{"id":"https://openalex.org/W4391215967","doi":"https://doi.org/10.1109/tdsc.2024.3358630","title":"MQTT-I: Achieving End-to-End Data Flow Integrity in MQTT","display_name":"MQTT-I: Achieving End-to-End Data Flow Integrity in MQTT","publication_year":2024,"publication_date":"2024-01-25","ids":{"openalex":"https://openalex.org/W4391215967","doi":"https://doi.org/10.1109/tdsc.2024.3358630"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3358630","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3358630","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011745542","display_name":"Francesco Buccafurri","orcid":"https://orcid.org/0000-0003-0448-8464"},"institutions":[{"id":"https://openalex.org/I59725666","display_name":"University of Reggio Calabria","ror":"https://ror.org/041sz8d87","country_code":"IT","type":"education","lineage":["https://openalex.org/I59725666"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Francesco Buccafurri","raw_affiliation_strings":["DIIES Dept., University Mediterranea of Reggio Calabria, Reggio Calabria, Italy","DIIES Dept., University Mediterranea of Reggio Calabria, Via dell'Universita 25, Reggio Calabria, Italy"],"affiliations":[{"raw_affiliation_string":"DIIES Dept., University Mediterranea of Reggio Calabria, Reggio Calabria, Italy","institution_ids":["https://openalex.org/I59725666"]},{"raw_affiliation_string":"DIIES Dept., University Mediterranea of Reggio Calabria, Via dell'Universita 25, Reggio Calabria, Italy","institution_ids":["https://openalex.org/I59725666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086191958","display_name":"Vincenzo De Angelis","orcid":"https://orcid.org/0000-0001-9731-3641"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Vincenzo De Angelis","raw_affiliation_strings":["DIMES Dept., University of Calabria, Arcavacata, Italy","DIMES Dept., University of Calabria, Via P.Bucci, 87036 Arcavacata di Rende, Cosenza, Italy"],"affiliations":[{"raw_affiliation_string":"DIMES Dept., University of Calabria, Arcavacata, Italy","institution_ids":["https://openalex.org/I45204951"]},{"raw_affiliation_string":"DIMES Dept., University of Calabria, Via P.Bucci, 87036 Arcavacata di Rende, Cosenza, Italy","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018525310","display_name":"Sara Lazzaro","orcid":"https://orcid.org/0000-0002-0846-4980"},"institutions":[{"id":"https://openalex.org/I59725666","display_name":"University of Reggio Calabria","ror":"https://ror.org/041sz8d87","country_code":"IT","type":"education","lineage":["https://openalex.org/I59725666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Sara Lazzaro","raw_affiliation_strings":["DIIES Dept., University Mediterranea of Reggio Calabria, Reggio Calabria, Italy","DIIES Dept., University Mediterranea of Reggio Calabria, Via dell'Universita 25, Reggio Calabria, Italy"],"affiliations":[{"raw_affiliation_string":"DIIES Dept., University Mediterranea of Reggio Calabria, Reggio Calabria, Italy","institution_ids":["https://openalex.org/I59725666"]},{"raw_affiliation_string":"DIIES Dept., University Mediterranea of Reggio Calabria, Via dell'Universita 25, Reggio Calabria, Italy","institution_ids":["https://openalex.org/I59725666"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011745542"],"corresponding_institution_ids":["https://openalex.org/I59725666"],"apc_list":null,"apc_paid":null,"fwci":26.9397,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.99605949,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"21","issue":"5","first_page":"4717","last_page":"4734"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mqtt","display_name":"MQTT","score":0.9430229663848877},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8494030833244324},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5813437104225159},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5710091590881348},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5360949635505676},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48951828479766846},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.46165525913238525},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.44535404443740845},{"id":"https://openalex.org/keywords/end-to-end-principle","display_name":"End-to-end principle","score":0.42848140001296997},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.2135831117630005},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.18906155228614807}],"concepts":[{"id":"https://openalex.org/C132868160","wikidata":"https://www.wikidata.org/wiki/Q10322548","display_name":"MQTT","level":3,"score":0.9430229663848877},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8494030833244324},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5813437104225159},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5710091590881348},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5360949635505676},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48951828479766846},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.46165525913238525},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.44535404443740845},{"id":"https://openalex.org/C74296488","wikidata":"https://www.wikidata.org/wiki/Q2527392","display_name":"End-to-end