Secure Enhancement for MQTT Protocol Using Distributed Machine Learning Framework

被引:5
|
作者
Alotaibi, Nouf Saeed [1 ]
Ahmed, Hassan I. Sayed [2 ]
Kamel, Samah Osama M. [2 ]
Elkabbany, Ghada Farouk [2 ]
机构
[1] Shaqra Univ, Coll Sci & Humanities Al Dawadmi, Dept Comp Sci, Dawadmi City 11911, Saudi Arabia
[2] Elect Res Inst, Informat Dept, Cairo 12622, Egypt
关键词
MQTT protocol; MQTT attacks; distributed machine learning; H2O distributed machine learning algorithms; security IoT;
D O I
10.3390/s24051638
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Message Queuing Telemetry Transport (MQTT) protocol stands out as one of the foremost and widely recognized messaging protocols in the field. It is often used to transfer and manage data between devices and is extensively employed for applications ranging from smart homes and industrial automation to healthcare and transportation systems. However, it lacks built-in security features, thereby making it vulnerable to many types of attacks such as man-in-the-middle (MitM), buffer overflow, pre-shared key, brute force authentication, malformed data, distributed denial-of-service (DDoS) attacks, and MQTT publish flood attacks. Traditional methods for detecting MQTT attacks, such as deep neural networks (DNNs), k-nearest neighbor (KNN), linear discriminant analysis (LDA), and fuzzy logic, may exist. The increasing prevalence of device connectivity, sensor usage, and environmental scalability become the most challenging aspects that novel detection approaches need to address. This paper presents a new solution that leverages an H2O-based distributed machine learning (ML) framework to improve the security of the MQTT protocol in networks, particularly in IoT environments. The proposed approach leverages the strengths of the H2O algorithm and architecture to enable real-time monitoring and distributed detection and classification of anomalous behavior (deviations from expected activity patterns). By harnessing H2O's algorithms, the identification and timely mitigation of potential security threats are achieved. Various H2O algorithms, including random forests, generalized linear models (GLMs), gradient boosting machine (GBM), XGBoost, and the deep learning (DL) algorithm, have been assessed to determine the most reliable algorithm in terms of detection performance. This study encompasses the development of the proposed algorithm, including implementation details and evaluation results. To assess the proposed model, various evaluation metrics such as mean squared error (MSE), root-mean-square error (RMSE), mean per class error (MCE), and log loss are employed. The results obtained indicate that the H2OXGBoost algorithm outperforms other H2O models in terms of accuracy. This research contributes to the advancement of secure IoT networks and offers a practical approach to enhancing the security of MQTT communication channels through distributed detection and classification techniques.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] Secure Cloud Framework Based on Machine learning Approach
    Das, Prasenjit Kumar
    Sinha, Nidul
    Annappa, B.
    JOURNAL OF ALGEBRAIC STATISTICS, 2022, 13 (02) : 1383 - 1390
  • [22] PiRATE: A Blockchain-Based Secure Framework of Distributed Machine Learning in 5G Networks
    Zhou, Sicong
    Huang, Huawei
    Chen, Wuhui
    Zhou, Pan
    Zheng, Zibin
    Guo, Song
    IEEE NETWORK, 2020, 34 (06): : 84 - 91
  • [23] Secure PUF-based Authentication and Key Exchange Protocol using Machine Learning
    Ali-Pour, Amir
    Afghah, Fatemeh
    Hely, David
    Beroulle, Vincent
    Di Natale, Giorgio
    2022 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2022), 2022, : 386 - 389
  • [24] MQTT Poller: an endogenous framework for large-scale MQTT protocol performance evaluation
    da Cunha, Diogo Maciel
    Spohn, Marco Aurelio
    REVISTA BRASILEIRA DE COMPUTACAO APLICADA, 2024, 16 (03): : 37 - 47
  • [25] A Secure Corroboration Protocol for Internet of Things (IoT) Devices Using MQTT Version 5 and LDAP
    Vithanage, Nethmi N. Nanayakkara
    Thanthrige, Sangeeth S. Hetti
    Kapuge, Malsha C. K. Paththini
    Malwenna, Tharindu H.
    Liyanapathirana, Chethana
    Wijekoon, Janaka L.
    35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 837 - 841
  • [26] A Practical Evaluation of a Secure and Energy-Efficient Smart Parking System Using the MQTT Protocol
    Alqazzaz, Ali
    Alharthi, Raed
    Alrashdi, Ibrahim
    Aloufi, Esam
    Zohdy, Mohamed A.
    Ming, Hua
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND DATA MINING (ICISDM 2019), 2019, : 165 - 170
  • [27] Machine Learning Protocol for Secure 5G Handovers
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    Abeka, Silvance Onyango
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2022, 29 (01) : 14 - 35
  • [28] A Novel Framework for Secure Cloud Computing Based IDS Using Machine Learning Techniques
    Tiwari, Geetika
    Jain, Ruchi
    2022 9TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING & MACHINE INTELLIGENCE, ISCMI, 2022, : 258 - 263
  • [29] A Protocol for Secure Verification ofWatermarks Embedded into Machine Learning Models
    Kapusta, Katarzyna
    Thouvenot, Vincent
    Bettan, Olivier
    Beguinet, Hugo
    Senet, Hugo
    PROCEEDINGS OF THE 2021 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2021, 2021, : 171 - 176
  • [30] Machine Learning Protocol for Secure 5G Handovers
    Vincent Omollo Nyangaresi
    Anthony Joachim Rodrigues
    Silvance Onyango Abeka
    International Journal of Wireless Information Networks, 2022, 29 : 14 - 35