To see the other types of publications on this topic, follow the link: Protocollo MQTT.

Journal articles on the topic 'Protocollo MQTT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Protocollo MQTT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Salamanca-Figueroa, Fabián Andrés, Willmar Arbey Suarez- Rodrígez, and Christian Camilo Cárdenas-Gamboa. "Prototipo de monitoreo y alarma para la detección de heladas blancas en sectores rurales de Sogamoso." Ingeniería Investigación y Desarrollo 18, no. 1 (January 12, 2018): 47. http://dx.doi.org/10.19053/1900771x.v18.n1.2018.8032.

Full text
Abstract:
El presente artículo muestra el diseño de un prototipo de monitoreo y alarma que permite la detección de heladas blancas y sirve de base para el desarrollo de un prototipo que posibilite la detección y predicción de heladas negras. El dispositivo, muestra las variables atmosféricas de temperatura y humedad, las comunica a un servidor local (Broker) mediante WiFi y el protocolo MQTT, éste a su vez retransmite la información útil a otros dispositivos finales, como celulares y computadoras. El sistema es capaz de alertar mediante una alarma y permitir la comunicación de estos eventos a los diferentes dispositivos finales. Para lograr ésto, fue necesario seleccionar los dispositivos, tecnologías y protocolos convenientes, realizar un diseño y validarlo por medio de la emulación de las condiciones de temperatura y humedad adecuadas.
APA, Harvard, Vancouver, ISO, and other styles
2

Quiñones, Manuel Fernando, Hever Patricio Pachar Bravo, Javier Martínez-Curipoma, Luis Quiñones, and Rommel Torres. "Desarrollo y evaluación de un gateway móvil IoT para redes 4G LTE." Enfoque UTE 11, no. 4 (October 1, 2020): 16–26. http://dx.doi.org/10.29019/enfoqueute.v11n4.634.

Full text
Abstract:
La tendencia actual es interconectar cualquier dispositivo para ser monitoreado y controlado de manera remota por medio de tecnologías propias del concepto de IoT. Uno de los problemas es conectar los dispositivos a una red mediante tecnologías con suficiente cobertura y capacidad, por lo que en el presente artículo se muestra el desarrollo de un gateway móvil para aplicaciones IoT bajo la plataforma Android, evaluado en redes móviles de 4G. El gateway móvil IoT envía los datos recolectados de sensores mediante la selección de los protocolos MQTT y HTTP, hacia plataformas IoT en Internet. La arquitectura se compone de sensores de temperatura, luminosidad y presión que se integran en un nodo sensor, cuya función es la obtención de los datos, procesamiento y luego, mediante Bluetooth, se envía a un smartphone Android, donde se ejecuta una aplicación que hace la función gateway móvil. Aquí se realiza el entramado de datos que son enviados mediante la red 4G LTE hacia las plataformas IoT de Ubidots y Watson IoT. Posteriormente se realizaron pruebas con varias métricas como latencia, demanda de corriente y costos de conexión. Se concluye que el gateway móvil IoT tiene un mejor rendimiento bajo el protocolo MQTT, en comparación con HTTP.
APA, Harvard, Vancouver, ISO, and other styles
3

ALBUQUERQUE, J., D. CHEN, M. BASTOS, A. SOARES, and W. VALENZUELA. "UMA APLICAÇÃO IOT COM PROTOCOLO MQTT PERSISTINDO EM MONGODB." Revista SODEBRAS 15, no. 174 (June 2020): 54–58. http://dx.doi.org/10.29367/issn.1809-3957.15.2020.174.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Silva, Daniel, Liliana I. Carvalho, José Soares, and Rute C. Sofia. "A Performance Analysis of Internet of Things Networking Protocols: Evaluating MQTT, CoAP, OPC UA." Applied Sciences 11, no. 11 (May 26, 2021): 4879. http://dx.doi.org/10.3390/app11114879.

Full text
Abstract:
IoT data exchange is supported today by different communication protocols and different protocolar frameworks, each of which with its own advantages and disadvantages, and often co-existing in a way that is mandated by vendor policies. Although different protocols are relevant in different domains, there is not a protocol that provides better performance (jitter, latency, energy consumption) across different scenarios. The focus of this work is two-fold. First, to provide a comparison of the different available solutions in terms of protocolar features such as type of transport, type of communication pattern support, security aspects, including Named-data networking as relevant example of an Information-centric networking architecture. Secondly, the work focuses on evaluating three of the most popular protocols used both in Consumer as well as in Industrial IoT environments: MQTT, CoAP, and OPC UA. The experimentation has been carried out first on a local testbed for MQTT, COAP and OPC UA. Then, larger experiments have been carried out for MQTT and CoAP, based on the large-scale FIT-IoT testbed. Results show that CoAP is the protocol that achieves across all scenarios lowest time-to-completion, while OPC UA, albeit exhibiting less variability, resulted in higher time-to-completion in comparison to CoAP or MQTT.
APA, Harvard, Vancouver, ISO, and other styles
5

Sahmi, Imane, Abderrahim Abdellaoui, Tomader Mazri, and Nabil Hmina. "MQTT-PRESENT: Approach to secure internet of things applications using MQTT protocol." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (October 1, 2021): 4577. http://dx.doi.org/10.11591/ijece.v11i5.pp4577-4586.

