<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Tunisian-Algerian Conference on applied Computing, December</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Hayette Zeghida</string-name>
          <email>h.zeghida@univ-skikda.dz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mehdi Boulaiche</string-name>
          <email>boulaiche.mehdi@yahoo.fr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ramdane Chikh</string-name>
          <email>r.chikh@univ-skikda.dz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Attack</institution>
          ,
          <addr-line>Deep learning, Machine learning, MQTT, IoT</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1955</year>
      </pub-date>
      <volume>1</volume>
      <fpage>7</fpage>
      <lpage>18</lpage>
      <abstract>
        <p>The rapid evolution of the Internet of Things (IoT) technology has enabled the seamless connection of countless devices and sensors, allowing them to eficiently gather and transmit data to centralized networks. Currently, the number of devices connected to the Internet has surpassed the global human population, with projections indicating that this figure will likely double in the next few years. Despite this explosive growth, a unified global IoT framework is still lacking and no universal standards or protocols have been established to integrate the diverse components of the IoT ecosystem. Various communication protocols are in use today, with the Message Queuing Telemetry Transport (MQTT) protocol standing out as one of the most widely adopted. Designed specifically for sensor trafic on low-bandwidth and resource-limited networks, MQTT is highly suitable for supporting automated IoT systems. This paper delves into the structure and functionality of the MQTT protocol, ofering a detailed analysis of potential attack vectors that could threaten its security. In addition, it reviews recent advancements in security solutions and relevant studies from the literature to provide a comprehensive understanding of MQTT's vulnerabilities and defenses. By building a solid knowledge base on MQTT security, the paper aims to be an invaluable resource for the current IoT community and future developers. Furthermore, the paper serves as a foundation for future research, helping streamline the process of identifying, selecting, and implementing appropriate security measures for MQTT in diverse IoT applications.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The rapid and significant increase in smart devices, encompassing everything from vehicles and
household appliances to advanced healthcare gadgets and various industrial controllers, has spurred a
remarkable development of numerous innovative internet of things solutions. These unique solutions
typically rely on a low-cost, lightweight protocol that is designed specifically for eficient network
communication, such as the widely used MATT. This protocol facilitates seamless communication
among devices reliably and eficiently, which is essential for the proliferation of smart technologies.
The MQTT protocol was developed in the late 1990s by Andy Stanford-Clark of IBM and Arlen Nipper
of Arcom (later acquired by Eurotech); the MQTT was introduced as an extension to commercial
messaging systems. The Organization for the Advancement of Structured Information Standards
(OASIS) developed the MQTT IoT standard, which was subsequently approved for release by both the
International Organization for Standardization (ISO) and the International Electrotechnical Commission
(IEC). MQTT 3.1.1 was approved by the ISO and IEC Joint Technical Committee on Information
Technology (JTC1), receiving the designation ”ISO/IEC 20922” [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], with MQTT 5.0 being the latest
version [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        The MQTT protocol operates with three main components: the publisher, the subscriber, and the
broker (Figure 1). The publisher gathers data from various sources, such as sensors embedded in
machinery, wearables, or mobile devices. Subscribers use mobile applications to subscribe to specific
topics generated by the publisher (Figure 2). The broker serves as the central element of the MQTT
protocol, acting as an intermediary between publishers and subscribers. It stores messages in the cloud
and can handle the reception and transmission of multiple messages simultaneously [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>CEUR</p>
      <p>ceur-ws.org
The protocol includes a Quality of service (QoS) feature to ensure reliable message delivery from the
publisher to the subscriber, ofering three levels of QoS:
• Level 0: also known as ”at most once” delivery, the default option where the message is sent only
once without guarantees.
• Level 1: or ”at least once” delivery, which provides basic delivery assurance with the option to
resend if necessary.
• Level 2: or ”exactly once” delivery, where the message remains with the broker until it is confirmed
to have been received by the subscriber.</p>
      <p>Although the MQTT protocol provides significant advantages, it faces certain risks, including data
leakage, message tampering, and forwarding vulnerabilities. Additionally, the broker is susceptible to
well-known Denial of Service (DoS) attacks. As a result, it is essential to identify efective and eficient
security measures to safeguard this protocol.</p>
      <p>The remainder of the paper is organized as follows: Section II focuses on the use cases of MQTT
protocol in IoT. Section III addresses Common Security Threats in the MQTT Protocol, while Section IV
outlines the MQTT security enhancement measures. The paper concludes in Section V by highlighting
future research opportunities.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Use Cases of MQTT protocol in IoT</title>
      <p>
        Several IoT areas have benefited from and used the MQTT protocol’s characteristics in their operations.
Kouicem et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] summarized the following fields:
• Smart Healthcare: The introduction of intelligent sensors has made the healthcare system
competent. The publisher uses the MQTT protocol to detect blood pressure, heart rate, EEG, and ECG
and transmit the data to the subscriber.
• Smart Home: A smart home includes sensors, light, gas, temperature, and camera sensors.
      </p>
      <p>These sensors are all connected by microprogrammers, which gather data and transmit it to the
homeowner via the MQTT protocol.
• Smart weather monitoring: Using the MQTT protocol, several sensors, including air pressure
sensors, temperature sensors, humidity sensors, and sensors that measure wind speed and solar
radiation, work together to deliver real-time weather data.
• Smart Parking: A user can rapidly ascertain whether or not the parking place is available using a
smart parking system. Through the use of Radio Frequency IDentification (RFID) technology,
he is provided with parking information. An RFID reader reads the tag and then broadcasts the
information to the cloud via MQTT.
• Smart Industry: MQTT is essential to the smart industry because it enables direct
machine-tomachine communication, which can reduce material requirements, speed up decision-making, as
well as identify necessary items, which are some of today’s industry’s most pressing demands.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Common Security Threats in MQTT Protocol</title>
      <p>
        In the rapidly evolving landscape of the IoT, the MQTT protocol stands out for its eficiency and
simplicity in facilitating message exchange. MQTT clients typically communicate with brokers using
TCP/IP (Transmission Control Protocol/Internet Protocol ) port 1883 for unencrypted data exchanges,
while port 8883 is reserved for encrypted communications via SSL/TLS (Secure Sockets Layer and
Transport Layer Security) [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Despite the encryption option, the MQTT protocol remains vulnerable
because developers focus on lightweight solutions and bandwidth usage rather than prioritizing security.
This leaves the system exposed to various threats. Physical attacks, for instance, can disable IoT devices
like mobile phones, routers, cameras, and sensors. Additionally, cyber-attacks may compromise wireless
networks, allowing malicious actors to manipulate and jeopardize connected devices. This section
explores the most critical attacks targeting the MQTT protocol.
      </p>
      <p>• Unauthorized Access : Unauthorized access to MQTT installations poses a significant threat,
as it can compromise the integrity of data exchanged between MQTT clients (publishers or
subscribers) and brokers. Attackers can exploit weak credentials, insecure permissions, or web
vulnerabilities to gain unauthorized access, allowing them to send or manipulate messages. Once
compromised, attackers can interfere with the communication between MQTT brokers and clients,
leading to data manipulation and compromised system integrity [19]. Many real-world incidents
of unauthorized access to MQTT brokers are often caused by weak or leaked credentials, such as
using default usernames and passwords like ”admin/admin123.” To prevent such attacks, strict
security measures should be implemented.
• Message tampering: Message tampering poses a significant security threat in the MQTT
protocol, where attackers alter message contents during transmission, leading to misinformation
or unintended data leaks. This can destabilize devices and infrastructure and diminish trust in
the system. Common techniques include IP/DNS ( Internet Protocol/Domain Name System )
spoofing, DHCP (Dynamic Host Configuration Protocol) starvation, and bufer overflow, resulting
in message modification or delays. Attackers may manipulate messages on networks or within
client/server applications. To counter this, integrity checks, encryption, and digital signatures
are employed to ensure data integrity from origin to destination. These measures help detect
tampering and secure end-to-end communication [21].
• Denial of Service (DoS): Denial of Service (DoS) attacks aim to disrupt MQTT systems by
depleting resources like connection handling or CPU (Central Processing Unit) capacity.
