dc.contributor.author |
Tabassum, Khalida Anika |
|
dc.contributor.author |
Hossain, A fifa |
|
dc.contributor.author |
Rahman, Md. Ha zur |
|
dc.date.accessioned |
2022-03-22T05:22:51Z |
|
dc.date.available |
2022-03-22T05:22:51Z |
|
dc.date.issued |
2021-03-30 |
|
dc.identifier.citation |
[1] Renu Aggarwal and Manik Lal Das. \RFID Security in the Context of "Internet of Things"". In: Proceedings of the First International Conference on Security of Internet of Things. SecurIT '12. Kollam, India: Association for Computing Machin- ery, 2012, pp. 51{56. isbn: 9781450318228. doi: 10.1145/2490428.2490435. url: https://doi.org/10.1145/2490428.2490435. [2] Syaiful Andy, Budi Rahardjo, and Bagus Hanindhito. \Attack scenarios and secu- rity analysis of MQTT communication protocol in IoT system". In: 2017 4th Inter- national Conference on Electrical Engineering, Computer Science and Informatics (EECSI). IEEE. 2017, pp. 1{6. [3] Niccol o De Caro et al. \Comparison of two lightweight protocols for smartphone- based sensing". In: 2013 IEEE 20th Symposium on Communications and Vehicular Technology in the Benelux (SCVT). IEEE. 2013, pp. 1{6. [4] Susana Eiroa et al. \Using physical unclonable functions for hardware authentica- tion: A survey". In: (2010). [5] Roy Fielding et al. Hypertext transfer protocol{HTTP/1.1. 1999. [6] James King and Ali Ismail Awad. \A distributed security mechanism for resource- constrained IoT devices". In: Informatica 40.1 (2016). [7] Evangelos Kosmatos. \Integrating RFIDs and Smart Objects into a Uni edInternet of Things Architecture". In: Advances in Internet of Things 01 (Jan. 2011), pp. 5{ 12. doi: 10.4236/ait.2011.11002. |
en_US |
dc.identifier.uri |
http://hdl.handle.net/123456789/1276 |
|
dc.description |
Supervised by
Mr. Md. Hamjajul Ashmafee
Lecturer,
Dept. of Computer Science and Engineering(CSE)
Islamic University of Technology |
en_US |
dc.description.abstract |
The Internet of Things (IoT) is a network of interconnected computing devices, mechanical
and digital machines that can move data without needing human or computer intervention.
In this context MQTT was developed. MQTT is a lightweight publish/subscribe mes-
saging protocol designed for M2M (machine to machine) telemetry in low bandwidth
environments. MQTT stands for MQ Telemetry Transport but previously was known as
Message Queuing Telemetry Transport.
The main purpose behind developing MQTT was to make it lightweight, so that it
can be used in case of resource constrained devices. MQTT doesn't specify security
mechanisms and instead, it only ensures delivering of data since it is a message oriented
protocol,which is clearly an issue from the security standpoint. Therefore, encryption,
authentication, reliability needs to be implemented as separate features in the application
layer or for instance via TLS, which on the other hand might increase overhead. Overall,
security is an ongoing endeavor for MQTT, and it is most likely the most critical one
provided that MQTT is one of the most commonly deployed and mature communication
protocol solutions. In contrast to other available options, addressing the problems and
establishing a solution architecture will give MQTT a major and signi cant bene t.
In this paper we provide you Trident, a blockchain based structure for secured com-
munication through MQTT with the help of physically unclonable function (PUF). |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Department of Computer Science and Engineering (CSE), Islamic University of Technology (IUT), Board Bazar, Gazipur-1704, Bangladesh |
en_US |
dc.title |
Trident: a M2M communication solution for IoT devices using blockchain fused MQTT and PUF based authentication scheme |
en_US |
dc.type |
Thesis |
en_US |