Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Internet of Things (IoT) enables device and machine communication using TCP/IP protocol. Message Queuing Telemetry Transport (MQTT) is the most preferred protocol and is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most signif...
| Main Author: | Hintaw, Ahmed Jameel |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/61252/ http://eprints.usm.my/61252/1/24%20Pages%20from%20AHMED%20JAMEEL%20HINTAW.pdf |
Similar Items
Rabin-p encryption scheme analysis on MQTT
by: Che Izam, Wan Abdullah, et al.
Published: (2023)
by: Che Izam, Wan Abdullah, et al.
Published: (2023)
Mosquitto: server and client implementation of the MQTT protocol
by: Light, Roger A.
Published: (2017)
by: Light, Roger A.
Published: (2017)
Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol
by: Jaisan S M, Ashish
Published: (2024)
by: Jaisan S M, Ashish
Published: (2024)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Cryptographic Authentication-Based Mechanism For Securing Secs/Gem Communications For Industry 4.0 Manufacturing
by: Laghari, Shams Ul Arfeen
Published: (2023)
by: Laghari, Shams Ul Arfeen
Published: (2023)
Adopting Theories-Based Model Of Information Security Compliance Behaviour For Healthcare Employees In Kingdom Of Saudi Arabia
by: Tuwayrish S, Alanazi Sultan
Published: (2023)
by: Tuwayrish S, Alanazi Sultan
Published: (2023)
Secure-Rpl: Approach To Prevent Resource-Based Attacks In Wireless Sensor Networks Using Balanced Clustering
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
A situation assessment and prediction mechanism for network security situation awareness
by: Leau, Yu Beng
Published: (2016)
by: Leau, Yu Beng
Published: (2016)
Smart room system with remote access using MQTT
by: Merunei, Nick Cassidy, et al.
Published: (2022)
by: Merunei, Nick Cassidy, et al.
Published: (2022)
IoT smart laboratory system using NODEMCU and MQTT
by: Muhammad Aqil, Muhammad Suhud
Published: (2022)
by: Muhammad Aqil, Muhammad Suhud
Published: (2022)
Suitability of using symmetric key to secure multimedia data: an overview,
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
by: MOHAMMED AHMED JUBAIR, MOHAMMED AHMED JUBAIR, et al.
Published: (2022)
by: MOHAMMED AHMED JUBAIR, MOHAMMED AHMED JUBAIR, et al.
Published: (2022)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2023)
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2023)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
Enhanced Cloud Service Broker Selection Policy Based On Differential Evolution Algorithm
by: Sanjalawe, Yousef Khader Khattar
Published: (2020)
by: Sanjalawe, Yousef Khader Khattar
Published: (2020)
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
Buiding a HA MQTT brokerage solution using mosquitto
by: Wong, Kei Yin
Published: (2021)
by: Wong, Kei Yin
Published: (2021)
An Improved Secure Router Discovery Mechanism To Prevent Fake Ra Attack In Link Local Ipv6 Network
by: C. Arjuman, Navaneethan
Published: (2021)
by: C. Arjuman, Navaneethan
Published: (2021)
Symmetric encryption using preshared public parameters for a secure TFTP protocol / Nur Nabila Mohamed
by: Mohamed, Nur Nabila
Published: (2015)
by: Mohamed, Nur Nabila
Published: (2015)
Enhanced Trust-nd Protocol To Prevent Temporal Denial-of-service Vulnerabilities On Ipv6 Link-local Network
by: Hasbullah, Iznan Husainy
Published: (2023)
by: Hasbullah, Iznan Husainy
Published: (2023)
Enhanced Late-Straggler Algorithm With On-Demand Etl For Big Data Retrieval
by: Zakaria Katrawi, Anwar Hussein
Published: (2022)
by: Zakaria Katrawi, Anwar Hussein
Published: (2022)
Enhancement Of Hybrid Fibre Reinforced Vinyl Ester Composite Using Nanococonut Shell
by: Masduki, Mohd Masri
Published: (2017)
by: Masduki, Mohd Masri
Published: (2017)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
Fault tolerant container-based message queuing telemetry transport (MQTT) embedded cluster system
by: Thean, Zhong Ying
Published: (2020)
by: Thean, Zhong Ying
Published: (2020)
Security analysis of TORA routing protocol
by: Chee, Vee Liem, et al.
Published: (2007)
by: Chee, Vee Liem, et al.
Published: (2007)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
An enhanced tree-based key management scheme for secure communication in wireless sensor network
by: Rasul, Khadija, et al.
Published: (2010)
by: Rasul, Khadija, et al.
Published: (2010)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2014)
by: Tahir, Mohammad, et al.
Published: (2014)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
Enhanced AES algorithm based on 14 rounds in securing data
and minimizing processing time
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2021)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2021)
Enhancing Security Protocol For Voip Communication Using Modified Vector Quantization
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
Digital watermarking scheme for QR code security
by: Tan Lei Lei, Joanna, et al.
Published: (2021)
by: Tan Lei Lei, Joanna, et al.
Published: (2021)
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009)
by: C., Li, et al.
Published: (2009)
An efficient and provable secure identity-based identification scheme in the standard model
by: Ji-Jian, Chin, et al.
Published: (2008)
by: Ji-Jian, Chin, et al.
Published: (2008)
Enhanced Steganography Framework Based On Lossless Compression And Histogram
by: Kasasbeh, Dima Suliman Mohammad
Published: (2024)
by: Kasasbeh, Dima Suliman Mohammad
Published: (2024)
Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
Fundamental to password based security
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
A Novel Protocol For Enhancing The Security Of Electronic Transaction Using Gsm Authentication
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
Security of a key agreement protocol based on chaotic maps
by: Han, Song
Published: (2008)
by: Han, Song
Published: (2008)
Similar Items
-
Rabin-p encryption scheme analysis on MQTT
by: Che Izam, Wan Abdullah, et al.
Published: (2023) -
Mosquitto: server and client implementation of the MQTT protocol
by: Light, Roger A.
Published: (2017) -
Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol
by: Jaisan S M, Ashish
Published: (2024) -
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004) -
Cryptographic Authentication-Based Mechanism For Securing Secs/Gem Communications For Industry 4.0 Manufacturing
by: Laghari, Shams Ul Arfeen
Published: (2023)