“…Most of the works related to MQTT protocol available in the literature focus on performance evaluation (Fehrenbach, 2017;Gündoğan et al, 2018;Lee et al, 2013;Luzuriaga et al, 2015;Scalagent, 2015;Thangavel et al, 2014;Yokotani & Sasaki, 2016), proposing security enhancements to the existing protocol (Mektoubi et al, 2016;Shin et al, 2016;Singh et al, 2015), formal modelling (Aziz, 2016;Houimli et al, 2017) and security evaluation (Andy et al, 2017;Firdous et al, 2017;Perrone et al, 2017).…”