2018
DOI: 10.1155/2018/8261746
|View full text |Cite
|
Sign up to set email alerts
|

MQTT Security: A Novel Fuzzing Approach

Abstract: The Internet of Things is a concept that is increasingly present in our lives. The emergence of intelligent devices has led to a paradigm shift in the way technology interacts with the environment, leading society to a smarter planet. Consequently, new advanced telemetry approaches appear to connect all kinds of devices with each other, with companies, or with other networks, such as the Internet. On the road to an increasingly interconnected world, where critical devices rely on communication networks to prov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(24 citation statements)
references
References 24 publications
0
24
0
Order By: Relevance
“…The security mechanism has captured the attention of both academics and business leaders [15]. Since MQTT's mode of operation is the root cause of security problems, it is especially susceptible to cyberattacks [16]. Additionally, many security solutions have been proposed to address the MQTT's security flaws [17][18][19].…”
Section: Mqtt-based Mechanismsmentioning
confidence: 99%
“…The security mechanism has captured the attention of both academics and business leaders [15]. Since MQTT's mode of operation is the root cause of security problems, it is especially susceptible to cyberattacks [16]. Additionally, many security solutions have been proposed to address the MQTT's security flaws [17][18][19].…”
Section: Mqtt-based Mechanismsmentioning
confidence: 99%
“…It mainly focuses on the fuzzing of ordinary programs in IoT firmware but not the network protocols. In [ 40 ], the authors propose a template-based fuzzing method to fuzz the MQTT protocol. The fuzzer is at the man-in-the-middle position between the client and the broker, and it selectively mutates the packets that match the specified types (e.g., PUBLISH messages).…”
Section: Related Workmentioning
confidence: 99%
“…MQTT is widely used for machine‐to‐machine (M2M) communication, and it has become an important component of modern IoT applications, including cloud data transfer, which helps particularly in extreme environments such as the off‐shore sea considered in this work. Moreover, it is commonly used in applications with real‐time or near real‐time requirements, often using constraint devices for which saving power and compute matter, leveraging on an optional Transport Layer Security (TLS, Secure‐MQTT on 8883 port) because MQTT has no native support for security 33,34 . Its first version has been introduced in 1999, while the last release is from 2014 and today MQTT is an open OASIS and ISO standard (ISO/IEC PRF 20922).…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, it is commonly used in applications with real-time or near real-time requirements, often using constraint devices for which saving power and compute matter, leveraging on an optional Transport Layer Security (TLS, Secure-MQTT on 8883 port) because MQTT has no native support for security. 33,34…”
Section: Iot Application Protocolsmentioning
confidence: 99%