Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to protect against such attacks. This paper will revie...
Main Authors: | Dan Dinculeană, Xiaochun Cheng |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-02-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/9/5/848 |
Similar Items
-
Post-Quantum Authentication in the MQTT Protocol
by: Juliet Samandari, et al.
Published: (2023-07-01) -
A Multi-Tier MQTT Architecture with Multiple Brokers Based on Fog Computing for Securing Industrial IoT
by: Hassan Kurdi, et al.
Published: (2022-07-01) -
Scalable Incident Reporting Framework: A Sensor and IoT Research
by: Sidi Mohamed Ahmed Ghaly, et al.
Published: (2023-06-01) -
Message Queuing Telemetry Transport (MQTT) Security: A Cryptographic Smart Card Approach
by: Eduardo Buetas Sanjuan, et al.
Published: (2020-01-01) -
Securing Communication in MQTT enabled Internet of Things with Lightweight security protocol
by: Adil Bashir, et al.
Published: (2017-04-01)