Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/31557
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAlharbi, SS-
dc.contributor.authorBell, D-
dc.contributor.authorAwad, W-
dc.coverage.spatialManama, Bahrain-
dc.date.accessioned2025-07-15T07:38:59Z-
dc.date.available2025-07-15T07:38:59Z-
dc.date.issued2025-04-13-
dc.identifierORCiD: David Bell https://orcid.org/0000-0003-3148-6691-
dc.identifier.citationAlharbi, S.S.,Bell, D. and Awad, W. (2025) 'Application Layer Security: MQTT Perspective with TLS Implementation and Analysis', 2024 International Conference on IT Innovation and Knowledge Discovery (ITIKD), Manama, Bahrain, 13-15 April, pp. 1 - 14. doi: 10.1109/ITIKD63574.2025.11005154.en_US
dc.identifier.isbn979-8-3503-5546-8 (ebk)-
dc.identifier.issn979-8-3503-5547-5 (PoD)-
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/31557-
dc.description.abstractThe Internet of Things (IoT) has become ingrained in our daily lives, transforming the way we interact with technology. From smart homes to wearable devices, IoT enhances convenience and connectivity. However, this widespread adoption raises security concerns. Recent years have witnessed a surge in cyberattacks exploiting vulnerabilities in IoT devices. Security lapses in device development and the sheer volume of interconnected devices contribute to the challenges. Data breaches and privacy infringements also loom large, highlighting the need for a balanced approach to technological advancement and robust cybersecurity measures to safeguard personal information and ensure the positive impact of IoT on daily life. In this study, we reviewed IoT encryption algorithms with focus on the integration between the IoT application layer and some encryption algorithms with focus on the MQTT protocol. Additionally, we conducted a comparative performance analysis of MQTT with and without TLS, highlighting the impact of encryption on IoT communication in terms of different performance metrics like CPU cycles, memory consumption, latency and throughput.en_US
dc.format.extent1 - 14-
dc.format.mediumElectronic-
dc.languageEnglish-
dc.language.isoen_USen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.rightsCopyright © 2025 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works ( https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/ ).-
dc.rights.urihttps://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/-
dc.source2024 International Conference on IT Innovation and Knowledge Discovery (ITIKD)-
dc.source2024 International Conference on IT Innovation and Knowledge Discovery (ITIKD)-
dc.subjectIoT data securityen_US
dc.subjectsecure MQTT protocolen_US
dc.subjectTLSen_US
dc.subjectMQTTen_US
dc.subjectlightweight secure communicationen_US
dc.subjectIoT application layeren_US
dc.titleApplication Layer Security: MQTT Perspective with TLS Implementation and Analysisen_US
dc.typeConference Paperen_US
dc.date.dateAccepted2025-02-20-
dc.identifier.doihttps://doi.org/10.1109/ITIKD63574.2025.11005154-
dc.relation.isPartOf2nd International Conference on IT Innovation and Knowledge Discovery (ITIKD)-
pubs.finish-date2025-04-15-
pubs.finish-date2025-04-15-
pubs.publication-statusPublished-
pubs.start-date2025-04-13-
pubs.start-date2025-04-13-
dcterms.dateAccepted2025-02-20-
dc.rights.holderInstitute of Electrical and Electronics Engineers (IEEE)-
Appears in Collections:Dept of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCopyright © 2025 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works ( https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/ ).1.19 MBAdobe PDFView/Open


Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.