Abstract
The Internet of Things (IoT) will change our lives. It will be present in every application’s domain: transportation, healthcare, home, and city. Everyone is connected due to his smartphone which is considered as the first thing connected to the Internet but it’s still not the real revolution of the Internet of Things. Our contribution is to propose an approach to secure the communication using the MQTT protocol after making a comparison between the different application protocols used in IoT as MQTT, CoAP, HTTP, and AMQP. Finally, we propose a new approach to secure the protocol MQTT with the highest level of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Batty, M., et al.: Smart cities of the future. Eur. Phys. J. Spec. Top. 214(1), 481–518 (2012)
ITU-T Focus Group on Smart Sustainable Cities, “Smart sustainable cities: an analysis of definitions”. Focus Group Technical Report, Geneva, Switzerland, Tech. Rep. FG-SSC-10/2014 (2014)
Mohanty, S.P., Choppali, U., Kougianos, E.: Everything you wanted to know about smart cities: the Internet of things is the backbone. IEEE Consum. Electron. Mag. 5(3), 60–70 (2016)
Minerva, R., Biru, A., Rotondi, D.: Towards a definition of the internet of things (IoT) (2015)
Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the IP-based internet of things. Wirel. Pers. Commun. 61(3), 527–542 (2011)
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Sadeghi, A.-R., Wachsmann, C., Waidner, M.: Security and privacy challenges in industrial internet of things, pp. 1–6. présenté à ACM Press (2015)
Zhang, Z.-K., Cho, M.C.Y., Shieh, S.: Emerging Security Threats and Countermeasures in IoT, p. 16. présenté à ACM Press (2015)
Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (2014)
Yassein, M.B., Shatnawi, M.Q.: Application layer protocols for the Internet of things: a survey. In: International Conference on Engineering & MIS (ICEMIS), pp. 1–4 (2016)
Foster, A.: Messaging technologies for the industrial internet and the internet of things whitepaper. PrismTech (2015)
Han, N.S.: Semantic service provisioning for 6LoWPAN: powering internet of things applications on web (2015)
Fernandes, J.L., Lopes, I.C., Rodrigues, J.J., Ullah, S.: Performance evaluation of RESTful web services and AMQP protocol. In: 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 810–815 (2013)
Bloebaum, T.H., Johnsen, F.T.: Evaluating publish/subscribe approaches for use in tactical broadband networks. In: Military Communications Conference, MILCOM 2015-2015 IEEE, pp. 605–610 (2015)
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015)
Grigorik, I.: Making the web faster with HTTP 2.0. Queue 11(10), 40 (2013)
Naik, N., Jenkins, P.: Web protocols and challenges of web latency in the web of things. In: 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 845–850 (2016)
Banks, A., Gupta, R.: MQTT Version 3.1.1. Jt. Pap. Open Group OASIS OMG (2014)
Niruntasukrat, A., Issariyapat, C., Pongpaibool, P., Meesublak, K., Aiumsupucgul, P., Panya, A.: Authorization mechanism for MQTT-based internet of things. In: 2016 IEEE International Conference on Communications Workshops (ICC), pp. 290–295 (2016)
Vaidya, M.L., Nikose, M., Jalan, P.A., Chaudhary, R.: Effective Processing of MQTT protocol IN Internet of Things (IOT) for smart system (2016)
Mun, D.-H., Dinh, M.L., Kwon, Y.-W.: An Assessment of Internet of Things Protocols for Resource-Constrained Applications, pp. 555–560 (2016)
Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), pp. 1–6 (2017)
Naik, N.: Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP. In: 2017 IEEE International Systems Engineering Symposium (ISSE), pp. 1–7 (2017)
Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things, pp. 21–28 (2015)
ISACA: Cybersecurity Fundamentals Study Guide. ISACA (2015)
Sahmi, I., Mazri, T., Hmina, N.: Security Study of Different Threats in Internet of Things (2018)
Singh, M., Rajan, M.A., Shivraj, V.L., Balamuralidhar, P.: Secure MQTT for Internet of Things (IoT), pp. 746–751 (2015)
Mektoubi, A., Hassani, H.L., Belhadaoui, H., Rifi, M., Zakari, A.: New approach for securing communication over MQTT protocol a comparison between RSA and Elliptic Curve. In: International Conference on Systems of Collaboration (SysCo), pp. 1–6 (2016)
Katsikeas, S.: A lightweight and secure MQTT implementation for wireless sensor networks. Technical University of CRETE (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Sahmi, I., Mazri, T., Hmina, N. (2021). The Security of MQTT Against the Applications Protocols for IoT. In: Ben Ahmed, M., Rakıp Karaș, İ., Santos, D., Sergeyeva, O., Boudhir, A.A. (eds) Innovations in Smart Cities Applications Volume 4. SCA 2020. Lecture Notes in Networks and Systems, vol 183. Springer, Cham. https://doi.org/10.1007/978-3-030-66840-2_87
Download citation
DOI: https://doi.org/10.1007/978-3-030-66840-2_87
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66839-6
Online ISBN: 978-3-030-66840-2
eBook Packages: EngineeringEngineering (R0)