4.6 Article

Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices

期刊

APPLIED SCIENCES-BASEL
卷 9, 期 5, 页码 -

出版社

MDPI
DOI: 10.3390/app9050848

关键词

Internet of Things (IoT); Message Queue Telemetry Transport (MQTT); Keyed-Hash Message Authentication Code (HMAC); confidentiality; integrity

向作者/读者索取更多资源

With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to protect against such attacks. This paper will review some existing solutions used to secure a communication channel, such as Transport Layer Security or symmetric encryption, as well as provide a novel approach to achieving confidentiality and integrity of messages. The method, called Value-to-Keyed-Hash Message Authentication Code (Value-to-HMAC) mapping, uses signatures to send messages, instead of encryption, by implementing a Keyed-Hash Message Authentication Code generation algorithm. Although robust solutions exist that can be used to secure the communication between devices, this paper considers that not every Internet of Things (IoT) device or network design is able to afford the overhead and drop in performance, or even support such protocols. Therefore, the Value-to-HMAC method was designed to maximize performance while ensuring the messages are only readable by the intended node. The experimental procedure demonstrates how the method will achieve better performance than a symmetric-key encryption algorithm, while ensuring the confidentiality and integrity of information through the use of one mechanism.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Artificial Intelligence

Adaptive weighted dynamic differential evolution algorithm for emergency material allocation and scheduling

Tiejun Wang, Kaijun Wu, Tiaotiao Du, Xiaochun Cheng

Summary: This article proposes an adaptive weighted dynamic differential evolution (AWDDE) algorithm for emergency material allocation and scheduling problems. The algorithm utilizes strategies such as chaotic mapping, weighted mutation operator, and disturbance operator to improve the global optimization ability and convergence speed.

COMPUTATIONAL INTELLIGENCE (2022)

Article Telecommunications

Secure smart contracts for cloud-based manufacturing using Ethereum blockchain

Ajay Kumar, Kumar Abhishek, Pranav Nerurkar, Muhammad Rukunuddin Ghalib, Achyut Shankar, Xiaochun Cheng

Summary: This paper proposes a secure smart contracts framework based on blockchain to address the issues in the Cloud-Based Manufacturing industry, and its efficacy is demonstrated in a case study.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Telecommunications

MobiScan: An enhanced invisible screen-camera communication system for IoT applications

Xiao Zhang, Jiqiang Liu, Zhongjie Ba, Yaodong Tao, Xiaochun Cheng

Summary: MobiScan is a dynamic and invisible screen-to-camera communication system that ensures data security, real-time communication, and flexible capture angle. It addresses the issues of poor data security, high computational overhead, and limited capture angle faced by existing systems.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Engineering, Civil

Cooperative Conflict Detection and Resolution and Safety Assessment for 6G Enabled Unmanned Aerial Vehicles

Shanmei Li, Xiaochun Cheng, Xuedong Huang, Sattam Ai Otaibi, Hongyong Wang

Summary: In this paper, a cooperative conflict detection and resolution method is innovatively developed in the UAV Internet of Things environment considering UAV relative motion relationships and UAV priorities. By using improved communication technologies and a safety assessment method, real-time and reactive conflict-free paths for UAVs are generated, improving the effectiveness of CD&R.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

Privacy-preserving and fine-grained data sharing for resource-constrained healthcare CPS devices

Yangyang Bao, Weidong Qiu, Xiaochun Cheng

Summary: Medical cyber-physical systems enable real-time health monitoring and flexible diagnostic services. However, security threats pose concerns for data security and user privacy. This article proposes an energy-saving and privacy-preserving data sharing scheme to address these challenges.

EXPERT SYSTEMS (2023)

Article Environmental Sciences

Generative Recorrupted-to-Recorrupted: An Unsupervised Image Denoising Network for Arbitrary Noise Distribution

Yukun Liu, Bowen Wan, Daming Shi, Xiaochun Cheng

Summary: With the breakthrough in supervised learning, more works are focusing on end-to-end learning for denoising. However, obtaining labels to support this approach is challenging. Unsupervised denoisers have emerged, but they require the noise model to be determined in advance, limiting practical use.

REMOTE SENSING (2023)

Editorial Material Chemistry, Multidisciplinary

Cognitive Computing with a Big Data System in a Secure Internet of Things

Xiaochun Cheng, Ding-Zhu Du, Arun Kumar Sangaiah, Rongxing Lu

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Information Systems

PIGNUS: A Deep Learning model for IDS in industrial internet-of-things

P. L. S. Jayalaxmi, Rahul Saha, Gulshan Kumar, Mamoun Alazab, Mauro Conti, Xiaochun Cheng

Summary: The heterogeneous nature of the IIoT poses challenges to the development of effective IDS. The existing solutions are non-usable due to the lack of a comprehensive feature mapping method. This paper proposes PIGNUS, a comprehensive IDS framework that combines efficient feature mapping and cascading model.

