Security problems in the practice of implementation of the internet of things technology.

Keywords: Internet of Things, information security, software, communication, information technology, identification.

Abstract

The article reveals security issues in the practice of the Internet of Things technology. The author provides an analysis of the problems of the Internet of Things, where the problem of information security is chosen as the major one. It is noted that numerous Internet of Things programs can be combined into three groups — industrial, environmental, public. All technologies included in the continuous computational processes of the Internet of Things are described, such as: radio frequency identification; processing of large arrays of information, Big Data; machine-to-machine interaction (MachinetoMachine, M2M); cyber-physical systems (biological, physical, etc. operations of which are integrated and controlled by a computer core); location identification through GLONASS and GPS; providing broadband communication, including the global standard for digital mobile cellular communication with time division multiple access (TDMA) and frequency division multiple access (FDMA); wireless sensor networks, and other modern technologies. It is emphasized that taking into account all the characteristics of the Internet of Things, it has three levels: the level of perception, network level and applied level, each fulfilling the tasks and performing its functions. The author proposed a number of information security issues for each level. The causes of software vulnerabilities of the Internet of Things are described, and the complexity of software on the Internet of Things is determined, indicating measures that can reduce the level of vulnerability. It is emphasized that for software design it is necessary to emulate the behaviour of IoT devices, i.e. to create a simulator of the environment for servers. Due to limitations in devices (power supply, processor performance, memory), the Internet of Things faces a difficult task to avoid a strong discrepancy between the emulator and the device. The concept of backdoor is provided, and the principles of backdoor application are described.

References

Mikhnenko Ya.O., Kurdecha, V.V. (2019). Comparison of Types of Cloud Services in IoT. Modern Challenges in Telecommunications: Materials of the XIII International Scientific Conference (Kyiv, April 15-19, 2019). Kyiv, 2019. URL: https://cutt.ly/gpqg4id (retrieved: 12.10.2020)

Porolo, Ye.A., Kurdecha, V.V. (2020). Improved Network Architecture for the Cloud Internet of Things. Modern Challenges in Telecommunications: Materials of the XIV International Scientific Conference (Kyiv, April 13-17, 2020) / Inst. of Telecommunication Systems and Research Institute of Telecommunications of NTU Igor Sikorsky KPI. Kyiv. URL: https://cutt.ly/wpqjh4U (retrieved: 12.10.2020)

Sotnik, I.M., Zavrazhnyi, K.Yu. (2017). Approaches to Information Security of the Industrial Internet of Things at the Enterprise. Marketing and Management of Innovations, 3, 177-186. doi: 10.21272/mmi.2017.3-17.

Hraivoronskyi, M.V. (2017). Internet of Things Security. Internet of Things: Problems of Legal Regulation and Implementation: Materials of the Research and Training Conference (Kyiv, October 24, 2017). / Ed. by: V.M. Furashev, S.Yu. Petriaev. Kyiv: National Technical University of Ukraine, Igor Sikorsky Kyiv Polytechnic Institute, Polytechnika Publishing House, 29-35.

Petrenko, A.I. (2019). Cryptology in the Internet of Things. Modelling and Information Systems in Economics, 97, 155-163. URL: https://cutt.ly/IorknVi

Zhang, B., Zou, Z., & Liu, M. (2011, May). Evaluation on security system of internet of things based on fuzzy-AHP method. In 2011 International Conference on E-Business and E-Government (ICEE) (pp. 1-5). IEEE. doi:10.1109/ICEBEG.2011.5881939

Schurgot, M. R., Shinberg, D. A., & Greenwald, L. G. (2015, June). Experiments with security and privacy in IoT networks. In 2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) (pp. 1-6). IEEE.

Sorokin, D.V., Bondarchuk, A.P., Storchak, K.P. (2019). Infrastructure of Industrial IoT Networks and Cyber Threats in Access when Using IoT Solutions. Telecommunication and Information Technology. No. 4. Pp. 120-127. URL: https://cutt.ly/6orjhfo

Aleksina, L.T. Shevchenko, O.O. (2019). Research of the Internet of Things Technologies. Connectivity, 4, 24-26.

Bazylevych, V., Maltseva, M., Petrenko, T., Chernysh, L. (2020). Secure Smart Home System Using the Internet of Things. Technical Sciences and Technologies, 2(20), 218-228.

Abstract views: 190
PDF Downloads: 253
Published
2020-12-27
How to Cite
Samoilenko М. (2020). Security problems in the practice of implementation of the internet of things technology . COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (41), 198-204. https://doi.org/10.36910/6775-2524-0560-2020-41-31
Section
Computer science and computer engineering