全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Performance Analysis of the Hybrid MQTT/UMA and Restful IoT Security Model

DOI: 10.4236/ait.2021.111003, PP. 26-41

Keywords: IoT, MQTT (Message Queuing Telemetry Transport), UMA (User-Managed Access), Network Security

Full-Text   Cite this paper   Add to My Lib

Abstract:

Internet of Things (IoT) environments are being deployed all over the globe. They have the potential to form solutions to applications, from small scale applications to national and international ones. Therefore, scalability, performance, and security form a triangle of requirements that must be carefully set. Furthermore, IoT applications require higher security standards. A previously proposed IoT application framework with a security embedded structure using the integration between message queue telemetry transport (MQTT) and user-managed access (UMA) is analyzed in this work. The performance analysis of the model is presented. Comparing the model with existing models and different design structures shows that the model presented in this work is promising for a functioning IoT design model with security. The results and analysis showed that the built-in security model had performed better than models with other frameworks, especially with fog implementation.

References

[1]  Benjamin, C. (2018) Key Trends from the IoT Developer Survey 2018.
https://blog.benjamin-cabe.com/2018/04/17/key-trends-iot-developer-survey-2018
[2]  Aloufi, K.S. and Alhazmi, O.H. (2020) A Hybrid MQTT/UMA Internet of Things Model. Communications and Network, 12, 155-173.
https://doi.org/10.4236/cn.2020.124008
[3]  Aloufi, K.S. and Alhazmi, O.H. (2020) Secure IoT Resources with Access Control Over Restful Web Services. Jordanian Journal of Electrical Engineering, 6, 63-77.
https://doi.org/10.5455/jjee.204-1581015531
[4]  Zhao, F. (2010) Sensors Meet the Cloud: Planetary-Scale Distributed Sensing and Decision Making. 2010 9th IEEE International Conference on Cognitive Informatics, Beijing, 7-9 July 2004, 998-998.
https://doi.org/10.1109/COGINF.2010.5599715
[5]  Biswas, A.R. and Giaffreda, R. (2014) IoT and Cloud Convergence: Opportunities and Challenges. 2014 IEEE World Forum on Internet of Things, Seoul, 6-8 March 2014, 375-376.
https://doi.org/10.1109/WF-IoT.2014.6803194
[6]  Zeydan, E., Bastug, E., Bennis M., Kader, M.A., Karatepe, I.A. and Debba, M. (2016) Big Data Caching for Networking: Moving from Cloud to Edge. IEEE Communications Magazine, 54, 36-42.
https://doi.org/10.1109/MCOM.2016.7565185
[7]  Alam, S., Chowdhury, M.M.R. and Noll, J. (2010) SenaaS: An Event-Driven Sensor Virtualization Approach for Internet of Things Cloud. IEEE International Conference on Networked Embedded Systems for Enterprise Applications, Suzhou, 25-26 November 2010, 1-6.
https://doi.org/10.1109/NESEA.2010.5678060
[8]  Alhazmi, O.H. and Aloufi, K.S. (2019) Fog-Based Internet of Things: A Security Scheme. In 2019 2nd International Conference on Computer Applications Information Security, Riyadh, 1-3 May 2019, 1-6.
https://doi.org/10.1109/CAIS.2019.8769506
[9]  Sharma, S.K. and Wang, X. (2017) Live Data Analytics with Collaborative Edge and Cloud Processing in Wireless IoT Networks. Access IEEE, 5, 4621-4635.
https://doi.org/10.1109/ACCESS.2017.2682640
[10]  International Organization for Standardization (2016) ISO/IEC 20922: 2016 Information Technology—Message Queuing Telemetry Transport (MQTT) v3.1.1.
