{"title":"物联网MQTT协议中的安全方法","authors":"Chia-Fen Hsieh, Chih-Kai Chang","doi":"10.1109/taai54685.2021.00061","DOIUrl":null,"url":null,"abstract":"One of the most extensive protocols on the Internet of Things is Message Queuing Telemetry Transport (MQTT). However, there is no complete security method for the security of this protocol. The confidentiality and integrity of the message cannot be ensured. In the Industrial Internet of Things, there is more and more confidential or sensitive information. Therefore, it is important to deliver the message correctly. The issue of information security has gradually received attention. MQTT, which only relies on TCP/IP, does not have encryption protection. It may become the target of a man-in-the-middle attack. This paper uses a new architecture to protect MQTT in two stages. First, it uses a one-time-password as the first-stage authentication mechanism. It is an OTP-based identity verification method and an effective algorithm to protect the device from improper use. It can eliminate the risk of unauthorized users gaining access rights. The second stage is to use the simple restriction of black and white lists. It realizes the second identity verification. Finally, to prevent sensitive information from being stolen or modified after being cracked. It encrypts the payload with Advanced Encryption Standard (AES). Ensure that confidential or sensitive information will not leak out due to attacks. In this way, the confidentiality and integrity of the data can be ensured.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"The Security Method in MQTT Protocol for Internet of Things\",\"authors\":\"Chia-Fen Hsieh, Chih-Kai Chang\",\"doi\":\"10.1109/taai54685.2021.00061\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most extensive protocols on the Internet of Things is Message Queuing Telemetry Transport (MQTT). However, there is no complete security method for the security of this protocol. The confidentiality and integrity of the message cannot be ensured. In the Industrial Internet of Things, there is more and more confidential or sensitive information. Therefore, it is important to deliver the message correctly. The issue of information security has gradually received attention. MQTT, which only relies on TCP/IP, does not have encryption protection. It may become the target of a man-in-the-middle attack. This paper uses a new architecture to protect MQTT in two stages. First, it uses a one-time-password as the first-stage authentication mechanism. It is an OTP-based identity verification method and an effective algorithm to protect the device from improper use. It can eliminate the risk of unauthorized users gaining access rights. The second stage is to use the simple restriction of black and white lists. It realizes the second identity verification. Finally, to prevent sensitive information from being stolen or modified after being cracked. It encrypts the payload with Advanced Encryption Standard (AES). Ensure that confidential or sensitive information will not leak out due to attacks. In this way, the confidentiality and integrity of the data can be ensured.\",\"PeriodicalId\":343821,\"journal\":{\"name\":\"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/taai54685.2021.00061\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/taai54685.2021.00061","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Security Method in MQTT Protocol for Internet of Things
One of the most extensive protocols on the Internet of Things is Message Queuing Telemetry Transport (MQTT). However, there is no complete security method for the security of this protocol. The confidentiality and integrity of the message cannot be ensured. In the Industrial Internet of Things, there is more and more confidential or sensitive information. Therefore, it is important to deliver the message correctly. The issue of information security has gradually received attention. MQTT, which only relies on TCP/IP, does not have encryption protection. It may become the target of a man-in-the-middle attack. This paper uses a new architecture to protect MQTT in two stages. First, it uses a one-time-password as the first-stage authentication mechanism. It is an OTP-based identity verification method and an effective algorithm to protect the device from improper use. It can eliminate the risk of unauthorized users gaining access rights. The second stage is to use the simple restriction of black and white lists. It realizes the second identity verification. Finally, to prevent sensitive information from being stolen or modified after being cracked. It encrypts the payload with Advanced Encryption Standard (AES). Ensure that confidential or sensitive information will not leak out due to attacks. In this way, the confidentiality and integrity of the data can be ensured.