Implementasi Protokol Transport Layer Security pada Internet of Things Berbasis MQTT dan ESP32
Abstract
The security factor is a challenge that must be overcome to encourage the broad implementation of IoT (Internet of Things). The main threat to the Internet of Things is carried out by allowing unauthorized people to access data and misuse personal information, facilitating attacks on other systems, and threatening the personal safety of its users. In this study, testing was carried out on the Internet of Things security gap based on MQTT (Message Queuing Telemetry Transport). Three parameters were tested in this study, namely authentication, data confidentiality, and data integrity. From the research results, there is a security gap in the Internet of Things based on MQTT (Message Queuing Telemetry Transport) in terms of authentication, data confidentiality and data integrity. The transport layer security protocol is able to provide security for MQTT communications by implementing encryption for each packet sent. The effect of ESP32 performance on the device is not significant after the transport layer security protocol is implemented. The average value of the remaining memory load contained in the IoT based on MQTT and ESP32 without the transport layer security protocol is 263410 bytes and the IoT based on MQTT and ESP32 with the implementation of the transport layer security protocol is 223588.7 bytes. Keywords: Internet of Things, Transport Layer Security, Massage Queuing Telemetry Transport, topic,publish,subscribe,TLS, MQTT, IoTPublished
Issue
Section
License
Copyright info for authors
1. Authors hold the copyright in any process, procedure, or article described in the work and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors retain publishing rights to re-use all or portion of the work in different work but can not granting third-party requests for reprinting and republishing the work.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.