Skip to main content

Security in MQTT and CoAP Protocols of IOT’s Application Layer

  • Conference paper
  • First Online:
Communication, Networks and Computing (CNC 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 839))

Included in the following conference series:

Abstract

The Internet of Things (IoT) is a framework of interconnected computing devices mechanical and digital machines, internationally identifiable physical objects (or things) or people that are have unique identity and the ability to transfer data over a network without human-to-human or human-to-computer interaction., their combination with the Internet, and their representation in the digital world. The accessibility and availability of cheap components of IoT devices enables a extensive range of applications and provide smart environments. These devices perform actuating and sensing tasks and identified through unique addresses. The IoT devices are connected to the Internet and expected to use the Constrained Application Protocol (CoAP) at the application layer as a main web transfer protocol. Message Queuing Telemetry Transport (MQTT) does not enforce the use of a particular security approach for its applications, but instead leaves that to the application designer. Therefore, IoT solutions can be based on application context and specific security requirements. MQTT is a Client Server publish/subscribe messaging transport protocol. It is lightweight, open, uncomplicated, and designed to make implementation more easier. These characteristics of MQTT make it perfect for use in most of the situations, including communication in Machine to Machine (M2M) and Internet of Things (IoT). In IOT there is major use of Wireless Sensor Networks (WSN) which connects virtual world to physical world. In this paper focus is given to application layer of IOT. In application layer two important protocols are MQTT and CoAP. Security mechanism is proposed in the paper for these protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Asim, M.: A survey on application layer protocols for Internet of Things (IoT). Int. J. Adv. Res. Comput. Sci. 8(3), 996–1000 (2017). ISSN 0976-5697

    MathSciNet  Google Scholar 

  2. Kraijak, S., Tuwanut, P.: A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends. In: 11th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), pp. 1–6, September 2015. https://doi.org/10.1049/cp.2015.0714

  3. Rahman, R.A., Shah, B.: Security analysis of IoT protocols: a focus in CoAP. In: 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), pp. 1–7. IEEE (2016)

    Google Scholar 

  4. Ugrenovic, D., Gardasevic, G.: CoAP protocol for web-based monitoringin IoT healthcare applications. In: 2015 23rd Telecommunications Forum Telfor(TELFOR), pp. 79–82, November 2015

    Google Scholar 

  5. Thangavel, D., Ma, X., Valera, A., Tan, H.-X., Tan, C.K.-Y.: Performance evaluation of MQTT and CoAP via a common middleware. In: IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing 2014, Singapore (2014). ISSNIP.2014.6827678

    Google Scholar 

  6. Chen, M., Wan, J., Gonzalez, S., Liao, X., Leung, V.C.M.: A survey of recent developments in home M2M networks. IEEE Commun. Surv. Tutor. 16(1), 98–114 (2014). First Quarter

    Article  Google Scholar 

  7. Wang, M., Zhang, G., Zhang, C., Zhang, J., Li, C.: An IoT-based appliance control system for smart homes. In: 2013 Fourth International Conference on Intelligent Control and Information Processing (ICICIP), pp. 744–747, 9–11 June 2013

    Google Scholar 

  8. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of Things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)

    Article  Google Scholar 

  9. Ishaq, I., Hoebeke, J., Moerman, I., Demeester, P.: Experimental evaluation of unicast and multicast CoAP group communication. Sensors 16(7), 1–8 (2016). NCBI

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Harshal Misalkar or Umesh Nikam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Burange, A., Misalkar, H., Nikam, U. (2019). Security in MQTT and CoAP Protocols of IOT’s Application Layer. In: Verma, S., Tomar, R., Chaurasia, B., Singh, V., Abawajy, J. (eds) Communication, Networks and Computing. CNC 2018. Communications in Computer and Information Science, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-2372-0_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2372-0_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2371-3

  • Online ISBN: 978-981-13-2372-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics