Olanrewaju Mueez Adesanya
Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario
Adesanya, Olanrewaju Mueez; Moradpoor, Naghmeh; Maglaras, Leandros; Lim, Ik Soo; Ferrag, Mohamed Amine
Authors
Dr Naghmeh Moradpoor N.Moradpoor@napier.ac.uk
Associate Professor
Leandros Maglaras
Ik Soo Lim
Mohamed Amine Ferrag
Abstract
The rapid growth of Internet of Things technology has introduced an era of numerous interconnected devices, transforming the communication with the physical world. However, the security and privacy of the data generated and stored on these devices have become significant concerns due to the potential risks associated with unauthorized access and data exfiltration. This paper presents a comprehensive study on the characterization and evaluation of IoT protocols for data exfiltration, with a focus on Message Queuing Telemetry Transport versions 3.1.1 and 5.0, Constrained Application Protocol version 1.0, and Websocket, owing to their widespread adoption and diverse characteristics. These protocols are chosen to meet the constraints of IoT devices and networks, where minimal bandwidth utilization and low power consumption are crucial. We employed a multifaceted methodology, incorporating a comprehensive literature review and the Chiton data encapsulation and exfiltration software tool, to assess the security features, vulnerabilities, and performance metrics of these protocols for data exfiltration. Performance evaluations on the three selected protocols were conducted using a live Client-Server network. A laptop served as the server for exfiltrated data collection, while a Raspberry Pi 3 device acted as the IoT Client Publisher. The evaluation included Wireshark as a network protocol analyser and the enhancement of the Chiton Software Tool with custom codes to encapsulate and exfiltrate data within the IoT protocol messages, empirically measuring the selected protocols’ performance, including overhead, latency, and throughput for different data exfiltration scenarios, providing a versatile platform for protocol evaluation. Comparative analysis revealed the strengths and weaknesses of MQTT, CoAP, and Websocket in various data exfiltration scenarios, facilitating the selection of MQTT and Websocket over the CoAP protocol for IoT applications. Lastly, ideas and recommendations for identifying and mitigating data exfiltration in IoT protocols are proposed.
Citation
Adesanya, O. M., Moradpoor, N., Maglaras, L., Lim, I. S., & Ferrag, M. A. (2024, April). Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario. Presented at 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Abu Dhabi, United Arab Emirates
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) |
Start Date | Apr 29, 2024 |
End Date | May 1, 2024 |
Acceptance Date | Mar 21, 2024 |
Online Publication Date | Aug 12, 2024 |
Publication Date | 2024 |
Deposit Date | Mar 21, 2024 |
Publisher | Institute of Electrical and Electronics Engineers |
Peer Reviewed | Peer Reviewed |
Series ISSN | 2325-2944 |
Book Title | 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) |
DOI | https://doi.org/10.1109/DCOSS-IoT61029.2024.00087 |
Keywords | COAP, Websocket, MQTT, Data integrity and confidentiality, Chiton |
Public URL | http://researchrepository.napier.ac.uk/Output/3572511 |
Related Public URLs | https://sites.google.com/view/secriot2024 |
You might also like
A Proposed Continuous Facial Recognition Framework for Adaptive Environmental Detection
(2025)
Presentation / Conference Contribution
Binius Zero-Knowledge Proofs Meet Multi-Layer Bloom Filters: A Secure and Efficient Protocol for Federated Learning in Autonomous Vehicle Networks
(2025)
Presentation / Conference Contribution
A Blockchain-Powered Defence System Against DDoS Attacks with Incentivised Collaboration
(2025)
Presentation / Conference Contribution
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems
(2025)
Presentation / Conference Contribution
Post-Quantum ZKP for Privacy-Preserving Authentication and Model Verification in Decentralized CAV
(2025)
Presentation / Conference Contribution
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search