Analytical Performance Comparison of IoT Communication Protocols MQTT and CoAP from Security Perspective
In this present scenario, world Internet is maximum based on H2H communication only. But in the principle of IoT, it reduces direct Human-Human and Human-Machine communication. IoT provides support to work 24 X 7 over the year without affecting the accuracy of result. IoT environment is fully based...
Saved in:
| Published in | 2024 3rd Odisha International Conference on Electrical Power Engineering, Communication and Computing Technology (ODICON) pp. 1 - 5 |
|---|---|
| Main Authors | , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
08.11.2024
|
| Subjects | |
| Online Access | Get full text |
| DOI | 10.1109/ODICON62106.2024.10797474 |
Cover
| Abstract | In this present scenario, world Internet is maximum based on H2H communication only. But in the principle of IoT, it reduces direct Human-Human and Human-Machine communication. IoT provides support to work 24 X 7 over the year without affecting the accuracy of result. IoT environment is fully based on sensors and actuators. Sensor is responsible for data collection as well as for the route of transmission and actuator is responsible for security of data, communication of data and for accuracy of data. From application point of view, now days all critical sectors like: health care sectors, defense sectors, Aviation sectors, Space sectors are strictly working on the application of IoT. Most of the work is there performed by their automated systems. If any error occurs at the time of data transmission, then that may cause a serious loss for the society. So, security mechanism is most vital part for all IoT systems. Though IoT is based on machine-to-machine communications without human intervention, we need to emphasize both on device structures and their protocols. Generally, IoT devices are very small in size and its embedded applications are less complexity. We need maximum attention if any modification is carried out in its structure. There are various types of IoT protocols available, out of them two most common protocols are CoAP and MQTT. Different security algorithms are used by these protocols for encryption and decryption of these data. Two most security algorithms are AES and ECC algorithm. The algorithm which takes low time for key generation is most suitable for IoT protocols. In this research, we are going to find out different Lou points of these two protocols. Then we will analyze two most common security algorithms i.e. AES and ECC key generation time using python codes and we will compare these times to its hybrid model key generation time. At last we have proposed a new security algorithm i.e. AES-ECC hybrid algorithm for IoT communication protocols. |
|---|---|
| AbstractList | In this present scenario, world Internet is maximum based on H2H communication only. But in the principle of IoT, it reduces direct Human-Human and Human-Machine communication. IoT provides support to work 24 X 7 over the year without affecting the accuracy of result. IoT environment is fully based on sensors and actuators. Sensor is responsible for data collection as well as for the route of transmission and actuator is responsible for security of data, communication of data and for accuracy of data. From application point of view, now days all critical sectors like: health care sectors, defense sectors, Aviation sectors, Space sectors are strictly working on the application of IoT. Most of the work is there performed by their automated systems. If any error occurs at the time of data transmission, then that may cause a serious loss for the society. So, security mechanism is most vital part for all IoT systems. Though IoT is based on machine-to-machine communications without human intervention, we need to emphasize both on device structures and their protocols. Generally, IoT devices are very small in size and its embedded applications are less complexity. We need maximum attention if any modification is carried out in its structure. There are various types of IoT protocols available, out of them two most common protocols are CoAP and MQTT. Different security algorithms are used by these protocols for encryption and decryption of these data. Two most security algorithms are AES and ECC algorithm. The algorithm which takes low time for key generation is most suitable for IoT protocols. In this research, we are going to find out different Lou points of these two protocols. Then we will analyze two most common security algorithms i.e. AES and ECC key generation time using python codes and we will compare these times to its hybrid model key generation time. At last we have proposed a new security algorithm i.e. AES-ECC hybrid algorithm for IoT communication protocols. |
