1,879
Views
16
CrossRef citations to date
0
Altmetric
Review Article

MQTT Vulnerabilities, Attack Vectors and Solutions in the Internet of Things (IoT)

, , &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

A. Nechibvute & H. D. Mafukidze. (2023) Integration of SCADA and Industrial IoT: Opportunities and Challenges. IETE Technical Review 0:0, pages 1-14.
Read now
Prarthana J. Mehta, Balu L. Parne & Sankita J. Patel. (2023) MAKA: Multi-Factor Authentication and Key Agreement Scheme for LoRa-Based Smart Grid Communication Services. IETE Journal of Research 0:0, pages 1-17.
Read now

Articles from other publishers (14)

Mohamed Salb, Luka Jovanovic, Nebojsa Bacanin, Milos Antonijevic, Miodrag Zivkovic, Nebojsa Budimirovic & Laith Abualigah. (2023) Enhancing Internet of Things Network Security Using Hybrid CNN and XGBoost Model Tuned via Modified Reptile Search Algorithm. Applied Sciences 13:23, pages 12687.
Crossref
Mifta Ahmed Umer, Luis Borges Gouveia & Elefelious Getachew Belay. (2023) Provenance blockchain for ensuring IT security in cloud manufacturing. Frontiers in Blockchain 6.
Crossref
Ayman Al-Ani, Wong Kang Shen, Ahmed K. Al-Ani, Shams A. Laghari & Omar E. Elejla. (2023) Evaluating Security of MQTT Protocol in Internet of Things. Evaluating Security of MQTT Protocol in Internet of Things.
Hannes Sochor, Flavio Ferrarotti & Rudolf Ramler. (2021) An automated evaluation of broker compatibility for the Message Queuing Telemetry Transport protocol. Journal of Software: Evolution and Process 35:7.
Crossref
Sharmila B S & Rohini Nagapadma. (2023) P‐DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities. SECURITY AND PRIVACY.
Crossref
Hariprasad S & Deepa T. (2023) An Ensemble Intrusion Detection System based on Acute Feature Selection. Multimedia Tools and Applications.
Crossref
Álvaro Michelena, José Aveleira‐Mata, Esteban Jove, Martín Bayón‐Gutiérrez, Paulo Novais, Oscar Fontenla Romero, José Luis Calvo‐Rolle & Héctor Aláiz‐Moretón. (2023) A novel intelligent approach for man‐in‐the‐middle attacks detection over internet of things environments based on message queuing telemetry transport . Expert Systems.
Crossref
Ahmed J. Hintaw, Selvakumar Manickam, Shankar Karuppayah, Mohammad Adnan Aladaileh, Mohammed Faiz Aboalmaaly & Shams Ul Arfeen Laghari. (2023) A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things. IEEE Access 11, pages 43019-43040.
Crossref
Ouijdane Fadli, Younes Balboul, Mohammed Fattah, Said Mazer & Moulhime Elbekkali. Detailed analysis and comparison of communication protocol-oriented IoT applications. Detailed analysis and comparison of communication protocol-oriented IoT applications.
Armand Roets & Bobby L. Tait. 2023. Cybersecurity in the Age of Smart Societies. Cybersecurity in the Age of Smart Societies 141 157 .
S. Mohammadali Zanjani, Hossein Shahinzadeh, Jalal Moradi, Zohreh Rezaei, Bahareh Kaviani-Baghbaderani & Sudeep Tanwar. (2022) Securing the Internet of Things via Blockchain-Aided Smart Contracts. Securing the Internet of Things via Blockchain-Aided Smart Contracts.
C. Prajisha & A. R. Vasudevan. (2022) An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM. International Journal of Information Security 21:6, pages 1263-1282.
Crossref
Ali Mohammad Norouzzadeh Gil Molk, Seyed Mohsen Ghoreishi, Fatemeh Ghasemi & Iraj Elyasi. (2022) Improve Performances of Wireless Sensor Networks for Data Transfer Based on Fuzzy Clustering and Huffman Compression. Journal of Sensors 2022, pages 1-16.
Crossref
Emrah Atilgan, Ilker Ozcelik & Esra N. Yolacan. (2021) MQTT Security at a Glance. MQTT Security at a Glance.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.