MQTT Vulnerabilities, Attack Vectors and Solutions in the Internet of Things (IoT)

被引:43
作者
Hintaw, Ahmed J. [1 ,2 ]
Manickam, Selvakumar [1 ]
Aboalmaaly, Mohammed Faiz [2 ]
Karuppayah, Shankar [1 ]
机构
[1] Univ Sains Malaysia, Natl Adv Ctr NAv6 IPv6, George Town, Penang, Malaysia
[2] Alsafwa Univ Coll, Dept Comp Tech Engn, Kerbala, Iraq
关键词
COaP; Data communication protocols; DPWS; Internet of things; MQTT; MQTT threats; Publish-subscribe; Security; XMPP; SECURITY CHALLENGES; ENCRYPTION; MECHANISM; PROTOCOL; DDOS;
D O I
10.1080/03772063.2021.1912651
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of Things (IoT) paved the way for devices and machine communication using TCP/IP protocol. Lightweight and stateless communication is imperative especially in a situation requiring conservation of energy usage, e.g. wireless sensor network. Representational State Transfer (REST) API method is based on web communication protocol, Hyper-Text Transfer Protocol (HTTP), and is widely used in IoT messaging. Some of these protocols are DPWS, XMPP, MQTT, COaP, AMQP. Among these protocols, MQTT is the most preferred protocol and is expected to be the de facto messaging IoT standard. MQTT uses a publisher/subscriber model to facilitate messaging between devices making messaging lightweight. Nevertheless, there are a number of security issues due to the design of the protocol itself. Some of the issues are denial of service, identity spoofing, information disclosure, elevation of privileges and data tampering. These issues can be caused by both internal and external perpetrators. Researchers have proposed various security techniques and mechanisms to address these issues. Incorporation of security has added processing overhead to the devices and this will have a bearing on IoT devices that are powered by a battery. This issue has opened up new research challenges in making the protocols more lightweight and at the same time not compromising the level of security provided.
引用
收藏
页码:3368 / 3397
页数:30
相关论文
共 169 条
[61]  
FPAnalyst, 2016, ATT THINGS
[62]  
Fysarakis K, 2016, IEEE GLOB COMM CONF, DOI 10.1109/GLOCOM.2016.7842383
[63]  
Gomes YF, 2015, I SYMP CONSUM ELECTR, P200, DOI 10.1109/ICCE.2015.7066380
[64]  
Goodnight E. Z., 2017, WHAT IS SHATTERED SH
[65]   Understanding Cloud Computing Vulnerabilities [J].
Grobauer, Bernd ;
Walloschek, Tobias ;
Stoecker, Elmar .
IEEE SECURITY & PRIVACY, 2011, 9 (02) :50-57
[66]   Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network [J].
Guerrero-Sanchez, Alma E. ;
Rivas-Araiza, Edgar A. ;
Luis Gonzalez-Cordoba, Jose ;
Toledano-Ayala, Manuel ;
Takacs, Andras .
SENSORS, 2020, 20 (10)
[67]   AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things [J].
HaddadPajouh, Hamed ;
Khayami, Raouf ;
Dehghantanha, Ali ;
Choo, Kim-Kwang Raymond ;
Parizi, Reza M. .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (20) :16119-16133
[68]  
Harsha MS, 2018, 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P2244, DOI 10.1109/ICACCI.2018.8554472
[69]  
Hayashi K., 2014, IoT worm used to mine cryptocurrency
[70]   Security Challenges in the IP-based Internet of Things [J].
Heer, Tobias ;
Garcia-Morchon, Oscar ;
Hummen, Rene ;
Keoh, Sye Loong ;
Kumar, Sandeep S. ;
Wehrle, Klaus .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (03) :527-542