Book Image

MQTT Essentials - A Lightweight IoT Protocol

5 (1)
Book Image

MQTT Essentials - A Lightweight IoT Protocol

5 (1)

Overview of this book

This step-by-step guide will help you gain a deep understanding of the lightweight MQTT protocol. We’ll begin with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. Then, you will use best practices to secure the MQTT Mosquitto broker to ensure that only authorized clients are able to publish and receive messages. Once you have secured the broker with the appropriate configuration, you will develop a solution that controls a drone with Python. Further on, you will use Python on a Raspberry Pi 3 board to process commands and Python on Intel Boards (Joule, Edison and Galileo). You will then connect to the MQTT broker, subscribe to topics, send messages, and receive messages in Python. You will also develop a solution that interacts with sensors in Java by working with MQTT messages. Moving forward, you will work with an asynchronous API with callbacks to make the sensors interact with MQTT messages. Following the same process, you will develop an iOS app with Swift 3, build a website that uses WebSockets to connect to the MQTT broker, and control home automation devices with HTML5, JavaScript code, Node.js and MQTT messages
Table of Contents (16 chapters)
MQTT Essentials - A Lightweight IoT Protocol
About the Author
About the Reviewer
Customer Feedback

Testing the MQTT TLS configuration with MQTT-spy

Now, we will use the MQTT-spy GUI utility to generate another MQTT client that uses an encrypted connection to publish messages to another topic that will match the sensors/+/altitude topic filter, sensors/drone500/altitude. Follow the next steps:

  1. Launch MQTT-spy.

  2. Select Connections | New connection or Connections | Manage connections in case you were already running MQTT-spy or have saved previous settings. The Connection list dialog box will appear.

  3. Click on the Connectivity tab and make sure MQTT 3.1.1 is selected in the Protocol version dropdown.

  4. Click on the Security tab and on the TLS tab below the User auth. tab.

  5. Select CA certificate& client certificate/key in the TLS/SSL mode dropdown.

  6. Select TLSv1.2 in the Protocol dropdown.

  7. Enter or select the full path to the ca.crt file that you created in the certificates folder in the CA certificate file textbox.

  8. Enter or select the full path to the device001.crt file that you created in the certificates...