{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T09:12:37Z","timestamp":1770541957405,"version":"3.49.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032137562","type":"print"},{"value":"9783032137579","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-13757-9_9","type":"book-chapter","created":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T08:12:44Z","timestamp":1770451964000},"page":"117-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Vulnerabilities and\u00a0Countermeasures in\u00a0MQTT-SN Communication"],"prefix":"10.1007","author":[{"given":"Hemant","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Amiya","family":"Nayak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,8]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Hunkeler, U., Truong, H.-L., Stanford-Clark, A.: MQTT-S\u2014a publish\/subscribe protocol for Wireless Sensor Networks. In: Proceedings of the 3rd International Conference on Communication Systems Software and Middleware (COMSWARE), Bangalore, India, pp. 791\u2013798. IEEE (2008)","DOI":"10.1109\/COMSWA.2008.4554519"},{"key":"9_CR2","unstructured":"Stanford-Clark, A., Truong, H.-L.: MQTT for Sensor Networks (MQTT-SN) Protocol Specification. Technical report, IBM Corporation. Version 1.2, pp. 1\u201328 (2013)"},{"issue":"3","key":"9_CR3","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.1109\/TDSC.2021.3052712","volume":"19","author":"B Zhao","year":"2022","unstructured":"Zhao, B., et al.: A large-scale empirical study on the vulnerability of deployed IoT devices. IEEE Trans. Dependable Secure Comput. 19(3), 1826\u20131840 (2022). https:\/\/doi.org\/10.1109\/TDSC.2021.3052712","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"9_CR4","doi-asserted-by":"publisher","first-page":"567","DOI":"10.3390\/s22020567","volume":"22","author":"M Husnain","year":"2022","unstructured":"Husnain, M., et al.: Preventing MQTT vulnerabilities using IoT enabled intrusion detection system. Sensors 22(2), 567 (2022). https:\/\/doi.org\/10.3390\/s22020567","journal-title":"Sensors"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT systems. In: Proceedings of the 2017 Int\u2019l Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Yogyakarta, Indonesia, pp. 1\u20136 (2017). https:\/\/doi.org\/10.1109\/EECSI.2017.8239151","DOI":"10.1109\/EECSI.2017.8239179"},{"issue":"21","key":"9_CR6","doi-asserted-by":"publisher","first-page":"10991","DOI":"10.3390\/app122110991","volume":"12","author":"J Rold\u00e1n-G\u00f3mez","year":"2022","unstructured":"Rold\u00e1n-G\u00f3mez, J., Carrillo-Mond\u00e9jar, J., Castelo G\u00f3mez, J.M., Ruiz-Villafranca, S.: Security analysis of the MQTT-SN protocol for the Internet of Things. Appl. Sci. 12(21), 10991 (2022). https:\/\/doi.org\/10.3390\/app122110991","journal-title":"Appl. Sci."},{"key":"9_CR7","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-030-59028-4_7","volume-title":"Database and Expert Systems Applications","author":"H Sochor","year":"2020","unstructured":"Sochor, H., Ferrarotti, F., Ramler, R.: Exploiting MQTT-SN for distributed reflection denial-of-service attacks. In: Kotsis, G., et al. (eds.) DEXA 2020. CCIS, vol. 1285, pp. 74\u201381. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59028-4_7"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"226422","DOI":"10.1109\/ACCESS.2020.3045441","volume":"8","author":"C-S Park","year":"2020","unstructured":"Park, C.-S., Nam, H.-M.: Security architecture and protocols for secure MQTTSN. IEEE Access 8, 226422\u2013226436 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3045441","journal-title":"IEEE Access"},{"issue":"1","key":"9_CR9","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2020\/1\/012044","volume":"2020","author":"TL Kao","year":"2021","unstructured":"Kao, T.L., Wang, H.C., Li, J.E.: Safe MQTT-SN: a lightweight secure encrypted communication in IoT. J. Phys: Conf. Ser. 2020(1), 012044 (2021). https:\/\/doi.org\/10.1088\/1742-6596\/2020\/1\/012044","journal-title":"J. Phys: Conf. Ser."},{"key":"9_CR10","first-page":"1","volume":"7","author":"P Oza","year":"2020","unstructured":"Oza, P., Kamdar, D.: A review on security approaches of MQTT protocol with respect to internet of things. Int. J. Res. Analyt. Rev. 7, 1\u201311 (2020)","journal-title":"Int. J. Res. Analyt. Rev."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Sadio, O., Ngom, I., Lishou, C.: Lightweight security scheme for MQTT\/MQTTSN protocol. In: Proceedings of the 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Granada, Spain, pp. 119\u2013123. IEEE (2019)","DOI":"10.1109\/IOTSMS48152.2019.8939177"},{"issue":"1","key":"9_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10009-025-00793-2","volume":"27","author":"W Lin","year":"2025","unstructured":"Lin, W., Chen, S., Zhu, H.: Formal verification and security analysis of MQTTSN. Int. J. Softw. Tools Technol. Transfer 27(1), 5\u201319 (2025)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-030-51473-0_9","volume-title":"Wireless Networks and Industrial IoT","author":"C G\u00fcndo\u011fan","year":"2021","unstructured":"G\u00fcndo\u011fan, C., Kietzmann, P., Schmidt, T.C., W\u00e4hlisch, M.: Information-centric networking for the industrial Internet of Things. In: Mahmood, N.H., Marchenko, N., Gidlund, M., Popovski, P. (eds.) Wireless Networks and Industrial IoT, pp. 171\u2013189. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-51473-0_9"},{"issue":"8","key":"9_CR14","doi-asserted-by":"publisher","first-page":"11111","DOI":"10.1007\/s11227-022-04322-9","volume":"78","author":"AO Bang","year":"2022","unstructured":"Bang, A.O., Rao, U.P.: Design and evaluation of a novel white-box encryption scheme for resource-constrained IoT devices. J. Supercomput. 78(8), 11111\u201311137 (2022)","journal-title":"J. Supercomput."},{"issue":"3","key":"9_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3005715","volume":"16","author":"U Chatterjee","year":"2017","unstructured":"Chatterjee, U., Chakraborty, R., Mukhopadhyay, D.: A PUF-based secure communication protocol for IoT. ACM Trans. Embedded Comput. Syst. 16(3), 1\u201325 (2017). https:\/\/doi.org\/10.1145\/3005715","journal-title":"ACM Trans. Embedded Comput. Syst."},{"issue":"10","key":"9_CR16","doi-asserted-by":"publisher","first-page":"1282","DOI":"10.3390\/sym16101282","volume":"16","author":"X Gong","year":"2024","unstructured":"Gong, X., Kou, T., Li, Y.: Enhancing MQTT-SN security with a lightweight PUF-based authentication and encrypted channel establishment scheme. Symmetry 16(10), 1282 (2024). https:\/\/doi.org\/10.3390\/sym16101282","journal-title":"Symmetry"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Singh, M., Rajan, M.A., Shivraj, V.L., Balamuralidhar, P.: Secure MQTT for Internet of Things (IoT). In: Proceedings of the 2015 International Conference on Communication Systems and Network Technologies (CSNT), Gwalior, India, pp. 746\u2013751 (2015). https:\/\/doi.org\/10.1109\/CSNT.2015.16","DOI":"10.1109\/CSNT.2015.16"},{"key":"9_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101172","volume":"26","author":"B Imran","year":"2024","unstructured":"Imran, B., Ahsan, M., Akbar, A.H., Shah, G.A.: D4gw: DTLS for gateway multiplexed application to secure MQTT (SN)-based pub\/sub architecture. Internet Things 26, 101172 (2024)","journal-title":"Internet Things"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-13757-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T08:12:45Z","timestamp":1770451965000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-13757-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032137562","9783032137579"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-13757-9_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"8 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}