METHODS OF SAFETY DOMESTIC SECURITY

Authors

DOI:

https://doi.org/10.28925/2663-4023.2019.6.134141

Keywords:

Internet of Things (IoT); smart home; Blockchain; security

Abstract

This study focuses on the problem of Internet of Things (IoT) security, namely: an overview of threats to the information security of a smart home and the analysis of existing security methods for its devices. The Internet of Things is experiencing an exponential growth in research and industry. At the same time, security threats to information programs and databases are increasing. As it is known, the foundation of Internet of Things security consists of four parts: communication security, device security, device monitoring and network interaction control. The sources of threats and vulnerabilities of IoT information security are accordingly investigated. Conventional security and privacy approaches are generally not applicable to IoT, mainly because of its decentralized topology and limited resources of most of its devices. The analysis of scientific sources has allowed us to explore different approaches to secure a smart home: an architectural method with three modules to protect the confidentiality of smart home data analysis; network-level constraint method; Blockchain technology. It is determined that the proposed blockchain smart home platform enables the security of information, taking into account the basic security goals - confidentiality, integrity and accessibility. Blockchain can be used to track sensor data measurements and prevent duplication of any other malicious data, for authentication and secure data transmission. This research will help design and develop new methods and technologies for smart home security.

 

Downloads

Download data is not yet available.

References

Baranov OA Internet of Things (IoT): A Review of Legal Issues // Internet of Things: Problems of Legal Regulation and Implementation: Proceedings of a Scientific and Practical Conference. October 24, 2017, Kyiv. / Order. VM Furashev, S. Yu. Petryayev. - K .: NTUU "Igor Sikorsky Kyiv Polytechnic Institute" Publishing House "Polytechnic". 2017. http://ipp.kpi.ua/wp-content/uploads/2017/-_14.11.2017.pdf

2. Cisko Cybersecurity Report 2018. URL: https://www.cisco.com/c/en/products/security/security-reports.html#~download-th.

S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini. Security, privacy and trust in the Internet of Things: The Road ahead, Computer Networks, vol. 76, pp. 146-164, 2015.

Monastyrsky, L., Petryshyn, O. Features of data collection and processing for smart object management / L. Monastyrsky, O., Petryshyn // Electronics and Information Technologies. - 2017. - Issue 7. - P. 86–92

AV Snegurov, Information Security Risks of Intelligent House Systems / AV Snegurov, EA Tkachenko, AD Kravchenko // Eastern European Journal of Advanced Technologies. - 2011. - № 4 (3). - P. 30-34. - Access mode: http://nbuv.gov.ua/UJRN/Vejpte_2011_4(3)__9.

E. Fernandes, J. Jung, A. Prakash Security Analysis of Emerging Smart Home Applications. 2016 IEEE Symposium on Security and Privacy. http://iotsecurity.eecs.umich.edu/img/Fernandes_SmartThingsSP16.pdf

V. Sivaraman, D. Chan, D. Earl, and R. Boreli, “Smartphones attacking smart homes,” in Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, 2016. http://www2.ee.unsw.edu.au/~vijay/pubs/conf/16wisec.pdf

N. Zhang, S. Demetriou, X. Mi, W. Diao, K. Yuan, P. Zong, F. Qian, X. Wang, K. Chen, Y. Tian, CAGunter, K. Zhang, P. Tague and Y. Lin. Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going To Be. 2017 https://arxiv.org/pdf/1703.09809.pdf

A. Chakravorty, T. Wlodarczyk, and C. Rong, “Privacy preserving data analytics for smart homes,” in Security and Privacy Workshops (SPW). IEEE, 2013, pp. 23–27. https://www.ieee-security.org/TC/SPW2013/papers/data/5017a023.pdf

S. Notra, M. Siddiqi, H. H. Gharakheili, V. Sivaraman, and R. Boreli, “An experimental study of security and privacy risks with emerging household appliances,” in Communications and Network Security (CNS), 2014 IEEE Conference he. IEEE, 2014

http://www2.eet.unsw.edu.au/~vijay/pubs/conf/14M2Msec.pdf

S. Nakamoto Peer-to-Peer Electronic Cash System. Bitcoin. Available at: https://bitcoin.org/bitcoin.pdf

A. Dorri, R. Jurdak, S.S. Kanhere, and P. Gauravaram, “Blockchain for IoT Security and Privacy: The Case Study of a Smart Home,” in International Conference on Pervasive Computing and Communications Workshops, 2017, IEEE https : //allquantor.at/blockchainbib/pdf/dorri2017blockchain.pdf

S. Fan, L. Song, and C. Sang, “Research on Privacy Protection in an IoT Blockchain-Based System,” in International Conference on Smart Blockchain, SmartBlock 2018: Smart Blockchain https://easychair.org/publications / preprint_download / Vg7v

Downloads


Abstract views: 905

Published

2019-12-26

How to Cite

Belova, A., & Onischenko, V. (2019). METHODS OF SAFETY DOMESTIC SECURITY. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(6), 134–141. https://doi.org/10.28925/2663-4023.2019.6.134141