Authors :
Dr. Fatma Abdalla Mabrouk Khiralla
Volume/Issue :
Volume 7 - 2022, Issue 9 - September
Google Scholar :
https://bit.ly/3IIfn9N
Scribd :
https://bit.ly/3f63d17
DOI :
https://doi.org/10.5281/zenodo.7106328
Abstract :
In the Internet of Things era, data-backed
insights are being used by industries and organisations to
deliver value. It will provide boundless services to increase
productivity and efficiency in the future; however, there
are still security issues associated with IoT devices.
This paper discusses IoT security issues and
challenges using MQTT and CoAP protocols. As a first
step, the cybersecurity hierarchy of the Internet of Things
and its infrastructure will be examined. Our next topic
will be the Internet of things devices and their weaknesses.
There will also be a discussion of the types of protocols on
the Internet of Things, for example, HTTP, DDS and
XMPP, most of which originated from Internet protocols.
In addition to highlighting MQTT and CoAP and
comparing them, the study clarifies all previous studies
that looked at those protocols. Our final paragraph
discussed cybersecurity challenges on the Internet of
Things and MQTT and CoAP as the future of IoT.
Keywords :
MQTT, CoAP, IoT, protocols , cybersecurity , HTTP,DDS ,XMPP
In the Internet of Things era, data-backed
insights are being used by industries and organisations to
deliver value. It will provide boundless services to increase
productivity and efficiency in the future; however, there
are still security issues associated with IoT devices.
This paper discusses IoT security issues and
challenges using MQTT and CoAP protocols. As a first
step, the cybersecurity hierarchy of the Internet of Things
and its infrastructure will be examined. Our next topic
will be the Internet of things devices and their weaknesses.
There will also be a discussion of the types of protocols on
the Internet of Things, for example, HTTP, DDS and
XMPP, most of which originated from Internet protocols.
In addition to highlighting MQTT and CoAP and
comparing them, the study clarifies all previous studies
that looked at those protocols. Our final paragraph
discussed cybersecurity challenges on the Internet of
Things and MQTT and CoAP as the future of IoT.
Keywords :
MQTT, CoAP, IoT, protocols , cybersecurity , HTTP,DDS ,XMPP