Investigation of IoT Security Technologies
Students Name: Tokarenko Oleh Arturovych
Qualification Level: magister
Speciality: System Administration of Telecommunications Networks
Institute: Institute of Telecommunications, Radioelectronics and Electronic Engineering
Mode of Study: full
Academic Year: 2020-2021 н.р.
Language of Defence: ukrainian
Abstract: The results of IoT failures can be severe, therefore, the study and research in security issues in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy, confidentiality, ensure the security of the users, infrastructures, data, and devices of the IoT, and guarantee the availability of the services offered by an IoT ecosystem. Thus, research in IoT security has recently been gaining much momentum with the help of the available simulation tools, modellers, computational and analysis platforms. Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT is facing. In this work, we are exploring the background of IoT systems and security measures, and identifying different security and privacy issues, approaches used to secure the components of IoT-based environments and systems, existing security solutions, and the best privacy models necessary and suitable for different layers of IoT driven applications. In recent years, academic research to address the privacy and security issues for IoT systems has attained positive developments. Currently, the techniques and security methods proposed essentially based on conventional network security methods. However, applying security mechanisms in an IoT system is more challenging than with a traditional network, due to the heterogeneity of devices and protocols as well as the scale or number of nodes in the system. The challenges in applying IoT security mitigation, which are due to physical coupling, heterogeneity, resource constraints, privacy, the large scale, trust management and unpreparedness for security are extensively explained in [1]. The survey papers [2–6] evaluate the possible threats to IoT systems according to the layers and the available countermeasures. Kouicem et al. [7] stated that in recent years, there has been a lot of research to address issues such as key management, confidentiality, integrity, privacy, and policy enforcement for IoT systems, hence suggested traditional cryptography methods and new tech- nologies such as Software Defined Network (SDN) and Blockchain implemented to solve current IoT security issues. Every day new technologies emerge, or changes made to existing ones. Consider the latest advances in the 5G network, for example. 5G expected to play an essential role in the IoT systems and applications. It is getting the researchers’ attention and curiosity about the possible security and privacy risks, with its high frequency and bandwidth. Yet, the short wavelength imposes a change in the infrastructure, hence the need for more base stations to cover the same area covered by other wireless technology. This new structure imposes more threats, such as fake base stations. It is essential to understand the security risks and potential solutions. IoT devices and applications are playing an essential role in our modern life. We can see IoT devices almost everywhere from our homes, offices, shopping centers, schools, airports, and many other places to provide us with secure and on-demand services. The IoT devices support the collaboration with the stakeholders and help in understanding the business requirements and outcomes. Additionally, IoT-based analytics and data processing can enhance the productivity and efficiency of industrial infrastructures Moreover, IoT systems are implementing different types of useful technological advances in various sectors. Many vendors and companies adopt a vast amount of policies to protect their connected devices from malicious attacks. With more of these devices connected to private networks and the Internet as well, more privacy and security concerns reported. We read and hear that our coffee machine is spying on our talks; our smart doorbell is sending our guest photos to government agencies. Many real-life examples emphasize the severity of the security vulnerabilities associated with using IoT devices. This work presents an analysis of recent research in IoT security, its trends and open issues. The main contribution of this work is to provide an overview of the current state of IoT security research, the relevant tools, IoT modellers, simulators, statistical analysis of IoT security model and comparison of anomaly recognition methods for cyberattacks detection. Study object – IoT Security Model Scope of research – 102 pages Goal of research: IoT security state, software tools, technoligies overview and statistical analysis of IoT security model As a result, general basis formed for recognizing anomalies of detecting cyberattacks and malicious behavior on IoT devices with limited computing and communication resources. Key words: IoT security, challenges, statistical analysis, confinentiality, privacy, authentication, security model, cyberattacks References. 1. Sha K., W. Wei, T. Andrew Yang, Z. Wang, W. Shi, On security challenges and open issues in the Internet of Things, Futur. Generate. Comput. Syst. 83 (2018) 326–337. 2. Yuchen Yang H.Z., Longfei Wu, Guisheng Yin, Lijie Li, A survey on security and privacy issues in internet-of-things, in: 2015 10th Int. Conf. Internet Technol. Secur. Trans., 4, 2015, pp. 202–207. 3. Lin J., W. Yu, N. Zhang, X. Yang, H. Zhang, W. Zhao, A survey on internet of things: architecture, enabling technologies, security and privacy, and applica- tions, IEEE Internet Things J. 4 (5) (2017) 1125–1142. 4. Tewari A., B.B. Gupta, Security, privacy and trust of different layers in the Internet-of-Things (IoTs) framework, Futur. Generate. Comput. Syst. (2018) 1–13, doi: 10.1016 / j.future.2018.04.027. 5. Riahi Sfar A., E. Natalizio, Y. Challal, Z. Chtourou, A roadmap for security challenges in the Internet of Things, Digit. Commun. Networks 4 (2) (2018) 118–137. 6. Alaba F.A., M. Othman, I.A.T. Hashem, F. Alotaibi, Internet of Things security: A survey, J. Netw. Comput. Appl. 88 (2017) 10–28 December 2016. 7. Kouicem D.E., A. Bouabdallah, H. Lakhlef, Internet of things security: A top – down survey, Comput. Networks 141 (2018) 199–221.