<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Elisa ROUX, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/elisa-roux/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 01 Oct 2025 08:10:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Elisa ROUX, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The security of the MQTT protocol</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/10/the-security-of-the-mqtt-protocol/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/10/the-security-of-the-mqtt-protocol/#respond</comments>
		
		<dc:creator><![CDATA[Elisa ROUX]]></dc:creator>
		<pubDate>Wed, 01 Oct 2025 07:37:41 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=27856</guid>

					<description><![CDATA[<p>“Smart homes”, “Smart devices” and even “Smart cities”: these now familiar expressions illustrate how deeply embedded the Internet of Things (IoT) is in our daily lives. At the heart of these technologies, the MQTT protocol plays a subtle yet essential role....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/10/the-security-of-the-mqtt-protocol/">The security of the MQTT protocol</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><b><span data-contrast="none">“Smart homes”, “Smart devices” and even “Smart cities”: these now familiar expressions illustrate how deeply embedded the Internet of Things (IoT) is in our daily lives. At the heart of these technologies, the MQTT protocol plays a subtle yet essential role. This article presents methods for securing MQTT in response to the growing challenges of IoT.</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="none">In 2024, the number of connected IoT devices worldwide was estimated at around 18 billion, more than double the world&#8217;s population. From connected alarms to smart elevators, industrial sensors, and medical devices, these technologies now shape our daily lives.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="none">Recent advances in the field of IoT have transformed the way we interact with connected objects. Designed to be intuitive, they are accessible without specific expertise. The connections between them, often wireless, go almost unnoticed by users. However, behind this apparent simplicity lie sophisticated communication protocols, including MQTT. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="none">Due to its popularity and growing presence in sensitive operations, MQTT has been the subject of research for several years regarding the risks associated with its use. Here, we will focus on how it works, its potential vulnerabilities, and best practices for ensuring secure communications.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1><span data-contrast="none">MQTT and the reasons behind its popularity</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:360}"> </span></h1>
<h2><span data-contrast="none">This protocol’s strengths</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h2>
<p><span data-contrast="none">Developed in 1999 by Andy Stanford-Clark (IBM) and Arlen Nipper (Arcom), MQTT was designed to provide a</span><b><span data-contrast="none"> lightweight</span></b><span data-contrast="none">, </span><b><span data-contrast="none">efficient</span></b><span data-contrast="none"> solution with </span><b><span data-contrast="none">low energy</span></b><span data-contrast="none"> and </span><b><span data-contrast="none">bandwidth consumption</span></b><span data-contrast="none"> for monitoring isolated oil pipelines in the desert via satellite link.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="none">It is precisely because of these fundamental properties that MQTT has now established itself as the standard for IoT data transmission. This protocol is also frequently used to upload data from sensors or connected objects to cloud platforms.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img fetchpriority="high" decoding="async" class=" wp-image-27836 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_1.png" alt="" width="776" height="364" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_1.png 1410w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_1-407x191.png 407w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_1-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_1-768x360.png 768w" sizes="(max-width: 776px) 100vw, 776px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure 1 – MQTT key features</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<h2><span data-contrast="none">How it operates</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h2>
<p><strong><i>Definitions of key terms</i> </strong></p>
<p><b><span data-contrast="none">MQTT Client: </span></b><span data-contrast="none">A device that exchanges information.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><b><span data-contrast="none">MQTT Broker: </span></b><span data-contrast="none">An intermediary entity that allows MQTT clients to communicate and through which all MQTT messages pass. Specifically, the broker receives published messages and distributes them to the relevant recipients (subscribers to the corresponding topic). </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><b><span data-contrast="none">Topic: </span></b><span data-contrast="none">A string of characters used to filter and organize messages according to a hierarchical structure. When a client posts a message, they associate it with a topic. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><b><span data-contrast="none">Publish/Subscribe:</span></b><span data-contrast="none"> A model derived from the classic client/server model, in which requests are not initiated by a client requesting resources from a server, but by a server regularly sending updates to clients without active solicitation.</span></p>
<p><span data-contrast="none">MQTT is a “Machine to Machine” or M2M communication protocol that operates according to a </span><b><span data-contrast="none">Publish/Subscribe model</span></b><span data-contrast="none">, allowing for great flexibility in its implementation.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="none">MQTT clients can take on the role of</span><b><span data-contrast="none"> publisher</span></b><span data-contrast="none">, </span><b><span data-contrast="none">subscriber</span></b><span data-contrast="none">, or </span><b><span data-contrast="none">both</span></b><span data-contrast="none">. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="none">To receive the information they need, </span><b><span data-contrast="none">subscribers</span></b><span data-contrast="none"> subscribe to </span><b><span data-contrast="none">topics</span></b><span data-contrast="none"> (1), which are generally organized hierarchically within the broker (e.g., Home/Room/etc.). When a publisher sends a message intended for subscribers to that topic (2), they are notified by the </span><b><span data-contrast="none">broker</span></b><span data-contrast="none"> (3).</span></p>
<p><span data-contrast="none">As a result, MQTT clients are not required to share the same network or be active at the same time, and do not need to be synchronized with each other. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img decoding="async" class="aligncenter wp-image-27838 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_2-e1759302752361.png" alt="" width="1370" height="398" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_2-e1759302752361.png 1370w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_2-e1759302752361-437x127.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_2-e1759302752361-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_2-e1759302752361-768x223.png 768w" sizes="(max-width: 1370px) 100vw, 1370px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure 2 – Illustration of a simplified MQTT architecture</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p><span data-contrast="none">Moreover, MQTT offers a </span><b><span data-contrast="none">“Quality of Service” mechanism</span></b><span data-contrast="none"> for its messages, allowing communications to be tailored to the requirements of the application. For example, it can guarantee message delivery in the event of an unstable connection. MQTT clients can select one of three QoS levels for the distribution of their messages:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><b><span data-contrast="none">QoS 0</span></b><span data-contrast="none"> « </span><b><i><span data-contrast="none">At most once » </span></i></b><span data-contrast="none">– The message will be delivered once or not at all, without acknowledgment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="none">QoS 1</span></b><span data-contrast="none"> « </span><b><i><span data-contrast="none">At least once » </span></i></b><span data-contrast="none">– The message will be delivered periodically until the sender receives an acknowledgment. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="none">QoS 2</span></b><span data-contrast="none"> « </span><b><i><span data-contrast="none">Once » </span></i></b><span data-contrast="none">– The message is guaranteed to be delivered once and only once.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><span data-contrast="none">The chosen QoS level also affects</span><b><span data-contrast="none"> how long the message is stored locally</span></b><span data-contrast="none"> by the sender and recipient. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="none">This architecture enables </span><b><span data-contrast="none">decentralized</span></b><span data-contrast="none"> and </span><b><span data-contrast="none">scalable communications</span></b><span data-contrast="none">. These features are particularly advantageous in the IoT field, where flexibility is essential to accommodate a wide range of use cases. They also explain why MQTT extends far beyond the IoT and finds applications in many other environments, such as telemetry and industrial monitoring.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1><span data-contrast="none">Is MQTT vulnerable?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:360}"> </span></h1>
<p><span data-contrast="none">Like many other communication protocols, MQTT is </span><b><span data-contrast="none">not secure by default</span></b><span data-contrast="none">. Although most implementations now incorporate robust security solutions, certain weaknesses and configuration errors persist, leaving systems vulnerable.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="none">To illustrate these concepts, we will look at a standard example of how this protocol is used in an industrial environment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img decoding="async" class=" wp-image-27840 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_3.png" alt="" width="614" height="545" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_3.png 955w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_3-215x191.png 215w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_3-44x39.png 44w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_3-768x681.png 768w" sizes="(max-width: 614px) 100vw, 614px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure 3 – Illustration of an example of industrial use of MQTT</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p><span data-contrast="none">In this scenario, all systems represented contain an MQTT client that allows users to subscribe to topics and communicate with the on-premise broker. MQTT communications are unencrypted and there is no authentication of the broker or clients, leaving it possible for an attacker to access production data exchanged in clear text or to send commands to equipment by impersonating the broker or one of its clients.</span><span data-ccp-props="{}"> </span></p>
<h1><span data-contrast="none">How can you protect yourself?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:360}"> </span></h1>
<p><span data-contrast="none">To effectively mitigate these risks, the broker and MQTT clients must be carefully deployed and configured. Here we propose various security measures to ensure confidentiality, integrity, authenticity, and availability of end-to-end communications.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 aria-level="4"><span data-contrast="none">Securing the MQTT broker</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h2>
<h3><span data-contrast="none">Enabling default encryption for communications</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p><span data-contrast="none">When </span><b><span data-contrast="none">port 8883</span></b><span data-contrast="none"> is the only MQTT port defined, unencrypted communication attempts on the broker are rejected. Furthermore, it is essential that the broker has access to a </span><b><span data-contrast="none">valid certificate</span></b><span data-contrast="none"> and </span><b><span data-contrast="none">private key</span></b><span data-contrast="none"> and that t</span><b><span data-contrast="none">he cryptographic suite</span></b><span data-contrast="none"> used is </span><b><span data-contrast="none">secure</span></b><span data-contrast="none"> (e.g., TLS 1.2 or 1.3). </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img loading="lazy" decoding="async" class=" wp-image-27842 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_4.png" alt="" width="701" height="435" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_4.png 1036w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_4-308x191.png 308w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_4-63x39.png 63w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_4-768x477.png 768w" sizes="auto, (max-width: 701px) 100vw, 701px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure 4 – Enabling encryption on a Mosquitto MQTT broker via a configuration file</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p><span data-contrast="none">Many IoT devices have </span><b><span data-contrast="none">low computing power</span></b><span data-contrast="none"> and </span><b><span data-contrast="none">limited resources</span></b><span data-contrast="none">, so adding mechanisms such as TLS can represent a </span><b><span data-contrast="none">significant overhead</span></b><span data-contrast="none">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3><span data-contrast="none">Implementation of customer authentication and control of their access rights</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p><span data-contrast="none">MQTT allows </span><b><span data-contrast="none">the</span></b> <b><span data-contrast="none">authentication of clients</span></b><span data-contrast="none"> connecting to a broker using common methods such as a username and password (with an associated password file) and </span><b><span data-contrast="none">verification of the client&#8217;s certificate</span></b><span data-contrast="none">, validated by a certification authority (the broker must have the certificate from this authority). Some brokers also allow</span><b><span data-contrast="none"> the use of external authentication solutions</span></b><span data-contrast="none">.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="none">To restrict subscriptions or publications on certain topics by clients, an</span><b><span data-contrast="none"> Access Control List or ACL</span></b><span data-contrast="none"> logic can be added.</span></p>
