{"id":"https://openalex.org/W7129019212","doi":"https://doi.org/10.3390/jsan15010022","title":"Enhanced MQTT Protocol for Securing Big Data/Hadoop Data Management","display_name":"Enhanced MQTT Protocol for Securing Big Data/Hadoop Data Management","publication_year":2026,"publication_date":"2026-02-16","ids":{"openalex":"https://openalex.org/W7129019212","doi":"https://doi.org/10.3390/jsan15010022"},"language":"en","primary_location":{"id":"doi:10.3390/jsan15010022","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jsan15010022","pdf_url":"https://www.mdpi.com/2224-2708/15/1/22/pdf?version=1771238860","source":{"id":"https://openalex.org/S2736633529","display_name":"Journal of Sensor and Actuator Networks","issn_l":"2224-2708","issn":["2224-2708"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Sensor and Actuator Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2224-2708/15/1/22/pdf?version=1771238860","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022088724","display_name":"Ferdaous kamoun-abid","orcid":null},"institutions":[{"id":"https://openalex.org/I142899784","display_name":"University of Sfax","ror":"https://ror.org/04d4sd432","country_code":"TN","type":"education","lineage":["https://openalex.org/I142899784"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Ferdaous Kamoun-Abid","raw_affiliation_strings":["New Technologies and Communication Systems Laboratory, National School of Electronics and Telecommunications, Sfax 3018, Tunisia"],"affiliations":[{"raw_affiliation_string":"New Technologies and Communication Systems Laboratory, National School of Electronics and Telecommunications, Sfax 3018, Tunisia","institution_ids":["https://openalex.org/I142899784"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043462979","display_name":"Amel meddeb-Makhlouf meddeb-Makhlouf","orcid":null},"institutions":[{"id":"https://openalex.org/I142899784","display_name":"University of Sfax","ror":"https://ror.org/04d4sd432","country_code":"TN","type":"education","lineage":["https://openalex.org/I142899784"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Amel Meddeb-Makhlouf","raw_affiliation_strings":["New Technologies and Communication Systems Laboratory, National School of Electronics and Telecommunications, Sfax 3018, Tunisia"],"affiliations":[{"raw_affiliation_string":"New Technologies and Communication Systems Laboratory, National School of Electronics and Telecommunications, Sfax 3018, Tunisia","institution_ids":["https://openalex.org/I142899784"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5022088724"],"corresponding_institution_ids":["https://openalex.org/I142899784"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39550619,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"1","first_page":"22","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.1316000074148178,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.1316000074148178,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.10750000178813934,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.09179999679327011,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6205000281333923},{"id":"https://openalex.org/keywords/mqtt","display_name":"MQTT","score":0.5224000215530396},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.49900001287460327},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.44510000944137573},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4424999952316284},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4323999881744385},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.41440001130104065},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4115000069141388},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.40209999680519104},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.3727000057697296}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8769999742507935},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6205000281333923},{"id":"https://openalex.org/C132868160","wikidata":"https://www.wikidata.org/wiki/Q10322548","display_name":"MQTT","level":3,"score":0.5224000215530396},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49970000982284546},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.49900001287460327},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.44510000944137573},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4424999952316284},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4323999881744385},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.41440001130104065},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4115000069141388},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.40209999680519104},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3727000057697296},{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.36579999327659607},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.36489999294281006},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.36399999260902405},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3637000024318695},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.33480000495910645},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.33169999718666077},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.329800009727478},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.32120001316070557},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.32109999656677246},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.3208000063896179},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3012000024318695},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2906999886035919},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.28760001063346863},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28600001335144043},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2689000070095062},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.2635999917984009},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.26170000433921814},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.2612999975681305},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.25609999895095825},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.25519999861717224},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.2531999945640564},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jsan15010022","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jsan15010022","pdf_url":"https://www.mdpi.com/2224-2708/15/1/22/pdf?version=1771238860","source":{"id":"https://openalex.org/S2736633529","display_name":"Journal of Sensor and Actuator Networks","issn_l":"2224-2708","issn":["2224-2708"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Sensor and Actuator Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0f141594bd744d2897f03e75bee09832","is_oa":true,"landing_page_url":"https://doaj.org/article/0f141594bd744d2897f03e75bee09832","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Sensor and Actuator Networks, Vol 15, Iss 1, p 22 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jsan15010022","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jsan15010022","pdf_url":"https://www.mdpi.com/2224-2708/15/1/22/pdf?version=1771238860","source":{"id":"https://openalex.org/S2736633529","display_name":"Journal of Sensor and Actuator Networks","issn_l":"2224-2708","issn":["2224-2708"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Sensor and Actuator Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7129019212.pdf","grobid_xml":"https://content.openalex.org/works/W7129019212.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W112964067","https://openalex.org/W2727655671","https://openalex.org/W2786321307","https://openalex.org/W2806255535","https://openalex.org/W3010443706","https://openalex.org/W3026115049","https://openalex.org/W3033136171","https://openalex.org/W3168924973","https://openalex.org/W3193489073","https://openalex.org/W3194799414","https://openalex.org/W3198218884","https://openalex.org/W4220704354","https://openalex.org/W4293364733","https://openalex.org/W4317620952","https://openalex.org/W4321097842","https://openalex.org/W4362612809","https://openalex.org/W4380538283","https://openalex.org/W4382050394","https://openalex.org/W4390982945","https://openalex.org/W4400018669","https://openalex.org/W4401609424","https://openalex.org/W4402303524","https://openalex.org/W4409651768","https://openalex.org/W4411902645","https://openalex.org/W4412458895","https://openalex.org/W4413684120","https://openalex.org/W4415715642","https://openalex.org/W7083454205","https://openalex.org/W7125828170"],"related_works":[],"abstract_inverted_index":{"Big":[0],"data":[1,5,16,104,125,161,194,237],"has":[2],"significantly":[3],"transformed":[4],"processing":[6,197],"and":[7,15,38,57,75,97,115,128,151,186,196,223,249],"analytics":[8],"across":[9],"various":[10],"domains.":[11],"However,":[12],"ensuring":[13],"security":[14,32,250],"confidentiality":[17,63,195],"in":[18,35,67,148,199],"distributed":[19],"platforms":[20],"such":[21],"as":[22],"Hadoop":[23,68,81,91,201,240],"remains":[24],"a":[25,120,166,212],"challenging":[26],"task.":[27],"Distributed":[28],"environments":[29],"face":[30],"major":[31],"issues,":[33],"particularly":[34,157],"the":[36,49,62,84,124,130,137,174,177,207,231,234],"management":[37],"protection":[39,168],"of":[40,51,64,123,145,176,179,209,236],"large-scale":[41,103,200],"data.":[42],"In":[43],"this":[44],"article,":[45],"we":[46,60,87,118,204,252],"focus":[47],"on":[48,110],"cost":[50],"secure":[52],"information":[53,65],"transmission,":[54],"implementation":[55],"complexity,":[56],"scalability.":[58],"Furthermore,":[59],"address":[61],"stored":[66],"by":[69],"analyzing":[70],"different":[71,189],"AES":[72,181],"encryption":[73,182],"modes":[74,183],"examining":[76],"their":[77],"potential":[78],"to":[79,192,220],"enhance":[80],"security.":[82],"At":[83,230],"application":[85],"layer,":[86],"operate":[88],"within":[89,239],"our":[90],"environment":[92],"using":[93,211,243],"an":[94],"extended,":[95],"secure,":[96],"widely":[98],"used":[99],"MQTT":[100,112],"protocol":[101,133],"for":[102,140,159],"communication.":[105],"This":[106,132,163],"approach":[107],"is":[108,173,241],"based":[109],"implementing":[111],"with":[113,188],"TLS,":[114],"before":[116],"connecting,":[117],"add":[119],"hash":[121],"verification":[122,214],"nodes\u2019":[126],"identities":[127],"send":[129],"JWT.":[131],"uses":[134],"TCP":[135,146],"at":[136],"transport":[138],"layer":[139,172],"underlying":[141],"transmission.":[142],"The":[143,170],"advantage":[144],"lies":[147],"its":[149],"reliability":[150],"small":[152],"header":[153],"size,":[154],"making":[155],"it":[156],"suitable":[158],"big":[160],"environments.":[162],"work":[164],"proposes":[165],"triple-layer":[167],"framework.":[169],"first":[171],"assessment":[175],"performance":[178,247],"existing":[180],"(CTR,":[184],"CBC,":[185],"GCM)":[187],"key":[190],"sizes":[191],"optimize":[193],"efficiency":[198],"deployments.":[202],"Afterwards,":[203],"propose":[205],"evaluating":[206],"integrity":[208,235],"DataNodes":[210],"novel":[213],"mechanism":[215],"that":[216],"employs":[217],"SHA-3-256":[218],"hashing":[219],"authenticate":[221],"nodes":[222],"prevent":[224],"unauthorized":[225],"access":[226],"during":[227],"cluster":[228],"initialization.":[229],"third":[232],"tier,":[233],"blocks":[238],"ensured":[242],"SHA-3-256.":[244],"Through":[245],"extensive":[246],"testing":[248],"validation,":[251],"demonstrate":[253],"integration.":[254]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-02-17T00:00:00"}
