Exchanging Data Using MQTT Protocol In Arduino

Authors

  • Arefa Shafique Shaikh P.G. Student, Department of Computer Science Engineering, Sandip University Nashik

Keywords:

MQTT, TLS, AES, DES, HTTP, IoT, CoAP, Md5

Abstract

In the coming years, sensors will likely grow in
every aspect of our lives. Several activities explain
how the Internet of Things (IoT) will have an
impact on almost all aspect of our lives and why
security is at the top of the list of IoT challenges.
Device to Device communications (D2D) in IoT are
forecast and another major concern within the use
of IoT is to make sure device security, D2D
connectivity and high quality data. Therefore, a
proper communication protocol is required to fix
this issues. To address this, we purpose the use of
Message Queue Telemetry
Transport(MQTT)protocol to transfer data between
devices, as it is more secured. MQTT (Message
Queuing Telemetry Transport) is a
publish/subscribe messaging protocol which works
on top of the TCP/IP protocol. The key feature of
MQTT is its light weight, adds flexible
authentication and bandwidth efficiency. The result
of this study is transferring high quality data
securely using MQTT protocol.

References

OASIS MQTT Technical Committee, “MQTT

Version 5.0,” OASIS, Committee Specification 02,

May 2018.

H. Tschofenig and J. Arkko, “Report from the

Smart Object Workshop,” IETF, RFC 6574, Apr.

A. Niruntasukrat, C. Issariyapat, P.

Pongpaibool, K. Meesublak, P. Aiumsupucgul, and

A. Panya, “Authorization mechanism for MQTTbased Internet of Things,” in 2016 IEEE

International Conference on Communications

Workshops (ICC), 2016, pp. 290–295.

S. Katsikeas et al., “Lightweight secure

industrial IoT communications via the MQ

telemetry transport protocol,” in 2017 IEEE

Symposium on Computers and Communications

(ISCC), 2017, pp. 1193–1200.

M. Ion, “Security of Publish/Subscribe

Systems,” Ph.D. dissertation, University of Trento,

Italy, May 2013.

B. S. Adiga, P. Balamuralidhar, M. A. Rajan, R.

Shastry, and V. L. Shivraj, “An Identity Based

Encryption Using Elliptic Curve Cryptog- raphy

for Secure M2M Communication,” in Proceedings

of the First International Conference on Security of

Internet of Things, ser. SecurIT ’12. ACM, 2012,

pp. 68–74.

Ahlgren, B., Dannewitz, C., Imbrenda, C.,

Kutscher, D. and Ohlman, B., 2012. A survey of

information-centric networking. IEEE

Communications Magazine, 50(7).

Amadeo, M., Campolo, C., Quevedo, J.,

Corujo, D., Molinaro, A., Iera,A.Aguiar, R.L. and

Vasilakos, A.V., 2016. Information-centric

networking for the internet of things: challenges

and opportunities.

Luzuriaga, J. E., Cano, J. C., Calafate, C.,

Manzoni, P., Perez, M., & Boronat, P. (2015,

September). Handling mobility in IoT

applications

Downloads

Published

2021-06-01

How to Cite

Arefa Shafique Shaikh. (2021). Exchanging Data Using MQTT Protocol In Arduino. iJournals:International Journal of Software & Hardware Research in Engineering ISSN:2347-4890, 9(5). Retrieved from https://ijournals.in/journal/index.php/ijshre/article/view/25