scholarly journals MODERN METHODS OF TESTING AND INFORMATION SECURITY PROBLEMS IN IoT

This article analyzes the technology of the internet of things, ie its architecture, communication standards, threats to security and safety, methods and types of testing devices of the internet of things. In short, the architectures proposed by ITU-T and IWF, IEEE standards for Internet of Things, LPWAN standards, four levels of security (devices/gateways, network/transport, services and applications), components according to test methods, performance, loading, security, etc.

2019 ◽  
Vol 265 ◽  
pp. 07014
Author(s):  
Alexander Shiler ◽  
Elizaveta Stepanova

At present, the Internet market of things is constantly expanding; it has covered almost all the most important areas: transport, housing and communal services, industry, agriculture, telecommunications and information technology. In connection with the constant increase in the number of attacks on IoT-devices, the issue of standardization of this technology is quite acute. The features of the of existing solutions and the new proposed Russian NB-Fi standard for IoT are presented in this article from the point of view of information security.


2020 ◽  
Vol 11 (5) ◽  
pp. 259-269
Author(s):  
V. A. Galatenko ◽  
◽  
K. A. Kostyukhin ◽  

Internet of things technology is developing at an exceptionally fast pace. This applies to both industrial and consumer Internet. The "things" account for billions, and many areas of application have been formed. At the same time, the state of information security of the Internet of things is not satisfactory, and protective measures are clearly inferior to Commerce. This is especially dangerous because the Internet of things spans two worlds: digital and physical, and security breaches can cause both informational and physical damage. The Internet of things is developing rapidly, so it is natural that it experiences typical growth diseases-fragmentation and uneven development. The base for ensuring security is mostly formed (but continues to be formed), the question is how quickly there will be a harmonization of approaches, and advanced ideas will be accepted by device manufacturers. Many state and non-state agencies actively promote security tools, inform and train manufacturers and consumers. The article is an overview of the main provisions of information security of the Internet of things. An attempt is made to consider software and technical and legislative levels of Internet of things security. This makes it different from other publications of a similar nature. Only a holistic, integrated approach can improve real information security. Authors outline basic concepts and describe a reference model of Internet of things, draw attention to the peculiarities of the Internet of things that are important from the security point of view, enumerate typical threats for Internet of things. The legislative level of information security, security recommendations for the Internet of things, manufacturers description of usage, and installation of software corrections are considered in detail.


Author(s):  
Matt Zwolenski ◽  
Lee Weatherill

The Digital Universe, which consists of all the data created by PC, Sensor Networks, GPS/WiFi Location, Web Metadata, Web-Sourced Biographical Data, Mobile, Smart-Connected Devices and Next-Generation Applications (to name but a few) is altering the way we consume and measure IT and disrupting proven business models. Unprecedented and exponential data growth is presenting businesses with new and unique opportunities and challenges. As the ‘Internet of Things’ (IoT) and Third Platform continue to grow, the analysis of structured and unstructured data will drive insights that change the way businesses operate, create distinctive value, and deliver services and applications to the consumer and to each other. As enterprises and IT grapple to take advantage of these trends in order to gain share and drive revenue, they must be mindful of the Information Security and Data Protection pitfalls that lay in wait ─ hurdles that have already tripped up market leaders and minnows alike.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Xianzhi Tang ◽  
Chunyan Ding

The progress of the social economy and the rapid development of the power field have created more favorable conditions for the construction of my country’s power grid. In this network age, how to further realize the connection between the power system and the Internet of Things is the key content of many scholars’ research. In the Internet of Things environment, there have been many excellent results in the collection, storage, and management of electric power big data, but the problem of information security has not been completely solved. Based on big data analysis and Internet of Things technology, this paper studies the architecture design of power information security terminals. In view of the diverse types of power grid mobile information and the large amount of data, this paper designs a power transportation mobile information security management system structure, which improves the effective management of power data by the system through big data, smart sensors, and wireless communication technology. According to the experiment, the power information security terminal constructed in this paper can effectively reduce communication resources and save communication costs in the process of aggregating multidimensional data. In the user satisfaction survey, residents’ satisfaction with the convenience and safety of the intelligent power system is also as high as 9.312 and 9.233. On the whole, the application of big data and Internet of Things technology to the construction of power information security terminals can indeed improve the service efficiency of power companies under the premise of ensuring safety and allow users to have a better experience.


2021 ◽  
Vol 16 (92) ◽  
pp. 72-81
Author(s):  
Emil A. Gumerov ◽  
◽  
Tamara V. Alekseeva ◽  

Cyber-physical systems are a means of effectively managing industrial applications of the Internet of things. Physical layer cyber-physical system implements the control devices of the industrial Internet of things and intelligent algorithms digital system level provide management and information security applications. Effective management and information security determine the success of the industrial Internet of things, so the research topic is relevant. The purpose of this article is to develop an optimal architecture of a cyber-physical system based on the principles of data processing at the place of their occurrence and the application of a control action at the place of the problem occurrence. The authors were faced with the task of exploring all the possibilities associated with the application of the proposed principles and developing an optimal application architecture for the industrial Internet of things. In the study proposed the concept of intelligent application of industrial Internet of things, which enables processing of continuously generated data in their source and provides application control action to the location of the problem. The proposed solution: a) increases the information security of the industrial application of the Internet of things (data is not transmitted over the network) and b) prevents an attack on the software of the Industrial application of the Internet of things. The solution can be used by developers of industrial IoT systems to effectively launch and implement projects


Sign in / Sign up

Export Citation Format

Share Document