Secure Iot Devices Using Aes Encryption: K. Siva Kumar Swamy, G.Sony, CH - Jagadeesh Ram, B.Navven, J.Harshitha
Secure Iot Devices Using Aes Encryption: K. Siva Kumar Swamy, G.Sony, CH - Jagadeesh Ram, B.Navven, J.Harshitha
Abstract— The IOT is a system of connecting the protocols is MQTT (Message queue telemetry
devices to the internet .It interacts with the real transport protocol). This protocol is created by IBM
world with wide range of applications. But, IOT which uses publish and subscribe pattern. This
has a disadvantage that is it has no security .To protocol requires a very small bandwidth.
provide security for protecting information to
This work proposes a new approach for
be delivered and communication through the
secure communication which is based on MQTT
use of codes we use cryptography. In
protocol. By using standard techniques of
cryptography we are using AES algorithm, in
cryptography such as digital signature & payload
this message will be passed in turns of block
encryption to secure communications, in an IoT
ciphers. To connect IOT and cryptography we
network.
require MQTT (message queuing telemetry
transport) broker to publish and subscribe The properties for which the network will
system takes place, in which we can publish and be secured are confidentiality, integrity, and
receive message as a client. These encrypted authenticity. Confidentiality is the ability to restrict
message cannot be decoded until it has the attackers from identifying the initial plain text
decryption key, so the device can secure from message that has been transmitted by the sender.
attacks. Integrity is the ability to restrict an active attacker
from changing the message without the notice of
Keywords— IoT, MQTT Broker, AES the legitimate user. Authenticity is the assurance
Encryption and Decryption that a message, communication of the information
via source, it entitles from authenticity which
1. INTRODUCTION encompasses evidence of uniqueness.
The Internet of things (IoT) is the system MQTT[4] is used in IoT as a client-server
of interconnection of processing objects with the publish/subscribe messaging transport protocol
Internet network using existing technologies and MQTT is lightweight, simple, free and can be
communication protocols without requiring human implemented easily. MQTT is a binary protocol.
to human or human to computer interaction. The MQTT has a minimal packet overhead. One more
use of IoT is growing rapidly which raises many important thing is MQTT can be easily
new serious issues related to security. Many recent implemented on the client-side. This most useful
reports on cyber security have highlighted IoT suits for constrained devices like IoT which are
vulnerability and the risk with the deployment of having bounded resources.
intelligent networks. The objects connected to the
Cryptography is an important feature of
network can create a lot of attacks and thus can
computer security. It is dependent on the privacy of
present a danger for the integrity of data. To avoid
the secret or private key. The user accepts an easily
these possible attacks, security approaches must
remembered passcode that is used to encrypt the
take place to ensure a set of criteria, like resistance
cryptographic key and this key is then stored in a
to attack, data authenticity, user privacy, and access
database. The security of the cryptographic key is
control.
weak due to the practical problems of memorizing
As IoT is having a very limited capacity of pass codes. Since the pass code is not directly
memory, bandwidth, and energy a new type of matched to a user the system is unable to
protocols and ideas are developed to improve the differentiate between the legitimate user and the
quality of service for this type of network. One of attacker.
2.2 Encryption and Decryption process request is sent to the encryption key request topic,
The sender message get encrypted using and the client waits for a response from the KMS.
AES algorithm (ESP32) .It was send through
MQTT broker and MQTT bridge to Receiver. The Response Received: The client should always
receiver has decrypted key, hence from the receive a response from the KMS, whether the
decryption code the message get decrypted. request is authorized or not. If no response is
received after a certain amount of time (network
The figure 2 depicts the steps undertaken dependent), the request times out and the client
when an application requires a new message to be sends another request. If the request has not been
published. Functionality is provided for the device approved, a response is received with an error code
to be both a publisher and subscriber to topics. For corresponding to the reason for denial.
the purpose of description, the encryption and
publishing process will be outlined for the IoT
device, and message receipt from subscription and
decryption process will be outlined for the
resource-unconstrained service. This is based
on the conventional perspective of IoT devices
such as sensors publishing information about their
environment which is then utilized by services to
make sense of the data provided. It is also noted
that systems operate bi-directionally, and services
can publish messages in order to actuate some
function on the IoT device.
3. RESULTS AND DISCUSSION right balance between the lightweight aspect and
the security aspect in which this solution
In this work, we have generated a chipper
guarantees data authenticity and confidentiality.
text by AES encryption using Ardunio[6] module
using ESP-32 Board and also decrypted by using 5. REFERENCES
AES algorithm.
[1] William Stallings “Cryptography and Network
This can be secure our data while there Security” Principles and Practice Seventh Edition
was cyber attacks. The output was shown in serial [2] “Advanced Encryption Standard”
monitor of ardunio module in fig.3 <:https://en.wikipedia.org/wiki/ Advanced
_Encryption_ Standard >
4. CONCLUSION [3] “Data sheet of ESP32”
In this work we generated encrypted <URL:https://www.espressif.com/sites/default/files
messages using cryptographic algorithms (AES, /documentation/esp32_ datasheet_en.pdf>
SHA-1) for different types of boards (ESP32, [4] “MQTT Protocol Tutorial: Technical
ESP8266, Raspberry pi). These codes can be linked description, MQTT security and
to the normal IoT device codes which provide a Mosquitto”<URL:https://www.survivingwithandroi
secure connection for both publisher and d.com/mqtt-protocol-tutorial/>
subscriber. [5]“Welcome to the home of
MQTT.fx”<URL:https://mqttfx.jensd.de/>
After having done work, we concluded [6] “Arduino IDE” URL:https:// en. wikipedia
that MQTT was the best option to have as the IoT .org/wiki/Arduino_ IDE/>
protocol. The other goal to keep the
[7] “5 Common Cyber Attacks in the IoT - Threat
Alert on a Grand Scale”
<URL:https://www.globalsign.com/en/blog/five-
common-cyber-attacks-in-the -iot>
[8] “MQTT Quality of Service”.
<URL:https://www.hivemq.com/blog/mqtt-
essentials-part-6-mqtt-qualityof-service-levels>