Font Size: a A A

Research On An Improved MQTT Protocol With Separate Message Storage Processing And Security Authentication

Posted on:2021-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhangFull Text:PDF
GTID:2428330611966939Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The MQTT communication protocol is widely used in the Internet of Things(IoT),but the protocol does not take any measures to ensure the security of data both in transmission and processing,and there are significant data security risks.As the number of users continues to grow,this security issue needs to be addressed.Recent research on the security of the MQTT protocol mainly focuses on the security of data transmission,but there are also data security issues associated with the storage and processing of data at the broker side.In order to address the both aspects of security simultaneously,this paper presents a proposal for a message storage processing and security authentication separated improvement scheme.In this scheme,the concepts of process key and exclusive public-private key are proposed: the process key can solve the security problem and the final decryptability of the message when the message is forwarded in explicit form on the broker side;the exclusive public-private key can solve the key control problem and the security problem of the key when there are a large number of clients.Based on the process key and exclusive public-private key,this paper designs and implements related algorithms,which mainly include: 1)a Hill cryptographic algorithm based on chaos theory,which improves the problem that the original Hill cryptography is vulnerable to known explicit attacks and greatly improves the randomness of the cryptographic key matrix,which ensures the security of the data in transmission;2)a process key generation algorithm based on Hill cryptography,which ensures that the data is decryptable only at the subscriber and not at the broker side,thus ensuring the security of the data when storage processing;3)an exclusive public-private key pair generation algorithm based on elliptic curve cryptography,which enables the generation of mutual public-private key pairs between the client and the verification center,solving the key control and security problems.Finally,this paper implements a message storage processing and security authentication split system based on the proposed schemes,and tests the system on both functionality and performance.Functional testing has partially validated this improvement to ensure the security of data during transmission and processing.The performance test mainly compares the three metrics of CPU utilization,memory usage,and time consumption.The results show that the MQTT protocol based on this improved solution has better overall performance than the SSL/TLS-based MQTT protocol,and compared to the original MQTT protocol,it achieves a good compromise between performance and security.
Keywords/Search Tags:MQTT, IoT Security, Elliptic Curves Cryptography, Hill Cipher, Chaos Theory
PDF Full Text Request
Related items