SECURING INTERNET OF THINGS DATA
DOI:
https://doi.org/10.20535/2411-2976.22019.40-46Keywords:
Internet of things, data security.Abstract
Background. The Internet of Things as a concept and as a network is a multitude of objects, which can be either static or dynamic in nature. Those objects also must be identifiable and should be able to be integrated into communication networks related to both the physical world and the information world, Data provided by things is often personal. It can contain our environment, the status of our homes and cities, or our personal health and activities. That’s why mechanisms to provide and guarantee the security and privacy of data are crucial issues in IoT. However, protecting the Internet of Things is a complex
and difficult task. To handle the detection of intrusion in IoT is hard task too. This opens up exciting new business opportunities and a trail for economic growth.
Objective. The purpose of the paper is creating concept of data securing in the Internet of things networks.
Methods. Analysis of publications on data security of the Internet of Things. Integration of existing data protection solutions (at the node, network) level with software management systems.
Results. The possible way is combining the current passive protection such as encryption, and integrating them within more active and dynamic applications, such as AIS-based systems shown in the article or any other similar system.
Conclusions. The paper proposes the concept of data protection in the Internet of Things, which is based on the combination of several solutions into a single system and allows ensuring data protection at a guaranteed level.
References
S.Suganthi, D.Usha. A SURVEY OF INTRUSION DETECTION
SYSTEM IN IOT DEVICES Int. J. Adv. Res. 6(6), 23-3ISSN: 2320-
Falguni Jindal, Rishabh Jamar.FUTURE AND CHALLENGESOF
INTERNETOF THINGS // International Journal of Computer Science
& Information Technology (IJCSIT) Vol 10, No 2, April 2018
DOI:10.5121/ijcsit.2018.10202
D. H. Summerville, K. M. Zach, Y. Chen, Ultra-lightweight
deep packet anomaly detection for Internet of Things devices, in:
IEEE 34th International Performance Computing and
Communications Conference (IPCCC), IEEE, 2015, pp.1–8.
Choudhury, T., Gupta, A., Pradhan, S., Kumar, P., & Rathore, Y. S. (2017). Privacy and Security of Cloud-Based Internet of Things (IoT). 2017 3rd International Conference on Computational Intelligence and Networks (CINE). doi:10.1109/cine.2017.28
Liu, C., Zhang, Y., & Zhang, H. (2013). A Novel Approach to IoT
Security Based on Immunology. 2013 Ninth International Conference on Computational Intelligence and Security. doi:10.1109/cis.2013.168
Oracevic, A., Dilek, S., & Ozdemir, S. (2017). Security in internet of things: A survey. 2017 International Symposium on Networks, Computers and Communications (ISNCC).
doi:10.1109/isncc.2017.8072001
Oh, S.-R., & Kim, Y.-G. (2017). Development of IoT security
component for interoperability. 2017 13th International Computer
Engineering Conference (ICENCO).
doi:10.1109/icenco.2017.8289760
M. Tortonesi, J. Michaelis, N. Suri and M. Baker, "Software-defined and value-based information processing and dissemination in IoT applications," NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, 2016, pp. 789-793
S. K. Sharma and X. Wang, "Live Data Analytics With Collaborative Edge and Cloud Processing in Wireless IoT Networks," in IEEE Access, vol. 5, pp. 4621-4635, 2017.
Tasnuva Mahjabin1, Yang Xiao1, Guang Sun2 andWangdong
Jiang, A survey of distributed denial-of-service attack, prevention,
and mitigation techniques, International Journal of Distributed Sensor Networks, 2017, Vol. 13(12).
Roman, Rodrigo, Jianying Zhou, and Javier Lopez. "On the features and challenges of security and privacy in distributed internet of things." Computer Networks 57.10 (2013): 2266-2279.
