A Novel MQTT-ZT Secure Broker: Zero Trust Architecture for IoT Security

  • Meha James
  • , Thomas Newe
  • , Donna O'Shea
  • , George D. O'Mahony

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The rapid growth of the Internet of Things (IoT) introduces significant security risks, including unauthorized access, data breaches, and supply chain attacks. Traditional models like Role-Based Access Control (RBAC) lack scalability and realtime enforcement for dynamic IoT environments. This paper presents the MQTT-ZT Secure Broker - an MQTT-based IoT communication framework built on Zero Trust Architecture (ZTA). It integrates Attribute-Based Access Control (ABAC) directly into the broker using a built-in Policy Enforcement Point (PEP) and Axiomatics' ALFA policy engine for efficient, low-latency authorization. Experiments conducted in a cyber range show the broker maintains low processing times - 20-79 ms for publishers and 24-63 ms for subscribers - even at 200 clients, outperforming traditional methods that often exceed 100 ms. These results highlight the architecture's ability to scale while ensuring continuous verification and minimal latency. The MQTT-ZT Secure Broker offers a robust and scalable Zero Trust solution for securing IoT environments.

Original languageEnglish
Title of host publicationProceedings of the 2025 IEEE International Conference on Cyber Security and Resilience, CSR 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages433-439
Number of pages7
ISBN (Electronic)9798331535919
DOIs
Publication statusPublished - 2025
Event5th IEEE International Conference on Cyber Security and Resilience, CSR 2025 - Chania, Greece
Duration: 4 Aug 20256 Aug 2025

Publication series

NameProceedings of the 2025 IEEE International Conference on Cyber Security and Resilience, CSR 2025

Conference

Conference5th IEEE International Conference on Cyber Security and Resilience, CSR 2025
Country/TerritoryGreece
CityChania
Period4/08/256/08/25

Keywords

  • Access Control
  • Attribute-Based Access Control (ABAC)
  • Cybersecurity
  • Internet of Things (IoT)
  • Message Queuing Telemetry Transport (MQTT)
  • Policy Decision Point (PDP)
  • Policy Enforcement Point (PEP)
  • Zero Trust (ZT)
  • Zero Trust Architecture (ZTA)

Fingerprint

Dive into the research topics of 'A Novel MQTT-ZT Secure Broker: Zero Trust Architecture for IoT Security'. Together they form a unique fingerprint.

Cite this