Abstract
The article discusses the MQTT protocol for the Internet of Things and touch wireless networks, its features, applications, and specific procedures. The information elements and principles of the message owner are analyzed. This article covers topics such as secure storage of the Internet of Things, the transfer of that data through the secure interface of mobile devices and web applications. It also looks at all the key tools provided by MQTT for information security. The proposed identification of users in this article is to identify them from the Cloudant database. This application works on the Node.js server in IBM Bluemix and provides an API or RESTful that requires mobile client authentication. The mobile client access service is designed to call these two APIs in any authentication application. It is suggested to use separate authentication approaches: for the web application - on the Cloud Directory and for the mobile application - MobileFirst Client Access. However, both the web and mobile applications use the same level of application security to allow the user to access device data. To improve the security of messages, it is suggested to use a transport layer security protocol that uses different cryptographic methods. We are offered homomorphic encryption of these protocols. The transport layer security protocol increases the performance of the protocol and reduces the computational cost, but it does not apply when initially connecting to the server or when a previous session has already expired. The article presents an algorithm for the detection of weak symmetry breaking for the analysis of the chance of a recovered e-mail. A method of homomorphic encryption and authentication of users and their emails in wireless sensor networks of the Internet of Things is proposed.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.