Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Lightweight Security Scheme for MQTT or MQTT-SN Protocol - 2019

Lightweight Security Scheme For Mqtt Or Mqtt-Sn Protocol

Research Area:  Internet of Things

Abstract:

In the coming years, sensors will likely have a permeated every aspect of our life. Several works explain how the Internet of things (IoT) will have an impact on almost all aspects of our life and why security is at the top of the list of IoT challenges. Constrained nodes constitute a significant portion of devices in IoT. These nodes are characterized by severe constraints on power, memory, and processing resources, therefore, do not support conventional security protocols such as Transport Layer Security (TLS). Message Queue Telemetry Transport (MQTT) is a lightweight communication protocol particularly adapted for constrained nodes. Security solution, in MQTT protocol, can be achieved in multiple layers. To ensure end-to-end encryption, Authenticated Encryption with Associated Data (AEAD) is one of the most recommended solutions. Actually, the Advanced Encryption Standard (AES) is one of the most widely used standard encryption methods. However, constrained nodes processors did not have hardware support for AES and the physical-layer packet size of these nodes is limited. This paper proposes ChaCha20-Po1y1305 AEAD as a solution to secure constrained nodes communication over MQTT/MQTT-SN. ChaCha20 and Poly1305 are respectively lightweight stream cipher and one-time authenticator which continue gain popularity from crypto community. A prototype of the proposed solution is implemented on constrained nodes like Arduino UNO. The paper mainly provides results related to memory footprint and execution time. These results indicate that the proposed scheme requires small amount of memory and present low processing time.

Keywords:  

Author(s) Name:  Ousmane Sadio; Ibrahima Ngom; Claude Lishou

Journal name:  

Conferrence name:  International Conference on Internet of Things: Systems, Management and Security

Publisher name:  IEEE

DOI:  10.1109/IOTSMS48152.2019.8939177

Volume Information: