Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: MQTT protocol.

Zeitschriftenartikel zum Thema „MQTT protocol“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "MQTT protocol" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Yamin, Muhammad Ikrar, Son Kuswadi und Sritrusta Sukaridhoto. „Real Performance Evaluation On MQTT and COAP Protocol in Ubiquitous Network Robot Platform (UNRPF) for Disaster Multi-robot Communication“. EMITTER International Journal of Engineering Technology 6, Nr. 2 (29.12.2018): 369–85. http://dx.doi.org/10.24003/emitter.v6i2.305.

Der volle Inhalt der Quelle
Annotation:
Disaster multi-robot has a significant role in a disaster area to do many tasks like detection of fire, search and rescue of victims, etc. It needs to build good communication between the operator and multi-robot and among multi-robot themselves to perform their tasks quickly and efficiently. This relates with the queue message protocol system. In this research, we implemented the queue message protocol on mesh topology and integrated it on the robot platform. Recently, development of IoT (Internet of Things) Technology causes development of communication protocol. MQTT and CoAP are among the communication protocols used for IoT needs. Both protocols performance were compared when  used and implemented into disaster multi-robot. We also integrated MQTT protocol and robot platform python based (UNR-PF). The result shows that MQTT protocol is easier to be implemented on to disaster multi-robot platform (UNR-PF) on mesh topology than CoAP, and that data transfer rate of MQTT protocol has data transfer rate higher than CoAP.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Silva, Daniel, Liliana I. Carvalho, José Soares und Rute C. Sofia. „A Performance Analysis of Internet of Things Networking Protocols: Evaluating MQTT, CoAP, OPC UA“. Applied Sciences 11, Nr. 11 (26.05.2021): 4879. http://dx.doi.org/10.3390/app11114879.

Der volle Inhalt der Quelle
Annotation:
IoT data exchange is supported today by different communication protocols and different protocolar frameworks, each of which with its own advantages and disadvantages, and often co-existing in a way that is mandated by vendor policies. Although different protocols are relevant in different domains, there is not a protocol that provides better performance (jitter, latency, energy consumption) across different scenarios. The focus of this work is two-fold. First, to provide a comparison of the different available solutions in terms of protocolar features such as type of transport, type of communication pattern support, security aspects, including Named-data networking as relevant example of an Information-centric networking architecture. Secondly, the work focuses on evaluating three of the most popular protocols used both in Consumer as well as in Industrial IoT environments: MQTT, CoAP, and OPC UA. The experimentation has been carried out first on a local testbed for MQTT, COAP and OPC UA. Then, larger experiments have been carried out for MQTT and CoAP, based on the large-scale FIT-IoT testbed. Results show that CoAP is the protocol that achieves across all scenarios lowest time-to-completion, while OPC UA, albeit exhibiting less variability, resulted in higher time-to-completion in comparison to CoAP or MQTT.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Sahmi, Imane, Abderrahim Abdellaoui, Tomader Mazri und Nabil Hmina. „MQTT-PRESENT: Approach to secure internet of things applications using MQTT protocol“. International Journal of Electrical and Computer Engineering (IJECE) 11, Nr. 5 (01.10.2021): 4577. http://dx.doi.org/10.11591/ijece.v11i5.pp4577-4586.

Der volle Inhalt der Quelle
Annotation:
The big challenge to raise for deploying the application's domain of the Internet of Things is security. As one of the popular messaging protocols in the IoT world, the message queue telemetry transport (MQTT) is designed for constrained devices and machine-to-machine communications, based on the publish-subscribe model, it offers a basic authentication using username and password. However, this authentication method might have a problem in terms of security and scalability. In this paper, we provide an analysis of the current research in the literature related to the security for the MQTT protocol, before we give a brief description of each algorithm used on our approach, to finally propose a new approach to secure this protocol based on AugPAKE algorithm and PRESENT encryption. This solution provides mutual authentication between the broker and their clients (publishers and subscribers), the confidentiality of the published message is protected twice, the integrity and non-repudiation of MQTT messages which is protected during the process of transmission.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Sahlmann, Kristina, Vera Clemens, Michael Nowak und Bettina Schnor. „MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices“. Sensors 21, Nr. 1 (22.12.2020): 10. http://dx.doi.org/10.3390/s21010010.

Der volle Inhalt der Quelle
Annotation:
Message Queuing Telemetry Transport (MQTT) is one of the dominating protocols for edge- and cloud-based Internet of Things (IoT) solutions. When a security vulnerability of an IoT device is known, it has to be fixed as soon as possible. This requires a firmware update procedure. In this paper, we propose a secure update protocol for MQTT-connected devices which ensures the freshness of the firmware, authenticates the new firmware and considers constrained devices. We show that the update protocol is easy to integrate in an MQTT-based IoT network using a semantic approach. The feasibility of our approach is demonstrated by a detailed performance analysis of our prototype implementation on a IoT device with 32 kB RAM. Thereby, we identify design issues in MQTT 5 which can help to improve the support of constrained devices.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Park, Jun-Hong, Hyeong-Su Kim und Won-Tae Kim. „DM-MQTT: An Efficient MQTT Based on SDN Multicast for Massive IoT Communications“. Sensors 18, Nr. 9 (12.09.2018): 3071. http://dx.doi.org/10.3390/s18093071.

