The emerging technology of Internet of Things has a great potential in a whole world. The significant changes in innovations and ideas in digital objects or devices and information communication technologies lead to the expeditious implementation of the Internet of Things (IoT) worldwide. The major concern of IoT implementation should be Secure Device to Device communication. The existing IoT protocols used does not provide security. Our result can help IoT programmers to make the communication secure. We choose MQTT protocol. Implementation of secured MQTT Protocol is done by using Advanced Encryption Standard (AES) in Electronic codebook (ECB) mode. The algorithm designed by AES uses symmetric key for encryption as well as decryption.
REFERENCES
1.
B. S.
Adiga
, P.
Balamuralidhar
, M. A.
Rajan
, R.
Shastry
and V. L.
Shivraj
, “An Identity Based weEncryption Using Elliptic Curve Cryptography for Secure M2M Communication
,” In Proceedings of the First International Conference on Security of Internet of Things, ser. SecurIT’12
, (ACM
, 2012
), pp. 68
–74
.2.
M.
Ion
, “Security of Publish/Subscribe Systems
,” Ph.D. dissertation, University of Trento
, Italy
, (May 2013
).3.
D.
Locke
, “MQ Telemetry Transport (MQTT) V3.1Protocol\Specification
,” http://www.ibm.com/developerworks/library/ws-mqtt/, 2010
.4.
Davis
, Ernesto
Garćıa
and Calveras
, Anna
and Demirkol
, Ilker
, “Improving packet delivery performance of publish/subscribe protocols in wireless sensor networks
,” Multidisciplinary Digit Publishing Institute
13
(1
), 648
–680
(2013
).5.
J.
Bethencourt
, A.
Sahai
and B.
Waters
, “Ciphertext-Policy Attribute-Based Encryption
,” In Proceedings of the 2007 IEEE Symposium on Security and Privacy, ser. SP ’07, Washington, DC
(USA
, 2007
), pp. 321
–334
.6.
P.
Pal
, G.
Lauer
, J.
Khoury
, N.
Hoff
and J.
Loyall
, “P3S: A Privacy Preserving Publish-subscribe Middleware
,” In Proceedings of the 13thInternational Middleware Conference, ser. Middleware
12
, pp. 476
–495
.7.
M.
Ion
, G.
Russello
and B.
Crispo
, “Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
,” In Security and Privacy in Communication Networks, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
50
, 272
–289
(2010
).8.
M. A.
Tariq
, “Non-functional Requirements in Publish/Subscribe Systems
,” Ph.D. dissertation, University at Stuttgart, Fakult at Informatik, Elektrotechnik und Informationstechnik
, Germany
, (August 2013
).9.
A.
Sahai
and B.
Waters
, “Fuzzy Identity-based Encryption
,” In Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, ser. EUROCRYPT’05
, (Berlin, Heidelberg
, 2005
), pp. 457
–473
.10.
R.
Ostrovsky
, A.
Sahai
and B.
Waters
, “Attribute-based Encryption with Non-monotonic Access Structures
,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07
, 2007
, pp. 195
–203
.11.
A.
Stanford-Clark
and H. L.
Truong
, “MQTT For Sensor Networks (MQTT-SN) Protocol Specification
,” http://mqtt.org/documentation, 2013
.12.
Zaidi
and Syed Ali
Raza
, et al "Enabling IoT empowered smart lighting solutions: A communication theoretic perspective
." Wireless Communications and Networking Conference Workshops (WCNCW
), (IEEE
2014
).13.
Zhang
, Yuejun
, Ping
Zhou
and Mingguang
Wu
, “Research on DALI and Development of Master-Slave module
,” 2006 IEEE International Conference on Networking, Sensing and Control
, (IEEE
, 2006
).14.
Alkar
, Ali
Ziya
and Umit
Buhur
, “An Internet based wireless homeautomation system for multifunctional devices
,” IEEE Transactions on Consumer Electronics
51
(4
), 1169
–1174
(2005
).15.
Rashmi L
Jain
and Manali
Kshirsagar
, “Development of Modified Leadership Protocol for Smart Sensor Network
,” International Journal of Pure and Applied Mathematics
119
(16
), 2187
–2192
(July, 2018
).16.
Rashmi L
Jain
and Shweta
Chhajed
, “Survey on Security Mechanism to Embedded platform based IoT Devices
,” Internatinal conference, S B Jain college of Engg
, Nagpur
, 68
(30
), (February-2020
).
This content is only available via PDF.
© 2024 Author(s). Published under an exclusive license by AIP Publishing.
2024
Author(s)
You do not currently have access to this content.