Open Access iconOpen Access

ARTICLE

crossmark

Improving Smart Home Security via MQTT: Maximizing Data Privacy and Device Authentication Using Elliptic Curve Cryptography

by Zainatul Yushaniza Mohamed Yusoff1, Mohamad Khairi Ishak2,*, Lukman A. B. Rahim3, Mohd Shahrimie Mohd Asaari1

1 School of Electrical and Electronic Engineering, Engineering Campus, Universiti Sains Malaysia, Nibong Tebal, Penang, 14300, Malaysia
2 Department of Electrical and Computer Engineering, College of Engineering and IT, Ajman University, Ajman, 346, United Arab Emirates
3 Faculty of Science and IT, Universiti Teknologi Petronas, Seri Iskandar, Perak, 32610, Malaysia

* Corresponding Author: Mohamad Khairi Ishak. Email: email

Computer Systems Science and Engineering 2024, 48(6), 1669-1697. https://doi.org/10.32604/csse.2024.056741

Abstract

The rapid adoption of Internet of Things (IoT) technologies has introduced significant security challenges across the physical, network, and application layers, particularly with the widespread use of the Message Queue Telemetry Transport (MQTT) protocol, which, while efficient in bandwidth consumption, lacks inherent security features, making it vulnerable to various cyber threats. This research addresses these challenges by presenting a secure, lightweight communication proxy that enhances the scalability and security of MQTT-based Internet of Things (IoT) networks. The proposed solution builds upon the Dang-Scheme, a mutual authentication protocol designed explicitly for resource-constrained environments and enhances it using Elliptic Curve Cryptography (ECC). This integration significantly improves device authentication, data confidentiality, and energy efficiency, achieving an 87.68% increase in data confidentiality and up to 77.04% energy savings during publish/subscribe communications in smart homes. The Middleware Broker System dynamically manages transaction keys and session IDs, offering robust defences against common cyber threats like impersonation and brute-force attacks. Penetration testing with tools such as Hydra and Nmap further validated the system’s security, demonstrating its potential to significantly improve the security and efficiency of IoT networks while underscoring the need for ongoing research to combat emerging threats.

Keywords


Cite This Article

APA Style
Yusoff, Z.Y.M., Ishak, M.K., Rahim, L.A.B., Asaari, M.S.M. (2024). Improving smart home security via MQTT: maximizing data privacy and device authentication using elliptic curve cryptography. Computer Systems Science and Engineering, 48(6), 1669-1697. https://doi.org/10.32604/csse.2024.056741
Vancouver Style
Yusoff ZYM, Ishak MK, Rahim LAB, Asaari MSM. Improving smart home security via MQTT: maximizing data privacy and device authentication using elliptic curve cryptography. Comput Syst Sci Eng. 2024;48(6):1669-1697 https://doi.org/10.32604/csse.2024.056741
IEEE Style
Z. Y. M. Yusoff, M. K. Ishak, L. A. B. Rahim, and M. S. M. Asaari, “Improving Smart Home Security via MQTT: Maximizing Data Privacy and Device Authentication Using Elliptic Curve Cryptography,” Comput. Syst. Sci. Eng., vol. 48, no. 6, pp. 1669-1697, 2024. https://doi.org/10.32604/csse.2024.056741



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 314

    View

  • 122

    Download

  • 0

    Like

Share Link