Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices

被引:82
|
作者
Dinculeana, Dan [1 ]
Cheng, Xiaochun [1 ]
机构
[1] Middlesex Univ, Fac Sci & Technol, London NW4 4BT, England
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 05期
关键词
Internet of Things (IoT); Message Queue Telemetry Transport (MQTT); Keyed-Hash Message Authentication Code (HMAC); confidentiality; integrity; KEY MANAGEMENT SCHEME;
D O I
10.3390/app9050848
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to protect against such attacks. This paper will review some existing solutions used to secure a communication channel, such as Transport Layer Security or symmetric encryption, as well as provide a novel approach to achieving confidentiality and integrity of messages. The method, called Value-to-Keyed-Hash Message Authentication Code (Value-to-HMAC) mapping, uses signatures to send messages, instead of encryption, by implementing a Keyed-Hash Message Authentication Code generation algorithm. Although robust solutions exist that can be used to secure the communication between devices, this paper considers that not every Internet of Things (IoT) device or network design is able to afford the overhead and drop in performance, or even support such protocols. Therefore, the Value-to-HMAC method was designed to maximize performance while ensuring the messages are only readable by the intended node. The experimental procedure demonstrates how the method will achieve better performance than a symmetric-key encryption algorithm, while ensuring the confidentiality and integrity of information through the use of one mechanism.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Lightweight Security Mechanism over MQTT Protocol for IoT Devices
    Amnalou, Sanaz
    Abu Bakar, Khairul Azmi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (07) : 202 - 207
  • [2] MORID: MQTT oriented routing between IoT devices
    Sonam, Rahul
    Johari, Rahul
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (07): : 2121 - 2128
  • [3] IoT Applications based on MQTT Protocol
    Salagean, Maria
    Zinca, Daniel
    2020 14TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2020, : 375 - 378
  • [4] MQTT Vulnerabilities, Attack Vectors and Solutions in the Internet of Things (IoT)
    Hintaw, Ahmed J.
    Manickam, Selvakumar
    Aboalmaaly, Mohammed Faiz
    Karuppayah, Shankar
    IETE JOURNAL OF RESEARCH, 2023, 69 (06) : 3368 - 3397
  • [5] Dynamic Threading to Improve Embedded Software Performance in IoT Devices Using MQTT Protocol
    Bui Huu Phuc
    Pham Van Quang
    Nguyen Quang Linh
    Pham Van Huong
    2018 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC), 2018, : 321 - 325
  • [6] Object Security Scheme based on Access Policies using MQTT Protocol for IoT Devices
    Nathi, Rohan A.
    Sutar, Dimpal
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [7] A Secure Corroboration Protocol for Internet of Things (IoT) Devices Using MQTT Version 5 and LDAP
    Vithanage, Nethmi N. Nanayakkara
    Thanthrige, Sangeeth S. Hetti
    Kapuge, Malsha C. K. Paththini
    Malwenna, Tharindu H.
    Liyanapathirana, Chethana
    Wijekoon, Janaka L.
    35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 837 - 841
  • [8] DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol
    Alatram, Alaa
    Sikos, Leslie F.
    Johnstone, Mike
    Szewczyk, Patryk
    Kang, James Jin
    COMPUTER NETWORKS, 2023, 231
  • [9] Vulnerabilities in Hub Architecture IoT Devices
    Visan, Bogdan Alexandru
    Lee, Jiyoon
    Yang, Baijian
    Smith, Anthony H.
    Matson, Eric T.
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 83 - 88
  • [10] Analysis of Security Vulnerabilities for IoT Devices
    Kim, Hee-Hyun
    Yoo, Jinho
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2022, 18 (04): : 489 - 499