Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels

Article Properties
Cite
Mileva, Aleksandra, et al. “Comprehensive Analysis of MQTT 5.0 Susceptibility to Network Covert Channels”. Computers &Amp; Security, vol. 104, 2021, p. 102207, https://doi.org/10.1016/j.cose.2021.102207.
Mileva, A., Velinov, A., Hartmann, L., Wendzel, S., & Mazurczyk, W. (2021). Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Computers &Amp; Security, 104, 102207. https://doi.org/10.1016/j.cose.2021.102207
Mileva A, Velinov A, Hartmann L, Wendzel S, Mazurczyk W. Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Computers & Security. 2021;104:102207.
Journal Categories
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Science
Science (General)
Cybernetics
Information theory
Technology
Electrical engineering
Electronics
Nuclear engineering
Telecommunication
Technology
Technology (General)
Industrial engineering
Management engineering
Information technology
Refrences
Title Journal Journal Categories Citations Publication Date
Covert timing channels for IoT over mobile networks 2018
The new threats of information hiding: the road ahead 2018
Steganography for Cyber-physicalSystems Journal of Cyber Security and Mobility 4 2017
A survey on internet of things: architecture, enabling technologies, security and privacy, and applications IEEE Internet of Things Journal 2017
Hiding information in a Stream Control Transmission Protocol Computer Communications
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
15 2012
Citations
Title Journal Journal Categories Citations Publication Date
Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments Computer Networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2024
Privacy-preserving data dissemination scheme based on Searchable Encryption, publish–subscribe model, and edge computing Computer Communications
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
1 2023
Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy IEEE Transactions on Dependable and Secure Computing
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2023
Covert Channel Detection: Machine Learning Approaches IEEE Access
  • Technology: Electrical engineering. Electronics. Nuclear engineering
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
1 2022
Analysis of Reversible Network Covert Channels IEEE Access
  • Technology: Electrical engineering. Electronics. Nuclear engineering
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
2022
Citations Analysis
The category Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks 5 is the most commonly referenced area in studies that cite this article. The first research to cite this article was titled MQTT Implementations, Open Issues, and Challenges: A Detailed Comparison and Survey and was published in 2022. The most recent citation comes from a 2024 study titled Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments. This article reached its peak citation in 2022, with 6 citations. It has been cited in 8 different journals, 37% of which are open access. Among related journals, the IEEE Access cited this research the most, with 2 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year