IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

How to Authenticate MQTT Sessions Without Channel and Broker Security

How to Authenticate MQTT Sessions Without Channel and Broker Security
View Sample PDF
Author(s): Reto E. Koenig (Department of Computer Science, Bern University of Applied Sciences, Switzerland), Lukas Laederach (Bern University of Applied Sciences, Switzerland)and Cédric von Allmen (Bern University of Applied Sciences, Switzerland)
Copyright: 2020
Pages: 10
Source title: Applied Approach to Privacy and Security for the Internet of Things
Source Author(s)/Editor(s): Parag Chatterjee (National Technological University, Argentina & University of the Republic, Uruguay), Emmanuel Benoist (Bern University of Applied Sciences, Switzerland)and Asoke Nath (St. Xavier's College, Kolkata, India)
DOI: 10.4018/978-1-7998-2444-2.ch006

Purchase

View How to Authenticate MQTT Sessions Without Channel and Broker Security on the publisher's website for pricing and purchasing information.

Abstract

This chapter describes a new but state-of-the-art approach to provide authenticity in MQTT sessions using the means of zero-knowledge proofs. This approach completely voids session hijacking for the MQTT protocol and provides authenticity. The presented approach does not require the broker to keep any secrets for session handling. The presented approach allows completely anonymous but authentic sessions; hence, the broker does not need any priory knowledge of the client party. As it is especially targeted for applications within the world of internet of things (IoT), the presented approach is designed to require only the minimum in extra power in terms of energy and space. The approach does not introduce any new concept, but simply combines a state of the art cryptographic Zero-Knowledge Proof of identity with the existing MQTT 5.0 specification. Thus, no protocol extension is required in order to provide the targeted security properties. The described approach is completely agnostic to the application layer at the client side and is only required during MQTT session establishment.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom