Keywords:-
Article Content:-
Abstract
This research work greatly concerning the trending Protocol known as Message Queue Telemetry Transport (MQTT) which is used by Internet of Things (IoT) to pass messages by both ends. The communication between the huge amounts of devices is enabled by IPv6 and light weight communication protocols such as MQTT. The goal was to develop a protocol which is bandwidth-efficient and uses little battery power. Most of the present-day surveys focusing on IoT MQTT protocol protection. Even though security is very much concerned, it is also important to concentrate on MQTT messages with its types, structure and so on.
References:-
References
Gupta, A. IoT Hackers Handbook; AttifyInc: Sunnyvale, CA, USA, 2017.
Nastase, L. Security in the Internet of Things: A Survey on Application Layer Protocols. In Proceedings of the 2017 21st International Conference on Control Systems and Computer Science, Bucharest, Romania, 29–31 May 2017.
Dan Dinculeană and Xiaochun Cheng, Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices, Appl. Sci. 2019, 9, 848; doi:10.3390/app9050848.
Reginald (January 25, 2016). "S&T's Internet of Things Pilot Demonstrates 'State of the Practical'". dhs.gov. p. 1.
"IBM Knowledge Center - IBM MQ - Using MQTT with IBM Integration Bus - Quality of service and connection management".
www.ibm.com.
Banks, A., & Gupta, R. (2014). MQTT Version 3.1. 1. OASIS standard.
Lampkin, V., Leong, W. T., Olivera, L., Rawat, S., Subrahmanyam, N., Xiang, R., ... & Locke, D. (2012). Building smarter planet solutions with mqtt and ibm websphere mq telemetry. IBM Redbooks.
Hunkeler, U., Truong, H. L., & Stanford-Clark, A. (2008, January). MQTT-S—A publish/subscribe protocol for Wireless Sensor Networks. In Communication systems software and middleware and workshops, 2008. comsware 2008. 3rd international conference on (pp. 791- 798). IEEE.