z-logo
open-access-imgOpen Access
Authentication algorithm for internet of things networks based on MQTT protocol
Author(s) -
Dmitrii I. Dikii
Publication year - 2020
Publication title -
serbian journal of electrical engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.133
H-Index - 5
eISSN - 2217-7183
pISSN - 1451-4869
DOI - 10.2298/sjee2003389d
Subject(s) - computer science , computer network , authentication (law) , password , authentication protocol , mqtt , the internet , key (lock) , cryptography , computer security , algorithm , internet of things , world wide web
The authentication algorithm for machine-to-machine communication devices via the MQTT Protocol is considered, which allows verifying the device legality without sending the password. The algorithm protects the Internet of things network from unauthorized access, ensures confidentiality by generating a common session key, and provides protection against attacks of the "man in the middle" and others. The obtained experiment results showed noticeable performance improvement compared to the TLS Protocol. The cryptographic strength of the proposed algorithm is based on the discrete logarithm problem. The main advantage of the algorithm is the ability to authenticate in one requestresponse cycle.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here