Husnul Hidayat, Parman Sukarno, Aulia Arif Wardana
{"title":"MQTT协议中使用数字签名的开销分析","authors":"Husnul Hidayat, Parman Sukarno, Aulia Arif Wardana","doi":"10.1109/ICEEI47359.2019.8988861","DOIUrl":null,"url":null,"abstract":"This study proposes a digital signature scheme to secure messages sent by the publish/subscribe middleware Message Queue Telemetry Transport (MQTT) protocol. In which, it uses the Advanced Encryption System (AES) and Secure Hash Algorithm (SHA) with the end-to-end method and analyze the overhead of application of digital signature. Because, the disadvantage of MQTT is that there is no encryption process on the payload. In which, allows one to be able to find out the payload content that causes no privacy in the data. Data integrity is also a problem with MQTT. The purpose of this digital signature is to verify that the payload sent is a genuine one, which does not change during the transmission process, and the secrecy of the payload. After evaluating and testing the proposed system, the program can secure the MQTT payload. The addition of a security mechanism in MQTT such as the encryption process, decryption, verification results produces overhead in several aspects. The overhead used in this study is to measure the size of the payload, the time of sending messages, the process of the mechanism of digital signature security, memory consumption, and CPU usage. In an overhead analysis, overhead is carried out by examining various types of AES keys and multiple types of SHA. After examination, there is an increase in size for several aspects that have been mentioned because of the digital signature scheme.","PeriodicalId":236517,"journal":{"name":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Overhead Analysis on the Use of Digital Signature in MQTT Protocol\",\"authors\":\"Husnul Hidayat, Parman Sukarno, Aulia Arif Wardana\",\"doi\":\"10.1109/ICEEI47359.2019.8988861\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study proposes a digital signature scheme to secure messages sent by the publish/subscribe middleware Message Queue Telemetry Transport (MQTT) protocol. In which, it uses the Advanced Encryption System (AES) and Secure Hash Algorithm (SHA) with the end-to-end method and analyze the overhead of application of digital signature. Because, the disadvantage of MQTT is that there is no encryption process on the payload. In which, allows one to be able to find out the payload content that causes no privacy in the data. Data integrity is also a problem with MQTT. The purpose of this digital signature is to verify that the payload sent is a genuine one, which does not change during the transmission process, and the secrecy of the payload. After evaluating and testing the proposed system, the program can secure the MQTT payload. The addition of a security mechanism in MQTT such as the encryption process, decryption, verification results produces overhead in several aspects. The overhead used in this study is to measure the size of the payload, the time of sending messages, the process of the mechanism of digital signature security, memory consumption, and CPU usage. In an overhead analysis, overhead is carried out by examining various types of AES keys and multiple types of SHA. After examination, there is an increase in size for several aspects that have been mentioned because of the digital signature scheme.\",\"PeriodicalId\":236517,\"journal\":{\"name\":\"2019 International Conference on Electrical Engineering and Informatics (ICEEI)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Electrical Engineering and Informatics (ICEEI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEEI47359.2019.8988861\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEEI47359.2019.8988861","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Overhead Analysis on the Use of Digital Signature in MQTT Protocol
This study proposes a digital signature scheme to secure messages sent by the publish/subscribe middleware Message Queue Telemetry Transport (MQTT) protocol. In which, it uses the Advanced Encryption System (AES) and Secure Hash Algorithm (SHA) with the end-to-end method and analyze the overhead of application of digital signature. Because, the disadvantage of MQTT is that there is no encryption process on the payload. In which, allows one to be able to find out the payload content that causes no privacy in the data. Data integrity is also a problem with MQTT. The purpose of this digital signature is to verify that the payload sent is a genuine one, which does not change during the transmission process, and the secrecy of the payload. After evaluating and testing the proposed system, the program can secure the MQTT payload. The addition of a security mechanism in MQTT such as the encryption process, decryption, verification results produces overhead in several aspects. The overhead used in this study is to measure the size of the payload, the time of sending messages, the process of the mechanism of digital signature security, memory consumption, and CPU usage. In an overhead analysis, overhead is carried out by examining various types of AES keys and multiple types of SHA. After examination, there is an increase in size for several aspects that have been mentioned because of the digital signature scheme.