Comparison of security level and current consumption of security implementations for MQTT

IoT is a rapidly growing area with products in the consumer, commercial and industrial market. Collecting data with multiple small and often battery-powered devices sets new challenges for both sec ...

[1]  Matthew J. B. Robshaw,et al.  Algebraic aspects of the advanced encryption standard , 2006 .

[2]  Ramesh Karri,et al.  Optimizing the Energy Consumed by Secure Wireless Sessions – Wireless Transport Layer Security Case Study , 2003, Mob. Networks Appl..

[3]  G. Fitzgerald,et al.  'I. , 2019, Australian journal of primary health.

[4]  Alasdair Gilchrist Industry 4.0: The Industrial Internet of Things , 2016 .

[5]  Claes Wohlin,et al.  Experimentation in Software Engineering , 2000, The Kluwer International Series in Software Engineering.

[6]  Robert T. Braden,et al.  Requirements for Internet Hosts - Communication Layers , 1989, RFC.

[7]  Nigel P. Smart,et al.  Cryptography Made Simple , 2015, Information Security and Cryptography.

[8]  Umesh Hodeghatta Rao,et al.  The InfoSec Handbook , 2014, Apress.

[9]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[10]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[11]  R. Mondal,et al.  Internet of Things and Wireless Sensor Network for Smart Cities , 2017 .

[12]  Sanjay Kumar Madria,et al.  Sensor networks: an overview , 2003 .

[13]  Ananthi Kaliyamoorthy,et al.  A Survey on Hardware and Software Optimization of Microprocessors for Low Power Consumption , 2011 .

[14]  J. Koenderink Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.

[15]  Sean Turner,et al.  Transport Layer Security , 2014, IEEE Internet Computing.

[16]  Jin B. Hong,et al.  Towards scalable security analysis using multi-layered security models , 2016, J. Netw. Comput. Appl..