CYBERSECURITY OF MQTT CONNECTIONS IN AN AUTOMATED GATE CONTROL SYSTEM
DOI:
https://doi.org/10.28925/2663-4023.2025.27.727Keywords:
Keywords:Internet of Things (IoT); data protection; MQTT connection; forensic analysis; TLS/SSL; controller; sensor; scanner.Abstract
With the development of the Internet of Things (IoT), the issue of data protection and the secure operation of IoT systems has become increasingly important. One of the major threats is unprotected MQTT connections, which are vulnerable to traffic interception (MitM attacks), command spoofing, unauthorized access, and DDoS attacks.This paper explores MQTT security methods using the example of an automated gate control system. It presents an analysis of recent research in IoT cybersecurity, identifies the main vulnerabilities of MQTT brokers and clients, and proposes measures to secure IoT infrastructure.Special attention is given to TLS/SSL encryption for traffic protection, MQTT client authentication, access restrictions using ACL (Access Control List), and the isolation of IoT devices in separate networks (VPN/VLAN).The research findings confirm that a comprehensive implementation of security measures significantly reduces attack risks and ensures the reliable and secure operation of IoT projects.
Downloads
References
Information technology – Security techniques – Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012). (2012).
Zhang, X. (2023). Security Challenges in MQTT-Based IoT Systems. Journal of Cybersecurity and IoT, 15(3), 45–62.
Patel, Y. (2022). Enhancing MQTT Security Using TLS and Access Control Mechanisms. International Journal of IoT Security Studies, 8(2), 78–94.
IoT Security Research Group. (2023). Best Practices for Securing MQTT Communications in Industrial IoT. Proceedings of the IoT Security Conference, 2023, 112–130.
MQTT Specification v5.0. (2023). MQTT.org. https://mqtt.org
MQTT Security Fundamentals. Technical Report on IoT Communication Security, OASIS Open. (2022). OASIS.
Eclipse Mosquitto MQTT Broker Security Guide. (2023). Mosquitto Project. https://mosquitto.org
Detecting and Analyzing MQTT Traffic Using Wireshark. (2023). Wireshark Foundation. https://wireshark.org
Singh, R., & Kumar, P. (2023). Mitigating IoT-Based Attacks through Secure MQTT Implementations. Cybersecurity & IoT Journal, 10(1), 23–40.
Implementing VPN and VLAN Isolation for IoT Networks. (2023). Cisco Systems. https://cisco.com
Schneider Electric. (2023). Secure Gate Automation Using MQTT and IoT Protocols. Industry 4.0 Security Handbook, 14(4), 98–115.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Оксана Онищук

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.