Attackers can overload the server by creating excessive connections or repeatedly sending client
authentication data, preventing legitimate connections and services.</p>
      <p>
        DoS attacks can be individual, where a single attacker sends numerous requests, or distributed,
where compromised hosts across the Internet generate overwhelming trafic. The consequences
include reduced system capacity, service failures, and potential cascading failures afecting the
broader network [20]. In some cases, the attacker may use higher QoS levels along with large
payloads to strain the broker’s resources. For example, QoS level 2 requires the broker to store
messages until they are successfully delivered, which can lead to resource depletion if messages
fail to transmit [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Common DoS attacks include Mirai, flooding, and SlowITe [ 20].
• Man-in-the-Middle: One of the most deadly attacks, the attacker intercepts data transmitted
between two connection points and tricks them into believing they are directly linked. Then,
it may obtain and assess published data before editing and disseminating it to subscribers. The
attacker may introduce messages containing remote control orders, such as ”RESTORE FACTORY
SETTINGS” or ”OFF” directives to disable specific devices [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
• Brute Force attack: This kind of attack lacks a clear plan and concentrates on trying every
possible key to subscribe to the broker. A suitable key may be created by cleverly converting the
ciphertext to plaintext. Although it takes a while, the attacker’s full access to network resources
breaches privacy and increases the chance that connected equipment may be damaged [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
• Ransomware: Also called phishing. This type of attack often begins with an email asking
recipients to perform some actions, including clicking on a malicious link or downloading a
malicious file, to get sensitive information. The ransomware scams may also use text messages,
phone calls, and social networking sites to deceive victims into supplying personal information.
The Ransomware locks users out of their workstations or encrypts data after gaining user
information like login passwords and credit card numbers. After that, the victim is prompted to
hand over a ransom to end the siege on the device and the services it ofers [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. MQTT security enhancement measures</title>
      <p>The MQTT protocol, a popular messaging system used in many networked environments, faces several
security challenges. One of the main issues is the use of open network ports, which can be easily
accessed and exploited by unauthorized users. Additionally, the protocol allows users to freely subscribe
to and publish on any topic, creating opportunities for malicious activities. Another vulnerability
arises from sending data in unencrypted, plain text format, making it easy for interceptors to access
sensitive information. Moreover, many users often need to pay more attention to the importance of
changing the default username and password provided by the factory, leaving their systems vulnerable
to attacks. Implementing robust security measures, such as encryption using Secure Transport Layer
(STL), is also hampered by the limited resources available in many MQTT environments. Recent
research has focused on enhancing MQTT security to combat these vulnerabilities. These eforts
primarily involve applying advanced Machine Learning (ML) and Deep Learning (DL) techniques.
These methodologies ofer promising solutions for detecting and mitigating security threats in MQTT
systems, thus significantly improving their overall security posture. (Table 1) summarizes the strengths
and weaknesses of contemporary studies.</p>
      <sec id="sec-4-1">
        <title>Paper Strengths Weaknesses</title>
        <p>
          Hindy et al [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] Creating a fresh IoT-MQTT dataset and The authors used a simulated dataset for
making it available to the public, al- their model evaluation, which may need
lowing other academics to utilize it to capture the complexity and variability
to investigate the issues of IoT intru- of real-world IoT trafic fully. In addition,
sion detection further. The research The paper did not compare the
perforemphasized the significance of lever- mance of the proposed model with other
aging flow-based characteristics to dis- existing models, which could provide
valutinguish MQTT-based attacks from be- able insights into the efectiveness of the
nign trafic, which has practical impli- proposed approach.
cations for developing successful IDS
in IoT networks.
        </p>
        <p>
          Zeghida et al the ensemble learning techniques The proposed method was applied only to
[
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] demonstrated excellent results com- the MQTT protocol, and it was unclear
pared to single learning strategies. whether this method could be used for
Also, processing data to have balanced other types of IoT protocols.
        </p>
        <p>data is essential for better outcomes.</p>
        <p>
          Dewantaz et The SibProMQTT scheme is designed Focus on Sybil attacks in MQTT protocols
al[
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] to be lightweight and eficient, making without addressing other IoT security
isit suitable for IoT devices with low com- sues and the lack of comparative analysis
putational resources. The experimental with other MQTT security solutions.