principle","level":2,"score":0.42848140001296997},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.2135831117630005},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.18906155228614807},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3358630","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3358630","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W2137705","https://openalex.org/W121432690","https://openalex.org/W1490341282","https://openalex.org/W1566345534","https://openalex.org/W1632195884","https://openalex.org/W1853400974","https://openalex.org/W2016865288","https://openalex.org/W2027281287","https://openalex.org/W2031857348","https://openalex.org/W2038704326","https://openalex.org/W2048099096","https://openalex.org/W2069667482","https://openalex.org/W2079493184","https://openalex.org/W2098931293","https://openalex.org/W2102881299","https://openalex.org/W2169731081","https://openalex.org/W2410685830","https://openalex.org/W2417363734","https://openalex.org/W2514873781","https://openalex.org/W2547926162","https://openalex.org/W2590920222","https://openalex.org/W2609495336","https://openalex.org/W2787170874","https://openalex.org/W2792358013","https://openalex.org/W2793196814","https://openalex.org/W2897114917","https://openalex.org/W2911348539","https://openalex.org/W2914962155","https://openalex.org/W2927160209","https://openalex.org/W2932317951","https://openalex.org/W2965865530","https://openalex.org/W2969553274","https://openalex.org/W2971927531","https://openalex.org/W2980759111","https://openalex.org/W2981797988","https://openalex.org/W2991680473","https://openalex.org/W2997750674","https://openalex.org/W2998692792","https://openalex.org/W3015952374","https://openalex.org/W3110900633","https://openalex.org/W3136156468","https://openalex.org/W3164214938","https://openalex.org/W3215903849","https://openalex.org/W4205617251","https://openalex.org/W4236786653","https://openalex.org/W4247388100","https://openalex.org/W4285037303","https://openalex.org/W4285078286","https://openalex.org/W4293767047","https://openalex.org/W4313163337","https://openalex.org/W4313855700","https://openalex.org/W4361981215","https://openalex.org/W4362514666","https://openalex.org/W6763082449","https://openalex.org/W6779434386"],"related_works":["https://openalex.org/W4387259453","https://openalex.org/W2397192327","https://openalex.org/W2144564205","https://openalex.org/W2141006951","https://openalex.org/W3152823548","https://openalex.org/W2154676777","https://openalex.org/W2952942094","https://openalex.org/W4319993352","https://openalex.org/W3159877768","https://openalex.org/W3174284130"],"abstract_inverted_index":{"MQTT":[0,12],"has":[1,48],"become":[2],"the":[3,8,38,46,56,98,111,126,129,157,164,181],"de":[4],"facto":[5],"standard":[6,11],"in":[7,37,55,97,116,190],"IoT.":[9],"Although":[10],"lacks":[13],"built-in":[14],"security":[15,183],"features,":[16],"several":[17],"proposals":[18],"have":[19],"been":[20],"made":[21],"to":[22,31,67,103,162,178],"address":[23],"this":[24,69],"gap.":[25],"Unfortunately,":[26],"no":[27],"existing":[28],"proposal":[29],"aims":[30],"offer":[32],"end-to-end":[33,80],"data":[34,81,102,105],"flow":[35,82],"integrity":[36,149],"threat":[39],"model":[40],"of":[41,58,100,114,143,192],"untrusted":[42],"broker.":[43],"Consider":[44],"that,":[45],"broker":[47],"a":[49,73],"privileged":[50],"role,":[51],"since":[52],"it":[53],"is":[54,86],"middle":[57],"communication":[59],"between":[60,167],"publishers":[61,119,135],"and":[62,120,124,136,145,169,175,194],"subscribers.":[63],"Our":[64,84,107],"paper":[65],"attempts":[66],"bridge":[68],"gap":[70],"by":[71,88],"introducing":[72],"new":[74],"protocol":[75],"called":[76],"MQTT-I,":[77],"which":[78],"achieves":[79],"integrity.":[83,106],"solution":[85,108,159],"inspired":[87],"approaches":[89],"based":[90],"on":[91],"Merkle":[92],"Hash":[93],"Trees,":[94],"commonly":[95],"used":[96],"context":[99],"outsourced":[101],"guarantee":[104],"aligns":[109],"with":[110,186],"specific":[112],"nature":[113],"MQTT,":[115],"which:":[117],"(1)":[118],"subscribers":[121,137],"dynamically":[122],"join":[123],"leave":[125],"system,":[127],"(2)":[128],"decoupling":[130],"principle":[131],"holds,":[132],"meaning":[133],"that":[134,180],"do":[138],"not":[139],"establish":[140],"any":[141],"form":[142],"agreement,":[144],"(3)":[146],"data,":[147],"whose":[148],"should":[150],"be":[151],"protected,":[152],"are":[153],"multi-topic":[154],"streams.":[155],"Moreover,":[156],"proposed":[158],"allows":[160],"us":[161],"find":[163],"right":[165],"balance":[166],"performance":[168],"security.":[170],"We":[171],"perform":[172],"both":[173],"theoretical":[174],"experimental":[176],"analysis":[177],"demonstrate":[179],"introduced":[182],"features":[184],"come":[185],"an":[187],"acceptable":[188],"overhead":[189],"terms":[191],"computational":[193],"energy":[195],"cost.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":24},{"year":2024,"cited_by_count":8}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
