The Security Method in MQTT Protocol for Internet of Things

Chia-Fen Hsieh, Chih-Kai Chang
{"title":"The Security Method in MQTT Protocol for Internet of Things","authors":"Chia-Fen Hsieh, Chih-Kai Chang","doi":"10.1109/taai54685.2021.00061","DOIUrl":null,"url":null,"abstract":"One of the most extensive protocols on the Internet of Things is Message Queuing Telemetry Transport (MQTT). However, there is no complete security method for the security of this protocol. The confidentiality and integrity of the message cannot be ensured. In the Industrial Internet of Things, there is more and more confidential or sensitive information. Therefore, it is important to deliver the message correctly. The issue of information security has gradually received attention. MQTT, which only relies on TCP/IP, does not have encryption protection. It may become the target of a man-in-the-middle attack. This paper uses a new architecture to protect MQTT in two stages. First, it uses a one-time-password as the first-stage authentication mechanism. It is an OTP-based identity verification method and an effective algorithm to protect the device from improper use. It can eliminate the risk of unauthorized users gaining access rights. The second stage is to use the simple restriction of black and white lists. It realizes the second identity verification. Finally, to prevent sensitive information from being stolen or modified after being cracked. It encrypts the payload with Advanced Encryption Standard (AES). Ensure that confidential or sensitive information will not leak out due to attacks. In this way, the confidentiality and integrity of the data can be ensured.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/taai54685.2021.00061","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

One of the most extensive protocols on the Internet of Things is Message Queuing Telemetry Transport (MQTT). However, there is no complete security method for the security of this protocol. The confidentiality and integrity of the message cannot be ensured. In the Industrial Internet of Things, there is more and more confidential or sensitive information. Therefore, it is important to deliver the message correctly. The issue of information security has gradually received attention. MQTT, which only relies on TCP/IP, does not have encryption protection. It may become the target of a man-in-the-middle attack. This paper uses a new architecture to protect MQTT in two stages. First, it uses a one-time-password as the first-stage authentication mechanism. It is an OTP-based identity verification method and an effective algorithm to protect the device from improper use. It can eliminate the risk of unauthorized users gaining access rights. The second stage is to use the simple restriction of black and white lists. It realizes the second identity verification. Finally, to prevent sensitive information from being stolen or modified after being cracked. It encrypts the payload with Advanced Encryption Standard (AES). Ensure that confidential or sensitive information will not leak out due to attacks. In this way, the confidentiality and integrity of the data can be ensured.
物联网MQTT协议中的安全方法
在物联网中应用最广泛的协议之一是消息队列遥测传输(MQTT)。然而,对于该协议的安全性,目前还没有一个完整的安全方法。无法确保消息的机密性和完整性。在工业物联网中,机密或敏感信息越来越多。因此,正确地传递消息非常重要。信息安全问题逐渐受到重视。MQTT只依赖于TCP/IP,没有加密保护。它可能成为中间人攻击的目标。本文采用一种新的体系结构,分两个阶段对MQTT进行保护。首先,它使用一次性密码作为第一阶段身份验证机制。它是一种基于otp的身份验证方法,是保护设备不被不当使用的有效算法。它可以消除未经授权的用户获得访问权限的风险。第二阶段是使用简单的黑白名单限制。实现了二次身份验证。最后,防止敏感信息被窃取或被破解后被修改。它使用高级加密标准(AES)对有效负载进行加密。确保机密或敏感信息不会因攻击而泄露。这样可以保证数据的保密性和完整性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信