Enhancing MQTT Security in the Internet of Things with an Enhanced Symmetric Algorithm

Main Article Content

Rupali Atul Mahajan, Rupesh G. Mahajan, Manjusha Tatiya, Ujjwala Hemant Mandekar, Minal Shahakar, Yogendra Patil


The Internet of Things (IoT), which connects billions of gadgets to expedite operations and enhance our lives, has completely changed the way we interact with our environment. With MQTT (Message Queuing Telemetry Transport) emerging as a popular communication protocol within the IoT ecosystem, the vast proliferation of networked devices has, however, presented serious security challenges. In order to strengthen MQTT security, this study suggests using an improved symmetric algorithm.Existing MQTT implementations frequently rely on simple security safeguards, making them susceptible to dangers like data manipulation, eavesdropping, and unauthorised access. Our research presents a novel symmetric algorithm designed to meet the particular needs of MQTT communication as a defence against these weaknesses. In order to protect the confidentiality and integrity of data transferred between IoT devices and brokers, this algorithm provides powerful encryption mechanisms. Additionally, it optimises resource usage to take into account the limitations of IoT devices, which frequently have constrained computational and memory resources.

Article Details

Author Biography

Rupali Atul Mahajan, Rupesh G. Mahajan, Manjusha Tatiya, Ujjwala Hemant Mandekar, Minal Shahakar, Yogendra Patil

[1]Dr. Rupali Atul Mahajan

2Dr. Rupesh G. Mahajan

3Dr. Manjusha Tatiya

4Dr. Ujjwala Hemant Mandekar

5Minal Shahakar

6Dr. Yogendra Patil



[1]Associate professor & Head, Data Science Department, Vishwakarma Institute of Information Technology, Pune, Maharashtra, India

2Dr.D.Y.Patil Institute of Technology, Pimpri, Pune, Maharashtra, India

3Indira College of Engineering and Management, Pune, Maharashtra, India

4Department of Computer Engineering, Government Polytechnic, Nagpur, Maharashtra, India

5Assistant Professor, Dept. of Computer Engineering, Pimpri Chinchwad College of Engineering, Pune, Maharashtra, India

6Marathwada Mitra Mandal Institute of Technology, Lohagan, Pune, Maharashtra, India.

rupali.mahajan@viit.ac.in1, mhjn.rpsh@gmail.com2, manjusha.tatiya@indiraicem.ac.in3, ujjwalaaher@gmail.com4, mhjn.minal@gmail.com5, patyogendra@gmail.com6



Pereira, G.C.C.F.; Alves, R.C.A.; da Silva, F.L.; Azevedo, R.M.; Albertini, B.C.; Margi, C.B. Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems. Secur. Commun. Netw. 2017, 2017, 2046735.

Jain, A.K.; Jones, R.; Joshi, P. Survey of Cryptographic Hashing Algorithms for Message Signing. Int. J. Comput. Sci. Technol. 2017, 8, 18–22.

Kim, J.Y.; Holz, R.; Hu, W.; Jha, S. Automated Analysis of Secure Internet of Things Protocols. In Proceedings of the ACSAC 2017, Orlando, FL, USA, 4–8 December 2017.

Kiran, S.K.V.V.N.L.; Harini, N. Evaluating Efficiency of HMAC and Digital Signatures to Enhance Security in IoT. Int. J. Pure Pllied Math. 2018, 119, 13991–13997.

Du, X.; Guizani, M.; Xiao, Y.; Chen, H.H. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks. IEEE Trans. Wirel. Commun. 2009, 8, 1223–1229.

Xiao, Y.; Rayi, V.K.; Sun, B.; Du, X.; Hu, F.; Galloway, M. A Survey of Key Management Schemes in Wireless Sensor Networks. J. Comput. Commun. 2007, 30, 2314–2341.

Du, X.; Xiao, Y.; Guizani, M.; Chen, H.H. An Effective Key Management Scheme for Heterogeneous Sensor Networks. Ad Hoc Networks 2007, 5, 24–34.

Gao, C.; Siyi, L.V.; Wei, Y.; Wang, Z.; Liu, Z.; Cheng, X. An Effective Searchable Symmetric Encryption with Enhanced Security for Mobile Devices. IEEE Access 2018, 6, 2169–3536.

Wang, C.; Zhao, Z.; Gong, L.; Zhu, L.; Liu, Z.; Cheng, X. A Distributed Anomaly Detection System for In-Vehicle Network Using HTM. IEEE Access 2018, 6, 9091–9098.

Wang, C.; Zhu, L.; Gong, L.; Zhao, Z.; Yang, L.; Liu, Z.; Cheng, X. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information. Sensors 2018, 18, 1424–8220.

De Rango, F., Potrino, G., Tropea, M., & Fazio, P. (2020). Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks. Pervasive and Mobile Computing, 61, 101105.

S. Ajani and M. Wanjari, "An Efficient Approach for Clustering Uncertain Data Mining Based on Hash Indexing and Voronoi Clustering," 2013 5th International Conference and Computational Intelligence and Communication Networks, 2013, pp. 486-490, doi: 10.1109/CICN.2013.106.

Gupta, V., Khera, S., & Turk, N. (2020). MQTT protocol employing IOT based home safety system with ABE encryption. Multimedia Tools and Applications, 1-19.

Chanal, P. M., &Kakkasageri, M. S. (2020). Security and Privacy in IoT: A Survey. Wireless Personal Communications, 1-27.

Tawalbeh, L. A., Muheidat, F., Tawalbeh, M., &Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102.

Hussain, M., & Jain, U. (2020). Simple and secure device authentication mechanism for smart environments using Internet of things devices. International Journal of Communication Systems, e4570.

Khetani, V. ., Gandhi, Y. ., Bhattacharya, S. ., Ajani, S. N. ., & Limkar, S. . (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253–262. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2951

Yugha, R., &Chithra, S. (2020). A survey on technologies and security protocols: Reference for future generation IoT. Journal of Network and Computer Applications, 102763.