Abstract

The Internet of Things (IoT) encompasses a technological ecosystem that improves the daily lives of individuals by increasing productivity, safety, comfort, health and sustainability. In addition, the IoT brings a variety of benefits to many industries, including increased efficiency, productivity and cost savings. However, the proliferation of IoT technologies has revealed many security vulnerabilities, especially in the middleware layer. In this article, we presented possible attacks on availability of middleware layer messaging protocols. In the research, a comprehensive case study was carried out, especially focusing on the MQTT (Message Queuing Telemetry Transport) protocol. We performed Man-in-the-Middle (MitM), Denial of Service (DoS) and Brute-Force attacks in our experimental environment. The effects and results of the attacks made in cases where the connection to the MQTT protocol is made with a user name and password, and when the user name and password are not used are examined. The results of the attacks that emerged in the different scenarios created were evaluated and the precautions to be taken to protect against the attacks were discussed.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call