Der volle Inhalt der Quelle
Annotation:
Edge computing is proposed to solve the problem of centralized cloud computing caused by a large number of IoT (Internet of Things) devices. The IoT protocols need to be modified according to the edge computing paradigm, where the edge computing devices for analyzing IoT data are distributed to the edge networks. The MQTT (Message Queuing Telemetry Transport) protocol, as a data distribution protocol widely adopted in many international IoT standards, is suitable for cloud computing because it uses a centralized broker to effectively collect and transmit data. However, the standard MQTT may suffer from serious traffic congestion problem on the broker, causing long transfer delays if there are massive IoT devices connected to the broker. In addition, the big data exchange between the IoT devices and the broker decreases network capability of the edge networks. The authors in this paper propose a novel MQTT with a multicast mechanism to minimize data transfer delay and network usage for the massive IoT communications. The proposed MQTT reduces data transfer delays by establishing bidirectional SDN (Software Defined Networking) multicast trees between the publishers and the subscribers by means of bypassing the centralized broker. As a result, it can reduce transmission delay by 65% and network usage by 58% compared with the standard MQTT.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Najeeb, Nihaala, und Shelbi Joseph. „IoT Service Search using MQTT Protocol“. International Journal of Computer Sciences and Engineering 7, Nr. 7 (31.07.2019): 292–97. http://dx.doi.org/10.26438/ijcse/v7i7.292297.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Jaloudi, Samer. „Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study“. Future Internet 11, Nr. 3 (07.03.2019): 66. http://dx.doi.org/10.3390/fi11030066.

Der volle Inhalt der Quelle
Annotation:
Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled. However, the MODBUS TCP is an open de facto standard, and is used for some automation and telecontrol systems. It is based on a polling mechanism and follows the synchronous request–response pattern, as opposed to the asynchronous publish–subscribe pattern. In this study, polling-based and event-based protocols are investigated to realize an open and interoperable Industrial Internet of Things (IIoT) environment. Many Internet of Things (IoT) protocols are introduced and compared, and the message queuing telemetry transport (MQTT) is chosen as the event-based, publish–subscribe protocol. The study shows that MODBUS defines an optimized message structure in the application layer, which is dedicated to industrial applications. In addition, it shows that an event-oriented IoT protocol complements the MODBUS TCP but cannot replace it. Therefore, two scenarios are proposed to build the IIoT environment. The first scenario is to consider the MODBUS TCP as an IoT protocol, and build the environment using the MODBUS TCP on a standalone basis. The second scenario is to use MQTT in conjunction with the MODBUS TCP. The first scenario is efficient and complies with most industrial applications where the request–response pattern is needed only. If the publish–subscribe pattern is needed, the MQTT in the second scenario complements the MODBUS TCP and eliminates the need for a gateway; however, MQTT lacks interoperability. To maintain a homogeneous message structure for the entire environment, industrial data are organized using the structure of MODBUS messages, formatted in the UTF-8, and then transferred in the payload of an MQTT publish message. The open and interoperable environment can be used for Internet SCADA, Internet-based monitoring, and industrial control systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman und Mohamed Zorkany. „Internet of Things (IoT) Platform for Multi-Topic Messaging“. Energies 13, Nr. 13 (30.06.2020): 3346. http://dx.doi.org/10.3390/en13133346.

Der volle Inhalt der Quelle
Annotation:
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access protocol (SOAP). These protocols only support single-topic messaging. Thus, in this work, an IoT message protocol that supports multi-topic messaging is proposed. This protocol will add a simple “brain” for IoT platforms in order to realize an intelligent IoT architecture. Moreover, it will enhance the traffic throughput by reducing the overheads of messages and the delay of multi-topic messaging. Most current IoT applications depend on real-time systems. Therefore, an RTOS (real-time operating system) as a famous OS (operating system) is used for the embedded systems to provide the constraints of real-time features, as required by these real-time systems. Using RTOS for IoT applications adds important features to the system, including reliability. Many of the undertaken research works into IoT platforms have only focused on specific applications; they did not deal with the real-time constraints under a real-time system umbrella. In this work, the design of the multi-topic IoT protocol and platform is implemented for real-time systems and also for general-purpose applications; this platform depends on the proposed multi-topic communication protocol, which is implemented here to show its functionality and effectiveness over similar protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Shaikh, Arefa Shafique. „A Survey on Exchanging Data Using MQTT Protocol in Arduino“. International Journal for Research in Applied Science and Engineering Technology 9, Nr. VII (31.07.2021): 3081–82. http://dx.doi.org/10.22214/ijraset.2021.37007.

Der volle Inhalt der Quelle
Annotation:
In the coming years, sensors will likely grow in every aspect of our lives. Several activities explain how the Internet of Things (IoT) will have an impact on almost all aspect of our lives and why security is at the top of the list of IoT challenges. Device to Device communications (D2D) in IoT are forecast and another major concern within the use of IoT is to make sure device security, D2D connectivity and high quality data. Therefore, a proper communication protocol is required to fix this issues. To address this, we purpose the use of Message Queue Telemetry Transport(MQTT)protocol to transfer data between devices, as it is more secured. MQTT (Message Queuing Telemetry Transport) is a publish/subscribe messaging protocol which works on top of the TCP/IP protocol. The key feature of MQTT is its light weight, adds flexible authentication and bandwidth efficiency. The result of this study is transferring high quality data securely using MQTT protocol.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Gao, Zhenyu, Jian Cao, Wei Wang, Huayun Zhang und Zengrong Xu. „Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time“. Security and Communication Networks 2021 (13.09.2021): 1–11. http://dx.doi.org/10.1155/2021/4587862.

Der volle Inhalt der Quelle
Annotation:
Industry 4.0 focuses on continuous interconnection services, allowing for the continuous and uninterrupted exchange of signals or information between related parties. The application of messaging protocols for transferring data to remote locations must meet specific specifications such as asynchronous communication, compact messaging, operating in conditions of unstable connection of the transmission line of data, limited network bandwidth operation, support multilevel Quality of Service (QoS), and easy integration of new devices. The Message Queue Telemetry Transport (MQTT) protocol is used in software applications that require asynchronous communication. It is a light and simplified protocol based on publish-subscribe messaging and is placed functionally over the TCP/IP protocol. It is designed to minimize the required communication bandwidth and system requirements increasing reliability and probability of successful message transmission, making it ideal for use in Machine-to-Machine (M2M) communication or networks where bandwidth is limited, delays are long, coverage is not reliable, and energy consumption should be as low as possible. Despite the fact that the advantage that MQTT offers its way of operating does not provide a serious level of security in how to achieve its interconnection, as it does not require protocol dependence on one intermediate third entity, the interface is dependent on each application. This paper presents an innovative real-time anomaly detection system to detect MQTT-based attacks in cyber-physical systems. This is an online-semisupervised learning neural system based on a small number of sampled patterns that identify crowd anomalies in the MQTT protocol related to specialized attacks to undermine cyber-physical systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Al-Azam, Moh Noor, Darian Rizaludin, Yulius Satmoko Raharjo und Aryo Nugroho. „Message Queuing Telemetry Transport dalam Internet of Things menggunakan ESP-32“. JURNAL MEDIA INFORMATIKA BUDIDARMA 3, Nr. 3 (30.07.2019): 159. http://dx.doi.org/10.30865/mib.v3i3.1160.

