METHODS OF INFORMATION SECURITY IN IOT-TECHNOLOGIES

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.27.705

Keywords:

IoT; Wi-Fi; RTSP; Internet of Things technologies; suppression; cyber threats, network attacks; information security; protection against attacks

Abstract

 This paper examines modern IoT systems, which are an integral part of technological progress. They have found application in industry, transport, smart home systems and other technical areas. However, the large number of connected devices, their limited computing resources and dependence on wireless networks make these systems extremely vulnerable to attacks aimed at violating the confidentiality, integrity and availability of data. The article considers a method for protecting information in IoT systems, which takes into account the vulnerabilities of wireless networks and devices such as IP cameras. Since most IoT devices operate in wireless networks, this makes them particularly vulnerable to denial of service attacks. Thanks to the use of multi-level authentication (using passwords and two-factor authentication), which allowed reducing the risk of unauthorized access to the device. A method for protecting information for IoT systems is considered, which takes into account the specific vulnerabilities and threats characteristic of these technologies. Threats, including attacks using WiFi jammers that cause denial of service and compromise of RTSP video streams, were investigated. The proposed information protection method involves a multi-level approach that includes data encryption, frequency switching to avoid signal blocking, and RTSP stream protection mechanisms. This information protection method is of great practical importance, as it can be used to ensure security in a wide range of IoT systems. Experimental testing, which was implemented using the example of the TP-Link Tapo C100 wireless IP camera, demonstrated the effectiveness of the proposed solutions in reducing the impact of attacks and ensuring reliable operation of IoT devices. As part of the research, a comprehensive understanding of the vulnerabilities of IoT systems to WiFi jammer-based attacks was achieved, and effective protection measures were developed to ensure the stability and security of such systems. Further research will allow improving existing protection methods and expanding the possibilities for their integration into more complex and large-scale IoT systems.

Downloads

Download data is not yet available.

References

Cvetković, A., Radojčić, V., Adamović, S. (2021). Multi-factor Authentication for the Internet of Things. XXII MEĐUNARODNI NAUČNI SKUP, 22(7), 61–64. https://doi.org/10.7251/ZRSNG2101013C

Schulzrinne, H., Rao, A., Lanphier, R. (1998). Real Time Streaming Protocol (RTSP). https://doi.org/10.17487/RFC2326

IoT Security Foundation. Best Practice Guidelines for IoT Security. (2022).

Pirayesh, H., Zeng, H. (2022). Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey. IEEE Communications Surveys & Tutorials, 24(2), 767–809. https://doi.org/ 10.1109/COMST.2022.3159185

Nmap: The Network Mapper. (n.d.). https://nmap.org/

Ashton, K. (2009). That “Internet of Things” Thing. RFID Journal.

Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks. NISTIR 8228. (2019). National Institute of Standards and Technology (NIST).

IoT Security Foundation Guidelines. Recommendations for the security of IoT devices. (n.d.). https://www.iotsecurityfoundation.org/

Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10–28.

Official documentation of IP-camera TpLink Tapo C100. User manual and specifications. (n.d.). https://www.tp-link.com/uk-ua/support/download/tapo-c100/

Sokolov, V., Skladannyi, P., & Platonenko, A. (2023). Jump-Stay Jamming Attack on Wi-Fi Systems. In: IEEE 18th International Conference on Computer Science and Information Technologies, 1–5. https://doi.org/10.1109/CSIT61576.2023.10324031

Sokolov, V., Skladannyi, P., Astapenya, V. (2023). Bluetooth Low-Energy Beacon Resistance to Jamming Attack. In: IEEE 13th International Conference on Electronics and Information Technologies, 270–274. https://doi.org/10.1109/ELIT61488.2023.10310815

Sokolov, V., Skladannyi, P., Korshun, N. (2023). ZigBee Network Resistance to Jamming Attacks. In: IEEE 6th International Conference on Information and Telecommunication Technologies and Radio Electronics, 161–165. https://doi.org/10.1109/UkrMiCo61577.2023.10380360

Sokolov, V., Skladannyi, P., Astapenya, V. (2023). Wi-Fi Interference Resistance to Jamming Attack. In: IEEE 5th International Conference on Advanced Information and Communication Technologies, 1–4. https://doi.org/10.1109/AICT61584.2023.10452687

Sokolov, V., Skladannyi, P., Mazur, N. (2023). Wi-Fi Repeater Influence on Wireless Access. In: IEEE 5th International Conference on Advanced Information and Communication Technologies, 33–36. https://doi.org/10.1109/AICT61584.2023.10452421

Kriuchkova, L., Sokolov, V., Skladannyi, P. (2024). Determining the Zone of Successful Interaction in RFID Technologies. In: IEEE 29th International Seminar/Workshop on Direct and Inverse Problems of Electromagnetic and Acoustic Wave Theory, 168–171. https://doi.org/10.1109/diped63529.2024.10706153

Hulak, H. M., Zhiltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2024). Information and cyber security of the enterprise. Textbook. Lviv: Publisher Marchenko T. V.

Downloads


Abstract views: 291

Published

2025-03-27

How to Cite

Oliinyk, Y., Platonenko, A., Cherevyk, V., Vorokhob, M., & Shevchuk, Y. (2025). METHODS OF INFORMATION SECURITY IN IOT-TECHNOLOGIES. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(27), 100–108. https://doi.org/10.28925/2663-4023.2025.27.705

Most read articles by the same author(s)

1 2 > >>