{"title":"Authentication algorithm for internet of things networks based on MQTT protocol","authors":"D. Dikii","doi":"10.2298/sjee2003389d","DOIUrl":null,"url":null,"abstract":"The authentication algorithm for machine-to-machine communication devices via the MQTT Protocol is considered, which allows verifying the device legality without sending the password. The algorithm protects the Internet of things network from unauthorized access, ensures confidentiality by generating a common session key, and provides protection against attacks of the \"man in the middle\" and others. The obtained experiment results showed noticeable performance improvement compared to the TLS Protocol. The cryptographic strength of the proposed algorithm is based on the discrete logarithm problem. The main advantage of the algorithm is the ability to authenticate in one requestresponse cycle.","PeriodicalId":37704,"journal":{"name":"Serbian Journal of Electrical Engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Serbian Journal of Electrical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2298/sjee2003389d","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 3
Abstract
The authentication algorithm for machine-to-machine communication devices via the MQTT Protocol is considered, which allows verifying the device legality without sending the password. The algorithm protects the Internet of things network from unauthorized access, ensures confidentiality by generating a common session key, and provides protection against attacks of the "man in the middle" and others. The obtained experiment results showed noticeable performance improvement compared to the TLS Protocol. The cryptographic strength of the proposed algorithm is based on the discrete logarithm problem. The main advantage of the algorithm is the ability to authenticate in one requestresponse cycle.
期刊介绍:
The main aims of the Journal are to publish peer review papers giving results of the fundamental and applied research in the field of electrical engineering. The Journal covers a wide scope of problems in the following scientific fields: Applied and Theoretical Electromagnetics, Instrumentation and Measurement, Power Engineering, Power Systems, Electrical Machines, Electrical Drives, Electronics, Telecommunications, Computer Engineering, Automatic Control and Systems, Mechatronics, Electrical Materials, Information Technologies, Engineering Mathematics, etc.