{"id":"https://openalex.org/W4417282198","doi":"https://doi.org/10.1109/pimrc62392.2025.11275272","title":"QLB-MSS: Queuing-Based Load Balancing for MQTTv5 Shared Subscriptions to Prevent DDoS Starvation","display_name":"QLB-MSS: Queuing-Based Load Balancing for MQTTv5 Shared Subscriptions to Prevent DDoS Starvation","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4417282198","doi":"https://doi.org/10.1109/pimrc62392.2025.11275272"},"language":null,"primary_location":{"id":"doi:10.1109/pimrc62392.2025.11275272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc62392.2025.11275272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115751297","display_name":"Graziano Rizzo","orcid":null},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Graziano Rizzo","raw_affiliation_strings":["University of Calabria,DIMES,Italy,87036"],"affiliations":[{"raw_affiliation_string":"University of Calabria,DIMES,Italy,87036","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074855296","display_name":"Mattia Giovanni Spina","orcid":"https://orcid.org/0009-0000-8407-2551"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mattia Giovanni Spina","raw_affiliation_strings":["University of Calabria,DIMES,Italy,87036"],"affiliations":[{"raw_affiliation_string":"University of Calabria,DIMES,Italy,87036","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075581736","display_name":"Floriano De Rango","orcid":"https://orcid.org/0000-0003-4901-6233"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Floriano De Rango","raw_affiliation_strings":["University of Calabria,DIMES,Italy,87036"],"affiliations":[{"raw_affiliation_string":"University of Calabria,DIMES,Italy,87036","institution_ids":["https://openalex.org/I45204951"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5115751297"],"corresponding_institution_ids":["https://openalex.org/I45204951"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.47450244,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.4156999886035919,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.4156999886035919,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.15809999406337738,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.09130000323057175,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/load-balancing","display_name":"Load balancing (electrical power)","score":0.7447999715805054},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6474999785423279},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4207000136375427},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.37860000133514404},{"id":"https://openalex.org/keywords/load-management","display_name":"Load management","score":0.3686000108718872},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.3418000042438507},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3084999918937683},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.30649998784065247},{"id":"https://openalex.org/keywords/mqtt","display_name":"MQTT","score":0.30239999294281006}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7915999889373779},{"id":"https://openalex.org/C138959212","wikidata":"https://www.wikidata.org/wiki/Q1806783","display_name":"Load balancing (electrical power)","level":3,"score":0.7447999715805054},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6474999785423279},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5102999806404114},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.47440001368522644},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4207000136375427},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.382099986076355},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.37860000133514404},{"id":"https://openalex.org/C2779370713","wikidata":"https://www.wikidata.org/wiki/Q357554","display_name":"Load management","level":2,"score":0.3686000108718872},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3418000042438507},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3084999918937683},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.30649998784065247},{"id":"https://openalex.org/C132868160","wikidata":"https://www.wikidata.org/wiki/Q10322548","display_name":"MQTT","level":3,"score":0.30239999294281006},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2996000051498413},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.29510000348091125},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.29490000009536743},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.2849000096321106},{"id":"https://openalex.org/C3019591417","wikidata":"https://www.wikidata.org/wiki/Q575614","display_name":"Load distribution","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.27469998598098755},{"id":"https://openalex.org/C65714651","wikidata":"https://www.wikidata.org/wiki/Q1662626","display_name":"Multihoming","level":4,"score":0.273499995470047},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.2685999870300293},{"id":"https://openalex.org/C65813073","wikidata":"https://www.wikidata.org/wiki/Q1622420","display_name":"High availability","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.2565000057220459},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.25440001487731934},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2515000104904175}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pimrc62392.2025.11275272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc62392.2025.11275272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2982512057","https://openalex.org/W2989635506","https://openalex.org/W3125734163","https://openalex.org/W3190992642","https://openalex.org/W4312684043","https://openalex.org/W4393859539","https://openalex.org/W4398775120","https://openalex.org/W4399485385","https://openalex.org/W4400617040","https://openalex.org/W4408325128","https://openalex.org/W4408520071","https://openalex.org/W4410087152"],"related_works":[],"abstract_inverted_index":{"The":[0],"forthcoming":[1],"sixth":[2],"generation":[3],"(6G)":[4],"of":[5,13,46,113,134],"networks":[6],"is":[7,36,73],"expected":[8],"to":[9,64,87,130,154,164],"enable":[10],"disruptive":[11],"Internet":[12],"Things":[14],"(IoT)":[15],"applications":[16],"by":[17],"fostering":[18],"a":[19,44,110,119,131,150,169],"seamless":[20],"integration":[21],"between":[22],"networking":[23,48],"and":[24,50,68,92,100,177],"Artificial":[25],"Intelligence":[26],"(AI).":[27],"In":[28],"addition,":[29],"the":[30,38,114,122,161,184],"exponential":[31],"increase":[32],"in":[33,121],"interconnected":[34],"devices":[35],"challenging":[37],"current":[39,47],"5G":[40],"networks,":[41],"urgently":[42],"requiring":[43],"redesign":[45],"architectures":[49],"communication":[51],"protocols.":[52],"To":[53],"address":[54],"these":[55,84],"challenges,":[56],"IoT":[57],"application-layer":[58],"protocols":[59],"are":[60],"undergoing":[61],"significant":[62],"redesigns":[63],"enhance":[65],"scalability,":[66,94],"efficiency,":[67],"adaptability.":[69],"A":[70],"prominent":[71],"example":[72],"MQTTv5,":[74],"which":[75],"introduces":[76],"several":[77],"advanced":[78],"features,":[79],"including":[80],"shared":[81,123,170],"subscriptions.":[82],"While":[83],"advancements":[85],"contribute":[86],"more":[88],"efficient":[89],"resource":[90],"utilization":[91],"network":[93],"they":[95],"also":[96],"introduce":[97],"new":[98],"security":[99],"reliability":[101],"concerns":[102],"that":[103,117,126],"must":[104],"be":[105],"carefully":[106],"addressed.":[107],"Based":[108],"on":[109],"previous":[111],"work":[112],"same":[115],"authors":[116],"found":[118],"vulnerability":[120],"subscription":[124,171],"mechanism":[125,153],"makes":[127],"it":[128],"prone":[129],"Distributed":[132],"Denial":[133],"Service":[135],"(DDoS)":[136],"Starvation":[137],"attack,":[138],"this":[139],"paper":[140],"proposes":[141],"QLB-MSS:":[142],"Queuing-Based":[143],"Load":[144],"Balancing":[145],"for":[146],"MQTTv5":[147],"Shared":[148],"Subscriptions,":[149],"load":[151,175],"balancing":[152],"Prevent":[155],"DDoS":[156],"Starvation.":[157],"This":[158],"approach":[159],"allows":[160],"MQTT":[162],"broker":[163],"intelligently":[165],"allocate":[166],"messages":[167],"within":[168],"group,":[172],"ensuring":[173],"balanced":[174],"distribution":[176],"preventing":[178],"device":[179],"overload":[180],"while":[181],"effectively":[182],"mitigating":[183],"considered":[185],"attack.":[186]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-12T00:00:00"}