Full text
Abstract:
The big challenge to raise for deploying the application's domain of the Internet of Things is security. As one of the popular messaging protocols in the IoT world, the message queue telemetry transport (MQTT) is designed for constrained devices and machine-to-machine communications, based on the publish-subscribe model, it offers a basic authentication using username and password. However, this authentication method might have a problem in terms of security and scalability. In this paper, we provide an analysis of the current research in the literature related to the security for the MQTT protocol, before we give a brief description of each algorithm used on our approach, to finally propose a new approach to secure this protocol based on AugPAKE algorithm and PRESENT encryption. This solution provides mutual authentication between the broker and their clients (publishers and subscribers), the confidentiality of the published message is protected twice, the integrity and non-repudiation of MQTT messages which is protected during the process of transmission.
APA, Harvard, Vancouver, ISO, and other styles
6

Najeeb, Nihaala, and Shelbi Joseph. "IoT Service Search using MQTT Protocol." International Journal of Computer Sciences and Engineering 7, no. 7 (July 31, 2019): 292–97. http://dx.doi.org/10.26438/ijcse/v7i7.292297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ramos Rojas, José Julian, Pedro Rafael Guevara Salgado, Pedro José Jiménez Pérez, and Samir Oswaldo Castaño Rivera. "SisMo: sistema de seguridad para motocicletas." Ingenium 10, no. 28 (June 30, 2016): 19. http://dx.doi.org/10.21774/ing.v10i28.651.

Full text
Abstract:
Este trabajo de investigación aborda los aspectos relacionados con el diseño, la construcción y la implementación de un sistema de seguridad para motocicletas mediante la utilización de dispositivos móviles bajo sistemas Android y el protocolo de comunicación Message Queue Telemetry Transport [MQTT], como estrategia en la prevención y recuperación de este tipo de vehículos, en caso de ser hurtados. El sistema desarrollado permitió realizar un seguimiento en tiempo real de la ubicación, la notificación de alertas vía móvil y el control del sistema eléctrico de la motocicleta. Es importante resaltar cómo la integración de tecnologías GPRS, GPS, Arduino y el protocolo MQTT, bajo el concepto de Internet de las cosas [IoT] facilita la comunicación entre dispositivos móviles y vehículos de transporte particular, tales como motocicletas, carros y bicicletas. Para su desarrollo, el equipo investigador partió del reconocimiento de las funcionalidades y las limitaciones de dispositivos de similar propósito disponibles en el mercado.
APA, Harvard, Vancouver, ISO, and other styles
8

Shaikh, Arefa Shafique. "A Survey on Exchanging Data Using MQTT Protocol in Arduino." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 31, 2021): 3081–82. http://dx.doi.org/10.22214/ijraset.2021.37007.

Full text
Abstract:
In the coming years, sensors will likely grow in every aspect of our lives. Several activities explain how the Internet of Things (IoT) will have an impact on almost all aspect of our lives and why security is at the top of the list of IoT challenges. Device to Device communications (D2D) in IoT are forecast and another major concern within the use of IoT is to make sure device security, D2D connectivity and high quality data. Therefore, a proper communication protocol is required to fix this issues. To address this, we purpose the use of Message Queue Telemetry Transport(MQTT)protocol to transfer data between devices, as it is more secured. MQTT (Message Queuing Telemetry Transport) is a publish/subscribe messaging protocol which works on top of the TCP/IP protocol. The key feature of MQTT is its light weight, adds flexible authentication and bandwidth efficiency. The result of this study is transferring high quality data securely using MQTT protocol.
APA, Harvard, Vancouver, ISO, and other styles
9

Atmoko, Rachmad Andri, Daoguo Yang, M. Yayan Alfiani, and Lilik Subiyanto. "Controlling Unmanned Surface Vehicle Using MQTT Protocol." Journal Of Computer Networks, Architecture and High Performance Computing 1, no. 2 (July 16, 2019): 21–28. http://dx.doi.org/10.47709/cnapc.v1i2.229.

