Abstract

This article introduces the security risks of the commonly used MQTT protocol in the Internet of Things and the security risks caused by smart door lock vulnerabilities, aiming to solve the problem of public MQTT agent leaking smart lock data, causing attackers to use the sensitive data to physically locate and remotely control the connection to the smart door lock supplier Any lock issues in the cloud infrastructure. This paper presents a wireless sensor network authentication encryption method based on SM9 algorithm. By implementing and deploying sensor network authentication encryption in practical applications, it avoids the leakage of sensitive information from public data exposed on the Internet.

Highlights

  • In the current era of the Internet of everything, 5G, big data, artificial intelligence and other new technologies have brought innovative vitality to the Internet of things

  • The purpose of this paper is to study the hidden risks of intelligent door locks caused by vulnerability risk in MQTT protocols commonly used in the Internet of things, and encrypt the MQTT public data transmission data exposed on the Internet through IBC authentication encryption method, so that attackers cannot view sensitive information in data even if they obtain MQTT public data

  • In order to realize the identity authentication and data encryption transmission of the sensor in the intelligent door lock, the IBC key infrastructure is deployed in the application layer, each terminal entity applies for the IBC private key, and the authentication encryption is realized when the sensor is running, so as to ensure the security of the wireless sensor network

Read more

Summary

Introduction

In the current era of the Internet of everything, 5G, big data, artificial intelligence and other new technologies have brought innovative vitality to the Internet of things. A large number of Internet of things devices connected to the cloud without network security tests are on the market,We must be aware of this cumulative risk and strengthen the regulation and supervision of product network security

Disclosure of personal information by public MQTT data
Improper access control settings lead to user name and password disclosure
Components of IBC key Infrastructure
System initialization
Identity authentication and data encryption
Key update
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.