Der volle Inhalt der Quelle
Annotation:
Message Queuing Telemetry Transport (MQTT) is a connectivity protocol between machines or now better known as the Internet of Things (IoT). This protocol recognizes two basic functions of M2M communication, namely publish and subscribe (pub/sub). The MQTT protocol is designed as a very simple and very lightweight message delivery protocol, designed for devices that are limited and with low bandwidth capacity, high latency or on an unreliable network. The design principles are to minimize bandwidth requirements and device resource requirements, and keep trying to ensure reliability and guaranteed delivery rates. In this paper, VerneMQ performance reliability is tested - one of the MQTT brokers, with several stressing levels using ESP-32 as a publisher and notebook with the python application as a subscriber.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Vaccari, Ivan, Maurizio Aiello und Enrico Cambiaso. „SlowTT: A Slow Denial of Service against IoT Networks“. Information 11, Nr. 9 (18.09.2020): 452. http://dx.doi.org/10.3390/info11090452.

Der volle Inhalt der Quelle
Annotation:
The security of Internet of Things environments is a critical and trending topic, due to the nature of the networks and the sensitivity of the exchanged information. In this paper, we investigate the security of the Message Queue Telemetry Transport (MQTT) protocol, widely adopted in IoT infrastructures. We exploit two specific weaknesses of MQTT, identified during our research activities, allowing the client to configure the KeepAlive parameter and MQTT packets to execute an innovative cyber threat against the MQTT broker. In order to validate the exploitation of such vulnerabilities, we propose SlowTT, a novel “Slow” denial of service attack aimed at targeting MQTT through low-rate techniques, characterized by minimum attack bandwidth and computational power requirements. We validate SlowTT against real MQTT services, by considering both plaintext and encrypted communications and by comparing the effects of the attack when targeting different application daemons and protocol versions. Results show that SlowTT is extremely successful, and it can exploit the identified vulnerability to execute a denial of service against the IoT network by keeping the connection alive for a long time.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Mamlook, Rustom, Omer F. Khan und Thabit Sultan Mohammed. „Bridging for cross protocol talk in IOT devices using windows communication foundation“. International Journal of Engineering & Technology 7, Nr. 3.29 (24.08.2018): 196. http://dx.doi.org/10.14419/ijet.v7i3.29.18794.

Der volle Inhalt der Quelle
Annotation:
In the Internet of Things (IoT), multiple communication protocols are used to connect the smart device. Wi-Fi, Xbee, ZigBee, Bluetooth, and LoRaWAN are some of the communication channels utilized for connectivity by devices using some IoT platform.In order to enable the development of smart services for IoT platforms, there are solutions by different vendors to connect between IoT devices. For example, multiple IoT platforms are available in the market namely IoTivity platform developed by Open Connectivity Foundation (OCF), AllJoyn platform from All Seen Alliance, Weave made by Google, and Home Kit by Apple. In view of such segmentation of IoT platforms, IoT Application’s development has been made complex, where IoT device and accompanying application compatibility with available platforms requires support for multiple protocols.To simplify the complexity introduced by multiple platforms, M2M [4] International standard was already proposed as the bridge for integrating IoT protocols. In our paper, we implement a proxy web service using Windows Communication Foundation (WCF) as a way to translate communication in one IoT protocol to another. In our implementation of middleware, we allowed the MQTT broker to accept messages, which were passed, to the Web Service from various devices over Hyper Text Protocol’s POST or GET Commands. Bridging between WCF Web Service and MQTT broker was enabled with duplex communication. Hence, devices supporting either HTTP protocol or MQTT protocol were able to communicate transparently.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Atmoko, Rachmad Andri, Daoguo Yang, M. Yayan Alfiani und Lilik Subiyanto. „Controlling Unmanned Surface Vehicle Using MQTT Protocol“. Journal Of Computer Networks, Architecture and High Performance Computing 1, Nr. 2 (16.07.2019): 21–28. http://dx.doi.org/10.47709/cnapc.v1i2.229.

Der volle Inhalt der Quelle
Annotation:
Abstract- The communication system at USV is the most important part of ensuring that the USV control system runs well. Communication systems that are commonly used at USV are generally still local networks. The development of a wider range of communications is needed to improve USV scalability so that the benefits can be increased to support the concept of remote laboratory and remote surveillance. USV is generally controlled using a wireless network with a limited work area using WIFI or using another electromagnetic waves transmission. This research proposes the development control and monitoring systems of USV to be controlled over the Internet by using the message queuing telemetry transport(MQTT) Protocol. This idea makes the USV can be controlled remotely, no longer have to operate it in the field. The control speed response of rudder and motor are analyzed. Performance monitoring of the compass sensor, GPS, and cameras also showed good results. As a result, the average delay time generated is 1.6 second.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Quincozes, Silvio, Tubino Emilio und Juliano Kazienko. „MQTT Protocol: Fundamentals, Tools and Future Directions“. IEEE Latin America Transactions 17, Nr. 09 (September 2019): 1439–48. http://dx.doi.org/10.1109/tla.2019.8931137.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Hernández Ramos, Santiago, M. Teresa Villalba und Raquel Lacuesta. „MQTT Security: A Novel Fuzzing Approach“. Wireless Communications and Mobile Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8261746.

