Loading…
Security assessment of common open source MQTT brokers and clients
Security and dependability of devices are paramount for the IoT ecosystem. Message Queuing Telemetry Transport protocol (MQTT) is the de facto standard and the most common alternative for those limited devices that cannot leverage HTTP. However, the MQTT protocol was designed with no security concer...
Saved in:
Published in: | arXiv.org 2023-09 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Edoardo Di Paolo Bassetti, Enrico Spognardi, Angelo |
description | Security and dependability of devices are paramount for the IoT ecosystem. Message Queuing Telemetry Transport protocol (MQTT) is the de facto standard and the most common alternative for those limited devices that cannot leverage HTTP. However, the MQTT protocol was designed with no security concern since initially designed for private networks of the oil and gas industry. Since MQTT is widely used for real applications, it is under the lens of the security community, also considering the widespread attacks targeting IoT devices. Following this direction research, in this paper we present an empirical security evaluation of several widespread implementations of MQTT system components, namely five broker libraries and three client libraries. While the results of our research do not capture very critical flaws, there are several scenarios where some libraries do not fully adhere to the standard and leave some margins that could be maliciously exploited and potentially cause system inconsistencies. |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2862629409</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2862629409</sourcerecordid><originalsourceid>FETCH-proquest_journals_28626294093</originalsourceid><addsrcrecordid>eNqNjMEKgkAQQJcgSMp_GOgsbLNqei2KLh0i72LbCJru2I4e-vs89AGd3uE93kIFaMwuymLElQpFWq01pntMEhOow53s5JvxA5UIifTkRuAaLPc9O-CBHAhP3hJcb0UBD88v8gKVe4LtmrmWjVrWVScU_rhW2_OpOF6iwfN7IhnLdh64WZWYpZhiHuvc_Fd9Ac7AOek</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2862629409</pqid></control><display><type>article</type><title>Security assessment of common open source MQTT brokers and clients</title><source>Publicly Available Content Database</source><creator>Edoardo Di Paolo ; Bassetti, Enrico ; Spognardi, Angelo</creator><creatorcontrib>Edoardo Di Paolo ; Bassetti, Enrico ; Spognardi, Angelo</creatorcontrib><description>Security and dependability of devices are paramount for the IoT ecosystem. Message Queuing Telemetry Transport protocol (MQTT) is the de facto standard and the most common alternative for those limited devices that cannot leverage HTTP. However, the MQTT protocol was designed with no security concern since initially designed for private networks of the oil and gas industry. Since MQTT is widely used for real applications, it is under the lens of the security community, also considering the widespread attacks targeting IoT devices. Following this direction research, in this paper we present an empirical security evaluation of several widespread implementations of MQTT system components, namely five broker libraries and three client libraries. While the results of our research do not capture very critical flaws, there are several scenarios where some libraries do not fully adhere to the standard and leave some margins that could be maliciously exploited and potentially cause system inconsistencies.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Cybersecurity ; Internet of Things ; Libraries ; Queueing ; Telemetry</subject><ispartof>arXiv.org, 2023-09</ispartof><rights>2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2862629409?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>780,784,25753,37012,44590</link.rule.ids></links><search><creatorcontrib>Edoardo Di Paolo</creatorcontrib><creatorcontrib>Bassetti, Enrico</creatorcontrib><creatorcontrib>Spognardi, Angelo</creatorcontrib><title>Security assessment of common open source MQTT brokers and clients</title><title>arXiv.org</title><description>Security and dependability of devices are paramount for the IoT ecosystem. Message Queuing Telemetry Transport protocol (MQTT) is the de facto standard and the most common alternative for those limited devices that cannot leverage HTTP. However, the MQTT protocol was designed with no security concern since initially designed for private networks of the oil and gas industry. Since MQTT is widely used for real applications, it is under the lens of the security community, also considering the widespread attacks targeting IoT devices. Following this direction research, in this paper we present an empirical security evaluation of several widespread implementations of MQTT system components, namely five broker libraries and three client libraries. While the results of our research do not capture very critical flaws, there are several scenarios where some libraries do not fully adhere to the standard and leave some margins that could be maliciously exploited and potentially cause system inconsistencies.</description><subject>Cybersecurity</subject><subject>Internet of Things</subject><subject>Libraries</subject><subject>Queueing</subject><subject>Telemetry</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNqNjMEKgkAQQJcgSMp_GOgsbLNqei2KLh0i72LbCJru2I4e-vs89AGd3uE93kIFaMwuymLElQpFWq01pntMEhOow53s5JvxA5UIifTkRuAaLPc9O-CBHAhP3hJcb0UBD88v8gKVe4LtmrmWjVrWVScU_rhW2_OpOF6iwfN7IhnLdh64WZWYpZhiHuvc_Fd9Ac7AOek</recordid><startdate>20230907</startdate><enddate>20230907</enddate><creator>Edoardo Di Paolo</creator><creator>Bassetti, Enrico</creator><creator>Spognardi, Angelo</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20230907</creationdate><title>Security assessment of common open source MQTT brokers and clients</title><author>Edoardo Di Paolo ; Bassetti, Enrico ; Spognardi, Angelo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_28626294093</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cybersecurity</topic><topic>Internet of Things</topic><topic>Libraries</topic><topic>Queueing</topic><topic>Telemetry</topic><toplevel>online_resources</toplevel><creatorcontrib>Edoardo Di Paolo</creatorcontrib><creatorcontrib>Bassetti, Enrico</creatorcontrib><creatorcontrib>Spognardi, Angelo</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Edoardo Di Paolo</au><au>Bassetti, Enrico</au><au>Spognardi, Angelo</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Security assessment of common open source MQTT brokers and clients</atitle><jtitle>arXiv.org</jtitle><date>2023-09-07</date><risdate>2023</risdate><eissn>2331-8422</eissn><abstract>Security and dependability of devices are paramount for the IoT ecosystem. Message Queuing Telemetry Transport protocol (MQTT) is the de facto standard and the most common alternative for those limited devices that cannot leverage HTTP. However, the MQTT protocol was designed with no security concern since initially designed for private networks of the oil and gas industry. Since MQTT is widely used for real applications, it is under the lens of the security community, also considering the widespread attacks targeting IoT devices. Following this direction research, in this paper we present an empirical security evaluation of several widespread implementations of MQTT system components, namely five broker libraries and three client libraries. While the results of our research do not capture very critical flaws, there are several scenarios where some libraries do not fully adhere to the standard and leave some margins that could be maliciously exploited and potentially cause system inconsistencies.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2023-09 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_2862629409 |
source | Publicly Available Content Database |
subjects | Cybersecurity Internet of Things Libraries Queueing Telemetry |
title | Security assessment of common open source MQTT brokers and clients |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T11%3A36%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Security%20assessment%20of%20common%20open%20source%20MQTT%20brokers%20and%20clients&rft.jtitle=arXiv.org&rft.au=Edoardo%20Di%20Paolo&rft.date=2023-09-07&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2862629409%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_journals_28626294093%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2862629409&rft_id=info:pmid/&rfr_iscdi=true |