Side-by-Side Analysis of Key Exchange Algorithms for Load Optimized Security in MQTT Protocol
Suja P Mathews1, Raju R Gondkar2
1Suja P Mathews*, Department of IT, Jain University, Bangalore, India.
2Dr. Raju R Gondkar, Department of PG Studies, CMR University, Bangalore, India.
Manuscript received on March 12, 2020. | Revised Manuscript received on March 25, 2020. | Manuscript published on March 30, 2020. | PP: 3987-3991 | Volume-8 Issue-6, March 2020. | Retrieval Number: F8987038620/2020©BEIESP | DOI: 10.35940/ijrte.F8987.038620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The Information Technology has evolved and we have reached at an era of Internet of Things (IoT). According to International Telecommunication Union’s Global Standards Initiative (GSI), it is the network of all kinds of ‘things’ embedded with electronics, sensors, actuators, software etc. Things connected in open Internet poses high security risks. Majority of these devices use Message Queuing Telemetry Transport (MQTT) protocol for exchanging information. Most of the devices with limited storage and computing power are connected using MQTT. Since the protocol doesn’t provide any mechanism for encryption, the security aspect of the protocol is really weak. This paper describes the need for empowering security in MQTT. In this research work, we benchmark different cryptographic algorithms and propose the best possible algorithm to enable higher level of security in MQTT. This work further demonstrates how to use the proposed algorithm to enable lightweight key exchange mechanism among MQTT devices.
Keywords: Cryptographic Algorithms, Lightweight Key Exchange, MQTT, Public key, Payload encryption, Security.
Scope of the Article: Plant Cyber Security.