A Novel Multicast Secure MQTT Messaging Protocol Framework for IoT-Related Issues

3Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Edge computing and fog computing have emerged as effective and efficient technologies for IoT-related issues. In the recent times, fellow researchers have proposed numerous researches under the area of edge and fog computing. Still, edge and fog computing have remained open research problems. In the proposed research work, we have proposed a MQTT-based broker security mechanism to protect the IoT-based system from a selection of security penetrations such as man-in-the-middle attacks, DDoS, DoS and many more. In general, MQTT broker architecture acts as an intermediator to establish connection between a publisher and subscriber. For secure communication between both the ends, it is essential to establish a novel security protocol which secure communication channel between subscribers and publishers. In the presented research work, we have proposed a novel authentication mechanism which makes the use of MQTT broker in achieving data privacy, authentication and data integrity. Furthermore, a detailed and rigorous analysis of a variety of security attacks has been analyzed and discussed in the end. At last but not the least, we have also presented multicast-MQTT secure messaging protocol and compared it with state-of-the-art methodologies such as RSA and advanced encryption standard.

Author supplied keywords

Cite

CITATION STYLE

APA

Pandya, S., Mistry, M., Kotecha, K., Sur, A., Parikh, P., Shah, K., & Dave, R. (2021). A Novel Multicast Secure MQTT Messaging Protocol Framework for IoT-Related Issues. In Lecture Notes in Networks and Systems (Vol. 203 LNNS, pp. 339–359). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-16-0733-2_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free