Security risks in MQTT-based Industrial IoT Applications

Tejaswi Boppana, P. Bagade
{"title":"Security risks in MQTT-based Industrial IoT Applications","authors":"Tejaswi Boppana, P. Bagade","doi":"10.1109/COINS54846.2022.9854993","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) plays a crucial role in improving the quality of life. In recent years, IoT systems have proliferated in almost every industry, including manufacturing, automobiles, agriculture, and energy. IoT is the key enabling technology for Industry 4.0. This growing reliance on IoT devices piqued the interest of several adversaries attempting to gain unauthorized access to IoT systems for illicit purposes. So, it is essential to identify any potential security risks in IoT systems. Numerous Industrial Internet of Things (IIoT) applications, including wind turbines, agriculture, and warehouses, deploy hundreds of IoT devices in remote locations. These IoT devices are not physically monitored since it requires extensive human effort. Instead, the IoT devices are monitored by web applications that collect sensor data from remote devices. IoT application-layer protocols are responsible for communication between web applications and IoT devices in such large-scale IoT systems. Any communication flaw could put the entire IoT system at risk. The publish/subscribe-based MQTT protocol is a widely used IoT messaging standard. In this paper, we present a threat model and demonstrate a specific weakness in unencrypted MQTT-based IoT systems that enables an attacker to gain unauthorized access to the entire system by launching a combination of man-in-the-middle (MITM) and cross-site scripting (XSS) attacks. We also discuss steps to be taken and future directions for research in the security of industrial IoT systems using the MQTT communication protocol to avoid the possibility of such attacks.","PeriodicalId":187055,"journal":{"name":"2022 IEEE International Conference on Omni-layer Intelligent Systems (COINS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Omni-layer Intelligent Systems (COINS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COINS54846.2022.9854993","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Internet of Things (IoT) plays a crucial role in improving the quality of life. In recent years, IoT systems have proliferated in almost every industry, including manufacturing, automobiles, agriculture, and energy. IoT is the key enabling technology for Industry 4.0. This growing reliance on IoT devices piqued the interest of several adversaries attempting to gain unauthorized access to IoT systems for illicit purposes. So, it is essential to identify any potential security risks in IoT systems. Numerous Industrial Internet of Things (IIoT) applications, including wind turbines, agriculture, and warehouses, deploy hundreds of IoT devices in remote locations. These IoT devices are not physically monitored since it requires extensive human effort. Instead, the IoT devices are monitored by web applications that collect sensor data from remote devices. IoT application-layer protocols are responsible for communication between web applications and IoT devices in such large-scale IoT systems. Any communication flaw could put the entire IoT system at risk. The publish/subscribe-based MQTT protocol is a widely used IoT messaging standard. In this paper, we present a threat model and demonstrate a specific weakness in unencrypted MQTT-based IoT systems that enables an attacker to gain unauthorized access to the entire system by launching a combination of man-in-the-middle (MITM) and cross-site scripting (XSS) attacks. We also discuss steps to be taken and future directions for research in the security of industrial IoT systems using the MQTT communication protocol to avoid the possibility of such attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于mqtt的工业物联网应用中的安全风险
物联网(IoT)在提高生活质量方面发挥着至关重要的作用。近年来,物联网系统在制造业、汽车、农业和能源等几乎所有行业都得到了广泛应用。物联网是工业4.0的关键使能技术。这种对物联网设备的日益依赖激起了一些对手的兴趣,他们试图未经授权访问物联网系统以达到非法目的。因此,识别物联网系统中的任何潜在安全风险至关重要。许多工业物联网(IIoT)应用,包括风力涡轮机、农业和仓库,在偏远地区部署了数百个物联网设备。这些物联网设备没有受到物理监控,因为它需要大量的人力。相反,物联网设备由从远程设备收集传感器数据的web应用程序监控。在这种大规模的物联网系统中,物联网应用层协议负责web应用程序和物联网设备之间的通信。任何通信漏洞都可能使整个物联网系统处于危险之中。基于发布/订阅的MQTT协议是广泛使用的物联网消息传递标准。在本文中,我们提出了一个威胁模型,并展示了未加密的基于mqtt的物联网系统中的一个特定弱点,该弱点使攻击者能够通过启动中间人(MITM)和跨站点脚本(XSS)攻击的组合来获得对整个系统的未经授权的访问。我们还讨论了使用MQTT通信协议的工业物联网系统安全研究的步骤和未来方向,以避免此类攻击的可能性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Security risks in MQTT-based Industrial IoT Applications Time and Energy trade-off analysis for Multi-Installment Scheduling with result retrieval strategy for Large Scale data processing GANIBOT: A Network Flow Based Semi Supervised Generative Adversarial Networks Model for IoT Botnets Detection COINS 2022 Cover Page Interference Recognition for Fog Enabled IoT Architecture using a Novel Tree-based Method
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1