Furresults showed minimal computational thermore, there was a restriction to a few
cost addition, making it a practical so- devices in the experimental step,
potenlution for IoT systems. tially not reflecting larger IoT systems.
        </p>
        <p>
          Zeghida et al Provided an in-depth analysis of MQTT The work Focused on identifying a
sin[
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] protocol vulnerabilities, and created a gular category of IoT attacks while
disrenovel approach using DL techniques to garding alternative potential threats and
develop a hybrid DL intrusion detec- restricting the comparison of results to a
tion system for MQTT-based systems solitary study rather than incorporating
and demonstrated the superiority of multiple relevant works.
this approach over traditional ML
methods.
        </p>
        <p>Im, Y., &amp; Lim, M. Introduced a new mechanism that tack- The experiments and evaluations were
lim[18] les the issue of end-to-end commu- ited to simulated or controlled
environnication in MQTT by incorporating ments, and there was a lack of real-world
request-response patterns to facilitate deployment and testing of E-MQTT in
direct communication between a pub- practical IoT or communication systems.
lisher and subscribers and including
experiments to benchmark its
performance against standard MQTT. The
experimental findings consistently
indicated that E-MQTT surpasses
traditional MQTT in terms of delay.</p>
        <p>Continued on the next page</p>
        <p>
          Kim et al [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] developed a comprehensive IoT security framework that identifies multiple IoT and
botnet attacks utilizing the N-BaIoT dataset. Their model was proposed to identify attacks on IoT devices
using a combination of five ML techniques; Naive Bayes (NB), K-Nearest Neighbors (K-NN), Logistic
Regression (LR), Decision Tree (DT), Random Forest (RF), and three DL algorithms; Convolutional
Neural Network (CNN), Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM). The ML
models, specifically DT and RF, demonstrated superior performance in detecting the Mirai and Bashlite
botnets inside the N-BaIoT dataset. According to the F1-score metric, the CNN model outperformed all
other DL models.
        </p>
        <p>
          Syed et al [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. developed a new MQTT dataset with three types of attacks: denial proposed an
MLbased framework for detecting DoS attacks in IoT devices. The authors focus on the MQTT protocol,
commonly used in IoT communication, and present an attack model for DoS attacks on this protocol.
To analyze network trafic and detect anomalies that may indicate a DoS attack, three machine learning
techniques were applied: Average One-Dependence Estimator (AODE), derived from Naive Bayes; C4.5,
built on decision trees; and Multilayer Perceptron (MLP), rooted in artificial neural networks. These
algorithms were used to assess the classifiers’ efectiveness in distinguishing between normal and attack
categories, using count-based flow characteristics and field length variables. The empirical findings
demonstrate that their suggested methodology may eficiently identify DoS assaults with a notable
level of precision.
        </p>
        <p>
          Vaccari et al [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] introduced MQTTset, a novel dataset that focuses on the MQTT protocol, which is
extensively used in IoT networks. The new dataset was used to train ML models, including RF, NB, DT,
Neural Network (NN), Gradient Boosting (GB), and MLP, in order to develop detection methods for
safeguarding IoT environments. The authors also emphasize the significance of detection systems in
the field of cyber-security and underscore the necessity for tailored datasets to train these models.
Alaiz-Moreton et al [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] created a new MQTT dataset containing three types of attacks: denial of
service, man-in-the-middle, and intrusion. Their focus was on identifying attacks targeting IoT systems
that utilize the MQTT protocol. They suggested models for an Intrusion Detection System (IDS) that
can quickly identify network intrusions and security threats by using ensemble ML and DL algorithms;
Extreme Gradient Boosting (XGBoost), LSTM, and Gated Recurrent Unit (GRU) to categorize the frames
an IDS might assign as attack or normal. Their work provides valuable insights into detecting assaults
on IoT devices utilizing various methods.
        </p>
        <p>
          Mosaiyebzadeh et al [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] proposed a Deep Learning-based network intrusion detection system trained
using ” MQTT-IoT-IDS2020,” a public dataset containing MQTT attacks. The proposed DNN,
CNNRNN-LSTM, and LSTM models were evaluated using standard performance metrics such as accuracy,
precision, recall, F1-score, and weighted average. The performance assessment yielded very accurate
ifndings and an F1-score in the CNN-RNN-LSTM model.
