Securing MQTT-M2M Communications in a Food Retail Distribution

被引:0
|
作者
Spina, Mattia Giovanni [1 ]
Tropea, Mauro [1 ]
De Rango, Floriano [1 ]
机构
[1] Univ Calabria, DIMES Dept, I-87036 Arcavacata Di Rende, CS, Italy
关键词
MQTT; IoT; M2M; Security; ECC; Food Retail Distribution;
D O I
10.1109/CCNC51664.2024.10454863
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT devices are becoming more pervasive and integrated within our everyday lives, and networks of these devices are able to help humans accomplish complex and critical tasks. In such a network, IoT devices cooperate using Machine-to-Machine (M2M) communications to carry out such tasks. It becomes vital, therefore, to protect such a type of communication most often carried out by resource-constrained devices that cannot afford the overhead of a standard security protocol such as TLS. In this paper, a security framework for MQTT-M2M communications is proposed, considering a smart food retail shop use case. Specifically, we considered SlowIte, Data Forgery, Man-In-The-Middle, and Dictionary attacks that target the communication among the smart devices of food retail shop, proposing a mitigation method for each of them. To prove the benefits the proposal can provide, in terms of CPU/RAM utilization and network bandwidth consumption, we compared it with the baseline MQTT security standard, i.e. TLS.
引用
收藏
页码:554 / 557
页数:4
相关论文
共 50 条
  • [41] THE MARKET POTENTIAL OF M2M COMMUNICATIONS FOR TELECOMMUNICATIONS OPERATORS
    Perakovic, Dragan
    Husnjak, Sinisa
    Forenbacher, Ivan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON TRAFFIC AND TRANSPORT ENGINEERING (ICTTE), 2012, : 211 - 218
  • [42] Machine-to-Machine (M2M) communications: A survey
    Verma, Pawan Kumar
    Verma, Rajesh
    Prakash, Arun
    Agrawal, Ashish
    Naik, Kshirasagar
    Tripathi, Rajeev
    Alsabaan, Maazen
    Khalifa, Tarek
    Abdelkader, Tamer
    Abogharaf, Abdulhakim
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 83 - 105
  • [43] Enabling Edge-based Federated Learning through MQTT and OMA Lightweight-M2M
    Genovese, Giacomo
    Singh, Gurtaj
    Campolo, Claudia
    Molinaro, Antonella
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [44] Securing M2M With Post-Quantum Public-Key Cryptography
    Shih, Jie-Ren
    Hu, Yongbo
    Hsiao, Ming-Chun
    Chen, Ming-Shing
    Shen, Wen-Chung
    Yang, Bo-Yin
    Wu, An-Yeu
    Cheng, Chen-Mou
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2013, 3 (01) : 106 - 116
  • [45] Modelling and Optimisation of Packet Transmission Scheduling in M2M Communications
    Pereira, Carlos
    Aguiar, Ana
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2017, : 576 - 582
  • [46] A trust-based offloading for mobile M2M communications
    Boustanifar, Fariba
    Movahedi, Zeinab
    2016 INT IEEE CONFERENCES ON UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING AND COMMUNICATIONS, CLOUD AND BIG DATA COMPUTING, INTERNET OF PEOPLE, AND SMART WORLD CONGRESS (UIC/ATC/SCALCOM/CBDCOM/IOP/SMARTWORLD), 2016, : 1139 - 1143
  • [47] Recent Advances in M2M Communications and Internet of Things (IoT)
    Aalto University, Espoo, Finland
    不详
    IL, United States
    Int J Wireless Inf Networks, 3 (240-242): : 240 - 242
  • [48] Bayesian Inference Algorithms for Multiuser Detection in M2M Communications
    Zhang, Xiaoxu
    Liang, Ying-Chang
    Fang, Jun
    2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2016,
  • [49] On the Use and Optimization of PRMA based Cognitive M2M Communications
    Aijaz, Adnan
    Aghvami, A. Hamid
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 1265 - 1271
  • [50] Service-adaptive Functional Architecture in M2M Communications
    Lee, SungHyup
    Kim, KyoungKeun
    Jang, WonGyu
    Anh Ngoc Le
    2013 FIFTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2013, : 735 - 737