2017
DOI: 10.11591/eecsi.v4.1064
|View full text |Cite
|
Sign up to set email alerts
|

Attack Scenarios and Security Analysis of MQTT Communication Protocol in IoT System

Abstract: Various communication protocols are currently used in the Internet of Things (IoT) devices. One of the protocols that are already standardized by ISO is MQTT protocol (ISO / IEC 20922: 2016). Many IoT developers use this protocol because of its minimal bandwidth requirement and low memory consumption. Sometimes, IoT device sends confidential data that should only be accessed by authorized people or devices. Unfortunately, the MQTT protocol only provides authentication for the security mechanism which, by defau… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(23 citation statements)
references
References 9 publications
0
23
0
Order By: Relevance
“…e proposed work aims to create a digital security system linked to the IoT/IIoT and in particular to the MQTT communication protocol to give the research and industrial community a fully realistic framework for its use and implementation. e most relevant dataset that simulates communication and transaction modes in IoT/IIoT, as well as the associated MQTT-based attacks [12,13], was chosen for the most accurate and realistic picture of how M2M communication works. Specifically, the selected dataset came from the recording of IoT network sensor data based on the application of the MQTT protocol, as applied in real automation conditions in a smart home environment.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…e proposed work aims to create a digital security system linked to the IoT/IIoT and in particular to the MQTT communication protocol to give the research and industrial community a fully realistic framework for its use and implementation. e most relevant dataset that simulates communication and transaction modes in IoT/IIoT, as well as the associated MQTT-based attacks [12,13], was chosen for the most accurate and realistic picture of how M2M communication works. Specifically, the selected dataset came from the recording of IoT network sensor data based on the application of the MQTT protocol, as applied in real automation conditions in a smart home environment.…”
Section: Methodsmentioning
confidence: 99%
“…In this sense and recognizing not only the necessity of use but also the vulnerabilities that characterize the communication based on the MQTT protocol, this paper presents an online-semisupervised learning neural anomaly detection system to detect MQTT-based attacks, without special requirements and resources [13].…”
Section: Introductionmentioning
confidence: 99%
“…The data accumulated in our system is primarily stored in the MQTT server. MQTT lacks security in some of its steps, where it does not encrypt the data (Andy, Rahardjo & Hanindhito, 2017). As one of our main motives for this work is to increase the transparency of the trackable data of agricultural products, tamperproofing the historical data is a must.…”
Section: A Blockchainmentioning
confidence: 99%
“…Different attack scenarios are considered as parts of five main categories: DoS, identity spoofing, information disclosure, elevation of privileges, data tampering. [24] considers other MQTT attack classes: attacks against data privacy, authentication and data integrity, port obscurity and botnet over MQTT. [25], [26] propose instead novel security attacks against MQTT, by implementing low-rate denial of service attacks, an emerging category of threats making use of lowbandwidth rate to make a network service unavailable to its intended users.…”
Section: Related Workmentioning
confidence: 99%