        </p>
        <p>
          Hindy et al [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] created a new dataset called ”MQTT-IoT-IDS2020” that includes both regular and attack
situations in the context of IoT-MQTT. They made this dataset available to the public. The researchers
developed a model that utilized six distinct ML approaches, including LR, k-NN, DT, RF, SVM, and NB,
to detect intrusions in IoT networks. The researchers extracted three levels of features from the raw
data (uniflow, biflow, packet features) and evaluated the significance of using high-level (flow-based)
features to build their IDS. The findings demonstrated the eficacy of flow-based characteristics in
identifying assaults.
        </p>
        <p>
          Zeghida et al [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] introduced an IDS-based Ensemble Learning model to defend against cyber-attacks
on IoT devices. They first generated a balanced binary dataset from the MQTTset dataset for training
and testing the IDS. Then, they proposed and assessed three ensemble learning techniques—bagging,
boosting, and stacking—for identifying intrusions in IoT systems through MQTT trafic analysis. The
results confirmed the efectiveness of their approach, where accuracy exceeded 95%.
        </p>
        <p>
          Dewantaz et al[
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] introduced ”SibProMQTT”, a security scheme for enhancing the MQTT protocol
in IoT devices. It focuses on defending against Sybil, message falsification, replay, and impersonation
attacks. The scheme uses timestamps, session keys, and encryption for secure data transmission. It is
proven efective through security analyses and experiments. SibProMQTT is notable for its lightweight,
eficient approach to ensuring data protection and resistance to various attacks, thereby improving
MQTT communication security in IoT systems.
        </p>
        <p>
          Zeghida et al [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] proposed a deep learning (DL)-enabled IDS designed to detect DoS attacks in
MQTTenabled IoT device interactions. They employed a publicly available dataset known as the ’MQTT
dataset.’ Initially, they used individual algorithms such as LSTM, CNN, and GRU. Later, they integrated
several DL algorithms to maximize their capabilities. So, hybrid DL models like CNN-RNN, CNN-LSTM,
and CNN-GRU were created. The results of this study were excellent, with an accuracy rate of more
than 99% and a meager loss rate of 0.072.
        </p>
        <p>In their study, Im, Y., &amp; Lim, M. [18] introduced a new mechanism called ”E-MQTT” to specifically tackle
the fundamental End-to-End communication issue seen in MQTT. E-MQTT enhances the capability of
request-response patterns for seamless communication between a publisher and subscribers, allowing
for the verification of the exact instant when subscribers get the message. The system facilitates
bidirectional communication in two modes based on the configuration of the minimal number of answer
packets: synchronous and asynchronous modes. The researchers deployed E-MQTT and conducted
a comparative analysis with MQTT, demonstrating that E-MQTT efectively decreases the latency of
end-to-end request-response communication.</p>
        <p>Alasmari &amp; Alhogail [22] conducted a a a thorough research that presented an efective ML-based IDS
tailored to safeguard smart home IoT devices against MQTT assaults. Their study used an extended
two-stage assessment technique to analyze 22 machine learning algorithms, finally determining that
the Generalized Linear Model (GLM) paired with random oversampling is the most successful option,
obtaining 100% accuracy and F-score. Notably, their study provided autonomous feature engineering
strategies that improve model performance while decreasing detection time, solving the key issue of
class imbalance in intrusion detection.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>CONCLUSION</title>
      <p>The IoT has revolutionized connectivity, allowing a vast array of services, devices, and systems to be
interconnected. This has led to the integration of numerous protocols and applications tailored to
diferent use cases. Among these, MQTT stands out as a particularly suitable protocol for IoT scenarios.
