Abstract
Internet of Things (IoT) has changed view of people about devices and has paved new ways of interaction. These devices form a powerful network that can be controlled from anywhere anytime. Though this is beauty of IoT but it comes with high price of vulnerability and high load. Broker based IoT protocols enable two way communication. One of these protocols is Message Querying Telemetry Transport (MQTT). Load balancing in IoT is huge problem when it comes to application of such publish subscribe models. This issue provides loophole for adversaries to exploit by attempting various attacks on network e.g. Denial of Service (DoS), Distributed Denial of Service (DDoS) etc. These attacks not only deprive network of its bandwidth but also are threat to confidentiality and privacy of any IoT based system. In this paper, we have tried to investigate load balancing problem by investigating different MQTT based threat models and proposing a UML profile for effective handling of load balancing in IoTs employing MQTT protocol. Intuition of proposed profile is to introduce lightweight extension that can provide a robust load-balanced version of MQTT protocol. Validation of profile is performed through case study of Proactive Technical Support System for HealthCare. From validation it is evident that proposed profile is robust in handling load balancing shortcomings in IoT ecosystems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Evans, D.: The internet of things: how the next evolution of the internet is changing everything (2011)
Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S., Kumar, S., Wehrle, K.: Security challenges in the ip-based internet of things. Wireless Pers. Commun. 61(3), 527–542 (2011)
Li, S., Da Xu, L., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17(2), 243–259 (2015)
Sadeghi, A.-R., Wachsmann, C., Waidner, M.: Security and privacy challenges in industrial internet of things. In: 52nd ACM/EDAC/IEEE, Design Automation Conference (DAC) (2015)
Rose, K., Eldridge, S., Chapin, L.: The internet of things: an overview. The Internet Society (ISOC), pp. 1–50 (2015)
Penttinen, J.: Wireless Communications Security: Solutions for the Internet of Things. Wiley, Chichester (2016)
Waher, P.: Communication patterns for the internet of things (2016)
Cisco: Securing the internet of things: A proposed framework (2012)
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015)
Waher, P.: Learning Internet of Things. Packt Publishing Ltd., Birmingham (2015)
Yang, Z., Yue, Y., Yang, Y., Peng, Y., Wang, X., Liu, W.: Study and application on the architecture and key technologies for IoT. In: International Conference on Multimedia Technology (2011)
Wu, M., Lu, T.-J., Ling, F.-Y., Sun, J., Du, H.-Y.: Research on the architecture of internet of things. In: 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) (2010)
Tschofenig, H., Arkko, J., Thaler, D., McPherson, D.: Architectural considerations in smart object networking, rfc 7452. Tech. Rep (2015)
Rose, K., Eldridge, S., Chapin, L.: The internet of things: an overview. The Internet Society (ISOC), pp. 1–50 (2015)
Zhang, Z.-K., Cho, M.C.Y., Shieh, S.: Emerging security threats and countermeasures in IoT. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, New York (2015)
Olivieri, A.C., Rizzo, G., Morard, F.: A publish-subscribe approach to IoT integration: the smart office use case. In: IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (2015)
Tarkoma, S.: Publish/Subscribe Systems: Design and Principles. Wiley (2012)
Syed, N.F., Zubair, B., Craig, V., Ahmed, I.: Modelling and evaluation of malicious attacks against the IoT MQTT protocol. In: IEEE International Conference on Internet of Things (iThings) (2017)
Banks, A., Gupta, R.: Mqtt version 3.1. 1. OASIS standard (2014)
Niruntasukrat, A., Issariyapat, C., Pongpaibool, P., Meesublak, K., Aiumsupucgul, P., Panya, A.: Authorization mechanism for mqtt-based internet of things. In: IEEE International Conference on Communications Workshops (ICC) (2016)
Anwar, M., Rashid, M., Azam, F., Kashif, M.: Model-based design verification for embedded systems through SVOCL: an OCL extension for System Verilog. J. Des. Autom. Embed. Syst. 21(1), 1–36 (2017)
Chernyshev, M., Baig, Z., Bello, O., Zeadally, S.: Internet of things (IoT): research, simulators, and testbeds. IEEE Internet of Things J. 5(3), 1637–1647 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Anwer, H., Azam, F., Anwar, M.W., Rashid, M. (2020). A Model-Driven Approach for Load-Balanced MQTT Protocol in Internet of Things (IoT). In: Barolli, L., Hussain, F., Ikeda, M. (eds) Complex, Intelligent, and Software Intensive Systems. CISIS 2019. Advances in Intelligent Systems and Computing, vol 993. Springer, Cham. https://doi.org/10.1007/978-3-030-22354-0_33
Download citation
DOI: https://doi.org/10.1007/978-3-030-22354-0_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22353-3
Online ISBN: 978-3-030-22354-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)