Abstract

The article discusses the MQTT protocol for the Internet of Things and touch wireless networks, its features, applications, and specific procedures. The information elements and principles of the message owner are analyzed. This article covers topics such as secure storage of the Internet of Things, the transfer of that data through the secure interface of mobile devices and web applications. It also looks at all the key tools provided by MQTT for information security. The proposed identification of users in this article is to identify them from the Cloudant database. This application works on the Node.js server in IBM Bluemix and provides an API or RESTful that requires mobile client authentication. The mobile client access service is designed to call these two APIs in any authentication application. It is suggested to use separate authentication approaches: for the web application - on the Cloud Directory and for the mobile application - MobileFirst Client Access. However, both the web and mobile applications use the same level of application security to allow the user to access device data. To improve the security of messages, it is suggested to use a transport layer security protocol that uses different cryptographic methods. We are offered homomorphic encryption of these protocols. The transport layer security protocol increases the performance of the protocol and reduces the computational cost, but it does not apply when initially connecting to the server or when a previous session has already expired. The article presents an algorithm for the detection of weak symmetry breaking for the analysis of the chance of a recovered e-mail. A method of homomorphic encryption and authentication of users and their emails in wireless sensor networks of the Internet of Things is proposed.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call