Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol

被引:46
|
作者
Firdous, Syed Naeem [1 ]
Baig, Zubair [1 ]
Valli, Craig [1 ]
Ibrahim, Ahmed [1 ]
机构
[1] Edith Cowan Univ, Sch Sci, Secur Res Inst, Churchlands, WA, Australia
关键词
IoT; Security; MQTT; Threat Modelling; INTERNET; THINGS;
D O I
10.1109/iThings-GreenCom-CPSCom-SmartData.2017.115
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) paradigm is changing the way people live and work in society. Advancements in various information and communication technologies have paved the way for new possibilities and opportunities both in households and industries to build such an Internet of connected devices. However, these devices possess capabilities that enable control from anywhere and at anytime. The exploitation of these capabilities make these devices potential and viable targets for adversaries. Middleware-based IoT application protocols play a crucial role in enabling bidirectional communication and remote control of IoT devices. Among the various IoT application protocols, Message Queuing Telemetry Protocol (MQTT) is being widely adopted. The possible threats in MQTT-based IoT environments need to be identified before applying appropriate countermeasures. In this paper, we present the MQTT threat model and perform an evaluation of the Denial of Service (DoS) attack that targets MQTT brokers.
引用
收藏
页码:748 / 755
页数:8
相关论文
共 50 条
  • [31] Formal-Based Modeling and Analysis of a Network Communication Protocol for IoT: MQTT Protocol
    Hcine, Jamila
    Ben Hafaiedh, Imene
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT'18), VOL.2, 2020, 147 : 350 - 360
  • [32] PERFORMANCE EVALUATION OF MQTT PROTOCOL IN INTERNET OF THINGS
    Murthy M.Y.B.
    Kumar G.V.S.
    Mrudula K.
    Shaik R.
    Prasad S.K.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2023, 82 (08): : 51 - 57
  • [33] Characterization of threats in IoT from an MQTT protocol-oriented dataset
    Castaneda, Angel Luis Munoz
    Mata, Jose Antonio Aveleira
    Alaiz-Moreton, Hector
    COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (05) : 5281 - 5296
  • [34] Attack Scenarios and Security Analysis of MQTT Communication Protocol in IoT System
    Andy, Syaiful
    Rahardjo, Budi
    Hanindhito, Bagus
    2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), 2017, : 571 - 575
  • [35] Effective Feature Engineering Framework for Securing MQTT Protocol in IoT Environments
    Al Hanif, Abdulelah
    Ilyas, Mohammad
    SENSORS, 2024, 24 (06)
  • [36] Implementation of MQTT Protocol in Health Care Based on IoT Systems: A Study
    Tareq, Roaa Wadullah
    Khaleel, Turkan Ahmed
    INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING SYSTEMS, 2021, 12 (04) : 215 - 223
  • [37] Using the MQTT Protocol in Real Time for Synchronizing IoT Device State
    Shaout, Adnan
    Crispin, Brennan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (3A) : 515 - 521
  • [38] Dynamic bridge generation for IoT data exchange via the MQTT protocol
    Schmitt, Alexandre
    Carlier, Florent
    Renault, Valerie
    9TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2018) / THE 8TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2018) / AFFILIATED WORKSHOPS, 2018, 130 : 90 - 97
  • [39] Intelligent Parking Cloud Services based on IoT using MQTT Protocol
    Dhar, Prarna
    Gupta, Poonam
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 30 - 34
  • [40] Implementation and Evaluation of an Intrusion Detection System for IoT: Against Routing Attacks
    Khardioui, Mohamed
    Bamou, Abdelouahed
    Ouadghiri, My Driss El
    Aghoutane, Badraddine
    ADVANCED INTELLIGENT SYSTEMS FOR SUSTAINABLE DEVELOPMENT, AI2SD'2019, VOL 6: ADVANCED INTELLIGENT SYSTEMS FOR NETWORKS AND SYSTEMS, 2020, 92 : 155 - 166