Abstract
The Message Queue Telemetry Transport (MQTT) protocol for publish/subscribe middleware is proposed in this paper as a way to secure messages. In which the end-to-end method employs the Advanced Encryption System (AES) and Secure Hash Algorithm (SHA), and analyses the overhead associated with the usage of digital signatures Because there is no encryption method applied to the payload, MQTT has this drawback. Which enables one to discover the payload content that results in no data privacy. MQTT also has issues with data integrity. This digital signature's function is to confirm the payload's authenticity, that it doesn't alter during transmission, and that the payload is secret.The proposed solution can be evaluated and tested after which the programme can secure the MQTT payload. The addition of a security mechanism to MQTT, such as the encryption and decryption processes and verification outcomes, results in overhead in many areas. The overhead employed in this study is used to calculate the payload size, message sending time, process of digital signature security mechanism, memory consumption, and CPU utilisation. In an overhead analysis, overhead is performed by looking at many AES key types and numerous SHA key types. Upon closer inspection, it is seen that the digital signature system has resulted in a size increase for a number of the previously listed elements.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have