Enter your keyword

2-s2.0-85058392998

[vc_empty_space][vc_empty_space]

Access control on internet of things based on publish/subscribe using authentication server and secure protocol

Wardana A.A.a, Perdana R.S.a

a School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2018 IEEE.This study proposes a prototype model from access control security system in the Internet of Things (IoT) that uses the Message Queuing Telemetry Transport (MQTT) protocol as its communication and fog computing as its architecture with the authentication server and secure protocol. In the MQTT protocol, there are security mechanism issues such as publisher (device) authentication and data privacy protection is still not good. This causes the integrity and confidentiality of a data used by the subscriber to be less secure. Device nodes and gateway devices in IoT that become publishers will be authenticated to obtain tokens using authentication server via HTTPS. Tokens are embedding with sensor data inside secure payload format and publish to MQTT broker. Authentication server will perform management and validation credentials on all publishers and secure payload in MQTT broker. In addition, SSL certificates are applied to the MQTT protocol to secure their communications. Based on evaluation and security analysis, the application of access control mechanisms can be implemented on the MQTT protocol and can secure the integrity and confidentiality of data that sent from the device to the cloud over the internet. In the overhead analysis, there is a significant increase in payload because of the payload data sent with the token, but the latency of delivery time, CPU, memory usage is still up to a reasonable limit of not more than 50%.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Access control mechanism,Authentication servers,Data privacy protections,Internet of thing (IOT),Message Queuing Telemetry Transport,Secure protocols,Security analysis,Security mechanism[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Access Control,Authentication,Internet of Things,Message Queuing Telemetry Transport,Secure Protocol[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text]ACKNOWLEDGMENT Gratitude to the Ministry of Education and Culture of The Republic of Indonesia who has granted “Beasiswa Unggulan” scholarship to the first author so he can continue his studies to the master program at Institut Teknologi Bandung. Hopefully, this research can contribute to the advancement of technology research in Indonesia.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICITEED.2018.8534855[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]