METHODS OF INFORMATION SECURITY IN IOT-TECHNOLOGIES
DOI:
https://doi.org/10.28925/2663-4023.2025.27.705Keywords:
IoT; Wi-Fi; RTSP; Internet of Things technologies; suppression; cyber threats, network attacks; information security; protection against attacksAbstract
This paper examines modern IoT systems, which are an integral part of technological progress. They have found application in industry, transport, smart home systems and other technical areas. However, the large number of connected devices, their limited computing resources and dependence on wireless networks make these systems extremely vulnerable to attacks aimed at violating the confidentiality, integrity and availability of data. The article considers a method for protecting information in IoT systems, which takes into account the vulnerabilities of wireless networks and devices such as IP cameras. Since most IoT devices operate in wireless networks, this makes them particularly vulnerable to denial of service attacks. Thanks to the use of multi-level authentication (using passwords and two-factor authentication), which allowed reducing the risk of unauthorized access to the device. A method for protecting information for IoT systems is considered, which takes into account the specific vulnerabilities and threats characteristic of these technologies. Threats, including attacks using WiFi jammers that cause denial of service and compromise of RTSP video streams, were investigated. The proposed information protection method involves a multi-level approach that includes data encryption, frequency switching to avoid signal blocking, and RTSP stream protection mechanisms. This information protection method is of great practical importance, as it can be used to ensure security in a wide range of IoT systems. Experimental testing, which was implemented using the example of the TP-Link Tapo C100 wireless IP camera, demonstrated the effectiveness of the proposed solutions in reducing the impact of attacks and ensuring reliable operation of IoT devices. As part of the research, a comprehensive understanding of the vulnerabilities of IoT systems to WiFi jammer-based attacks was achieved, and effective protection measures were developed to ensure the stability and security of such systems. Further research will allow improving existing protection methods and expanding the possibilities for their integration into more complex and large-scale IoT systems.
Downloads
References
Cvetković, A., Radojčić, V., Adamović, S. (2021). Multi-factor Authentication for the Internet of Things. XXII MEĐUNARODNI NAUČNI SKUP, 22(7), 61–64. https://doi.org/10.7251/ZRSNG2101013C
Schulzrinne, H., Rao, A., Lanphier, R. (1998). Real Time Streaming Protocol (RTSP). https://doi.org/10.17487/RFC2326
IoT Security Foundation. Best Practice Guidelines for IoT Security. (2022).
Pirayesh, H., Zeng, H. (2022). Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey. IEEE Communications Surveys & Tutorials, 24(2), 767–809. https://doi.org/ 10.1109/COMST.2022.3159185
Nmap: The Network Mapper. (n.d.). https://nmap.org/
Ashton, K. (2009). That “Internet of Things” Thing. RFID Journal.
Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks. NISTIR 8228. (2019). National Institute of Standards and Technology (NIST).
IoT Security Foundation Guidelines. Recommendations for the security of IoT devices. (n.d.). https://www.iotsecurityfoundation.org/
Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10–28.
Official documentation of IP-camera TpLink Tapo C100. User manual and specifications. (n.d.). https://www.tp-link.com/uk-ua/support/download/tapo-c100/
Sokolov, V., Skladannyi, P., & Platonenko, A. (2023). Jump-Stay Jamming Attack on Wi-Fi Systems. In: IEEE 18th International Conference on Computer Science and Information Technologies, 1–5. https://doi.org/10.1109/CSIT61576.2023.10324031
Sokolov, V., Skladannyi, P., Astapenya, V. (2023). Bluetooth Low-Energy Beacon Resistance to Jamming Attack. In: IEEE 13th International Conference on Electronics and Information Technologies, 270–274. https://doi.org/10.1109/ELIT61488.2023.10310815
Sokolov, V., Skladannyi, P., Korshun, N. (2023). ZigBee Network Resistance to Jamming Attacks. In: IEEE 6th International Conference on Information and Telecommunication Technologies and Radio Electronics, 161–165. https://doi.org/10.1109/UkrMiCo61577.2023.10380360
Sokolov, V., Skladannyi, P., Astapenya, V. (2023). Wi-Fi Interference Resistance to Jamming Attack. In: IEEE 5th International Conference on Advanced Information and Communication Technologies, 1–4. https://doi.org/10.1109/AICT61584.2023.10452687
Sokolov, V., Skladannyi, P., Mazur, N. (2023). Wi-Fi Repeater Influence on Wireless Access. In: IEEE 5th International Conference on Advanced Information and Communication Technologies, 33–36. https://doi.org/10.1109/AICT61584.2023.10452421
Kriuchkova, L., Sokolov, V., Skladannyi, P. (2024). Determining the Zone of Successful Interaction in RFID Technologies. In: IEEE 29th International Seminar/Workshop on Direct and Inverse Problems of Electromagnetic and Acoustic Wave Theory, 168–171. https://doi.org/10.1109/diped63529.2024.10706153
Hulak, H. M., Zhiltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2024). Information and cyber security of the enterprise. Textbook. Lviv: Publisher Marchenko T. V.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Ярослав Олійник, Артем Платоненко, В’ячеслав Черевик , Максим Ворохоб, Юрій Шевчук

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.