Review and analysis of standards and protocols in the field of Internet of Things. Modern testing methods and problems of information security IoT

N.A. Naraliyev, D.I. Samal


IoT is a whole ecosystem that contains intelligent devices equipped with sensors (sensors) that provide remote control, storage, transmission and security of data. The Internet of Things (IoT) is an innovative solution in various areas such as healthcare, insurance, labor protection, logistics, ecology, etc. To unleash the full potential of using IoT devices, it is necessary to solve many problems related to standards, security, architecture, ecosystem construction, channels and device connection protocols. Today in the world, large organizations such as NIST, IEEE, ISO / IEC, and others make enormous efforts in addressing the issues of standardization, security, and the architecture of developed devices.

Analysis of recent scientific research in the field of solving information security issues and data privacy of IoT devices showed positive results, but these methods and approaches are based on traditional methods of network security. The development and application of security mechanisms for IoT devices is a complex and heterogeneous task. In this regard, ensuring information security and the protection of sensitive data, as well as the availability of IoT devices, is the main purpose of writing this article.

Given the above, many questions arise related to the security status of IoT devices, namely:  What are the current standards and protocols for IoT?  What are the requirements for ensuring information security of IoT devices? What security mechanisms do IoT devices have?  What methods of testing IoT devices exist?

Manufacturers and developers of IoT devices do not pay enough attention to security issues. With the development of cyber-attacks, attack vectors are becoming more sophisticated and aimed at several infrastructure elements at the same time. IoT infrastructure typically includes millions of connected objects and devices that store and share confidential information. Scenarios of theft and fraud, such as hacking and falsifying personal data, pose a serious threat to such IoT devices. Most IoT devices use the public Internet to exchange data, which makes them vulnerable to cyber-attacks. Modern approaches to information security often offer solutions to individual problems, when multi-level approaches offer increased resistance to cyber-attacks.

Full Text:

PDF (Russian)


Internet of Things, IoT, M2M global market On-line media_, _IoT,_M2M_( world_market)

ITU-T Recommendation Y.2060 for the Internet of Things (IoThttps: // Rec = 11559 & lang = en

IEEE Internet of Things

International Electrotechnical Commission

International Cybersecurity Standardization for Internet of Things (IoT)

NIST: Internet of Things

IEEE Standard for Local and Metropolitan Area Networks - Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)

IEEE 802.15.4f-2012 - IEEE Standard for Local and Metropolitan area networks-- Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 2: Active Radio Frequency Identification (RFID) System Physical Layer (PHY) )

IEEE 802.16-2012 - IEEE Standard for Broadband Wireless Access Systems

IEEE 1609.2-2013 -

IEEE 1703-2012 - IEEE Standard for Local Area Area Networks / Wide Area Network (LAN / WAN) Industry Data Center Device Data Tables -2012.html

IEEE 1888-2011 - IEEE Standard for Ubiquitous Green Community Control Network Protocol

IEEE 1902.1-2009 - IEEE Standard for Long Wavelength Wireless Network Protocol

IEEE 2200-2012 - IEEE Standard Protocol for Stream Management in Media Client Devices

IEEE 2030.5-2013 - IEEE Adoption of Smart Energy Profile 2.0 Application Protocol Standard

IEEE 21451-7-2011 - Information technology - Transducers electronic data sheet (TEDS) http: //

E. Morin, M. Maman, R. Guizzetti, and A. Duda, IEEE Access, vol. 5, pp. 7097–7114, 2017

LPWAN: smart network of the future

IoT technologies grouped by working coverage range

The Mirai botnet was used for a powerful DDoS attack on the Dyn company

BrickerBot turns IoT gadgets into “brick”

BrickerBot Permanent Denial-of-Service Attack

Security Management for the Internet of Things, Electronic Theses and Dissertations, 2017

Security of the “Internet of Things”: existing problems and their solutions

Testing usability

Types of software testing

Performance testing: test sequence, measurable indicators, rules for submitting the load

Performance Testing Comprehensive testing at all stages of the software life cycle.

V. Chang, M. Ramachandran, “Towards Ensuring Data Security Using the Cloud Computing Environment”, IEEE Trans. Comput services. Volume 9, no 1, p. 138-151, January / February. 2016

Threats of the Internet of Things and possible methods of protection


  • There are currently no refbacks.

Abava  Absolutech IT-EDU 2019

ISSN: 2307-8162