Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol

被引:46
|
作者
Firdous, Syed Naeem [1 ]
Baig, Zubair [1 ]
Valli, Craig [1 ]
Ibrahim, Ahmed [1 ]
机构
[1] Edith Cowan Univ, Sch Sci, Secur Res Inst, Churchlands, WA, Australia
关键词
IoT; Security; MQTT; Threat Modelling; INTERNET; THINGS;
D O I
10.1109/iThings-GreenCom-CPSCom-SmartData.2017.115
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) paradigm is changing the way people live and work in society. Advancements in various information and communication technologies have paved the way for new possibilities and opportunities both in households and industries to build such an Internet of connected devices. However, these devices possess capabilities that enable control from anywhere and at anytime. The exploitation of these capabilities make these devices potential and viable targets for adversaries. Middleware-based IoT application protocols play a crucial role in enabling bidirectional communication and remote control of IoT devices. Among the various IoT application protocols, Message Queuing Telemetry Protocol (MQTT) is being widely adopted. The possible threats in MQTT-based IoT environments need to be identified before applying appropriate countermeasures. In this paper, we present the MQTT threat model and perform an evaluation of the Denial of Service (DoS) attack that targets MQTT brokers.
引用
收藏
页码:748 / 755
页数:8
相关论文
共 50 条
  • [41] Characterization of threats in IoT from an MQTT protocol-oriented dataset
    Ángel Luis Muñoz Castañeda
    José Antonio Aveleira Mata
    Héctor Aláiz-Moretón
    Complex & Intelligent Systems, 2023, 9 : 5281 - 5296
  • [42] A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol
    Wan, Chen
    Mehmood, Amjad
    Carsten, Maple
    Epiphaniou, Gregory
    Lloret, Jaime
    2022 9TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, IOTSMS, 2022, : 44 - 51
  • [43] Web-based IoT and Robot SCADA using MQTT protocol
    Guo, Jr-Hung
    Lin, Tzu-Yuan
    Hsia, Kuo-Hsien
    JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE, 2022, 9 (02): : 202 - 208
  • [44] Security against Attacks and Malicious Code Execution in Mobile Agent Using IBF-CPABE Protocol
    Jolly, Prabhjot Kaur
    Batra, Shalini
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (02) : 1155 - 1169
  • [45] Security against Attacks and Malicious Code Execution in Mobile Agent Using IBF-CPABE Protocol
    Prabhjot Kaur Jolly
    Shalini Batra
    Wireless Personal Communications, 2019, 107 : 1155 - 1169
  • [46] Qos level 3: A synchronous communication mechanism in mqtt protocol for iot
    Im Y.
    Lim M.
    Transactions of the Korean Institute of Electrical Engineers, 2021, 70 (06): : 893 - 904
  • [47] WSN and IoT based smart city model using the MQTT protocol
    Kumar, Vishal
    Sakya, Gayatri
    Shankar, Chandra
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (08): : 1423 - 1434
  • [48] Adaptive federated learning scheme for recognition of malicious attacks in an IoT network
    Prateek Chhikara
    Rajkumar Tekchandani
    Neeraj Kumar
    Computing, 2024, 106 : 1177 - 1192
  • [49] Secure Localization and Velocity Estimation in Mobile IoT Networks With Malicious Attacks
    Li, Yunfei
    Ma, Shaodan
    Yang, Guanghua
    Wong, Kai-Kit
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08) : 6878 - 6892
  • [50] Adaptive federated learning scheme for recognition of malicious attacks in an IoT network
    Chhikara, Prateek
    Tekchandani, Rajkumar
    Kumar, Neeraj
    COMPUTING, 2024, 106 (04) : 1177 - 1192