2022
DOI: 10.3390/iot3040024
|View full text |Cite
|
Sign up to set email alerts
|

Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control

Abstract: The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT devices such as smart bulbs, smart switches, and control gateways. However, the main challenge for such control systems is how to maximize security under limited resources such as low-processing power, low memory, low data rate, and low-bandwidth IoT networks. In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 53 publications
0
7
0
Order By: Relevance
“…Several considerations, including the type of device and the task it will carry out, determine the optimal protocol for every given Internet of Things application. Constraint Application Protocol (CoAP) [16][17][18] and Message Queueing Telemetry Transport (MQTT) [19][20][21] are the most often used application protocols. CoAP was developed to let low-power, low-resource devices connect to the Internet of Things via slow, unreliable networks.…”
Section: Application Layermentioning
confidence: 99%
“…Several considerations, including the type of device and the task it will carry out, determine the optimal protocol for every given Internet of Things application. Constraint Application Protocol (CoAP) [16][17][18] and Message Queueing Telemetry Transport (MQTT) [19][20][21] are the most often used application protocols. CoAP was developed to let low-power, low-resource devices connect to the Internet of Things via slow, unreliable networks.…”
Section: Application Layermentioning
confidence: 99%
“…The overall design begins with the hardware components of the incubator, including sensors, actuators, and microcontrollers responsible for reading sensor data. This sensor data is subsequently transmitted to the IoT broker via a Wi-Fi network, utilizing the MQTT protocol [28].…”
Section: Materials and Methods 31 System Overviewmentioning
confidence: 99%
“…Clients who register with a broker and are interested in specific types of messages are known as Subscribers. Therefore, both publishers and subscribers establish a connection with the broker [37]. The MQTT server is responsible for the authentication and authorization of MQTT clients.…”
Section: Methodsmentioning
confidence: 99%