{"title":"消息队列遥测传输协议的安全性分析","authors":"Matheus Ferraz Silveira, A. Gradvohl","doi":"10.5335/rbca.v13i2.12163","DOIUrl":null,"url":null,"abstract":"The Internet of Things aims to assign computational processing and connection to simple objects on a network tocollect data and then perform analysis. Due to its easy use, simplified implementation has several informationsecurity problems. This article presents attack procedures in an IoT environment using the Message QueueTelemetry Transport protocol. For attack procedures, we use the Low Orbit Ion Cannon and Wireshark programs,compromising the integrity, confidentiality, and availability of data and network connection. After carrying outthe attack procedures, we implemented security methods on the network, such as data encryption and firewall toprotect data integrity and prevent network connection attacks","PeriodicalId":41711,"journal":{"name":"Revista Brasileira de Computacao Aplicada","volume":null,"pages":null},"PeriodicalIF":0.2000,"publicationDate":"2021-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security analysis of the message queuing telemetry transport protocol\",\"authors\":\"Matheus Ferraz Silveira, A. Gradvohl\",\"doi\":\"10.5335/rbca.v13i2.12163\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things aims to assign computational processing and connection to simple objects on a network tocollect data and then perform analysis. Due to its easy use, simplified implementation has several informationsecurity problems. This article presents attack procedures in an IoT environment using the Message QueueTelemetry Transport protocol. For attack procedures, we use the Low Orbit Ion Cannon and Wireshark programs,compromising the integrity, confidentiality, and availability of data and network connection. After carrying outthe attack procedures, we implemented security methods on the network, such as data encryption and firewall toprotect data integrity and prevent network connection attacks\",\"PeriodicalId\":41711,\"journal\":{\"name\":\"Revista Brasileira de Computacao Aplicada\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.2000,\"publicationDate\":\"2021-07-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Revista Brasileira de Computacao Aplicada\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5335/rbca.v13i2.12163\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Revista Brasileira de Computacao Aplicada","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5335/rbca.v13i2.12163","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
Security analysis of the message queuing telemetry transport protocol
The Internet of Things aims to assign computational processing and connection to simple objects on a network tocollect data and then perform analysis. Due to its easy use, simplified implementation has several informationsecurity problems. This article presents attack procedures in an IoT environment using the Message QueueTelemetry Transport protocol. For attack procedures, we use the Low Orbit Ion Cannon and Wireshark programs,compromising the integrity, confidentiality, and availability of data and network connection. After carrying outthe attack procedures, we implemented security methods on the network, such as data encryption and firewall toprotect data integrity and prevent network connection attacks