Security models of the Internet of Things

O.Ye. Kovalenko
{"title":"Security models of the Internet of Things","authors":"O.Ye. Kovalenko","doi":"10.34121/1028-9763-2023-4-43-50","DOIUrl":null,"url":null,"abstract":"The IoT is a cyber-convergent system that includes things, means of communication, target ap-plications, and data analysis tools that support the unique identification of each object. IoT technologies play a vital role in the creation of cyber-convergent systems due to their wide us-age in various spheres of life such as industry, social sphere, health care, and creating a com-fortable environment. The IoT security model method ensures the confidentiality, integrity, and availability of data that is transferred between devices and also guarantees the privacy and secu-rity of end users. The creation and use of IoT systems directly affect the security and privacy of the involved and connected components. The presented study introduces an analysis of IoT ar-chitecture models with end-to-end security support. The conducted literature review reveals the challenges of various aspects of security faced by the IoT environment. Some models imple-menting different security strategies at different layers of the IoT are described. These include the perception layer which provides the authentication process for identifying IoT entities, the network layer which focuses on the security processes of cloud platforms, and the application layer which provides authentication and authorization for end users. The results of the analysis show that building secure IoT systems is based on three main strategies: proper configuring and ensuring the protection of all IoT devices; using secure wireless networks to connect IoT devic-es to corporate or global networks; constant situational awareness of security threats to IoT de-vices; and implementing appropriate security solutions to protect them from attacks. The ma-turity model of the IoT security system based on the ISA/IEC 62443 document package is also described.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Matematičeskie mašiny i sistemy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.34121/1028-9763-2023-4-43-50","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The IoT is a cyber-convergent system that includes things, means of communication, target ap-plications, and data analysis tools that support the unique identification of each object. IoT technologies play a vital role in the creation of cyber-convergent systems due to their wide us-age in various spheres of life such as industry, social sphere, health care, and creating a com-fortable environment. The IoT security model method ensures the confidentiality, integrity, and availability of data that is transferred between devices and also guarantees the privacy and secu-rity of end users. The creation and use of IoT systems directly affect the security and privacy of the involved and connected components. The presented study introduces an analysis of IoT ar-chitecture models with end-to-end security support. The conducted literature review reveals the challenges of various aspects of security faced by the IoT environment. Some models imple-menting different security strategies at different layers of the IoT are described. These include the perception layer which provides the authentication process for identifying IoT entities, the network layer which focuses on the security processes of cloud platforms, and the application layer which provides authentication and authorization for end users. The results of the analysis show that building secure IoT systems is based on three main strategies: proper configuring and ensuring the protection of all IoT devices; using secure wireless networks to connect IoT devic-es to corporate or global networks; constant situational awareness of security threats to IoT de-vices; and implementing appropriate security solutions to protect them from attacks. The ma-turity model of the IoT security system based on the ISA/IEC 62443 document package is also described.
物联网安全模型
物联网是一个网络融合系统,包括事物、通信手段、目标应用程序和数据分析工具,支持每个对象的唯一识别。物联网技术在工业、社会、医疗保健、创造舒适环境等生活领域的广泛应用,在创建网络融合系统中发挥着至关重要的作用。物联网安全模型方法既保证了设备间传输数据的保密性、完整性和可用性,又保证了终端用户的隐私性和安全性。物联网系统的创建和使用直接影响到相关和连接组件的安全性和隐私性。本研究介绍了具有端到端安全支持的物联网架构模型的分析。进行的文献综述揭示了物联网环境面临的安全各个方面的挑战。介绍了在物联网的不同层实现不同安全策略的一些模型。其中包括提供识别物联网实体的身份验证过程的感知层,专注于云平台安全过程的网络层以及为最终用户提供身份验证和授权的应用层。分析结果表明,构建安全的物联网系统基于三个主要策略:正确配置并确保对所有物联网设备的保护;使用安全无线网络将物联网设备连接到企业或全球网络;对物联网设备安全威胁的持续态势感知;并实施适当的安全解决方案来保护它们免受攻击。介绍了基于ISA/IEC 62443文档包的物联网安全系统成熟模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信