{"title":"MQTT Security at a Glance","authors":"Emrah Atilgan, Ilker Ozcelik, E. Yolacan","doi":"10.1109/ISCTURKEY53027.2021.9654337","DOIUrl":null,"url":null,"abstract":"It is possible to talk about the concept of IoT in every environment where there is the Internet and devices that can connect to the Internet in various ways. An IoT system may include various devices such as sensors, machines, applications, etc. to improve the quality of people’s lives or the value of business income. The MQTT protocol is the most widely used protocol for the communication of these devices in IoT systems. Since it is a part of our daily life, it has become essential to examine the weaknesses of this protocol and provide solutions to them. In this study, the structure and operation of the MQTT protocol are detailed, possible attack types are classified, and their properties are examined. Then, the security solutions for the MQTT protocol are examined under two categories and the studies done in recent years are included. With the proposed study, it is aimed to examine the security issues of the MQTT protocol and to guide future studies by creating a knowledge base in this field.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654337","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
It is possible to talk about the concept of IoT in every environment where there is the Internet and devices that can connect to the Internet in various ways. An IoT system may include various devices such as sensors, machines, applications, etc. to improve the quality of people’s lives or the value of business income. The MQTT protocol is the most widely used protocol for the communication of these devices in IoT systems. Since it is a part of our daily life, it has become essential to examine the weaknesses of this protocol and provide solutions to them. In this study, the structure and operation of the MQTT protocol are detailed, possible attack types are classified, and their properties are examined. Then, the security solutions for the MQTT protocol are examined under two categories and the studies done in recent years are included. With the proposed study, it is aimed to examine the security issues of the MQTT protocol and to guide future studies by creating a knowledge base in this field.