{"id":"https://openalex.org/W4416924999","doi":"https://doi.org/10.1109/wimob66857.2025.11257525","title":"Security-Oriented Load Distribution in MQTTv5: A Token Bucket and Trust Evaluation Approach","display_name":"Security-Oriented Load Distribution in MQTTv5: A Token Bucket and Trust Evaluation Approach","publication_year":2025,"publication_date":"2025-10-20","ids":{"openalex":"https://openalex.org/W4416924999","doi":"https://doi.org/10.1109/wimob66857.2025.11257525"},"language":null,"primary_location":{"id":"doi:10.1109/wimob66857.2025.11257525","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257525","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074855296","display_name":"Mattia Giovanni Spina","orcid":"https://orcid.org/0009-0000-8407-2551"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Mattia Giovanni Spina","raw_affiliation_strings":["University of Calabria,DIMES,Rende,CS,Italy,87036"],"affiliations":[{"raw_affiliation_string":"University of Calabria,DIMES,Rende,CS,Italy,87036","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115751297","display_name":"Graziano Rizzo","orcid":null},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Graziano Rizzo","raw_affiliation_strings":["University of Calabria,DIMES,Rende,CS,Italy,87036"],"affiliations":[{"raw_affiliation_string":"University of Calabria,DIMES,Rende,CS,Italy,87036","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075581736","display_name":"Floriano De Rango","orcid":"https://orcid.org/0000-0003-4901-6233"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Floriano De Rango","raw_affiliation_strings":["University of Calabria,DIMES,Rende,CS,Italy,87036"],"affiliations":[{"raw_affiliation_string":"University of Calabria,DIMES,Rende,CS,Italy,87036","institution_ids":["https://openalex.org/I45204951"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5074855296"],"corresponding_institution_ids":["https://openalex.org/I45204951"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45492972,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.3192000091075897,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.3192000091075897,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.2736999988555908,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.05739999935030937,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7366999983787537},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.6118999719619751},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.609499990940094},{"id":"https://openalex.org/keywords/mqtt","display_name":"MQTT","score":0.5734999775886536},{"id":"https://openalex.org/keywords/token-bucket","display_name":"Token bucket","score":0.5296000242233276},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5038999915122986},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.454800009727478},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.42890000343322754}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7993000149726868},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7366999983787537},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6844000220298767},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.6118999719619751},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.609499990940094},{"id":"https://openalex.org/C132868160","wikidata":"https://www.wikidata.org/wiki/Q10322548","display_name":"MQTT","level":3,"score":0.5734999775886536},{"id":"https://openalex.org/C135135165","wikidata":"https://www.wikidata.org/wiki/Q386456","display_name":"Token bucket","level":3,"score":0.5296000242233276},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5038999915122986},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4975999891757965},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.454800009727478},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.42890000343322754},{"id":"https://openalex.org/C164916973","wikidata":"https://www.wikidata.org/wiki/Q1378386","display_name":"Leaky bucket","level":3,"score":0.36959999799728394},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3052000105381012},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.29649999737739563},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.2851000130176544},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.27900001406669617},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.27630001306533813},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.273499995470047},{"id":"https://openalex.org/C115067241","wikidata":"https://www.wikidata.org/wiki/Q1639854","display_name":"Token passing","level":3,"score":0.2727999985218048},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.26440000534057617},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.25619998574256897},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.2540999948978424}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wimob66857.2025.11257525","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257525","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2989635506","https://openalex.org/W3048741721","https://openalex.org/W3135725526","https://openalex.org/W3190992642","https://openalex.org/W4316039105","https://openalex.org/W4360584536","https://openalex.org/W4387096259","https://openalex.org/W4394994431","https://openalex.org/W4396523435","https://openalex.org/W4406264898","https://openalex.org/W4410087152"],"related_works":[],"abstract_inverted_index":{"The":[0],"advent":[1],"of":[2,10,38,92,105,168],"fifth-generation":[3],"(5G)":[4],"networks":[5],"has":[6],"enabled":[7],"the":[8,11,36,59,77,103,153,163,169,174],"rise":[9],"massive":[12],"IoT":[13,52],"(mIoT)":[14],"paradigm,":[15],"characterized":[16],"by":[17,76,119],"large-scale,":[18],"heterogeneous,":[19],"and":[20,30,66,166],"interconnected":[21],"devices":[22],"leading":[23],"to":[24,63,89,173],"breakthrough":[25],"applications":[26],"like":[27],"telemedicine,":[28],"AR/VR,":[29],"autonomous":[31],"systems.":[32],"In":[33],"this":[34,85,115],"context,":[35],"security":[37],"communication":[39],"protocols":[40],"becomes":[41],"critical.":[42],"Among":[43],"these,":[44],"MQTT":[45],"is":[46],"a":[47,81,129],"widely":[48],"adopted":[49],"protocol":[50],"for":[51],"communications.":[53],"Its":[54],"latest":[55],"specification,":[56],"MQTTv5,":[57],"introduces":[58],"shared":[60],"subscription":[61],"feature":[62],"improve":[64],"scalability":[65,118],"reduce":[67],"message":[68,138],"overhead":[69],"on":[70,101,150],"constrained":[71],"devices.":[72],"However,":[73],"prior":[74],"work":[75],"same":[78],"authors":[79],"revealed":[80],"critical":[82],"vulnerability":[83],"in":[84],"mechanism,":[86],"allowing":[87],"attackers":[88],"induce":[90],"starvation":[91],"legitimate":[93,122],"subscribers.":[94],"An":[95],"initial":[96],"mitigation":[97],"was":[98],"proposed,":[99],"based":[100,149],"limiting":[102],"number":[104],"subscribers":[106],"per":[107],"group":[108,142],"using":[109],"fixed":[110],"statistical":[111],"thresholds.":[112],"While":[113],"effective,":[114],"approach":[116],"compromises":[117],"potentially":[120],"excluding":[121],"nodes.":[123],"To":[124],"address":[125],"this,":[126],"we":[127],"propose":[128],"novel":[130],"adaptive,":[131],"trustbased":[132],"token":[133],"bucket":[134],"mechanism":[135],"that":[136],"regulates":[137],"delivery":[139,147],"without":[140],"restricting":[141],"size.":[143],"By":[144],"dynamically":[145],"adjusting":[146],"rates":[148],"subscriber":[151],"trust,":[152],"system":[154],"mitigates":[155],"attacks":[156],"while":[157],"preserving":[158],"scalability.":[159],"Experimental":[160],"results":[161],"demonstrate":[162],"superior":[164],"effectiveness":[165],"efficiency":[167],"proposed":[170],"solution":[171],"compared":[172],"previous":[175],"approach.":[176]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-02T00:00:00"}
