Intrusion detection system for various IoT attacks on MQTT protocol
Abstract
In recent times the number of IoT devices have increased massively but the security
of these devices has not been upgraded. Due to this huge number, achieving high
security is a big challenge. The use of a classic centralized design in IoT systems can
compromise security. Gadgets in the Internet of Things have sensors that collect
information about their surroundings which is required for the correct operation of
IoT setups. If not secured, or if stolen or otherwise hacked, this data could have a
number of undesirable consequences. The Internet of Things devices use a variety
of communication protocols. The MQTT protocol is one of the protocols that has
previously been standardized by ISO. Because of its low memory use and low band width requirements, this protocol is popular among IoT developers. Occasionally,
IoT devices communicate sensitive data that is only meant for authorized devices.
The protocol, on the other hand, merely authenticates the security mechanism,
which does not encrypt the data being carried by default which is a major concern
in terms of data privacy, authentication, and data integrity. This paper highlights
numerous reasons why many IoT systems do not have proper security mechanisms
in place. Following that, it also shows and explains how we may easily attack this
protocol in a variety of assault scenarios. Finally, after learning about the flaws in
We can increase our security by looking into this protocol. awareness, particularly
of the MQTT protocol, and then implementation.