Research Article
BibTex RIS Cite
Year 2023, Volume: 3 Issue: 2, 99 - 106, 15.12.2023

Abstract

References

  • C. C. Sobin, “A Survey on Architecture, Protocols and Challenges in IoT,” Wireless Personal Communications, vol. 112, pp. 1383-1429, 2020. doi: 0.1007/s11277-020-07108-5
  • O. Yavuz, “Nesnelerin İnterneti (IoT) ve Güvenliği,” btkakademi.gov.tr, 2023. [Online]. Available: https://www.btkakademi.gov.tr/portal/course/nesnelerin-interneti-iot-ve-guvenligi-10625. [Accessed July 2, 2023].
  • M. B. Younes and N. N. El-Emam, “Information Security and Data Management for IoT Smart Healthcare,” In Intelligent Internet of Things for Smart Healthcare Systems, CRC Press, pp. 69-80, 2023.
  • A. J. Hintaw, S. Manickam, M. F. Aboalmaaly, and S. Karuppayah, “MQTT Vulnerabilities, Attack Vectors and Solutions in the Internet of Things (IoT)”, IETE Journal of Research, vol. 69, no. 6, pp. 3368-3397, 2023. doi: 10.1080/03772063.2021.1912651
  • H. Wong, L. Tuo, “Man-in-the-Middle Attacks on MQTT-based IoT Using BERTBased Adversarial Message Generation”, KDD’20 Workshops: the 3rd International Workshop on Artificial Intelligence of Things (AIoT), 2020, San Diego, CA.
  • B. Erdem and O. Yaman, “KNN Based Intrusion Detection Method for IoT Applications Using MQTT Protocol,” Fırat University Journal of Science and Technology, vol. 1, no. 1, pp. 225-229, 2022.
  • M. M. Şimşek and E. Atılgan, “Attacks on Availability of IoT Middleware Protocols: A Case Study on MQTT”, Eskişehir Türk Dünyası Uygulama ve Araştırma Merkezi Bilişim Dergisi, vol. 4, no. 2, pp. 16-27, 2023. doi:10.53608/estudambilisim.1297052
  • S. Tian, V. G. Vassilakis, “On the Efficiency of a Lightweight Authentication and Privacy Preservation Scheme for MQTT”, Electronics, vol. 12, no. 14, 3085, 2023. doi: 10.3390/electronics12143085
  • A. N. Kaya and E. N. Yolaçan, “Attacks nn The MQTT-Based IoT System Detection Using Machine Learning,” Journal of Engineering and Architecture Faculty of Eskişehir Osmangazi University, vol. 30, no. 2, pp. 159-170, 2022.
  • A. H. Farea and K. Küçük, “Enhancement Trust Management in IoT to Detect ON-OFF Attacks with Cooja,” International Journal of Multidisciplinary Studies and Innovative Technologies, vol. 5, no. 2, pp. 123-128, 2021.
  • A. Varma and S. UniKrishnan, “Effect of Payload Security in MQTT Protocol Over Transport and Application Layer”, IOP Conference Series: Materials Science and Engineering, vol. 1166, 012019, 2021. doi:10.1088/1757-899X/1166/1/012019
  • MQTT, “MQTT: The Standard for IoT Messaging,” mqtt.org, 2022. [Online]. Available: https://mqtt.org. [Accessed July 2, 2023].
  • F. Chen, Y. Huo, J. Zhu, and D. Fan, “A Review on the Study on MQTT Security Challenge,” 2020 IEEE International Conference on Smart Cloud (SmartCloud), Washington, DC, USA, 2020, pp. 128-133, doi: 10.1109/SmartCloud49737.2020.00032.
  • M. Bender, E. Kirdan, M. -O. Pahl, G. Carle, “Open-Source MQTT Evaluation,” 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, pp. 1-4, 2021, doi: 10.1109/CCNC49032.2021.9369499.
  • Amazon, “MQTT Protokolü Neden Önemli?,” amazon.com, 2023. [Online]. Available: https://aws.amazon.com/tr/what-is/mqtt/. [Accessed July 22, 2023].
  • HiveMQ, “HiveMQ | Public Broker | MQTT Dashboard,” hivemq.com, 2023. [Online]. Available: https://broker.hivemq.com/. [Accessed July 22, 2023].
  • ArduinoModules, “KY-015 Temperature and Humidity Sensor Module,” arduinomodules.info, 2021. [Online]. Available: https://arduinomodules.info/ky-015-temperature-humidity-sensor-module/. [Accessed July 25, 2023].
  • F. T. Akgul, “Ultrasonik (Ultrasonic) Sensör Nedir? Nasıl Çalışır?,” robotistan.com, 2021. [Online]. Available: https://maker.robotistan.com/ultrasonic-sensor/. [Accessed July 25, 2023].
  • IPCisco, “Address Resolution Protocol (ARP),” 2020. [Online]. Available: https://ipcisco.com/lesson/address-resolution-protocol-arp/. [Accessed Aug. 1, 2023].
  • Rauf, “[TR] ARP Nedir ve ARP Spoofing Nasıl Yapılır?,” 2021. [Online]. Available: https://pwnlab.me/tr-arp-nedir-ve-arp-spoofing-nasil-yapilir/. [Accessed Aug. 2, 2023].
  • M. Brown, “System Setup and Scripts For Various MitM Activities,” 2022. [Online]. Available: https://github.com/nmatt0/mitmtools. [Accessed Aug. 2, 2023].

