Next-Gen IoT Security: ARIA Cryptography within Hardware Secure Modules - A Comparative Analysis of MQTT and LwM2M Integration

차세대 IoT 보안: 하드웨어 보안모듈 내 ARIA 암호화 - MQTT 와 LwM2M 통합의 비교 분석

  • Iqbal Muhammad (Dept. of Computer Science Engineering, Pusan National University) ;
  • Laksmono Agus Mahardika Ari (Dept. of Computer Science Engineering, Pusan National University) ;
  • Derry Pratama (Dept. of Computer Science Engineering, Pusan National University) ;
  • Howon kim (Dept. of Computer Science Engineering, Pusan National University)
  • 이크발 무함마드 (부산대학교 정보융합공학과) ;
  • 락스모노 아구스 마하르디카 아리 (부산대학교 정보융합공학과) ;
  • 프라타마 데리 (부산대학교 정보융합공학과 ) ;
  • 김호원 (부산대학교 정보융합공학과)
  • Published : 2024.05.23

Abstract

This paper investigates the integration of ARIA cryptography within hardware secure modules to bolster IoT security. We present a comparative analysis of two prominent IoT communication protocols, MQTT and LwM2M, augmented with ARIA cryptography. The study evaluates their performance, security, and scalability in practical IoT applications. Our experimental setup comprises FPGA-enabled hardware secure modules interfaced with Raspberry Pi acting as an MQTT and LwM2M client. We utilize the Mosquitto MQTT server and an LwM2M server deployed on AWS IoT. Through rigorous experimentation, we measure various performance metrics, including latency, throughput, and resource utilization. Additionally, security aspects are scrutinized, assessing the resilience of each protocol against common IoT security threats. Our findings highlight the efficacy of ARIA cryptography in bolstering IoT security and reveal insights into the comparative strengths and weaknesses of MQTT and LwM2M protocols. These results contribute to the development of robust and secure IoT systems, paving the way for future research in this domain.

Keywords

Acknowledgement

This work is financially supported by Korea Ministry of Land, Infrastructure and Transport(MOLIT) as 「Innovative Talent Education Program for Smart City」.

References

  1. M. Iqbal, A. M. Ari Laksmono, A. T. Prihatno, D. Pratama, B. Jeong and H. Kim, "Enhancing IoT Security: Integrating MQTT with ARIA Cipher 256 Algorithm Cryptography and mbedTLS," 2023 International Conference on Platform Technology and Service (PlatCon), Busan, Korea, Republic of, 2023, pp. 91-96, doi
  2. A. M. A. Laksmono, M. Iqbal, D. Pratama, A. T. Prihatno, D. Yun and H. Kim, "Secure Sensor Data Transmission in IoT: Robust Implementation of LwM2M on the Lightweight Device Communication," 2023 International Conference on Platform Technology and Service (PlatCon), Busan, Korea, Republic of, 2023, pp. 85-90, doi: 10.1109/PlatCon60102.2023.10255201.
  3. Koppel, B. (2013). Analysis of a Hardware Security Module's High-Availability Setting. In 2013 IEEE Security & Privacy.
  4. Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd ed.). Wiley