loading
Documents

Research.Publish.Connect.

Paper

Authors: Giovanni Perrone 1 ; Massimo Vecchio 1 ; Riccardo Pecori 1 and Raffaele Giaffreda 2

Affiliations: 1 eCampus University, Italy ; 2 FBK CREATE-NET, Italy

ISBN: 978-989-758-245-5

Keyword(s): Internet of Things, Security, Access Control, Publish-subscribe, Open Source MQTT Broker.

Abstract: Recent news of massive Distributed Denial of Service (DDoS) attacks being carried out using thousands of Internet of Things (IoT) devices transformed into attack bots are nothing else than a wake-up call for all the actors having a role on the IoT stage. The need to define and establish, as quickly as possible, viable security standards able to cope with the heterogeneous requirements arising from the IoT world is urgent, now more than ever. Maybe even before that, the dissemination of basic knowledge connected with the culture of IT security seems to play a major role in the overall security balance for IoT. Since it is more likely that systems using lightweight devices can be more vulnerable to security attacks, in this paper we start with analyzing MQTT, a message-based communication protocol explicitly designed having low-end devices in mind. After that, we move on to describe some of the security solutions and improvements typically suggested and implemented in real-life deployme nts of MQTT. Finally, we conclude this paper with a concise, though not exhaustive, survey on some of the most promising research topics in the IoT security area. (More)

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.80.177.176

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Perrone G., Vecchio M., Pecori R. and Giaffreda R. (2017). The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices.In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS, ISBN 978-989-758-245-5, pages 246-253. DOI: 10.5220/0006287302460253

@conference{iotbds17,
author={Giovanni Perrone and Massimo Vecchio and Riccardo Pecori and Raffaele Giaffreda},
title={The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices},
booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,},
year={2017},
pages={246-253},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006287302460253},
isbn={978-989-758-245-5},
}

TY - CONF

JO - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,
TI - The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices
SN - 978-989-758-245-5
AU - Perrone G.
AU - Vecchio M.
AU - Pecori R.
AU - Giaffreda R.
PY - 2017
SP - 246
EP - 253
DO - 10.5220/0006287302460253

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.