The Security Method in MQTT Protocol for Internet of Things

Chia-Fen Hsieh, Chih-Kai Chang
{"title":"The Security Method in MQTT Protocol for Internet of Things","authors":"Chia-Fen Hsieh, Chih-Kai Chang","doi":"10.1109/taai54685.2021.00061","DOIUrl":null,"url":null,"abstract":"One of the most extensive protocols on the Internet of Things is Message Queuing Telemetry Transport (MQTT). However, there is no complete security method for the security of this protocol. The confidentiality and integrity of the message cannot be ensured. In the Industrial Internet of Things, there is more and more confidential or sensitive information. Therefore, it is important to deliver the message correctly. The issue of information security has gradually received attention. MQTT, which only relies on TCP/IP, does not have encryption protection. It may become the target of a man-in-the-middle attack. This paper uses a new architecture to protect MQTT in two stages. First, it uses a one-time-password as the first-stage authentication mechanism. It is an OTP-based identity verification method and an effective algorithm to protect the device from improper use. It can eliminate the risk of unauthorized users gaining access rights. The second stage is to use the simple restriction of black and white lists. It realizes the second identity verification. Finally, to prevent sensitive information from being stolen or modified after being cracked. It encrypts the payload with Advanced Encryption Standard (AES). Ensure that confidential or sensitive information will not leak out due to attacks. In this way, the confidentiality and integrity of the data can be ensured.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/taai54685.2021.00061","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

One of the most extensive protocols on the Internet of Things is Message Queuing Telemetry Transport (MQTT). However, there is no complete security method for the security of this protocol. The confidentiality and integrity of the message cannot be ensured. In the Industrial Internet of Things, there is more and more confidential or sensitive information. Therefore, it is important to deliver the message correctly. The issue of information security has gradually received attention. MQTT, which only relies on TCP/IP, does not have encryption protection. It may become the target of a man-in-the-middle attack. This paper uses a new architecture to protect MQTT in two stages. First, it uses a one-time-password as the first-stage authentication mechanism. It is an OTP-based identity verification method and an effective algorithm to protect the device from improper use. It can eliminate the risk of unauthorized users gaining access rights. The second stage is to use the simple restriction of black and white lists. It realizes the second identity verification. Finally, to prevent sensitive information from being stolen or modified after being cracked. It encrypts the payload with Advanced Encryption Standard (AES). Ensure that confidential or sensitive information will not leak out due to attacks. In this way, the confidentiality and integrity of the data can be ensured.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网MQTT协议中的安全方法
在物联网中应用最广泛的协议之一是消息队列遥测传输(MQTT)。然而,对于该协议的安全性,目前还没有一个完整的安全方法。无法确保消息的机密性和完整性。在工业物联网中,机密或敏感信息越来越多。因此,正确地传递消息非常重要。信息安全问题逐渐受到重视。MQTT只依赖于TCP/IP,没有加密保护。它可能成为中间人攻击的目标。本文采用一种新的体系结构,分两个阶段对MQTT进行保护。首先,它使用一次性密码作为第一阶段身份验证机制。它是一种基于otp的身份验证方法,是保护设备不被不当使用的有效算法。它可以消除未经授权的用户获得访问权限的风险。第二阶段是使用简单的黑白名单限制。实现了二次身份验证。最后,防止敏感信息被窃取或被破解后被修改。它使用高级加密标准(AES)对有效负载进行加密。确保机密或敏感信息不会因攻击而泄露。这样可以保证数据的保密性和完整性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Using Random Forests and Decision Trees to Predict Viewing Game Live Streaming via Viewers’ Comments [Title page iii] An Automatic Response System based on Multi-layer Perceptual Neural Network and Web Crawler MLNN: A Novel Network Intrusion Detection Based on Multilayer Neural Network A Hybrid Deep Learning Network for Long-Term Travel Time Prediction in Freeways
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1