To see the other types of publications on this topic, follow the link: MQTT protocol.

Journal articles on the topic 'MQTT protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'MQTT protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yamin, Muhammad Ikrar, Son Kuswadi, and Sritrusta Sukaridhoto. "Real Performance Evaluation On MQTT and COAP Protocol in Ubiquitous Network Robot Platform (UNRPF) for Disaster Multi-robot Communication." EMITTER International Journal of Engineering Technology 6, no. 2 (December 29, 2018): 369–85. http://dx.doi.org/10.24003/emitter.v6i2.305.

Full text
Abstract:
Disaster multi-robot has a significant role in a disaster area to do many tasks like detection of fire, search and rescue of victims, etc. It needs to build good communication between the operator and multi-robot and among multi-robot themselves to perform their tasks quickly and efficiently. This relates with the queue message protocol system. In this research, we implemented the queue message protocol on mesh topology and integrated it on the robot platform. Recently, development of IoT (Internet of Things) Technology causes development of communication protocol. MQTT and CoAP are among the communication protocols used for IoT needs. Both protocols performance were compared when  used and implemented into disaster multi-robot. We also integrated MQTT protocol and robot platform python based (UNR-PF). The result shows that MQTT protocol is easier to be implemented on to disaster multi-robot platform (UNR-PF) on mesh topology than CoAP, and that data transfer rate of MQTT protocol has data transfer rate higher than CoAP.
APA, Harvard, Vancouver, ISO, and other styles
2

Silva, Daniel, Liliana I. Carvalho, José Soares, and Rute C. Sofia. "A Performance Analysis of Internet of Things Networking Protocols: Evaluating MQTT, CoAP, OPC UA." Applied Sciences 11, no. 11 (May 26, 2021): 4879. http://dx.doi.org/10.3390/app11114879.

Full text
Abstract:
IoT data exchange is supported today by different communication protocols and different protocolar frameworks, each of which with its own advantages and disadvantages, and often co-existing in a way that is mandated by vendor policies. Although different protocols are relevant in different domains, there is not a protocol that provides better performance (jitter, latency, energy consumption) across different scenarios. The focus of this work is two-fold. First, to provide a comparison of the different available solutions in terms of protocolar features such as type of transport, type of communication pattern support, security aspects, including Named-data networking as relevant example of an Information-centric networking architecture. Secondly, the work focuses on evaluating three of the most popular protocols used both in Consumer as well as in Industrial IoT environments: MQTT, CoAP, and OPC UA. The experimentation has been carried out first on a local testbed for MQTT, COAP and OPC UA. Then, larger experiments have been carried out for MQTT and CoAP, based on the large-scale FIT-IoT testbed. Results show that CoAP is the protocol that achieves across all scenarios lowest time-to-completion, while OPC UA, albeit exhibiting less variability, resulted in higher time-to-completion in comparison to CoAP or MQTT.
APA, Harvard, Vancouver, ISO, and other styles
3

Sahmi, Imane, Abderrahim Abdellaoui, Tomader Mazri, and Nabil Hmina. "MQTT-PRESENT: Approach to secure internet of things applications using MQTT protocol." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (October 1, 2021): 4577. http://dx.doi.org/10.11591/ijece.v11i5.pp4577-4586.

Full text
Abstract:
The big challenge to raise for deploying the application's domain of the Internet of Things is security. As one of the popular messaging protocols in the IoT world, the message queue telemetry transport (MQTT) is designed for constrained devices and machine-to-machine communications, based on the publish-subscribe model, it offers a basic authentication using username and password. However, this authentication method might have a problem in terms of security and scalability. In this paper, we provide an analysis of the current research in the literature related to the security for the MQTT protocol, before we give a brief description of each algorithm used on our approach, to finally propose a new approach to secure this protocol based on AugPAKE algorithm and PRESENT encryption. This solution provides mutual authentication between the broker and their clients (publishers and subscribers), the confidentiality of the published message is protected twice, the integrity and non-repudiation of MQTT messages which is protected during the process of transmission.
APA, Harvard, Vancouver, ISO, and other styles
4

Sahlmann, Kristina, Vera Clemens, Michael Nowak, and Bettina Schnor. "MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices." Sensors 21, no. 1 (December 22, 2020): 10. http://dx.doi.org/10.3390/s21010010.

Full text
Abstract:
Message Queuing Telemetry Transport (MQTT) is one of the dominating protocols for edge- and cloud-based Internet of Things (IoT) solutions. When a security vulnerability of an IoT device is known, it has to be fixed as soon as possible. This requires a firmware update procedure. In this paper, we propose a secure update protocol for MQTT-connected devices which ensures the freshness of the firmware, authenticates the new firmware and considers constrained devices. We show that the update protocol is easy to integrate in an MQTT-based IoT network using a semantic approach. The feasibility of our approach is demonstrated by a detailed performance analysis of our prototype implementation on a IoT device with 32 kB RAM. Thereby, we identify design issues in MQTT 5 which can help to improve the support of constrained devices.
APA, Harvard, Vancouver, ISO, and other styles
5

Park, Jun-Hong, Hyeong-Su Kim, and Won-Tae Kim. "DM-MQTT: An Efficient MQTT Based on SDN Multicast for Massive IoT Communications." Sensors 18, no. 9 (September 12, 2018): 3071. http://dx.doi.org/10.3390/s18093071.

