Results 11 to 20 of about 27,939 (257)

Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories

open access: yesIEEE Access
Amid the exponential rise of Internet of Things (IoT) devices, the Message Queue Telemetry Transport (MQTT) protocol has gained prominence due to its efficiency in facilitating device-cloud interactions. Yet, the surge in IoT device usage and MQTT’
Shams Ul Arfeen Laghari   +5 more
doaj   +2 more sources

Effective Feature Engineering Framework for Securing MQTT Protocol in IoT Environments

open access: yesSensors
The explosive growth of the domain of the Internet of things (IoT) network devices has resulted in unparalleled ease of productivity, convenience, and automation, with Message Queuing Telemetry Transport (MQTT) protocol being widely recognized as an ...
Abdulelah Al Hanif, Mohammad Ilyas
doaj   +2 more sources

A Scalable Real-Time SDN-Based MQTT Framework for Industrial Applications

open access: yesIEEE Open Journal of the Industrial Electronics Society
The increasing prominence of concepts such as Smart Production and Industrial Internet of Things (IIoT) within the context of Industry 4.0 has introduced a new set of requirements for the engineering of industrial systems, including support for dynamic ...
E. Shahri, P. Pedreiras, L. Almeida
doaj   +2 more sources

A Comparative Study of HTTP and MQTT for IoT Applications in Hydroponics

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
Hydroponics is based on nutrients in water. It must be regularly monitored to prevent plant defects. The Internet of Things has become a solution for remote hydroponic monitoring and is currently being tested on the Yuan Hidroponik Kelompok Wanita Tani ...
Irvan Rizki Nugraha   +2 more
doaj   +2 more sources

SGANFuzz: A Deep Learning-Based MQTT Fuzzing Method Using Generative Adversarial Networks

open access: yesIEEE Access
As the Internet of Things (IoT) industry grows, the risk of network protocol security threats has also increased. One protocol that has come under scrutiny for its security vulnerabilities is MQTT (Message Queuing Telemetry Transport), which is widely ...
Zhiqiang Wei   +4 more
doaj   +2 more sources

Prototype Wireless Network for Internet of Things based on DECT Standard

open access: yesTelfor Journal, 2022
This paper presents a software prototype of a wireless network for the Internet of Things (IoT) based on the DECT (Digital Enhanced Cordless Telecommunication) standard.
I. V. Sinyavskiy   +2 more
doaj   +1 more source

TD-MQTT: Transparent Distributed MQTT Brokers for Horizontal IoT Applications

open access: yes2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2022
2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and ...
Hmissi, Fatma, Ouni, Sofiane
openaire   +2 more sources

Authentication algorithm for internet of things networks based on MQTT protocol [PDF]

open access: yesSerbian Journal of Electrical Engineering, 2020
The authentication algorithm for machine-to-machine communication devices via the MQTT Protocol is considered, which allows verifying the device legality without sending the password.
Dikii Dmitrii
doaj   +1 more source

SlowTT: A Slow Denial of Service against IoT Networks

open access: yesInformation, 2020
The security of Internet of Things environments is a critical and trending topic, due to the nature of the networks and the sensitivity of the exchanged information.
Ivan Vaccari   +2 more
doaj   +1 more source

Denial of service attack detection through machine learning for the IoT

open access: yesJournal of Information and Telecommunication, 2020
Sustained Internet of Things (IoT) deployment and functioning are heavily reliant on the use of effective data communication protocols. In the IoT landscape, the publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is popular ...
Naeem Firdous Syed   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy