| Literature DB >> 35336347 |
Abstract
In the current era of smart homes and smart grids, complex technical systems that allow for the automation of domestic functions are rapidly growing and becoming more widely available. A wide range of technologies and software applications are now available for use in smart homes, and many of them are free to use. They allow for communication between home appliances and their users, as well as the automation, monitoring, and remote-control capabilities of home appliances themselves. Unfortunately, a lot of previous research ignored security issues involving the great attention to detail of the data in a transmission session within the devices in smart home architectures, which is why this study proposed smart grid secured transmission flags suitable for preventing every bit of data transmission in a smart home. Secure Message Queueing Transport Protocol (MQTT) in Internet of Things (IoT) Smart Homes protocols was utilized; an experimental testbed was designed with a prototype involving the process of a smart home system and the sequences of the data transmission. The evaluation of the proposed strategies has shown an improved bi-directional secure resource constraint strategy for the smart home within data packet transmission at 70 to 80 mbps over secure MQTT. A number of concerns, including technological barriers, difficulties, challenges, and future trends, as well as the role of users, have been presented in this study, among others.Entities:
Keywords: Internet of Things; bi-directional transmission; secure MQTT protocol; smart home
Mesh:
Year: 2022 PMID: 35336347 PMCID: PMC8955741 DOI: 10.3390/s22062174
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1MQTT publish-subscribe model.
Figure 2The conceptual smart home MQTT model.
Figure 3The functional requirement for smart home MQTT model.
Figure 4The conceptual smart home MQTT model.
Figure 5The secure MQTT model.
Figure 6The interaction views with the smart home MQTT model.
Figure 7The verification rate of obscureness.
Transmission sessions captured data.
| Ses | ts/m | tt/kb | as/kb | ta/s | td/ms | tm/ms | ad/ms | ft/ms | ap/ms | V1/kb | V2/kb | V3/kb |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| S1 | 7.1 | 406.6 | 74.6 | 25.102 | 288.6 | 50.6 | 282.6 | 21.6 | 267.6 | 64.6 | 10.544 | 6.813 |
| S2 | 7.1 | 406.6 | 266.6 | 27.202 | 302.6 | 56.6 | 85.6 | 26.6 | 65.6 | 64.6 | 21.68 | 7.3281 |
| S3 | 7.1 | 406.6 | 406.6 | 29.176 | 65.6 | 55.6 | 62.6 | 31.6 | 37.6 | 64.6 | 29.8 | 7.628 |
| S4 | 106.6 | 406.6 | 406.6 | 29.183 | 67.6 | 59.6 | 62.6 | 31.6 | 37.6 | 64.6 | 29.8 | 7.627 |
| S5 | 976.6 | 406.6 | 108.6 | 14.07 | 1366.6 | 52.6 | 79.6 | 31.6 | 54.6 | 64.6 | 12.516 | 7.393 |
| S6 | 666.6 | 406.6 | 406.6 | 29.187 | 68.6 | 58.6 | 62.6 | 31.6 | 37.6 | 64.6 | 29.8 | 7.627 |
| S7 | 7.1 | 406.6 | 406.6 | 29.184 | 80.6 | 44.6 | 62.6 | 31.6 | 37.6 | 64.6 | 29.8 | 7.627 |
| S8 | 666.6 | 406.6 | 406.6 | 29.183 | 74.6 | 54.6 | 62.6 | 31.6 | 37.6 | 64.6 | 29.8 | 7.627 |
| S9 | 666.6 | 406.6 | 406.6 | 29.183 | 74.6 | 54.6 | 62.6 | 31.6 | 37.6 | 64.6 | 29.8 | 7.627 |
| S10 | 666.6 | 406.6 | 406.6 | 29.183 | 74.6 | 54.6 | 62.6 | 31.6 | 37.6 | 64.6 | 29.8 | 7.627 |
Ses = transmission session, ts(m) = ranges, tt = initial transmitted data (kb) as = second transmission data (s) tx = transmission, td = third round, tm = fourth transmission time, fd = second to last transmission time, ap = last transmission time, V1 = secure MQTT data packet, V2 = secure MQTT data packet, V3 = secure MQTT data packet size in bytes.