Review and analysis of standards and protocols in the field of Internet of Things. Modern testing methods and problems of information security IoT

N.A. Naraliyev, D.I. Samal

Abstract


IoT is a whole ecosystem that contains intelligent devices equipped with sensors (sensors) that provide remote control, storage, transmission and security of data. The Internet of Things (IoT) is an innovative solution in various areas such as healthcare, insurance, labor protection, logistics, ecology, etc. To unleash the full potential of using IoT devices, it is necessary to solve many problems related to standards, security, architecture, ecosystem construction, channels and device connection protocols. Today in the world, large organizations such as NIST, IEEE, ISO / IEC, and others make enormous efforts in addressing the issues of standardization, security, and the architecture of developed devices.

Analysis of recent scientific research in the field of solving information security issues and data privacy of IoT devices showed positive results, but these methods and approaches are based on traditional methods of network security. The development and application of security mechanisms for IoT devices is a complex and heterogeneous task. In this regard, ensuring information security and the protection of sensitive data, as well as the availability of IoT devices, is the main purpose of writing this article.

Given the above, many questions arise related to the security status of IoT devices, namely:  What are the current standards and protocols for IoT?  What are the requirements for ensuring information security of IoT devices? What security mechanisms do IoT devices have?  What methods of testing IoT devices exist?

Manufacturers and developers of IoT devices do not pay enough attention to security issues. With the development of cyber-attacks, attack vectors are becoming more sophisticated and aimed at several infrastructure elements at the same time. IoT infrastructure typically includes millions of connected objects and devices that store and share confidential information. Scenarios of theft and fraud, such as hacking and falsifying personal data, pose a serious threat to such IoT devices. Most IoT devices use the public Internet to exchange data, which makes them vulnerable to cyber-attacks. Modern approaches to information security often offer solutions to individual problems, when multi-level approaches offer increased resistance to cyber-attacks.


Full Text:

PDF (Russian)

References


Internet of Things, IoT, M2M global market http://www.tadviser.ru/index.php/Article: On-line media_, _IoT,_M2M_( world_market)

https://ru.wikipedia.org/wiki/International_Data_Corporation

https://strij.tech/publications/tehnologiya/chto-takoe-internet-veschey.html

https://www.intel.ru/content/www/ru/ru/internet-of-things/ecosystem.html

ITU-T Recommendation Y.2060 for the Internet of Things (IoThttps: //www.itu.int/ITU-T/recommendations/rec.aspx? Rec = 11559 & lang = en

IEEE Internet of Things https://iot.ieee.org/

International Electrotechnical Commission https://www.iec.ch/

International Cybersecurity Standardization for Internet of Things (IoT) https://csrc.nist.gov/publications/detail/nistir/8200/draft

NIST: Internet of Things https://www.nist.gov/topics/internet-things-iot

IEEE Standard for Local and Metropolitan Area Networks - Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) http://standards.ieee.org/findstds/standard/802.15.4-2011.html

IEEE 802.15.4f-2012 - IEEE Standard for Local and Metropolitan area networks-- Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 2: Active Radio Frequency Identification (RFID) System Physical Layer (PHY) ) http://standards.ieee.org/findstds/standard/802.15.4f-2012.html

IEEE 802.16-2012 - IEEE Standard for Broadband Wireless Access Systems http://standards.ieee.org/findstds/standard/802.16-2012.html

IEEE 1609.2-2013 - http://www.ieee.org/findstds/standard/1609.2-2013.html

http://standards.ieee.org/findstds/standard/802.16p-2012.html

IEEE 1703-2012 - IEEE Standard for Local Area Area Networks / Wide Area Network (LAN / WAN) Industry Data Center Device Data Tables http://standards.ieee.org/findstds/standard/1703 -2012.html

IEEE 1888-2011 - IEEE Standard for Ubiquitous Green Community Control Network Protocol http://standards.ieee.org/findstds/standard/1888-2011.html

IEEE 1902.1-2009 - IEEE Standard for Long Wavelength Wireless Network Protocol http://standards.ieee.org/findstds/standard/1902.1-2009.html

IEEE 2200-2012 - IEEE Standard Protocol for Stream Management in Media Client Devices http://standards.ieee.org/findstds/standard/2200-2012.html

http://standards.ieee.org/develop/project/1905.1.html

IEEE 2030.5-2013 - IEEE Adoption of Smart Energy Profile 2.0 Application Protocol Standard http://standards.ieee.org/findstds/standard/2030.5-2013.html

IEEE 21451-7-2011 - Information technology - Transducers electronic data sheet (TEDS) http: // standards.ieee.org/findstds/standard/21451-7-2011.html

E. Morin, M. Maman, R. Guizzetti, and A. Duda, IEEE Access, vol. 5, pp. 7097–7114, 2017

LPWAN: smart network of the future https://ichip.ru/lpwan-umnaya-set-budushhego.html

IoT technologies grouped by working coverage range http://controlengrussia.com/besprovodny-e-tehnologii/putivoditel-iot-1/

The Mirai botnet was used for a powerful DDoS attack on the Dyn company https://habr.com/company/eset/blog/313444/

BrickerBot turns IoT gadgets into “brick” https://habr.com/post/402995/

BrickerBot Permanent Denial-of-Service Attack https://ics-cert.us-cert.gov/alerts/ICS-ALERT-17-102-01A

Security Management for the Internet of Things, Electronic Theses and Dissertations, 2017

Security of the “Internet of Things”: existing problems and their solutions http://www.controlengrussia.com/internet-veshhej/bezopasnost-interneta-veshhej/

Testing usability https://qalight.com.ua/baza-znaniy/yuzabiliti/

Types of software testing https://geteasyqa.com/en/qa/software-testing-types/

Performance testing: test sequence, measurable indicators, rules for submitting the load http://software-testing.ru/library/testing/performance-testing/2685-test-perfomance

Performance Testing Comprehensive testing at all stages of the software life cycle. http://www.a1qa.ru/performance-testing/

V. Chang, M. Ramachandran, “Towards Ensuring Data Security Using the Cloud Computing Environment”, IEEE Trans. Comput services. Volume 9, no 1, p. 138-151, January / February. 2016

Threats of the Internet of Things and possible methods of protection https://os.kaspersky.com/2019/03/13/ugrozy-interneta-veshhey-i-vozmozhnye-me/


Refbacks

  • There are currently no refbacks.


Abava  Кибербезопасность MoNeTec 2024

ISSN: 2307-8162