Analysis and protection of IoT systems: Edge computing and decentralized decision-making

Main Article Content

Nadiia M. Lobanchykova
https://orcid.org/0000-0003-4010-0308
Ihor A. Pilkevych
https://orcid.org/0000-0001-5064-3272
Oleksandr Korchenko
https://orcid.org/0000-0003-3376-0631

Abstract

This article presents a detailed analysis of the Internet of Things (IoT) systems and the methods used to protect them. The article highlights the potential of edge computing to minimize traffic transmission and the decentralization of decision-making systems to enhance security. The analysis examines attacks on IoT system components and provides protection recommendations. Furthermore, the article explores the prospects of information protection in IoT systems.

Downloads

Download data is not yet available.

Article Details

How to Cite
Lobanchykova, N.M., Pilkevych, I.A. and Korchenko, O., 2022. Analysis and protection of IoT systems: Edge computing and decentralized decision-making. Journal of Edge Computing [Online], 1(1), pp.55–67. Available from: https://doi.org/10.55056/jec.573 [Accessed 24 May 2024].
Section
Articles

How to Cite

Lobanchykova, N.M., Pilkevych, I.A. and Korchenko, O., 2022. Analysis and protection of IoT systems: Edge computing and decentralized decision-making. Journal of Edge Computing [Online], 1(1), pp.55–67. Available from: https://doi.org/10.55056/jec.573 [Accessed 24 May 2024].
Received 2022-08-17
Accepted 2022-11-20
Published 2022-11-21

References

Blyler, J., 2020. 8 Critical IoT Security Technologies. Available from: https://www.electronicdesign.com/industrial-automation/article/21805420/8-critical-iot-security-technologies.

Cisco Systems, 2014. The Internet of Things Reference Model. Available from: http://cdn.iotwf.com/resources/71/IoT_Reference_Model_White_Paper_June_4_2014.pdf.

dos Santos, M.G., Ameyed, D., Petrillo, F., Jaafar, F. and Cheriet, M., 2020. Internet of Things Architectures: A Comparative Study. Available from: https://arxiv.org/pdf/2004.12936.pdf.

Frahim, J., Pignataro, C., Apcar, J. and Morrow, M., 2015. Securing the Internet of Things: A Proposed Framework. Available from: http://web.archive.org/web/20210323170935/https://tools.cisco.com/security/center/resources/secure_iot_proposed_framework.

Gnatyuk, S.L., 2019. Cybersecurity in the context of the fourth industrial revolution (INDUSTRY 4.0): challenges and opportunities for Ukraine. Available from: https://niss.gov.ua/doslidzhennya/informaciyni-strategii/kiberbezpeka-v-umovakh-rozgortannya-chetvertoi-promislovoi.

Herts, A., Tsidylo, I., Herts, N., Barna, L. and Mazur, S.I., 2020. PhotosynQ - Cloud platform powered by IoT devices. E3S Web of Conferences, 166. Available from: https://doi.org/10.1051/e3sconf/202016605001. DOI: https://doi.org/10.1051/e3sconf/202016605001

Hewlett Packard, 2020. HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. Available from: https://www8.hp.com/us/en/hp-news/press-release.html?id=1744676.

Immerman, G., 2020. The Importance Of Edge Computing For The IOT. Available from: https://www.machinemetrics.com/blog/edge-computing-iot.

Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), pp.2481–2501. Available from: https://doi.org/10.1007/s11276-014-0761-7. DOI: https://doi.org/10.1007/s11276-014-0761-7

Khomich, S.V., Fedosiuk, A.V. and Kulikovsky, M.I., 2015. Research of System of IoT Devices Information Security. Digital technologies, 18, pp.166–171.

Korchenko, O., Alexander, M., Odarchenko, R., Nadzhi, A. and Petrenko, O., 2016. Analysis of threats and mechanisms for information security in sensor networks. Information protection, 1, pp.48–56.

Kuznetsov, D.I. and Ryabchina, L.S., 2019. Information security of the Internet of Things systems. Bulletin of Kryvyi Rih National University, 49, pp.80–83. DOI: https://doi.org/10.31721/2306-5451-2019-1-49-80-84

Shokaliuk, S.V., Bohunenko, Y.Y., Lovianova, I.V. and Shyshkina, M.P., 2020. Technologies of distance learning for programming basics on the principles of integrated development of key competences. CEUR Workshop Proceedings, 2643, pp.548–562. DOI: https://doi.org/10.55056/cte.412

Turanska, O.S., 2018. Development of methods of information protection in wireless sensor networks. Master’s thesis. NTU of Ukraine "KPI named after Igor Sikorsky".

Vovk, A.V., 2018. Methods of information security IoT. Master’s thesis. NTU of Ukraine "KPI named after Igor Sikorsky".

Similar Articles

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)