Show simple item record

dc.contributor.advisorHossain, Dr. Muhammad Iqbal
dc.contributor.advisorRahman, Rafeed
dc.contributor.authorFarhan
dc.contributor.authorMueth Ul Ehsan Ananno
dc.contributor.authorTanzil Talat Anonto
dc.contributor.authorSazzad Alam Tomal
dc.date.accessioned2022-11-15T08:33:58Z
dc.date.available2022-11-15T08:33:58Z
dc.date.copyright2022
dc.date.issued2022-01
dc.identifier.otherID: 17201109
dc.identifier.otherID: 17301142
dc.identifier.otherID: 17201078
dc.identifier.otherID: 16301124
dc.identifier.urihttp://hdl.handle.net/10361/17571
dc.descriptionThis thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2022.en_US
dc.descriptionCataloged from PDF version of thesis.
dc.descriptionIncludes bibliographical references (pages 32-33).
dc.description.abstractIn recent times the number of IoT devices have increased massively but the security of these devices has not been upgraded. Due to this huge number, achieving high security is a big challenge. The use of a classic centralized design in IoT systems can compromise security. Gadgets in the Internet of Things have sensors that collect information about their surroundings which is required for the correct operation of IoT setups. If not secured, or if stolen or otherwise hacked, this data could have a number of undesirable consequences. The Internet of Things devices use a variety of communication protocols. The MQTT protocol is one of the protocols that has previously been standardized by ISO. Because of its low memory use and low band width requirements, this protocol is popular among IoT developers. Occasionally, IoT devices communicate sensitive data that is only meant for authorized devices. The protocol, on the other hand, merely authenticates the security mechanism, which does not encrypt the data being carried by default which is a major concern in terms of data privacy, authentication, and data integrity. This paper highlights numerous reasons why many IoT systems do not have proper security mechanisms in place. Following that, it also shows and explains how we may easily attack this protocol in a variety of assault scenarios. Finally, after learning about the flaws in We can increase our security by looking into this protocol. awareness, particularly of the MQTT protocol, and then implementation.en_US
dc.description.statementofresponsibilityFarhan
dc.description.statementofresponsibilityMueth Ul Ehsan Ananno
dc.description.statementofresponsibilityTanzil Talat Anonto
dc.description.statementofresponsibilitySazzad Alam Tomal
dc.format.extent33 Pages
dc.language.isoen_USen_US
dc.publisherBrac Universityen_US
dc.rightsBrac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subjectMQTTen_US
dc.subjectAttacksen_US
dc.subjectSecurityen_US
dc.subjectCentralizeden_US
dc.subject.lcshInternet of things
dc.subject.lcshComputer networks
dc.titleIntrusion detection system for various IoT attacks on MQTT protocolen_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Science and Engineering, Brac University
dc.description.degreeB. Computer Science and Engineering


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record