Securing the IoT application layer from an MQTT protocol perspective: Challenges and research prospects

S Lakshminarayana, A Praseed… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the most promising new millennial technologies, having
numerous applications in our surrounding environment. The fundamental goal of an IoT …

Lightweight cryptography in IoT networks: A survey

M Rana, Q Mamun, R Islam - Future Generation Computer Systems, 2022 - Elsevier
With the advent of advanced technology, the IoT has made possible the connection of
numerous devices that can collect vast volumes of data. Hence, the demands of IoT security …

[HTML][HTML] SlowITe, a novel denial of service attack affecting MQTT

I Vaccari, M Aiello, E Cambiaso - Sensors, 2020 - mdpi.com
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …

[HTML][HTML] Slowtt: A slow denial of service against iot networks

I Vaccari, M Aiello, E Cambiaso - Information, 2020 - mdpi.com
The security of Internet of Things environments is a critical and trending topic, due to the
nature of the networks and the sensitivity of the exchanged information. In this paper, we …

Current lightweight cryptography protocols in smart city IoT networks: A survey

M Rana, Q Mamun, R Islam - arxiv preprint arxiv:2010.00852, 2020 - arxiv.org
With the advent of advanced technology, IoT introduces a vast number of devices
connecting with each other and collecting a sheer volume of data. Thus, the demands of IoT …

The implementation of encryption algorithms in mqtt protocol for iot constrained devices

Y Iqbal, MF Amjad, F Khan… - 2022 14th International …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is a promising and emerging technology in which many devices
communicate, process, and exchange information with other devices, servers, or …

[PDF][PDF] DoS attacks detection in MQTT networks

D Dikii, S Arustamov… - Indonesian Journal of …, 2021 - pdfs.semanticscholar.org
The paper considers the problem of protecting the Internet of things infrastructure against
denial-of-service (DoS) attacks at the application level. The authors considered parameters …

A precision cybersecurity workflow for cyber-physical systems: The iot healthcare use case

F Spegni, A Sabatelli, A Merlo, L Pepa… - … on Research in …, 2022 - Springer
The IoT paradigm revolves around a tight interaction between the IT side (ie, the thing and
the software therein) and the human counterpart. From a security standpoint, both these …

Internet of Things (IoT) applications security trends and challenges

AA Laghari, H Li, AA Khan, Y Shoulin, S Karim… - Discover Internet of …, 2024 - Springer
The idea behind layered design is the foundation of the Internet of Things. Each tier uses a
variety of technologies for capacity, preparation, and information transmission. With regard …

Traffic Analysis in V2X Application-Level Gateways

S Szancer - 2024 - reposit.haw-hamburg.de
Future cars will communicate with a variety of entities ranging from other vehicles and
infrastructure, such as traffic lights, to Internet-based services running on remote servers …