[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bali et al., 2019 - Google Patents

Lightweight authentication for MQTT to improve the security of IoT communication

Bali et al., 2019

Document ID
17967335628561786707
Author
Bali R
Jaafar F
Zavarasky P
Publication year
Publication venue
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy

External Links

Snippet

A widely used application layer protocol for IoT communication is Message Queue Telemetry Transport (MQTT) protocol. The provision of security in MQTT protocol is an essential concern in IoT applications. In this paper, we show how the conventional secure …
Continue reading at dl.acm.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Similar Documents

Publication Publication Date Title
Saleem et al. FESDA: Fog-enabled secure data aggregation in smart grid IoT network
Bali et al. Lightweight authentication for MQTT to improve the security of IoT communication
Badra et al. Lightweight and efficient privacy-preserving data aggregation approach for the smart grid
Okay et al. A secure data aggregation protocol for fog computing based smart grids
Saxena et al. Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication
Garg et al. An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function
Agrawal et al. A trustworthy agent-based encrypted access control method for mobile cloud computing environment
Chaudhary et al. LaCSys: Lattice-based cryptosystem for secure communication in smart grid environment
Hintaw et al. A robust security scheme based on enhanced symmetric algorithm for MQTT in the Internet of Things
Chen et al. A novel NTRU-based handover authentication scheme for wireless networks
Priyadharshini et al. Efficient Key Management System Based Lightweight Devices in IoT.
Zhu et al. An edge re‐encryption‐based access control mechanism in NDN
Zhang et al. A provable semi-outsourcing privacy preserving scheme for data transmission from IoT devices
KR101812311B1 (en) User terminal and data sharing method of user terminal based on attributed re-encryption
Verchyk et al. A practical study of post-quantum enhanced identity-based encryption
Ma et al. Edge computing assisted an efficient privacy protection layered data aggregation scheme for IIoT
Ren et al. Toward efficient and secure deep packet inspection for outsourced middlebox
Kalidass et al. Enhancement of end-to-end security in advanced metering infrastructure
Kanani et al. Hybrid PKDS in 4G using secured DCC
Vangala et al. Enhanced encryption model for sensor data in wireless sensor network
Solum et al. Modular over-the-wire configurable security for long-lived critical infrastructure monitoring systems
Xu et al. Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext
Kakarla et al. Secure and light-weighted Group based Authentication and Key Agreement Protocol involving ECDH for Machine Type Communications in 3GPP Networks
Prakasha et al. Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure
Muthavhine et al. An application of the khumbelo function on the camellia algorithm to prevent attacks in iot devices