Its significance is primarily due to its lightweight nature, making it ideal for environments where
resources like electricity, processing power, memory, and bandwidth are constrained. Additionally,
MQTT’s open-source nature and ease of use add to its appeal in these settings. Recent research has
increasingly focused on the security aspects of MQTT, recognizing it as a critical area of concern. This
article provides a comprehensive overview of the MQTT protocol, including its various applications in
the IoT landscape. It delves into the security challenges associated with MQTT, ofering an in-depth
analysis of the protocol’s vulnerabilities.</p>
      <p>Furthermore, the article presents a summary of the most up-to-date research on the detection of
attacks targeting MQTT. This includes a critical evaluation of the strengths and limitations of current
methodologies in identifying and mitigating these security threats. As part of ongoing and future
initiatives, there is a clear intention to continue this research to advance MQTT security. Future eforts
aim to develop more resilient and adaptive solutions capable of efectively protecting MQTT in the
rapidly evolving and interconnected IoT ecosystem.</p>
      <sec id="sec-5-1">
        <title>Declaration on Generative AI</title>
        <p>The authors have not employed any Generative AI tools.
ment. In International Conference on Intelligent Systems and Pattern Recognition (pp. 129-140).</p>
        <p>Cham: Springer Nature Switzerland.
[18] Im, Y., &amp; Lim, M. (2023). E-MQTT: End-to-End Synchronous and Asynchronous Communication</p>
        <p>Mechanisms in MQTT Protocol. Applied Sciences, 13(22), 12419.
[19] Kant, D., Johannsen, A.,&amp; Creutzburg, R. (2021). Analysis of IoT security risks based on the exposure
of the MQTT protocol. Electronic Imaging, 33, 1-8.
[20] Vaccari, I., Aiello, M., &amp; Cambiaso, E. (2020). SlowITe, a novel denial of service attack afecting</p>
        <p>MQTT. Sensors, 20(10), 2932.
[21] Chen, F., Huo, Y., Zhu, J., &amp; Fan, D. (2020, November). A review on the study on MQTT security
challenge. In 2020 IEEE International Conference on Smart Cloud (SmartCloud) (pp. 128-133). IEEE.
[22] Alasmari, R., &amp; Alhogail, A. A. (2024). Protecting Smart-Home IoT Devices From MQTT Attacks:
An Empirical Study of ML-Based IDS. IEEE Access, 12, 25993-26004.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Roman</surname>
            , Rodrigo,
            <given-names>Pablo</given-names>
          </string-name>
          <string-name>
            <surname>Najera</surname>
          </string-name>
          , and Javier Lopez.
          <article-title>”Securing the internet of things</article-title>
          .”
          <source>Computer 44.9</source>
          (
          <year>2011</year>
          ):
          <fpage>51</fpage>
          -
          <lpage>58</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Belkhiri</surname>
          </string-name>
          ,
          <string-name>
            <surname>Hamza</surname>
          </string-name>
          , et al. ”
          <article-title>Security in the internet of things: recent challenges and solutions</article-title>
          .
          <source>” Proceedings of the 4th International Conference on Electrical Engineering and Control Applications: ICEECA</source>
          <year>2019</year>
          ,
          <volume>17</volume>
          -
          <fpage>19</fpage>
          December 2019, Constantine, Algeria. Springer Singapore,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Kouicem</surname>
            ,
            <given-names>Djamel</given-names>
          </string-name>
          <string-name>
            <surname>Eddine</surname>
          </string-name>
          , Abdelmadjid Bouabdallah, and Hicham Lakhlef. ”
          <article-title>Internet of things security: A top-down survey</article-title>
          .”
          <source>Computer Networks</source>
          <volume>141</volume>
          (
          <year>2018</year>
          ):
          <fpage>199</fpage>
          -
          <lpage>221</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Dinculeană</surname>
          </string-name>
          , Dan, and Xiaochun Cheng. ”
          <article-title>Vulnerabilities and limitations of MQTT protocol used between IoT devices</article-title>
          .”
          <source>Applied Sciences 9.5</source>
          (
          <year>2019</year>
          ):
          <fpage>848</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Firdous</surname>
            ,
            <given-names>Syed</given-names>
          </string-name>
          <string-name>
            <surname>Naeem</surname>
          </string-name>
          , et al. ”
          <article-title>Modelling and evaluation of malicious attacks against the iot mqtt protocol</article-title>
          .” 2017
          <string-name>
            <given-names>IEEE</given-names>
            <surname>International</surname>
          </string-name>
          <article-title>Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and</article-title>
          IEEE Cyber,
          <article-title>Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)</article-title>
          . IEEE,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <surname>Fu</surname>
          </string-name>
          , et al. ”
          <article-title>A review on the study on MQTT security challenge</article-title>
          .”
