| Login
dc.contributor.author | Tabassum, Khalida Anika | |
dc.contributor.author | Hossain, A fifa | |
dc.contributor.author | Rahman, Md. Ha zur | |
dc.date.accessioned | 2022-03-22T05:22:51Z | |
dc.date.available | 2022-03-22T05:22:51Z | |
dc.date.issued | 2021-03-30 | |
dc.identifier.citation | [1] Renu Aggarwal and Manik Lal Das. \RFID Security in the Context of "Internet of Things"". In: Proceedings of the First International Conference on Security of Internet of Things. SecurIT '12. Kollam, India: Association for Computing Machin- ery, 2012, pp. 51{56. isbn: 9781450318228. doi: 10.1145/2490428.2490435. url: https://doi.org/10.1145/2490428.2490435. [2] Syaiful Andy, Budi Rahardjo, and Bagus Hanindhito. \Attack scenarios and secu- rity analysis of MQTT communication protocol in IoT system". In: 2017 4th Inter- national Conference on Electrical Engineering, Computer Science and Informatics (EECSI). IEEE. 2017, pp. 1{6. [3] Niccol o De Caro et al. \Comparison of two lightweight protocols for smartphone- based sensing". In: 2013 IEEE 20th Symposium on Communications and Vehicular Technology in the Benelux (SCVT). IEEE. 2013, pp. 1{6. [4] Susana Eiroa et al. \Using physical unclonable functions for hardware authentica- tion: A survey". In: (2010). [5] Roy Fielding et al. Hypertext transfer protocol{HTTP/1.1. 1999. [6] James King and Ali Ismail Awad. \A distributed security mechanism for resource- constrained IoT devices". In: Informatica 40.1 (2016). [7] Evangelos Kosmatos. \Integrating RFIDs and Smart Objects into a Uni edInternet of Things Architecture". In: Advances in Internet of Things 01 (Jan. 2011), pp. 5{ 12. doi: 10.4236/ait.2011.11002. | en_US |
dc.identifier.uri | http://hdl.handle.net/123456789/1276 | |
dc.description | Supervised by Mr. Md. Hamjajul Ashmafee Lecturer, Dept. of Computer Science and Engineering(CSE) Islamic University of Technology | en_US |
dc.description.abstract | The Internet of Things (IoT) is a network of interconnected computing devices, mechanical and digital machines that can move data without needing human or computer intervention. In this context MQTT was developed. MQTT is a lightweight publish/subscribe mes- saging protocol designed for M2M (machine to machine) telemetry in low bandwidth environments. MQTT stands for MQ Telemetry Transport but previously was known as Message Queuing Telemetry Transport. The main purpose behind developing MQTT was to make it lightweight, so that it can be used in case of resource constrained devices. MQTT doesn't specify security mechanisms and instead, it only ensures delivering of data since it is a message oriented protocol,which is clearly an issue from the security standpoint. Therefore, encryption, authentication, reliability needs to be implemented as separate features in the application layer or for instance via TLS, which on the other hand might increase overhead. Overall, security is an ongoing endeavor for MQTT, and it is most likely the most critical one provided that MQTT is one of the most commonly deployed and mature communication protocol solutions. In contrast to other available options, addressing the problems and establishing a solution architecture will give MQTT a major and signi cant bene t. In this paper we provide you Trident, a blockchain based structure for secured com- munication through MQTT with the help of physically unclonable function (PUF). | en_US |
dc.language.iso | en | en_US |
dc.publisher | Department of Computer Science and Engineering (CSE), Islamic University of Technology (IUT), Board Bazar, Gazipur-1704, Bangladesh | en_US |
dc.title | Trident: a M2M communication solution for IoT devices using blockchain fused MQTT and PUF based authentication scheme | en_US |
dc.type | Thesis | en_US |