Security Architecture and Protocols for Secure MQTT-SN

Message Queuing Telemetry Transport (MQTT) is a de facto standard for various Internet of Things (IoT) and industrial IoT applications. The data produced by a publisher are delivered to several subscribers via an MQTT broker. However, the MQTT standard lacks security-related functionalities, such as...

Full description

Bibliographic Details
Main Authors: Chang-Seop Park, Hye-Min Nam
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
IoT
Online Access:https://ieeexplore.ieee.org/document/9296847/
id doaj-58d19e680cff42a99ffaf75079b5448f
record_format Article
spelling doaj-58d19e680cff42a99ffaf75079b5448f2021-03-30T04:24:55ZengIEEEIEEE Access2169-35362020-01-01822642222643610.1109/ACCESS.2020.30454419296847Security Architecture and Protocols for Secure MQTT-SNChang-Seop Park0https://orcid.org/0000-0003-1273-5162Hye-Min Nam1https://orcid.org/0000-0003-1034-8257Department of Software Science, Dankook University, Yongin, Republic of KoreaDepartment of Computer Science, Dankook University, Yongin, Republic of KoreaMessage Queuing Telemetry Transport (MQTT) is a de facto standard for various Internet of Things (IoT) and industrial IoT applications. The data produced by a publisher are delivered to several subscribers via an MQTT broker. However, the MQTT standard lacks security-related functionalities, such as mutual authentication, access control, control message security, and end-to-end security. According to a recent report, many security threats and flaws associated with MQTT have been identified worldwide. This paper proposes security architecture and protocols to bootstrap MQTT security in the wireless sensor network. Security bootstrapping for MQTT includes security credential generation and distribution; registration protocol for joining MQTT entities such as publishers, subscribers, and brokers to the security controller; and rekeying protocol for group membership management. Special attention is given to the end-to-end security between the publishers and subscribers because the data from the publishers should not be corrupted by, and exposed to, the compromised broker. Both security analysis and performance evaluation show that our proposed security architecture and protocols for secure MQTT can be a viable solution to enhance MQTT security.https://ieeexplore.ieee.org/document/9296847/Access controlend-to-end securitygroup membershipMQTT-SNIoTsecurity architecture
collection DOAJ
language English
format Article
sources DOAJ
author Chang-Seop Park
Hye-Min Nam
spellingShingle Chang-Seop Park
Hye-Min Nam
Security Architecture and Protocols for Secure MQTT-SN
IEEE Access
Access control
end-to-end security
group membership
MQTT-SN
IoT
security architecture
author_facet Chang-Seop Park
Hye-Min Nam
author_sort Chang-Seop Park
title Security Architecture and Protocols for Secure MQTT-SN
title_short Security Architecture and Protocols for Secure MQTT-SN
title_full Security Architecture and Protocols for Secure MQTT-SN
title_fullStr Security Architecture and Protocols for Secure MQTT-SN
title_full_unstemmed Security Architecture and Protocols for Secure MQTT-SN
title_sort security architecture and protocols for secure mqtt-sn
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description Message Queuing Telemetry Transport (MQTT) is a de facto standard for various Internet of Things (IoT) and industrial IoT applications. The data produced by a publisher are delivered to several subscribers via an MQTT broker. However, the MQTT standard lacks security-related functionalities, such as mutual authentication, access control, control message security, and end-to-end security. According to a recent report, many security threats and flaws associated with MQTT have been identified worldwide. This paper proposes security architecture and protocols to bootstrap MQTT security in the wireless sensor network. Security bootstrapping for MQTT includes security credential generation and distribution; registration protocol for joining MQTT entities such as publishers, subscribers, and brokers to the security controller; and rekeying protocol for group membership management. Special attention is given to the end-to-end security between the publishers and subscribers because the data from the publishers should not be corrupted by, and exposed to, the compromised broker. Both security analysis and performance evaluation show that our proposed security architecture and protocols for secure MQTT can be a viable solution to enhance MQTT security.
topic Access control
end-to-end security
group membership
MQTT-SN
IoT
security architecture
url https://ieeexplore.ieee.org/document/9296847/
work_keys_str_mv AT changseoppark securityarchitectureandprotocolsforsecuremqttsn
AT hyeminnam securityarchitectureandprotocolsforsecuremqttsn
_version_ 1724181870332084224