Proceedings of the 15th ACM Workshop on Wireless Network Testbeds, Experimental Evaluation &Amp; CHaracterization 2021
DOI: 10.1145/3477086.3480838
|View full text |Cite
|
Sign up to set email alerts
|

An Experimental Evaluation of MQTT Authentication and Authorization in IoT

Abstract: Security vulnerabilities make the Internet of Things (IoT) systems open to online attacks that threaten both their operation and user privacy. Among the many protocols governing IoT operation, MQTT has seen wide adoption, but comes with rudimentary security support. Specifically, while the MQTT standard strongly recommends that servers (brokers) offer Transport Layer Security (TLS), it is mainly concerned with the message transmission protocol, leaving to implementers the responsibility for providing appropria… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 9 publications
0
1
0
Order By: Relevance
“…Michaelides et al delved into the security aspects of MQTT in [26], although they did not specifically assess the delay. Like our approach, they employed a Raspberry Pi in their testbed and characterized the energy consumption.…”
Section: Related Workmentioning
confidence: 99%
“…Michaelides et al delved into the security aspects of MQTT in [26], although they did not specifically assess the delay. Like our approach, they employed a Raspberry Pi in their testbed and characterized the energy consumption.…”
Section: Related Workmentioning
confidence: 99%
“…To define authorisation policies, we use a capabilitybased approach which has been extensively studied for authorisation in the IoT context [5]. Also, the latest implementation of authentication and authorisation for MQTT [6] advocates the use of OAuth 2.0 2 , which is a capability based authorisation delegation protocol.…”
Section: A Authorisation Tokensmentioning
confidence: 99%
“…Michaelides et al. focus on security aspects of MQTT in [ 34 ]. They do not assess the delay, but they also use Raspberry Pi in their testbed, as well as an approach similar to ours to characterize energy consumption.…”
Section: Related Workmentioning
confidence: 99%