On cybersecurity of the Internet of Things systems

Dmitry Namiot, Vladimir Sukhomlin

Abstract


This article discusses the issues of cybersecurity of the Internet of Things (IoT) systems. Such systems are always an integration of many different technologies. This, naturally, increases the opportunities for attackers to influence both software and hardware subsystems of projects. The multitude of different vendors with their solutions and software update cycles greatly increases the possibility of supply chain attacks. Historically, IoT systems have used and continue to use a wide variety of communication solutions, which complicates data protection in this area. End devices (sensors, actuators) also differ greatly in their capabilities and characteristics, which excludes any unified solutions in this area. Perhaps the only “standard” element of IoT systems is cloud storage, the cybersecurity of which must also be dealt with outside of IoT projects. The IoT cybersecurity work is further complicated by the fact that the term IoT hides a whole family of approaches (architectures) - the industrial Internet of Things, the Internet of nano-things, etc. Possible attacks on IOT systems include confidential data theft, identity theft, infrastructure damage, data corruption, unauthorized surveillance, illegal data modification, and unauthorized use of device capabilities.

Full Text:

PDF (Russian)

References


Magistratura POVS https://cs.msu.ru/news/3368 Retrieved: Dec, 2022

Namiot, Dmitry, Manfred Sneps-Sneppe Ventspils, and Yousef Ibrahim Daradkeh. "On internet of things education." 2017 20th conference of open innovations association (FRUCT). IEEE, 2017.

Namiot, Dmitry, and Manfred Sneps-Sneppe. "On internet of things and big data in university courses." International Journal of Embedded and Real-Time Communication Systems (IJERTCS) 8.1 (2017): 18-30.

Lebed, Sergey. "Innovacionnye tehnologii v sfere kiberbezopasnosti." Sovremennye informacionnye tehnologii i IT-obrazovanie [Onlajn], 18.2 (2022): 383-390.

What is cybersecurity https://www.microsoft.com/ru-ru/security/business/security-101/what-is-cybersecurity Retrieved: Dec, 2022

Computer Security https://en.wikipedia.org/wiki/Computer_security Retrieved: Dec, 2022

What is cyber-security https://www.kaspersky.ru/resource-center/definitions/what-is-cyber-security Retrieved: Dec, 2022

What is cyber security https://www.sap.com/cis/insights/what-is-cybersecurity.html Retrieved: Dec, 2022

IoT Cybersecurity https://www.knowledgehut.com/blog/security/Iot-cyber-security Retrieved: Dec, 2022

Fraunhofer IoT Cybersecurity https://www.iis.fraunhofer.de/en/ff/lv/iot-system/tech/cybersecurity.html Retrieved: Dec, 2022

Namiot, Dmitry. "On internet of things and smart cities educational courses." International Journal of Open Information Technologies 4.5 (2016): 26-38.

Boyes, Hugh, et al. "The industrial internet of things (IIoT): An analysis framework." Computers in industry 101 (2018): 1-12.

Akyildiz, Ian F., and Josep Miquel Jornet. "The internet of nano-things." IEEE Wireless Communications 17.6 (2010): 58-63.

Akyildiz, Ian F., and Ahan Kak. "The internet of space things/cubesats." IEEE Network 33.5 (2019): 212-218.

Xia, Tingting, et al. "Maritime internet of things: Challenges and solutions." IEEE Wireless Communications 27.2 (2020): 188-196.

Oceans Internet of Things https://www.media.mit.edu/projects/oceans-internet-of-things/overview/ Retrieved: Dec, 2022

Voas, Jeffrey. "Networks of ‘things’." NIST Special Publication 800.183 (2016): 800-183.

Nguyen, Thanh Hai, et al. "Specifying and reasoning about CPS through the lens of the NIST CPS framework." Theory and Practice of Logic Programming (2022): 1-41.

Mahmoud, Magdi S., Mutaz M. Hamdan, and Uthman A. Baroudi. "Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges." Neurocomputing 338 (2019): 101-115.

Cyber Physical Systems Security https://www.dhs.gov/science-and-technology/cpssec Retrieved: Dec, 2022

Nazarenko, Artem A., and Ghazanfar Ali Safdar. "Survey on security and privacy issues in cyber physical systems." AIMS Electronics and Electrical Engineering 3.2 (2019): 111-143.

