The emerging technology of Internet of Things has a great potential in a whole world. The significant changes in innovations and ideas in digital objects or devices and information communication technologies lead to the expeditious implementation of the Internet of Things (IoT) worldwide. The major concern of IoT implementation should be Secure Device to Device communication. The existing IoT protocols used does not provide security. Our result can help IoT programmers to make the communication secure. We choose MQTT protocol. Implementation of secured MQTT Protocol is done by using Advanced Encryption Standard (AES) in Electronic codebook (ECB) mode. The algorithm designed by AES uses symmetric key for encryption as well as decryption.

1.
B. S.
Adiga
,
P.
Balamuralidhar
,
M. A.
Rajan
,
R.
Shastry
and
V. L.
Shivraj
, “
An Identity Based weEncryption Using Elliptic Curve Cryptography for Secure M2M Communication
,” In
Proceedings of the First International Conference on Security of Internet of Things, ser. SecurIT’12
, (
ACM
,
2012
), pp.
68
74
.
2.
M.
Ion
, “
Security of Publish/Subscribe Systems
,” Ph.D. dissertation,
University of Trento
,
Italy
, (May
2013
).
3.
D.
Locke
, “
MQ Telemetry Transport (MQTT) V3.1Protocol\Specification
,” http://www.ibm.com/developerworks/library/ws-mqtt/,
2010
.
4.
Davis
,
Ernesto
Garćıa
and
Calveras
,
Anna
and
Demirkol
,
Ilker
, “
Improving packet delivery performance of publish/subscribe protocols in wireless sensor networks
,”
Multidisciplinary Digit Publishing Institute
13
(
1
),
648
680
(
2013
).
5.
J.
Bethencourt
,
A.
Sahai
and
B.
Waters
, “
Ciphertext-Policy Attribute-Based Encryption
,” In
Proceedings of the 2007 IEEE Symposium on Security and Privacy, ser. SP ’07, Washington, DC
(
USA
,
2007
), pp.
321
334
.
6.
P.
Pal
,
G.
Lauer
,
J.
Khoury
,
N.
Hoff
and
J.
Loyall
, “
P3S: A Privacy Preserving Publish-subscribe Middleware
,” In
Proceedings of the 13thInternational Middleware Conference, ser. Middleware
12
, pp.
476
495
.
7.
M.
Ion
,
G.
Russello
and
B.
Crispo
, “
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
,” In
Security and Privacy in Communication Networks, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
50
,
272
289
(
2010
).
8.
M. A.
Tariq
, “
Non-functional Requirements in Publish/Subscribe Systems
,” Ph.D. dissertation,
University at Stuttgart, Fakult at Informatik, Elektrotechnik und Informationstechnik
,
Germany
, (August
2013
).
9.
A.
Sahai
and
B.
Waters
, “
Fuzzy Identity-based Encryption
,” In
Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, ser. EUROCRYPT’05
, (
Berlin, Heidelberg
,
2005
), pp.
457
473
.
10.
R.
Ostrovsky
,
A.
Sahai
and
B.
Waters
, “
Attribute-based Encryption with Non-monotonic Access Structures
,” in
Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07
,
2007
, pp.
195
203
.
11.
A.
Stanford-Clark
and
H. L.
Truong
, “
MQTT For Sensor Networks (MQTT-SN) Protocol Specification
,” http://mqtt.org/documentation,
2013
.
12.
Zaidi
and
Syed Ali
Raza
, et al
"Enabling IoT empowered smart lighting solutions: A communication theoretic perspective
."
Wireless Communications and Networking Conference Workshops (WCNCW
), (
IEEE
2014
).
13.
Zhang
,
Yuejun
,
Ping
Zhou
and
Mingguang
Wu
, “
Research on DALI and Development of Master-Slave module
,”
2006 IEEE International Conference on Networking, Sensing and Control
, (
IEEE
,
2006
).
14.
Alkar
,
Ali
Ziya
and
Umit
Buhur
, “
An Internet based wireless homeautomation system for multifunctional devices
,”
IEEE Transactions on Consumer Electronics
51
(
4
),
1169
1174
(
2005
).
15.
Rashmi L
Jain
and
Manali
Kshirsagar
, “
Development of Modified Leadership Protocol for Smart Sensor Network
,”
International Journal of Pure and Applied Mathematics
119
(
16
),
2187
2192
(July,
2018
).
16.
Rashmi L
Jain
and
Shweta
Chhajed
, “
Survey on Security Mechanism to Embedded platform based IoT Devices
,”
Internatinal conference, S B Jain college of Engg
,
Nagpur
,
68
(
30
), (February-
2020
).
This content is only available via PDF.
You do not currently have access to this content.