IIT Home Page CNR Home Page

Introducing Usage Control in MQTT

MQTT is a widely-used general purpose IoT application layer protocol, usable in both constrained and powerful devices, which coordinates data exchanges through a publish/subscribe approach. In this paper we propose a methodology to increase the security of the MQTT protocol, by including Usage Control in its operative workflow. The inclusion of Usage Control enables a fine-grained dynamic control of the rights of subscribers to access data and data-streams over time, by monitoring mutable attributes related to the subscriber, the environment or data itself. We will present the architecture and workflow of MQTT enhanced through Usage Control, also presenting a real implementation on Raspberry Pi 3 for performance evaluation.

3rd Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2017), Oslo, 2017

IIT authors:

Antonio La Marra

Foto di Antonio La Marra

Athanasios Rizos

Foto di Athanasios Rizos

Type: Contributo in atti di convegno
Field of reference: Computer Science & Engineering

File: Introducing-UCON-In_MQTT.pdf

Activity: Sicurezza di dispositivi mobili