Man-in-the-Middle Attacks on IoT Devices: Message Manipulation and Vulnerabilities in the MQTT Protocol An Experimental Case Study

  • Leonardo De La Cadena
  • , Johnny Loachamin
  • , Diego Gamboa
  • , Graciela Guerrero
  • , Santiago Quishpe
  • , Esteven Nacimba

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In today’s world, all household devices are connected to the Internet. Although this offers numerous benefits, it also introduces new risks that must be addressed and mitigated. Although the vulnerability of MQTT to MitM attacks and the effectiveness of TLS as a mitigation are well-established principles, there is a gap in practical, reproducible demonstrations that highlight the ease of exploitation and the absolute effectiveness of mitigation in a controlled IoT context. For this reason, an experiment was conducted within a virtual environment, executing a Man-in-the-Middle (MitM) attack using spoofing techniques to capture MQTT packets and alter the messages transmitted across an IoT device network. Using the Polymorph tool in Kali Linux, it was possible to modify the messages exchanged between two virtual machines communicating via a Mosquitto server. Due to the absence of security measures in Mosquitto’s message transmission, a security mechanism was implemented to mitigate the described attack. Therefore, TLS and SSL message encryption techniques were tested. When attempting the attack again after implementing TLS for message transmission, it was observed that no MQTT packet network traffic was generated, effectively disabling the MitM attack. This shows that executing a MitM attack on IoT devices can compromise environments using such technologies, potentially enabling cyberphysical attacks and endangering human lives. Hence, it is crucial to promote the proper implementation of message encryption techniques, such as TLS, within IoT communication networks.

Original languageEnglish
Title of host publicationTechnologies and Innovation - 11th International Conference, CITI 2025, Proceedings
EditorsRafael Valencia-Garcia, Patricio Alvarez-Muñoz, Juan Tarquino Calderon, Vanessa Vergara-Lozano, Laura Ortega-Ponce, Ana Lucía Pico-Aguilar, Benjamín Marcelo Vásconez-García
PublisherSpringer Science and Business Media Deutschland GmbH
Pages225-239
Number of pages15
ISBN (Print)9783032114938
DOIs
StatePublished - 2026
Externally publishedYes
Event11th International Conference on Technologies and Innovation, CITI 2025 - Guayaquil, Ecuador
Duration: Dec 8 2025Dec 11 2025

Publication series

NameCommunications in Computer and Information Science
Volume2776 CCIS
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Conference

Conference11th International Conference on Technologies and Innovation, CITI 2025
Country/TerritoryEcuador
CityGuayaquil
Period12/8/2512/11/25

Keywords

  • Broker Server
  • IoT devices
  • MQTT
  • Man-in-the-Middle
  • Message Alteration
  • Mosquitto
  • TLS Security

Fingerprint

Dive into the research topics of 'Man-in-the-Middle Attacks on IoT Devices: Message Manipulation and Vulnerabilities in the MQTT Protocol An Experimental Case Study'. Together they form a unique fingerprint.

Cite this