Full text
Abstract:
Abstract- The communication system at USV is the most important part of ensuring that the USV control system runs well. Communication systems that are commonly used at USV are generally still local networks. The development of a wider range of communications is needed to improve USV scalability so that the benefits can be increased to support the concept of remote laboratory and remote surveillance. USV is generally controlled using a wireless network with a limited work area using WIFI or using another electromagnetic waves transmission. This research proposes the development control and monitoring systems of USV to be controlled over the Internet by using the message queuing telemetry transport(MQTT) Protocol. This idea makes the USV can be controlled remotely, no longer have to operate it in the field. The control speed response of rudder and motor are analyzed. Performance monitoring of the compass sensor, GPS, and cameras also showed good results. As a result, the average delay time generated is 1.6 second.
APA, Harvard, Vancouver, ISO, and other styles
10

Quincozes, Silvio, Tubino Emilio, and Juliano Kazienko. "MQTT Protocol: Fundamentals, Tools and Future Directions." IEEE Latin America Transactions 17, no. 09 (September 2019): 1439–48. http://dx.doi.org/10.1109/tla.2019.8931137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ho, Nam, and Choong Seon Hong. "Secure MQTT Protocol based on Attribute-Based Encryption Scheme." Journal of KIISE 45, no. 3 (March 31, 2018): 195–99. http://dx.doi.org/10.5626/jok.2018.45.3.195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Park, Chang-Seop, and Hye-Min Nam. "Security Architecture and Protocols for Secure MQTT-SN." IEEE Access 8 (2020): 226422–36. http://dx.doi.org/10.1109/access.2020.3045441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Jaloudi, Samer. "Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study." Future Internet 11, no. 3 (March 7, 2019): 66. http://dx.doi.org/10.3390/fi11030066.

Full text
Abstract:
Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled. However, the MODBUS TCP is an open de facto standard, and is used for some automation and telecontrol systems. It is based on a polling mechanism and follows the synchronous request–response pattern, as opposed to the asynchronous publish–subscribe pattern. In this study, polling-based and event-based protocols are investigated to realize an open and interoperable Industrial Internet of Things (IIoT) environment. Many Internet of Things (IoT) protocols are introduced and compared, and the message queuing telemetry transport (MQTT) is chosen as the event-based, publish–subscribe protocol. The study shows that MODBUS defines an optimized message structure in the application layer, which is dedicated to industrial applications. In addition, it shows that an event-oriented IoT protocol complements the MODBUS TCP but cannot replace it. Therefore, two scenarios are proposed to build the IIoT environment. The first scenario is to consider the MODBUS TCP as an IoT protocol, and build the environment using the MODBUS TCP on a standalone basis. The second scenario is to use MQTT in conjunction with the MODBUS TCP. The first scenario is efficient and complies with most industrial applications where the request–response pattern is needed only. If the publish–subscribe pattern is needed, the MQTT in the second scenario complements the MODBUS TCP and eliminates the need for a gateway; however, MQTT lacks interoperability. To maintain a homogeneous message structure for the entire environment, industrial data are organized using the structure of MODBUS messages, formatted in the UTF-8, and then transferred in the payload of an MQTT publish message. The open and interoperable environment can be used for Internet SCADA, Internet-based monitoring, and industrial control systems.
APA, Harvard, Vancouver, ISO, and other styles
14

Susanto, Bekti Maryuni, Ery Setiyawan Jullev Atmadji, and Willy Laurent Brenkman. "IMPLEMENTASI MQTT PROTOCOL PADA SMART HOME SECURITY BERBASIS WEB." Jurnal Informatika Polinema 4, no. 3 (May 1, 2018): 201. http://dx.doi.org/10.33795/jip.v4i3.207.

Full text
Abstract:
Penggunaan IoT semakin berkembang dalam waktu singkat, hal ini dikarenakan oleh semakin berkembangnya teknologi informasi. Hal ini menyebabkan keterlibatan banyak device yang saling terkoneksi dengan sensor yang terpasang pada lingkungan. Sehingga dengan adanya banyak device maka menyebabkan permasalahan interoperabilitas dari masing-masing alat. Untuk mengatasi hal tersebut maka diperlukan sebuah gateway atau protocol yang mampu menjembatani interoperabilitas tersebut. Salah satu tugas Gateway atau protocol tersebut adalah harus mampu menangani permasalahan interoperabilitas serta mampu menangani permintaan maupun device profile dari masing-masing sensor maupun device yang terkoneksi. MQTT sendiri adalah sebuah protocol konektifitas machine to machine (M2M) yang didesain mampu mengirimkan data dengan sangat ringan menggunakan arsitektur TCP/IP. Pada MQTT sendiri mempunyai keunggulan yaitu dapat mengirimkan data dengan bandwith yang ringan, konsumsi listrik yang sedikit, latensi serta konektifitas yang sangat tinggi, ketersediaan variable yang banyak serta jaminan pengiriman data yang dapat dinegosiasikan. Paper ini membahas tentang implementasi MQTT protocol pada smart home security berbasis web. Topik ini dipilih karena keamanan rumah merupakan permasalahan yang sangat penting, apalagi saat kita meninggalkan rumah.
APA, Harvard, Vancouver, ISO, and other styles
15

