Skip to main content

Lightweight Secure-MQTT for Internet of Things

  • Conference paper
  • First Online:
Optical and Wireless Technologies

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 648))

Abstract

In this paper, a security mechanism for MQTT-enabled Internet of things (IoT) using a simple thin cryptographic process has been proposed. The key benefits of the proposed security mechanism are the simplicity, resilience to attacks, energy efficiency, and the speed of cryptographic computations such that it can be computed quickly. The encryption of MQTT payload is performed using lightweight operations so that a smaller amount of node energy is consumed in the process. To test the effectiveness of the proposed mechanism, Contiki-based simulation setup is created, wherein the implementation of the proposed solution is performed and tested in Cooja simulator. The analysis depicts that the proposed solution consumes less energy for enciphering data, provides security against possible attacks like spoofing attack and brute-force attack, and has tiny code footprint. It is contemplated that the proposed security solution can be used in protecting message confidentiality in the Internet of things environment and other low-power wireless networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gartner, http://www.gartner.com/newsroom/id/3598917, last accessed 2017/12/23

  2. Khan R, Khan SU, Zaheer R (2012) Future internet: the internet of things architecture, possible applications and key challenges. In: Proceedings of the international conference on frontiers of information technology (FIT). IEEE, India, pp 257–260

    Google Scholar 

  3. Ion M (2013) Security of publish/subscribe systems. Ph.D. thesis, University of Trento. http://eprints-phd.biblio.unitn.it/993/

  4. Introducing the MQTT Security Fundamentals. https://www.hivemq.com/blog/introducing-the-mqtt-security-fundamentals, last accessed 2018/03/15

  5. O’Neill ME (2014) PCG: a family of simple fast space-efficient statistically good algorithm for random number generation. HMC-CS-2014-0905

    Google Scholar 

  6. Biswas K, Muthukkumarasamy V, Wu XW, Singh K (2016) Performance evaluation of block ciphers for wireless sensor networks. In: Choudhary R et al (eds) Advanced computing and communication technologies. Springer, Singapore, pp 443–452

    Google Scholar 

  7. Wang X, Zhang J, Schooler E, Ion M (2014) Performance evaluation of attribute-based encryption: toward data privacy in the IoT. In: Proceedings of international conference on communications (ICC), Sydney, NSW. IEEE, pp 725–730

    Google Scholar 

  8. Pal P, Lauer G, Khoury J, Hoff N, Loyall J (2012) P3S: a privacy-preserving publish-subscribe middleware. In: Springer lecture notes in computer science book series (LNCS), vol 7662

    Google Scholar 

  9. Mishra S (2015) Network security protocol for constrained devices in the internet of things. IEEE INDICON

    Google Scholar 

  10. Park J, Kang N (2014) Lightweight secure communication for CoAP-enabled internet of things using delegated DTLS handshake. In: Proceedings of international conference on information and communication technology convergence (ICTC), Busan. IEEE, pp 28–33

    Google Scholar 

  11. Gaubatz G, Kaps JP, Sunar B (2005) State-of-the-art in ultra-low power public key cryptography for wireless sensor networks. In: Proceedings of 3rd IEEE international conference on pervasive computing and communications workshop (PERCOMW)

    Google Scholar 

  12. Kang N, Oh S, Yoon S (2014) Secure initial-key reconfiguration for resource-constrained devices. IETF draft-kang-core-secure-reconfiguration 01

    Google Scholar 

  13. Eclipse Mosquitto Broker, https://mosquitto.org

  14. Contiki Operating System, http://www.contiki-os.org/

  15. Andy S-C, Hong LT (2013) MQTT for sensor networks (MQTT-SN) protocol specification version 1.2, International Business Machines Corporation (IBM). https://stanford-clark.com

  16. Powertrace Tool, https://github.com/contiki-os/contiki/tree/master/apps/powertrace, (2015)

  17. Dunkels A, Erikson J, Finne N, Tsiftes N (2011) Powertrace: network-level power profiling for low-power wireless networks. SICS Technical Report T2011:05, ISSN 1100-3154

    Google Scholar 

  18. Zolertia Mote. https://zolertia.io/product/re-mote

  19. Bashir A, Mir AH (2017) Securing publish-subscribe services with dynamic security protocol in MQTT enabled internet of things. Int J Secur Its Appl 11(11):53–66

    Google Scholar 

  20. Bogdanov A et al (2007) PRESENT: an ultra-lightweight block cipher. In: Proceeding of workshop cryptographic hardware and embedded systems (CHES 07), LNCS 4727, Springer, pp 450–466

    Google Scholar 

  21. Hong D et al (2006) HIGHT: a new block cipher suitable for low resource device. In: Proceedings of CHES 2006, LNCS, vol 4249, pp 4659. Springer, Berlin

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bashir, A., Mir, A.H. (2020). Lightweight Secure-MQTT for Internet of Things. In: Janyani, V., Singh, G., Tiwari, M., Ismail, T. (eds) Optical and Wireless Technologies. Lecture Notes in Electrical Engineering, vol 648. Springer, Singapore. https://doi.org/10.1007/978-981-15-2926-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2926-9_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2925-2

  • Online ISBN: 978-981-15-2926-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics