Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices

被引:92
作者
Dinculeana, Dan [1 ]
Cheng, Xiaochun [1 ]
机构
[1] Middlesex Univ, Fac Sci & Technol, London NW4 4BT, England
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 05期
关键词
Internet of Things (IoT); Message Queue Telemetry Transport (MQTT); Keyed-Hash Message Authentication Code (HMAC); confidentiality; integrity; KEY MANAGEMENT SCHEME;
D O I
10.3390/app9050848
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to protect against such attacks. This paper will review some existing solutions used to secure a communication channel, such as Transport Layer Security or symmetric encryption, as well as provide a novel approach to achieving confidentiality and integrity of messages. The method, called Value-to-Keyed-Hash Message Authentication Code (Value-to-HMAC) mapping, uses signatures to send messages, instead of encryption, by implementing a Keyed-Hash Message Authentication Code generation algorithm. Although robust solutions exist that can be used to secure the communication between devices, this paper considers that not every Internet of Things (IoT) device or network design is able to afford the overhead and drop in performance, or even support such protocols. Therefore, the Value-to-HMAC method was designed to maximize performance while ensuring the messages are only readable by the intended node. The experimental procedure demonstrates how the method will achieve better performance than a symmetric-key encryption algorithm, while ensuring the confidentiality and integrity of information through the use of one mechanism.
引用
收藏
页数:10
相关论文
共 41 条
[21]   A secure IoT-based micro-payment protocol for wearable devices [J].
Bojjagani, Sriramulu ;
Rao, P. V. Venkateswara ;
Vemula, Dinesh Reddy ;
Reddy, B. Ramachandra ;
Lakshmi, T. Jaya .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (02) :1163-1188
[22]   Development of IoT based smart monitor and control system using MQTT protocol and Node-RED for parabolic greenhouse solar drying [J].
Choosumrong S. ;
Hataitara R. ;
Panumonwatee G. ;
Raghavan V. ;
Nualsri C. ;
Phasinam T. ;
Phasinam K. .
International Journal of Information Technology, 2023, 15 (4) :2089-2098
[23]   Distinguishing Between Smartphones and IoT Devices via Network Traffic [J].
Hui, Shuodi ;
Wang, Huandong ;
Xu, Dianlei ;
Wu, Jing ;
Li, Yong ;
Jin, Depeng .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (02) :1182-1196
[24]   A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices [J].
Ebrahimabadi, Mohammad ;
Younis, Mohamed ;
Karimi, Naghmeh .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) :3684-3703
[25]   USING SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY TO SECURE COMMUNICATION BETWEEN DEVICES IN IoT [J].
Henriques, Michelle S. ;
Vernekar, Nagaraj K. .
2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
[26]   Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags [J].
Tewari, Aakanksha ;
Gupta, Brij B. .
INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2020, 16 (03) :20-34
[27]   IoT-ID3PAKA: Efficient and Robust ID-3PAKA Protocol for Resource-Constrained IoT Devices [J].
Parai, Krittibas ;
Gupta, Daya Sagar ;
Islam, S. K. Hafizul .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) :10304-10313
[28]   Machine Learning Methods in Tasks Load Balancing Between IoT Devices and the Cloud [J].
Tishin, Mikhail ;
Mavromoustakis, Constandinos X. ;
Batalla, Jordi Mongay .
IEEE ACCESS, 2024, 12 :133726-133733
[29]   Distributed and Efficient Slot Assignment-Alignment Protocol for Resource-Constrained Wireless IoT Devices [J].
Sarvghadi, Mohammad Ali ;
Wan, Tat-Chee .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) :8754-8772
[30]   Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags [J].
Aakanksha Tewari ;
B. B. Gupta .
The Journal of Supercomputing, 2017, 73 :1085-1102