2022
DOI: 10.3390/app12178817
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher

Abstract: Personal data security is a cybersecurity trend that has captured the world’s attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely used in IoT implementation is MQTT. By default, MQTT does not provide data security features in the form of data encryption. Therefore, this research was carried out on the design of Secure End-to-End Encryption MQTT with Block Cipher-Based Lightweight Cryptograph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…Unlike this scheme, MARAS provides the right to access the topic and the client’s permission to publish or subscribe via OAuth 2.0 protocol. In relation to that, [ 37 ] compared the runtime performances of lightweight encryption algorithms in terms of encryption and decryption operations on MQTT payloads. The study evaluates AES-128 Galois/counter mode (GCM), GIFT-combined feedback (COFB), Romulus N1, and Tiny JAMBU.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Unlike this scheme, MARAS provides the right to access the topic and the client’s permission to publish or subscribe via OAuth 2.0 protocol. In relation to that, [ 37 ] compared the runtime performances of lightweight encryption algorithms in terms of encryption and decryption operations on MQTT payloads. The study evaluates AES-128 Galois/counter mode (GCM), GIFT-combined feedback (COFB), Romulus N1, and Tiny JAMBU.…”
Section: Related Workmentioning
confidence: 99%
“…As reflected in Table 9, no previous attempt could collectively provide all the security features that MARAS provides. [17]       antle et al [21]       h et al [28]       dhyay et al [29]       ntasukrat et al [30]       fir et al [31]       n et al [32]       arajan et al [33]       ammari [34]       y et al [35]       pa et al [36]       arno et al [37]       yasri et al [38]       l et al [39]       ib et al [40]       sikeas et al [41]       wiyuga et al [42]       hir et al [43]       dana et al [44]       bretta et al [45]       et al [47]       darrajan et al [48]       in et al [49]       juan et al [50]       oretti et al [51]       y et al [52] …”
Section: Authorizationmentioning
confidence: 99%
“…Existing research concerning end-to-end support within MQTT is predominantly focused on security investigations [41][42][43][44][45][46], with some research works [47][48][49][50] also touching on end-to-end services. Park et al [42] introduced a security architecture and protocols designed to establish MQTT security within wireless sensor networks.…”
Section: End-to-end Services Of Mqttmentioning
confidence: 99%
“…SEEMQTT [41] is a framework that ensures end-to-end data confidentiality, integrity, and authorization in MQTT-based communication for mobile IoT systems. Winarno et al [44] presented the design of a secure end-to-end encryption MQTT protocol using lightweight cryptographic algorithms and Galantucci secret sharing. Chien et al [45] discussed the importance of over-the-air (OTA) updates for secure IoT systems and highlighted the widespread use of MQTT as an IoT communication protocol.…”
Section: End-to-end Services Of Mqttmentioning
confidence: 99%
See 1 more Smart Citation