{"title":"Evaluating Secure Variants of the MQTT Protocol on Resource-Constraint Devices for Precision Agriculture","authors":"Mislav Has, M. Kusek, Ivana Podnar Žarko","doi":"10.1109/ConTEL58387.2023.10199102","DOIUrl":null,"url":null,"abstract":"When it comes to securing IoT communication, it is critical to employ secure communication technologies that can ensure that sensitive information exchanged between IoT devices and fog/edge/cloud services remains confidential. Since typical IoT devices are resource-constraint, it is challenging to use and deploy secure IoT protocols on such devices: It is thus critical to study the overhead of such protocols for resource-constrained devices, as it significantly affects the performance of an overall IoT solution. In this paper, we analyze the secure variants of the widely used messaging protocol MQ Telemetry Transport (MQTT), namely MQTT with TLS and MQTT with AES. We report the results of our performance evaluation in the context of an IoT solution for Precision Agriculture using an STM32 microcontroller with an NB-IoT module to compare these variants with plain MQTT and determine the most appropriate options based on the amount of data transmitted and achieved security level.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 17th International Conference on Telecommunications (ConTEL)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ConTEL58387.2023.10199102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
When it comes to securing IoT communication, it is critical to employ secure communication technologies that can ensure that sensitive information exchanged between IoT devices and fog/edge/cloud services remains confidential. Since typical IoT devices are resource-constraint, it is challenging to use and deploy secure IoT protocols on such devices: It is thus critical to study the overhead of such protocols for resource-constrained devices, as it significantly affects the performance of an overall IoT solution. In this paper, we analyze the secure variants of the widely used messaging protocol MQ Telemetry Transport (MQTT), namely MQTT with TLS and MQTT with AES. We report the results of our performance evaluation in the context of an IoT solution for Precision Agriculture using an STM32 microcontroller with an NB-IoT module to compare these variants with plain MQTT and determine the most appropriate options based on the amount of data transmitted and achieved security level.