Dikii, D. I. "Denial-of-service attack analysis by MQTT protocol." Scientific and Technical Journal of Information Technologies, Mechanics and Optics 20, no. 2 (April 1, 2020): 223–32. http://dx.doi.org/10.17586/2226-1494-2020-20-2-223-232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Atmoko, R. A., R. Riantini, and M. K. Hasin. "IoT real time data acquisition using MQTT protocol." Journal of Physics: Conference Series 853 (May 2017): 012003. http://dx.doi.org/10.1088/1742-6596/853/1/012003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Yamin, Muhammad Ikrar, Son Kuswadi, and Sritrusta Sukaridhoto. "Real Performance Evaluation On MQTT and COAP Protocol in Ubiquitous Network Robot Platform (UNRPF) for Disaster Multi-robot Communication." EMITTER International Journal of Engineering Technology 6, no. 2 (December 29, 2018): 369–85. http://dx.doi.org/10.24003/emitter.v6i2.305.

Full text
Abstract:
Disaster multi-robot has a significant role in a disaster area to do many tasks like detection of fire, search and rescue of victims, etc. It needs to build good communication between the operator and multi-robot and among multi-robot themselves to perform their tasks quickly and efficiently. This relates with the queue message protocol system. In this research, we implemented the queue message protocol on mesh topology and integrated it on the robot platform. Recently, development of IoT (Internet of Things) Technology causes development of communication protocol. MQTT and CoAP are among the communication protocols used for IoT needs. Both protocols performance were compared when  used and implemented into disaster multi-robot. We also integrated MQTT protocol and robot platform python based (UNR-PF). The result shows that MQTT protocol is easier to be implemented on to disaster multi-robot platform (UNR-PF) on mesh topology than CoAP, and that data transfer rate of MQTT protocol has data transfer rate higher than CoAP.
APA, Harvard, Vancouver, ISO, and other styles
18

Dikii, Dmitrii I. "Detection of DoS attacks caused by CONNECT messages of MQTT protocol." Radioelectronics. Nanosystems. Information Technologies 12, no. 2 (August 11, 2020): 287–96. http://dx.doi.org/10.17725/rensit.2020.12.287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Im, YeRin, and Mingyu Lim. "QoS Level 3: A Synchronous Communication Mechanism in MQTT Protocol for IoT." Transactions of The Korean Institute of Electrical Engineers 70, no. 6 (June 30, 2021): 893–904. http://dx.doi.org/10.5370/kiee.2021.70.6.893.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

V., Vitor, Renata I., and Sandro C. "IoT Embedded System for Data Acquisition using MQTT Protocol." International Journal of Computer Applications 182, no. 11 (August 14, 2018): 1–4. http://dx.doi.org/10.5120/ijca2018917736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

HC, Bhanujyothi. "Security exploration of MQTT protocol in Internet of Things." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 3 (June 25, 2020): 3892–97. http://dx.doi.org/10.30534/ijatcse/2020/209932020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Bartholet, Marcel, and Christian Überall. "Multi-protocol bridge generation for M2M communication using MQTT." Journal of Physics: Conference Series 1634 (September 2020): 012115. http://dx.doi.org/10.1088/1742-6596/1634/1/012115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, Jae Moon. "Development of translation telephone system by using MQTT protocol." International Journal of Computational Vision and Robotics 9, no. 6 (2019): 599. http://dx.doi.org/10.1504/ijcvr.2019.10025723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Lee, Jae Moon. "Development of translation telephone system by using MQTT protocol." International Journal of Computational Vision and Robotics 9, no. 6 (2019): 599. http://dx.doi.org/10.1504/ijcvr.2019.104042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

., Neha Agarwal. "INTERNET OF THINGS (IOT) BASED SWITCHBOX USING MQTT PROTOCOL." International Journal of Research in Engineering and Technology 05, no. 04 (April 25, 2016): 405–11. http://dx.doi.org/10.15623/ijret.2016.0504075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Light, Roger A. "Mosquitto: server and client implementation of the MQTT protocol." Journal of Open Source Software 2, no. 13 (May 26, 2017): 265. http://dx.doi.org/10.21105/joss.00265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Gómez-Meza, Javier Steve, Shuryca Vanessa Matute-Arias, and Teddy Jhennse Negrete Peña. "Diseño de un prototipo IoT para el monitoreo de material particulado en espacios reducidos utilizando ESP32 con servidor hospedado en la nube." Sinergia Académica 4, no. 3 (July 15, 2021): 1–18. http://dx.doi.org/10.51736/sa.v4i3.58.