Der volle Inhalt der Quelle
Annotation:
The Internet of Things is a concept that is increasingly present in our lives. The emergence of intelligent devices has led to a paradigm shift in the way technology interacts with the environment, leading society to a smarter planet. Consequently, new advanced telemetry approaches appear to connect all kinds of devices with each other, with companies, or with other networks, such as the Internet. On the road to an increasingly interconnected world, where critical devices rely on communication networks to provide an essential service, there arises the need to ensure the security and reliability of these protocols and applications. In this paper, we discuss a security-based approach for MQTT (Message Queue Telemetry Transport), which stands out as a very lightweight and widely used messaging and information exchange protocol for IoT (Internet of Things) devices throughout the world. To that end, we propose the creation of a framework that allows for performing a novel, template-based fuzzing technique on the MQTT protocol. The first experimental results showed that performance of the fuzzing technique presented here makes it a good candidate for use in network architectures with low processing power sensors, such as Smart Cities. In addition, the use of this fuzzer in widely used applications that implement MQTT has led to the discovery of several new security flaws not hitherto reported, demonstrating its usefulness as a tool for finding security vulnerabilities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Larmo, Anna, Antti Ratilainen und Juha Saarinen. „Impact of CoAP and MQTT on NB-IoT System Performance“. Sensors 19, Nr. 1 (20.12.2018): 7. http://dx.doi.org/10.3390/s19010007.

Der volle Inhalt der Quelle
Annotation:
The IoT protocols used for data transfer in the application layer, namely the Constraint Application Protocol (CoAP) and Message Queue Telemetry Transport (MQTT) have dependencies to the transport layer. The choice of transport, Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), on the other hand, has an impact on the Internet of Things (IoT) application level performance, especially over a wireless medium. Furthermore, we touch upon the impact of different security solutions. The motivation of this work is to look at the impact of the protocol stack on performance over a narrowband IoT (NB-IoT) link. The use case studied is infrequent small reports sent from the sensor device to a central cloud storage over a last mile radio access link. We find that while CoAP/UDP based transport performs consistently better both in terms of latency, coverage, and system capacity, MQTT/TCP also works when the system is less loaded.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Kant, Daniel, Andreas Johannsen und Reiner Creutzburg. „Analysis of IoT Security Risks based on the exposure of the MQTT Protocol“. Electronic Imaging 2021, Nr. 3 (18.06.2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Der volle Inhalt der Quelle
Annotation:
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment such as failure or impairment of production systems. We evaluate the prevalence of exposed IoT and IIoT devices related to the protocol MQTT by means of the search engine Shodan. The approach, design and results of our analysis are summarized in this paper.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

H. Amaran, M., M. S. Rohmad, L. H. Adnan, N. N. Mohamed und H. Hashim. „Lightweight Security for MQTT-SN“. International Journal of Engineering & Technology 7, Nr. 4.11 (02.10.2018): 223. http://dx.doi.org/10.14419/ijet.v7i4.11.20811.

Der volle Inhalt der Quelle
Annotation:
This study discusses a method to secure Message Queuing Telemetry Transport-Sensor network (MQTT-SN). MQTT-SN is a popular data communication protocol used in developing IoT applications and can be secured by augmenting it with a security scheme. In this work, several lightweight encryption schemes to be used in tandem with MQTT-SN were tested and analysed. The best algorithm is identified based on the speed of encryption and overall power consumption when implemented in IoT environment. It was found that L-BLOCK is the overall performer in securing MQTT-SN and should be highly considered when developing IoT applications.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

H. Amaran, M., M. S. Rohmad, L. H. Adnan, N. N. Mohamed und H. Hashim. „Lightweight Security for MQTT-SN“. International Journal of Engineering & Technology 7, Nr. 4.11 (02.10.2018): 262. http://dx.doi.org/10.14419/ijet.v7i4.11.21389.

Der volle Inhalt der Quelle
Annotation:
This study discusses a method to secure Message Queuing Telemetry Transport-Sensor network (MQTT-SN). MQTT-SN is a popular data communication protocol used in developing IoT applications and can be secured by augmenting it with a security scheme. In this work, several lightweight encryption schemes to be used in tandem with MQTT-SN were tested and analysed. The best algorithm is identified based on the speed of encryption and overall power consumption when implemented in IoT environment. It was found that L-BLOCK is the overall performer in securing MQTT-SN and should be highly considered when developing IoT applications.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Susanto, Bekti Maryuni, Ery Setiyawan Jullev Atmadji und Willy Laurent Brenkman. „IMPLEMENTASI MQTT PROTOCOL PADA SMART HOME SECURITY BERBASIS WEB“. Jurnal Informatika Polinema 4, Nr. 3 (01.05.2018): 201. http://dx.doi.org/10.33795/jip.v4i3.207.

Der volle Inhalt der Quelle
Annotation:
Penggunaan IoT semakin berkembang dalam waktu singkat, hal ini dikarenakan oleh semakin berkembangnya teknologi informasi. Hal ini menyebabkan keterlibatan banyak device yang saling terkoneksi dengan sensor yang terpasang pada lingkungan. Sehingga dengan adanya banyak device maka menyebabkan permasalahan interoperabilitas dari masing-masing alat. Untuk mengatasi hal tersebut maka diperlukan sebuah gateway atau protocol yang mampu menjembatani interoperabilitas tersebut. Salah satu tugas Gateway atau protocol tersebut adalah harus mampu menangani permasalahan interoperabilitas serta mampu menangani permintaan maupun device profile dari masing-masing sensor maupun device yang terkoneksi. MQTT sendiri adalah sebuah protocol konektifitas machine to machine (M2M) yang didesain mampu mengirimkan data dengan sangat ringan menggunakan arsitektur TCP/IP. Pada MQTT sendiri mempunyai keunggulan yaitu dapat mengirimkan data dengan bandwith yang ringan, konsumsi listrik yang sedikit, latensi serta konektifitas yang sangat tinggi, ketersediaan variable yang banyak serta jaminan pengiriman data yang dapat dinegosiasikan. Paper ini membahas tentang implementasi MQTT protocol pada smart home security berbasis web. Topik ini dipilih karena keamanan rumah merupakan permasalahan yang sangat penting, apalagi saat kita meninggalkan rumah.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Gopi Krishna, P., K. Sreenivasa Ravi, K. Hari Kishore, K. KrishnaVeni, K. N. Siva Rao und R. D. Prasad. „Design and development of bi-directional IoT gateway using ZigBee and Wi-Fi technologies with MQTT protocol“. International Journal of Engineering & Technology 7, Nr. 2.8 (19.03.2018): 125. http://dx.doi.org/10.14419/ijet.v7i2.8.10344.