Full text
Abstract:
Edge computing is proposed to solve the problem of centralized cloud computing caused by a large number of IoT (Internet of Things) devices. The IoT protocols need to be modified according to the edge computing paradigm, where the edge computing devices for analyzing IoT data are distributed to the edge networks. The MQTT (Message Queuing Telemetry Transport) protocol, as a data distribution protocol widely adopted in many international IoT standards, is suitable for cloud computing because it uses a centralized broker to effectively collect and transmit data. However, the standard MQTT may suffer from serious traffic congestion problem on the broker, causing long transfer delays if there are massive IoT devices connected to the broker. In addition, the big data exchange between the IoT devices and the broker decreases network capability of the edge networks. The authors in this paper propose a novel MQTT with a multicast mechanism to minimize data transfer delay and network usage for the massive IoT communications. The proposed MQTT reduces data transfer delays by establishing bidirectional SDN (Software Defined Networking) multicast trees between the publishers and the subscribers by means of bypassing the centralized broker. As a result, it can reduce transmission delay by 65% and network usage by 58% compared with the standard MQTT.
APA, Harvard, Vancouver, ISO, and other styles
6

Najeeb, Nihaala, and Shelbi Joseph. "IoT Service Search using MQTT Protocol." International Journal of Computer Sciences and Engineering 7, no. 7 (July 31, 2019): 292–97. http://dx.doi.org/10.26438/ijcse/v7i7.292297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jaloudi, Samer. "Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study." Future Internet 11, no. 3 (March 7, 2019): 66. http://dx.doi.org/10.3390/fi11030066.

Full text
Abstract:
Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled. However, the MODBUS TCP is an open de facto standard, and is used for some automation and telecontrol systems. It is based on a polling mechanism and follows the synchronous request–response pattern, as opposed to the asynchronous publish–subscribe pattern. In this study, polling-based and event-based protocols are investigated to realize an open and interoperable Industrial Internet of Things (IIoT) environment. Many Internet of Things (IoT) protocols are introduced and compared, and the message queuing telemetry transport (MQTT) is chosen as the event-based, publish–subscribe protocol. The study shows that MODBUS defines an optimized message structure in the application layer, which is dedicated to industrial applications. In addition, it shows that an event-oriented IoT protocol complements the MODBUS TCP but cannot replace it. Therefore, two scenarios are proposed to build the IIoT environment. The first scenario is to consider the MODBUS TCP as an IoT protocol, and build the environment using the MODBUS TCP on a standalone basis. The second scenario is to use MQTT in conjunction with the MODBUS TCP. The first scenario is efficient and complies with most industrial applications where the request–response pattern is needed only. If the publish–subscribe pattern is needed, the MQTT in the second scenario complements the MODBUS TCP and eliminates the need for a gateway; however, MQTT lacks interoperability. To maintain a homogeneous message structure for the entire environment, industrial data are organized using the structure of MODBUS messages, formatted in the UTF-8, and then transferred in the payload of an MQTT publish message. The open and interoperable environment can be used for Internet SCADA, Internet-based monitoring, and industrial control systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman, and Mohamed Zorkany. "Internet of Things (IoT) Platform for Multi-Topic Messaging." Energies 13, no. 13 (June 30, 2020): 3346. http://dx.doi.org/10.3390/en13133346.

Full text
Abstract:
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access protocol (SOAP). These protocols only support single-topic messaging. Thus, in this work, an IoT message protocol that supports multi-topic messaging is proposed. This protocol will add a simple “brain” for IoT platforms in order to realize an intelligent IoT architecture. Moreover, it will enhance the traffic throughput by reducing the overheads of messages and the delay of multi-topic messaging. Most current IoT applications depend on real-time systems. Therefore, an RTOS (real-time operating system) as a famous OS (operating system) is used for the embedded systems to provide the constraints of real-time features, as required by these real-time systems. Using RTOS for IoT applications adds important features to the system, including reliability. Many of the undertaken research works into IoT platforms have only focused on specific applications; they did not deal with the real-time constraints under a real-time system umbrella. In this work, the design of the multi-topic IoT protocol and platform is implemented for real-time systems and also for general-purpose applications; this platform depends on the proposed multi-topic communication protocol, which is implemented here to show its functionality and effectiveness over similar protocols.
APA, Harvard, Vancouver, ISO, and other styles
9

Shaikh, Arefa Shafique. "A Survey on Exchanging Data Using MQTT Protocol in Arduino." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 31, 2021): 3081–82. http://dx.doi.org/10.22214/ijraset.2021.37007.

Full text
Abstract:
In the coming years, sensors will likely grow in every aspect of our lives. Several activities explain how the Internet of Things (IoT) will have an impact on almost all aspect of our lives and why security is at the top of the list of IoT challenges. Device to Device communications (D2D) in IoT are forecast and another major concern within the use of IoT is to make sure device security, D2D connectivity and high quality data. Therefore, a proper communication protocol is required to fix this issues. To address this, we purpose the use of Message Queue Telemetry Transport(MQTT)protocol to transfer data between devices, as it is more secured. MQTT (Message Queuing Telemetry Transport) is a publish/subscribe messaging protocol which works on top of the TCP/IP protocol. The key feature of MQTT is its light weight, adds flexible authentication and bandwidth efficiency. The result of this study is transferring high quality data securely using MQTT protocol.
APA, Harvard, Vancouver, ISO, and other styles
10

Gao, Zhenyu, Jian Cao, Wei Wang, Huayun Zhang, and Zengrong Xu. "Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time." Security and Communication Networks 2021 (September 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/4587862.

Full text
Abstract:
Industry 4.0 focuses on continuous interconnection services, allowing for the continuous and uninterrupted exchange of signals or information between related parties. The application of messaging protocols for transferring data to remote locations must meet specific specifications such as asynchronous communication, compact messaging, operating in conditions of unstable connection of the transmission line of data, limited network bandwidth operation, support multilevel Quality of Service (QoS), and easy integration of new devices. The Message Queue Telemetry Transport (MQTT) protocol is used in software applications that require asynchronous communication. It is a light and simplified protocol based on publish-subscribe messaging and is placed functionally over the TCP/IP protocol. It is designed to minimize the required communication bandwidth and system requirements increasing reliability and probability of successful message transmission, making it ideal for use in Machine-to-Machine (M2M) communication or networks where bandwidth is limited, delays are long, coverage is not reliable, and energy consumption should be as low as possible. Despite the fact that the advantage that MQTT offers its way of operating does not provide a serious level of security in how to achieve its interconnection, as it does not require protocol dependence on one intermediate third entity, the interface is dependent on each application. This paper presents an innovative real-time anomaly detection system to detect MQTT-based attacks in cyber-physical systems. This is an online-semisupervised learning neural system based on a small number of sampled patterns that identify crowd anomalies in the MQTT protocol related to specialized attacks to undermine cyber-physical systems.
APA, Harvard, Vancouver, ISO, and other styles
11

Al-Azam, Moh Noor, Darian Rizaludin, Yulius Satmoko Raharjo, and Aryo Nugroho. "Message Queuing Telemetry Transport dalam Internet of Things menggunakan ESP-32." JURNAL MEDIA INFORMATIKA BUDIDARMA 3, no. 3 (July 30, 2019): 159. http://dx.doi.org/10.30865/mib.v3i3.1160.

