Side-by-Side Analysis of Key Exchange Algorithms for Load Optimized Security in MQTT Protocol

  • Mathews* S
  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Information Technology has evolved and we have reached at an era of Internet of Things (IoT). According to International Telecommunication Union’s Global Standards Initiative (GSI), it is the network of all kinds of ‘things’ embedded with electronics, sensors, actuators, software etc. Things connected in open Internet poses high security risks. Majority of these devices use Message Queuing Telemetry Transport (MQTT) protocol for exchanging information. Most of the devices with limited storage and computing power are connected using MQTT. Since the protocol doesn't provide any mechanism for encryption, the security aspect of the protocol is really weak. This paper describes the need for empowering security in MQTT. In this research work, we benchmark different cryptographic algorithms and propose the best possible algorithm to enable higher level of security in MQTT. This work further demonstrates how to use the proposed algorithm to enable lightweight key exchange mechanism among MQTT devices.

Cite

CITATION STYLE

APA

Mathews*, S. P., & Gondkar, Dr. R. R. (2020). Side-by-Side Analysis of Key Exchange Algorithms for Load Optimized Security in MQTT Protocol. International Journal of Recent Technology and Engineering (IJRTE), 8(6), 3987–3991. https://doi.org/10.35940/ijrte.f8987.038620

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free