https://www.iso.org/standard/69466.html
[11]  Ugalde, D.S. (2018) Security analysis for MQTT in the Internet of Things. Master Thesis, KTH Royal Institute of Technology (School of Electrical Engineering and Computer Science), Sweden.
https://www.diva-portal.org/smash/get/diva2:1295431/FULLTEXT01.pdf
[12]  Mishra, B. and Kertesz, A. (2020) The Use of MQTT in M2M and IoT Systems: A Survey. IEEE Access, 8, 201071-201086.
https://doi.org/10.1109/ACCESS.2020.3035849
[13]  Machulak, M. and Richer, J. (2015) User Managed Access, 2015.
https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html
[14]  Internet Engineering Task Force (2016) The OAuth 2.0 Authorization Framework. RFC 6749.
https://tools.ietf.org/html/rfc6749
[15]  Dewni Weeraman (2017) User Managed Access—UMA 2.0.
https://medium.com/@dewni.matheesha/user-managed-access-uma-2-0-bcecb1d535b3
[16]  Gerber, A. and Romeo, J. (2017) Connecting All the Things in The Internet of Things: A Guide to Selecting Network Technologies to Solve Your Iot Networking Challenges.
https://developer.ibm.com/technologies/iot/articles/iot-lp101-connectivity-network-protocols/
[17]  Aloufi, K.S. (2019) 6LoWPAN Stack Model Configuration for IoT Streaming Data Transmission over CoAP. International Journal of Communication Networks and Information Security (IJCNIS), 11, 304-311.
https://www.ijcnis.org/index.php/ijcnis/article/view/4034/358
[18]  Yokotani, T. and Sasaki, Y. (2016) Transfer Protocols of Tiny Data Blocks in IoT And Their Performance Evaluation. 2016 IEEE 3rd World Forum on Internet of Things, Reston, 12-14 December 2016, 54-57.
https://doi.org/10.1109/WF-IoT.2016.7845442
[19]  Yokotani, T. and Sasaki, Y. (2016) Comparison with
HTTP and MQTT on Required Network Resources for IoT. 2016 International Conference on Control, Electronics, Renewable Energy and Communications, Bandung, 13-15 September 2016, 1-6.
https://doi.org/10.1109/ICCEREC.2016.7814989
[20]  Hardjono, T., Maler, E., Machulak, M. and Catalano, D., (2013) User-Managed Access (UMA) Profile of OAuth 2.0. Internet-Draft Draft-Hardjono-Oauth-Um- acore-13.
https://tools.ietf.org/html/draft-hardjono-oauth-umacore-13
[21]  Jones, M. and Hardt, D. (2012) The OAuth 2.0 Authorization Framework: Bearer Token Usage. RFC 6750.
https://tools.ietf.org/html/rfc6750
https://doi.org/10.17487/rfc6750
[22]  Siriwardena, P. (2014) OAuth 2.0. In: Siriwardena, P., Eds., Advanced API Security, Apress, Berkeley, 91-132.
https://doi.org/10.1007/978-1-4302-6817-8_7
[23]  Maler, E., Machulak, M., Richer, J. and Hardjono, T. (2019) User-Managed Access (UMA) 2.0 Grant for OAuth 2.0 Authorization: Draft-Maler-Oauth-Umagrant-00.
https://tools.ietf.org/html/draft-maler-oauth-umagrant-00
[24]  Al-khafajiy, M., Baker, T., Waraich, A., Al-Jumeily, D. and Hussain, A. (2018) IoT-Fog Optimal Workload via Fog Offloading. 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, Zurich, 17-20 December 2018, 359-364.
https://doi.org/10.1109/UCC-Companion.2018.00081
[25]  Jaloudi, S. (2019) MQTT for IoT-based Applications in Smart Cities. Palestinian Journal of Technology and Applied Sciences, No. 2, 1-13.
[26]  Osipov, M. (2008) Home Automation with ZigBee. 2008 International Conference on Next Generation Wired/Wireless Networking, 3-5 September 2008, St. Petersburg, 263-270.
https://doi.org/10.1007/978-3-540-85500-2_26

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413