2019
DOI: 10.12720/jcm.14.6.463-469
|View full text |Cite
|
Sign up to set email alerts
|

A Brief Review on MQTT’s Security Issues within the Internet of Things (IoT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…Moreover, the algorithms have the capability to be tested in other protocols such as CoAP [25]. From security point of view, identity and authorization of nodes are critical problems [26][27][28][29][30]. reats such as avoiding data to be published or subscribed by attackers will have adverse effects on the broker in IoT system.…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, the algorithms have the capability to be tested in other protocols such as CoAP [25]. From security point of view, identity and authorization of nodes are critical problems [26][27][28][29][30]. reats such as avoiding data to be published or subscribed by attackers will have adverse effects on the broker in IoT system.…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, MQTT suffers from several security shortcomings, mainly from a lack of confidentiality, integrity, availability (DOS attack), mutual authentication, access control, control message security, and end-to-end security. In [ 27 ], the authors reviewed the symmetric, asymmetric, and hybrid lightweight schemes proposed in the literature for guaranteeing the confidentiality of transmitted data using MQTT. Moreover, the authors’ review suggested security techniques for guaranteeing access control in MQTT.…”
Section: Materials and Methodsmentioning
confidence: 99%
“…These vulnerabilities must be studied to protect these technologies from being exploited by others. Message Queuing Telemetry Transport (MQTT) is an application layer protocol vulnerable to various known and unknown security issues [22].…”
Section: F the Real-time Data Visualizationmentioning
confidence: 99%