The Message Queuing Telemetry Transport (MQTT) protocol is one of the most extended protocols on the Internet of Things (IoT). However, this protocol does not implement a strong security scheme by default, which does not allow a secure authentication mechanism between participants in the communication. Furthermore, we cannot trust the confidentiality and integrity of data. Lightweight IoT devices send more and more sensible data in areas of Smart Building, Smart City, Smart House, Smart Car, Connected Car, Health Care, Smart Retail, Industrial IoT (IIoT), etc. This makes the security challenges in the protocols used in the IoT particularly important. The standard of MQTT protocol strongly recommends implement it over Transport Layer Security (TLS) instead of plain TCP. Nonetheless, this option is not possible in most lightweight devices that make up the IoT ecosystem. Quite often, the constrained resources of IoT devices prevent the use of secure asymmetric cryptography algorithms implemented by themselves. In this article, we propose making a security schema in MQTT protocol using Cryptographic Smart Cards, for both challenges, the authentication schema and the trusted data confidentiality and data integrity. We carry out this security schema without modifying the standard protocol messages. And finally, we present a time results experiment using an example implementation model with JavaCard library. INDEX TERMS Internet of things (IoT), javacard, message queuing telemetry transport (MQTT), mutual authentication, smart card
Radio Frequency IDentification (RFID) has emerged as the new technology paradigm for acquisition and information management. RFID can be used to improve significantly the efficiency of business processes by providing the capability of automatic identification and data capture. This technology introduces new challenges on data and process information management in current systems. RFID data are timedependent and dynamically changing. In addition, data carry implicit semantics. The homogeneous data processing of such implicit semantics allows us to propose RFID middleware as a WHO-WHEN-WHERE data problem. This paper presents DEPCAS, a new middleware for RFID information based on the SCADA architecture for control systems. An application of DEPCAS is the resolution of heterogeneous situations, which solves the WHAT or context-aware to apply the auto identification data received from RFID systems in business applications.
As the use of RFID infrastructures is increasing, the deployment of heterogeneous RFID readers inside an ubiquitous system represents one of most typical problem. Integrating, hiding and supervising installation using sets of heterogeneous RFID readers represents a new focus in the middleware RFID research area. In this paper we present MARC (Minimal Abstract RFID Commands) a language to manage RFID installation in the DEPCAS (Data EPC Acquisition Software) RFID middleware. MARC language proposes a set of abstract commands to overload the specifics vendor applications to communicate from RFID middleware with RFID readers.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.