MQTT Vulnerabilities, Attack Vectors and Solutions in the Internet of Things (IoT)

被引:35
作者
Hintaw, Ahmed J. [1 ,2 ]
Manickam, Selvakumar [1 ]
Aboalmaaly, Mohammed Faiz [2 ]
Karuppayah, Shankar [1 ]
机构
[1] Univ Sains Malaysia, Natl Adv Ctr NAv6 IPv6, George Town, Penang, Malaysia
[2] Alsafwa Univ Coll, Dept Comp Tech Engn, Kerbala, Iraq
关键词
COaP; Data communication protocols; DPWS; Internet of things; MQTT; MQTT threats; Publish-subscribe; Security; XMPP; SECURITY CHALLENGES; ENCRYPTION; MECHANISM; PROTOCOL; DDOS;
D O I
10.1080/03772063.2021.1912651
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of Things (IoT) paved the way for devices and machine communication using TCP/IP protocol. Lightweight and stateless communication is imperative especially in a situation requiring conservation of energy usage, e.g. wireless sensor network. Representational State Transfer (REST) API method is based on web communication protocol, Hyper-Text Transfer Protocol (HTTP), and is widely used in IoT messaging. Some of these protocols are DPWS, XMPP, MQTT, COaP, AMQP. Among these protocols, MQTT is the most preferred protocol and is expected to be the de facto messaging IoT standard. MQTT uses a publisher/subscriber model to facilitate messaging between devices making messaging lightweight. Nevertheless, there are a number of security issues due to the design of the protocol itself. Some of the issues are denial of service, identity spoofing, information disclosure, elevation of privileges and data tampering. These issues can be caused by both internal and external perpetrators. Researchers have proposed various security techniques and mechanisms to address these issues. Incorporation of security has added processing overhead to the devices and this will have a bearing on IoT devices that are powered by a battery. This issue has opened up new research challenges in making the protocols more lightweight and at the same time not compromising the level of security provided.
引用
收藏
页码:3368 / 3397
页数:30
相关论文
共 169 条
  • [1] A. VAULT,, 2016, BRUTE FORCE ATTACK M
  • [2] Treatment of respiratory virus infections
    Abed, Yacine
    Boivin, Guy
    [J]. ANTIVIRAL RESEARCH, 2006, 70 (02) : 1 - 16
  • [3] Abomhara M., 2015, J. Cyber Security Mobility, V4, P65
  • [4] Ahamed T, 2018, INT J COMPUT COMMUN, V13, P915
  • [5] Akamai, 2014, SPIK DDOS TOOLK
  • [6] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [7] Fog-based local and remote policy enforcement for preserving data privacy in the Internet of Things
    Al-Hasnawi, Abduljaleel
    Carr, Steven M.
    Gupta, Ajay
    [J]. INTERNET OF THINGS, 2019, 7
  • [8] Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol
    Alaiz-Moreton, Hector
    Aveleira-Mata, Jose
    Ondicol-Garcia, Jorge
    Luis Munoz-Castaneda, Angel
    Garcia, Isaias
    Benavides, Carmen
    [J]. COMPLEXITY, 2019, 2019
  • [9] Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
    AlFardan, Nadhem J.
    Paterson, Kenneth G.
    [J]. 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, : 526 - 540
  • [10] Alghamdi TA, 2013, TOP HIST PHIL, P163, DOI 10.1109/FGCT.2013.6767217