Abstract
Integration of Internet of Things technologies into various sectors has resulted in the emergence of increasingly complex cyber threats that utilize protocols such as MQTT and CoAP. To address the issue, this thesis investigates vulnerabilities of these protocols to identify different types of threats presented by their use in IoT networks. The present thesis employs a comprehensive research design that includes theoretical analysis and practical simulations to classify a variety of attack vectors used to compromise IoT systems. Specifically, the results of the work suggest that threat vectors such as denial of service, protocol compromises, and payload manipulation are of great concern due to exploiting the arrested development of these protocols. Moreover, the work suggests the role of various logs and network traffic analysis in identifying unclear behaviors of these threats and the utility of advanced detection approaches. The latter recommendation assists in forming future scenarios where IoT attack detection may be instrumental.
Original language | English |
---|---|
Qualification | Master of Science |
Awarding Institution |
|
Supervisors/Advisors |
|
Award date | 1 May 2024 |
Publication status | Published - 2024 |
Research Field
- Cyber Security