IoT devices have led to the development of Distributed Measurement Systems (DMS). However, cyber-attacks have increased, making it crucial to implement security protocols without reducing network throughput. Open firmware on constrained devices offers another layer of customization, essential for the flexibility required in DMS. This allows software updates and modifications in real-time, which is crucial for adapting to evolving cybersecurity threats and managing device functionality. The objective is to identify algorithms that ensure optimal data transmission and encryption ratios and maximum compatibility with existing infrastructures and commercial hardware that support MQTT technology. This approach utilizes local MQTT brokers and TLS tunnels to secure local sensor data transmissions. This design enhances security and maintains the efficiency of data flow across the network. The primary objective moving forward is to refine and identify algorithms that ensure optimal data transmission and encryption ratios and uphold maximum compatibility with existing infrastructures that support MQTT technology. This is critical as MQTT is a standard protocol for IoT communications.
Safeguarding Sensitive Data in the Era of IoT: A Study on Security Protocols for Distributed Measurement Systems
Gentile A. F.;Lamonaca F.
2024-01-01
Abstract
IoT devices have led to the development of Distributed Measurement Systems (DMS). However, cyber-attacks have increased, making it crucial to implement security protocols without reducing network throughput. Open firmware on constrained devices offers another layer of customization, essential for the flexibility required in DMS. This allows software updates and modifications in real-time, which is crucial for adapting to evolving cybersecurity threats and managing device functionality. The objective is to identify algorithms that ensure optimal data transmission and encryption ratios and maximum compatibility with existing infrastructures and commercial hardware that support MQTT technology. This approach utilizes local MQTT brokers and TLS tunnels to secure local sensor data transmissions. This design enhances security and maintains the efficiency of data flow across the network. The primary objective moving forward is to refine and identify algorithms that ensure optimal data transmission and encryption ratios and uphold maximum compatibility with existing infrastructures that support MQTT technology. This is critical as MQTT is a standard protocol for IoT communications.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.