Der volle Inhalt der Quelle
Annotation:
With evolution of the smart things, to acquire data, gateways play a major role in interconnecting with various sensor nodes. Using different wireless protocols and standards with sensor nodes, gateway can transform information into a unique format that transmits into the cloud for further use. Which accepts the commands from external users in the remote location through a personal computer or a smartphone? The proposed gateway has its added advantages; (i) ZigBee and Wi-Fi wireless technologies connectivity is enabled, (ii) transforms the information into required protocol format, (iii) uses a light weighted MQTT protocol in transmitting and receiving environment, (iv) It provides the storage and analyzed data and (v) the sensor values can be observed and the devices can be controlled by a smartphone from remote location. Here we demonstrate the proof of concept for controlling the smart home appliances. This also represents a design and implementation of Bi-Directional IoT gateway using ZigBee and Wi-Fi technologies with MQTT protocol.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Dikii, D. I. „Denial-of-service attack analysis by MQTT protocol“. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 20, Nr. 2 (01.04.2020): 223–32. http://dx.doi.org/10.17586/2226-1494-2020-20-2-223-232.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Atmoko, R. A., R. Riantini und M. K. Hasin. „IoT real time data acquisition using MQTT protocol“. Journal of Physics: Conference Series 853 (Mai 2017): 012003. http://dx.doi.org/10.1088/1742-6596/853/1/012003.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Wicaksana, Gabe Dimas, Maman Abdurohman und Aji Gautama Putrada. „Enhancing the quality of experience of Arduino-based multiplayer online game using MQTT server“. Jurnal Teknologi dan Sistem Komputer 8, Nr. 1 (31.01.2020): 36–43. http://dx.doi.org/10.14710/jtsiskom.8.1.2020.36-43.

Der volle Inhalt der Quelle
Annotation:
Online multiplayer games require internet networks to play with opposing players more exciting because multiple players can fight each other. The game experiences lag, which is expressed as the quality of experience (QoE), is one of the most common problems for online multiplayer games, causing the games less exciting to play. This study examined the implementation of Message Queue Telemetry Transport (MQTT) as a communication protocol in multiplayer online games using Arduino and compared its performance against HTTP. QoE used data collected using the mean opinion score (MOS) method. The MQTT resulted in an average QoE score of 3.9 (Pingpong) and 4 (TicTacToe) MOS units, while on HTTP 3.8 (PingPong and TicTacToe). The use of the MQTT communication protocol can improve the QoE of multiplayer online game players compared to HTTP.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Et.al, Kitae Hwang. „Experiences And Considerations On Performance Test Of Mosquitto-Based Broker“. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, Nr. 6 (10.04.2021): 666–73. http://dx.doi.org/10.17762/turcomat.v12i6.2066.

Der volle Inhalt der Quelle
Annotation:
MQTT is a communication protocol for exchanging messages between clients via MQTT broker and is used to build many IoT systems. Currently, various tools have been developed to help measure the performance of application systems using MQTT. However, because they are all versatile tools, a dedicated test system that meets the purpose of the application system needs to be built on their behalf. But building a test system is not that simple. In this paper we discuss a case of building a test system for measuring U-Mosquitto’s performance, which has modified the open source Mosquitto broker to handle urgent messages with priority, and some issues to be considered in the process. In particular, they include selection of the server computer, the structure of the test program, the use of appropriate threads for the client, the appropriate number of clients, the appropriate workload per client, clock synchronization between clients, protocol analyzer issues, and other issues. Our experiences and considerations on these issues are expected to be a good guide for building a test system to measure the performance of MQTT application systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Ho, Nam, und Choong Seon Hong. „Secure MQTT Protocol based on Attribute-Based Encryption Scheme“. Journal of KIISE 45, Nr. 3 (31.03.2018): 195–99. http://dx.doi.org/10.5626/jok.2018.45.3.195.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Pramukantoro, Eko Sakti, und Husnul Anwari. „An Event-based Middleware for Syntactical Interoperability in Internet of Things“. International Journal of Electrical and Computer Engineering (IJECE) 8, Nr. 5 (01.10.2018): 3784. http://dx.doi.org/10.11591/ijece.v8i5.pp3784-3792.

Der volle Inhalt der Quelle
Annotation:
Internet of Things (IoT) connecting sensors or devices that record physical observations of the environment and a variety of applications or other Internet services. Along with the increasing number and diversity of devices connected, there arises a problem called interoperability. One type of interoperability is syntactical interoperability, where the IoT should be able to connect all devices through various data protocols. Based on this problem, we proposed a middleware that capable of supporting interoperability by providing a multi-protocol gateway between COAP, MQTT, and WebSocket. This middleware is developed using event-based architecture by implementing publish-subscribe pattern. We also developed a system to test the performance of middleware in terms of success rate and delay delivery of data. The system consists of temperature and humidity sensors using COAP and MQTT as a publisher and web application using WebSocket as a subscriber. The results for data transmission, either from sensors or MQTT COAP has a success rate above 90%, the average delay delivery of data from sensors COAP and MQTT below 1 second, for packet loss rate varied between 0% - 25%. The interoperability testing has been done using Interoperability assessment methodology and found out that ours is qualified.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

AVELEIRA MATA, JOSE, ANGEL LUIS MUÑOZ CASTAÑEDA, MARÍA TERESA GARCÍA ORDÁS, CARMEN BENAVIDES CUELLAR, José Alberto Benítez Andrades und HECTOR ALAIZ MORETON. „IDS PROTOTYPE FOR INTRUSION DETECTION WITH MACHINE LEARNING MODELS IN IOT SYSTEMS OF THE INDUSTRY 4.0“. DYNA 96, Nr. 3 (01.05.2021): 270–75. http://dx.doi.org/10.6036/10011.