COMPUTERS & SECURITY (2023)

Article Engineering, Electrical & Electronic

Oil-Net: A Learning-Based Framework for Working Conditions Diagnosis of Oil Well Through Dynamometer Cards Identification

Rong Ma, Haifeng Tian, Xiaochun Cheng, Yi Xiao, Qingxiao Xu, Xianchuan Yu

Summary: In the past decades, identifying the working conditions of oil wells required expensive and slow artificial inspections. However, using machine learning to diagnose working conditions through dynamometer cards identification has significant economic and environmental benefits for oil production. In this study, we collected dynamometer cards from the well-known Shengli Oil Field in China and created a dataset. We analyzed the properties of dynamometers under different working conditions and proposed the Oil-Net 1-D/2-D identification models based on time-series and computer vision approaches. Experimental results showed that Oil-Net 1-D/2-D significantly improves identification accuracy compared to other machine learning and time-series classification methods. This study provides important guidance for the development of learning-based intelligent diagnosis systems for oil well working conditions.

IEEE SENSORS JOURNAL (2023)

Article Engineering, Civil

Fine-Grained Data Sharing With Enhanced Privacy Protection and Dynamic Users Group Service for the IoV

Yangyang Bao, Weidong Qiu, Xiaochun Cheng, Jianfei Sun

Summary: The Internet of Vehicles (IoV) has revolutionized the driving experience and urban traffic management. This paper proposes an efficient access control scheme and an indirect revocation mechanism to address data leakage and personal privacy concerns in the publicly accessible IoV environment. Through detailed comparisons and simulation evaluations, the superiority of the proposed solutions in terms of functionality and performance is demonstrated.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Civil

Secure Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems

Jianfei Sun, Guowen Xu, Tianwei Zhang, Xiaochun Cheng, Xingshuo Han, Mingjian Tang

Summary: This paper proposes the first privacy-preserving data share mechanism with flexible cross-domain authorization for efficient and secure communication across autonomous vehicle platoons. The mechanism uses a new ciphertext conversion technique to achieve high-fidelity data communication and has been proven to be secure against various attacks. The theoretical evaluation and extensive experiments demonstrate its practicality in terms of functionality, storage, and computation overheads.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Multidisciplinary Sciences

Fake news stance detection using selective features and FakeNET

Turki Aljrees, Xiaochun Cheng, Mian Muhammad Ahmed, Muhammad Umer, Rizwan Majeed, Khaled Alnowaiser, Nihal Abuzinadah, Imran Ashraf

Summary: The proliferation of fake news has severe effects on society and individuals, hence the need for automated systems to make timely judgments. This study employs principal component analysis and chi-square methods to reduce feature dimensions and combines convolutional neural network and long short-term memory model to build FakeNET. Experimental results show that PCA achieves a higher accuracy.

PLOS ONE (2023)

Article Mathematics

A Contrastive Model with Local Factor Clustering for Semi-Supervised Few-Shot Learning

Hexiu Lin, Yukun Liu, Daming Shi, Xiaochun Cheng

Summary: This paper proposes a simple and efficient semi-supervised few-shot learning model to address the embeddings mismatch problem caused by inconsistent data distributions between the novel and base datasets. The model emphasizes pseudo-labeling guided contrastive learning and develops a novel local factor clustering module to obtain pseudo-labels from unlabeled samples.

MATHEMATICS (2023)

Article Engineering, Civil

A Tamper-Resistant Broadcasting Scheme for Secure Communication in Internet of Autonomous Vehicles

Jianfei Sun, Junyi Tao, Hao Zhang, Yanan Zhao, Liming Nie, Xiaochun Cheng, Tianwei Zhang

Summary: As autonomous driving, 5G, and IoT technologies become increasingly prevalent, the Internet of autonomous vehicle (IoAV) technology is recognized as a disruptive technique capable of changing the way people travel and improving the travel experience. However, existing efforts rarely address the secrecy, authenticity, and flexible one-to-many communication between autonomous vehicles. This paper proposes a tamper-resistant broadcasting (TRBS) scheme that overcomes the inefficiencies and insecurity of existing identity-based broadcast signcryption solutions, providing secure and efficient communication and information dissemination between autonomous vehicles.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Telecommunications

Intrusion detection and prevention system for an IoT environment

Ajay Kumar, K. Abhishek, M. R. Ghalib, A. Shankar, X. Cheng

Summary: Internet of Things (IoT) security refers to the act of securing IoT devices and networks. This study proposes Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) to protect cloud servers and IoT systems from illegal access. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances, providing an additional layer of investigation to safeguard the network system.

DIGITAL COMMUNICATIONS AND NETWORKS (2022)

暂无数据