M2M protocols can be abused to attack IoT and IIoT systems
Security Affairs
DECEMBER 4, 2018
The former one is a messaging protocol used to establish communication between a broker and multiple clients, the latter is a UDP client-server protocol that allows communications between nodes. ” reads the research paper. ” concludes the report.
Let's personalize your content