Full text
Abstract:
El material particulado en el aire es uno de los elementos con mayor repercusión negativa en la salud humana, con presencia en el Ecuador. Dicha situación constituye un problema latente, con poca atención para su control, debido a los elevados costos para adquirir equipos o la existencia de empresas privadas que realicen dichas mediciones. El objetivo de la investigación es diseñar un prototipo de Internet de las Cosas para el monitoreo de material particulado en espacios reducidos, usando ESP32 con servidor hospedado en la nube. La investigación tiene un diseño experimental, con alcance descriptivo y enfoque mixto. El prototipo diseñado para la adquisición de datos utiliza módulos de censado y la configuración del protocolo de comunicación MQTT integrando la plataforma ThingSpeak. Con la investigación se determinó la utilización de materiales electrónicos asequibles, software libre para su programación y el uso de herramientas para el tratamiento y visualización de datos de manera remota. El diseño del prototipo incluyó cuatro módulos de censado, un sensor Nova SDS011 y un microcontrolador ESP32 en cada módulo. Se utilizó el entorno de desarrollo integrado Arduino y Visual Code, ambos de código abierto para la programación de censado y una red mesh. La información obtenida es enviada mediante la red Wi-Fi a una tarjeta Raspberry Pi 4, configurada como servidor local. La información es publicada mediante el protocolo MQTT en un servidor hospedado en la nube en la plataforma ThingSpeak, que permite la visualización y tratamiento de los resultados de manera remota.
APA, Harvard, Vancouver, ISO, and other styles
28

Zeng, Yingpei, Mingmin Lin, Shanqing Guo, Yanzhao Shen, Tingting Cui, Ting Wu, Qiuhua Zheng, and Qiuhua Wang. "MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols." Sensors 20, no. 18 (September 11, 2020): 5194. http://dx.doi.org/10.3390/s20185194.

Full text
Abstract:
The publish/subscribe model has gained prominence in the Internet of things (IoT) network, and both Message Queue Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP) support it. However, existing coverage-based fuzzers may miss some paths when fuzzing such publish/subscribe protocols, because they implicitly assume that there are only two parties in a protocol, which is not true now since there are three parties, i.e., the publisher, the subscriber and the broker. In this paper, we propose MultiFuzz, a new coverage-based multiparty-protocol fuzzer. First, it embeds multiple-connection information in a single input. Second, it uses a message mutation algorithm to stimulate protocol state transitions, without the need of protocol specifications. Third, it uses a new desockmulti module to feed the network messages into the program under test. desockmulti is similar to desock (Preeny), a tool widely used by the community, but it is specially designed for fuzzing and is 10x faster. We implement MultiFuzz based on AFL, and use it to fuzz two popular projects Eclipse Mosquitto and libCoAP. We reported discovered problems to the projects. In addition, we compare MultiFuzz with AFL and two state-of-the-art fuzzers, MOPT and AFLNET, and find it discovering more paths and crashes.
APA, Harvard, Vancouver, ISO, and other styles
29

Mamlook, Rustom, Omer F. Khan, and Thabit Sultan Mohammed. "Bridging for cross protocol talk in IOT devices using windows communication foundation." International Journal of Engineering & Technology 7, no. 3.29 (August 24, 2018): 196. http://dx.doi.org/10.14419/ijet.v7i3.29.18794.

Full text
Abstract:
In the Internet of Things (IoT), multiple communication protocols are used to connect the smart device. Wi-Fi, Xbee, ZigBee, Bluetooth, and LoRaWAN are some of the communication channels utilized for connectivity by devices using some IoT platform.In order to enable the development of smart services for IoT platforms, there are solutions by different vendors to connect between IoT devices. For example, multiple IoT platforms are available in the market namely IoTivity platform developed by Open Connectivity Foundation (OCF), AllJoyn platform from All Seen Alliance, Weave made by Google, and Home Kit by Apple. In view of such segmentation of IoT platforms, IoT Application’s development has been made complex, where IoT device and accompanying application compatibility with available platforms requires support for multiple protocols.To simplify the complexity introduced by multiple platforms, M2M [4] International standard was already proposed as the bridge for integrating IoT protocols. In our paper, we implement a proxy web service using Windows Communication Foundation (WCF) as a way to translate communication in one IoT protocol to another. In our implementation of middleware, we allowed the MQTT broker to accept messages, which were passed, to the Web Service from various devices over Hyper Text Protocol’s POST or GET Commands. Bridging between WCF Web Service and MQTT broker was enabled with duplex communication. Hence, devices supporting either HTTP protocol or MQTT protocol were able to communicate transparently.
APA, Harvard, Vancouver, ISO, and other styles
30

Delgado, Alexi. "Design of an IOT Domotic System using the MQTT protocol." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 4 (August 25, 2020): 4811–18. http://dx.doi.org/10.30534/ijatcse/2020/90942020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Alaiz-Moreton, Hector, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García, and Carmen Benavides. "Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol." Complexity 2019 (April 7, 2019): 1–11. http://dx.doi.org/10.1155/2019/6516253.

