SECURING INTERNET OF THINGS DATA

Authors

  • Larysa Globa Prof DSc. in Computer Engineering, IEEE Professional Member, Chair of Information-telecommunication Networks, Institute of Telecommunication Systems, “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv, Ukraine, https://orcid.org/0000-0003-3231-3012
  • Julia Yamnenko Faculty of Electronics Igor Sikorsky Kyiv Polytechnic Institute Kyiv, Ukraine,
  • Vasyl Kurdecha assistant Institute of Telecommunication Systems Igor Sikorsky Kyiv Polytechnic Institute Kyiv, Ukraine,
  • Danylo Trokhymenko Institute of Telecommunication Systems Igor Sikorsky Kyiv Polytechnic Institute Kyiv, Ukraine,

DOI:

https://doi.org/10.20535/2411-2976.22019.40-46

Keywords:

Internet of things, data security.

Abstract

Background. The Internet of Things as a concept and as a network is a multitude of objects, which can be either static or dynamic in nature. Those objects also must be identifiable and should be able to be integrated into communication networks related to both the physical world and the information world, Data provided by things is often personal. It can contain our environment, the status of our homes and cities, or our personal health and activities. That’s why mechanisms to provide and guarantee the security and privacy of data are crucial issues in IoT. However, protecting the Internet of Things is a complex
and difficult task. To handle the detection of intrusion in IoT is hard task too. This opens up exciting new business opportunities and a trail for economic growth.
Objective. The purpose of the paper is creating concept of data securing in the Internet of things networks.
Methods. Analysis of publications on data security of the Internet of Things. Integration of existing data protection solutions (at the node, network) level with software management systems.
Results. The possible way is combining the current passive protection such as encryption, and integrating them within more active and dynamic applications, such as AIS-based systems shown in the article or any other similar system.
Conclusions. The paper proposes the concept of data protection in the Internet of Things, which is based on the combination of several solutions into a single system and allows ensuring data protection at a guaranteed level.

References

S.Suganthi, D.Usha. A SURVEY OF INTRUSION DETECTION

SYSTEM IN IOT DEVICES Int. J. Adv. Res. 6(6), 23-3ISSN: 2320-

Falguni Jindal, Rishabh Jamar.FUTURE AND CHALLENGESOF

INTERNETOF THINGS // International Journal of Computer Science

& Information Technology (IJCSIT) Vol 10, No 2, April 2018

DOI:10.5121/ijcsit.2018.10202

D. H. Summerville, K. M. Zach, Y. Chen, Ultra-lightweight

deep packet anomaly detection for Internet of Things devices, in:

IEEE 34th International Performance Computing and

Communications Conference (IPCCC), IEEE, 2015, pp.1–8.

Choudhury, T., Gupta, A., Pradhan, S., Kumar, P., & Rathore, Y. S. (2017). Privacy and Security of Cloud-Based Internet of Things (IoT). 2017 3rd International Conference on Computational Intelligence and Networks (CINE). doi:10.1109/cine.2017.28

Liu, C., Zhang, Y., & Zhang, H. (2013). A Novel Approach to IoT

Security Based on Immunology. 2013 Ninth International Conference on Computational Intelligence and Security. doi:10.1109/cis.2013.168

Oracevic, A., Dilek, S., & Ozdemir, S. (2017). Security in internet of things: A survey. 2017 International Symposium on Networks, Computers and Communications (ISNCC).

doi:10.1109/isncc.2017.8072001

Oh, S.-R., & Kim, Y.-G. (2017). Development of IoT security

component for interoperability. 2017 13th International Computer

Engineering Conference (ICENCO).

doi:10.1109/icenco.2017.8289760

M. Tortonesi, J. Michaelis, N. Suri and M. Baker, "Software-defined and value-based information processing and dissemination in IoT applications," NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, 2016, pp. 789-793

S. K. Sharma and X. Wang, "Live Data Analytics With Collaborative Edge and Cloud Processing in Wireless IoT Networks," in IEEE Access, vol. 5, pp. 4621-4635, 2017.

Tasnuva Mahjabin1, Yang Xiao1, Guang Sun2 andWangdong

Jiang, A survey of distributed denial-of-service attack, prevention,

and mitigation techniques, International Journal of Distributed Sensor Networks, 2017, Vol. 13(12).

Roman, Rodrigo, Jianying Zhou, and Javier Lopez. "On the features and challenges of security and privacy in distributed internet of things." Computer Networks 57.10 (2013): 2266-2279.

Urien, P. (2018). Blockchain IoT (BIoT): A New Direction for

Solving Internet of Things Security and Trust Issues. 2018 3rd

Cloudification of the Internet of Things (CIoT).

doi:10.1109/ciot.2018.8627112

Lu, X., Li, Q., Qu, Z., & Hui, P. (2014). Privacy Information Security Classification Study in Internet of Things. 2014 International Conference on Identification, Information and Knowledge in the Internet of Things. doi:10.1109/iiki.2014.40

Narang, S., Nalwa, T., Choudhury, T., & Kashyap, N. (2018). An efficient method for security measurement in internet of things. 2018 International Conference on Communication, Computing and Internet of Things (IC3IoT). doi:10.1109/ic3iot.2018.8668159

S. Geetha, R. Hariharan and V. P. Venkatesan, "Secured Indexing and Tagging of IoT Based Device Nodes for Service Based Licensing and Secured Access," 2017 World Congress on Computing and Communication Technologies (WCCCT), Tiruchirappalli, 2017, pp. 6-10. doi: 10.1109/WCCCT.2016.12

S. J. Johnston, M. Scott and S. J. Cox, "Recommendations for

securing Internet of Things devices using commodity hardware," 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, 2016, pp. 307-310. doi: 10.1109/WF IoT.2016.7845410

M. Singh, A. Singh and S. Kim, "Blockchain: A game changer for securing IoT data," 2018 IEEE 4th World Forum on Internet of

Things (WF-IoT), Singapore, 2018, pp. 51-55. doi: 10.1109/WFIoT.2018.8355182

Globa L. Method for resource allocation of virtualized network

functions in hybrid environment / L. Globa, M. Skulysh, S. Sulima // 2016 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), 6–9 June 2016 : conference proceedings. — Varna, Bulgaria, 2016. — P. 1–5.

Mariia S., Svitlana S. Service deployment aspects in the systems with network function virtualization //Radio Electronics & Info Communications (UkrMiCo), 2016 International Conference. – IEEE, 2016. – С. 1-7.

Skulysh M. Management of Multiple Stage Queuing Systems / M. Skulysh, S. Sulima // CADSM 2015 : 13-th International conference, 24–27 February 2015 : conference proceedings. — Lviv–Polyana, 2015. — P. 431– 434.

Benazzouz, C. Munilla, O. Günalp, M. Gallissot and L. Gürgen,

"Sharing user IoT devices in the cloud," 2014 IEEE World Forum on

Internet of Things (WF-IoT), Seoul, 2014, pp. 373-374. doi:

1109/WF-IoT.2014.6803193

Globa, L., Kurdecha, V., Ishchenko, I., Zakharchuk, A., Kunieva, N."The Intellectual IoT-System for Monitoring the Base Station Quality of Service", 2018 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2018, 8433715

S. Suhail, C. S. Hong, Z. U. Ahmad, F. Zafar and A. Khan,

"Introducing Secure Provenance in IoT: Requirements and

Challenges," 2016 International Workshop on Secure Internet of

Things (SIoT), Heraklion, 2016, pp. 39-46. doi:10.1109/SIoT.2016.011

T. Shah and S. Venkatesan, "Authentication of IoT Device and IoT Server Using Secure Vaults," 2018 17th IEEE International

Conference On Trust, Security And Privacy In Computing And

Communications/ 12th IEEE International Conference On Big Data

Science And Engineering (TrustCom/BigDataSE), New York, NY,

, pp. 819-824. doi:10.1109/TrustCom/BigDataSE.2018.00117

M. Singh, A. Singh and S. Kim, "Blockchain: A game changer for securing IoT data," 2018 IEEE 4th World Forum on Internet of

Things (WF-IoT), Singapore, 2018, pp. 51-55. doi:10.1109/WFIoT.

8355182

Liu, C., Zhang, Y., Li, Z., Zhang, J., Qin, H., & Zeng, J.(2015).

Dynamic Defense Architecture for the Security of the Internet of

Things. 2015 11th International Conference on Computational

Intelligence and Security (CIS). doi:10.1109/cis.2015.100

Downloads

Issue

Section

Статті