Securing the IoT Application Layer from an MQTT Protocol Perspective: Challenges and Research Prospects

S Lakshminarayana, A Praseed… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the most promising new millennial technologies, having
numerous applications in our surrounding environment. The fundamental goal of an IoT …

Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model

S Amanlou, MK Hasan, KAA Bakar - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) has converged with Cloud computing to provide
comprehensive services to users in different places. However, with the exponential growth of …

A secure IoT-based irrigation system for precision agriculture using the expeditious cipher

C Fathy, HM Ali - Sensors, 2023 - mdpi.com
Due to the recent advances in the domain of smart agriculture as a result of integrating
traditional agriculture and the latest information technologies including the Internet of Things …

Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker

JJ Puthiyidam, S Joseph, B Bhushan - The Journal of Supercomputing, 2024 - Springer
Advancements in computing and communication technology have increased the number of
devices connected to the Internet, leading to the emergence of the Internet of Things (IoT) …

Publish/Subscribe Method for real-time data processing in massive IoT leveraging blockchain for secured storage

M Ataei, A Eghmazi, A Shakerian, R Landry Jr… - Sensors, 2023 - mdpi.com
In the Internet of Things (IoT) era, the surge in Machine-Type Devices (MTDs) has
introduced Massive IoT (MIoT), opening new horizons in the world of connected devices …

[PDF][PDF] Developed security and privacy algorithms for cyber physical system

DD Khudhur, MS Croock - International Journal of Electrical and …, 2021 - academia.edu
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates
with wireless sensor network (WSN). This system is widely used in many applications such …

Evaluation of quality of service parameters for MQTT communication in IoT application by using deep neural network

S Pawar, DB Jadhav, M Lokhande, P Raskar… - International Journal of …, 2024 - Springer
The three main pillars of the Internet of Things (IoT) are Computation, Communication and
things that are connected in a network of IoT. In IoT for communication, various protocols like …

Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication

JJ Puthiyidam, S Joseph, B Bhushan - Computer Communications, 2024 - Elsevier
Abstract Internet of Things (IoT) networks are vulnerable to various security threats,
especially in client authentication. The current authentication methods require significant …

Enhancing security mechanism of MQTT protocol using payload encryption

PS Akshatha, SM Dilip Kumar - … Conference on Frontiers in Computing and …, 2022 - Springer
MQTT has become one of the most widely used IoT communication protocols due to its
efficiency and simplicity. However, it does not support the desired security features; instead …

Secure and efficient device‐to‐device communication in IoT: The DMBSOA‐enhanced MQTT protocol

BS Loganathan, SP Jaganathan - Transactions on Emerging …, 2024 - Wiley Online Library
Abstract The Internet of Things (IoT) plays a crucial role in enhancing technology by
facilitating data transfer, storage, control, and management across networks. Secure …