{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:23:33Z","timestamp":1761805413686,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T00:00:00Z","timestamp":1547856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Concordia University of Edmonton"},{"name":"Public Safety Canada"},{"name":"Computer Research Institute of Montreal (CRIM)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,19]]},"DOI":"10.1145\/3309074.3309081","type":"proceedings-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T13:29:18Z","timestamp":1555075758000},"page":"6-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Lightweight authentication for MQTT to improve the security of IoT communication"],"prefix":"10.1145","author":[{"given":"Ranbir Singh","family":"Bali","sequence":"first","affiliation":[{"name":"Concordia University of Edmonton, Alberta, Canada"}]},{"given":"Fehmi","family":"Jaafar","sequence":"additional","affiliation":[{"name":"Concordia University of Edmonton, Alberta, Canada"}]},{"given":"Pavol","family":"Zavarasky","sequence":"additional","affiliation":[{"name":"Concordia University of Edmonton, Alberta, Canada"}]}],"member":"320","published-online":{"date-parts":[[2019,1,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.03.008"},{"key":"e_1_3_2_1_2_1","unstructured":"D. Locke \"MQ Telemetry Transport (MQTT) V3.1 Protocol Specification \"http:\/\/www.ibm.com\/developerworks\/library\/ws-mqtt\/ 2010.  D. Locke \"MQ Telemetry Transport (MQTT) V3.1 Protocol Specification \"http:\/\/www.ibm.com\/developerworks\/library\/ws-mqtt\/ 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"key":"e_1_3_2_1_4_1","volume-title":"MQTT for sensor networks (mqtt-sn) protocol specification.\" International business machines (IBM)","author":"Andy S.","year":"2013","unstructured":"S. Andy and H. Truong . \" MQTT for sensor networks (mqtt-sn) protocol specification.\" International business machines (IBM) , Corporation version 1, 2013 . S. Andy and H. Truong. \"MQTT for sensor networks (mqtt-sn) protocol specification.\" International business machines (IBM), Corporation version 1, 2013."},{"key":"e_1_3_2_1_5_1","volume-title":"MQTT Security: A Novel Fuzzing Approach.\"Wireless Communications and Mobile Computing","author":"Hern\u00e1ndez R.","year":"2018","unstructured":"R. Hern\u00e1ndez , M. Santiago , T. Villalba , and R. Lacuesta . \" MQTT Security: A Novel Fuzzing Approach.\"Wireless Communications and Mobile Computing , 2018 . R. Hern\u00e1ndez, M. Santiago, T. Villalba, and R. Lacuesta. \"MQTT Security: A Novel Fuzzing Approach.\"Wireless Communications and Mobile Computing, 2018."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"A lightweight authentication mechanism for M2M communications in industrial IoT environment","author":"Esfahani A.","year":"2017","unstructured":"A. Esfahani , G. Mantas , R. Matischek , F.B. Saghezchi , J. Rodriguez , A. Bicaku , S. Maksuti , M. Tauber , C. Schmittner , and J. A. Bastos \" A lightweight authentication mechanism for M2M communications in industrial IoT environment .\" IEEE Internet of Things Journal , pp. 1 -- 8 , 2017 . A. Esfahani, G. Mantas, R. Matischek, F.B. Saghezchi, J. Rodriguez, A. Bicaku, S. Maksuti, M. Tauber, C. Schmittner, and J. A. Bastos \"A lightweight authentication mechanism for M2M communications in industrial IoT environment.\" IEEE Internet of Things Journal, pp.1--8, 2017.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_8_1","first-page":"432","article-title":"A security framework for MQTT","author":"Seong S.","year":"2016","unstructured":"S. Seong , H. Kazukuni Kobara , C. Chuang , and W Huang . \" A security framework for MQTT .\" IEEE Conference on Communications and Network Security (CNS) , pp. 432 -- 436 , 2016 . S. Seong, H. Kazukuni Kobara, C. Chuang, and W Huang. \"A security framework for MQTT.\" IEEE Conference on Communications and Network Security (CNS), pp. 432--436, 2016.","journal-title":"IEEE Conference on Communications and Network Security (CNS)"},{"key":"e_1_3_2_1_9_1","first-page":"3","article-title":"Securing device connectivity in the industrial internet of things (IoT)","author":"Amir M.","year":"2016","unstructured":"M. Amir . \" Securing device connectivity in the industrial internet of things (IoT) .\" In Connectivity Frameworks for Smart Devices, Springer , pp. 3 -- 22 , 2016 . M. Amir. \"Securing device connectivity in the industrial internet of things (IoT).\" In Connectivity Frameworks for Smart Devices, Springer, pp. 3--22, 2016.","journal-title":"Connectivity Frameworks for Smart Devices, Springer"},{"key":"e_1_3_2_1_10_1","first-page":"1243","article-title":"Securing smart maintenance services: hardware-security and TLS for MQTT","author":"Lesjak C.","year":"2015","unstructured":"C. Lesjak , D. Hein , M. Hofmann , M. Maritsch , A. Aldrian , P. Priller , T. Ebner , T. Ruprechter , and G. Pregartner . \" Securing smart maintenance services: hardware-security and TLS for MQTT .\" IEEE 13th International Conference on Industrial Informatics (INDIN) , pp. 1243 -- 1250 , 2015 . C. Lesjak, D. Hein, M. Hofmann, M. Maritsch, A. Aldrian, P. Priller, T. Ebner, T. Ruprechter, and G. Pregartner. \"Securing smart maintenance services: hardware-security and TLS for MQTT.\" IEEE 13th International Conference on Industrial Informatics (INDIN), pp. 1243--1250, 2015.","journal-title":"IEEE 13th International Conference on Industrial Informatics (INDIN)"},{"volume-title":"Security in industrial IoT-quo vadis?.\" e&i Elektrotechnik und Informationstechnik","author":"Lesjak C.","key":"e_1_3_2_1_11_1","unstructured":"C. Lesjak , N. Druml , R. Matischek , T. Ruprechter , and G. Holweg . \" Security in industrial IoT-quo vadis?.\" e&i Elektrotechnik und Informationstechnik , Vol. 133 , No. 7, pp.324--329, 2016. C. Lesjak, N. Druml, R. Matischek, T. Ruprechter, and G. Holweg. \"Security in industrial IoT-quo vadis?.\" e&i Elektrotechnik und Informationstechnik, Vol.133, No. 7, pp.324--329, 2016."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2016.7503802"},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"MQTT based secured home automation system","author":"Upadhyay Y.","year":"2016","unstructured":"Y. Upadhyay , A. Borole , and D. Dileepan . \" MQTT based secured home automation system .\" IEEE Symposium on Colossal Data Analysis and Networking (CDAN) , , pp. 1 -- 4 , 2016 . Y. Upadhyay, A. Borole, and D. Dileepan. \"MQTT based secured home automation system.\" IEEE Symposium on Colossal Data Analysis and Networking (CDAN), , pp. 1--4, 2016.","journal-title":"IEEE Symposium on Colossal Data Analysis and Networking (CDAN)"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490428.2490438"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIC.2009.10"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"A. R. Ganesh P. N. Manikandan S. P. Sethu R. Sundararajan and K. Pargunarajan \"An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based Wireless Sensor Networks \" in Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT '11) pp. 1209--1214 2011.  A. R. Ganesh P. N. Manikandan S. P. Sethu R. Sundararajan and K. Pargunarajan \"An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based Wireless Sensor Networks \" in Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT '11) pp. 1209--1214 2011.","DOI":"10.1109\/ICRTIT.2011.5972351"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"K. G. Gopchandran K. Gopakumar and B. Premlet \"Information encryption and decryption using hyperchaotic systems in delayed nonlinear feedback systems \" in Proceedings of the International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT '10) pp. 855--859 2010.  K. G. Gopchandran K. Gopakumar and B. Premlet \"Information encryption and decryption using hyperchaotic systems in delayed nonlinear feedback systems \" in Proceedings of the International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT '10) pp. 855--859 2010.","DOI":"10.1109\/ICUMT.2010.5676533"},{"key":"e_1_3_2_1_20_1","article-title":"Chaotic stream cipher-based secure data communications over intelligent transportation network","author":"Zhang W.","year":"2015","unstructured":"W. Zhang , S. Tang , L. Zhang , Z. Ma , and J. Song . \" Chaotic stream cipher-based secure data communications over intelligent transportation network .