Abstract

It is possible to talk about the concept of IoT in every environment where there is the Internet and devices that can connect to the Internet in various ways. An IoT system may include various devices such as sensors, machines, applications, etc. to improve the quality of people’s lives or the value of business income. The MQTT protocol is the most widely used protocol for the communication of these devices in IoT systems. Since it is a part of our daily life, it has become essential to examine the weaknesses of this protocol and provide solutions to them. In this study, the structure and operation of the MQTT protocol are detailed, possible attack types are classified, and their properties are examined. Then, the security solutions for the MQTT protocol are examined under two categories and the studies done in recent years are included. With the proposed study, it is aimed to examine the security issues of the MQTT protocol and to guide future studies by creating a knowledge base in this field.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call