Securing the IoT Application Layer From an MQTT Protocol Perspective: Challenges and Research Prospects

被引:10
|
作者
Lakshminarayana, Sujitha [1 ]
Praseed, Amit [2 ]
Thilagam, P. Santhi [1 ]
机构
[1] Natl Inst Technol Karnataka, Comp Sci & Engn Dept, Surathkal 575025, India
[2] Natl Inst Technol Calicut, Comp Sci & Engn Dept, Kozhikode 673601, India
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2024年 / 26卷 / 04期
关键词
Internet of Things; Protocols; Security; Surveys; Cameras; Pediatrics; Standards; IoT; application layer; MQTT; vulnerabilities; attacks; taxonomy; testing; detection; defense; INTRUSION DETECTION; INTERNET; ATTACKS; THINGS; COMMUNICATION; SYSTEMS; THREATS; VULNERABILITIES; DEVICES;
D O I
10.1109/COMST.2024.3372630
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is one of the most promising new millennial technologies, having numerous applications in our surrounding environment. The fundamental goal of an IoT system is to ensure effective communication between users and their devices, which is accomplished through the application layer of IoT. For this reason, the security of protocols employed at the IoT application layer are extremely significant. Message Queuing Telemetry Transport (MQTT) is being widely adopted as the application layer protocol for resource-constrained IoT devices. The reason for the widespread usage of the MQTT protocol in IoT devices is its highly appealing features, such as packet-agnostic communication, high scalability, low power consumption, low implementation cost, fast and reliable message delivery. These capabilities of the MQTT protocol make it a potential and viable target for adversaries. Therefore, we initially emphasize on the emerging MQTT vulnerabilities and provide a classification of identified MQTT vulnerabilities for the IoT paradigm. Then, this paper reviews attacks against the MQTT protocol and the corresponding defense mechanisms for MQTT-based IoT deployments. Furthermore, MQTT attacks are categorized and investigated with reference to crucial characteristics that aid in comprehending how these attacks are carried out. The defense mechanisms are discussed in detail, with a particular focus on techniques for identifying vulnerabilities, detecting and preventing attacks against the MQTT protocol. This work also discloses lessons learned by identifying and providing insightful findings, open challenges, and future research directions. Such a discussion is anticipated to propel more research efforts in this burgeoning area and pave a secure path toward expanding and fully realizing the MQTT protocol in IoT technology.
引用
收藏
页码:2510 / 2546
页数:37
相关论文
共 43 条
  • [1] A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)
    Quincozes, Vagner E.
    Quincozes, Silvio E.
    Kazienko, Juliano F.
    Gama, Simone
    Cheikhrouhou, Omar
    Koubaa, Anis
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 1975 - 2002
  • [2] Characterization of threats in IoT from an MQTT protocol-oriented dataset
    Castaneda, Angel Luis Munoz
    Mata, Jose Antonio Aveleira
    Alaiz-Moreton, Hector
    COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (05) : 5281 - 5296
  • [3] DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications
    Praseed, Amit
    Thilagam, P. Santhi
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01): : 661 - 685
  • [4] Effective Feature Engineering Framework for Securing MQTT Protocol in IoT Environments
    Al Hanif, Abdulelah
    Ilyas, Mohammad
    SENSORS, 2024, 24 (06)
  • [5] Security of IoT Application Layer Protocols: Challenges and Findings
    Nebbione, Giuseppe
    Calzarossa, Maria Carla
    FUTURE INTERNET, 2020, 12 (03):
  • [6] Securing MQTT protocol for IoT environment using IDS based on ensemble learning
    Hayette Zeghida
    Mehdi Boulaiche
    Ramdane Chikh
    International Journal of Information Security, 2023, 22 : 1075 - 1086
  • [7] Securing MQTT protocol for IoT environment using IDS based on ensemble learning
    Zeghida, Hayette
    Boulaiche, Mehdi
    Chikh, Ramdane
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 1075 - 1086
  • [8] On securing IoT from Deep Learning perspective
    Otoum, Yazan
    Nayak, Amiya
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 1159 - 1165
  • [9] From IoT to Cloud: Applications and Performance of the MQTT Protocol
    Borsatti, Davide
    Cerroni, Walter
    Tonini, Federico
    Raffaelli, Carla
    2020 22ND INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON 2020), 2020,
  • [10] A Certificate Based Authorization and Protected Application Layer Protocol For IoT
    Premalatha, T.
    Duraisamy, S.
    2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,