ASSESSMENT OF RISK OF SAFETY IN NETWORKS OF THE INTERNET OF THINGS

Author(s):  
Андрей Александрович Болгов ◽  
Сергей Александрович Ермаков ◽  
Лариса Владимировна Паринова ◽  
Николай Ильич Баранников ◽  
Владимир Павлович Лось ◽  
...  

В статье предлагаются результаты анализа возможности применения традиционных подходов к анализу рисков в сетях Интернета вещей с учетом особенностей архитектуры построения и динамики их развития. До настоящего времени было предложено множество методов для решения таких проблем с использованием вероятностных моделей. Но несмотря на то, что они позволяют решить большинство задач, они все же могут вызывать некоторые проблемы при оценке рисков и анализе полученных результатов. Наиболее распространенные проблемы связаны со сложностью ранжирования и объективностью оценки вероятности нанесения ущерба и величины этого ущерба. По итогу к заключению статьи приводятся аргументы в пользу альтернативных методологий анализа рисков, адекватно учитывающих динамические характеристики технологии при сохранении преимуществ существующих подходов к оценке. In this article results of the analysis of possibility of application of traditional approaches to risk analysis in networks of the Internet of things taking into account features of architecture of creation and dynamics of their development are offered. So far, many methods have been proposed to solve such problems using probabilistic models. However, although they can solve most problems, they can still cause some problems when assessing risks and analyzing the results. The most common problems are related to the complexity of ranking and the objectivity of assessing the probability of damage and the magnitude of this damage. As a result, the article concludes with arguments in favor of the alternative methodologies of risk analysis which are adequately considering response characteristics of technology when saving advantages of the existing approaches to assessment are adduced.

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Ran Li ◽  
Dalong Wang ◽  
Wenshu Wei ◽  
Shoubin Li

Studying the movement characteristics of the coalmine emulsion pump valve is of great significance for optimizing the dynamic response characteristics of the pump valve, reducing the hysteresis effect, and improving the volumetric efficiency. This article combines the Internet of Things (IoT) and cellular automata techniques to investigate the movement characteristics of the valve of the emulsion pump. Based on Adolf’s exact differential equation and Runge–Kutta iterative method, the movement displacement and movement of the pump valve spool speed curve are computed using Scilab software. We employ cellular automata and AMESim to establish the hydraulic system model of emulsion pump and analyze the movement characteristics of pump valve movement displacement, speed, stability, and closing hysteresis through simulation. Finally, the IoT techniques and a test device are used to evaluate the movement displacement of the pump valve. The experimental results verify the feasibility of using the proposed method to study the pump valve motion characteristics, greatly reduce the cost of testing and parameterized design, and contribute to the development of highly reliable and efficient emulsion pump valves.


Author(s):  
Manoj Kumar Srivastav

The internet of things (IoT) refers to a network comprised of physical objects capable of gathering and sharing electronic information. Internet of things will be connected with physical objects that are accessible through the internet. In general, IoT is a collection of all things in the world and that should be connected over internet. But in any technology, there exist some risk factor which will diminish the performance of an organization. In IoT, security of information is always a challenging task. Security is an essential pillar of the internet, ‘the' most significant challenge for the IoT. When the number of connected devices increases, the opportunity of risk factor in positive and negative side will work to implement the IoT. Risk analysis is the review of the risks associated with a particular event or action. In this chapter, challenges of security and analysis of risk have discussed to reduce the problems.


2015 ◽  
Vol 100 ◽  
pp. 1215-1223 ◽  
Author(s):  
Sergey Efremov ◽  
Nikolay Pilipenko ◽  
Leonid Voskov

Author(s):  
Ismail Butun ◽  
Nuno Pereira ◽  
Mikael Gidlund

LoRa and its upper layers definition LoRaWAN is one of the most promising LPWAN technologies for implementing the Internet of Things (IoT). Although being a popular technology, several works in the literature have revealed various weaknesses regarding the security of LoRaWAN v1.0 (the official 1st draft). By using all these recommendations from the academia and industry, the LoRa-Alliance has worked on the v1.0 to develop an enhanced version and provide more secure and trustable architecture. The result of these efforts ended-up with LoRaWAN v1.1, which was released on Oct 11, 2017. This manuscript aims at demystifying the security aspects and provide a comprehensive Security Risk Analysis related to latest version of LoRaWAN. Besides, it provides several remedies to the recognized vulnerabilities. To the best of authors’ knowledge, this work is one of its first kind by providing a detailed security analysis related to latest version of LoRaWAN. According to our analysis, end-device physical capture, rogue gateway and replay attacks are found to be threating for safety operation of the network. Eventually, v1.1 of LoRaWAN is found to be less vulnerable to attacks compared to v1.0, yet possesses several security implications that need to be addressed and fixed for the upcoming releases.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


2019 ◽  
pp. 4-44 ◽  
Author(s):  
Peter Thorns

This paper discusses the organisations involved in the development of application standards, European regulations and best practice guides, their scope of work and internal structures. It considers their respective visions for the requirements for future standardisation work and considers in more detail those areas where these overlap, namely human centric or integrative lighting, connectivity and the Internet of Things, inclusivity and sustainability.


2019 ◽  
Vol 14 (5) ◽  
pp. 375
Author(s):  
Vladimir P. Zhalnin ◽  
Anna S. Zakharova ◽  
Demid A. Uzenkov ◽  
Andrey I. Vlasov ◽  
Alexey I. Krivoshein ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document