Abosata, Nasr, et al. "Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications." Sensors 21.11 (2021): 3654.

Namiot, Dmitry, and Manfred Sneps-Sneppe. "On internet of things programming models." Distributed Computer and Communication Networks: 19th International Conference, DCCN 2016, Moscow, Russia, November 21-25, 2016, Revised Selected Papers 19. Springer International Publishing, 2016.

Namiot, Dmitry, and Elena Zubareva. "Data-driven Cities." International Journal of Open Information Technologies 4.12 (2016): 79-85.

P'ezodatchik http://digitrode.ru/articles/2761-chto-takoe-pezoelektricheskiy-datchik-kak-on-rabotaet-oblasti-primeneniya.html Retrieved: Dec, 2022

Yang, Ke, et al. "A comprehensive survey on hybrid communication for internet of nano-things in context of body-centric communications." arXiv preprint arXiv:1912.09424 (2019).

Namiot, Dmitry, and Manfred Sneps-Sneppe. "Context-aware data discovery." 2012 16th International Conference on Intelligence in Next Generation Networks. IEEE, 2012.

Kurganova, Nadezhda, et al. "Digital twins’ introduction as one of the major directions of industrial digitalization." International Journal of Open Information Technologies 7.5 (2019): 105-115.

Holmes, David, et al. "Digital Twins and Cyber Security–solution or challenge?." 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). IEEE, 2021.

NIST IoT principles https://www.nist.gov/itl/applied-cybersecurity/nist-cybersecurity-iot-program/principles Retrieved: Dec, 2022

Rao, V. Venkateswara, R. Marshal, and K. Gobinath. "The IoT Supply Chain Attack Trends-Vulnerabilities and Preventive Measures." 2021 4th International Conference on Security and Privacy (ISEA-ISAP). IEEE, 2021.

How the IoT Intensifies Software Supply Chain Risks https://www.cyberark.com/resources/blog/how-the-iot-intensifies-software-supply-chain-risks Retrieved: Dec, 2022

Wurm J, Jin Y, Liu Y, et al. (2017) Introduction to Cyber-Physical System Security: A Cross-Layer Perspective. IEEE Transactions on Multi-Scale Computing Systems 3: 215–227.

Puttonen, Juha, et al. "Enhancing security in cloud-based cyber-physical systems." (2016).

Ntalampiras S (2016) Automatic identification of integrity attacks in

cyber-physical systems.Expert Syst Appl 58: 164–173.

Altawy R, Youssef AM (2016) Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices. IEEE Access 4: 959–979.

Brunner, Michael, et al. "Towards an integrated model for safety and security requirements of cyber-physical systems." 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 2017..

Lun, Yuriy Zacchia, et al. "Cyber-physical systems security: a systematic mapping study." arXiv preprint arXiv:1605.09641 (2016).

IoT Threats https://unit42.paloaltonetworks.com/iot-threat-report-2020/ Retrieved: Dec, 2022

Ilyushin, Eugene, Dmitry Namiot, and Ivan Chizhov. "Attacks on machine learning systems-common problems and methods." International Journal of Open Information Technologies 10.3 (2022): 17-22

NISTIR 8259 https://www.nist.gov/itl/applied-cybersecurity/nist-cybersecurity-iot-program/nistir-8259-series Retrieved: Dec, 2022

ETSI EN 303 645 https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf Retrieved: Dec, 2022

OWASP https://owasp.org/www-project-internet-of-things/ Retrieved: Dec, 2022

Kuprijanovskij, V. P., et al. "Roznichnaja torgovlja v cifrovoj jekonomike." International Journal of Open Information Technologies 4.7 (2016): 1-12.

Kuprijanovskaja, Ju. V., et al. "Umnyj kontejner, umnyj port, BIM, Internet Veshhej i blokchejn v cifrovoj sisteme mirovoj torgovli." International Journal of Open Information Technologies 6.3 (2018): 49-94.

Nikolaev, D. E., et al. "Cifrovaja zheleznaja doroga-innovacionnye standarty i ih rol' na primere Velikobritanii." International Journal of Open Information Technologies 4.10 (2016): 55-61.


Refbacks

  • There are currently no refbacks.


Abava  Кибербезопасность MoNeTec 2024

ISSN: 2307-8162