Visible to the public Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System

TitleOverhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
Publication TypeConference Paper
Year of Publication2020
AuthorsFauzan, A., Sukarno, P., Wardana, A. A.
Conference Name2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)
Date Publishedsep
Keywordsclass-2 device, class-l device, computer network security, constrained device, constrained-device, constrained-devices, cryptographic protocols, decryption time, digital signature, digital signature mechanism, digital signatures, Encryption, flash usage, Internet of Things, Internet of Things system, Memory management, memory usage, message delivery time, Message Queue Telemetry Transport, Message Queue Telemetry Transport protocol, MQTT protocol, overhead analysis, Payloads, Protocols, pubcrawl, queueing theory, Resiliency, Scalability, security, security mechanism, signature verification performance, transmission process, transport protocols
AbstractThis paper presents an overhead analysis of the use of digital signature mechanisms in the Message Queue Telemetry Transport (MQTT) protocol for three classes of constrained-device. Because the resources provided by constrained-devices are very limited, the purpose of this overhead analysis is to help find out the advantages and disadvantages of each class of constrained-devices after a security mechanism has been applied, namely by applying a digital signature mechanism. The objective of using this digital signature mechanism is for providing integrity, that if the payload sent and received in its destination is still original and not changed during the transmission process. The overhead analysis aspects performed are including analyzing decryption time, signature verification performance, message delivery time, memory and flash usage in the three classes of constrained-device. Based on the overhead analysis result, it can be seen that for decryption time and signature verification performance, the Class-2 device is the fastest one. For message delivery time, the smallest time needed for receiving the payload is Class-l device. For memory usage, the Class-2 device is providing the biggest available memory and flash.
DOI10.1109/IC2IE50715.2020.9274651
Citation Keyfauzan_overhead_2020