Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security 2017
DOI: 10.5220/0006287302460253
|View full text |Cite
|
Sign up to set email alerts
|

The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 60 publications
(15 citation statements)
references
References 7 publications
0
15
0
Order By: Relevance
“…Nevertheless, it is often up to the developer to choose the mechanisms most appropriate to the specific application requirements. In addition, as pointed out by Perrone et al [22], the standard mainly refers to simple scenarios and does not discuss details of complex scenarios, such as broker interconnections and synchronization mechanisms between brokers. Therefore, these issues require additional research efforts.…”
Section: Mitigationsmentioning
confidence: 99%
“…Nevertheless, it is often up to the developer to choose the mechanisms most appropriate to the specific application requirements. In addition, as pointed out by Perrone et al [22], the standard mainly refers to simple scenarios and does not discuss details of complex scenarios, such as broker interconnections and synchronization mechanisms between brokers. Therefore, these issues require additional research efforts.…”
Section: Mitigationsmentioning
confidence: 99%
“…Most of the works related to MQTT protocol available in the literature focus on performance evaluation (Fehrenbach, 2017;Gündoğan et al, 2018;Lee et al, 2013;Luzuriaga et al, 2015;Scalagent, 2015;Thangavel et al, 2014;Yokotani & Sasaki, 2016), proposing security enhancements to the existing protocol (Mektoubi et al, 2016;Shin et al, 2016;Singh et al, 2015), formal modelling (Aziz, 2016;Houimli et al, 2017) and security evaluation (Andy et al, 2017;Firdous et al, 2017;Perrone et al, 2017).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Our work is different from the study presented in Fehrenbach (2017) as the focus of this work is on modelling DoS attacks by varying the parameters in control packets and assessing their impact on various MQTT brokers and deployment scenarios. Perrone et al (2017) presented a security analysis of MQTT protocol and described the various security requirements for IoT deployments. In another work, Andy et al Andy et al (2017) presented some attack scenarios as well as a security analysis of the MQTT protocol.…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to the review presented in [11] the botnet network Mirai has challenged the world society in the context of cyberattacks, when devices gained unauthorized access to other devices to execute a malicious code. The authors pointed out the main security mechanisms that must be employed to prevent such incidents.…”
Section: Related Workmentioning
confidence: 99%
“…As presented in [1,11,12,25,26], it is suggested to employ the TLS protocol to provide secure authentication between devices and the gateway. This protocol has two stages.…”
Section: Algorithmmentioning
confidence: 99%