IoT devices are becoming more pervasive and integrated within our everyday lives, and networks of these devices are able to help humans accomplish complex and critical tasks. In such a network, IoT devices cooperate using Machine-to-Machine (M2M) communications to carry out such tasks. It becomes vital, therefore, to protect such a type of communication most often carried out by resource-constrained devices that cannot afford the overhead of a standard security protocol such as TLS. In this paper, a security framework for MQTT-M2M communications is proposed, considering a smart food retail shop use case. Specifically, we considered SlowIte, Data Forgery, Man-In-The-Middle, and Dictionary attacks that target the communication among the smart devices of food retail shop, proposing a mitigation method for each of them. To prove the benefits the proposal can provide, in terms of CPU/RAM utilization and network bandwidth consumption, we compared it with the baseline MQTT security standard, i.e. TLS.

Securing MQTT-M2M Communications in a Food Retail Distribution

Spina M. G.;Tropea M.;De Rango F.
2024-01-01

Abstract

IoT devices are becoming more pervasive and integrated within our everyday lives, and networks of these devices are able to help humans accomplish complex and critical tasks. In such a network, IoT devices cooperate using Machine-to-Machine (M2M) communications to carry out such tasks. It becomes vital, therefore, to protect such a type of communication most often carried out by resource-constrained devices that cannot afford the overhead of a standard security protocol such as TLS. In this paper, a security framework for MQTT-M2M communications is proposed, considering a smart food retail shop use case. Specifically, we considered SlowIte, Data Forgery, Man-In-The-Middle, and Dictionary attacks that target the communication among the smart devices of food retail shop, proposing a mitigation method for each of them. To prove the benefits the proposal can provide, in terms of CPU/RAM utilization and network bandwidth consumption, we compared it with the baseline MQTT security standard, i.e. TLS.
2024
MQTT
IoT
M2M
Security
ECC
Food Retail Distribution
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.11770/399628
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 4
  • ???jsp.display-item.citation.isi??? 4
social impact