Data Exchange Protocol for Cryptographic Key Distribution System Using MQTT Service

被引:2
|
作者
Furtak, Janusz [1 ]
机构
[1] Mil Univ Technol, Ul Kaliskiego 2, PL-00904 Warsaw, Poland
关键词
MANAGEMENT;
D O I
10.15439/2022F260
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
There is an increasing demand for capturing reliable data from IoT network devices. Due to the limited capabilities of such devices to process and store sensitive data and the range and performance of the communication link, it is a significant challenge to develop a secure solution for symmetric key distribution. This paper presents a secure data exchange protocol for a cryptographic key generation, renewal, and distribution (KGR) system. The Trusted Platform Module (TPM) supports the trust establishment, key generation, all cryptographic procedures of the KGR system and secure data exchange in the described protocol. The protocol uses the MQTT (Message Queuing Telemetry Transport) service, which IoT devices widely use.
引用
收藏
页码:611 / 615
页数:5
相关论文
共 50 条
  • [1] The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment
    Furtak, Janusz
    [J]. SENSORS, 2023, 23 (11)
  • [2] Data Exchange with the MQTT Protocol: Dynamic Bridge Approach
    Schmitt, Alexandre
    Carlier, Florent
    Renault, Valerie
    [J]. 2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), 2019,
  • [3] The Key Technology of Online Service System Based on MQTT
    Chen, Da-mei
    Gao, Ze-hua
    [J]. INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE: TECHNIQUES AND APPLICATIONS, AITA 2016, 2016, : 8 - 12
  • [4] Robust Data Exchange and Redirecting Data Flow Mechanism in IoT Network Using MQTT Protocol
    Thirupathi, V.
    Sagar, K.
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2023, 57 (1-2) : 59 - 89
  • [5] Denial of service attacks using Internet Key Exchange protocol
    Dewan, Prashant
    Naidu, Divya Kolar Sunder
    Durham, David M.
    [J]. 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 471 - 475
  • [6] An Approach to Cryptographic Key Exchange Using Fingerprint
    Barman, Subhas
    Chattopadhyay, Samiran
    Samanta, Debasis
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 162 - 172
  • [7] Implementation of Public-Key Infrastructure for Smart Parking System Using MQTT Protocol
    Vijayan, Rajilal Manathala
    Ezhilarasie, R.
    Umamakeswari, A.
    [J]. INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 1029 - 1037
  • [8] Implementation of a quantum cryptographic key distribution system
    Cheung, WN
    Edward, PJ
    Ganeshkumar, G
    Barbopoulos, LO
    [J]. IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B12 - B16
  • [9] Cryptographic Key Exchange Protocol with Message Authentication Codes (MAC) using Finite State Machine
    Isa, Mohd Anuar Mat
    Ahmad, Miza Mumtaz
    Sani, Nor Fazlida Mohd
    Hashim, Habibah
    Mahmod, Ramlan
    [J]. MEDICAL AND REHABILITATION ROBOTICS AND INSTRUMENTATION (MRRI2013), 2014, 42 : 263 - 270
  • [10] Secured Key Distribution Scheme for Cryptographic Key Management System
    Khaing, Kyawt Kyawt
    Aung, Khin Mi Mi
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 481 - 486