ARTÍCULO
TITULO

Review and analysis of standards and protocols in the field of Internet of Things. Modern testing methods and problems of information security IoT

N.A. Naraliyev    
D.I. Samal    

Resumen

IoT is a whole ecosystem that contains intelligent devices equipped with sensors (sensors) that provide remote control, storage, transmission and security of data. The Internet of Things (IoT) is an innovative solution in various areas such as healthcare, insurance, labor protection, logistics, ecology, etc. To unleash the full potential of using IoT devices, it is necessary to solve many problems related to standards, security, architecture, ecosystem construction, channels and device connection protocols. Today in the world, large organizations such as NIST, IEEE, ISO / IEC, and others make enormous efforts in addressing the issues of standardization, security, and the architecture of developed devices.Analysis of recent scientific research in the field of solving information security issues and data privacy of IoT devices showed positive results, but these methods and approaches are based on traditional methods of network security. The development and application of security mechanisms for IoT devices is a complex and heterogeneous task. In this regard, ensuring information security and the protection of sensitive data, as well as the availability of IoT devices, is the main purpose of writing this article.Given the above, many questions arise related to the security status of IoT devices, namely:  What are the current standards and protocols for IoT?  What are the requirements for ensuring information security of IoT devices? What security mechanisms do IoT devices have?  What methods of testing IoT devices exist?Manufacturers and developers of IoT devices do not pay enough attention to security issues. With the development of cyber-attacks, attack vectors are becoming more sophisticated and aimed at several infrastructure elements at the same time. IoT infrastructure typically includes millions of connected objects and devices that store and share confidential information. Scenarios of theft and fraud, such as hacking and falsifying personal data, pose a serious threat to such IoT devices. Most IoT devices use the public Internet to exchange data, which makes them vulnerable to cyber-attacks. Modern approaches to information security often offer solutions to individual problems, when multi-level approaches offer increased resistance to cyber-attacks.

 Artículos similares

       
 
Mahammad Khalid Shaik Vadla, Mahima Agumbe Suresh and Vimal K. Viswanathan    
Understanding customer emotions and preferences is paramount for success in the dynamic product design landscape. This paper presents a study to develop a prediction pipeline to detect the aspect and perform sentiment analysis on review data. The pre-tra... ver más
Revista: Algorithms

 
Gricelda Herrera-Franco, Lady Bravo-Montero, Jhon Caicedo-Potosí and Paúl Carrión-Mero    
The excessive use of energy from fossil fuels, which corresponds to population, industrialisation, and unsustainable economic growth, is the cause of carbon dioxide production and climate change. The Water?Energy?Food (WEF) nexus is an applicable concept... ver más
Revista: Water

 
Suveshnee Munien, Puspa L. Adhikari, Kimberly Reycraft, Traci J. Mays, Trishan Naidoo, MacKenzie Pruitt, Jacqueline Arena and Sershen    
This systematic review represents one of the first attempts to compare the efficacy of the full suite of management interventions developed to control (prevent or remove) microplastics (MPs) in freshwater bodies, both man-made and natural. The review als... ver más
Revista: Water

 
Marisa Magno, Ana Isabel Martins, Joana Pais, Anabela G. Silva and Nelson Pacheco Rocha    
The early detection of cognitive impairment is essential in order to initiate interventions and guarantee access to healthcare services. Digital solutions are emerging in the literature as an alternative approach to cognitive screening. Our primary goal ... ver más
Revista: Applied Sciences

 
Norbert Lichtenauer, Lukas Schmidbauer, Sebastian Wilhelm and Florian Wahl    
Background: Using personal data as Open Data is a pervasive topic globally, spanning various sectors and disciplines. Recent technological advancements, particularly in artificial intelligence and algorithm-driven analysis, have significantly expanded th... ver más
Revista: Information