Full text
Abstract:
Message Queuing Telemetry Transport (MQTT) is a connectivity protocol between machines or now better known as the Internet of Things (IoT). This protocol recognizes two basic functions of M2M communication, namely publish and subscribe (pub/sub). The MQTT protocol is designed as a very simple and very lightweight message delivery protocol, designed for devices that are limited and with low bandwidth capacity, high latency or on an unreliable network. The design principles are to minimize bandwidth requirements and device resource requirements, and keep trying to ensure reliability and guaranteed delivery rates. In this paper, VerneMQ performance reliability is tested - one of the MQTT brokers, with several stressing levels using ESP-32 as a publisher and notebook with the python application as a subscriber.
APA, Harvard, Vancouver, ISO, and other styles
12

Vaccari, Ivan, Maurizio Aiello, and Enrico Cambiaso. "SlowTT: A Slow Denial of Service against IoT Networks." Information 11, no. 9 (September 18, 2020): 452. http://dx.doi.org/10.3390/info11090452.

Full text
Abstract:
The security of Internet of Things environments is a critical and trending topic, due to the nature of the networks and the sensitivity of the exchanged information. In this paper, we investigate the security of the Message Queue Telemetry Transport (MQTT) protocol, widely adopted in IoT infrastructures. We exploit two specific weaknesses of MQTT, identified during our research activities, allowing the client to configure the KeepAlive parameter and MQTT packets to execute an innovative cyber threat against the MQTT broker. In order to validate the exploitation of such vulnerabilities, we propose SlowTT, a novel “Slow” denial of service attack aimed at targeting MQTT through low-rate techniques, characterized by minimum attack bandwidth and computational power requirements. We validate SlowTT against real MQTT services, by considering both plaintext and encrypted communications and by comparing the effects of the attack when targeting different application daemons and protocol versions. Results show that SlowTT is extremely successful, and it can exploit the identified vulnerability to execute a denial of service against the IoT network by keeping the connection alive for a long time.
APA, Harvard, Vancouver, ISO, and other styles
13

Mamlook, Rustom, Omer F. Khan, and Thabit Sultan Mohammed. "Bridging for cross protocol talk in IOT devices using windows communication foundation." International Journal of Engineering & Technology 7, no. 3.29 (August 24, 2018): 196. http://dx.doi.org/10.14419/ijet.v7i3.29.18794.

Full text
Abstract:
In the Internet of Things (IoT), multiple communication protocols are used to connect the smart device. Wi-Fi, Xbee, ZigBee, Bluetooth, and LoRaWAN are some of the communication channels utilized for connectivity by devices using some IoT platform.In order to enable the development of smart services for IoT platforms, there are solutions by different vendors to connect between IoT devices. For example, multiple IoT platforms are available in the market namely IoTivity platform developed by Open Connectivity Foundation (OCF), AllJoyn platform from All Seen Alliance, Weave made by Google, and Home Kit by Apple. In view of such segmentation of IoT platforms, IoT Application’s development has been made complex, where IoT device and accompanying application compatibility with available platforms requires support for multiple protocols.To simplify the complexity introduced by multiple platforms, M2M [4] International standard was already proposed as the bridge for integrating IoT protocols. In our paper, we implement a proxy web service using Windows Communication Foundation (WCF) as a way to translate communication in one IoT protocol to another. In our implementation of middleware, we allowed the MQTT broker to accept messages, which were passed, to the Web Service from various devices over Hyper Text Protocol’s POST or GET Commands. Bridging between WCF Web Service and MQTT broker was enabled with duplex communication. Hence, devices supporting either HTTP protocol or MQTT protocol were able to communicate transparently.
APA, Harvard, Vancouver, ISO, and other styles
14

Atmoko, Rachmad Andri, Daoguo Yang, M. Yayan Alfiani, and Lilik Subiyanto. "Controlling Unmanned Surface Vehicle Using MQTT Protocol." Journal Of Computer Networks, Architecture and High Performance Computing 1, no. 2 (July 16, 2019): 21–28. http://dx.doi.org/10.47709/cnapc.v1i2.229.

Full text
Abstract:
Abstract- The communication system at USV is the most important part of ensuring that the USV control system runs well. Communication systems that are commonly used at USV are generally still local networks. The development of a wider range of communications is needed to improve USV scalability so that the benefits can be increased to support the concept of remote laboratory and remote surveillance. USV is generally controlled using a wireless network with a limited work area using WIFI or using another electromagnetic waves transmission. This research proposes the development control and monitoring systems of USV to be controlled over the Internet by using the message queuing telemetry transport(MQTT) Protocol. This idea makes the USV can be controlled remotely, no longer have to operate it in the field. The control speed response of rudder and motor are analyzed. Performance monitoring of the compass sensor, GPS, and cameras also showed good results. As a result, the average delay time generated is 1.6 second.
APA, Harvard, Vancouver, ISO, and other styles
15

Quincozes, Silvio, Tubino Emilio, and Juliano Kazienko. "MQTT Protocol: Fundamentals, Tools and Future Directions." IEEE Latin America Transactions 17, no. 09 (September 2019): 1439–48. http://dx.doi.org/10.1109/tla.2019.8931137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hernández Ramos, Santiago, M. Teresa Villalba, and Raquel Lacuesta. "MQTT Security: A Novel Fuzzing Approach." Wireless Communications and Mobile Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8261746.

