Exchanging Data Using MQTT Protocol In Arduino
Keywords:
MQTT, TLS, AES, DES, HTTP, IoT, CoAP, Md5Abstract
In the coming years, sensors will likely grow in
every aspect of our lives. Several activities explain
how the Internet of Things (IoT) will have an
impact on almost all aspect of our lives and why
security is at the top of the list of IoT challenges.
Device to Device communications (D2D) in IoT are
forecast and another major concern within the use
of IoT is to make sure device security, D2D
connectivity and high quality data. Therefore, a
proper communication protocol is required to fix
this issues. To address this, we purpose the use of
Message Queue Telemetry
Transport(MQTT)protocol to transfer data between
devices, as it is more secured. MQTT (Message
Queuing Telemetry Transport) is a
publish/subscribe messaging protocol which works
on top of the TCP/IP protocol. The key feature of
MQTT is its light weight, adds flexible
authentication and bandwidth efficiency. The result
of this study is transferring high quality data
securely using MQTT protocol.
References
OASIS MQTT Technical Committee, “MQTT
Version 5.0,” OASIS, Committee Specification 02,
May 2018.
H. Tschofenig and J. Arkko, “Report from the
Smart Object Workshop,” IETF, RFC 6574, Apr.
A. Niruntasukrat, C. Issariyapat, P.
Pongpaibool, K. Meesublak, P. Aiumsupucgul, and
A. Panya, “Authorization mechanism for MQTTbased Internet of Things,” in 2016 IEEE
International Conference on Communications
Workshops (ICC), 2016, pp. 290–295.
S. Katsikeas et al., “Lightweight secure
industrial IoT communications via the MQ
telemetry transport protocol,” in 2017 IEEE
Symposium on Computers and Communications
(ISCC), 2017, pp. 1193–1200.
M. Ion, “Security of Publish/Subscribe
Systems,” Ph.D. dissertation, University of Trento,
Italy, May 2013.
B. S. Adiga, P. Balamuralidhar, M. A. Rajan, R.
Shastry, and V. L. Shivraj, “An Identity Based
Encryption Using Elliptic Curve Cryptog- raphy
for Secure M2M Communication,” in Proceedings
of the First International Conference on Security of
Internet of Things, ser. SecurIT ’12. ACM, 2012,
pp. 68–74.
Ahlgren, B., Dannewitz, C., Imbrenda, C.,
Kutscher, D. and Ohlman, B., 2012. A survey of
information-centric networking. IEEE
Communications Magazine, 50(7).
Amadeo, M., Campolo, C., Quevedo, J.,
Corujo, D., Molinaro, A., Iera,A.Aguiar, R.L. and
Vasilakos, A.V., 2016. Information-centric
networking for the internet of things: challenges
and opportunities.
Luzuriaga, J. E., Cano, J. C., Calafate, C.,
Manzoni, P., Perez, M., & Boronat, P. (2015,
September). Handling mobility in IoT
applications