Performance Analysis of the Hybrid IoT Security Model of MQTT and UMA

04/26/2020
by   Khalid S. Aloufi, et al.
0

IoT applications are promising for future daily activities; therefore, the number of IoT connected devices is expected to reach billions in the coming few years. However, IoT has different application frameworks. Furthermore, IoT applications require higher security standards. In this work, an IoT application framework is presented with a security embedded structure using the integration between message queue telemetry transport (MQTT) and user managed access (UMA). The performance analysis of the model is presented. Comparing the model with existing models and different design structures shows that the model presented in this work is promising for a functioning IoT design model with security. The security in the model is a built-in feature in its structure. The model is built on recommended frameworks; therefore, it is ready for integration with other web standards for data sharing, which will help in making IoT application integrated from different developing parties.

READ FULL TEXT
research
10/22/2019

Designing Security and Privacy Requirements in Internet of Things: A Survey

The design and development process for the Internet of Things (IoT) appl...
research
12/17/2021

A Survey on the Applications of Blockchains in Security of IoT Systems

The Internet of Things (IoT) has already changed our daily lives by inte...
research
07/03/2020

Towards the Adoption of OMG Standards in the Development of SOA-Based IoT Systems

A common feature of the Internet of Things (IoT) is the high heterogenei...
research
10/29/2018

Exploring Security Economics in IoT Standardization Efforts

The Internet of Things (IoT) propagates the paradigm of interconnecting ...
research
12/29/2021

IoT Security Challenges and Mitigations: An Introduction

The use of IoT in society is perhaps already ubiquitous, with a vast att...
research
07/06/2022

LDA-2IoT : A Level Dependent Authentication using Two Factor for IoT Paradigm

The widespread expansion of the IoT based services are changing peoples ...
research
07/14/2020

multiple layers of fuzzy logic to quantify vulnerabilies in iot

Quantifying vulnerabilities of network systems has been a highly controv...

Please sign up or login with your details

Forgot password? Click here to reset