CoAP and MQTT: Characteristics and Security

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There is no doubt that Internet of Things (IoT) has a significant impact on many aspects of our lives including how we live, drive, irrigate, the way we consume energy and the way we manage our confidential and personal data. Data is generated and gathered from different lightweight IoT gadgets and smart devices using two widely protocols; Constrained Application Protocol (CoAP) and Message Queuing Telemetry Transport (MQTT). These protocols are based on Publish/Subscribe model. Nevertheless, as the use of these emerging protocols increase, the risk of attacks increases as well. Indeed, these communications come up with many security vulnerabilities. In this paper, we describe these two emerging messaging protocols to address the needs of the lightweight IoT nodes, we discuss protocols and techniques used to manage security in CoAP and MQTT, we reveal some of security limitations and issues, we conclude with some future directions.

Author supplied keywords

Cite

CITATION STYLE

APA

Ouakasse, F., & Rakrak, S. (2023). CoAP and MQTT: Characteristics and Security. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 147, pp. 157–167). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-15191-0_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free