Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Design and Implementation of Efficient IoT Authentication Schemes for MQTT 5.0

View through CrossRef
<p>MQTT (Message Queue Telemetry Transport) is one of the most popular Internet of Things (IoT) communication protocols, owing to its lightweight and easiness to use. The previous MQTT standards (including version 3.1 and its precedents) do not provide proper security functions; instead, they assume the adoption of SSL/TLS in the underlying layer. However, it not only incurs larger overhead but also hinders the development of suitable authentication/confidentiality protection to suit various MQTT deployment scenarios. The newest MQTT standard called MQTT 5.0 responds to these challenges by supporting the Enhanced Authentication framework in which designers can design and implement any secure authentication mechanisms within the framework. This paper designs and implements two efficient authentication protocols, using the MQTT 5.0 Enhanced Authentication framework. One is simple challenge-response authentication scheme, and the other is an anonymous challenge-response authentication scheme. We extend HiveMQ platform to implement the schemes and evaluate the performance. The results show that the proposed schemes demand only hundred few more milliseconds to achieve much robust authentication, compared to the simple identity-password authentication.</p> <p>&nbsp;</p>
Title: Design and Implementation of Efficient IoT Authentication Schemes for MQTT 5.0
Description:
<p>MQTT (Message Queue Telemetry Transport) is one of the most popular Internet of Things (IoT) communication protocols, owing to its lightweight and easiness to use.
The previous MQTT standards (including version 3.
1 and its precedents) do not provide proper security functions; instead, they assume the adoption of SSL/TLS in the underlying layer.
However, it not only incurs larger overhead but also hinders the development of suitable authentication/confidentiality protection to suit various MQTT deployment scenarios.
The newest MQTT standard called MQTT 5.
0 responds to these challenges by supporting the Enhanced Authentication framework in which designers can design and implement any secure authentication mechanisms within the framework.
This paper designs and implements two efficient authentication protocols, using the MQTT 5.
0 Enhanced Authentication framework.
One is simple challenge-response authentication scheme, and the other is an anonymous challenge-response authentication scheme.
We extend HiveMQ platform to implement the schemes and evaluate the performance.
The results show that the proposed schemes demand only hundred few more milliseconds to achieve much robust authentication, compared to the simple identity-password authentication.
</p> <p>&nbsp;</p>.

Related Results

Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although MQTT se...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks
Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks
Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the a...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Securing the MQTT Protocol using Enhanced Cryptographic techniques in IoT Surroundings
Securing the MQTT Protocol using Enhanced Cryptographic techniques in IoT Surroundings
Abstract Protocol of MQTT - Message Queuing Telemetry Transport process is among the majority of lengthy procedures in IoT protocols. Nevertheless, this particular p...
Design
Design
Conventional definitions of design rarely capture its reach into our everyday lives. The Design Council, for example, estimates that more than 2.5 million people use design-related...
Perancangan dan Implementasi Sistem Peringatan Dini Banjir Berbasis IoT dengan ESP32, MQTT, dan Aplikasi Kodular
Perancangan dan Implementasi Sistem Peringatan Dini Banjir Berbasis IoT dengan ESP32, MQTT, dan Aplikasi Kodular
Floods are the most frequent natural disasters and cause material and non-material losses. One of the problems faced is the lack of early warning when floods occur. This problem ca...

Back to Top