Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
MQTT in Focus: Understanding the Protocol and Its Recent
Advancements
Nael M. Radwan, Jim Alves-Foss
Pages - 1 - 14 | Revised - 31-05-2024 | Published - 30-06-2024
MORE INFORMATION
KEYWORDS
The Internet of Things (IoT), Message Queuing Telemetry Transfer (MQTT), Messaging Protocols (MP).
ABSTRACT
This article offers a detailed exploration of MQTT (Message Queuing Telemetry Transport) and its
latest version, MQTTv5. It delves into MQTT's components, protocol layers, and the pivotal role
of brokers in MQTT networks. We differentiate between public and private brokers, outlining their
use cases. The article focuses on MQTT's flow control mechanisms, emphasizing MQTTv5's
enhancements with sending quotas and the Receive Maximum attribute. It discusses limitations
related to message Quality of Service (QoS) levels. We also address MQTT's challenges,
including TCP reliance, scalability issues, single points of failure, implementation complexity, and
TCP/IP support requirements. This information equips readers with insights to make informed
decisions for IoT projects.
Al-Hawawreh, M. and E. Sitnikova (2020). Developing a security testbed for industrial internet of things. IEEE Internet of Things Journal 8(7): 5558-5573. | |
Andy, S., Rahardjo, B., & Hanindhito, B. (2017, September). Attack scenarios and security analysis of MQTT communication protocol in IoT system. In 2017 4th international conference on electrical engineering, computer science and informatics (EECSI) (pp. 1-6). IEEE. | |
Atmoko, R. A., Riantini, R., & Hasin, M. K. (2017, May). IoT real time data acquisition using MQTT protocol. In Journal of Physics: Conference Series (Vol. 853, No. 1, p. 012003). IOP Publishing. | |
Bashir, A., & Mir, A. H. (2020). Lightweight Secure-MQTT for Internet of Things. In Optical and Wireless Technologies: Proceedings of OWT 2019 (pp. 57-66). Springer Singapore. | |
Bender, M., Kirdan, E., Pahl, M. O., & Carle, G. (2021, January). Open-source MQTT evaluation. In 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC) (pp. 1-4). IEEE. | |
Bhawiyuga, A., Data, M., & Warda, A. (2017, October). Architectural design of token based authentication of MQTT protocol in constrained IoT device. In 2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA) (pp. 1-4). IEEE. | |
Dinculeană, D., & Cheng, X. (2019). Vulnerabilities and limitations of MQTT protocol used between IoT devices. Applied Sciences, 9(5), 848. | |
Fauzan, A., Sukarno, P., & Wardana, A. A. (2020, September). Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System. In 2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) (pp. 415-420). IEEE. | |
Ferrari, P., Flammini, A., Sisinni, E., Rinaldi, S., Brandão, D., & Rocha, M. S. (2018). Delay estimation of industrial IoT applications based on messaging protocols. IEEE Transactions on Instrumentation and Measurement, 67(9), 2188-2199. | |
Froiz-Míguez, I., Fernández-Caramés, T. M., Fraga-Lamas, P., & Castedo, L. (2018). Design, implementation and practical evaluation of an IoT home automation system for fog computing applications based on MQTT and ZigBee-WiFi sensor nodes. Sensors, 18(8), 2660. | |
Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2017). Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet of things journal, 5(4), 2483-2495. | |
Grgić, K., Špeh, I., & Heđi, I. (2016, October). A web-based IoT solution for monitoring data using MQTT protocol. In 2016 international conference on smart systems and technologies (SST) (pp. 249-253). IEEE. | |
Gupta, V., Khera, S., & Turk, N. (2021). MQTT protocol employing IOT based home safety system with ABE encryption. Multimedia Tools and Applications, 80(2), 2931-2949. | |
Hiromoto, R. E., Haney, M., & Vakanski, A. (2017, September). A secure architecture for IoT with supply chain risk management. In 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) (Vol. 1, pp. 431-435). IEEE. | |