          <source>2020 IEEE International Conference on Smart Cloud (SmartCloud)</source>
          . IEEE,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Makhija</surname>
          </string-name>
          , Jigar, Akhil Appu Shetty, and Ananya Bangera. ”
          <article-title>Classification of attacks on MQTT-based IoT system using machine learning techniques</article-title>
          .
          <source>” International Conference on Innovative Computing and Communications: Proceedings of ICICC 2021</source>
          , Volume
          <volume>3</volume>
          . Springer Singapore,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Patel</surname>
          </string-name>
          , Rushi. ”
          <article-title>Cyber Security in Domain of IoT: A Review Threats</article-title>
          and Security.” (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <surname>Jiyeon</surname>
          </string-name>
          , et al. ”
          <article-title>Intelligent detection of iot botnets using machine learning and deep learning</article-title>
          .
          <source>” Applied Sciences 10.19</source>
          (
          <year>2020</year>
          ):
          <fpage>7009</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Syed</surname>
            ,
            <given-names>Naeem</given-names>
          </string-name>
          <string-name>
            <surname>Firdous</surname>
          </string-name>
          , et al. ”
          <article-title>Denial of service attack detection through machine learning for the IoT</article-title>
          .
          <source>” Journal of Information and Telecommunication</source>
          <volume>4</volume>
          .4 (
          <year>2020</year>
          ):
          <fpage>482</fpage>
          -
          <lpage>503</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Vaccari</surname>
          </string-name>
          ,
          <string-name>
            <surname>Ivan</surname>
          </string-name>
          , et al. ”
          <article-title>MQTTset, a new dataset for machine learning techniques</article-title>
          <source>on MQTT.” Sensors</source>
          <volume>20</volume>
          .22 (
          <year>2020</year>
          ):
          <fpage>6578</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Alaiz-Moreton</surname>
          </string-name>
          , Hector, et al. ”
          <article-title>Multiclass classification procedure for detecting attacks on MQTTIoT protocol</article-title>
          .”
          <source>Complexity</source>
          <year>2019</year>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Mosaiyebzadeh</surname>
          </string-name>
          ,
          <string-name>
            <surname>Fatemeh</surname>
          </string-name>
          , et al. ”
          <article-title>A network intrusion detection system using deep learning against mqtt attacks in iot</article-title>
          .”
          <source>2021 IEEE Latin-American Conference on Communications (LATINCOM)</source>
          . IEEE,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Hindy</surname>
          </string-name>
          ,
          <string-name>
            <surname>Hanan</surname>
          </string-name>
          , et al. ”
          <article-title>Machine learning based IoT intrusion detection system: An MQTT case study (MQTT-IoT-IDS2020 dataset)</article-title>
          .
          <source>” Selected Papers from the 12th International Networking Conference: INC 2020</source>
          . Cham: Springer International Publishing,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Zeghida</surname>
            , Hayette,
            <given-names>Mehdi</given-names>
          </string-name>
          <string-name>
            <surname>Boulaiche</surname>
          </string-name>
          , and Ramdane Chikh. ”
          <article-title>Securing MQTT protocol for IoT environment using IDS based on ensemble learning</article-title>
          .”
          <source>International Journal of Information Security</source>
          (
          <year>2023</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Dewantaz</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wahidah</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hertiana</surname>
            ,
            <given-names>S. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sanjoyo</surname>
            ,
            <given-names>D. D.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Arifin</surname>
            ,
            <given-names>S. H. S.</given-names>
          </string-name>
          (
          <year>2023</year>
          ,
          <article-title>September)</article-title>
          .
          <article-title>SibProMQTT: Protection of the MQTT Communication Protocol Against Sybil Attacks Applied for IoT Devices</article-title>
          .
          <source>In 2023 International Conference on IC Design and Technology (ICICDT)</source>
          (pp.
          <fpage>108</fpage>
          -
          <lpage>111</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Zeghida</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boulaiche</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Chikh</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2023</year>
          , May).
          <article-title>Detection of DoS Attacks in</article-title>
          MQTT Environ-
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>