How to Authenticate MQTT Sessions Without Channel- and Broker Security

03/31/2019
by   Reto E. Koenig, et al.
0

This paper describes a new but state-of-the-art approach to provide authenticity in mqtt sessions using the means of zero-knowledge-proofs. This approach completely voids session hijacking for the mqtt protocol and provides authenticity without the need for any network-security nor channel-security nor broker-based predefined ACLs. The presented approach does not require the broker to keep any secrets for session handling, what so ever. Moreover, it allows the clientID, which represents the identification for a session, to be publicly known. The presented approach allows completely anonymous but authentic sessions, hence the broker does not need any a priori knowledge of the client-party. As it is especially targeted for applications within the world of IoT, the presented approach is tuned to require only the minimum in extra power in terms of energy and space. The approach does not introduce any new concept, but simply fusions a state-of-the-art cryptographic zero knowledge proof of identity with the existing MQTT-5 specification. Thus no protocol extension is required in order to provide the targeted security properties. The described approach is completely agnostic to the application layer at the client side and is only required during mqtt-session establishment.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/25/2023

Universal Session Protocol: A Novel Approach to Session Management

Currently, the TCP/IP model enables exploitation of vulnerabilities anon...
research
01/15/2021

Manifestly Phased Communication via Shared Session Types

Session types denote message protocols between concurrent processes, all...
research
01/28/2020

Language-Based Web Session Integrity

Session management is a fundamental component of web applications: despi...
research
02/04/2020

Encryption Algorithm for TCP Session Hijacking

Distributed network of the computer and the design defects of the TCP pr...
research
07/17/2019

Inductive Analysis of the Internet Protocol TLS

Internet browsers use security protocols to protect sensitive messages. ...
research
12/18/2020

Experimental relativistic zero-knowledge proofs

Protecting secrets is a key challenge in our contemporary information-ba...
research
06/19/2018

Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA

In this paper, we perform an automated analysis of two devices developed...

Please sign up or login with your details

Forgot password? Click here to reset