2019 14th International Conference on Computer Engineering and Systems (ICCES) 2019
DOI: 10.1109/icces48960.2019.9068129
|View full text |Cite
|
Sign up to set email alerts
|

A Secure MQTT Protocol, Telemedicine IoT Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…The invertibility of the SubBytes transformation has been verified in order to achieve the enhanced inverse SubBytes process, as indicated in Eq. (17). Assumed 𝑓(𝑘) and 𝑓(𝑥) within 𝐺𝐹(2 8 ) is operated, in such a way:…”
Section: Enhanced Invsubbytes Transformationmentioning
confidence: 99%
See 1 more Smart Citation
“…The invertibility of the SubBytes transformation has been verified in order to achieve the enhanced inverse SubBytes process, as indicated in Eq. (17). Assumed 𝑓(𝑘) and 𝑓(𝑥) within 𝐺𝐹(2 8 ) is operated, in such a way:…”
Section: Enhanced Invsubbytes Transformationmentioning
confidence: 99%
“…However, these methods are not well suited for IoT that utilized limited resource nodes. There are, in the current bibliography, many comprehensive studies about applying cryptographic schemes, [15]- [17]. Besides, Authentication and encryption of the payload are two aspects of MQTT interaction that are addressed in these studies using a variety of techniques and cryptographic primitives.…”
Section: Introductionmentioning
confidence: 99%
“…The fast development in information and communication technology has witnessed the emergence of the Internet of Things (IoT), a technology in which electronic devices and electrical appliances are interconnected and are able to transfer data (1,2). IoT is expected to facilitate and automate information exchange to a broader context of data communication (3,4) which consequently improves the quality of life (5)(6)(7) and business processes (8). IoT applications cover smart homes (9), smart cities (10), smart vehicles (11), healthcare (12), smart grids (13), and smart farming (14), to mention a few.…”
Section: Introductionmentioning
confidence: 99%
“…[16], [17], or [18]. And in particular, about MQTT communications, applying cryptographic schemes, [19], [20] or [21]. These papers use different schemes and cryptography primitives to secure MQTT communications, both to authenticate and to encrypt the payload.…”
Section: Introductionmentioning
confidence: 99%