Analytical Performance Comparison of IoT Communication Protocols MQTT and CoAP from Security Perspective

In this present scenario, world Internet is maximum based on H2H communication only. But in the principle of IoT, it reduces direct Human-Human and Human-Machine communication. IoT provides support to work 24 X 7 over the year without affecting the accuracy of result. IoT environment is fully based...

Full description

Saved in:
Bibliographic Details
Published in2024 3rd Odisha International Conference on Electrical Power Engineering, Communication and Computing Technology (ODICON) pp. 1 - 5
Main Authors Swain, Satyaprakash, Pattanayak, Binod Kumar, Mohanty, Mihir Narayan, Senapati, Chinmayee
Format Conference Proceeding
LanguageEnglish
Published IEEE 08.11.2024
Subjects
Online AccessGet full text
DOI10.1109/ODICON62106.2024.10797474

Cover

Abstract In this present scenario, world Internet is maximum based on H2H communication only. But in the principle of IoT, it reduces direct Human-Human and Human-Machine communication. IoT provides support to work 24 X 7 over the year without affecting the accuracy of result. IoT environment is fully based on sensors and actuators. Sensor is responsible for data collection as well as for the route of transmission and actuator is responsible for security of data, communication of data and for accuracy of data. From application point of view, now days all critical sectors like: health care sectors, defense sectors, Aviation sectors, Space sectors are strictly working on the application of IoT. Most of the work is there performed by their automated systems. If any error occurs at the time of data transmission, then that may cause a serious loss for the society. So, security mechanism is most vital part for all IoT systems. Though IoT is based on machine-to-machine communications without human intervention, we need to emphasize both on device structures and their protocols. Generally, IoT devices are very small in size and its embedded applications are less complexity. We need maximum attention if any modification is carried out in its structure. There are various types of IoT protocols available, out of them two most common protocols are CoAP and MQTT. Different security algorithms are used by these protocols for encryption and decryption of these data. Two most security algorithms are AES and ECC algorithm. The algorithm which takes low time for key generation is most suitable for IoT protocols. In this research, we are going to find out different Lou points of these two protocols. Then we will analyze two most common security algorithms i.e. AES and ECC key generation time using python codes and we will compare these times to its hybrid model key generation time. At last we have proposed a new security algorithm i.e. AES-ECC hybrid algorithm for IoT communication protocols.
AbstractList In this present scenario, world Internet is maximum based on H2H communication only. But in the principle of IoT, it reduces direct Human-Human and Human-Machine communication. IoT provides support to work 24 X 7 over the year without affecting the accuracy of result. IoT environment is fully based on sensors and actuators. Sensor is responsible for data collection as well as for the route of transmission and actuator is responsible for security of data, communication of data and for accuracy of data. From application point of view, now days all critical sectors like: health care sectors, defense sectors, Aviation sectors, Space sectors are strictly working on the application of IoT. Most of the work is there performed by their automated systems. If any error occurs at the time of data transmission, then that may cause a serious loss for the society. So, security mechanism is most vital part for all IoT systems. Though IoT is based on machine-to-machine communications without human intervention, we need to emphasize both on device structures and their protocols. Generally, IoT devices are very small in size and its embedded applications are less complexity. We need maximum attention if any modification is carried out in its structure. There are various types of IoT protocols available, out of them two most common protocols are CoAP and MQTT. Different security algorithms are used by these protocols for encryption and decryption of these data. Two most security algorithms are AES and ECC algorithm. The algorithm which takes low time for key generation is most suitable for IoT protocols. In this research, we are going to find out different Lou points of these two protocols. Then we will analyze two most common security algorithms i.e. AES and ECC key generation time using python codes and we will compare these times to its hybrid model key generation time. At last we have proposed a new security algorithm i.e. AES-ECC hybrid algorithm for IoT communication protocols.
