Araştırma Makalesi

MitM Attacks and IoT Security: A Case Study on MQTT

Cilt: 3 Sayı: 2 15 Aralık 2023
PDF İndir
EN

MitM Attacks and IoT Security: A Case Study on MQTT

Öz

The number of devices connected to the Internet has increased with the development of Internet of Things (IoT) technologies. It is foreseen that this situation will increase daily, and the concept of the IoT will become more popular. However, security vulnerabilities in IoT devices have not been eliminated, and these devices are vulnerable to attacks because their resource-limited features increase security concerns. The security problem of the Message Queuing Telemetry Transport (MQTT) protocol, which is widely used in the IoT field, is of great importance. In this study, a smart-home system application that provides communication between devices using the MQTT protocol has been developed. A Man in the Middle (MitM) attack, which is one of the first attacks that come to mind when it comes to privacy violation, was carried out, targeting data packets between users with a temperature sensor used in the application.

Anahtar Kelimeler

Kaynakça

  1. C. C. Sobin, “A Survey on Architecture, Protocols and Challenges in IoT,” Wireless Personal Communications, vol. 112, pp. 1383-1429, 2020. doi: 0.1007/s11277-020-07108-5
  2. O. Yavuz, “Nesnelerin İnterneti (IoT) ve Güvenliği,” btkakademi.gov.tr, 2023. [Online]. Available: https://www.btkakademi.gov.tr/portal/course/nesnelerin-interneti-iot-ve-guvenligi-10625. [Accessed July 2, 2023].
  3. M. B. Younes and N. N. El-Emam, “Information Security and Data Management for IoT Smart Healthcare,” In Intelligent Internet of Things for Smart Healthcare Systems, CRC Press, pp. 69-80, 2023.
  4. A. J. Hintaw, S. Manickam, M. F. Aboalmaaly, and S. Karuppayah, “MQTT Vulnerabilities, Attack Vectors and Solutions in the Internet of Things (IoT)”, IETE Journal of Research, vol. 69, no. 6, pp. 3368-3397, 2023. doi: 10.1080/03772063.2021.1912651
  5. H. Wong, L. Tuo, “Man-in-the-Middle Attacks on MQTT-based IoT Using BERTBased Adversarial Message Generation”, KDD’20 Workshops: the 3rd International Workshop on Artificial Intelligence of Things (AIoT), 2020, San Diego, CA.
  6. B. Erdem and O. Yaman, “KNN Based Intrusion Detection Method for IoT Applications Using MQTT Protocol,” Fırat University Journal of Science and Technology, vol. 1, no. 1, pp. 225-229, 2022.
  7. M. M. Şimşek and E. Atılgan, “Attacks on Availability of IoT Middleware Protocols: A Case Study on MQTT”, Eskişehir Türk Dünyası Uygulama ve Araştırma Merkezi Bilişim Dergisi, vol. 4, no. 2, pp. 16-27, 2023. doi:10.53608/estudambilisim.1297052
  8. S. Tian, V. G. Vassilakis, “On the Efficiency of a Lightweight Authentication and Privacy Preservation Scheme for MQTT”, Electronics, vol. 12, no. 14, 3085, 2023. doi: 10.3390/electronics12143085

Ayrıntılar

Birincil Dil

İngilizce

Konular

Modelleme ve Simülasyon

Bölüm

Araştırma Makalesi

Yayımlanma Tarihi

15 Aralık 2023

Gönderilme Tarihi

10 Eylül 2023

Kabul Tarihi

1 Aralık 2023

Yayımlandığı Sayı

Yıl 2023 Cilt: 3 Sayı: 2

Kaynak Göster

APA
Çelik, S., Yalçın, N., & Çakır, S. (2023). MitM Attacks and IoT Security: A Case Study on MQTT. Journal of Artificial Intelligence and Data Science, 3(2), 99-106. https://izlik.org/JA35HS56LM
AMA
1.Çelik S, Yalçın N, Çakır S. MitM Attacks and IoT Security: A Case Study on MQTT. Journal of Artificial Intelligence and Data Science. 2023;3(2):99-106. https://izlik.org/JA35HS56LM
Chicago
Çelik, Serhat, Nesibe Yalçın, ve Semih Çakır. 2023. “MitM Attacks and IoT Security: A Case Study on MQTT”. Journal of Artificial Intelligence and Data Science 3 (2): 99-106. https://izlik.org/JA35HS56LM.
EndNote
Çelik S, Yalçın N, Çakır S (01 Aralık 2023) MitM Attacks and IoT Security: A Case Study on MQTT. Journal of Artificial Intelligence and Data Science 3 2 99–106.
IEEE
[1]S. Çelik, N. Yalçın, ve S. Çakır, “MitM Attacks and IoT Security: A Case Study on MQTT”, Journal of Artificial Intelligence and Data Science, c. 3, sy 2, ss. 99–106, Ara. 2023, [çevrimiçi]. Erişim adresi: https://izlik.org/JA35HS56LM
ISNAD
Çelik, Serhat - Yalçın, Nesibe - Çakır, Semih. “MitM Attacks and IoT Security: A Case Study on MQTT”. Journal of Artificial Intelligence and Data Science 3/2 (01 Aralık 2023): 99-106. https://izlik.org/JA35HS56LM.
JAMA
1.Çelik S, Yalçın N, Çakır S. MitM Attacks and IoT Security: A Case Study on MQTT. Journal of Artificial Intelligence and Data Science. 2023;3:99–106.
MLA
Çelik, Serhat, vd. “MitM Attacks and IoT Security: A Case Study on MQTT”. Journal of Artificial Intelligence and Data Science, c. 3, sy 2, Aralık 2023, ss. 99-106, https://izlik.org/JA35HS56LM.
Vancouver
1.Serhat Çelik, Nesibe Yalçın, Semih Çakır. MitM Attacks and IoT Security: A Case Study on MQTT. Journal of Artificial Intelligence and Data Science [Internet]. 01 Aralık 2023;3(2):99-106. Erişim adresi: https://izlik.org/JA35HS56LM