Analysis and protection of IoT systems: Edge computing and decentralized decision-making
Main Article Content
Abstract
This article presents a detailed analysis of the Internet of Things (IoT) systems and the methods used to protect them. The article highlights the potential of edge computing to minimize traffic transmission and the decentralization of decision-making systems to enhance security. The analysis examines attacks on IoT system components and provides protection recommendations. Furthermore, the article explores the prospects of information protection in IoT systems.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
Accepted 2022-11-20
Published 2022-11-21
References
Blyler, J., 2020. 8 Critical IoT Security Technologies. Available from: https://www.electronicdesign.com/industrial-automation/article/21805420/8-critical-iot-security-technologies.
Cisco Systems, 2014. The Internet of Things Reference Model. Available from: http://cdn.iotwf.com/resources/71/IoT_Reference_Model_White_Paper_June_4_2014.pdf.
dos Santos, M.G., Ameyed, D., Petrillo, F., Jaafar, F. and Cheriet, M., 2020. Internet of Things Architectures: A Comparative Study. Available from: https://arxiv.org/pdf/2004.12936.pdf.
Frahim, J., Pignataro, C., Apcar, J. and Morrow, M., 2015. Securing the Internet of Things: A Proposed Framework. Available from: http://web.archive.org/web/20210323170935/https://tools.cisco.com/security/center/resources/secure_iot_proposed_framework.
Gnatyuk, S.L., 2019. Cybersecurity in the context of the fourth industrial revolution (INDUSTRY 4.0): challenges and opportunities for Ukraine. Available from: https://niss.gov.ua/doslidzhennya/informaciyni-strategii/kiberbezpeka-v-umovakh-rozgortannya-chetvertoi-promislovoi.
Herts, A., Tsidylo, I., Herts, N., Barna, L. and Mazur, S.I., 2020. PhotosynQ - Cloud platform powered by IoT devices. E3S Web of Conferences, 166. Available from: https://doi.org/10.1051/e3sconf/202016605001. DOI: https://doi.org/10.1051/e3sconf/202016605001
Hewlett Packard, 2020. HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. Available from: https://www8.hp.com/us/en/hp-news/press-release.html?id=1744676.
Immerman, G., 2020. The Importance Of Edge Computing For The IOT. Available from: https://www.machinemetrics.com/blog/edge-computing-iot.
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), pp.2481–2501. Available from: https://doi.org/10.1007/s11276-014-0761-7. DOI: https://doi.org/10.1007/s11276-014-0761-7
Khomich, S.V., Fedosiuk, A.V. and Kulikovsky, M.I., 2015. Research of System of IoT Devices Information Security. Digital technologies, 18, pp.166–171.
Korchenko, O., Alexander, M., Odarchenko, R., Nadzhi, A. and Petrenko, O., 2016. Analysis of threats and mechanisms for information security in sensor networks. Information protection, 1, pp.48–56.
Kuznetsov, D.I. and Ryabchina, L.S., 2019. Information security of the Internet of Things systems. Bulletin of Kryvyi Rih National University, 49, pp.80–83. DOI: https://doi.org/10.31721/2306-5451-2019-1-49-80-84
Shokaliuk, S.V., Bohunenko, Y.Y., Lovianova, I.V. and Shyshkina, M.P., 2020. Technologies of distance learning for programming basics on the principles of integrated development of key competences. CEUR Workshop Proceedings, 2643, pp.548–562. DOI: https://doi.org/10.55056/cte.412
Turanska, O.S., 2018. Development of methods of information protection in wireless sensor networks. Master’s thesis. NTU of Ukraine "KPI named after Igor Sikorsky".
Vovk, A.V., 2018. Methods of information security IoT. Master’s thesis. NTU of Ukraine "KPI named after Igor Sikorsky".