Full text
Abstract:
The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems (IDS) are used to protect IoT systems from the various anomalies and attacks at the network level. Intrusion Detection Systems (IDS) can be improved through machine learning techniques. Our work focuses on creating classification models that can feed an IDS using a dataset containing frames under attacks of an IoT system that uses the MQTT protocol. We have addressed two types of method for classifying the attacks, ensemble methods and deep learning models, more specifically recurrent networks with very satisfactory results.
APA, Harvard, Vancouver, ISO, and other styles
32

Dinculeană, Dan, and Xiaochun Cheng. "Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices." Applied Sciences 9, no. 5 (February 27, 2019): 848. http://dx.doi.org/10.3390/app9050848.

Full text
Abstract:
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to protect against such attacks. This paper will review some existing solutions used to secure a communication channel, such as Transport Layer Security or symmetric encryption, as well as provide a novel approach to achieving confidentiality and integrity of messages. The method, called Value-to-Keyed-Hash Message Authentication Code (Value-to-HMAC) mapping, uses signatures to send messages, instead of encryption, by implementing a Keyed-Hash Message Authentication Code generation algorithm. Although robust solutions exist that can be used to secure the communication between devices, this paper considers that not every Internet of Things (IoT) device or network design is able to afford the overhead and drop in performance, or even support such protocols. Therefore, the Value-to-HMAC method was designed to maximize performance while ensuring the messages are only readable by the intended node. The experimental procedure demonstrates how the method will achieve better performance than a symmetric-key encryption algorithm, while ensuring the confidentiality and integrity of information through the use of one mechanism.
APA, Harvard, Vancouver, ISO, and other styles
33

Yeh, Chia-Shin, Shang-Liang Chen, and I.-Ching Li. "Implementation of MQTT protocol based network architecture for smart factory." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 235, no. 13 (May 8, 2021): 2132–42. http://dx.doi.org/10.1177/09544054211014488.

Full text
Abstract:
The core concept of smart manufacturing is based on digitization to construct intelligent production and management in the manufacturing process. By digitizing the production process and connecting all levels from product design to service, the purpose of improving manufacturing efficiency, reducing production cost, enhancing product quality, and optimizing user experience can be achieved. To digitize the manufacturing process, IoT technology will have to be introduced into the manufacturing process to collect and analyze process information. However, one of the most important problems in building the industrial IoT (IIoT) environment is that different industrial network protocols are used for different equipment in factories. Therefore, the information in the manufacturing process may not be easily exchanged and obtained. To solve the above problem, a smart factory network architecture based on MQTT (MQ Telemetry Transport), IoT communication protocol, is proposed in this study, to construct a heterogeneous interface communication bridge between the machine tool, embedded device Raspberry Pi, and website. Finally, the system architecture is implemented and imported into the factory, and a smart manufacturing information management system is developed. The edge computing module is set up beside a three-axis machine tool, and a human-machine interface is built for the user controlling and monitoring. Users can also monitor the system through the dynamically updating website at any time and any place. The function of real-time gesture recognition based on image technology is developed and built on the edge computing module. The gesture recognition results can be transmitted to the machine controller through MQTT, and the machine will execute the corresponding action according to different gestures to achieve human-robot collaboration. The MQTT transmission architecture developed here is validated by the given edge computing application. It can serve as the basis for the construction of the IIoT environment, assist the traditional manufacturing industry to prepare for digitization, and accelerate the practice of smart manufacturing.
APA, Harvard, Vancouver, ISO, and other styles
34

Guo, Jr-Hung, Lin Tzu Yuan, and Kuo-Hsien Hsia. "Development of the IoT module using MQTT Protocol and AES." Proceedings of International Conference on Artificial Life and Robotics 26 (January 21, 2021): 56–60. http://dx.doi.org/10.5954/icarob.2021.os9-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (June 18, 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Full text
Abstract:
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment such as failure or impairment of production systems. We evaluate the prevalence of exposed IoT and IIoT devices related to the protocol MQTT by means of the search engine Shodan. The approach, design and results of our analysis are summarized in this paper.
APA, Harvard, Vancouver, ISO, and other styles
36

Budiana, Mochamad Soebagja, Ridha Muldina Negara, Arif Indra Irawan, and Harashta Tatimma Larasati. "Advanced detection Denial of Service attack in the Internet of Things network based on MQTT protocol using fuzzy logic." Register: Jurnal Ilmiah Teknologi Sistem Informasi 7, no. 2 (April 19, 2021): 95. http://dx.doi.org/10.26594/register.v7i2.2340.

