SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation

被引:16
|
作者
Hamad, Mohammad [1 ]
Finkenzeller, Andreas [1 ]
Liu, Hangmao [1 ]
Lauinger, Jan [1 ]
Prevelakis, Vassilis [2 ]
Steinhorst, Sebastian [1 ]
机构
[1] Tech Univ Munich, Dept Elect & Comp Engn, D-80333 Munich, Germany
[2] Tech Univ Carolo Wilhelmina Braunschweig, Inst Comp & Network Engn, D-38106 Braunschweig, Germany
关键词
Cryptography; Security; Protocols; Cloud computing; Internet of Things; Encryption; Libraries; End-to-end (E2E) security; key sharing; message queue telemetry transport (MQTT); publish; subscribe (Pub/Sub) model; trust delegation;
D O I
10.1109/JIOT.2022.3221857
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The publish/subscribe (Pub/Sub) model offers a communication scheme that is appropriate for a variety of mobile Internet of Things (IoT) systems (e.g., autonomous vehicles). In most of these systems, ensuring the end-to-end (E2E) security of exchanged information is a critical requirement. However, the Pub/Sub scheme lacks appropriate mechanisms to ensure the E2E security, even when state-of-the-art solutions, such as transport layer security (TLS) or attribute-based encryption (ABE), were adopted. These solutions either do not offer E2E security or are infeasible to be adopted in mobile IoT systems with resource-constrained platforms. In this article, we propose a framework, so-called SEEMQTT, to ensure secure E2E Pub/Sub-based communication for mobile IoT systems. Our solution allows the publisher to encrypt the published messages and control which subscribers can decrypt these messages without violating the decoupling requirement of the Pub/Sub model. Our solution leverages multiple honest-but-curious KeyStores to store secret shares generated from a secret key using a secret sharing scheme. The links between the publisher and every KeyStores are secured using identity-based encryption (IBE). The publisher uses the secret key to encrypt published messages. Trust delegation is used to authorize certain subscribers to access these shares and consequently decrypt the published messages. We provide an Arduino-based library that implements our proposed protocol. Also, we perform an extensive performance evaluation using real IoT hardware. Experimental results show that adopting our proposed solution, SEEMQTT, makes E2E security for mobile IoT systems feasible.
引用
收藏
页码:3384 / 3406
页数:23
相关论文
共 50 条
  • [31] Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems
    Goel, Nidhi
    Raman, Balasubramanian
    Gupta, Indra
    ADVANCES IN MULTIMEDIA, 2014, 2014 (2014)
  • [32] Channel Agnostic End-to-End Learning based Communication Systems with Conditional GAN
    Ye, Hao
    Li, Geoffrey Ye
    Juang, Biing-Hwang Fred
    Sivanesan, Kathiravetpillai
    2018 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2018,
  • [33] BitFool: An Optimization-based Adversarial Attack for End-to-End Communication Systems
    Yang, Runzhuo
    Cheng, Jiaying
    Liu, Donghang
    Li, Dou
    2024 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS, ICCCS 2024, 2024, : 1014 - 1020
  • [34] End-to-end optimization of optical communication systems based on directly modulated lasers
    Hernandez, Sergio
    Peucheret, Christophe
    Da Ros, Francesco
    Zibar, Darko
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2024, 16 (08) : D29 - D43
  • [35] Deep Learning Based End-to-End Wireless Communication Systems Without Pilots
    Ye, Hao
    Li, Geoffrey Ye
    Juang, Biing-Hwang
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2021, 7 (03) : 702 - 714
  • [36] Overfitting and Underfitting Analysis for Deep Learning Based End-to-end Communication Systems
    Zhang, Haotian
    Zhang, Lin
    Jiang, Yuan
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [37] A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT
    Li, Sensen
    Zhang, Tikui
    Yu, Bin
    He, Kuan
    IEEE SENSORS JOURNAL, 2021, 21 (04) : 5487 - 5501
  • [38] Design and Implementation of a PKI-Based End-to-End Secure Infrastructure for Mobile E-Commerce
    Chanson S.T.
    Cheung T.-W.
    World Wide Web, 2001, 4 (4) : 235 - 253
  • [39] Design and implementation of a PKI-based end-to-end secure infrastructure for mobile e-commerce
    Cheung, TW
    Chanson, ST
    SECOND INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING, VOL I, PROCEEDINGS, 2002, : 3 - 7
  • [40] End-to-end communication systems modeling using hardware-accelerated simulation tool
    Pansatiankul, Dhawat E.
    Lin, Victor S.
    MILCOM 2006, VOLS 1-7, 2006, : 707 - +