2019 International Conference on Information Science and Communication Technology (ICISCT) 2019
DOI: 10.1109/cisct.2019.8777403
|View full text |Cite
|
Sign up to set email alerts
|

Reliable Image Notifications for Smart Home Security with MQTT

Abstract: Internet of Things (IoT) applications utilize lowpowered battery operated devices and reliable event notifications depend on low-power messages from the sensors node to the server and vice versa over bandwidth constrained unreliable channels. Publish/subscribe communications protocols play an important part in such low-powered device communications with MQTT protocol being most prevalent for such deployments. These protocols have enabled IoT applications such as smart home, fleet management, oil pipelines and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…In particular, after the CONNECT packet is sent to the server, the server has to keep the connection alive for a period of time equal to k = 1.5 times [60] the Keep-Alive parameter T , that is by default equal to T = 60 s [61,62]. This means that by sending a single CONNECT packet it is possible to keep the connection alive for k • T = T DoS = 90 s. Although similar exploitation on HTTP allows the attacker to keep connections alive for 300 s [59], found value should be considered relatively high, since it means that each connection requires (at the application layer) just s 1 +s 2 8•T DoS = 2.84 bps.…”
Section: The Slowite Attackmentioning
confidence: 99%
“…In particular, after the CONNECT packet is sent to the server, the server has to keep the connection alive for a period of time equal to k = 1.5 times [60] the Keep-Alive parameter T , that is by default equal to T = 60 s [61,62]. This means that by sending a single CONNECT packet it is possible to keep the connection alive for k • T = T DoS = 90 s. Although similar exploitation on HTTP allows the attacker to keep connections alive for 300 s [59], found value should be considered relatively high, since it means that each connection requires (at the application layer) just s 1 +s 2 8•T DoS = 2.84 bps.…”
Section: The Slowite Attackmentioning
confidence: 99%
“…Message Queuing Telemetry Transport (MQTT) is the protocol commonly used for publishing messages from IoT devices [14], [15]. An image notification system for smart home using MQTT protocol is described in [14].…”
Section: Related Workmentioning
confidence: 99%
“…Message Queuing Telemetry Transport (MQTT) is the protocol commonly used for publishing messages from IoT devices [14], [15]. An image notification system for smart home using MQTT protocol is described in [14]. A room temperature control and fire alarm system utilising MQTT on AWS platform integrated a fire sensor, fire alarm, and sprinkler actuator on Wi-Fi [15].…”
Section: Related Workmentioning
confidence: 99%
“…In recent decades, many IoT applications have used MQTT brokers such as [6][7][8][9][10][11]. The typical structure of an IoT application using MQTT brokers deployed with remote centralized data centers (as in a Cloud environment) is depicted in Figure 1.…”
Section: Mqttmentioning
confidence: 99%