AUPS: An Open Source AUthenticated Publish/Subscribe system for the Internet of Things

@article{Rizzardi2016AUPSAO,
  title={AUPS: An Open Source AUthenticated Publish/Subscribe system for the Internet of Things},
  author={Alessandra Rizzardi and Sabrina Sicari and Daniele Miorandi and Alberto Coen-Porisini},
  journal={Inf. Syst.},
  year={2016},
  volume={62},
  pages={29-41}
}
Abstract The arising of the Internet of Things (IoT) is enabling new service provisioning paradigms, able to leverage heterogeneous devices and communication technologies. Efficient and secure communication mechanisms represent a key enabler for the wider adoption and diffusion of IoT systems. One of the most widely employed protocols in IoT and machine-to-machine communications is the Message Queue Telemetry Transport (MQTT), a lightweight publish/subscribe messaging protocol designed for… CONTINUE READING
BETA

Citations

Publications citing this paper.
SHOWING 1-10 OF 20 CITATIONS

A risk assessment methodology for the Internet of Things

VIEW 6 EXCERPTS
CITES BACKGROUND, METHODS & RESULTS
HIGHLY INFLUENCED

Access Control on Internet of Things based on Publish/Subscribe using Authentication Server and Secure Protocol

  • 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)
  • 2018
VIEW 1 EXCERPT
CITES METHODS

Assessment of Message Queue Telemetry and Transport (MQTT) protocol with Symmetric Encryption

  • 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)
  • 2018
VIEW 1 EXCERPT
CITES METHODS

Solving Interoperability within the Smart Building: A Real Test-Bed

  • 2018 IEEE International Conference on Communications Workshops (ICC Workshops)
  • 2018
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 24 REFERENCES

Attribute-based encryption for fine-grained access control of encrypted data

  • ACM Conference on Computer and Communications Security
  • 2006
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Architecting information centric ETSI-M2M systems

  • 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)
  • 2014
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Enforcement of security policy rules for the Internet of Things

  • 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
  • 2014
VIEW 11 EXCERPTS
HIGHLY INFLUENTIAL

Security

S. Sicari, A. Rizzardi, L. A. Grieco, A. Coen-Porisini
  • privacy and trust in Internet of Things: the road ahead, Comput. Netw. 76
  • 2015
VIEW 2 EXCERPTS

Similar Papers