Problems and Approaches to Increase the Cybersecurity Level in the Data Transmission Channels of the Internet of Things Systems and Devices
DOI:
https://doi.org/10.31649/1997-9266-2024-175-4-104-114Keywords:
cyber defense, cyber threats, mathematical model, probability of cyber threats, internet, Internet of things (IoT), communication channels, processor tracts, software, malwareAbstract
The article deals with modern technologies and devices of the Internet of Things, features of providing their cybersecurity, current risks and the latest and effective approaches to high-level cyber defense in the architecture of the Internet of things.
The problems of cyber threats in modern internet devices are diverse and generate a significant problem on the path of further promotion of IoT technologies. These are various and complex information risks of cybersecurity for processing and transmission processes in the IoT structures and devices that use different technologies of intervention in the main functionality. As the IoT devices and systems use the Internet and interfaces of the Internet, as well as wireless radio interfaces in combination with mobile operating systems based on high -yielding ARM processors, the risks of IoT cybersecurity are growing significantly and put in question the long -term stable functioning of IoT systems. Sometimes these risks of cybersecurity create a significant problem for information data in IoT systems, and significantly slow down their promotion in a number of industries. Therefore, this problem must be resolved. The work has evaluated and analyzed the problems of cybersecurity in the IoT, the existing approaches are considered and new effective practical provisions and approaches to ensure high cyber defense systems and Internet devices are suggested .
The aspects have been considered and the analysis of the problems of cybersecurity of the Internet of things using approaches and methods of the improved protection of data transmission in systems and channels of the Internet of things that are connected to modern Internet information network is carried out.
Approaches to more protected data transmission in IoTs, based on a comprehensive combination of known technologies with a combination of their aggregate use and symbiosis with other technologies, are proposed. This enables to enhance cybersecurity and reduce the risks of cyber threats in IoT systems that occur and also takes place in other modern information systems that are often connected and guided via the Internet. These approaches and principles allow to increase the reliability and overall protection of data transmission to IoT, evaluate the main factors of the impact of information threats and to reduce the consequences of their implementation. The prospects for the development of these approaches and methods in complex IoT data exchange systems are considered. The advantages of the method and approaches of cyber defense while the transmission of data to IoT and protected cryptographic processing and transmission of information in the devices and information systems of the Internet of things are described.
References
Vadym Malinovskyi, Leonid Kupershtein, and Vitaliy Lukichov, “Cybersecurity and Data Stability Analysis of IoT Devices,” Materials of 2022 IEEE 9th International Conference on Problems of Infocommunications. Science and Technology (PIC S&T`2022). IEEE Ukraine Section. Kharkiv National University of Radio Electronics.
Vadym Malinovskyi, Leonid Kupershtein, and Vitaliy Lukichov, “Risks Assessment and Approaches to Creative of the Reliable Software Modules for IoT Devices,” Materials of International Conference on Innovative Solutions in Software Engineering. November 29-30, 2022. Ivano-Frankivsk, Ukraine.
Yuan Xiao, Yinqian Zhang, and Radu Teodorescu, Speechminer: a Framework for investigating and measuring speculative execution vulnerabilities. [Electronic resource]. Available: https://arxiv.org/pdf/1912.00329.pdf . Accesed: 18.01.2024.
В. І. Маліновський, «Мінімізація факторів кіберзагроз і спеціалізовані підходи до інформаційного захисту мікропроцесорних систем індустріального Internetу речей,» Матеріали LI-ї науково-технічної конференції факультету інформаційних технологій та комп’ютерної інженерії. Факультет інформаційних технологій та комп’ютерної інженерії (ФІТКІ). 2022. 31.05.2022. ВНТУ: [Електронний ресурс]. Режим доступу: https://conferences.vntu.edu.ua/index.php/all-fitki/all-fitki-2022/paper/view/15000 . Дата звернення 19.01.2024.
В. І. Маліновський, «Сучасні кіберзагрози і захист даних в системах і пристроях Internetу речей,» Інформаційне суспільство: технологічні, економічні та технічні аспекти становлення, матеріали міжнародної наукової Internet-конференції, вип. 6, 4-5 липня 2022. [Електронний ресурс]. Режим доступу:
http://www.konferenciaonline.org.ua/ua/article/id-595/ . Дата звернення 19.01.2024.
Alper Kerman, Oliver Borchert, Scott Rose, and Eileen Division Allen Tan, “Implementing a Zero Trust Architecture: [Nist project Description],” The National Cybersecurity Center of Excellence (NCCoE) Project Descriptions, 2020, 17 p. [Electronic resource]. Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.ZTA.pdf . Accessed: 19.01.2024.
S. Rose, et al., “Zero Trust Architecture,” National Institute of Standards and Technology (NIST) Special Publication 800-207, Gaithersburg, Md., August 2020. [Electronic resource]. Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf . Accesed:19.01.202.