Full text
Abstract:
The Internet of Things is a concept that is increasingly present in our lives. The emergence of intelligent devices has led to a paradigm shift in the way technology interacts with the environment, leading society to a smarter planet. Consequently, new advanced telemetry approaches appear to connect all kinds of devices with each other, with companies, or with other networks, such as the Internet. On the road to an increasingly interconnected world, where critical devices rely on communication networks to provide an essential service, there arises the need to ensure the security and reliability of these protocols and applications. In this paper, we discuss a security-based approach for MQTT (Message Queue Telemetry Transport), which stands out as a very lightweight and widely used messaging and information exchange protocol for IoT (Internet of Things) devices throughout the world. To that end, we propose the creation of a framework that allows for performing a novel, template-based fuzzing technique on the MQTT protocol. The first experimental results showed that performance of the fuzzing technique presented here makes it a good candidate for use in network architectures with low processing power sensors, such as Smart Cities. In addition, the use of this fuzzer in widely used applications that implement MQTT has led to the discovery of several new security flaws not hitherto reported, demonstrating its usefulness as a tool for finding security vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
17

Larmo, Anna, Antti Ratilainen, and Juha Saarinen. "Impact of CoAP and MQTT on NB-IoT System Performance." Sensors 19, no. 1 (December 20, 2018): 7. http://dx.doi.org/10.3390/s19010007.

Full text
Abstract:
The IoT protocols used for data transfer in the application layer, namely the Constraint Application Protocol (CoAP) and Message Queue Telemetry Transport (MQTT) have dependencies to the transport layer. The choice of transport, Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), on the other hand, has an impact on the Internet of Things (IoT) application level performance, especially over a wireless medium. Furthermore, we touch upon the impact of different security solutions. The motivation of this work is to look at the impact of the protocol stack on performance over a narrowband IoT (NB-IoT) link. The use case studied is infrequent small reports sent from the sensor device to a central cloud storage over a last mile radio access link. We find that while CoAP/UDP based transport performs consistently better both in terms of latency, coverage, and system capacity, MQTT/TCP also works when the system is less loaded.
APA, Harvard, Vancouver, ISO, and other styles
18

Kant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (June 18, 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Full text
Abstract:
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment such as failure or impairment of production systems. We evaluate the prevalence of exposed IoT and IIoT devices related to the protocol MQTT by means of the search engine Shodan. The approach, design and results of our analysis are summarized in this paper.
APA, Harvard, Vancouver, ISO, and other styles
19

H. Amaran, M., M. S. Rohmad, L. H. Adnan, N. N. Mohamed, and H. Hashim. "Lightweight Security for MQTT-SN." International Journal of Engineering & Technology 7, no. 4.11 (October 2, 2018): 223. http://dx.doi.org/10.14419/ijet.v7i4.11.20811.

Full text
Abstract:
This study discusses a method to secure Message Queuing Telemetry Transport-Sensor network (MQTT-SN). MQTT-SN is a popular data communication protocol used in developing IoT applications and can be secured by augmenting it with a security scheme. In this work, several lightweight encryption schemes to be used in tandem with MQTT-SN were tested and analysed. The best algorithm is identified based on the speed of encryption and overall power consumption when implemented in IoT environment. It was found that L-BLOCK is the overall performer in securing MQTT-SN and should be highly considered when developing IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
20

H. Amaran, M., M. S. Rohmad, L. H. Adnan, N. N. Mohamed, and H. Hashim. "Lightweight Security for MQTT-SN." International Journal of Engineering & Technology 7, no. 4.11 (October 2, 2018): 262. http://dx.doi.org/10.14419/ijet.v7i4.11.21389.

Full text
Abstract:
This study discusses a method to secure Message Queuing Telemetry Transport-Sensor network (MQTT-SN). MQTT-SN is a popular data communication protocol used in developing IoT applications and can be secured by augmenting it with a security scheme. In this work, several lightweight encryption schemes to be used in tandem with MQTT-SN were tested and analysed. The best algorithm is identified based on the speed of encryption and overall power consumption when implemented in IoT environment. It was found that L-BLOCK is the overall performer in securing MQTT-SN and should be highly considered when developing IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
21

Susanto, Bekti Maryuni, Ery Setiyawan Jullev Atmadji, and Willy Laurent Brenkman. "IMPLEMENTASI MQTT PROTOCOL PADA SMART HOME SECURITY BERBASIS WEB." Jurnal Informatika Polinema 4, no. 3 (May 1, 2018): 201. http://dx.doi.org/10.33795/jip.v4i3.207.

Full text
Abstract:
Penggunaan IoT semakin berkembang dalam waktu singkat, hal ini dikarenakan oleh semakin berkembangnya teknologi informasi. Hal ini menyebabkan keterlibatan banyak device yang saling terkoneksi dengan sensor yang terpasang pada lingkungan. Sehingga dengan adanya banyak device maka menyebabkan permasalahan interoperabilitas dari masing-masing alat. Untuk mengatasi hal tersebut maka diperlukan sebuah gateway atau protocol yang mampu menjembatani interoperabilitas tersebut. Salah satu tugas Gateway atau protocol tersebut adalah harus mampu menangani permasalahan interoperabilitas serta mampu menangani permintaan maupun device profile dari masing-masing sensor maupun device yang terkoneksi. MQTT sendiri adalah sebuah protocol konektifitas machine to machine (M2M) yang didesain mampu mengirimkan data dengan sangat ringan menggunakan arsitektur TCP/IP. Pada MQTT sendiri mempunyai keunggulan yaitu dapat mengirimkan data dengan bandwith yang ringan, konsumsi listrik yang sedikit, latensi serta konektifitas yang sangat tinggi, ketersediaan variable yang banyak serta jaminan pengiriman data yang dapat dinegosiasikan. Paper ini membahas tentang implementasi MQTT protocol pada smart home security berbasis web. Topik ini dipilih karena keamanan rumah merupakan permasalahan yang sangat penting, apalagi saat kita meninggalkan rumah.
APA, Harvard, Vancouver, ISO, and other styles
22

Gopi Krishna, P., K. Sreenivasa Ravi, K. Hari Kishore, K. KrishnaVeni, K. N. Siva Rao, and R. D. Prasad. "Design and development of bi-directional IoT gateway using ZigBee and Wi-Fi technologies with MQTT protocol." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 125. http://dx.doi.org/10.14419/ijet.v7i2.8.10344.

