ARTÍCULO
TITULO

Review and analysis of standards and protocols in the field of Internet of Things. Modern testing methods and problems of information security IoT

N.A. Naraliyev    
D.I. Samal    

Resumen

IoT is a whole ecosystem that contains intelligent devices equipped with sensors (sensors) that provide remote control, storage, transmission and security of data. The Internet of Things (IoT) is an innovative solution in various areas such as healthcare, insurance, labor protection, logistics, ecology, etc. To unleash the full potential of using IoT devices, it is necessary to solve many problems related to standards, security, architecture, ecosystem construction, channels and device connection protocols. Today in the world, large organizations such as NIST, IEEE, ISO / IEC, and others make enormous efforts in addressing the issues of standardization, security, and the architecture of developed devices.Analysis of recent scientific research in the field of solving information security issues and data privacy of IoT devices showed positive results, but these methods and approaches are based on traditional methods of network security. The development and application of security mechanisms for IoT devices is a complex and heterogeneous task. In this regard, ensuring information security and the protection of sensitive data, as well as the availability of IoT devices, is the main purpose of writing this article.Given the above, many questions arise related to the security status of IoT devices, namely:  What are the current standards and protocols for IoT?  What are the requirements for ensuring information security of IoT devices? What security mechanisms do IoT devices have?  What methods of testing IoT devices exist?Manufacturers and developers of IoT devices do not pay enough attention to security issues. With the development of cyber-attacks, attack vectors are becoming more sophisticated and aimed at several infrastructure elements at the same time. IoT infrastructure typically includes millions of connected objects and devices that store and share confidential information. Scenarios of theft and fraud, such as hacking and falsifying personal data, pose a serious threat to such IoT devices. Most IoT devices use the public Internet to exchange data, which makes them vulnerable to cyber-attacks. Modern approaches to information security often offer solutions to individual problems, when multi-level approaches offer increased resistance to cyber-attacks.

 Artículos similares

       
 
Yelei Dong, Yang Pan, Xianliang Zhang, Qiang He, Si Chen, Litao Du and Shuting Yin    
Revista: Applied Sciences

 
Achini Adikari, Su Nguyen, Rashmika Nawaratne, Daswin De Silva and Damminda Alahakoon    
The proliferation of online hotel review platforms has prompted decision-makers in the hospitality sector to acknowledge the significance of extracting valuable information from this vast source. While contemporary research has primarily focused on extra... ver más
Revista: Applied Sciences

 
Filippo Cucinotta, Emmanuele Barberi and Fabio Salmeri    
The naval sector holds paramount importance for the global economy, yet it entails significant environmental impacts throughout the entire life cycle of ships. This review explores the application of life-cycle assessment (LCA) in the naval sector, a met... ver más

 
Fahim Sufi    
GPT (Generative Pre-trained Transformer) represents advanced language models that have significantly reshaped the academic writing landscape. These sophisticated language models offer invaluable support throughout all phases of research work, facilitatin... ver más
Revista: Information

 
Dimitris Mpouziotas, Jeries Besharat, Ioannis G. Tsoulos and Chrysostomos Stylios    
AliAmvra is a project developed to explore and promote high-quality catches of the Amvrakikos Gulf (GP) to Artas? wider regions. In addition, this project aimed to implement an integrated plan of action to form a business identity with high added value a... ver más
Revista: Information