Der volle Inhalt der Quelle
Annotation:
Industry 4.0 significantly improves productivity by collecting and analyzing data in real time. This, combined with remote access functions, and cloud processing that allows Internet of Things IoT, provides information that optimizes processes and decision support. Also involves a great growth of new networks and systems with special features, which mean that they are vulnerable to different attacks. So new security requirements are emerging in the IoT network. To improve the security of an IoT system for a transparent way, it is proposed the development of a prototype intrusion detection system IDS, which detects anomalies in IoT environments using the MQTT protocol (Message Queuing Telemetry Transport), widely used in IoT systems. For this purpose, it is generated a dataset of an IoT system in which perform different attacks on the MQTT protocol. This dataset is used to train a machine learning model, which is implemented in the IDS that captures the network frames in real time from the system to classify and detect the different attacks. Keywords: IoT, industry 4.0, cybersecurity, IDS, MQTT protocol, Machine Learning.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

ALBUQUERQUE, J., D. CHEN, M. BASTOS, A. SOARES und W. VALENZUELA. „UMA APLICAÇÃO IOT COM PROTOCOLO MQTT PERSISTINDO EM MONGODB“. Revista SODEBRAS 15, Nr. 174 (Juni 2020): 54–58. http://dx.doi.org/10.29367/issn.1809-3957.15.2020.174.54.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Alaiz-Moreton, Hector, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García und Carmen Benavides. „Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol“. Complexity 2019 (07.04.2019): 1–11. http://dx.doi.org/10.1155/2019/6516253.

Der volle Inhalt der Quelle
Annotation:
The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems (IDS) are used to protect IoT systems from the various anomalies and attacks at the network level. Intrusion Detection Systems (IDS) can be improved through machine learning techniques. Our work focuses on creating classification models that can feed an IDS using a dataset containing frames under attacks of an IoT system that uses the MQTT protocol. We have addressed two types of method for classifying the attacks, ensemble methods and deep learning models, more specifically recurrent networks with very satisfactory results.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Tamri, Rajae, und Said Rakrak. „The SDN-MQTT for an interoperable smart home“. E3S Web of Conferences 229 (2021): 01031. http://dx.doi.org/10.1051/e3sconf/202122901031.

Der volle Inhalt der Quelle
Annotation:
This paper presents the design of SDN-MQTT for a smart home. It is a system combining the SDN technology that solves many technological difficulties in traditional networks, and the MQTT protocol that is arguably the most widely used for resource constrained IoT devices. These two technologies enable heterogeneous IoT devices to be interoperable and interact without any problems. Our proposed work ensures two levels of interoperability.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Budiana, Mochamad Soebagja, Ridha Muldina Negara, Arif Indra Irawan und Harashta Tatimma Larasati. „Advanced detection Denial of Service attack in the Internet of Things network based on MQTT protocol using fuzzy logic“. Register: Jurnal Ilmiah Teknologi Sistem Informasi 7, Nr. 2 (19.04.2021): 95. http://dx.doi.org/10.26594/register.v7i2.2340.

Der volle Inhalt der Quelle
Annotation:
Message Queuing Telemetry Transport (MQTT) is one of the popular protocols used on the Internet of Things (IoT) networks because of its lightweight nature. With the increasing number of devices connected to the internet, the number of cybercrimes on IoT networks will increase. One of the most popular attacks is the Denial of Service (DoS) attack. Standard security on MQTT uses SSL/TLS, but SSL/TLS is computationally wasteful for low-powered devices. The use of fuzzy logic algorithms with the Intrusion Detection System (IDS) scheme is suitable for detecting DoS because of its simple nature. This paper uses a fuzzy logic algorithm embedded in a node to detect DoS in the MQTT protocol with feature selection nodes. This paper's contribution is that the nodes feature selection used will monitor SUBSCRIBE and SUBACK traffic and provide this information to fuzzy input nodes to detect DoS attacks. Fuzzy performance evaluation is measured against changes in the number of nodes and attack intervals. The results obtained are that the more the number of nodes and the higher the traffic intensity, the fuzzy performance will decrease, and vice versa. However, the number of nodes and traffic intensity will affect fuzzy performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

V., Vitor, Renata I. und Sandro C. „IoT Embedded System for Data Acquisition using MQTT Protocol“. International Journal of Computer Applications 182, Nr. 11 (14.08.2018): 1–4. http://dx.doi.org/10.5120/ijca2018917736.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

HC, Bhanujyothi. „Security exploration of MQTT protocol in Internet of Things“. International Journal of Advanced Trends in Computer Science and Engineering 9, Nr. 3 (25.06.2020): 3892–97. http://dx.doi.org/10.30534/ijatcse/2020/209932020.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Bartholet, Marcel, und Christian Überall. „Multi-protocol bridge generation for M2M communication using MQTT“. Journal of Physics: Conference Series 1634 (September 2020): 012115. http://dx.doi.org/10.1088/1742-6596/1634/1/012115.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Lee, Jae Moon. „Development of translation telephone system by using MQTT protocol“. International Journal of Computational Vision and Robotics 9, Nr. 6 (2019): 599. http://dx.doi.org/10.1504/ijcvr.2019.10025723.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Lee, Jae Moon. „Development of translation telephone system by using MQTT protocol“. International Journal of Computational Vision and Robotics 9, Nr. 6 (2019): 599. http://dx.doi.org/10.1504/ijcvr.2019.104042.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

., Neha Agarwal. „INTERNET OF THINGS (IOT) BASED SWITCHBOX USING MQTT PROTOCOL“. International Journal of Research in Engineering and Technology 05, Nr. 04 (25.04.2016): 405–11. http://dx.doi.org/10.15623/ijret.2016.0504075.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Light, Roger A. „Mosquitto: server and client implementation of the MQTT protocol“. Journal of Open Source Software 2, Nr. 13 (26.05.2017): 265. http://dx.doi.org/10.21105/joss.00265.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Buccafurri, Francesco, Vincenzo De Angelis und Roberto Nardone. „Securing MQTT by Blockchain-Based OTP Authentication“. Sensors 20, Nr. 7 (03.04.2020): 2002. http://dx.doi.org/10.3390/s20072002.