MitM Attacks and IoT Security: A Case Study on MQTT

Year 2023, Volume: 3 Issue: 2, 99 - 106, 15.12.2023

Abstract

The number of devices connected to the Internet has increased with the development of Internet of Things (IoT) technologies. It is foreseen that this situation will increase daily, and the concept of the IoT will become more popular. However, security vulnerabilities in IoT devices have not been eliminated, and these devices are vulnerable to attacks because their resource-limited features increase security concerns. The security problem of the Message Queuing Telemetry Transport (MQTT) protocol, which is widely used in the IoT field, is of great importance. In this study, a smart-home system application that provides communication between devices using the MQTT protocol has been developed. A Man in the Middle (MitM) attack, which is one of the first attacks that come to mind when it comes to privacy violation, was carried out, targeting data packets between users with a temperature sensor used in the application.

References

  • C. C. Sobin, “A Survey on Architecture, Protocols and Challenges in IoT,” Wireless Personal Communications, vol. 112, pp. 1383-1429, 2020. doi: 0.1007/s11277-020-07108-5
  • O. Yavuz, “Nesnelerin İnterneti (IoT) ve Güvenliği,” btkakademi.gov.tr, 2023. [Online]. Available: https://www.btkakademi.gov.tr/portal/course/nesnelerin-interneti-iot-ve-guvenligi-10625. [Accessed July 2, 2023].
  • M. B. Younes and N. N. El-Emam, “Information Security and Data Management for IoT Smart Healthcare,” In Intelligent Internet of Things for Smart Healthcare Systems, CRC Press, pp. 69-80, 2023.
  • A. J. Hintaw, S. Manickam, M. F. Aboalmaaly, and S. Karuppayah, “MQTT Vulnerabilities, Attack Vectors and Solutions in the Internet of Things (IoT)”, IETE Journal of Research, vol. 69, no. 6, pp. 3368-3397, 2023. doi: 10.1080/03772063.2021.1912651
  • H. Wong, L. Tuo, “Man-in-the-Middle Attacks on MQTT-based IoT Using BERTBased Adversarial Message Generation”, KDD’20 Workshops: the 3rd International Workshop on Artificial Intelligence of Things (AIoT), 2020, San Diego, CA.
  • B. Erdem and O. Yaman, “KNN Based Intrusion Detection Method for IoT Applications Using MQTT Protocol,” Fırat University Journal of Science and Technology, vol. 1, no. 1, pp. 225-229, 2022.
  • M. M. Şimşek and E. Atılgan, “Attacks on Availability of IoT Middleware Protocols: A Case Study on MQTT”, Eskişehir Türk Dünyası Uygulama ve Araştırma Merkezi Bilişim Dergisi, vol. 4, no. 2, pp. 16-27, 2023. doi:10.53608/estudambilisim.1297052
  • S. Tian, V. G. Vassilakis, “On the Efficiency of a Lightweight Authentication and Privacy Preservation Scheme for MQTT”, Electronics, vol. 12, no. 14, 3085, 2023. doi: 10.3390/electronics12143085
  • A. N. Kaya and E. N. Yolaçan, “Attacks nn The MQTT-Based IoT System Detection Using Machine Learning,” Journal of Engineering and Architecture Faculty of Eskişehir Osmangazi University, vol. 30, no. 2, pp. 159-170, 2022.