T. Dönmez, and C. Nigussie, “Security of LoRaWAN” v1. 1 in Backward Compatibility Scenarios. Procedia Computer science, 2018, no. 134, pр. 51-58. [Electronic resource]. Available: https://www.sciencedirect.com/science/article/pii/S1877050918311062 . Accessed: 19.01.2024.
Л. М. Куперштейн, і С. П. Бондарчук, «Загрози та вразливості бездротових мереж,» [Електронний ресурс]. Режим доступу: http://dspace.kntu.kr.ua/jspui/bitstream/123456789/5022/1/AUConferenceCyberSecurity_November2016_p146.pdf . Дата звернення 19.01.2024.
Joshua Franklin, et al., “Mobile Device Security Cloud and Hybrid Builds,” NIST SPECIAL PUBLICATION 1800-4A / The MITRE Corporation McLean, VA, February 2019. [Electronic resource]. Available:
https://www.nccoe.nist.gov/projects/building-blocks/mobile-device-security/cloud-hybrid .
E. Perelman, G. Hamerly, M. Van Biesbrouck, T. Sherwood, and B. Calder, “Using Simpoint for accurate and efficient simulation in ACM sigmetrics performance evaluation review,” IEEE Access, vol. 31, no. 1, pp. 318-319, 2003.
Miloud Bagaa, Tarik Taleb, Jorge Bernal Bernabe, and Antonio Skarmeta, “А machine learning security framework for lot systems,” IEEE Access, may 21, 2020. IEEE Press. Digital Object Identifier 10.1109/ACCESS, 2996214, 2020.
J. Pacheco and S. Hariri, “IoT security framework for smart cyber infrastructures,” in Proc. IEEE 1st Int. Workshops Found. Appl. Self Syst. (FAS*W), Sep. 2016, pp. 242247.
A. Souri, A. Hussien, M. Hoseyninezhad, and M. Norouzi, “A systematic review of IoT communication strategies for an efcient smart environment,” Trans. Emerg. Telecommun.Technol. Aug. 2019, Art. № e3736. [Electronic resource]. Available: https://onlinelibrary.wiley.com/action/showCitFormats?doi=10.1002%2Fett.3736 .
Amjad Mehmood, Gregory Epiphaniou, Carsten Maple, Nikolaos Ersotelos, and Richard Wiseman, “A hybrid methodology to assess cyber resilience of IoT in energy management and connected sites,” Sensors, no 23, 8720, pp. 2-46, 2023. [Electronic resource]. Available: https://www.mdpi.com/journal/sensors. MDPI Sensors https://doi.org/10.3390/s23218720 .
T. Taleb. “Toward carrier cloud: Potential, challenges, and solutions,” IEEE Wireless Commun, vol. 21, no. 3, pp. 80-91, Jun. 2014.
S. Lal, T. Taleb, and A. Dutta, “NFV: Security threats and best practices,” IEEE Commun. Mag., vol. 55, no. 8, pp. 211-217, Aug. 2017.
V. Varadharajan, and U. Tupakula, “Security as a service model for cloud environment,” IEEE Trans. Netw. Service Manage, vol. 11, no. 1, pp. 60-75, Mar. 2014.
Y. Khettab, M. Bagaa, D. L. C. Dutra, T. Taleb, and N. Toumi, “Virtual security as a service for 5G verticals,” IEEE Wireless Commun. Netw. Conf. (WCNC), Apr. 2018, pp. 1-6.
X. Wang, C. Wang, X. Li, V. C. M. Leung, and T. Taleb, “Federated deep reinforcement learning for Internet of Things with decentralized cooper-ative edge caching,” IEEE Internet Things J., early access., Apr. 9, 2020, https://doi.org/10.1109/JIOT.2020.2986803 .
Zero-Touch Network and Service Management (ZSM), Reference Architecture. Standard ETSI GS ZSM 002, V1.1.1. Aug. 2019.
K. S. Sahoo, B. Sahoo, and A. Panda, “Asecured SDN Framework for IoT,” in Proc. Int. Conf. Man Mach. Interfacing (MAMI), Dec. 2015, pp. 1-4.
C. Gonzalez, S. M. Charfadine, O. Flauzac, and F. Nolot, “SDN-based security Framework for the IoT in distributed grid,” in Proc. Int. Multidis-ciplinary Conf. Comput. Energy Sci. (SpliTech), Jul. 2016, pp. 15.
T. Nowatzki, J. Menon, C. Ho, and K. Sankaralingam, “Architectural simulators considered harmful,” in IEEE Micro, vol. 35, no. 6, pp. 4-12, 2015.
Downloads
-
pdf (Українська)
Downloads: 17
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).