{"title":"基于mqtt的工业物联网应用中的安全风险","authors":"Tejaswi Boppana, P. Bagade","doi":"10.1109/COINS54846.2022.9854993","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) plays a crucial role in improving the quality of life. In recent years, IoT systems have proliferated in almost every industry, including manufacturing, automobiles, agriculture, and energy. IoT is the key enabling technology for Industry 4.0. This growing reliance on IoT devices piqued the interest of several adversaries attempting to gain unauthorized access to IoT systems for illicit purposes. So, it is essential to identify any potential security risks in IoT systems. Numerous Industrial Internet of Things (IIoT) applications, including wind turbines, agriculture, and warehouses, deploy hundreds of IoT devices in remote locations. These IoT devices are not physically monitored since it requires extensive human effort. Instead, the IoT devices are monitored by web applications that collect sensor data from remote devices. IoT application-layer protocols are responsible for communication between web applications and IoT devices in such large-scale IoT systems. Any communication flaw could put the entire IoT system at risk. The publish/subscribe-based MQTT protocol is a widely used IoT messaging standard. In this paper, we present a threat model and demonstrate a specific weakness in unencrypted MQTT-based IoT systems that enables an attacker to gain unauthorized access to the entire system by launching a combination of man-in-the-middle (MITM) and cross-site scripting (XSS) attacks. We also discuss steps to be taken and future directions for research in the security of industrial IoT systems using the MQTT communication protocol to avoid the possibility of such attacks.","PeriodicalId":187055,"journal":{"name":"2022 IEEE International Conference on Omni-layer Intelligent Systems (COINS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Security risks in MQTT-based Industrial IoT Applications\",\"authors\":\"Tejaswi Boppana, P. Bagade\",\"doi\":\"10.1109/COINS54846.2022.9854993\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things (IoT) plays a crucial role in improving the quality of life. In recent years, IoT systems have proliferated in almost every industry, including manufacturing, automobiles, agriculture, and energy. IoT is the key enabling technology for Industry 4.0. This growing reliance on IoT devices piqued the interest of several adversaries attempting to gain unauthorized access to IoT systems for illicit purposes. So, it is essential to identify any potential security risks in IoT systems. Numerous Industrial Internet of Things (IIoT) applications, including wind turbines, agriculture, and warehouses, deploy hundreds of IoT devices in remote locations. These IoT devices are not physically monitored since it requires extensive human effort. Instead, the IoT devices are monitored by web applications that collect sensor data from remote devices. IoT application-layer protocols are responsible for communication between web applications and IoT devices in such large-scale IoT systems. Any communication flaw could put the entire IoT system at risk. The publish/subscribe-based MQTT protocol is a widely used IoT messaging standard. In this paper, we present a threat model and demonstrate a specific weakness in unencrypted MQTT-based IoT systems that enables an attacker to gain unauthorized access to the entire system by launching a combination of man-in-the-middle (MITM) and cross-site scripting (XSS) attacks. We also discuss steps to be taken and future directions for research in the security of industrial IoT systems using the MQTT communication protocol to avoid the possibility of such attacks.\",\"PeriodicalId\":187055,\"journal\":{\"name\":\"2022 IEEE International Conference on Omni-layer Intelligent Systems (COINS)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Conference on Omni-layer Intelligent Systems (COINS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COINS54846.2022.9854993\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Omni-layer Intelligent Systems (COINS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COINS54846.2022.9854993","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security risks in MQTT-based Industrial IoT Applications
Internet of Things (IoT) plays a crucial role in improving the quality of life. In recent years, IoT systems have proliferated in almost every industry, including manufacturing, automobiles, agriculture, and energy. IoT is the key enabling technology for Industry 4.0. This growing reliance on IoT devices piqued the interest of several adversaries attempting to gain unauthorized access to IoT systems for illicit purposes. So, it is essential to identify any potential security risks in IoT systems. Numerous Industrial Internet of Things (IIoT) applications, including wind turbines, agriculture, and warehouses, deploy hundreds of IoT devices in remote locations. These IoT devices are not physically monitored since it requires extensive human effort. Instead, the IoT devices are monitored by web applications that collect sensor data from remote devices. IoT application-layer protocols are responsible for communication between web applications and IoT devices in such large-scale IoT systems. Any communication flaw could put the entire IoT system at risk. The publish/subscribe-based MQTT protocol is a widely used IoT messaging standard. In this paper, we present a threat model and demonstrate a specific weakness in unencrypted MQTT-based IoT systems that enables an attacker to gain unauthorized access to the entire system by launching a combination of man-in-the-middle (MITM) and cross-site scripting (XSS) attacks. We also discuss steps to be taken and future directions for research in the security of industrial IoT systems using the MQTT communication protocol to avoid the possibility of such attacks.