Der volle Inhalt der Quelle
Annotation:
The Internet of Things is constantly capturing interest from modern applications, changing our everyday life and empowering industrial applications. Interaction and the collaboration among smart devices offer new challenges to security since they conflict with economic and energy consumption requirement constraints. On the other hand, the lack of security measures could negatively impact the concrete adoption of this paradigm. This paper focuses on the Message Queuing Telemetry Transport (MQTT) protocol, widely adopted in the Internet of Things. This protocol does not implement natively secure authentication mechanisms, which are demanded to developers. Hence, this paper proposes a novel OTP (one-time password)-authentication schema for MQTT, which uses the Ethereum blockchain to implement a second-factor out-of-band channel. The proposal enables the authentication of both local and remote devices preserving user privacy and guaranteeing trust and accountability via Ethereum smart contracts.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Mishra, Biswajeeban, Biswaranjan Mishra und Attila Kertesz. „Stress-Testing MQTT Brokers: A Comparative Analysis of Performance Measurements“. Energies 14, Nr. 18 (14.09.2021): 5817. http://dx.doi.org/10.3390/en14185817.

Der volle Inhalt der Quelle
Annotation:
Presently, Internet of Things (IoT) protocols are at the heart of Machine-to-Machine (M2M) communication. Irrespective of the radio technologies used for deploying an IoT/M2M network, all independent data generated by IoT devices (sensors and actuators) rely heavily on the special messaging protocols used for M2M communication in IoT applications. As the demand for IoT services is growing, the need for reduced power consumption of IoT devices and services is also growing to ensure a sustainable environment for future generations. The Message-Queuing Telemetry Transport or in short MQTT is a widely used IoT protocol. It is a low-resource-consuming messaging solution based on the publish–subscribe type communication model. This paper aims to assess the performance of several MQTT broker implementations (also known as MQTT servers) using stress testing, and to analyze their relationship with system design. The evaluation of the brokers is performed by a realistic test scenario, and the analysis of the test results is done with three different metrics: CPU usage, latency, and message rate. As the main contribution of this work, we analyzed six MQTT brokers (Mosquitto, Active-MQ, Hivemq, Bevywise, VerneMQ, and EMQ X) in detail, and classified them using their main properties. Our results showed that Mosquitto outperforms the other considered solutions in most metrics; however, ActiveMQ is the best performing one in terms of scalability due to its multi-threaded implementation, while Bevywise has promising results for resource-constrained scenarios.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Vaccari, Ivan, Maurizio Aiello und Enrico Cambiaso. „SlowITe, a Novel Denial of Service Attack Affecting MQTT“. Sensors 20, Nr. 10 (21.05.2020): 2932. http://dx.doi.org/10.3390/s20102932.

Der volle Inhalt der Quelle
Annotation:
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry Transport (MQTT) protocol used in IoT environments for communication between IoT devices. We exploit a specific weakness of MQTT which was identified during our research, allowing the client to configure the behavior of the server. In order to validate the possibility to exploit such vulnerability, we propose SlowITe, a novel low-rate denial of service attack aimed to target MQTT through low-rate techniques. We validate SlowITe against real MQTT services, considering both plain text and encrypted communications and comparing the effects of the threat when targeting different daemons. Results show that the attack is successful and it is able to exploit the identified vulnerability to lead a DoS on the victim with limited attack resources.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Et. al., Rajae Tamri,. „The MI-SDN System to Manage MQTT Data in an Interoperable IoT Wireless Network“. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, Nr. 5 (10.04.2021): 1031–36. http://dx.doi.org/10.17762/turcomat.v12i5.1747.

Der volle Inhalt der Quelle
Annotation:
The main challenge for the Internet of Things (IoT) is to ensure interoperability between heterogeneous IoT entities. To support the interaction, intercommunication, and interoperability between these devices several solutions are proposed in the literature. The SDN (Software-defined Network) is one of these solutions to resolve the problem of the heterogeneous network used in IoT. To guarantee network interoperability, the SDN uses a centralized controller, which handles the entire network. The role of end devices in IoT is only forwarding data. The MQTT (Message Queuing Telemetry Transport) protocol is another solution for granting interoperability in IoT. Which is a publish/subscribe based messaging protocol that avoids direct connection between devices by relaying data through a central server called the broker. Combination of these two solutions to manage IoT devices makes it easy to add new devices without touching or changing the existing infrastructure. The new devices only need to communicate with the broker. Moreover, the Controller SDN is responsible for handling networks. Consequently, smart devices added don’t need to be compatible with the others. In this paper, we present the design and the implementation of a new IoT architecture, which is a combination of SDN technology and MQTT protocol. That enables heterogeneous IoT devices to be interoperable and interact without any problems. Our system utilizes the lightweight protocol MQTT with a new mechanism using several slave brokers and one master. The slaves manage the group of the end devices in the wireless IoT network, and the master broker installed in the SDN controller supervises the integral network. The SDN controller uses a multicast system to send MQTTdata across the external wireless network. As a result, that reduces transmission delay between wireless IoT network compared with the using of a standard MQTT.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Saeed, Sabeeh Ahmad, Farrukh Zeeshan Khan, Zeshan Iqbal, Roobaea Alroobaea, Muneer Ahmad, Muhammad Talha, Muhammad Ahsan Raza und Ihsan Ali. „An IoT-Based Network for Smart Urbanization“. Wireless Communications and Mobile Computing 2021 (02.04.2021): 1–14. http://dx.doi.org/10.1155/2021/5584667.

