Loading

Energy Efficient and Secured MQTT Protocol using IoT
Selvi M.1, Gayathri A.2, Santhosh Kumar SVN3, Kannan A.4

1Selvi M*, School of Computer Science and Engineering, VIT University, Vellore, India.
2Gayathri A., School of Computer Science and Engineering, VIT University, Vellore, India.
3Santhosh Kumar SVN, School of Computer Science and Engineering, VIT University, Vellore, India.
4Kannan A., School of Computer Science and Engineering, VIT University, Vellore, India.
Manuscript received on January 13, 2020. | Revised Manuscript received on January 20, 2020. | Manuscript published on February 10, 2020. | PP: 11-14 | Volume-9 Issue-4, February 2020. | Retrieval Number: B6264129219/2020©BEIESP | DOI: 10.35940/ijitee.B6264.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet of Things is a distributed collection of smart devices, where the smart device communicates with each other using Device to Device (D2D communication. Due to the resource constraint nature of IOT, the lightweight communication protocol is needed. Message Querying Telemetry Transport (MQTT) is one of the lightweight communication protocol which employs publish and subscribe method. The most of existing MQTT protocols are vulnerable to Denial of Service attack. In order to overcome the issues of the existing system, in this work a novel lightweight protocol by name EES-MQTT (Energy Efficient and Secured MQTT) is proposed which can be able to provide efficient authentication during data transmission by identifying the intruders and removing the malicious nodes. Moreover, the proposed protocol can be able to provide security with better energy optimization. The feasibility of EES-MQTT is carried out using MQTT. fx simulation tool and the Eclipse Paho. The results from the simulation proves that the EES-MQTT reduces impact of malicious nodes and optimizes the energy consumption during the data transmission. 
Keywords: Energy Efficient and Secured, Light Weight Protocol, Energy Optimization, Message Querying and Telemetry Transport
Scope of the Article: Discrete Optimization