2020
DOI: 10.1007/s11042-020-09750-4
|View full text |Cite
|
Sign up to set email alerts
|

MQTT protocol employing IOT based home safety system with ABE encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 37 publications
(14 citation statements)
references
References 6 publications
0
12
0
1
Order By: Relevance
“…In terms of messaging protocols, most of the IoT devices deploy the Message Queuing Telemetry Transport protocol (MQTT). This type of protocol is designed especially for IoT devices, taking into account the constraints these devices encounter, such as low bandwidth, which considerably complicates the adoption of HTTP protocol [26]. Unlike HTTP, MQTT represents lightweight protocols, cutting down the volume of messages and benefiting from its minimal requirements on the availability of connection.…”
Section: Mqtt Protocolmentioning
confidence: 99%
“…In terms of messaging protocols, most of the IoT devices deploy the Message Queuing Telemetry Transport protocol (MQTT). This type of protocol is designed especially for IoT devices, taking into account the constraints these devices encounter, such as low bandwidth, which considerably complicates the adoption of HTTP protocol [26]. Unlike HTTP, MQTT represents lightweight protocols, cutting down the volume of messages and benefiting from its minimal requirements on the availability of connection.…”
Section: Mqtt Protocolmentioning
confidence: 99%
“…The attribute-based encryption (ABE) is an encryption technique widely used to ensure data security in IoV and IoT [29][30][31][32][33][34][35][36][37][38][39]. In order to provide cryptographic access control mechanism, ABE holds access control policies in the users' keys using a key-policy attribute-based encryption (KP-ABE) scheme or in the cipher-texts using a ciphertext-policy attribute-based encryption (CP-ABE) scheme [44].…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
“…In recent decades, many IoT applications have used MQTT brokers such as [6][7][8][9][10][11]. The typical structure of an IoT application using MQTT brokers deployed with remote centralized data centers (as in a Cloud environment) is depicted in Figure 1.…”
Section: Mqttmentioning
confidence: 99%