The Implementation of Encryption Algorithms in MQTT Protocol for IoT Constrained devices

Yasir Iqbal, Muhammad Faisal Amjad, Fawad Khan, Haider Abbas

Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

8 Citations (Scopus)

Abstract

The Internet of Things (IoT) is a promising and emerging technology in which many devices communicate, process, and exchange information with other devices, servers, or applications. The communication link could be between people to devices, or machine to machine, resulting in an extensive network of connected devices. Due to the increase in the range of applications, the attack surface has also increased. Usually, data transfer through an IoT network is critical, so confidentiality is a significant concern. In an IoT network, confidentiality can be achieved using Secure Shell (SSH) and Transport Layer Security (TLS) protocols. However, they have overheads that resource-constrained sensor devices cannot handle. Therefore, lightweight security mechanisms must be incorporated into various protocol stack layers. In this work, we have implemented AES128, Elliptic Curve Cryptography (ECC), ChaCha20, and Corrected Block Tiny Encryption Algorithm (XXTEA) in the MQTT protocol on ESP8266 and ATmega328p IoT devices. We present the performance evaluation of these encryption algorithms on a hardware testbed and a Contiki OS-based cooja simulator using the Tmote Sky module. The hardware experiments show that the ESP8266 chip with XXTEA encryption algorithm embedded with MQTT protocol is more efficient. At the same time, the simulation results show a rise in power consumption if we choose a robust encryption algorithm and increase the number of nodes.

Original languageEnglish
Title of host publication 2022 14th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2022
PublisherIEEE
Pages804-810
Number of pages7
ISBN (Electronic)9781665487719
ISBN (Print)9781665487726
DOIs
Publication statusE-pub ahead of print - 13 Jan 2023
Externally publishedYes

Keywords

  • Lightweight cryptography
  • MQTT
  • ESP8266
  • Contiki
  • loT

Fingerprint

Dive into the research topics of 'The Implementation of Encryption Algorithms in MQTT Protocol for IoT Constrained devices'. Together they form a unique fingerprint.

Cite this