Authentication Scheme and Key Agreement for Internet of Things Using MQTT Protocol
Internet of Things, security, authentication.
The Internet of Things is passing for a large growth, allowing that more devices be connected in the Internet and so, taking to a increase volume data. This technology pass through several challenges and one of the main is the information security. In IoT environments the security is essential for not permit the entrance of bad intentional devices, offer secure communication and data protection. Exist a lot of factors that are connected to a good security system, for exemple, athentication, criptography, secure communication canal and users identification. This work apresent a authentication scheme for Internet of Things that can be use with MQTT protocol. The propose scheme was developed using a set of tecniques like, logic port XOR, symetric criptography and hash functions. Other than that, is propose the use of PUF tecnique for unique identification of devices in IoT. The algorithm was tested using a tool for formal validation of security protocols, the scyther. In addition, the schema was implemented in a test environment using virtual machines. Therefore the python language was used to develop the schema and the Mosquitto service, with the MQTT protocol. During the performance evaluation, it was evident the existence of a commitment in the computational resources depending on of the provides security, existing a space to improve of the algorithm. On the other hand, the results showed that the schema own the necessary requirements to provide safe authentication and protection to data sended and received by devices.