A Blockchain-based MQTT Protocol Optimization Algorithm

Authors

  • Yun Ju North China Electric Power University, Beijing, China
  • Wei Gao State Grid Shanxi Electric Power Company, Taiyuan 030001, China
  • Lixia Zhang State Grid Shanxi Province Electric Power Company Information and Communication Branch, Taiyuan 030001, China

DOI:

https://doi.org/10.13052/jicts2245-800X.1122

Keywords:

MQTT protocol, blockchain, message proxy server, IoT, security

Abstract

The communication protocol is an important support to realize the communication between equipment and Internet. And it covers all aspects of the IoT (Internet of things) system. To address the security problem of forging or tampering of key data in traditional IoT protocols, this paper designs an improved MQTT (message queue telemetry transmission) protocol that uses blockchain technology to ensure the security of transmitted data in the process of data transmission. Because the information in the blockchain is not tamperable, which in turn ensures that data stored in brokers are not maliciously tampered with. Through simulation experiments, it is proved that this scheme is lightweight, efficient and easy to implement, which helps to protect the security of IoT data.

Downloads

Download data is not yet available.

Author Biographies

Yun Ju, North China Electric Power University, Beijing, China

Yun Ju received the Master and Ph.D. degrees from the School of Control and Computer Engineering, North China Electric Power University, Beijing, in 2006 and 2014, respectively. He is currently an lecturer in School of Control and Computer Engineering, North China Electric Power University, China. His current research interests include computer science and control engineering. He has authored or co-authored more than 50 publications.

Wei Gao, State Grid Shanxi Electric Power Company, Taiyuan 030001, China

Wei Gao received Bachelor degree from the School of Electronic and Information Engineering, Taiyuan University of Technology, Shanxi in 2003. And he received Master degree from the School of Electronic and Communication Engineering, Taiyuan University of Technology, Shanxi, in 2010.

Lixia Zhang, State Grid Shanxi Province Electric Power Company Information and Communication Branch, Taiyuan 030001, China

Lixia Zhang received Bachelor degree from the School of Information Management and Information System, Tianjin university of Commerce, Tianjin, in 2003. And she received Master degree from the School of Computer Application Technology, University of Science and Technology Beijing, Beijing, in 2010.

References

Zhong C. L., Zhu Z. and Huang R. G. Study on the IOT Architecture and Access Technology; proceedings of the 2017 16th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES), F 13–16 Oct. 2017, 2017 [C].

Xu L. D., He W. and Li S. Internet of Things in Industries: A Survey [J]. IEEE Transactions on Industrial Informatics, 2014, 10(4): 2233–43.

Wollschlaeger M., Sauter T. and Jasperneite J. The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0 [J]. IEEE Industrial Electronics Magazine, 2017, 11(1): 17–27.

Tao F., Cheng J. and Qi Q. IIHub: An Industrial Internet-of-Things Hub Toward Smart Manufacturing Based on Cyber-Physical System [J]. IEEE Transactions on Industrial Informatics, 2018, 14(5): 2271–80.

Sadio O., Ngom I. and Lishou C. Lightweight Security Scheme for MQTT/MQTT-SN Protocol; proceedings of the 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), F 22–25 Oct. 2019, 2019 [C].

Andy S., Rahardjo B. and Hanindhito B. Attack scenarios and security analysis of MQTT communication protocol in IoT system; proceedings of the 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), F 19–21 Sept. 2017, 2017 [C].

Amanlou S., Hasan M. K. and Bakar K. A. A. Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model [J]. Computer Networks, 2021, 199, 108465.

V S., A V. and Pattar S. MQTT based Secure Transport Layer Communication for Mutual Authentication in IoT Network [J]. Global Transitions Proceedings, 2022, 3(1): 60–6.

Yihan W. and Yongzhen L. Improved Design of DES Algorithm Based on Symmetric Encryption Algorithm; proceedings of the 2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA), F 22–24 Jan. 2021, 2021 [C].

Kim S., Goo Y., Kim M., et al. A method for service identification of SSL/TLS encrypted traffic with the relation of session ID and Server IP; proceedings of the 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), F 19–21 Aug. 2015, 2015 [C].

S. Shin K. K. Efficient Augmented Password-Only Authentication and Key Exchange for IKEv2 [J]. IETF, 2012.

Ö. Y. and Dalkılıç G. Authentication and Authorization Mechanism on Message Queue Telemetry Transport Protocol; proceedings of the 2018 3rd International Conference on Computer Science and Engineering (UBMK), F 20–23 Sept. 2018, 2018 [C].

Calabretta M., Pecori R. and Veltri L. A Token-based Protocol for Securing MQTT Communications; proceedings of the 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), F 13–15 Sept. 2018, 2018 [C].

Fremantle P., Aziz B., Kopecký J., et al. Federated Identity and Access Management for the Internet of Things; proceedings of the 2014 International Workshop on Secure Internet of Things, F 10-10 Sept. 2014, 2014 [C].

Niruntasukrat A., Issariyapat C., Pongpaibool P., et al. Authorization mechanism for MQTT-based Internet of Things; proceedings of the 2016 IEEE International Conference on Communications Workshops (ICC), F 23–27 May 2016, 2016 [C].

Esfahani A., Mantas G., Matischek R., et al. A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment [J]. IEEE Internet of Things Journal, 2019, 6(1): 288–96.

Sarwar K., Yongchareon S. and Yu J. Lightweight ECC with Fragile Zero-Watermarking for Internet of Things Security; proceedings of the 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), F 1–3 Aug. 2018, 2018 [C].

Downloads

Published

2023-05-15

How to Cite

Ju, Y. ., Gao, W. ., & Zhang, L. . (2023). A Blockchain-based MQTT Protocol Optimization Algorithm. Journal of ICT Standardization, 11(02), 135–156. https://doi.org/10.13052/jicts2245-800X.1122

Issue

Section

Intelligent System Concepts, architecture, standards, tools and applications