IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v12y2020i3p55-d333464.html
   My bibliography  Save this article

Security of IoT Application Layer Protocols: Challenges and Findings

Author

Listed:
  • Giuseppe Nebbione

    (Department of Electrical, Computer and Biomedical Engineering, University of Pavia, I-27100 Pavia, Italy)

  • Maria Carla Calzarossa

    (Department of Electrical, Computer and Biomedical Engineering, University of Pavia, I-27100 Pavia, Italy)

Abstract

IoT technologies are becoming pervasive in public and private sectors and represent presently an integral part of our daily life. The advantages offered by these technologies are frequently coupled with serious security issues that are often not properly overseen or even ignored. The IoT threat landscape is extremely wide and complex and involves a wide variety of hardware and software technologies. In this framework, the security of application layer protocols is of paramount importance since these protocols are at the basis of the communications among applications and services running on different IoT devices and on cloud/edge infrastructures. This paper offers a comprehensive survey of application layer protocol security by presenting the main challenges and findings. More specifically, the paper focuses on the most popular protocols devised in IoT environments for messaging/data sharing and for service discovery. The main threats of these protocols as well as the Common Vulnerabilities and Exposures (CVE) for their products and services are analyzed and discussed in detail. Good practices and measures that can be adopted to mitigate threats and attacks are also investigated. Our findings indicate that ensuring security at the application layer is very challenging. IoT devices are exposed to numerous security risks due to lack of appropriate security services in the protocols as well as to vulnerabilities or incorrect configuration of the products and services being deployed. Moreover, the constrained capabilities of these devices affect the types of security services that can be implemented.

Suggested Citation

  • Giuseppe Nebbione & Maria Carla Calzarossa, 2020. "Security of IoT Application Layer Protocols: Challenges and Findings," Future Internet, MDPI, vol. 12(3), pages 1-20, March.
  • Handle: RePEc:gam:jftint:v:12:y:2020:i:3:p:55-:d:333464
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/12/3/55/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/12/3/55/
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Jinze Du & Chengtai Gao & Tao Feng, 2022. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service," Future Internet, MDPI, vol. 15(1), pages 1-24, December.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:12:y:2020:i:3:p:55-:d:333464. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.