CYBERSECURITY OF MQTT CONNECTIONS IN AN AUTOMATED GATE CONTROL SYSTEM

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.27.727

Keywords:

Keywords:Internet of Things (IoT); data protection; MQTT connection; forensic analysis; TLS/SSL; controller; sensor; scanner.

Abstract

With the development of the Internet of Things (IoT), the issue of data protection and the secure operation of IoT systems has become increasingly important. One of the major threats is unprotected MQTT connections, which are vulnerable to traffic interception (MitM attacks), command spoofing, unauthorized access, and DDoS attacks.This paper explores MQTT security methods using the example of an automated gate control system. It presents an analysis of recent research in IoT cybersecurity, identifies the main vulnerabilities of MQTT brokers and clients, and proposes measures to secure IoT infrastructure.Special attention is given to TLS/SSL encryption for traffic protection, MQTT client authentication, access restrictions using ACL (Access Control List), and the isolation of IoT devices in separate networks (VPN/VLAN).The research findings confirm that a comprehensive implementation of security measures significantly reduces attack risks and ensures the reliable and secure operation of IoT projects.

Downloads

Download data is not yet available.

References

Information technology – Security techniques – Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012). (2012).

Zhang, X. (2023). Security Challenges in MQTT-Based IoT Systems. Journal of Cybersecurity and IoT, 15(3), 45–62.

Patel, Y. (2022). Enhancing MQTT Security Using TLS and Access Control Mechanisms. International Journal of IoT Security Studies, 8(2), 78–94.

IoT Security Research Group. (2023). Best Practices for Securing MQTT Communications in Industrial IoT. Proceedings of the IoT Security Conference, 2023, 112–130.

MQTT Specification v5.0. (2023). MQTT.org. https://mqtt.org

MQTT Security Fundamentals. Technical Report on IoT Communication Security, OASIS Open. (2022). OASIS.

Eclipse Mosquitto MQTT Broker Security Guide. (2023). Mosquitto Project. https://mosquitto.org

Detecting and Analyzing MQTT Traffic Using Wireshark. (2023). Wireshark Foundation. https://wireshark.org

Singh, R., & Kumar, P. (2023). Mitigating IoT-Based Attacks through Secure MQTT Implementations. Cybersecurity & IoT Journal, 10(1), 23–40.

Implementing VPN and VLAN Isolation for IoT Networks. (2023). Cisco Systems. https://cisco.com

Schneider Electric. (2023). Secure Gate Automation Using MQTT and IoT Protocols. Industry 4.0 Security Handbook, 14(4), 98–115.

Downloads


Abstract views: 6

Published

2025-03-27

How to Cite

Onyshchuk , O. (2025). CYBERSECURITY OF MQTT CONNECTIONS IN AN AUTOMATED GATE CONTROL SYSTEM. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(27), 294–303. https://doi.org/10.28925/2663-4023.2025.27.727