Hunkeler, U., Truong, H. L., & Stanford-Clark, A. (2008, January). MQTT-S—A publish/subscribe protocol for Wireless Sensor Networks. In 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE'08) (pp. 791-798). IEEE. | |
Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., & Alonso-Zarate, J. (2015). A survey on application layer protocols for the internet of things. Transaction on IoT and Cloud computing, 3(1), 11-17. | |
Kumar, A., Sharma, S., Goyal, N., Singh, A., Cheng, X., & Singh, P. (2021). Secure and energy-efficient smart building architecture with emerging technology IoT. Computer Communications, 176, 207-217. | |
Kumari, A., Tanwar, S., Tyagi, S., & Kumar, N. (2018). Fog computing for Healthcare 4.0 environment: Opportunities and challenges. Computers & Electrical Engineering, 72, 1-13. | |
Lara, E., Aguilar, L., Sanchez, M. A., & GarcÃa, J. A. (2020). Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial Internet of Things. Sensors, 20(2), 501. | |
Liu, X., Zhang, T., Hu, N., Zhang, P., & Zhang, Y. (2020). The method of Internet of Things access and network communication based on MQTT. Computer Communications, 153, 169-176. | |
Obaidat, M. A., Obeidat, S., Holst, J., Al Hayajneh, A., & Brown, J. (2020). A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities and countermeasures. Computers, 9(2), 44. | |
Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., & Fang, B. (2020). A survey on access control in the age of internet of things. IEEE Internet of Things Journal, 7(6), 4682-4696. | |
Radwan, N. M. (2020). A study: The future of the internet of things and its home applications. International Journal of Computer Science and Information Security (IJCSIS), 18(1). | |
Rahmani, A. M., Gia, T. N., Negash, B., Anzanpour, A., Azimi, I., Jiang, M., & Liljeberg, P. (2018). Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. Future Generation Computer Systems, 78, 641-658. | |
Ray, P. P. (2017). Internet of things for smart agriculture: Technologies, practices and future direction. Journal of Ambient Intelligence and Smart Environments, 9(4), 395-420. | |
Soni, D., & Makwana, A. (2017, April). A survey on MQTT: a protocol of internet of things (IOT). In International conference on telecommunication, power analysis and computing techniques (ICTPACT-2017) (Vol. 20, pp. 173-177). | |
Swamy, S. N., Jadhav, D., & Kulkarni, N. (2017, February). Security threats in the application layer in IOT applications. In 2017 International conference on i-SMAC (iot in social, mobile, analytics and cloud)(i-SMAC) (pp. 477-480). IEEE. | |
Upadhyay, Y., Borole, A., & Dileepan, D. (2016, March). MQTT based secured home automation system. In 2016 Symposium on Colossal Data Analysis and Networking (CDAN) (pp. 1-4). IEEE. | |
Vongsingthong, S., & Smanchat, S. (2014). Internet of things: a review of applications and technologies. Suranaree Journal of Science and Technology, 21(4), 359-374. | |
Wang, Q., Ji, S., Tian, Y., Zhang, X., Zhao, B., Kan, Y., Lin, Z., Lin, C., Deng, S., Liu, A.X. & Beyah, R. (2021). MPInspector: A systematic and automatic approach for evaluating the security of IoT messaging protocols. In 30th USENIX Security Symposium (USENIX Security 21) (pp. 4205-4222). | |
Yassein, M. B., Shatnawi, M. Q., Aljwarneh, S., & Al-Hatmi, R. (2017, May). Internet of Things: Survey and open issues of MQTT protocol. In 2017 international conference on engineering & MIS (ICEMIS) (pp. 1-6). IEEE. | |
Mr. Nael M. Radwan
Computer Science Department, Center for Secure & Dependable Systems (CSDS), University of Idaho, Moscow, Idaho, 83843 - United States of America
Dr. Jim Alves-Foss
Computer Science Department, Director of Center for Secure & Dependable Systems (CSDS), University of Idaho, Moscow, Idaho, 83843 - United States of America
jimaf@uidaho.edu
|
|
|
|
View all special issues >> | |
|
|