Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices

被引:82
|
作者
Dinculeana, Dan [1 ]
Cheng, Xiaochun [1 ]
机构
[1] Middlesex Univ, Fac Sci & Technol, London NW4 4BT, England
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 05期
关键词
Internet of Things (IoT); Message Queue Telemetry Transport (MQTT); Keyed-Hash Message Authentication Code (HMAC); confidentiality; integrity; KEY MANAGEMENT SCHEME;
D O I
10.3390/app9050848
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to protect against such attacks. This paper will review some existing solutions used to secure a communication channel, such as Transport Layer Security or symmetric encryption, as well as provide a novel approach to achieving confidentiality and integrity of messages. The method, called Value-to-Keyed-Hash Message Authentication Code (Value-to-HMAC) mapping, uses signatures to send messages, instead of encryption, by implementing a Keyed-Hash Message Authentication Code generation algorithm. Although robust solutions exist that can be used to secure the communication between devices, this paper considers that not every Internet of Things (IoT) device or network design is able to afford the overhead and drop in performance, or even support such protocols. Therefore, the Value-to-HMAC method was designed to maximize performance while ensuring the messages are only readable by the intended node. The experimental procedure demonstrates how the method will achieve better performance than a symmetric-key encryption algorithm, while ensuring the confidentiality and integrity of information through the use of one mechanism.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] IoT real time data acquisition using MQTT protocol
    Atmoko, R. A.
    Riantini, R.
    Hasin, M. K.
    INTERNATIONAL CONFERENCE ON PHYSICAL INSTRUMENTATION AND ADVANCED MATERIALS, 2017, 853
  • [22] Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol
    Firdous, Syed Naeem
    Baig, Zubair
    Valli, Craig
    Ibrahim, Ahmed
    2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 748 - 755
  • [23] Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment
    Iqbal Luqman Bin Mohd Paris
    Mohamed Hadi Habaebi
    Alhareth Mohammed Zyoud
    Wireless Personal Communications, 2023, 132 : 163 - 182
  • [24] Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment
    Paris, Iqbal Luqman Bin Mohd
    Habaebi, Mohamed Hadi
    Zyoud, Alhareth Mohammed
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 132 (01) : 163 - 182
  • [25] A Secure IoT Firmware Update Framework Based on MQTT Protocol
    Lo, Nai-Wei
    Hsu, Sheng-Hsiang
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY, ISAT 2019, PT I, 2020, 1050 : 187 - 198
  • [26] Formal-Based Modeling and Analysis of a Network Communication Protocol for IoT: MQTT Protocol
    Hcine, Jamila
    Ben Hafaiedh, Imene
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT'18), VOL.2, 2020, 147 : 350 - 360
  • [27] Vulnerabilities in IoT Devices with Software-Defined Radio
    Phan Duy Hung
    Bui Trong Vinh
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 664 - 668
  • [28] An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices
    Jiang, Xingbin
    Lora, Michele
    Chattopadhyay, Sudipta
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2020, 20 (02)
  • [29] Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild
    Song, Jinke
    Wan, Shangfeng
    Huang, Min
    Liu, Jiqiang
    Sun, Limin
    Li, Qiang
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2024, 20 (01)
  • [30] Characterization of threats in IoT from an MQTT protocol-oriented dataset
    Castaneda, Angel Luis Munoz
    Mata, Jose Antonio Aveleira
    Alaiz-Moreton, Hector
    COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (05) : 5281 - 5296