Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol

被引:43
|
作者
Firdous, Syed Naeem [1 ]
Baig, Zubair [1 ]
Valli, Craig [1 ]
Ibrahim, Ahmed [1 ]
机构
[1] Edith Cowan Univ, Sch Sci, Secur Res Inst, Churchlands, WA, Australia
关键词
IoT; Security; MQTT; Threat Modelling; INTERNET; THINGS;
D O I
10.1109/iThings-GreenCom-CPSCom-SmartData.2017.115
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) paradigm is changing the way people live and work in society. Advancements in various information and communication technologies have paved the way for new possibilities and opportunities both in households and industries to build such an Internet of connected devices. However, these devices possess capabilities that enable control from anywhere and at anytime. The exploitation of these capabilities make these devices potential and viable targets for adversaries. Middleware-based IoT application protocols play a crucial role in enabling bidirectional communication and remote control of IoT devices. Among the various IoT application protocols, Message Queuing Telemetry Protocol (MQTT) is being widely adopted. The possible threats in MQTT-based IoT environments need to be identified before applying appropriate countermeasures. In this paper, we present the MQTT threat model and perform an evaluation of the Denial of Service (DoS) attack that targets MQTT brokers.
引用
收藏
页码:748 / 755
页数:8
相关论文
共 50 条
  • [1] Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol
    Alaiz-Moreton, Hector
    Aveleira-Mata, Jose
    Ondicol-Garcia, Jorge
    Luis Munoz-Castaneda, Angel
    Garcia, Isaias
    Benavides, Carmen
    COMPLEXITY, 2019, 2019
  • [2] IoT-based Urban Traffic-Light Control: Modelling, Prototyping and Evaluation of MQTT protocol
    Zitouni, Rafik
    Pefit, Jeremy
    Djoudi, Aghiles
    George, Laurent
    2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2019, : 182 - 189
  • [3] IoT Applications based on MQTT Protocol
    Salagean, Maria
    Zinca, Daniel
    2020 14TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2020, : 375 - 378
  • [4] A Network Intrusion Detection System using Deep Learning against MQTT Attacks in IoT
    Mosaiyebzadeh, Fatemeh
    Araujo Rodriguez, Luis Gustavo
    Batista, Daniel Macedo
    Hirata Jr, R.
    2021 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM 2021), 2021,
  • [5] Modeling and evaluation of a new IoT security system for mitigating DoS attacks to the MQTT broker
    Potrino, Giuseppe
    De Rango, Floriano
    Santamaria, Amilcare Francesco
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [6] Leveraging Balanced Logic Gates as Strong PUFs for Securing IoT Against Malicious Attacks
    Yu, Weize
    Wen, Yiming
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2019, 35 (06): : 853 - 865
  • [7] Leveraging Balanced Logic Gates as Strong PUFs for Securing IoT Against Malicious Attacks
    Weize Yu
    Yiming Wen
    Journal of Electronic Testing, 2019, 35 : 853 - 865
  • [8] DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol
    Alatram, Alaa
    Sikos, Leslie F.
    Johnstone, Mike
    Szewczyk, Patryk
    Kang, James Jin
    COMPUTER NETWORKS, 2023, 231
  • [9] Development of the IoT module using MQTT Protocol and AES
    Guo, Jr-Hung
    Yuan, Lin Tzu
    Hsia, Kuo-Hsien
    PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS (ICAROB 2021), 2021, : 56 - 60
  • [10] Development of the IoT Module using MQTT Protocol and AES
    Guo, Jr-Hung
    Lin, Tzu-Yuan
    Hsia, Kuo-Hsien
    PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS (ICAROB 2021), 2021, : P59 - P59