Skip to main content
Top
Published in: Wireless Personal Communications 1/2023

25-07-2023

Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment

Authors: Iqbal Luqman Bin Mohd Paris, Mohamed Hadi Habaebi, Alhareth Mohammed Zyoud

Published in: Wireless Personal Communications | Issue 1/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet of Things (IoT) is the interconnection of devices with the internet to deliver its tasks. Nowadays, security is the main concern relating to these devices. Low in power storage, low in processing capabilities and low in data storage make it hard to provide a strong set of security protocols to protect the vulnerable devices “things”. Having internet as its backbone, allows the devices to communicate seamlessly. However, without any form of protection, it would open the door for hackers or middleman to hijack the connection, steal data and sabotage the information. In this paper, Secure Socket Layer and Transport Layer Security (SSL/TLS) protocol is implemented on top of Message Queuing Telemetry Transport (MQTT) IoT application protocol and the performance of the network is evaluated and analyzed in a typical IoT testbed comprising Raspberry Pi4 and ESP32 nodes. This work focuses on energy consumption, generated overhead, system complexity and required data storage resources. Experimental results of stress testing the system indicates that SSL/TLS encryption, operating with MQTT Quality of Service (QoS) level 2, while increasing the traffic rate 3.5 orders of magnitude yields more than two thousand times the amount of overhead generated and results in 73.25 J of consumed energy. Whereas operating without the SSL/TLS encryption under the same stress testing conditions yields only 140 times the amount of overhead generated and results in a mere 18.76 J of consumed energy. This difference of 4 folds on consumed energy indicates that the SSL/TLS -enabled node battery can only last a quarter of the lifespan of the TLS-free node and concluding the SSL/TLS encryption is not a viable solution for battery-operated IoT nodes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-of-service detection in 6LoWPAN based internet of things. In 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob), IEEE. pp. 600–607. https://doi.org/10.1109/WiMOB.2013.6673419. Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-of-service detection in 6LoWPAN based internet of things. In 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob), IEEE. pp. 600–607. https://​doi.​org/​10.​1109/​WiMOB.​2013.​6673419.​
4.
go back to reference Ali, I., Sabir, S., & Ullah, Z. (2016). Internet of things security, device authentication and access control: a review. International Journal of Computer Science and Information Security IJCSIS, 14(8), 456–466. Ali, I., Sabir, S., & Ullah, Z. (2016). Internet of things security, device authentication and access control: a review. International Journal of Computer Science and Information Security IJCSIS, 14(8), 456–466.
7.
go back to reference Sethi, P., & Sarangi, S. R. (2017). Internet of things: architectures, protocols, and applications. Journal of Electrical and Computer Engineering. Sethi, P., & Sarangi, S. R. (2017). Internet of things: architectures, protocols, and applications. Journal of Electrical and Computer Engineering.
9.
go back to reference Jokela, P., Moskowitz, R., & Nikander, P. (2008). Using the encapsulating security payload (ESP) transport format with the host identity protocol (HIP). RFC5202l. Jokela, P., Moskowitz, R., & Nikander, P. (2008). Using the encapsulating security payload (ESP) transport format with the host identity protocol (HIP). RFC5202l.
10.
go back to reference Bensalah, F., El Kamoun, N., & Bahnasse, A. (2017). Evaluation of tunnel layer impact on VOIP performances (IP-MPLS-MPLS VPN-MPLS VPN IPsec). International Journal of Computer Science and Network Security (IJCSNS), 17(3), 87. Bensalah, F., El Kamoun, N., & Bahnasse, A. (2017). Evaluation of tunnel layer impact on VOIP performances (IP-MPLS-MPLS VPN-MPLS VPN IPsec). International Journal of Computer Science and Network Security (IJCSNS), 17(3), 87.
11.
go back to reference Thomas, S. (2000). SSL and TLS essentials, securing the web (p. 3). John Wiley and Sons. Thomas, S. (2000). SSL and TLS essentials, securing the web (p. 3). John Wiley and Sons.
13.
go back to reference Prantl, T., Iffländer, L., Herrnleben, S., Engel, S., Kounev, S., & Krupitzer, C. (2021). Performance impact analysis of securing mqtt using tls. In Proceedings of the ACM/SPEC international conference on performance engineering, pp. 241–248. Prantl, T., Iffländer, L., Herrnleben, S., Engel, S., Kounev, S., & Krupitzer, C. (2021). Performance impact analysis of securing mqtt using tls. In Proceedings of the ACM/SPEC international conference on performance engineering, pp. 241–248.
14.
