Proceeding of the Electrical Engineering Computer Science and Informatics
Vol 4: EECSI 2017

Attack Scenarios and Security Analysis of MQTT Communication Protocol in IoT System

Syaiful Andy (Institut Teknologi Bandung)
Budi Rahardjo (Institut Teknologi Bandung)
Bagus Hanindhito (Institut Teknologi Bandung)



Article Info

Publish Date
01 Nov 2017

Abstract

Various communication protocols are currently used in the Internet of Things (IoT) devices. One of the protocols that are already standardized by ISO is MQTT protocol (ISO / IEC 20922: 2016). Many IoT developers use this protocol because of its minimal bandwidth requirement and low memory consumption. Sometimes, IoT device sends confidential data that should only be accessed by authorized people or devices. Unfortunately, the MQTT protocol only provides authentication for the security mechanism which, by default, does not encrypt the data in transit thus data privacy, authentication, and data integrity become problems in MQTT implementation. This paper discusses several reasons on why there are many IoT system that does not implement adequate security mechanism. Next, it also demonstrates and analyzes how we can attack this protocol easily using several attack scenarios. Finally, after the vulnerabilities of this protocol have been examined, we can improve our security awareness especially in MQTT protocol and then implement security mechanism in our MQTT system to prevent such attack

Copyrights © 2017






Journal Info

Abbrev

EECSI

Publisher

Subject

Computer Science & IT Electrical & Electronics Engineering

Description

Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, ...