  • A. H. Farea and K. Küçük, “Enhancement Trust Management in IoT to Detect ON-OFF Attacks with Cooja,” International Journal of Multidisciplinary Studies and Innovative Technologies, vol. 5, no. 2, pp. 123-128, 2021.
  • A. Varma and S. UniKrishnan, “Effect of Payload Security in MQTT Protocol Over Transport and Application Layer”, IOP Conference Series: Materials Science and Engineering, vol. 1166, 012019, 2021. doi:10.1088/1757-899X/1166/1/012019
  • MQTT, “MQTT: The Standard for IoT Messaging,” mqtt.org, 2022. [Online]. Available: https://mqtt.org. [Accessed July 2, 2023].
  • F. Chen, Y. Huo, J. Zhu, and D. Fan, “A Review on the Study on MQTT Security Challenge,” 2020 IEEE International Conference on Smart Cloud (SmartCloud), Washington, DC, USA, 2020, pp. 128-133, doi: 10.1109/SmartCloud49737.2020.00032.
  • M. Bender, E. Kirdan, M. -O. Pahl, G. Carle, “Open-Source MQTT Evaluation,” 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, pp. 1-4, 2021, doi: 10.1109/CCNC49032.2021.9369499.
  • Amazon, “MQTT Protokolü Neden Önemli?,” amazon.com, 2023. [Online]. Available: https://aws.amazon.com/tr/what-is/mqtt/. [Accessed July 22, 2023].
  • HiveMQ, “HiveMQ | Public Broker | MQTT Dashboard,” hivemq.com, 2023. [Online]. Available: https://broker.hivemq.com/. [Accessed July 22, 2023].
  • ArduinoModules, “KY-015 Temperature and Humidity Sensor Module,” arduinomodules.info, 2021. [Online]. Available: https://arduinomodules.info/ky-015-temperature-humidity-sensor-module/. [Accessed July 25, 2023].
  • F. T. Akgul, “Ultrasonik (Ultrasonic) Sensör Nedir? Nasıl Çalışır?,” robotistan.com, 2021. [Online]. Available: https://maker.robotistan.com/ultrasonic-sensor/. [Accessed July 25, 2023].
  • IPCisco, “Address Resolution Protocol (ARP),” 2020. [Online]. Available: https://ipcisco.com/lesson/address-resolution-protocol-arp/. [Accessed Aug. 1, 2023].
  • Rauf, “[TR] ARP Nedir ve ARP Spoofing Nasıl Yapılır?,” 2021. [Online]. Available: https://pwnlab.me/tr-arp-nedir-ve-arp-spoofing-nasil-yapilir/. [Accessed Aug. 2, 2023].
  • M. Brown, “System Setup and Scripts For Various MitM Activities,” 2022. [Online]. Available: https://github.com/nmatt0/mitmtools. [Accessed Aug. 2, 2023].
There are 21 citations in total.

Details

Primary Language English
Subjects Modelling and Simulation
Journal Section Research Articles
Authors

Serhat Çelik 0000-0002-4717-1507

Nesibe Yalçın 0000-0003-0324-9111

Semih Çakır 0000-0003-3072-9532

Publication Date December 15, 2023
Submission Date September 10, 2023
Published in Issue Year 2023 Volume: 3 Issue: 2

Cite

IEEE S. Çelik, N. Yalçın, and S. Çakır, “MitM Attacks and IoT Security: A Case Study on MQTT”, Journal of Artificial Intelligence and Data Science, vol. 3, no. 2, pp. 99–106, 2023.

All articles published by JAIDA are licensed under a Creative Commons Attribution 4.0 International License.

88x31.png