Securing the IoT Application Layer From an MQTT Protocol Perspective: Challenges and Research Prospects

被引:10
|
作者
Lakshminarayana, Sujitha [1 ]
Praseed, Amit [2 ]
Thilagam, P. Santhi [1 ]
机构
[1] Natl Inst Technol Karnataka, Comp Sci & Engn Dept, Surathkal 575025, India
[2] Natl Inst Technol Calicut, Comp Sci & Engn Dept, Kozhikode 673601, India
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2024年 / 26卷 / 04期
关键词
Internet of Things; Protocols; Security; Surveys; Cameras; Pediatrics; Standards; IoT; application layer; MQTT; vulnerabilities; attacks; taxonomy; testing; detection; defense; INTRUSION DETECTION; INTERNET; ATTACKS; THINGS; COMMUNICATION; SYSTEMS; THREATS; VULNERABILITIES; DEVICES;
D O I
10.1109/COMST.2024.3372630
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is one of the most promising new millennial technologies, having numerous applications in our surrounding environment. The fundamental goal of an IoT system is to ensure effective communication between users and their devices, which is accomplished through the application layer of IoT. For this reason, the security of protocols employed at the IoT application layer are extremely significant. Message Queuing Telemetry Transport (MQTT) is being widely adopted as the application layer protocol for resource-constrained IoT devices. The reason for the widespread usage of the MQTT protocol in IoT devices is its highly appealing features, such as packet-agnostic communication, high scalability, low power consumption, low implementation cost, fast and reliable message delivery. These capabilities of the MQTT protocol make it a potential and viable target for adversaries. Therefore, we initially emphasize on the emerging MQTT vulnerabilities and provide a classification of identified MQTT vulnerabilities for the IoT paradigm. Then, this paper reviews attacks against the MQTT protocol and the corresponding defense mechanisms for MQTT-based IoT deployments. Furthermore, MQTT attacks are categorized and investigated with reference to crucial characteristics that aid in comprehending how these attacks are carried out. The defense mechanisms are discussed in detail, with a particular focus on techniques for identifying vulnerabilities, detecting and preventing attacks against the MQTT protocol. This work also discloses lessons learned by identifying and providing insightful findings, open challenges, and future research directions. Such a discussion is anticipated to propel more research efforts in this burgeoning area and pave a secure path toward expanding and fully realizing the MQTT protocol in IoT technology.
引用
收藏
页码:2510 / 2546
页数:37
相关论文
共 43 条
  • [21] Implementing and Testing of Internet of Things (IoT) Technology in Agriculture and Compare the Application Layer Protocols: Message Queuing Telemetry Transport (MQTT) and Hyper Text Transport Protocol (HTTP)
    Sri, J. Maha Kavya
    Narendra, V. G.
    Pai, Vidya
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, ICAICR 2019, PT II, 2019, 1076 : 320 - 333
  • [22] Deep learning application in smart cities: recent development, taxonomy, challenges and research prospects
    Muhammad, Amina N.
    Aseere, Ali M.
    Chiroma, Haruna
    Shah, Habib
    Gital, Abdulsalam Y.
    Hashem, Ibrahim Abaker Targio
    NEURAL COMPUTING & APPLICATIONS, 2021, 33 (07) : 2973 - 3009
  • [23] IoT-Enabled Supply Chain Management From a Customer Perspective: Challenges and Opportunities
    Fu, Lei
    Pan, Runyu
    Gu, Tianbo
    Cheng, Xiuzhen
    Zhang, Huanle
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 1579 - 1589
  • [24] Survey, comparison and research challenges of IoT application protocols for smart farming
    Glaroudis, Dimitrios
    Iossifides, Athanasios
    Chatzimisios, Periklis
    COMPUTER NETWORKS, 2020, 168
  • [25] IoT-based DDoS on Cyber Physical Systems: Research Challenges, Datasets and Future Prospects
    Snehi, Manish
    Bhandari, Abhinav
    2022 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2022, : 387 - 394
  • [26] A Review on the Security of IoT Networks: From Network Layer's Perspective
    Jahangeer, Asma
    Bazai, Sibghat Ullah
    Aslam, Saad
    Marjan, Shah
    Anas, Muhammad
    Hashemi, Sayed Habibullah
    IEEE ACCESS, 2023, 11 : 71073 - 71087
  • [27] An Improved Publish-Subscribe Method In Application Layer Protocol For IoT
    Deogirikar, Jyoti
    Vidhate, Amarsinh
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 1070 - 1075
  • [28] Impact of the Application Layer Protocol on Energy Consumption, 4G Utilization and Performance How the Application Layer Protocol strengthens Green IoT
    Hofer, Johannes
    Pawaskar, Sachin
    2018 3RD CLOUDIFICATION OF THE INTERNET OF THINGS (CIOT), 2018,
  • [29] Intelligent Manufacturing From the Perspective of Industry 5.0: Application Review and Prospects
    Lei, Ziang
    Shi, Jianhua
    Luo, Ziren
    Cheng, Minghao
    Wan, Jiafu
    IEEE ACCESS, 2024, 12 : 167436 - 167451
  • [30] VE-CoAP: A constrained application layer protocol for IoT video transmission
    Ghotbou, Arvin
    Khansari, Mohammad
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 173