SECURITY OF DATA TRANSFER TO THE INTERNET OF THINGS

Belej Olexander, Lohutova Tamara
{"title":"SECURITY OF DATA TRANSFER TO THE INTERNET OF THINGS","authors":"Belej Olexander, Lohutova Tamara","doi":"10.28925/2663-4023.2019.6.618","DOIUrl":null,"url":null,"abstract":"The article discusses the MQTT protocol for the Internet of Things and touch wireless networks, its features, applications, and specific procedures. The information elements and principles of the message owner are analyzed. This article covers topics such as secure storage of the Internet of Things, the transfer of that data through the secure interface of mobile devices and web applications. It also looks at all the key tools provided by MQTT for information security. The proposed identification of users in this article is to identify them from the Cloudant database. This application works on the Node.js server in IBM Bluemix and provides an API or RESTful that requires mobile client authentication. The mobile client access service is designed to call these two APIs in any authentication application. It is suggested to use separate authentication approaches: for the web application - on the Cloud Directory and for the mobile application - MobileFirst Client Access. However, both the web and mobile applications use the same level of application security to allow the user to access device data. To improve the security of messages, it is suggested to use a transport layer security protocol that uses different cryptographic methods. We are offered homomorphic encryption of these protocols. The transport layer security protocol increases the performance of the protocol and reduces the computational cost, but it does not apply when initially connecting to the server or when a previous session has already expired. The article presents an algorithm for the detection of weak symmetry breaking for the analysis of the chance of a recovered e-mail. A method of homomorphic encryption and authentication of users and their emails in wireless sensor networks of the Internet of Things is proposed.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity: Education, Science, Technique","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.28925/2663-4023.2019.6.618","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The article discusses the MQTT protocol for the Internet of Things and touch wireless networks, its features, applications, and specific procedures. The information elements and principles of the message owner are analyzed. This article covers topics such as secure storage of the Internet of Things, the transfer of that data through the secure interface of mobile devices and web applications. It also looks at all the key tools provided by MQTT for information security. The proposed identification of users in this article is to identify them from the Cloudant database. This application works on the Node.js server in IBM Bluemix and provides an API or RESTful that requires mobile client authentication. The mobile client access service is designed to call these two APIs in any authentication application. It is suggested to use separate authentication approaches: for the web application - on the Cloud Directory and for the mobile application - MobileFirst Client Access. However, both the web and mobile applications use the same level of application security to allow the user to access device data. To improve the security of messages, it is suggested to use a transport layer security protocol that uses different cryptographic methods. We are offered homomorphic encryption of these protocols. The transport layer security protocol increases the performance of the protocol and reduces the computational cost, but it does not apply when initially connecting to the server or when a previous session has already expired. The article presents an algorithm for the detection of weak symmetry breaking for the analysis of the chance of a recovered e-mail. A method of homomorphic encryption and authentication of users and their emails in wireless sensor networks of the Internet of Things is proposed.
数据传输到物联网的安全性
本文讨论了用于物联网和触摸无线网络的MQTT协议、其特性、应用程序和具体过程。分析了消息所有者的信息构成要素和原则。本文涵盖了物联网的安全存储、通过移动设备和web应用程序的安全接口传输数据等主题。本文还介绍了MQTT为信息安全提供的所有关键工具。本文中建议的用户标识是从Cloudant数据库中标识用户。此应用程序在IBM Bluemix中的Node.js服务器上工作,并提供需要移动客户端身份验证的API或RESTful。移动客户端访问服务被设计为在任何身份验证应用程序中调用这两个api。建议使用单独的身份验证方法:对于web应用程序-在云目录上,对于移动应用程序- MobileFirst客户端访问。但是,web和移动应用程序都使用相同级别的应用程序安全来允许用户访问设备数据。为了提高消息的安全性,建议使用使用不同加密方法的传输层安全协议。我们提供了这些协议的同态加密。传输层安全协议提高了协议的性能并减少了计算成本,但在最初连接到服务器或之前的会话已经过期时,它并不适用。本文提出了一种检测弱对称性破缺的算法,用于分析电子邮件恢复的可能性。提出了一种物联网无线传感器网络中用户及其电子邮件的同态加密与认证方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信