CFP last date
20 December 2024
Reseach Article

Secure Authentication, Contract and Communication for IoT Environment using MQTT Protocol

by Hariprasanna M.A., P. Mahesha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 24
Year of Publication: 2020
Authors: Hariprasanna M.A., P. Mahesha
10.5120/ijca2020920776

Hariprasanna M.A., P. Mahesha . Secure Authentication, Contract and Communication for IoT Environment using MQTT Protocol. International Journal of Computer Applications. 175, 24 ( Oct 2020), 40-43. DOI=10.5120/ijca2020920776

@article{ 10.5120/ijca2020920776,
author = { Hariprasanna M.A., P. Mahesha },
title = { Secure Authentication, Contract and Communication for IoT Environment using MQTT Protocol },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2020 },
volume = { 175 },
number = { 24 },
month = { Oct },
year = { 2020 },
issn = { 0975-8887 },
pages = { 40-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number24/31602-2020920776/ },
doi = { 10.5120/ijca2020920776 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:26:02.532131+05:30
%A Hariprasanna M.A.
%A P. Mahesha
%T Secure Authentication, Contract and Communication for IoT Environment using MQTT Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 24
%P 40-43
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet of Things (IoT) is a subject of ample interest and it is a current technology. In last few years, security of the IoT systems is a field of wonderful research activities. Mutual authentication between the IoT devices and Users of IoT Environment is a significant part of secure IoT systems. Widely used authentication mechanisms, which are Single password based, are vulnerable to the side-channel and dictionary attacks. In this paper, multi-key based mutual authentication mechanism to provide a secure authentication, contract and communication between the IoT devices and Users of IoT Environment is introduced. In this approach, the publish-subscribe based Message Queuing Telemetry Transport (MQTT) protocol is used for secure communication, which is bandwidth-efficient and uses small amount of battery power. Using the Blockchain technology to store data helps to bring trust and transparency in the developed model. In order to demonstrate this entire methodology, authors have created a prototype using NodeMCU IoT platform for IoT Environment. The NodeMCU IoT platform is used for making effectual and fast IoT applications. The goal is to provide a secure authentication, contract and communication for IoT Environment. It is satisfactorily achieved with good response time as authenticated user can only be able to access control the IoT device.

References
  1. Trusit Shah and S. Venkatesan, “Authentication of IoT Device and IoT Server Using Secure Vaults”, In Proceedings of 17th IEEE International Conference, New York, USA, pp. 819-824, 2018.
  2. Kalra S and Sood S. K, “Secure Authentication Scheme for IoT and Cloud Servers”, Journal of Pervasive and Mobile Computing, Elsevier Publications, Vol. 24, pp. 210-233, 2015.
  3. Hao Zhang and Tingting Zhang, “A Peer to Peer Security Protocol for the Internet of Things”, In Proceedings of 18thIEEE International Conference, Paris, France, 2015.
  4. Randa Almadhoun, Maha Kadadha and Maya Alhemeiri, “A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes”, In Proceedings of 15th IEEE International Conference, Aqaba, Jordan, pp.1-8,2018.
  5. Hittu Garg and Mayank Dave, “Securing IoT Devices and Securely Connecting the Dots Using REST API and Middleware”, In Proceedings of 4th IEEE International Conference, Ghaziabad, India, pp. 1-6, 2019.
  6. Alok Kumar Gupta and Rahul Johari, “IOT based Electrical Device Surveillance and Control System”, In Proceedings of 4th IEEE International Conference, Ghaziabad, India, pp. 1-5, 2019.
  7. Jun Suzuki, Akira Tsuji, Yuki Hayashi, Masaki Kan and Shinya Miyakawa,“Device-Level IoT with Virtual I/O Device Interconnection”, In Proceedings of IEEE International Conference, Luxembourg City, Luxembourg, pp. 67-74, 2016.
  8. Shapna Muralidharan and Heedong Ko, “An Inter Planetary File System (IPFS) based IoT framework”, In Proceedings of IEEE International Conference, Las Vegas, NV, USA, USA, pp. 1-2, 2018.
  9. Madhusudhan Singh, Abhiraj Singh and Shiho Kim, “Blockchain: A Game Changer for Securing IoT Data”, In Proceedings of 4th IEEE International Conference, Singapore, pp. 51-55, 2018.
  10. Hien Thi Thu Truong, Miguel Almeida, Ghassan Karame and Claudio Soriente, “Towards Secure and Decentralized Sharing of IoT Data”, In Proceedings of IEEE International Conference, Atlanta, GA, USA, pp. 176-183, 2019.
  11. Seul-Ki Choi, Ju-Seong Ko and Jin Kwak, “A Study on IoT Device Authentication Protocol for High Speed and Lightweight”, In Proceedings of IEEE International Conference, Jeju, Korea(South), pp. 1-5, 2019.
  12. Sarada Prasad Gochhayat, Eranga Bandara, Sachin Shetty and Peter Foytik, “Blockchain based Encrypted Cloud Storage for IoT Data”, In Proceedings of IEEE International Conference, Atlanta, GA, USA, pp. 483-489, 2019.
Index Terms

Computer Science
Information Sciences

Keywords

IoT Device Users of IoT Environment Message Queuing Telemetry Transport (MQTT) protocol Adler-32