\" International Journal of Antennas and Propagation , 2015 . W. Zhang, S. Tang, L. Zhang, Z. Ma, and J. Song. \"Chaotic stream cipher-based secure data communications over intelligent transportation network.\"International Journal of Antennas and Propagation, 2015.","journal-title":"International Journal of Antennas and Propagation"},{"key":"e_1_3_2_1_21_1","first-page":"746","article-title":"Secure mqtt for internet of things (iot)","author":"Singh M.","year":"2015","unstructured":"M. Singh , M. A. Rajan , V. L. Shivraj , and P. Balamuralidhar . \" Secure mqtt for internet of things (iot) .\" Fifth IEEE International Conference on Communication Systems and Network Technologies (CSNT) , pp. 746 -- 751 , 2015 . M. Singh, M. A. Rajan, V. L. Shivraj, and P. Balamuralidhar. \"Secure mqtt for internet of things (iot).\" Fifth IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp. 746--751, 2015.","journal-title":"Fifth IEEE International Conference on Communication Systems and Network Technologies (CSNT)"},{"key":"e_1_3_2_1_22_1","unstructured":"MQTT Protocol Overview -Beginners Guide - Steve's Internet Guide available online www.steves-internet-guide.com\/mqtt.  MQTT Protocol Overview -Beginners Guide - Steve's Internet Guide available online www.steves-internet-guide.com\/mqtt."},{"key":"e_1_3_2_1_23_1","unstructured":"MQTT Version 5.0 \"Oasis https:\/\/www.oasis-open.org\/committees\/download.php\/61143\/mqtt-v5.0-wd15.pdf.  MQTT Version 5.0 \"Oasis https:\/\/www.oasis-open.org\/committees\/download.php\/61143\/mqtt-v5.0-wd15.pdf."},{"key":"e_1_3_2_1_24_1","volume-title":"An introduction to chaos-based algorithms for numerical optimization. Avances en Sistemas e Inform\u00e1tica, 8(1), 51--60","author":"Henao D.V.","year":"2011","unstructured":"J. D.V. Henao , ( 2011 ). An introduction to chaos-based algorithms for numerical optimization. Avances en Sistemas e Inform\u00e1tica, 8(1), 51--60 J.D.V. Henao, (2011). An introduction to chaos-based algorithms for numerical optimization. Avances en Sistemas e Inform\u00e1tica, 8(1), 51--60"},{"key":"e_1_3_2_1_25_1","volume-title":"Cryptanalysis of a chaotic image encryption algorithm based on information entropy. arXiv preprint arXiv:1803.10024","author":"Li C.","year":"2018","unstructured":"C. Li , B. Feng , and J. L\u00fc , ( 2018 ). Cryptanalysis of a chaotic image encryption algorithm based on information entropy. arXiv preprint arXiv:1803.10024 . C. Li, B. Feng, and J. L\u00fc, (2018). Cryptanalysis of a chaotic image encryption algorithm based on information entropy. arXiv preprint arXiv:1803.10024."},{"key":"e_1_3_2_1_26_1","unstructured":"H. Cooja (2018). How to calculate total energy consumption using Cooja. {online} Stack Overflow. Available at: \"https:\/\/stackoverflow.com\/questions\/45644277\/how-to-calculate-total-energy-consumption-usingcooja\" {Accessed 10 Jun. 2018}.  H. Cooja (2018). How to calculate total energy consumption using Cooja. {online} Stack Overflow. Available at: \"https:\/\/stackoverflow.com\/questions\/45644277\/how-to-calculate-total-energy-consumption-usingcooja\" {Accessed 10 Jun. 2018}."}],"event":{"name":"ICCSP 2019: 2019 the 3rd International Conference on Cryptography, Security and Privacy","acronym":"ICCSP 2019","location":"Kuala Lumpur Malaysia"},"container-title":["Proceedings of the 3rd International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309074.3309081","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3309074.3309081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:15Z","timestamp":1750201995000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309074.3309081"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,19]]},"references-count":26,"alternative-id":["10.1145\/3309074.3309081","10.1145\/3309074"],"URL":"https:\/\/doi.org\/10.1145\/3309074.3309081","relation":{},"subject":[],"published":{"date-parts":[[2019,1,19]]},"assertion":[{"value":"2019-01-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}