go back to reference Baranauskas, E., Toldinas, J., & Lozinskis, B. (2019). Evaluation of the impact on energy consumption of MQTT protocol over TLS. In CEUR workshop proceedings: IVUS 2019 international conference on information technologies: Proceedings of the international conference on information technologies, Kaunas, Lithuania, April 25, 2019, Vol. 2470, pp. 56–60. CEUR-WS. Baranauskas, E., Toldinas, J., & Lozinskis, B. (2019). Evaluation of the impact on energy consumption of MQTT protocol over TLS. In CEUR workshop proceedings: IVUS 2019 international conference on information technologies: Proceedings of the international conference on information technologies, Kaunas, Lithuania, April 25, 2019, Vol. 2470, pp. 56–60. CEUR-WS.
15.
go back to reference Shapsough, S., Aloul, F., & Zualkernan, I. A. (2018). Securing low-resource edge devices for IoT systems. In 2018 International symposium in sensing and instrumentation in IoT Era (ISSI), IEEE. pp. 1–4. Shapsough, S., Aloul, F., & Zualkernan, I. A. (2018). Securing low-resource edge devices for IoT systems. In 2018 International symposium in sensing and instrumentation in IoT Era (ISSI), IEEE. pp. 1–4.
16.
go back to reference Laaroussi, Z., & Novo, O. (2021). A performance analysis of the security communication in CoAP and MQTT. In 2021 IEEE 18th Annual consumer communications & networking conference (CCNC), IEEE. pp. 1–6. Laaroussi, Z., & Novo, O. (2021). A performance analysis of the security communication in CoAP and MQTT. In 2021 IEEE 18th Annual consumer communications & networking conference (CCNC), IEEE. pp. 1–6.
17.
go back to reference Silva, C., Toasa, R., Martinez, H. D., Veloz, J., & Gallardo, C. (2017). Secure push notification service based on MQTT protocol for mobile platforms. In XII Jornadas Iberoamericanas de Ingeniería de Software e Ingeniería del Conocimiento y Congreso Ecuatoriano en Ingeniería de Software, pp. 69–84. Silva, C., Toasa, R., Martinez, H. D., Veloz, J., & Gallardo, C. (2017). Secure push notification service based on MQTT protocol for mobile platforms. In XII Jornadas Iberoamericanas de Ingeniería de Software e Ingeniería del Conocimiento y Congreso Ecuatoriano en Ingeniería de Software, pp. 69–84.
18.
go back to reference Alghamdi, K., Alqazzaz, A., Liu, A., & Ming, H. (2018). Iotverif: An automated tool to verify ssl/tls certificate validation in android mqtt client applications. In Proceedings of the eighth ACM conference on data and application security and privacy, pp. 95–102. Alghamdi, K., Alqazzaz, A., Liu, A., & Ming, H. (2018). Iotverif: An automated tool to verify ssl/tls certificate validation in android mqtt client applications. In Proceedings of the eighth ACM conference on data and application security and privacy, pp. 95–102.
20.
go back to reference Seufert, M., Schatz, R., Wehner, N., Gardlo, B., & Casas, P. (2019). Is QUIC becoming the new TCP? On the potential impact of a new protocol on networked multimedia QoE. In 2019 Eleventh international conference on quality of multimedia experience (QoMEX), IEEE. pp. 1–6. https://doi.org/10.1109/QoMEX.2019.8743223. Seufert, M., Schatz, R., Wehner, N., Gardlo, B., & Casas, P. (2019). Is QUIC becoming the new TCP? On the potential impact of a new protocol on networked multimedia QoE. In 2019 Eleventh international conference on quality of multimedia experience (QoMEX), IEEE. pp. 1–6. https://​doi.​org/​10.​1109/​QoMEX.​2019.​8743223.​
21.
go back to reference Lampkin, V., Leong, W. T., Olivera, L., Rawat, S., Subrahmanyam, N., Xiang, R., & Locke, D. (2012). Building smarter planet solutions with mqtt and ibm websphere mq telemetry. IBM Redbooks. Lampkin, V., Leong, W. T., Olivera, L., Rawat, S., Subrahmanyam, N., Xiang, R., & Locke, D. (2012). Building smarter planet solutions with mqtt and ibm websphere mq telemetry. IBM Redbooks.
24.
go back to reference Hijazi, G., Hadi Habaebi, M., Al-Haddad, A., & Zyoud, A. M. (2021). Stress testing MQTT server for private IOT networks. International Journal of Electronics and Telecommunications, 67(2), 229–234. Hijazi, G., Hadi Habaebi, M., Al-Haddad, A., & Zyoud, A. M. (2021). Stress testing MQTT server for private IOT networks. International Journal of Electronics and Telecommunications, 67(2), 229–234.
27.
go back to reference Rodríguez, C., Baez, M., Daniel, F., Casati, F., Trabucco, J. C., Canali, L., & Percannella, G. (2016). REST APIs: A large-scale analysis of compliance with principles and best practices. In International conference on web engineering, Springer, Cham. pp. 21–39. https://doi.org/10.1007/978-3-319-38791-8_2. Rodríguez, C., Baez, M., Daniel, F., Casati, F., Trabucco, J. C., Canali, L., & Percannella, G. (2016). REST APIs: A large-scale analysis of compliance with principles and best practices. In International conference on web engineering, Springer, Cham. pp. 21–39. https://​doi.​org/​10.​1007/​978-3-319-38791-8_​2.​
28.
go back to reference Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., & Berners-Lee, T. (1999). Hypertext transfer protocol–HTTP/1.1. Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., & Berners-Lee, T. (1999). Hypertext transfer protocol–HTTP/1.1.
Metadata
Title
Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment
Authors
Iqbal Luqman Bin Mohd Paris
Mohamed Hadi Habaebi
Alhareth Mohammed Zyoud
Publication date
25-07-2023
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2023
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-023-10605-y

Other articles of this Issue 1/2023

Wireless Personal Communications 1/2023 Go to the issue