Full text
Abstract:
With evolution of the smart things, to acquire data, gateways play a major role in interconnecting with various sensor nodes. Using different wireless protocols and standards with sensor nodes, gateway can transform information into a unique format that transmits into the cloud for further use. Which accepts the commands from external users in the remote location through a personal computer or a smartphone? The proposed gateway has its added advantages; (i) ZigBee and Wi-Fi wireless technologies connectivity is enabled, (ii) transforms the information into required protocol format, (iii) uses a light weighted MQTT protocol in transmitting and receiving environment, (iv) It provides the storage and analyzed data and (v) the sensor values can be observed and the devices can be controlled by a smartphone from remote location. Here we demonstrate the proof of concept for controlling the smart home appliances. This also represents a design and implementation of Bi-Directional IoT gateway using ZigBee and Wi-Fi technologies with MQTT protocol.
APA, Harvard, Vancouver, ISO, and other styles
23

Dikii, D. I. "Denial-of-service attack analysis by MQTT protocol." Scientific and Technical Journal of Information Technologies, Mechanics and Optics 20, no. 2 (April 1, 2020): 223–32. http://dx.doi.org/10.17586/2226-1494-2020-20-2-223-232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Atmoko, R. A., R. Riantini, and M. K. Hasin. "IoT real time data acquisition using MQTT protocol." Journal of Physics: Conference Series 853 (May 2017): 012003. http://dx.doi.org/10.1088/1742-6596/853/1/012003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wicaksana, Gabe Dimas, Maman Abdurohman, and Aji Gautama Putrada. "Enhancing the quality of experience of Arduino-based multiplayer online game using MQTT server." Jurnal Teknologi dan Sistem Komputer 8, no. 1 (January 31, 2020): 36–43. http://dx.doi.org/10.14710/jtsiskom.8.1.2020.36-43.

Full text
Abstract:
Online multiplayer games require internet networks to play with opposing players more exciting because multiple players can fight each other. The game experiences lag, which is expressed as the quality of experience (QoE), is one of the most common problems for online multiplayer games, causing the games less exciting to play. This study examined the implementation of Message Queue Telemetry Transport (MQTT) as a communication protocol in multiplayer online games using Arduino and compared its performance against HTTP. QoE used data collected using the mean opinion score (MOS) method. The MQTT resulted in an average QoE score of 3.9 (Pingpong) and 4 (TicTacToe) MOS units, while on HTTP 3.8 (PingPong and TicTacToe). The use of the MQTT communication protocol can improve the QoE of multiplayer online game players compared to HTTP.
APA, Harvard, Vancouver, ISO, and other styles
26

Et.al, Kitae Hwang. "Experiences And Considerations On Performance Test Of Mosquitto-Based Broker." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 10, 2021): 666–73. http://dx.doi.org/10.17762/turcomat.v12i6.2066.

Full text
Abstract:
MQTT is a communication protocol for exchanging messages between clients via MQTT broker and is used to build many IoT systems. Currently, various tools have been developed to help measure the performance of application systems using MQTT. However, because they are all versatile tools, a dedicated test system that meets the purpose of the application system needs to be built on their behalf. But building a test system is not that simple. In this paper we discuss a case of building a test system for measuring U-Mosquitto’s performance, which has modified the open source Mosquitto broker to handle urgent messages with priority, and some issues to be considered in the process. In particular, they include selection of the server computer, the structure of the test program, the use of appropriate threads for the client, the appropriate number of clients, the appropriate workload per client, clock synchronization between clients, protocol analyzer issues, and other issues. Our experiences and considerations on these issues are expected to be a good guide for building a test system to measure the performance of MQTT application systems.
APA, Harvard, Vancouver, ISO, and other styles
27

Ho, Nam, and Choong Seon Hong. "Secure MQTT Protocol based on Attribute-Based Encryption Scheme." Journal of KIISE 45, no. 3 (March 31, 2018): 195–99. http://dx.doi.org/10.5626/jok.2018.45.3.195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Pramukantoro, Eko Sakti, and Husnul Anwari. "An Event-based Middleware for Syntactical Interoperability in Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 3784. http://dx.doi.org/10.11591/ijece.v8i5.pp3784-3792.

Full text
Abstract:
Internet of Things (IoT) connecting sensors or devices that record physical observations of the environment and a variety of applications or other Internet services. Along with the increasing number and diversity of devices connected, there arises a problem called interoperability. One type of interoperability is syntactical interoperability, where the IoT should be able to connect all devices through various data protocols. Based on this problem, we proposed a middleware that capable of supporting interoperability by providing a multi-protocol gateway between COAP, MQTT, and WebSocket. This middleware is developed using event-based architecture by implementing publish-subscribe pattern. We also developed a system to test the performance of middleware in terms of success rate and delay delivery of data. The system consists of temperature and humidity sensors using COAP and MQTT as a publisher and web application using WebSocket as a subscriber. The results for data transmission, either from sensors or MQTT COAP has a success rate above 90%, the average delay delivery of data from sensors COAP and MQTT below 1 second, for packet loss rate varied between 0% - 25%. The interoperability testing has been done using Interoperability assessment methodology and found out that ours is qualified.
APA, Harvard, Vancouver, ISO, and other styles
29

AVELEIRA MATA, JOSE, ANGEL LUIS MUÑOZ CASTAÑEDA, MARÍA TERESA GARCÍA ORDÁS, CARMEN BENAVIDES CUELLAR, José Alberto Benítez Andrades, and HECTOR ALAIZ MORETON. "IDS PROTOTYPE FOR INTRUSION DETECTION WITH MACHINE LEARNING MODELS IN IOT SYSTEMS OF THE INDUSTRY 4.0." DYNA 96, no. 3 (May 1, 2021): 270–75. http://dx.doi.org/10.6036/10011.

Full text
Abstract:
Industry 4.0 significantly improves productivity by collecting and analyzing data in real time. This, combined with remote access functions, and cloud processing that allows Internet of Things IoT, provides information that optimizes processes and decision support. Also involves a great growth of new networks and systems with special features, which mean that they are vulnerable to different attacks. So new security requirements are emerging in the IoT network. To improve the security of an IoT system for a transparent way, it is proposed the development of a prototype intrusion detection system IDS, which detects anomalies in IoT environments using the MQTT protocol (Message Queuing Telemetry Transport), widely used in IoT systems. For this purpose, it is generated a dataset of an IoT system in which perform different attacks on the MQTT protocol. This dataset is used to train a machine learning model, which is implemented in the IDS that captures the network frames in real time from the system to classify and detect the different attacks. Keywords: IoT, industry 4.0, cybersecurity, IDS, MQTT protocol, Machine Learning.
APA, Harvard, Vancouver, ISO, and other styles
30

ALBUQUERQUE, J., D. CHEN, M. BASTOS, A. SOARES, and W. VALENZUELA. "UMA APLICAÇÃO IOT COM PROTOCOLO MQTT PERSISTINDO EM MONGODB." Revista SODEBRAS 15, no. 174 (June 2020): 54–58. http://dx.doi.org/10.29367/issn.1809-3957.15.2020.174.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Alaiz-Moreton, Hector, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García, and Carmen Benavides. "Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol." Complexity 2019 (April 7, 2019): 1–11. http://dx.doi.org/10.1155/2019/6516253.

Full text
Abstract:
The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems (IDS) are used to protect IoT systems from the various anomalies and attacks at the network level. Intrusion Detection Systems (IDS) can be improved through machine learning techniques. Our work focuses on creating classification models that can feed an IDS using a dataset containing frames under attacks of an IoT system that uses the MQTT protocol. We have addressed two types of method for classifying the attacks, ensemble methods and deep learning models, more specifically recurrent networks with very satisfactory results.
APA, Harvard, Vancouver, ISO, and other styles
32

Tamri, Rajae, and Said Rakrak. "The SDN-MQTT for an interoperable smart home." E3S Web of Conferences 229 (2021): 01031. http://dx.doi.org/10.1051/e3sconf/202122901031.

Full text
Abstract:
This paper presents the design of SDN-MQTT for a smart home. It is a system combining the SDN technology that solves many technological difficulties in traditional networks, and the MQTT protocol that is arguably the most widely used for resource constrained IoT devices. These two technologies enable heterogeneous IoT devices to be interoperable and interact without any problems. Our proposed work ensures two levels of interoperability.
APA, Harvard, Vancouver, ISO, and other styles
33

Budiana, Mochamad Soebagja, Ridha Muldina Negara, Arif Indra Irawan, and Harashta Tatimma Larasati. "Advanced detection Denial of Service attack in the Internet of Things network based on MQTT protocol using fuzzy logic." Register: Jurnal Ilmiah Teknologi Sistem Informasi 7, no. 2 (April 19, 2021): 95. http://dx.doi.org/10.26594/register.v7i2.2340.

Full text
Abstract:
Message Queuing Telemetry Transport (MQTT) is one of the popular protocols used on the Internet of Things (IoT) networks because of its lightweight nature. With the increasing number of devices connected to the internet, the number of cybercrimes on IoT networks will increase. One of the most popular attacks is the Denial of Service (DoS) attack. Standard security on MQTT uses SSL/TLS, but SSL/TLS is computationally wasteful for low-powered devices. The use of fuzzy logic algorithms with the Intrusion Detection System (IDS) scheme is suitable for detecting DoS because of its simple nature. This paper uses a fuzzy logic algorithm embedded in a node to detect DoS in the MQTT protocol with feature selection nodes. This paper's contribution is that the nodes feature selection used will monitor SUBSCRIBE and SUBACK traffic and provide this information to fuzzy input nodes to detect DoS attacks. Fuzzy performance evaluation is measured against changes in the number of nodes and attack intervals. The results obtained are that the more the number of nodes and the higher the traffic intensity, the fuzzy performance will decrease, and vice versa. However, the number of nodes and traffic intensity will affect fuzzy performance.
APA, Harvard, Vancouver, ISO, and other styles
34

V., Vitor, Renata I., and Sandro C. "IoT Embedded System for Data Acquisition using MQTT Protocol." International Journal of Computer Applications 182, no. 11 (August 14, 2018): 1–4. http://dx.doi.org/10.5120/ijca2018917736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

HC, Bhanujyothi. "Security exploration of MQTT protocol in Internet of Things." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 3 (June 25, 2020): 3892–97. http://dx.doi.org/10.30534/ijatcse/2020/209932020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Bartholet, Marcel, and Christian Überall. "Multi-protocol bridge generation for M2M communication using MQTT." Journal of Physics: Conference Series 1634 (September 2020): 012115. http://dx.doi.org/10.1088/1742-6596/1634/1/012115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Lee, Jae Moon. "Development of translation telephone system by using MQTT protocol." International Journal of Computational Vision and Robotics 9, no. 6 (2019): 599. http://dx.doi.org/10.1504/ijcvr.2019.10025723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Lee, Jae Moon. "Development of translation telephone system by using MQTT protocol." International Journal of Computational Vision and Robotics 9, no. 6 (2019): 599. http://dx.doi.org/10.1504/ijcvr.2019.104042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

., Neha Agarwal. "INTERNET OF THINGS (IOT) BASED SWITCHBOX USING MQTT PROTOCOL." International Journal of Research in Engineering and Technology 05, no. 04 (April 25, 2016): 405–11. http://dx.doi.org/10.15623/ijret.2016.0504075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Light, Roger A. "Mosquitto: server and client implementation of the MQTT protocol." Journal of Open Source Software 2, no. 13 (May 26, 2017): 265. http://dx.doi.org/10.21105/joss.00265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Buccafurri, Francesco, Vincenzo De Angelis, and Roberto Nardone. "Securing MQTT by Blockchain-Based OTP Authentication." Sensors 20, no. 7 (April 3, 2020): 2002. http://dx.doi.org/10.3390/s20072002.