Der volle Inhalt der Quelle
Annotation:
Internet of Things (IoT) is considered one of the world’s ruling technologies. Billions of IoT devices connected together through IoT forming smart cities. As the concept grows, it is very challenging to design an infrastructure that is capable of handling large number of devices and process data effectively in a smart city paradigm. This paper proposed a structure for smart cities. It is implemented using a lightweight easy to implement network design and a simpler data format for information exchange that is suitable for developing countries like Pakistan. Using MQTT as network protocol, different sensor nodes were deployed for collecting data from the environment. Environmental factors like temperature, moisture, humidity, and percentage of CO2 and methane gas were recorded and transferred to sink node for information sharing over the IoT cloud using an MQTT broker that can be accessed any time using Mosquitto client. The experiment results provide the performance analysis of the proposed network at different QoS levels for the MQTT protocol for IoT-based smart cities. JSON structure is used to formulate the communication data structure for the proposed system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Dikii, Dmitrii I. „Detection of DoS attacks caused by CONNECT messages of MQTT protocol“. Radioelectronics. Nanosystems. Information Technologies 12, Nr. 2 (11.08.2020): 287–96. http://dx.doi.org/10.17725/rensit.2020.12.287.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Fernández, Fátima, Mihail Zverev, Pablo Garrido, José R. Juárez, Josu Bilbao und Ramón Agüero. „Even Lower Latency in IIoT: Evaluation of QUIC in Industrial IoT Scenarios“. Sensors 21, Nr. 17 (26.08.2021): 5737. http://dx.doi.org/10.3390/s21175737.

Der volle Inhalt der Quelle
Annotation:
In this paper we analyze the performance of QUIC as a transport alternative for Internet of Things (IoT) services based on the Message Queuing Telemetry Protocol (MQTT). QUIC is a novel protocol promoted by Google, and was originally conceived to tackle the limitations of the traditional Transmission Control Protocol (TCP), specifically aiming at the reduction of the latency caused by connection establishment. QUIC use in IoT environments is not widespread, and it is therefore interesting to characterize its performance when in over such scenarios. We used an emulation-based platform, where we integrated QUIC and MQTT (using GO-based implementations) and compared their combined performance with the that exhibited by the traditional TCP/TLS approach. We used Linux containers as end devices, and the ns-3 simulator to emulate different network technologies, such as WiFi, cellular, and satellite, and varying conditions. The results evince that QUIC is indeed an appropriate protocol to guarantee robust, secure, and low latency communications over IoT scenarios.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Delgado, Alexi. „Design of an IOT Domotic System using the MQTT protocol“. International Journal of Advanced Trends in Computer Science and Engineering 9, Nr. 4 (25.08.2020): 4811–18. http://dx.doi.org/10.30534/ijatcse/2020/90942020.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Dinculeană, Dan, und Xiaochun Cheng. „Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices“. Applied Sciences 9, Nr. 5 (27.02.2019): 848. http://dx.doi.org/10.3390/app9050848.

Der volle Inhalt der Quelle
Annotation:
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to protect against such attacks. This paper will review some existing solutions used to secure a communication channel, such as Transport Layer Security or symmetric encryption, as well as provide a novel approach to achieving confidentiality and integrity of messages. The method, called Value-to-Keyed-Hash Message Authentication Code (Value-to-HMAC) mapping, uses signatures to send messages, instead of encryption, by implementing a Keyed-Hash Message Authentication Code generation algorithm. Although robust solutions exist that can be used to secure the communication between devices, this paper considers that not every Internet of Things (IoT) device or network design is able to afford the overhead and drop in performance, or even support such protocols. Therefore, the Value-to-HMAC method was designed to maximize performance while ensuring the messages are only readable by the intended node. The experimental procedure demonstrates how the method will achieve better performance than a symmetric-key encryption algorithm, while ensuring the confidentiality and integrity of information through the use of one mechanism.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Yeh, Chia-Shin, Shang-Liang Chen und I.-Ching Li. „Implementation of MQTT protocol based network architecture for smart factory“. Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 235, Nr. 13 (08.05.2021): 2132–42. http://dx.doi.org/10.1177/09544054211014488.

Der volle Inhalt der Quelle
Annotation:
The core concept of smart manufacturing is based on digitization to construct intelligent production and management in the manufacturing process. By digitizing the production process and connecting all levels from product design to service, the purpose of improving manufacturing efficiency, reducing production cost, enhancing product quality, and optimizing user experience can be achieved. To digitize the manufacturing process, IoT technology will have to be introduced into the manufacturing process to collect and analyze process information. However, one of the most important problems in building the industrial IoT (IIoT) environment is that different industrial network protocols are used for different equipment in factories. Therefore, the information in the manufacturing process may not be easily exchanged and obtained. To solve the above problem, a smart factory network architecture based on MQTT (MQ Telemetry Transport), IoT communication protocol, is proposed in this study, to construct a heterogeneous interface communication bridge between the machine tool, embedded device Raspberry Pi, and website. Finally, the system architecture is implemented and imported into the factory, and a smart manufacturing information management system is developed. The edge computing module is set up beside a three-axis machine tool, and a human-machine interface is built for the user controlling and monitoring. Users can also monitor the system through the dynamically updating website at any time and any place. The function of real-time gesture recognition based on image technology is developed and built on the edge computing module. The gesture recognition results can be transmitted to the machine controller through MQTT, and the machine will execute the corresponding action according to different gestures to achieve human-robot collaboration. The MQTT transmission architecture developed here is validated by the given edge computing application. It can serve as the basis for the construction of the IIoT environment, assist the traditional manufacturing industry to prepare for digitization, and accelerate the practice of smart manufacturing.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie