Secure Vehicle to vehicle voice chat based MQTT and CoAP internet of things protocol

Noor A. Hussein, Mohamed Ibrahim. Shujaa


The congestion of road traffic is one of the most problems facing the ambulance transportation to provide fast healthcare service for patient. In this work, ambulance tracking with messages transfer system has been designed and implemented such that a central monitoring and tracking unit can observe ambulance using MQTT IoT protocol. Where each vehicle is occupied with an intelligent embedded system (Raspberry Pi) unit. When an ambulance is being in the road, it will communicate with other vehicle or road traffic by means of CoAP IoT protocol as a direct device to device communication. The proposed system has been designed such that driver use voice chat and the system are completely hand free. The voice message is being transfer into text by using speech recognition based Google API library, and then the received text message is converted again to speech by using text to speech algorithm. An encryption–decryption process-based stream cipher has been used. The message between IoT nodes has been encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message.


(IoT), MQTT Protocol, CoAP Protocol, V2V, VANET, speech recognition, Voice chat, Raspberry pi, OTP, DNA, LFSR.


Ray, P.P., "A survey on Internet of Things architectures," Journal of King Saud Universit Computer and Information Sciences, vol. 30(3), pp.291-319, 2018.

Kamaruddin, F., Malik, N.N.N.A., Murad, N.A., Latiff, N.M.A.A., Yusof, S.K.S. and Hamzah, S.A., "IoT-based intelligent irrigation management and monitoring system using arduino," Telkomnika, vol. 17(5), pp.2378-2388,2019.

Li, S., Da Xu, L. and Zhao, S., "5G Internet of Things: A survey," Journal of Industrial Information Integration, vol. (10), pp.1-9, 2018.

Eze, E.C., Zhang, S.J., Liu, E.J. and Eze, J.C.," Advances in vehicular ad-hoc networks (VANETs): Challenges and road-map for future development," International Journal of Automation and Computing, vol. 3(1), pp.1-18, 2016.

laba, F.A., Othman, M., Hashem, I.A.T. and Alotaibi, F., "Internet of Things security: A survey," Journal of Network and Computer Applications, vol. (88), pp.10-28,2017.

Pereira, G.C., Alves, R.C., Silva, F.L.D., Azevedo, R.M., Albertini, B.C. and Margi, C.B., "Performance evaluation of cryptographic algorithms over IoT platforms and operating systems," Security and Communication Networks. Volume, pp.16, 2017.

Azuaje, R., "Securing IoT: Hardware vs Software," Journal of Advances in Information Technology Vol, 9(3).pp.79-83, 2018.

Rachmawanto, E.H., "An improved security and message capacity using AES and Huffman coding on image steganography," System (HVS), vol. 9, p.10, 2019.

Mektoubi, A.; Hassani, H. L.; Belhadaoui, H.; and Rifi, M.; Zakari , A., "New approach for securing communication over MQTT protocol a comparaison between RSA and Elliptic Curve," Third International Conference on Systems of Collaboration (SysCo), Casablanca, Moroco, pp.1-6,2016.

Huang, J.; Tsai ,Po.; and Liao, I, "implementing publish/subscribe pattern for CoAP in fog computing environment," IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, Canada (BC), pp. 198-203,2017.

Venkatesh, H., Perur, S.D. and Jagadish, M.C. An approach to make way for intelligent ambulance using IoT. In International Journal of Electrical and Electronics Research, vol.3 (1), pp.218-223, 2015.

Mittal, Y., Toshniwal, P., Sharma, S., Singhal, D., Gupta, R. and Mittal, V.K., "A voice-controlled multi-functional smart home automation system," In Annual IEEE India Conference (INDICON), pp. 1-6, 2015.

Misbahuddin, S., Zubairi, J.A., Saggaf, A., Basuni, J., Sulaiman, A. and Al-Sofi, "A.: IoT based dynamic road traffic management for smart cities," In: 12th International Conference on High-capacity Optical Networks and Enabling/Emerging Technologies (HONET), pp. 1-5, 2015.

Ahsan, M., Haider, J., McManis, J. and Hashmi, M.S.J, "Developing intelligent software interface for wireless monitoring of vehicle speed and management of associated data," IET Wireless Sensor Systems, vol. 6, pp. 90-99, 2016.

Dhall, R. and Solanki, V, "An IoT Based Predictive Connected Car Maintenance," International Journal of Interactive Multimedia & Artificial Intelligence, vol. 4(3), 2017.

[14] Anwar, T.; Kumar, A.; and Paul, S., "DNA Cryptography Based on Symmetric Key Exchange," International Journal of Engineering and Technology (IJET), vol. 7(3), pp.938-950, 2015.

[15] Begum, M.; Ferdush, J.; and Moazzam, G.M., "A Hybrid Cryptosystem using DNA, OTP and RSA," International Journal of Computer Applications, vol. 172, pp. 0975-8887, 2017.

Wardana, A.A.; and Perdana, R.S., "Access Control on Internet of Things based on Publish/Subscribe using Authentication Server and Secure Protocol," 10th International Conference on Information Technology and Electrical Engineering (ICITEE), Kuta, India, pp.118-123, 2018.

Ibrahim, A.K.M., Rashid, R.A., Hamid, A.H.F.A., Sarijari, M.A. and Baharudin, M.A., "Lightweight IoT middleware for rapid application development," Telkomnika,vol.17(3), pp.1385-1392.

Ngu, A.H., Gutierrez, M., Metsis, V., Nepal, S. and Sheng, Q.Z., " IoT middleware: A survey on issues and enabling technologies," IEEE Internet of Things Journal, vol.4 (1), pp.1-20, 2016.

Mayub, A., Shidiq, M.R., Oktiawati, U.Y. and Rosyid, N.R., "Implementation smart home using Internet of Things (IoT)," Telkomnika, vol. 17(6), 2019.

Krishna, P.G., Ravi, K.S., Kumar, V.S. and Kumar, M.S., "Implementation of MQTT protocol on Low Resourced Embedded Network," Int. J. Pure Appl. Math. IJPAM, vol.116, pp.161-166, 2017.

Iglesias-Urkia, M., Orive, A. and Urbieta, A., "Analysis of CoAP implementations for industrial Internet of Things: A survey," Procedia Computer Science, vol.109, pp.188-195, 2017.

Kaur, J., & Kaler, N., "Design and Implementation of an OTP Based Data Security Model Incoperating AES and Sha2 in Cloud Environment," International Journal of Computers & Technology, vol. 17, pp. 7081-7091, 2018.

Narendrakumar, S., Razaque, A., Patel, V., Almi’ani, M., Rizvi, S.S. and Hans, A., "Token security for internet of things," International Journal of Embedded Systems, vol. 10, pp.334-343, 2018.

Vadaviya, D.O.; and Prof. Tandel, P.H., "Secure Encryption Techniques Using DNA Computation," International Journal of Modern Trends in Engineering and Research, pp. 2349-9745,2015

Zhang, X.; Zhou, Z.; and Niu, Y., "An Image Encryption Method Based on the Feistel Network and Dynamic DNA encoding," IEEE Photonics Journal, vol. 10, pp.1-14, 2018.

Wu, G., Wang, K., Zhang, J. and He, J., "A lightweight and efficient encryption scheme based on LFSR," International Journal of Embedded Systems, vol. 10, pp.225-232, 2018.

Total views : 55 times


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

shopify stats IJEECS visitor statistics