Full text
Abstract:
The Internet of Things is constantly capturing interest from modern applications, changing our everyday life and empowering industrial applications. Interaction and the collaboration among smart devices offer new challenges to security since they conflict with economic and energy consumption requirement constraints. On the other hand, the lack of security measures could negatively impact the concrete adoption of this paradigm. This paper focuses on the Message Queuing Telemetry Transport (MQTT) protocol, widely adopted in the Internet of Things. This protocol does not implement natively secure authentication mechanisms, which are demanded to developers. Hence, this paper proposes a novel OTP (one-time password)-authentication schema for MQTT, which uses the Ethereum blockchain to implement a second-factor out-of-band channel. The proposal enables the authentication of both local and remote devices preserving user privacy and guaranteeing trust and accountability via Ethereum smart contracts.
APA, Harvard, Vancouver, ISO, and other styles
42

Mishra, Biswajeeban, Biswaranjan Mishra, and Attila Kertesz. "Stress-Testing MQTT Brokers: A Comparative Analysis of Performance Measurements." Energies 14, no. 18 (September 14, 2021): 5817. http://dx.doi.org/10.3390/en14185817.

Full text
Abstract:
Presently, Internet of Things (IoT) protocols are at the heart of Machine-to-Machine (M2M) communication. Irrespective of the radio technologies used for deploying an IoT/M2M network, all independent data generated by IoT devices (sensors and actuators) rely heavily on the special messaging protocols used for M2M communication in IoT applications. As the demand for IoT services is growing, the need for reduced power consumption of IoT devices and services is also growing to ensure a sustainable environment for future generations. The Message-Queuing Telemetry Transport or in short MQTT is a widely used IoT protocol. It is a low-resource-consuming messaging solution based on the publish–subscribe type communication model. This paper aims to assess the performance of several MQTT broker implementations (also known as MQTT servers) using stress testing, and to analyze their relationship with system design. The evaluation of the brokers is performed by a realistic test scenario, and the analysis of the test results is done with three different metrics: CPU usage, latency, and message rate. As the main contribution of this work, we analyzed six MQTT brokers (Mosquitto, Active-MQ, Hivemq, Bevywise, VerneMQ, and EMQ X) in detail, and classified them using their main properties. Our results showed that Mosquitto outperforms the other considered solutions in most metrics; however, ActiveMQ is the best performing one in terms of scalability due to its multi-threaded implementation, while Bevywise has promising results for resource-constrained scenarios.
APA, Harvard, Vancouver, ISO, and other styles
43

Vaccari, Ivan, Maurizio Aiello, and Enrico Cambiaso. "SlowITe, a Novel Denial of Service Attack Affecting MQTT." Sensors 20, no. 10 (May 21, 2020): 2932. http://dx.doi.org/10.3390/s20102932.

Full text
Abstract:
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry Transport (MQTT) protocol used in IoT environments for communication between IoT devices. We exploit a specific weakness of MQTT which was identified during our research, allowing the client to configure the behavior of the server. In order to validate the possibility to exploit such vulnerability, we propose SlowITe, a novel low-rate denial of service attack aimed to target MQTT through low-rate techniques. We validate SlowITe against real MQTT services, considering both plain text and encrypted communications and comparing the effects of the threat when targeting different daemons. Results show that the attack is successful and it is able to exploit the identified vulnerability to lead a DoS on the victim with limited attack resources.
APA, Harvard, Vancouver, ISO, and other styles
44

Et. al., Rajae Tamri,. "The MI-SDN System to Manage MQTT Data in an Interoperable IoT Wireless Network." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 10, 2021): 1031–36. http://dx.doi.org/10.17762/turcomat.v12i5.1747.

Full text
Abstract:
The main challenge for the Internet of Things (IoT) is to ensure interoperability between heterogeneous IoT entities. To support the interaction, intercommunication, and interoperability between these devices several solutions are proposed in the literature. The SDN (Software-defined Network) is one of these solutions to resolve the problem of the heterogeneous network used in IoT. To guarantee network interoperability, the SDN uses a centralized controller, which handles the entire network. The role of end devices in IoT is only forwarding data. The MQTT (Message Queuing Telemetry Transport) protocol is another solution for granting interoperability in IoT. Which is a publish/subscribe based messaging protocol that avoids direct connection between devices by relaying data through a central server called the broker. Combination of these two solutions to manage IoT devices makes it easy to add new devices without touching or changing the existing infrastructure. The new devices only need to communicate with the broker. Moreover, the Controller SDN is responsible for handling networks. Consequently, smart devices added don’t need to be compatible with the others. In this paper, we present the design and the implementation of a new IoT architecture, which is a combination of SDN technology and MQTT protocol. That enables heterogeneous IoT devices to be interoperable and interact without any problems. Our system utilizes the lightweight protocol MQTT with a new mechanism using several slave brokers and one master. The slaves manage the group of the end devices in the wireless IoT network, and the master broker installed in the SDN controller supervises the integral network. The SDN controller uses a multicast system to send MQTTdata across the external wireless network. As a result, that reduces transmission delay between wireless IoT network compared with the using of a standard MQTT.
APA, Harvard, Vancouver, ISO, and other styles
45

Saeed, Sabeeh Ahmad, Farrukh Zeeshan Khan, Zeshan Iqbal, Roobaea Alroobaea, Muneer Ahmad, Muhammad Talha, Muhammad Ahsan Raza, and Ihsan Ali. "An IoT-Based Network for Smart Urbanization." Wireless Communications and Mobile Computing 2021 (April 2, 2021): 1–14. http://dx.doi.org/10.1155/2021/5584667.