Full text
Abstract:
Message Queuing Telemetry Transport (MQTT) is one of the popular protocols used on the Internet of Things (IoT) networks because of its lightweight nature. With the increasing number of devices connected to the internet, the number of cybercrimes on IoT networks will increase. One of the most popular attacks is the Denial of Service (DoS) attack. Standard security on MQTT uses SSL/TLS, but SSL/TLS is computationally wasteful for low-powered devices. The use of fuzzy logic algorithms with the Intrusion Detection System (IDS) scheme is suitable for detecting DoS because of its simple nature. This paper uses a fuzzy logic algorithm embedded in a node to detect DoS in the MQTT protocol with feature selection nodes. This paper's contribution is that the nodes feature selection used will monitor SUBSCRIBE and SUBACK traffic and provide this information to fuzzy input nodes to detect DoS attacks. Fuzzy performance evaluation is measured against changes in the number of nodes and attack intervals. The results obtained are that the more the number of nodes and the higher the traffic intensity, the fuzzy performance will decrease, and vice versa. However, the number of nodes and traffic intensity will affect fuzzy performance.
APA, Harvard, Vancouver, ISO, and other styles
37

De Aguilar, Dino Douglas Rodrigues, Marcelo Alves Guimarães, Robson Hebraico Cipriano Maniçoba, and Alex Ferreira Dos Santos. "Construção de uma estação meteorológica modular com o uso da plataforma Arduino e protocolo de comunicação MQTT / Building a modular weather station using the Arduino platform and the MQTT communication protocol." Brazilian Journal of Development 7, no. 4 (April 8, 2021): 36119–27. http://dx.doi.org/10.34117/bjdv7n4-194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Lee, Geunhyeok, Donghwi Kim, Cheolho Jeon, Hyunsig Jeon, and Hyunju Park. "A Study for Improving Efficiency of IoT Environment and Solution Based on MQTT Protocol." Journal of Korean Institute of Communications and Information Sciences 44, no. 7 (July 31, 2019): 1318–26. http://dx.doi.org/10.7840/kics.2019.44.7.1318.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Salcedo, Dixon, Diana Suarez, Jhon Solano, and Carlos Henriquez. "IoT Motors Sistema Inteligente para para la gestión automática de un generador eléctrico basado en la arquitectura del IoT." Computer and Electronic Sciences: Theory and Applications 1, no. 1 (November 23, 2020): 1–10. http://dx.doi.org/10.17981/cesta.01.01.2020.01.

Full text
Abstract:
Este articulo presenta el diseño y prototipado de un sistema inteligente, que sirve para la gestión automática de un generador eléctrico, basado en la arquitectura del IoT, a través del protocolo de comunicación MQTT.El prototipo, permite automatizar diversas funciones de un generador eléctrico ante la interrupción del fluido eléctrico; tales como: encendido y apagado de forma automática, teniendo en cuenta las condiciones eléctricas. También, controlar variables como el nivel de combustible, temperatura, horas de uso del equipo; que facilita cambios de aceite, y mantenimientos preventivos. Adicionalmente, cuenta con un gestor automático de carga de potencia, que evita que el generador inicie con una potencia máxima desde el arranque; logrando de esta forma ampliar el margen de vida útil de los circuitos electrónico de potencia. Finalmente, para controlar de manera remota las funciones mencionadas, se presenta una aplicación móvil para que el usuario final pueda monitorear en tiempo real el funcionamiento del generador, mediante la implementación del protocolo de comunicación de Message Queue Telemetry Transport (MQTT).
APA, Harvard, Vancouver, ISO, and other styles
40

Jassim, Eman K., and Emad H. AL-Hemiray. "COGNITIVE INTERNET OF THINGS USING MQTT PROTOCOL FOR SMART DIAGNOSIS SYSTEM." Iraqi Journal of Information & Communications Technology 2, no. 3 (December 27, 2019): 30–37. http://dx.doi.org/10.31987/ijict.2.3.77.

Full text
Abstract:
Cognitive Internet of Things (CIoT) is the next leap towards enhancing the accuracy and effectiveness of Internet of Things (IoT) technology used in combination with cognitive computing that has a significant role in healthcare and diseases diagnosis. The work in this paper proposes a system to diagnose the sensitivity toward sound and light by developing a mechanism based on facial emotions recognition system that integrate with IoT protocols and cloud computing. The proposed system was achieved by establishing a cognitive IoT environment composed of hardware and software components that practically implemented in a laboratory to identify the behavior of people suffering from sensitivity toward sound and light. This behavior was observed by monitoring human face emotions through a live video capturing using camera and image processing using facial emotion recognition software. Emotions values obtained was examined and collected in a cloud using (MQTT) protocol. These emotions were classified as normal and abnormal. Normal state give the impression that the surrounding environment is appropriate for people senses and they do not suffer from any discomfort, therefore the system works on a mechanism to increase the intensities of sound or light in this environment and vice versa.
APA, Harvard, Vancouver, ISO, and other styles
41

Korzukhin, S. V., R. R. Khaydarova, and V. N. Shmatkov. "Configurable IoT devices based on ESP8266 SoC system and MQTT protocol." Scientific and Technical Journal of Information Technologies, Mechanics and Optics 20, no. 5 (October 1, 2020): 722–28. http://dx.doi.org/10.17586/2226-1494-2020-20-5-722-728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Dikii, Dmitrii. "Authentication algorithm for internet of things networks based on MQTT protocol." Serbian Journal of Electrical Engineering 17, no. 3 (2020): 389–403. http://dx.doi.org/10.2298/sjee2003389d.

