Securing MQTT protocol for IoT environment using IDS based on ensemble learning

H Zeghida, M Boulaiche, R Chikh - International Journal of Information …, 2023 - Springer
Nowadays, the world of the Internet of Things (IoT) enables machines to communicate,
collect data, and even make decisions which improve significantly daily human life …

Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study

K Zarzycki, P Chaber, K Cabaj, M Ławryńczuk… - Sensors, 2023 - mdpi.com
This work is concerned with the vulnerability of a network industrial control system to cyber-
attacks, which is a critical issue nowadays. This is because an attack on a controlled process …

Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories

W Li, S Manickam, P Nanda, AK Al-Ani… - IEEE …, 2024 - ieeexplore.ieee.org
Amid the exponential rise of Internet of Things (IoT) devices, the Message Queue Telemetry
Transport (MQTT) protocol has gained prominence due to its efficiency in facilitating device …

Embracing Emerging Technologies: Insights from the 6th Workshop for Young Scientists in Computer Science & Software Engineering

AM Striuk - 2024 - elibrary.kdpu.edu.ua
The 6th Workshop for Young Scientists in Computer Science & Software Engineering
showcases cutting-edge research from emerging talents. This volume comprises diverse …

Effective Feature Engineering Framework for Securing MQTT Protocol in IoT Environments

A Al Hanif, M Ilyas - Sensors, 2024 - mdpi.com
The explosive growth of the domain of the Internet of things (IoT) network devices has
resulted in unparalleled ease of productivity, convenience, and automation, with Message …

Attacks on Availability of IoT Middleware Protocols: A Case Study on MQTT

MM Şimşek, E Atılgan - Eskişehir Türk Dünyası Uygulama ve …, 2023 - dergipark.org.tr
The Internet of Things (IoT) encompasses a technological ecosystem that improves the daily
lives of individuals by increasing productivity, safety, comfort, health and sustainability. In …

A Key-Based Multi-Mode Clock-Controlled Stream Cipher for Real-Time Secure Communications of IoT

ST Wu - Electronics, 2023 - mdpi.com
With the rapid development of the Internet and wireless communications, as well as the
popularization of personal communication systems, the security of real-time communications …

[图书][B] Cybersecurity Attacks Detection for MQTT-IoT Networks Using Machine Learning Ensemble Techniques

SMB Abdelbasit - 2023 - search.proquest.com
Abstract The Internet of Things (IoT) is one of the technical advancements that is progressing
swiftly. which promises to be revolutionary soon. IoT systems are convenient due to its …

Assessing Initial Attacks and Defense with Retry Function in MQTT Over QUIC

S Hitomi, I Arai, A Endo, M Kakiuchi… - 2024 IEEE 48th …, 2024 - ieeexplore.ieee.org
MQTT over QUIC protocol has recently garnered attention in the IoT field. This protocol
enables faster communication than the traditional MQTT. However, the security risks arising …