<p><img loading="lazy" decoding="async" class=" wp-image-27844 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_5.png" alt="" width="660" height="429" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_5.png 1030w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_5-294x191.png 294w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_5-60x39.png 60w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_5-768x500.png 768w" sizes="auto, (max-width: 660px) 100vw, 660px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure 5 – Addition of a certificate and password authentication with access control on a Mosquitto MQTT broker</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p><b><span data-contrast="none">Strict management of topics</span></b><span data-contrast="none"> is essential </span><b><span data-contrast="none">to prevent data leaks</span></b><span data-contrast="none"> and </span><b><span data-contrast="none">limit the risk of compromising</span></b><span data-contrast="none"> the broker. The use of wildcards # and + must be carefully monitored, as an overly permissive configuration would allow an attacker to access all ongoing exchanges.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3><span data-contrast="none">Deployment of broker protection measures   </span><span data-ccp-props="{}"> </span></h3>
<p><span data-contrast="none">A quick search on the Shodan search engine reveals thousands of MQTT brokers exposed on the Internet, often left in their default configuration, whose users are unaware of their existence or implications. It is therefore essential </span><b><span data-contrast="none">to protect the broker from both internal and external threats</span></b><span data-contrast="none"> by applying </span><b><span data-contrast="none">good security practices</span></b><span data-contrast="none">, such as regularly updating the system or restricting the number of simultaneous requests and connections, to prevent denial-of-service attacks and ensure its availability.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 aria-level="4"><span data-contrast="none">Securing MQTT clients</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h2>
<h3><span data-contrast="none">Enabling communication encryption</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p><span data-contrast="none">To connect to the broker, clients must use </span><b><span data-contrast="none">port 8883</span></b><span data-contrast="none"> and have a v</span><b><span data-contrast="none">alid certificate </span></b><span data-contrast="none">and </span><b><span data-contrast="none">private key</span></b><span data-contrast="none">, otherwise the connection will be rejected.</span></p>
<p><img loading="lazy" decoding="async" class=" wp-image-27846 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_6.png" alt="" width="687" height="318" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_6.png 1033w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_6-413x191.png 413w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_6-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_6-768x355.png 768w" sizes="auto, (max-width: 687px) 100vw, 687px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure 6 – Encrypted connection on an MQTT Paho client</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p><span data-contrast="none">The use of self-signed certificates to connect to the broker is </span><b><span data-contrast="none">strongly discouraged</span></b><span data-contrast="none"> because they can be easily substituted. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3><span data-contrast="none">Implementation of broker authentication (mutual authentication)</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p><span data-contrast="none">In addition to client authentication, MQTT supports </span><b><span data-contrast="none">broker authentication</span></b><span data-contrast="none"> by verifying the certificate authority that signed its certificate, thus ensuring </span><b><span data-contrast="none">mutual authentication (mTLS)</span></b><span data-contrast="none"> and secure communications.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> <img loading="lazy" decoding="async" class=" wp-image-27848 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_7.png" alt="" width="616" height="277" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_7.png 1041w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_7-425x191.png 425w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_7-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/mqtt_en_7-768x345.png 768w" sizes="auto, (max-width: 616px) 100vw, 616px" /></span></p>
<p><i><span data-contrast="none">Figure 7 – Broker authentication on an MQTT Paho client</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<h3><span data-contrast="none">Implementation of customer protection measures</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p><span data-contrast="none">If an MQTT client is compromised, an attacker could access a significant amount of information depending on the configuration of the targeted broker. This is why clients, and their secrets, must also be protected by </span><b><span data-contrast="none">applying good security practices on the client&#8217;s host machine</span></b><span data-contrast="none"> and on the content of exchanges (e.g., adding anti-replay mechanisms to requests). </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1><span data-contrast="none">What does the future hold for MQTT?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:360}"> </span></h1>
<p><span data-contrast="none">Despite its maturity, MQTT remains an evolving protocol and is gradually incorporating innovative features to meet the growing demands of connected environments. In a context where demand for reliable, secure, and low-power communications continues to increase, it is likely that MQTT use cases will continue to multiply in the coming years.</span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/10/the-security-of-the-mqtt-protocol/">The security of the MQTT protocol</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/10/the-security-of-the-mqtt-protocol/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
