z-logo
open-access-imgOpen Access
Implementation of Simon’s Algorithm in the Encryption Process of Publish-Subscribe Data Sending in the MQTT Protocol using the Raspberry
Author(s) -
Heru Nurwarsito,
S Yapputra
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1962/1/012064
Subject(s) - mqtt , computer science , encryption , computer network , plaintext , node (physics) , computer security , internet of things , engineering , structural engineering
In the development of IoT there is a higher risk of security because the device can be used as a Botnet and can harm many parties. The use of the MQTT communication protocol on the Internet of Things devices is massive. Otherwise, the MQTT protocol does not have a security side that can secure data exchange in this protocol. In information security, it is explained that data must have a security side in terms of confidentiality, integrity, and availability. One solution to address the problems that have been described is the addition of an encryption algorithm to the MQTT communication protocol so the data that moved remains safe. The SIMON algorithm is an algorithm released by the National Security Agency (NSA) in 2013 in the selection of the best lightweight cipher at that time. The selection of this secalgorithm is based on the efficiency, speed, and use of small power in carrying out the process. The encryption method will be implemented at the publisher node where the node will encrypt data first before sending it to the broker node. The decryption method will be implemented on the subscriber node where the node will perform subscribe function and decrypt function to get the plaintext. The SIMON algorithm that is used is SIMON 128/128 because it has been proven that this SIMON type has the fastest time in the encryption and decryption process. Functional testing shows that all nodes in the system can work properly according to their respective functions. On the attack test, two active attack methods are used, namely Ciphertext Only Attack and Known Plaintext Attack. Both attacks were unable to get the plaintext after several attempts. So it can be concluded that the SIMON algorithm has succeeded in securing the system using the MQTT communication protocol.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here