Next Article in Journal
Defect Detection in GIS X-Ray Images Based on Improved YOLOv10
Previous Article in Journal
Real-Time Paddle Stroke Classification and Wireless Monitoring in Open Water Using Wearable Inertial Nodes
Previous Article in Special Issue
Privacy Protection in AI Transformation Environments: Focusing on Integrated Log System and AHP Scenario Prioritization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Exploring MQTT Broker-Based, End-to-End Models for Security and Efficiency

1
Department of Information Management, National Chinan University, Nantou County 54561, Taiwan
2
Department of Computer Science & Information Engineering, National Chinan University, Nantou County 54561, Taiwan
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(17), 5308; https://doi.org/10.3390/s25175308 (registering DOI)
Submission received: 21 June 2025 / Revised: 15 August 2025 / Accepted: 18 August 2025 / Published: 26 August 2025

Abstract

MQTT is a publisher–broker–subscriber architecture in which a broker forwards the messages to interested subscribers, which facilitates the broker’s capacity to peek at the message contents; therefore, both academia and industry design and develop end-to-end (E2E) channels to protect the privacy against a curious broker which honestly follows the protocols but would peek at the contents for its benefits. However, we notice that the double-encryption issue of the conventional MQTT broker-based E2E models and the heavy broker-decrypt-re-encrypt overhead undermine MQTT efficiency strengths. In this study, we highlight the weaknesses, propose several solutions, implement the schemes, and experiment with them in the simulated scenarios. Security analysis and formal security proofs are verified to ensure the security goals. The analysis and the evaluations on the implementations confirm both the group key-based approach and the client–broker-channel, integrity-only approach could improve the efficiency performance while preserving security strengths.
Keywords: MQTT; Mosquitto; ECDH; enhanced authentication; end to end MQTT; Mosquitto; ECDH; enhanced authentication; end to end

Share and Cite

MDPI and ACS Style

Chien, H.-Y.; Shih, A.-T.; Huang, Y.-M. Exploring MQTT Broker-Based, End-to-End Models for Security and Efficiency. Sensors 2025, 25, 5308. https://doi.org/10.3390/s25175308

AMA Style

Chien H-Y, Shih A-T, Huang Y-M. Exploring MQTT Broker-Based, End-to-End Models for Security and Efficiency. Sensors. 2025; 25(17):5308. https://doi.org/10.3390/s25175308

Chicago/Turabian Style

Chien, Hung-Yu, An-Tong Shih, and Yuh-Ming Huang. 2025. "Exploring MQTT Broker-Based, End-to-End Models for Security and Efficiency" Sensors 25, no. 17: 5308. https://doi.org/10.3390/s25175308

APA Style

Chien, H.-Y., Shih, A.-T., & Huang, Y.-M. (2025). Exploring MQTT Broker-Based, End-to-End Models for Security and Efficiency. Sensors, 25(17), 5308. https://doi.org/10.3390/s25175308

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop