Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/29622
Title: An Experimental Evaluation of MQTT Authentication and Authorization in IoT
Authors: Michaelides, M
Sengul, C
Patras, P
Keywords: networks;network experimentation;cyber-physical networks;security and privacy;security protocols
Issue Date: 25-Oct-2021
Publisher: ACM
Citation: Michaelides, M., Sengul, C. and Patras, P. (2021) 'An Experimental Evaluation of MQTT Authentication and Authorization in IoT', WiNTECH '21: Proceedings of the 15th ACM Workshop on Wireless Network Testbeds, New Orleans, LA, USA, 31 Jan-4 Feb, pp. 69 - 76. doi: 10.1145/3477086.3480838.
Abstract: Security vulnerabilities make the Internet of Things (IoT) systems open to online attacks that threaten both their operation and user privacy. Among the many protocols governing IoT operation, MQTT has seen wide adoption, but comes with rudimentary security support. Specifically, while the MQTT standard strongly recommends that servers (brokers) offer Transport Layer Security (TLS), it is mainly concerned with the message transmission protocol, leaving to implementers the responsibility for providing appropriate security features. However, well-known solutions for Web Security (OAuth2) exist, which may benefit MQTT. This paper presents systematic implementation efforts and practical experimentation to evaluate the feasibility of one such approach, namely the MQTT-TLS profile for the Authentication and Authorization in Constrained Environments (ACE), recently specified by the IETF. Our implementation includes the functionality for (1) the Authorization Server (AS), to handle client registration, authorization policies, and Access Tokens; (2) the MQTT broker, to enforce authentication in both MQTT versions 3.1.1 and 5. Together, these enable ACE-MQTT clients to use (3) OAuth2-based authentication and authorization via Proof of Possession tokens. We make the source-code of our ACE-MQTT implementation publicly available, and evaluate it against plain MQTT systems in realistic settings with different computation constraints. To assess the cost of security, we measure the CPU, memory, network usage, and energy consumption. The results obtained confirm that the ACE requirements match the capabilities of moderately constrained devices, hence providing an affordable mechanism to secure MQTT systems.
URI: https://bura.brunel.ac.uk/handle/2438/29622
DOI: https://doi.org/10.1145/3477086.3480838
ISBN: 978-1-4503-8703-3
Other Identifiers: ORCiD: Cigdem Sengul https://orcid.org/0000-0002-6011-9690
Appears in Collections:Dept of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCopyright © held by Owner/Authors | Publication rights licensed to ACM 2021. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in WiNTECH '21: Proceedings of the 15th ACM Workshop on Wireless Network Testbeds, Experimental evaluation & CHaracterization, Pages 69 - 76, https://doi.org/10.1145/3477086.3480838 (see: https://www.acm.org/publications/policies/copyright-policy).1.34 MBAdobe PDFView/Open


Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.