Browse > Article
http://dx.doi.org/10.17661/jkiiect.2018.11.6.778

IoT MQTT Security Protocol Design Using Chaotic Signals  

Yim, Geo-Su (Department of Electrical Engineering, Pai Chai University)
Publication Information
The Journal of Korea Institute of Information, Electronics, and Communication Technology / v.11, no.6, 2018 , pp. 778-783 More about this Journal
Abstract
With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.
Keywords
Iot; MQTT; Security Protocol; Chaotic signals; Tent-map;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 S. H. Oh, S. K. Ko, S. C. Son, B. T. Lee, Y. S. Kim, "IoT Device Management Standard Protocol Trends in Mobile Communications", Electronics and Telecommunications Trends, Vol.30, No.1, pp. 94-101, 2015.
2 Y. H. Jeon, "A Study on the Security Modeling of Internet of Things(IoT)", Journal of KIIT, Vol.15, No.12, pp. 17-27, December, 2017.
3 J. Y. Ko, S. G. Lee, J. W. Kim, C. H. Lee "Technologies Analysis based on IoT Security Requirements and Secure Operating System", Journal of KCA, Vol.18, No.4, pp. 164-177, March, 2018.
4 N. H. Kim, C. S. Hong, "Secure MQTT Protocol based on Attribute-Based Encryption Scheme", Journal of KIISE, Vol.45, No.3, pp. 195-199, December, 2018.   DOI
5 N. H. Kim, C. S. Hong, "Lightweight Cryptography Algorithm based Secure MQTT Protocol", Proc. of KIISE, Vol.2016, No.12, pp. 757-759, December, 2016.
6 H. G. Schuster, "Deterministic Chaos: An Introduction: 2nd edition", VCH, pp. 24-32, December, 1997.
7 E. Ott, "Chaos in Dynamical Systems Second Edition", Cambridge University Press, pp. 15-18, September, 2002.
8 G. L. Baker, and J. P. Gollub, "Chaotic Dynamics an Introduction", Cambridge University Press, pp. 41-58, January, 1996.
9 Lynch, Stephen, "Dynamical Systems with Applications Using Matlab", Birkhauser, pp. 35-47, 2004.
10 M. H. Choi, G. S. Yim, "Passive RFID Certification Protocol Design Using Digital Chaos System", Journal of KIIT. pp. 85-92, October, 2014.
11 G. S. Yim, "Design of USN Communication Protocol Using Individual Chaotic Systems, Journal of KIIECT, Vol.8, No.6, pp. 528-533, December, 2015 .
12 Kitae Hwang, 'Design and Implementation of Dashboard Author and Viewer for IoT Systems based on MQTT', The Journal of The Institute of Internet, Broadcasting and Communication VOL. 18 No. 5, 2018