COMMUNICATION SECURITY IN THE MQTT PROTOCOL FOR MONITORING INTERNET OF THINGS DEVICES USING METHODS ELLIPTIC CURVE CRYPTOGRAPHY

  • Axel Natanael Salim Faculty of Computer Science, Masters in Informatics Engineering, Universitas Bina Darma, Indonesia
  • Tata Sutabri Faculty of Computer Science, Masters in Informatics Engineering, Universitas Bina Darma, Indonesia
  • Edi Surya Negara Faculty of Computer Science, Masters in Informatics Engineering, Universitas Bina Darma, Indonesia
  • M Izman Herdiansyah Faculty of Computer Science, Masters in Informatics Engineering, Universitas Bina Darma, Indonesia
Keywords: DHT11, ECC, IoT, Secure Communication, MQTT Broker, Wemos D1 Mini ESP8266

Abstract

The emergence of the IoT has become one of the most significant technology trends. The application of IoT is aimed at enhancing efficiency, comfort, and facilitating various human activities. One key aspect of IoT implementation is efficient communication between devices, with one of the most commonly used protocols being MQTT protocol. MQTT enables the transmission of data in real-time or based on specific events, although there are still several challenges that need to be addressed. One of the main challenges of MQTT is information security issues, prompting this research to examine effective solutions to enhance communication security in IoT applications that utilize MQTT protocol. One method of securing communication between IoT devices can involve using lightweight cryptographic communication security methods such as ECC method. ECC method is chosen because it utilizes shorter keys while still providing high security, making it more efficient when implemented on IoT devices. The results obtained indicate that data sent to MQTT Broker cannot be read and converted manually, ensuring much safer data transmission. Based on the test results, the tool can effectively read, process, and send data to MQTT Broker. QoS measurements on the system revealed that data encrypted and sent from the subscriber to MQTT Broker had an average delay time of 54.1 ms, throughput of 410.4 bps, zero packet loss, and jitter of 0.00 ms. Looking at the research findings, it can be concluded that this ECC method could serve as a solution to data communication security issues in the MQTT protocol.

Downloads

Download data is not yet available.

References

M. S. Audita, A. G. Putrada, and N. A. Suwastika, “Implementasi dan Analisis Pengurasan Otomatis Aquascape Berdasarkan Kualitas Air Menggunakan Fuzzy Logic,” e-Proceeding Eng., vol. 6, no. 1, pp. 2091–2099, 2019.

T. Sutabri, Y. B. Widodo, S. Sibuea, I. Rajiani, and Y. Hasan, “Tankmate Design For Settings Filter, Temperature, and Light on Aquascape,” J. Southwest Jiaotong Univ., vol. 54, no. 5, 2019.

A. Rouf and W. Agustiono, “Literature Review : Pemanfaatan Sistem Informasi Cerdas Pertanian Berbasis Internet of Things ( IoT ),” J. Teknol. dan Inform., vol. 9, no. 1, pp. 45–54, 2021.

D. Iskandar, A. Febbiansyah, and L. L. Firanda, “Monitoring Suhu dan Kelembaban Udara pada Ruangan Tertutup Berbasis IoT pada PT. Thembuzz Berkat Alam,” Incomtech, vol. 10, no. 2, pp. 8–15, 2021.

M. A. Hananto, A. Kusyanti, and R. Primananda, “Implementasi Algoritme Acorn untuk Pengamanan Data pada Protokol MQTT menggunakan Perangkat Wemos ESP8266,” J. Pengemb. Teknol. Inf. dan Ilmu Komput. , vol. 3, no. 8, pp. 2548–964, 2019, [Online]. Available: http://j-ptiik.ub.ac.id.

F. D. Silalahi, J. Dian, and N. D. Setiawan, “Implementasi Internet Of Things (Iot) Dalam Monitoring Suhu Dan Kelembaban Ruang Produksi Obat Non Steril Menggunakan Arduino Berbasis Web,” J. JUPITER, vol. 13, no. 2, pp. 62–68, 2021.

R. W. Febrianto and A. Zulianto, “Kriptografi Ringan di Internet of Things: Tinjauan Literatur Sistematis,” vol. 2, no. 1, 2021.

Y. B. Widodo, A. M. Ichsan, and T. Sutabri, “Perancangan Sistem Smart Home Dengan Konsep Internet Of Things Hybrid Berbasis Protokol Message Queuing Telemetry Transport,” J. Teknol. Inform. dan Komput., vol. 6, no. 2, pp. 123–136, 2020, doi: 10.37012/jtik.v6i2.302.

S. Andy and B. Rahardjo, “Keamanan Komunikasi Pada Protokol MQTT untuk Perangkat IoT,” Semin. Nas. Tek. Elektro 2016, no. 10, pp. 176–184, 2016.

C. A. Lara-Nino, A. Diaz-Perez, and M. Morales-Sandoval, “Lightweight Elliptic Curve Cryptography Accelerator for Internet of Things Applications,” Ad Hoc Networks, vol. 103, p. 102159, 2020, doi: 10.1016/j.adhoc.2020.102159.

D. Perdana, P. Purwiko, F. Dewanta, and F. Afianti, “Analisa Penggunaan Elliptic Curve Cryptography pada Sistem Autentikasi pada Internet of Things,” vol. 8, no. 1, pp. 42–49, 2022.

S. L. Nita and M. I. Mihailescu, “Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain,” Sensors, vol. 23, no. 3, 2023, doi: 10.3390/s23031371.

A. R. Taqwa and D. H. Sulaksono, “Implementasi Kriptografi Dengan Metode Elliptic Curve Cryptography (ECC) Untuk Aplikasi Chatting Berbasis Android,” J. Ris. Inov. Bid. Inform. dan Pendidik. Inform., vol. 1, no. 1, pp. 42–48, 2020.

M. Fauzan, U. B. Hanafi, and T. Irfan, “Implementasi TLS Sebagai Metode Keamanan Protokol Jaringan Pada MQTT Berbasis Raspberry PI,” 13th Ind. Res. Work. Natl. Semin., pp. 13–14, 2022, [Online]. Available: https://jurnal.polban.ac.id/ojs-3.1.2/proceeding/article/view/4332%0Ahttps://jurnal.polban.ac.id/ojs-3.1.2/proceeding/article/download/4332/2862.

T. Sutabri and D. Napitupulu, Sistem Informasi Bisnis. Penerbit ANDI, 2019.

ETSI, Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); General aspects of Quality of Service (QoS), vol. 2.1.1. 1999.

F. Palaha, E. Ermawati, M. Machdalena, and E. H. Arya, “Analisa Traffic Data Esp8266 Pada Kontrol Dan Monitoring Daya Lisrik Menggunakan Aplikasi Blynk Berbasis Arduino Nano,” J. Nas. Komputasi dan Teknol. Inf., vol. 4, no. 6, pp. 480–489, 2021, doi: 10.32672/jnkti.v4i6.3646.

H. Apriyanto, R. A. Laksono, and A. K. Ramadhani, “Quality Of Service (QoS) Analysis on The Internet Network (Case Study: Purwodadi Botanical Garden – BRIN),” SMARTICS J., vol. 8, no. 1, pp. 8–13, 2022, [Online]. Available: https://doi.org/10.21067/smartics.v8i1.6503.

S. E. A. P. Damanik, “Implementasi Algoritma Elliptic Curve Cryptography (ECC) UntukPenyandian Pesan Pada Aplikasi Chatting Client Server Berbasis Desktop,” J. Ris. Komput., vol. 6, no. 4, pp. 395–400, 2019.

S. P. Wahyuni, M. A. Murti, and G. B. Satrya, “Sistem Pengamanan Data IoT Menggunakan Enkripsi AES,” E-Proceeding Eng., vol. 10, no. 4, pp. 3678–3682, 2023.

Published
2024-04-04
How to Cite
[1]
Axel Natanael Salim, Tata Sutabri, Edi Surya Negara, and M Izman Herdiansyah, “COMMUNICATION SECURITY IN THE MQTT PROTOCOL FOR MONITORING INTERNET OF THINGS DEVICES USING METHODS ELLIPTIC CURVE CRYPTOGRAPHY ”, J. Tek. Inform. (JUTIF), vol. 5, no. 2, pp. 377-387, Apr. 2024.