2021
DOI: 10.1080/03772063.2021.1912651
|View full text |Cite
|
Sign up to set email alerts
|

MQTT Vulnerabilities, Attack Vectors and Solutions in the Internet of Things (IoT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(32 citation statements)
references
References 77 publications
0
32
0
Order By: Relevance
“…1) Authentication vulnerabilities: If the MQTT broker does not conduct a proper examination of the identity of the publisher/subscriber and does not block multiple authentication attempts, the attackers can take advantage of these vulnerabilities to access MQTTdevices or run DoS attacks against the broker [150]. 2) Authorization vulnerabilities: The MQTT broker may not appropriately assign publishing and subscribing permissions for clients (i.e., devices).…”
Section: ) Message Queuing Telemetry Transport (Mqtt)mentioning
confidence: 99%
“…1) Authentication vulnerabilities: If the MQTT broker does not conduct a proper examination of the identity of the publisher/subscriber and does not block multiple authentication attempts, the attackers can take advantage of these vulnerabilities to access MQTTdevices or run DoS attacks against the broker [150]. 2) Authorization vulnerabilities: The MQTT broker may not appropriately assign publishing and subscribing permissions for clients (i.e., devices).…”
Section: ) Message Queuing Telemetry Transport (Mqtt)mentioning
confidence: 99%
“…This attack can be easily launched and it exploits the Last Will and Testament feature available in MQTT protocol [12]. This feature is used to notify other subscribers about an unexpected disconnected client.…”
Section: A Last Will Payload Flooding Attackmentioning
confidence: 99%
“…Through unauthorized publishing/subscription, the attackers can gain privileges that should not be available to them [12]. In fact, the wildcard feature (e.g.…”
Section: F Elevation Of Privilege Attackmentioning
confidence: 99%
“…The paradigm of publish-subscribe is a promising design in the IoT arena because it allows clients to interact with one another through a centralized message broker [7], [8]. MQTT is widely utilized in publish-subscribe systems that employ IoT devices [9]. MQTT is considered as the data communications protocol that is most suited to the IoT because it can be simply deployed on devices that are low-cost, low-power, and low-storage [10].…”
Section: Introductionmentioning
confidence: 99%