Author Swain, Satyaprakash
Pattanayak, Binod Kumar
Mohanty, Mihir Narayan
Senapati, Chinmayee
Author_xml – sequence: 1
  givenname: Satyaprakash
  surname: Swain
  fullname: Swain, Satyaprakash
  email: satyaimit@gmail.com
  organization: Institute of Technical Education and Research(ITER), Siksha 'O' Anusandhan (Deemed to be University),Department of Computer Science and Engineering,Bhubaneswar,India
– sequence: 2
  givenname: Binod Kumar
  surname: Pattanayak
  fullname: Pattanayak, Binod Kumar
  email: binodpattanayak@soa.ac.in
  organization: Institute of Technical Education and Research(ITER), Siksha 'O' Anusandhan (Deemed to be University),Department of Computer Science and Engineering,Bhubaneswar,India
– sequence: 3
  givenname: Mihir Narayan
  surname: Mohanty
  fullname: Mohanty, Mihir Narayan
  email: mihirmohanty@soa.ac.in
  organization: Institute of Technical Education and Research(ITER), Siksha 'O' Anusandhan (Deemed to be University),Department of Electronics and Communication Engineering,Bhubaneswar,India
– sequence: 4
  givenname: Chinmayee
  surname: Senapati
  fullname: Senapati, Chinmayee
  email: chinmayees3752@gmail.com
  organization: Institute of Technical Education and Research(ITER), Siksha 'O' Anusandhan (Deemed to be University),Department of Civil Engineering,Bhubaneswar,India
BookMark eNo1j11LwzAYRiPohc79Ay_iD1hNmqRpLkv9GkxXsffjbfoGA20y0k7Yv3dDvXrgcDjw3JDLEAMScs9ZxjkzD9vHdb19L3LOiixnucw400ZLLS_I0mhTCsWEkkKba_JVBRiOs7cw0AaTi2mEYJHWcdxD8lMMNDq6ju2ZjIdwEmd_gk2Kc7RxmOjbR9tSCP1JqBrqUhzpJ9pD8vPxXJz2aGf_jbfkysEw4fJvF6R9fmrr19Vm-7Kuq83KGz6voJPQa6WM6voOFeus6zhYyazMS1eyslDIu7KXwECDcEqBBRTautIUkgmxIHe_WY-Iu33yI6Tj7v-_-AF1rlfY
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ODICON62106.2024.10797474
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350354379
EndPage 5
ExternalDocumentID 10797474
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i91t-ab4ad75595bdbe50bcfb1ac40c428f80865e1b8d4a0a7a3f55acae37cf8964033
IEDL.DBID RIE
IngestDate Wed Jan 01 06:01:58 EST 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i91t-ab4ad75595bdbe50bcfb1ac40c428f80865e1b8d4a0a7a3f55acae37cf8964033
PageCount 5
ParticipantIDs ieee_primary_10797474
PublicationCentury 2000
PublicationDate 2024-Nov.-8
PublicationDateYYYYMMDD 2024-11-08
PublicationDate_xml – month: 11
  year: 2024
  text: 2024-Nov.-8
  day: 08
PublicationDecade 2020
PublicationTitle 2024 3rd Odisha International Conference on Electrical Power Engineering, Communication and Computing Technology (ODICON)
PublicationTitleAbbrev ODICON
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.891747
Snippet In this present scenario, world Internet is maximum based on H2H communication only. But in the principle of IoT, it reduces direct Human-Human and...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Accuracy
Actuators
AES
CoAP
ECC
Internet of Things
IoT
Machine-to-machine communications
Medical services
MQTT
Power engineering
Propagation losses
Protocols
Security
Sensors
TCP
UDP
Title Analytical Performance Comparison of IoT Communication Protocols MQTT and CoAP from Security Perspective
URI https://ieeexplore.ieee.org/document/10797474
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5sD-JJxYpvInjddR95bI9SLa3Qh7hCbyVPFGFXdPfirzdJd1sqCN5CCJOQBzPfZL4ZgBuWUCETLQKdcGUBCsNBZhIVEMqMFCqW1LsuJlM6esGPC7JoyOqeC6O19sFnOnRN_5evSlk7V5l94cyZv7gDHZbRFVlrF66bvJm3s_vxYDalFsS42IMEh-34rcopXnEM92HaTrmKF3kP60qE8vtXNsZ_r-kAehuOHpqvtc8h7OjiCF59jhHvnkbzDSUADdbVBlFp0LjM0RYxxAmqSnslvtDkKc8RL5QdcDdHjnyCnpsSd05iS8zsQT58yAejoKmlELz14yrgAnPFLHogQglNIiGNiLnEkbTww2QW1xAdi0xhHnHGU0MIl1ynTJqsT3GUpsfQLcpCnwDifQsqBWOpNRScOZVJxu3DtwKMJLGMT6Hndmn5scqWsWw36OyP_nPYc4fl-X3ZBXSrz1pfWkVfiSt_wD8is6si
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwED90gvqk4sRvI_ja2o-k6R5lKptu3cQKexv5RBFa0e7Fv94kazcmCL6FklzLpeHud7nfHcAVjRIuIsU9FTFpAArFXqoj6ZGEasFlKBIXuhhmSe8FP0zIpCarOy6MUsolnynfDt1dvizFzIbKzAmn1v3F67BBMMZkTtfahMu6cub16LbfHWWJgTE2-yDCfrNipXeKMx33O5A1L51njLz7s4r74vtXPcZ_f9UutJcsPTRe2J89WFPFPry6KiMuQI3GS1IA6i76DaJSo36ZoxVqiBVUlean-ELDpzxHrJBmws0YWfoJeq6b3FmJDTWzDfn9Xd7teXU3Be-tE1Ye45hJavAD4ZIrEnChecgEDoQBIDo1yIaokKcSs4BRFmtCmGAqpkKnnQQHcXwAraIs1CEg1jGwklMaG1fBOlSpoMwcfSNACxKK8AjaVkvTj3m9jGmjoOM_nl_AVi8fDqaDfvZ4Att24xzbLz2FVvU5U2fG7Ff83G32D0WCrm8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+3rd+Odisha+International+Conference+on+Electrical+Power+Engineering%2C+Communication+and+Computing+Technology+%28ODICON%29&rft.atitle=Analytical+Performance+Comparison+of+IoT+Communication+Protocols+MQTT+and+CoAP+from+Security+Perspective&rft.au=Swain%2C+Satyaprakash&rft.au=Pattanayak%2C+Binod+Kumar&rft.au=Mohanty%2C+Mihir+Narayan&rft.au=Senapati%2C+Chinmayee&rft.date=2024-11-08&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FODICON62106.2024.10797474&rft.externalDocID=10797474