2nd Smart Cities Symposium (SCS 2019) 2019
DOI: 10.1049/cp.2019.0180
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Analysis on Security of MQTT Brokers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 3 publications
0
16
0
1
Order By: Relevance
“…The implementation of the Keyed-Hash Message Authentication Code (HMAC) generation algorithm [29] has been employed instead of a complex encryption algorithm to improve the efficiency with less time for the client to retrieve the messages. The different cloud MQTT brokers were analyzed from a security standpoint and conducted a denial-of-service (DoS) attack and information collection techniques to discover the least vulnerable broker was discussed in [30].…”
Section: Related Workmentioning
confidence: 99%
“…The implementation of the Keyed-Hash Message Authentication Code (HMAC) generation algorithm [29] has been employed instead of a complex encryption algorithm to improve the efficiency with less time for the client to retrieve the messages. The different cloud MQTT brokers were analyzed from a security standpoint and conducted a denial-of-service (DoS) attack and information collection techniques to discover the least vulnerable broker was discussed in [30].…”
Section: Related Workmentioning
confidence: 99%
“…It is also responsible for sending messages to subscribers, filtering the messages, and classifying the subscribers based on the topics that they have subscribed to. The broker also holds the sessions of all persisted clients, including subscriptions and missed messages [7].…”
Section: Mqtt Protocolmentioning
confidence: 99%
“…No entanto todos os dispositivos ficam dependentes do pleno funcionamento do serviço do broker MQTT. Dessa forma,é criado um ponto de falha na aplicação MQTT [Kotak et al 2019]. Um agente malicioso pode personificar um cliente e emitir pacotes a uma frequência maior que a capacidade de processamento do broker ou que o enlace de rede dele suporte.…”
Section: Figura 1 Exemplo De Aplicação Com Arquitetura Mqttunclassified