MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities

被引:19
|
作者
Calabretta, Marco [1 ]
Pecori, Riccardo [2 ]
Vecchio, Massimo [3 ]
Veltri, Luca [4 ]
机构
[1] IQVIA, Milan, Italy
[2] eCampus Univ, SMARTEST Res Ctr, Novedrate, CO, Italy
[3] CREATE NET FBK, OpenloT Res Unit, I-38123 Trento, TN, Italy
[4] Univ Parma, Dept Engn & Architecture, Parma, PR, Italy
关键词
Internet of Things; Security; MQTT; Publish-subscribe; token-based authentication; token-based authorization;
D O I
10.24138/jcomss.v14i4.604
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security in the Internet of Things is a current hot topic and it may comprise different aspects such as confidentiality and integrity of personal data, as well as the authentication and the authorization to access smart objects that are spreading more and more in our every-day lives. In this work we focus on MQTT (Message Queue Telemetry Transport), a message-based communication protocol explicitly designed for low-power machine-to-machine communications and based on the publish-subscribe paradigm. First of all, we provide an accurate analysis of some of the most recent security solutions and improvements of MQTT found in the literature. Secondly, we describe in detail a novel secure solution, called MQTT-Auth, to protect specific topics in MQTT. This solution is based on the AugPAKE security algorithm for guaranteeing confidentiality, and onto two tokens which permit to authenticate the usage of a topic and to guarantee authorization in accessing a topic respectively. MQTT-Auth can also be easily extended to a hierarchical structure of topics and entities. Finally, we compare MQTT-Auth with some solutions for securing MQTT being present in the relevant literature, and we provide some details on how MQTT-Auth has been implemented and successfully tested.
引用
收藏
页码:320 / 331
页数:12
相关论文
共 50 条
  • [1] A Token-based Protocol for Securing MQTT Communications
    Calabretta, Marco
    Pecori, Riccardo
    Veltri, Luca
    [J]. 2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2018, : 246 - 251
  • [2] An Experimental Evaluation of MQTT Authentication and Authorization in IoT
    Michaelides, Michael
    Sengul, Cigdem
    Patras, Paul
    [J]. PROCEEDINGS OF THE FIFTEENTH ACM WORKSHOP ON WIRELESS NETWORK TESTBEDS, EXPERIMENTAL EVALUATION & CHARACTERIZATION, WINTECH 2021, 2021, : 69 - 76
  • [3] A Secure Token-Based Communication for Authentication and Authorization Servers
    Kubovy, Jan
    Huber, Christian
    Jaeger, Markus
    Kueng, Josef
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 : 237 - 250
  • [4] Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication
    Manogaran, Gunasekaran
    Rawal, Bharat S.
    Saravanan, Vijayalakshmi
    Priyan, M. K.
    Xin, Qin
    Shakeel, P.
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [5] Architectural Design of Token based Authentication of MQTT Protocol in Constrained IoT Device
    Bhawiyuga, Adhitya
    Data, Mahendra
    Warda, Andri
    [J]. 2017 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2017,
  • [6] Beyond X.509 Token-based authentication and authorization in practice
    Ceccanti, Andrea
    Vianello, Enrico
    Giacomini, Francesco
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2019), 2020, 245
  • [7] Beyond X.509: token-based authentication and authorization for HEP
    Ceccanti, Andrea
    Vianello, Enrico
    Caberletti, Marco
    Giacomini, Francesco
    [J]. 23RD INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2018), 2019, 214
  • [8] Token-based Authentication for Smartphones
    Koschuch, Manuel
    Hudler, Matthias
    Eigner, Hubert
    Saffer, Zsolt
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON DATA COMMUNICATION NETWORKING (DCNET 2013), 2013, : 49 - 54
  • [9] Token-based authorization in StoRM WebDAV
    Ceccanti, Andrea
    Vianello, Enrico
    Michelotto, Diego
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2019), 2020, 245
  • [10] ECC based inter-device authentication and authorization scheme using MQTT for IoT networks
    Lohachab, Ankur
    Karambir
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 1 - 12