An extensible and transparent thing-to-thing security enhancement for MQTT protocol in IoT environment

Wei Tsung Su, Wei Cheng Chen, Chao Chun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Message Queue Telemetry Transport (MQTT) is widely accepted as a data exchange protocol in Internet of Things (IoT) environment. For security, MQTT supports Transport Layer Security (MQTT-TLS). However, MQTT-TLS provides thing-to-broker channel encryption only because data can still be exposed after MQTT broker. In addition, ACL becomes impractical due to the increasing number of rules for authorizing massive IoT devices. For solving these problems, we propose MQTT Thing-to-Thing Security (MQTT-TTS) which provides thing-to-thing security which prevents data leak. MQTT-TTS also provides the extensibility to include demanded security mechanisms for various security requirements. Moreover, the transparency of MQTT-TTS lets IoT application developers implementing secure data exchange with less programming efforts. Our MQTT-TTS implementation is available on https://github.com/beebit-sec/beebit-mqttc-sdk for evaluation.

Original languageEnglish
Title of host publicationGlobal IoT Summit, GIoTS 2019 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728121710
DOIs
Publication statusPublished - 2019 Jun
Event3rd Global IoT Summit, GIoTS 2019 - Aarhus, Denmark
Duration: 2019 Jun 172019 Jun 21

Publication series

NameGlobal IoT Summit, GIoTS 2019 - Proceedings

Conference

Conference3rd Global IoT Summit, GIoTS 2019
CountryDenmark
CityAarhus
Period19-06-1719-06-21

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Geography, Planning and Development
  • Hardware and Architecture

Fingerprint Dive into the research topics of 'An extensible and transparent thing-to-thing security enhancement for MQTT protocol in IoT environment'. Together they form a unique fingerprint.

Cite this