SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation

被引:16
|
作者
Hamad, Mohammad [1 ]
Finkenzeller, Andreas [1 ]
Liu, Hangmao [1 ]
Lauinger, Jan [1 ]
Prevelakis, Vassilis [2 ]
Steinhorst, Sebastian [1 ]
机构
[1] Tech Univ Munich, Dept Elect & Comp Engn, D-80333 Munich, Germany
[2] Tech Univ Carolo Wilhelmina Braunschweig, Inst Comp & Network Engn, D-38106 Braunschweig, Germany
关键词
Cryptography; Security; Protocols; Cloud computing; Internet of Things; Encryption; Libraries; End-to-end (E2E) security; key sharing; message queue telemetry transport (MQTT); publish; subscribe (Pub/Sub) model; trust delegation;
D O I
10.1109/JIOT.2022.3221857
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The publish/subscribe (Pub/Sub) model offers a communication scheme that is appropriate for a variety of mobile Internet of Things (IoT) systems (e.g., autonomous vehicles). In most of these systems, ensuring the end-to-end (E2E) security of exchanged information is a critical requirement. However, the Pub/Sub scheme lacks appropriate mechanisms to ensure the E2E security, even when state-of-the-art solutions, such as transport layer security (TLS) or attribute-based encryption (ABE), were adopted. These solutions either do not offer E2E security or are infeasible to be adopted in mobile IoT systems with resource-constrained platforms. In this article, we propose a framework, so-called SEEMQTT, to ensure secure E2E Pub/Sub-based communication for mobile IoT systems. Our solution allows the publisher to encrypt the published messages and control which subscribers can decrypt these messages without violating the decoupling requirement of the Pub/Sub model. Our solution leverages multiple honest-but-curious KeyStores to store secret shares generated from a secret key using a secret sharing scheme. The links between the publisher and every KeyStores are secured using identity-based encryption (IBE). The publisher uses the secret key to encrypt published messages. Trust delegation is used to authorize certain subscribers to access these shares and consequently decrypt the published messages. We provide an Arduino-based library that implements our proposed protocol. Also, we perform an extensive performance evaluation using real IoT hardware. Experimental results show that adopting our proposed solution, SEEMQTT, makes E2E security for mobile IoT systems feasible.
引用
收藏
页码:3384 / 3406
页数:23
相关论文
共 50 条
  • [1] Open-Source MQTT-Based End-to-End IoT System for Smart City Scenarios
    D'Ortona, Cristian
    Tarchi, Daniele
    Raffaelli, Carla
    FUTURE INTERNET, 2022, 14 (02):
  • [2] Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs
    Alghamdi, Wael Y.
    Wu, Hui
    Kanhere, Salil S.
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [3] A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher
    Winarno, Agus
    Sari, Riri Fitri
    APPLIED SCIENCES-BASEL, 2022, 12 (17):
  • [4] A secure end-to-end communication framework for cooperative IoT networks using hybrid blockchain system
    Erukala, Suresh Babu
    Tokmakov, Dimitar
    Perumalla, Anoosha
    Kaluri, Rajesh
    Bekyarova-Tokmakova, Anna
    Mileva, Nevena
    Lubomirov, Slavi
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [5] Secure End-to-End Communication for Constrained Devices in IoT-enabled Ambient Assisted Living Systems
    Porambage, Pawani
    Braeken, An
    Gurtov, Andrei
    Ylianttila, Mika
    Spinsante, Susanna
    2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 711 - 714
  • [6] Multi-Layered IoT System Design Towards End-to-End Secure Communication
    Rech, Alexander
    Gressl, Lukas
    Basic, Fikret
    Seifert, Christian
    Steger, Christian
    Sinnhofer, Andreas
    IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2020, : 2213 - 2220
  • [7] The sharing session key component (SSKC) algorithm for end-to-end secure wireless communication
    Wu, HK
    Yang, SC
    Lin, YT
    34TH ANNUAL 2000 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2000, : 242 - 250
  • [8] A secure end-to-end SMS-based mobile banking protocol
    Bojjagani, Sriramulu
    Sastry, V. N.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (15)
  • [9] NTRU and Secret Sharing Based Secure Group Communication for IoT Applications
    Saha, Sanchita
    Hota, Ashlesha
    Choudhury, Bikramjit
    Nag, Amitava
    Nandi, Sukumar
    IEEE ACCESS, 2023, 11 : 117341 - 117350
  • [10] A secure end-to-end proximity NFC-based mobile payment protocol
    Bojjagani, Sriramulu
    Sastry, V. N.
    COMPUTER STANDARDS & INTERFACES, 2019, 66