Performance Impact Analysis of Securing MQTT Using TLS

Performance Impact Analysis of Securing MQTT Using TLS

Performance Impact Analysis of Securing MQTT Using TLS Thomas Prantl, Lukas Iffländer, Stefan Chrisitan Krupitzer Herrnleben, Simon Engel, Samuel Kounev [email protected] {firstname.lastname}@uni-wuerzburg.de University of Hohenheim, Germany University of Würzburg, Germany ABSTRACT an excessive number of resource-constrained devices. One com- The interconnectivity of devices on the Internet of Things (IoT) monly applied protocol for communication in the IoT is the Message provides many new and smart applications. However, the integra- Queuing Telemetry Transport (MQTT) protocol [15]. MQTT is a tion of many devices—especially by inexperienced users—might lightweight publish-subscribe messaging protocol enabling effi- introduce several security threats. Further, several often used com- cient communication of IoT devices. A central instance—called the munication protocols in the IoT domain are not out-of-the-box message broker—manages subscriptions and delivers the messages secured. On the other hand, security inherently introduces over- instead of passing directly from one client to another. This protocol head, resulting in a decrease in performance. The Message Queuing is used, for example, in the context of smart home and industrial Telemetry Transport (MQTT) protocol is a popular communication applications [8]. Despite all the convenience that smart IoT devices protocol for IoT applications—for example, in Industry 4.0, railways, offer, one should keep in mind where the intelligence of suchsys- automotive, or smart homes. This paper analyzes the influence on tems originates. It results from voluntarily surrounding ourselves performance when using MQTT with TLS in terms of throughput, with sensors that collect data about our environment, including connection build-up times, and energy efficiency using a repro- personal data. That data is processed remotely and yields AI-driven ducible testbed based on a standard off-the-shelf microcontroller. reasoning. Accordingly, IoT device owners should have a genuine The results indicate that the impact of TLS on performance across interest in the security of their data and devices—especially con- all QoS levels depends on (i) the network situation and (ii) the con- sidering that IoT devices, on average, already suffer attacks five nection reestablishment frequency. Thus, a negative influence of minutes after their connection to the Internet [12]. TLS on the performance is noticeable only in deteriorated network Due to these security risks, a correspondingly high scientific in- situations or at a high reestablishment frequency. terest level in researching new security mechanisms for MQTT and examining them concerning the required performance exists (e.g., KEYWORDS [16, 20]). However, often works overlook that security mechanisms for making MQTT secure already exist for many applications and Pub/Sub, MQTT, IoT, TLS, Performance are just not used. For example, in applications in which the broker ACM Reference Format: is trustworthy, TLS can prevent data such as usernames and pass- Thomas Prantl, Lukas Iffländer, Stefan Herrnleben, Simon Engel, Samuel words from being transmitted in plaintext, making the hijacking Kounev and Chrisitan Krupitzer. 2021. Performance Impact Analysis of of IoT devices much more difficult. Several studies already investi- Securing MQTT Using TLS. In ICPE ’21: International Conference on Perfor- gated the use of TLS [1, 3, 4, 19, 23]. However, those publications mance Engineering, April 19–23, 2021, Rennes, France. ACM, New York, NY, do not contain all information regarding the used software (e.g., USA, 8 pages. https://doi.org/doi-tba the MQTT or TLS implementations), workloads, metrics, measure- ment setup, and, respectively, accuracy. They often do not consider 1 INTRODUCTION all three Quality of Service (QoS) levels of MQTT and completely ignore different network conditions. Those types of information A “smart” future based on the interaction of intelligent devices are essential for ensuring their experiments’ reproducibility and in the Internet of Things (IoT) is becoming a reality as promising their results’ validity [14]. applications in areas as smart cities, smart traffic, smart homes, or In this paper, we present and document our reproducible per- smart health show. IoT devices are the foundation of this “smart” formance measurements and analysis with well-described metrics. future. Those typically relatively small devices equipped with sen- The used measurement scripts and the source code for the adapted sors are often particularly resource-constrained and communicate MQTT client are available online1. Our analysis focuses on the with each other and cloud services. Various lightweight commu- performance loss when using MQTT with TLS in terms of through- nication protocols emerged to facilitate communication between put, broker connection establishment times, and energy efficiency. Using these analyses, we answer the relevant question for develop- Permission to make digital or hard copies of all or part of this work for personal or ers, whether securing MQTT using TLS has a significant negative classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation impact on performance in typical IoT scenarios. Our contributions on the first page. Copyrights for components of this work owned by others than ACM are threefold: must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a • The design of a reproducible testbed for measurements of fee. Request permissions from [email protected]. MQTT, which supports the use of TLS, all QoS levels, and ICPE ’21, April 19–23, 2021, ICPE, Rennes, France © 2021 Association for Computing Machinery. ACM ISBN isbn - tba...$price - tba https://doi.org/doi-tba 1https://gitlab2.... ADD URL ICPE ’21, April 19–23, 2021, ICPE, Rennes, France Prantl, et al. different network scenarios, using a standard off-the-shelf encryption between two directly communicating devices. The use microcontroller; of TLS combined with MQTT can not guarantee end-to-end en- • the definition of suitable metrics including error measures cryption between publishers and subscribers, but only encryption considering the underlying measurement accuracy; and between publisher and broker or broker and subscriber. Therefore, • analyzing the impact of combining MQTT with TLS on the the use of TLS with MQTT requires that the broker is trusted since throughput, broker connection establishment times, and en- it can read all messages. In practice, this is often the case since IoT ergy efficiency using our testbed. devices’ owners often also provide and control the broker. The remainder of this paper is structured as follows. In Section 2, we describe the basics of MQTT and TLS, followed by an overview 3 RELATED WORK of related work in Section 3. Next, Section 4 describes our testbed design. Then, Section 5 presents the used workload patterns and In this section, we discuss related literature in the area of perfor- metrics. Following in Section 6, we present the evaluation of the mance analysis of MQTT with TLS. Thereby, we also highlight the performance impact of combining MQTT with TLS. Lastly, Section 7 novelty of our contribution. concludes this paper with a summary and future work. The authors from [4] and the subsequent publication [3] propose a dynamic procedure to decide which TLS cipher suite fits best, depending on the remaining energy, desired encryption strength, 2 BACKGROUND and message length. The authors present a self-adaptive approach For a better understanding of our setup, measurements, and their of TLS but do not consider different network situations or QoS evaluation and design, this section explains the basic functionalities levels and do not compare MQTT with and without TLS. Necessary of MQTT and TLS. The explanations of MQTT and TLS originate information for reproducibility is missing (e.g., the used MQTT from [6, 13, 18]. libraries), and there is also no information about the accuracy of the obtained results. 2.1 Message Queuing Telemetry Transport In [19], the authors compare, among other things, MQTT with (MQTT) all QoS levels with and without TLS. The authors also state the accuracy of their measurement results, but do not specify how the MQTT is a lightweight Machine-to-Machine-protocol implement- accuracy is determined. They also do not consider different network ing a publish-subscribe architecture. In MQTT, several clients— situations and information about the used workload and testbed which can be publisher and subscriber—and a central message (like the used access point or libraries) is incomplete. broker interact. If a client wants to send a message, it publishes it The authors of [1, 23] determine the performance of all MQTT under a specified topic at the message broker. The message broker QoS levels without TLS in [23] and with TLS in [1]. However, it is forwards this message to all clients that previously subscribed to impossible to compare using MQTT with and without TLS as they this topic. There is no direct communication between the clients use different hardware. Furthermore, both papers lack a detailed eliminating coupling in time, space, and synchronization [7]. description of (i) the measurement setup (e.g., the MQTT client im- For each message published, the publisher

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us