| Author | Swain, Satyaprakash Pattanayak, Binod Kumar Mohanty, Mihir Narayan Senapati, Chinmayee |
| Author_xml | – sequence: 1 givenname: Satyaprakash surname: Swain fullname: Swain, Satyaprakash email: satyaimit@gmail.com organization: Institute of Technical Education and Research(ITER), Siksha 'O' Anusandhan (Deemed to be University),Department of Computer Science and Engineering,Bhubaneswar,India – sequence: 2 givenname: Binod Kumar surname: Pattanayak fullname: Pattanayak, Binod Kumar email: binodpattanayak@soa.ac.in organization: Institute of Technical Education and Research(ITER), Siksha 'O' Anusandhan (Deemed to be University),Department of Computer Science and Engineering,Bhubaneswar,India – sequence: 3 givenname: Mihir Narayan surname: Mohanty fullname: Mohanty, Mihir Narayan email: mihirmohanty@soa.ac.in organization: Institute of Technical Education and Research(ITER), Siksha 'O' Anusandhan (Deemed to be University),Department of Electronics and Communication Engineering,Bhubaneswar,India – sequence: 4 givenname: Chinmayee surname: Senapati fullname: Senapati, Chinmayee email: chinmayees3752@gmail.com organization: Institute of Technical Education and Research(ITER), Siksha 'O' Anusandhan (Deemed to be University),Department of Civil Engineering,Bhubaneswar,India |
| BookMark | eNo1j11LwzAYRiPohc79Ay_iD1hNmqRpLkv9GkxXsffjbfoGA20y0k7Yv3dDvXrgcDjw3JDLEAMScs9ZxjkzD9vHdb19L3LOiixnucw400ZLLS_I0mhTCsWEkkKba_JVBRiOs7cw0AaTi2mEYJHWcdxD8lMMNDq6ju2ZjIdwEmd_gk2Kc7RxmOjbR9tSCP1JqBrqUhzpJ9pD8vPxXJz2aGf_jbfkysEw4fJvF6R9fmrr19Vm-7Kuq83KGz6voJPQa6WM6voOFeus6zhYyazMS1eyslDIu7KXwECDcEqBBRTautIUkgmxIHe_WY-Iu33yI6Tj7v-_-AF1rlfY |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ODICON62106.2024.10797474 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798350354379 |
| EndPage | 5 |
| ExternalDocumentID | 10797474 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i91t-ab4ad75595bdbe50bcfb1ac40c428f80865e1b8d4a0a7a3f55acae37cf8964033 |
| IEDL.DBID | RIE |
| IngestDate | Wed Jan 01 06:01:58 EST 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i91t-ab4ad75595bdbe50bcfb1ac40c428f80865e1b8d4a0a7a3f55acae37cf8964033 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_10797474 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-Nov.-8 |
| PublicationDateYYYYMMDD | 2024-11-08 |
| PublicationDate_xml | – month: 11 year: 2024 text: 2024-Nov.-8 day: 08 |
| PublicationDecade | 2020 |
| PublicationTitle | 2024 3rd Odisha International Conference on Electrical Power Engineering, Communication and Computing Technology (ODICON) |
| PublicationTitleAbbrev | ODICON |
| PublicationYear | 2024 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.891747 |
| Snippet | In this present scenario, world Internet is maximum based on H2H communication only. But in the principle of IoT, it reduces direct Human-Human and... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Accuracy Actuators AES CoAP ECC Internet of Things IoT Machine-to-machine communications Medical services MQTT Power engineering Propagation losses Protocols Security Sensors TCP UDP |
| Title | Analytical Performance Comparison of IoT Communication Protocols MQTT and CoAP from Security Perspective |
| URI | https://ieeexplore.ieee.org/document/10797474 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5sD-JJxYpvInjddR95bI9SLa3Qh7hCbyVPFGFXdPfirzdJd1sqCN5CCJOQBzPfZL4ZgBuWUCETLQKdcGUBCsNBZhIVEMqMFCqW1LsuJlM6esGPC7JoyOqeC6O19sFnOnRN_5evSlk7V5l94cyZv7gDHZbRFVlrF66bvJm3s_vxYDalFsS42IMEh-34rcopXnEM92HaTrmKF3kP60qE8vtXNsZ_r-kAehuOHpqvtc8h7OjiCF59jhHvnkbzDSUADdbVBlFp0LjM0RYxxAmqSnslvtDkKc8RL5QdcDdHjnyCnpsSd05iS8zsQT58yAejoKmlELz14yrgAnPFLHogQglNIiGNiLnEkbTww2QW1xAdi0xhHnHGU0MIl1ynTJqsT3GUpsfQLcpCnwDifQsqBWOpNRScOZVJxu3DtwKMJLGMT6Hndmn5scqWsWw36OyP_nPYc4fl-X3ZBXSrz1pfWkVfiSt_wD8is6si |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwED90gvqk4sRvI_ja2o-k6R5lKptu3cQKexv5RBFa0e7Fv94kazcmCL6FklzLpeHud7nfHcAVjRIuIsU9FTFpAArFXqoj6ZGEasFlKBIXuhhmSe8FP0zIpCarOy6MUsolnynfDt1dvizFzIbKzAmn1v3F67BBMMZkTtfahMu6cub16LbfHWWJgTE2-yDCfrNipXeKMx33O5A1L51njLz7s4r74vtXPcZ_f9UutJcsPTRe2J89WFPFPry6KiMuQI3GS1IA6i76DaJSo36ZoxVqiBVUlean-ELDpzxHrJBmws0YWfoJeq6b3FmJDTWzDfn9Xd7teXU3Be-tE1Ye45hJavAD4ZIrEnChecgEDoQBIDo1yIaokKcSs4BRFmtCmGAqpkKnnQQHcXwAraIs1CEg1jGwklMaG1fBOlSpoMwcfSNACxKK8AjaVkvTj3m9jGmjoOM_nl_AVi8fDqaDfvZ4Att24xzbLz2FVvU5U2fG7Ff83G32D0WCrm8 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+3rd+Odisha+International+Conference+on+Electrical+Power+Engineering%2C+Communication+and+Computing+Technology+%28ODICON%29&rft.atitle=Analytical+Performance+Comparison+of+IoT+Communication+Protocols+MQTT+and+CoAP+from+Security+Perspective&rft.au=Swain%2C+Satyaprakash&rft.au=Pattanayak%2C+Binod+Kumar&rft.au=Mohanty%2C+Mihir+Narayan&rft.au=Senapati%2C+Chinmayee&rft.date=2024-11-08&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FODICON62106.2024.10797474&rft.externalDocID=10797474 |