Abstract
In this paper, a security mechanism for MQTT-enabled Internet of things (IoT) using a simple thin cryptographic process has been proposed. The key benefits of the proposed security mechanism are the simplicity, resilience to attacks, energy efficiency, and the speed of cryptographic computations such that it can be computed quickly. The encryption of MQTT payload is performed using lightweight operations so that a smaller amount of node energy is consumed in the process. To test the effectiveness of the proposed mechanism, Contiki-based simulation setup is created, wherein the implementation of the proposed solution is performed and tested in Cooja simulator. The analysis depicts that the proposed solution consumes less energy for enciphering data, provides security against possible attacks like spoofing attack and brute-force attack, and has tiny code footprint. It is contemplated that the proposed security solution can be used in protecting message confidentiality in the Internet of things environment and other low-power wireless networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gartner, http://www.gartner.com/newsroom/id/3598917, last accessed 2017/12/23
Khan R, Khan SU, Zaheer R (2012) Future internet: the internet of things architecture, possible applications and key challenges. In: Proceedings of the international conference on frontiers of information technology (FIT). IEEE, India, pp 257–260
Ion M (2013) Security of publish/subscribe systems. Ph.D. thesis, University of Trento. http://eprints-phd.biblio.unitn.it/993/
Introducing the MQTT Security Fundamentals. https://www.hivemq.com/blog/introducing-the-mqtt-security-fundamentals, last accessed 2018/03/15
O’Neill ME (2014) PCG: a family of simple fast space-efficient statistically good algorithm for random number generation. HMC-CS-2014-0905
Biswas K, Muthukkumarasamy V, Wu XW, Singh K (2016) Performance evaluation of block ciphers for wireless sensor networks. In: Choudhary R et al (eds) Advanced computing and communication technologies. Springer, Singapore, pp 443–452
Wang X, Zhang J, Schooler E, Ion M (2014) Performance evaluation of attribute-based encryption: toward data privacy in the IoT. In: Proceedings of international conference on communications (ICC), Sydney, NSW. IEEE, pp 725–730
Pal P, Lauer G, Khoury J, Hoff N, Loyall J (2012) P3S: a privacy-preserving publish-subscribe middleware. In: Springer lecture notes in computer science book series (LNCS), vol 7662
Mishra S (2015) Network security protocol for constrained devices in the internet of things. IEEE INDICON
Park J, Kang N (2014) Lightweight secure communication for CoAP-enabled internet of things using delegated DTLS handshake. In: Proceedings of international conference on information and communication technology convergence (ICTC), Busan. IEEE, pp 28–33
Gaubatz G, Kaps JP, Sunar B (2005) State-of-the-art in ultra-low power public key cryptography for wireless sensor networks. In: Proceedings of 3rd IEEE international conference on pervasive computing and communications workshop (PERCOMW)
Kang N, Oh S, Yoon S (2014) Secure initial-key reconfiguration for resource-constrained devices. IETF draft-kang-core-secure-reconfiguration 01
Eclipse Mosquitto Broker, https://mosquitto.org
Contiki Operating System, http://www.contiki-os.org/
Andy S-C, Hong LT (2013) MQTT for sensor networks (MQTT-SN) protocol specification version 1.2, International Business Machines Corporation (IBM). https://stanford-clark.com
Powertrace Tool, https://github.com/contiki-os/contiki/tree/master/apps/powertrace, (2015)
Dunkels A, Erikson J, Finne N, Tsiftes N (2011) Powertrace: network-level power profiling for low-power wireless networks. SICS Technical Report T2011:05, ISSN 1100-3154
Zolertia Mote. https://zolertia.io/product/re-mote
Bashir A, Mir AH (2017) Securing publish-subscribe services with dynamic security protocol in MQTT enabled internet of things. Int J Secur Its Appl 11(11):53–66
Bogdanov A et al (2007) PRESENT: an ultra-lightweight block cipher. In: Proceeding of workshop cryptographic hardware and embedded systems (CHES 07), LNCS 4727, Springer, pp 450–466
Hong D et al (2006) HIGHT: a new block cipher suitable for low resource device. In: Proceedings of CHES 2006, LNCS, vol 4249, pp 4659. Springer, Berlin
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bashir, A., Mir, A.H. (2020). Lightweight Secure-MQTT for Internet of Things. In: Janyani, V., Singh, G., Tiwari, M., Ismail, T. (eds) Optical and Wireless Technologies. Lecture Notes in Electrical Engineering, vol 648. Springer, Singapore. https://doi.org/10.1007/978-981-15-2926-9_7
Download citation
DOI: https://doi.org/10.1007/978-981-15-2926-9_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2925-2
Online ISBN: 978-981-15-2926-9
eBook Packages: EngineeringEngineering (R0)