Review and analysis of standards and protocols in the field of Internet of Things. Modern testing methods and problems of information security IoT
Abstract
IoT is a whole ecosystem that contains intelligent devices equipped with sensors (sensors) that provide remote control, storage, transmission and security of data. The Internet of Things (IoT) is an innovative solution in various areas such as healthcare, insurance, labor protection, logistics, ecology, etc. To unleash the full potential of using IoT devices, it is necessary to solve many problems related to standards, security, architecture, ecosystem construction, channels and device connection protocols. Today in the world, large organizations such as NIST, IEEE, ISO / IEC, and others make enormous efforts in addressing the issues of standardization, security, and the architecture of developed devices.
Analysis of recent scientific research in the field of solving information security issues and data privacy of IoT devices showed positive results, but these methods and approaches are based on traditional methods of network security. The development and application of security mechanisms for IoT devices is a complex and heterogeneous task. In this regard, ensuring information security and the protection of sensitive data, as well as the availability of IoT devices, is the main purpose of writing this article.
Given the above, many questions arise related to the security status of IoT devices, namely: What are the current standards and protocols for IoT? What are the requirements for ensuring information security of IoT devices? What security mechanisms do IoT devices have? What methods of testing IoT devices exist?
Manufacturers and developers of IoT devices do not pay enough attention to security issues. With the development of cyber-attacks, attack vectors are becoming more sophisticated and aimed at several infrastructure elements at the same time. IoT infrastructure typically includes millions of connected objects and devices that store and share confidential information. Scenarios of theft and fraud, such as hacking and falsifying personal data, pose a serious threat to such IoT devices. Most IoT devices use the public Internet to exchange data, which makes them vulnerable to cyber-attacks. Modern approaches to information security often offer solutions to individual problems, when multi-level approaches offer increased resistance to cyber-attacks.
Full Text:
PDF (Russian)References
Internet of Things, IoT, M2M global market http://www.tadviser.ru/index.php/Article: On-line media_, _IoT,_M2M_( world_market)
https://ru.wikipedia.org/wiki/International_Data_Corporation
https://strij.tech/publications/tehnologiya/chto-takoe-internet-veschey.html
https://www.intel.ru/content/www/ru/ru/internet-of-things/ecosystem.html
ITU-T Recommendation Y.2060 for the Internet of Things (IoThttps: //www.itu.int/ITU-T/recommendations/rec.aspx? Rec = 11559 & lang = en
IEEE Internet of Things https://iot.ieee.org/
International Electrotechnical Commission https://www.iec.ch/
International Cybersecurity Standardization for Internet of Things (IoT) https://csrc.nist.gov/publications/detail/nistir/8200/draft
NIST: Internet of Things https://www.nist.gov/topics/internet-things-iot
IEEE Standard for Local and Metropolitan Area Networks - Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) http://standards.ieee.org/findstds/standard/802.15.4-2011.html
IEEE 802.15.4f-2012 - IEEE Standard for Local and Metropolitan area networks-- Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 2: Active Radio Frequency Identification (RFID) System Physical Layer (PHY) ) http://standards.ieee.org/findstds/standard/802.15.4f-2012.html
IEEE 802.16-2012 - IEEE Standard for Broadband Wireless Access Systems http://standards.ieee.org/findstds/standard/802.16-2012.html
IEEE 1609.2-2013 - http://www.ieee.org/findstds/standard/1609.2-2013.html
http://standards.ieee.org/findstds/standard/802.16p-2012.html
IEEE 1703-2012 - IEEE Standard for Local Area Area Networks / Wide Area Network (LAN / WAN) Industry Data Center Device Data Tables http://standards.ieee.org/findstds/standard/1703 -2012.html
IEEE 1888-2011 - IEEE Standard for Ubiquitous Green Community Control Network Protocol http://standards.ieee.org/findstds/standard/1888-2011.html
IEEE 1902.1-2009 - IEEE Standard for Long Wavelength Wireless Network Protocol http://standards.ieee.org/findstds/standard/1902.1-2009.html
IEEE 2200-2012 - IEEE Standard Protocol for Stream Management in Media Client Devices http://standards.ieee.org/findstds/standard/2200-2012.html
http://standards.ieee.org/develop/project/1905.1.html
IEEE 2030.5-2013 - IEEE Adoption of Smart Energy Profile 2.0 Application Protocol Standard http://standards.ieee.org/findstds/standard/2030.5-2013.html
IEEE 21451-7-2011 - Information technology - Transducers electronic data sheet (TEDS) http: // standards.ieee.org/findstds/standard/21451-7-2011.html
E. Morin, M. Maman, R. Guizzetti, and A. Duda, IEEE Access, vol. 5, pp. 7097–7114, 2017
LPWAN: smart network of the future https://ichip.ru/lpwan-umnaya-set-budushhego.html
IoT technologies grouped by working coverage range http://controlengrussia.com/besprovodny-e-tehnologii/putivoditel-iot-1/
The Mirai botnet was used for a powerful DDoS attack on the Dyn company https://habr.com/company/eset/blog/313444/
BrickerBot turns IoT gadgets into “brick” https://habr.com/post/402995/
BrickerBot Permanent Denial-of-Service Attack https://ics-cert.us-cert.gov/alerts/ICS-ALERT-17-102-01A
Security Management for the Internet of Things, Electronic Theses and Dissertations, 2017
Security of the “Internet of Things”: existing problems and their solutions http://www.controlengrussia.com/internet-veshhej/bezopasnost-interneta-veshhej/
Testing usability https://qalight.com.ua/baza-znaniy/yuzabiliti/
Types of software testing https://geteasyqa.com/en/qa/software-testing-types/
Performance testing: test sequence, measurable indicators, rules for submitting the load http://software-testing.ru/library/testing/performance-testing/2685-test-perfomance
Performance Testing Comprehensive testing at all stages of the software life cycle. http://www.a1qa.ru/performance-testing/
V. Chang, M. Ramachandran, “Towards Ensuring Data Security Using the Cloud Computing Environment”, IEEE Trans. Comput services. Volume 9, no 1, p. 138-151, January / February. 2016
Threats of the Internet of Things and possible methods of protection https://os.kaspersky.com/2019/03/13/ugrozy-interneta-veshhey-i-vozmozhnye-me/
Refbacks
- There are currently no refbacks.
Abava Кибербезопасность IT Congress 2024
ISSN: 2307-8162