Security Architecture and Protocols for Secure MQTT-SN
Message Queuing Telemetry Transport (MQTT) is a de facto standard for various Internet of Things (IoT) and industrial IoT applications. The data produced by a publisher are delivered to several subscribers via an MQTT broker. However, the MQTT standard lacks security-related functionalities, such as...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9296847/ |
id |
doaj-58d19e680cff42a99ffaf75079b5448f |
---|---|
record_format |
Article |
spelling |
doaj-58d19e680cff42a99ffaf75079b5448f2021-03-30T04:24:55ZengIEEEIEEE Access2169-35362020-01-01822642222643610.1109/ACCESS.2020.30454419296847Security Architecture and Protocols for Secure MQTT-SNChang-Seop Park0https://orcid.org/0000-0003-1273-5162Hye-Min Nam1https://orcid.org/0000-0003-1034-8257Department of Software Science, Dankook University, Yongin, Republic of KoreaDepartment of Computer Science, Dankook University, Yongin, Republic of KoreaMessage Queuing Telemetry Transport (MQTT) is a de facto standard for various Internet of Things (IoT) and industrial IoT applications. The data produced by a publisher are delivered to several subscribers via an MQTT broker. However, the MQTT standard lacks security-related functionalities, such as mutual authentication, access control, control message security, and end-to-end security. According to a recent report, many security threats and flaws associated with MQTT have been identified worldwide. This paper proposes security architecture and protocols to bootstrap MQTT security in the wireless sensor network. Security bootstrapping for MQTT includes security credential generation and distribution; registration protocol for joining MQTT entities such as publishers, subscribers, and brokers to the security controller; and rekeying protocol for group membership management. Special attention is given to the end-to-end security between the publishers and subscribers because the data from the publishers should not be corrupted by, and exposed to, the compromised broker. Both security analysis and performance evaluation show that our proposed security architecture and protocols for secure MQTT can be a viable solution to enhance MQTT security.https://ieeexplore.ieee.org/document/9296847/Access controlend-to-end securitygroup membershipMQTT-SNIoTsecurity architecture |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Chang-Seop Park Hye-Min Nam |
spellingShingle |
Chang-Seop Park Hye-Min Nam Security Architecture and Protocols for Secure MQTT-SN IEEE Access Access control end-to-end security group membership MQTT-SN IoT security architecture |
author_facet |
Chang-Seop Park Hye-Min Nam |
author_sort |
Chang-Seop Park |
title |
Security Architecture and Protocols for Secure MQTT-SN |
title_short |
Security Architecture and Protocols for Secure MQTT-SN |
title_full |
Security Architecture and Protocols for Secure MQTT-SN |
title_fullStr |
Security Architecture and Protocols for Secure MQTT-SN |
title_full_unstemmed |
Security Architecture and Protocols for Secure MQTT-SN |
title_sort |
security architecture and protocols for secure mqtt-sn |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2020-01-01 |
description |
Message Queuing Telemetry Transport (MQTT) is a de facto standard for various Internet of Things (IoT) and industrial IoT applications. The data produced by a publisher are delivered to several subscribers via an MQTT broker. However, the MQTT standard lacks security-related functionalities, such as mutual authentication, access control, control message security, and end-to-end security. According to a recent report, many security threats and flaws associated with MQTT have been identified worldwide. This paper proposes security architecture and protocols to bootstrap MQTT security in the wireless sensor network. Security bootstrapping for MQTT includes security credential generation and distribution; registration protocol for joining MQTT entities such as publishers, subscribers, and brokers to the security controller; and rekeying protocol for group membership management. Special attention is given to the end-to-end security between the publishers and subscribers because the data from the publishers should not be corrupted by, and exposed to, the compromised broker. Both security analysis and performance evaluation show that our proposed security architecture and protocols for secure MQTT can be a viable solution to enhance MQTT security. |
topic |
Access control end-to-end security group membership MQTT-SN IoT security architecture |
url |
https://ieeexplore.ieee.org/document/9296847/ |
work_keys_str_mv |
AT changseoppark securityarchitectureandprotocolsforsecuremqttsn AT hyeminnam securityarchitectureandprotocolsforsecuremqttsn |
_version_ |
1724181870332084224 |