Full text
Abstract:
The authentication algorithm for machine-to-machine communication devices via the MQTT Protocol is considered, which allows verifying the device legality without sending the password. The algorithm protects the Internet of things network from unauthorized access, ensures confidentiality by generating a common session key, and provides protection against attacks of the "man in the middle" and others. The obtained experiment results showed noticeable performance improvement compared to the TLS Protocol. The cryptographic strength of the proposed algorithm is based on the discrete logarithm problem. The main advantage of the algorithm is the ability to authenticate in one requestresponse cycle.
APA, Harvard, Vancouver, ISO, and other styles
43

M.A., Hariprasanna, and P. Mahesha. "Secure Authentication, Contract and Communication for IoT Environment using MQTT Protocol." International Journal of Computer Applications 175, no. 24 (October 15, 2020): 40–43. http://dx.doi.org/10.5120/ijca2020920776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Schmitt, Alexandre, Florent Carlier, and Valérie Renault. "Dynamic bridge generation for IoT data exchange via the MQTT protocol." Procedia Computer Science 130 (2018): 90–97. http://dx.doi.org/10.1016/j.procs.2018.04.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

De, Bruno, Roberto Alexandre, and Fabrizio Leal. "MQTT Protocol Discovery Service for an Iot-based Gensets Monitoring System." International Journal of Computer Applications 180, no. 29 (March 24, 2018): 9–14. http://dx.doi.org/10.5120/ijca2018916695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Syafarinda, Y., F. Akhadin, Z. E. Fitri, Yogiswara, B. Widiawan, and E. Rosdiana. "The Precision Agriculture Based on Wireless Sensor Network with MQTT Protocol." IOP Conference Series: Earth and Environmental Science 207 (December 6, 2018): 012059. http://dx.doi.org/10.1088/1755-1315/207/1/012059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kumar, Vishal, Gayatri Sakya, and Chandra Shankar. "WSN and IoT based smart city model using the MQTT protocol." Journal of Discrete Mathematical Sciences and Cryptography 22, no. 8 (November 17, 2019): 1423–34. http://dx.doi.org/10.1080/09720529.2019.1692449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Putra, Willy Permana, Rizal Iman M, A. Sumarudin, and Agfianto Eko Putro. "Implementasi Lorawan Server Untuk Sistem Tracking Perahu Nelayan Berbasis MQTT Protocol." JOURNAL OF APPLIED INFORMATICS AND COMPUTING 2, no. 2 (December 5, 2018): 46–50. http://dx.doi.org/10.30871/jaic.v2i2.1024.

Full text
Abstract:
Luas perairan Indonesia sebesar 64.97 % dari luas wilayah Indonesia dengan jumlah nelayan sebanyak 2.17 juta nelayan di seluruh Indonesia. Kebanyakan dari nelayan Indonesia tersebut masih menggunakan cara tradisional dalam melaut. Dalam penelitian ini dilakukan untuk dapat membuat server sistem tracking perahu nelayan secara realtime. Dengan sistem ini, nelayan kecil dengan kegiatan nya hanya 1 – 2 hari melaut (one day fishing) dalam melakukan pelayarannya tingkat keselamatan nelayan dapat ditingkatkan dikarenakan dapat terpantau posisinya. Sistem yang dikembangkan menggunakan server berbasis mqtt protocol di sisi gateway. Server menggunakan mysql server menggunakan get JSON Parsing. Sebagai front end sistem tracking untuk menampilkan kordinat perahu berbasis web. Dari hasil implementasi didapat bahwa server dapat merespon dengan baik dari end device dengan melakukan pengiriman data secara periodik.
APA, Harvard, Vancouver, ISO, and other styles
49

Sundarrajan, M., A. E. Narayanan, and V. Srithar. "Securing the MQTT Protocol using Enhanced Cryptographic techniques in IoT Surroundings." Journal of Physics: Conference Series 1767, no. 1 (February 1, 2021): 012055. http://dx.doi.org/10.1088/1742-6596/1767/1/012055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ardhana, V. Y. P., Tibyani, F. A. S. Harianto, Sarwadi, R. A. Pratama, I. Sutrisno, J. Endrasmono, and R. Soekarta. "Design automatic waitress in android based restaurant using MQTT communication protocol." IOP Conference Series: Materials Science and Engineering 1175, no. 1 (August 1, 2021): 012009. http://dx.doi.org/10.1088/1757-899x/1175/1/012009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography