{"title":"基于认证服务器和安全协议发布/订阅的物联网访问控制","authors":"Aulia Arif Wardana, Riza Satria Perdana","doi":"10.1109/ICITEED.2018.8534855","DOIUrl":null,"url":null,"abstract":"This study proposes a prototype model from access control security system in the Internet of Things (IoT) that uses the Message Queuing Telemetry Transport (MQTT) protocol as its communication and fog computing as its architecture with the authentication server and secure protocol. In the MQTT protocol, there are security mechanism issues such as publisher (device) authentication and data privacy protection is still not good. This causes the integrity and confidentiality of a data used by the subscriber to be less secure. Device nodes and gateway devices in IoT that become publishers will be authenticated to obtain tokens using authentication server via HTTPS. Tokens are embedding with sensor data inside secure payload format and publish to MQTT broker. Authentication server will perform management and validation credentials on all publishers and secure payload in MQTT broker. In addition, SSL certificates are applied to the MQTT protocol to secure their communications. Based on evaluation and security analysis, the application of access control mechanisms can be implemented on the MQTT protocol and can secure the integrity and confidentiality of data that sent from the device to the cloud over the internet. In the overhead analysis, there is a significant increase in payload because of the payload data sent with the token, but the latency of delivery time, CPU, memory usage is still up to a reasonable limit of not more than 50%.","PeriodicalId":142523,"journal":{"name":"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"Access Control on Internet of Things based on Publish/Subscribe using Authentication Server and Secure Protocol\",\"authors\":\"Aulia Arif Wardana, Riza Satria Perdana\",\"doi\":\"10.1109/ICITEED.2018.8534855\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study proposes a prototype model from access control security system in the Internet of Things (IoT) that uses the Message Queuing Telemetry Transport (MQTT) protocol as its communication and fog computing as its architecture with the authentication server and secure protocol. In the MQTT protocol, there are security mechanism issues such as publisher (device) authentication and data privacy protection is still not good. This causes the integrity and confidentiality of a data used by the subscriber to be less secure. Device nodes and gateway devices in IoT that become publishers will be authenticated to obtain tokens using authentication server via HTTPS. Tokens are embedding with sensor data inside secure payload format and publish to MQTT broker. Authentication server will perform management and validation credentials on all publishers and secure payload in MQTT broker. In addition, SSL certificates are applied to the MQTT protocol to secure their communications. Based on evaluation and security analysis, the application of access control mechanisms can be implemented on the MQTT protocol and can secure the integrity and confidentiality of data that sent from the device to the cloud over the internet. In the overhead analysis, there is a significant increase in payload because of the payload data sent with the token, but the latency of delivery time, CPU, memory usage is still up to a reasonable limit of not more than 50%.\",\"PeriodicalId\":142523,\"journal\":{\"name\":\"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITEED.2018.8534855\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITEED.2018.8534855","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Access Control on Internet of Things based on Publish/Subscribe using Authentication Server and Secure Protocol
This study proposes a prototype model from access control security system in the Internet of Things (IoT) that uses the Message Queuing Telemetry Transport (MQTT) protocol as its communication and fog computing as its architecture with the authentication server and secure protocol. In the MQTT protocol, there are security mechanism issues such as publisher (device) authentication and data privacy protection is still not good. This causes the integrity and confidentiality of a data used by the subscriber to be less secure. Device nodes and gateway devices in IoT that become publishers will be authenticated to obtain tokens using authentication server via HTTPS. Tokens are embedding with sensor data inside secure payload format and publish to MQTT broker. Authentication server will perform management and validation credentials on all publishers and secure payload in MQTT broker. In addition, SSL certificates are applied to the MQTT protocol to secure their communications. Based on evaluation and security analysis, the application of access control mechanisms can be implemented on the MQTT protocol and can secure the integrity and confidentiality of data that sent from the device to the cloud over the internet. In the overhead analysis, there is a significant increase in payload because of the payload data sent with the token, but the latency of delivery time, CPU, memory usage is still up to a reasonable limit of not more than 50%.