Full text
Abstract:
Internet of Things (IoT) is considered one of the world’s ruling technologies. Billions of IoT devices connected together through IoT forming smart cities. As the concept grows, it is very challenging to design an infrastructure that is capable of handling large number of devices and process data effectively in a smart city paradigm. This paper proposed a structure for smart cities. It is implemented using a lightweight easy to implement network design and a simpler data format for information exchange that is suitable for developing countries like Pakistan. Using MQTT as network protocol, different sensor nodes were deployed for collecting data from the environment. Environmental factors like temperature, moisture, humidity, and percentage of CO2 and methane gas were recorded and transferred to sink node for information sharing over the IoT cloud using an MQTT broker that can be accessed any time using Mosquitto client. The experiment results provide the performance analysis of the proposed network at different QoS levels for the MQTT protocol for IoT-based smart cities. JSON structure is used to formulate the communication data structure for the proposed system.
APA, Harvard, Vancouver, ISO, and other styles
46

Dikii, Dmitrii I. "Detection of DoS attacks caused by CONNECT messages of MQTT protocol." Radioelectronics. Nanosystems. Information Technologies 12, no. 2 (August 11, 2020): 287–96. http://dx.doi.org/10.17725/rensit.2020.12.287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Fernández, Fátima, Mihail Zverev, Pablo Garrido, José R. Juárez, Josu Bilbao, and Ramón Agüero. "Even Lower Latency in IIoT: Evaluation of QUIC in Industrial IoT Scenarios." Sensors 21, no. 17 (August 26, 2021): 5737. http://dx.doi.org/10.3390/s21175737.

Full text
Abstract:
In this paper we analyze the performance of QUIC as a transport alternative for Internet of Things (IoT) services based on the Message Queuing Telemetry Protocol (MQTT). QUIC is a novel protocol promoted by Google, and was originally conceived to tackle the limitations of the traditional Transmission Control Protocol (TCP), specifically aiming at the reduction of the latency caused by connection establishment. QUIC use in IoT environments is not widespread, and it is therefore interesting to characterize its performance when in over such scenarios. We used an emulation-based platform, where we integrated QUIC and MQTT (using GO-based implementations) and compared their combined performance with the that exhibited by the traditional TCP/TLS approach. We used Linux containers as end devices, and the ns-3 simulator to emulate different network technologies, such as WiFi, cellular, and satellite, and varying conditions. The results evince that QUIC is indeed an appropriate protocol to guarantee robust, secure, and low latency communications over IoT scenarios.
APA, Harvard, Vancouver, ISO, and other styles
48

Delgado, Alexi. "Design of an IOT Domotic System using the MQTT protocol." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 4 (August 25, 2020): 4811–18. http://dx.doi.org/10.30534/ijatcse/2020/90942020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Dinculeană, Dan, and Xiaochun Cheng. "Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices." Applied Sciences 9, no. 5 (February 27, 2019): 848. http://dx.doi.org/10.3390/app9050848.

Full text
Abstract:
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to protect against such attacks. This paper will review some existing solutions used to secure a communication channel, such as Transport Layer Security or symmetric encryption, as well as provide a novel approach to achieving confidentiality and integrity of messages. The method, called Value-to-Keyed-Hash Message Authentication Code (Value-to-HMAC) mapping, uses signatures to send messages, instead of encryption, by implementing a Keyed-Hash Message Authentication Code generation algorithm. Although robust solutions exist that can be used to secure the communication between devices, this paper considers that not every Internet of Things (IoT) device or network design is able to afford the overhead and drop in performance, or even support such protocols. Therefore, the Value-to-HMAC method was designed to maximize performance while ensuring the messages are only readable by the intended node. The experimental procedure demonstrates how the method will achieve better performance than a symmetric-key encryption algorithm, while ensuring the confidentiality and integrity of information through the use of one mechanism.
APA, Harvard, Vancouver, ISO, and other styles
50

Yeh, Chia-Shin, Shang-Liang Chen, and I.-Ching Li. "Implementation of MQTT protocol based network architecture for smart factory." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 235, no. 13 (May 8, 2021): 2132–42. http://dx.doi.org/10.1177/09544054211014488.

Full text
Abstract:
The core concept of smart manufacturing is based on digitization to construct intelligent production and management in the manufacturing process. By digitizing the production process and connecting all levels from product design to service, the purpose of improving manufacturing efficiency, reducing production cost, enhancing product quality, and optimizing user experience can be achieved. To digitize the manufacturing process, IoT technology will have to be introduced into the manufacturing process to collect and analyze process information. However, one of the most important problems in building the industrial IoT (IIoT) environment is that different industrial network protocols are used for different equipment in factories. Therefore, the information in the manufacturing process may not be easily exchanged and obtained. To solve the above problem, a smart factory network architecture based on MQTT (MQ Telemetry Transport), IoT communication protocol, is proposed in this study, to construct a heterogeneous interface communication bridge between the machine tool, embedded device Raspberry Pi, and website. Finally, the system architecture is implemented and imported into the factory, and a smart manufacturing information management system is developed. The edge computing module is set up beside a three-axis machine tool, and a human-machine interface is built for the user controlling and monitoring. Users can also monitor the system through the dynamically updating website at any time and any place. The function of real-time gesture recognition based on image technology is developed and built on the edge computing module. The gesture recognition results can be transmitted to the machine controller through MQTT, and the machine will execute the corresponding action according to different gestures to achieve human-robot collaboration. The MQTT transmission architecture developed here is validated by the given edge computing application. It can serve as the basis for the construction of the IIoT environment, assist the traditional manufacturing industry to prepare for digitization, and accelerate the practice of smart manufacturing.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography