TY - GEN
T1 - Man-in-the-Middle Attacks on IoT Devices
T2 - 11th International Conference on Technologies and Innovation, CITI 2025
AU - De La Cadena, Leonardo
AU - Loachamin, Johnny
AU - Gamboa, Diego
AU - Guerrero, Graciela
AU - Quishpe, Santiago
AU - Nacimba, Esteven
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.
PY - 2026
Y1 - 2026
N2 - In today’s world, all household devices are connected to the Internet. Although this offers numerous benefits, it also introduces new risks that must be addressed and mitigated. Although the vulnerability of MQTT to MitM attacks and the effectiveness of TLS as a mitigation are well-established principles, there is a gap in practical, reproducible demonstrations that highlight the ease of exploitation and the absolute effectiveness of mitigation in a controlled IoT context. For this reason, an experiment was conducted within a virtual environment, executing a Man-in-the-Middle (MitM) attack using spoofing techniques to capture MQTT packets and alter the messages transmitted across an IoT device network. Using the Polymorph tool in Kali Linux, it was possible to modify the messages exchanged between two virtual machines communicating via a Mosquitto server. Due to the absence of security measures in Mosquitto’s message transmission, a security mechanism was implemented to mitigate the described attack. Therefore, TLS and SSL message encryption techniques were tested. When attempting the attack again after implementing TLS for message transmission, it was observed that no MQTT packet network traffic was generated, effectively disabling the MitM attack. This shows that executing a MitM attack on IoT devices can compromise environments using such technologies, potentially enabling cyberphysical attacks and endangering human lives. Hence, it is crucial to promote the proper implementation of message encryption techniques, such as TLS, within IoT communication networks.
AB - In today’s world, all household devices are connected to the Internet. Although this offers numerous benefits, it also introduces new risks that must be addressed and mitigated. Although the vulnerability of MQTT to MitM attacks and the effectiveness of TLS as a mitigation are well-established principles, there is a gap in practical, reproducible demonstrations that highlight the ease of exploitation and the absolute effectiveness of mitigation in a controlled IoT context. For this reason, an experiment was conducted within a virtual environment, executing a Man-in-the-Middle (MitM) attack using spoofing techniques to capture MQTT packets and alter the messages transmitted across an IoT device network. Using the Polymorph tool in Kali Linux, it was possible to modify the messages exchanged between two virtual machines communicating via a Mosquitto server. Due to the absence of security measures in Mosquitto’s message transmission, a security mechanism was implemented to mitigate the described attack. Therefore, TLS and SSL message encryption techniques were tested. When attempting the attack again after implementing TLS for message transmission, it was observed that no MQTT packet network traffic was generated, effectively disabling the MitM attack. This shows that executing a MitM attack on IoT devices can compromise environments using such technologies, potentially enabling cyberphysical attacks and endangering human lives. Hence, it is crucial to promote the proper implementation of message encryption techniques, such as TLS, within IoT communication networks.
KW - Broker Server
KW - IoT devices
KW - MQTT
KW - Man-in-the-Middle
KW - Message Alteration
KW - Mosquitto
KW - TLS Security
UR - https://www.scopus.com/pages/publications/105023303404
U2 - 10.1007/978-3-032-11494-5_15
DO - 10.1007/978-3-032-11494-5_15
M3 - Contribución a la conferencia
AN - SCOPUS:105023303404
SN - 9783032114938
T3 - Communications in Computer and Information Science
SP - 225
EP - 239
BT - Technologies and Innovation - 11th International Conference, CITI 2025, Proceedings
A2 - Valencia-Garcia, Rafael
A2 - Alvarez-Muñoz, Patricio
A2 - Tarquino Calderon, Juan
A2 - Vergara-Lozano, Vanessa
A2 - Ortega-Ponce, Laura
A2 - Pico-Aguilar, Ana Lucía
A2 - Vásconez-García, Benjamín Marcelo
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 8 December 2025 through 11 December 2025
ER -