Urien, P. (2018). Blockchain IoT (BIoT): A New Direction for
Solving Internet of Things Security and Trust Issues. 2018 3rd
Cloudification of the Internet of Things (CIoT).
doi:10.1109/ciot.2018.8627112
Lu, X., Li, Q., Qu, Z., & Hui, P. (2014). Privacy Information Security Classification Study in Internet of Things. 2014 International Conference on Identification, Information and Knowledge in the Internet of Things. doi:10.1109/iiki.2014.40
Narang, S., Nalwa, T., Choudhury, T., & Kashyap, N. (2018). An efficient method for security measurement in internet of things. 2018 International Conference on Communication, Computing and Internet of Things (IC3IoT). doi:10.1109/ic3iot.2018.8668159
S. Geetha, R. Hariharan and V. P. Venkatesan, "Secured Indexing and Tagging of IoT Based Device Nodes for Service Based Licensing and Secured Access," 2017 World Congress on Computing and Communication Technologies (WCCCT), Tiruchirappalli, 2017, pp. 6-10. doi: 10.1109/WCCCT.2016.12
S. J. Johnston, M. Scott and S. J. Cox, "Recommendations for
securing Internet of Things devices using commodity hardware," 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, 2016, pp. 307-310. doi: 10.1109/WF IoT.2016.7845410
M. Singh, A. Singh and S. Kim, "Blockchain: A game changer for securing IoT data," 2018 IEEE 4th World Forum on Internet of
Things (WF-IoT), Singapore, 2018, pp. 51-55. doi: 10.1109/WFIoT.2018.8355182
Globa L. Method for resource allocation of virtualized network
functions in hybrid environment / L. Globa, M. Skulysh, S. Sulima // 2016 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), 6–9 June 2016 : conference proceedings. — Varna, Bulgaria, 2016. — P. 1–5.
Mariia S., Svitlana S. Service deployment aspects in the systems with network function virtualization //Radio Electronics & Info Communications (UkrMiCo), 2016 International Conference. – IEEE, 2016. – С. 1-7.
Skulysh M. Management of Multiple Stage Queuing Systems / M. Skulysh, S. Sulima // CADSM 2015 : 13-th International conference, 24–27 February 2015 : conference proceedings. — Lviv–Polyana, 2015. — P. 431– 434.
Benazzouz, C. Munilla, O. Günalp, M. Gallissot and L. Gürgen,
"Sharing user IoT devices in the cloud," 2014 IEEE World Forum on
Internet of Things (WF-IoT), Seoul, 2014, pp. 373-374. doi:
1109/WF-IoT.2014.6803193
Globa, L., Kurdecha, V., Ishchenko, I., Zakharchuk, A., Kunieva, N."The Intellectual IoT-System for Monitoring the Base Station Quality of Service", 2018 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2018, 8433715
S. Suhail, C. S. Hong, Z. U. Ahmad, F. Zafar and A. Khan,
"Introducing Secure Provenance in IoT: Requirements and
Challenges," 2016 International Workshop on Secure Internet of
Things (SIoT), Heraklion, 2016, pp. 39-46. doi:10.1109/SIoT.2016.011
T. Shah and S. Venkatesan, "Authentication of IoT Device and IoT Server Using Secure Vaults," 2018 17th IEEE International
Conference On Trust, Security And Privacy In Computing And
Communications/ 12th IEEE International Conference On Big Data
Science And Engineering (TrustCom/BigDataSE), New York, NY,
, pp. 819-824. doi:10.1109/TrustCom/BigDataSE.2018.00117
M. Singh, A. Singh and S. Kim, "Blockchain: A game changer for securing IoT data," 2018 IEEE 4th World Forum on Internet of
Things (WF-IoT), Singapore, 2018, pp. 51-55. doi:10.1109/WFIoT.
8355182
Liu, C., Zhang, Y., Li, Z., Zhang, J., Qin, H., & Zeng, J.(2015).
Dynamic Defense Architecture for the Security of the Internet of
Things. 2015 11th International Conference on Computational
Intelligence and Security (CIS). doi:10.1109/cis.2015.100