B. Usmonov, O. Evsutin, A. Iskhakov, A. Shelupanov, A. Iskhakova, R. Meshcheryakov
{"title":"物联网嵌入式技术发展中的网络安全","authors":"B. Usmonov, O. Evsutin, A. Iskhakov, A. Shelupanov, A. Iskhakova, R. Meshcheryakov","doi":"10.1109/ICISCT.2017.8188589","DOIUrl":null,"url":null,"abstract":"The article deals with the current problem of ensuring security when developing embedded technologies for the Internet of things. The authors analyze modern technological features of this concept; consider the main vulnerabilities of information security. An approach is proposed to protect the data transferred between the physical, logical and virtual components of the dedicated Internet infrastructure of things. Distinctive features of the proposed approach are the intellectual analysis of messages transmitted in IoT and the use of digital watermarks for data transfer between IoT-devices.","PeriodicalId":173523,"journal":{"name":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"19 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":"{\"title\":\"The cybersecurity in development of IoT embedded technologies\",\"authors\":\"B. Usmonov, O. Evsutin, A. Iskhakov, A. Shelupanov, A. Iskhakova, R. Meshcheryakov\",\"doi\":\"10.1109/ICISCT.2017.8188589\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article deals with the current problem of ensuring security when developing embedded technologies for the Internet of things. The authors analyze modern technological features of this concept; consider the main vulnerabilities of information security. An approach is proposed to protect the data transferred between the physical, logical and virtual components of the dedicated Internet infrastructure of things. Distinctive features of the proposed approach are the intellectual analysis of messages transmitted in IoT and the use of digital watermarks for data transfer between IoT-devices.\",\"PeriodicalId\":173523,\"journal\":{\"name\":\"2017 International Conference on Information Science and Communications Technologies (ICISCT)\",\"volume\":\"19 4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"25\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Information Science and Communications Technologies (ICISCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISCT.2017.8188589\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCT.2017.8188589","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The cybersecurity in development of IoT embedded technologies
The article deals with the current problem of ensuring security when developing embedded technologies for the Internet of things. The authors analyze modern technological features of this concept; consider the main vulnerabilities of information security. An approach is proposed to protect the data transferred between the physical, logical and virtual components of the dedicated Internet infrastructure of things. Distinctive features of the proposed approach are the intellectual analysis of messages transmitted in IoT and the use of digital watermarks for data transfer between IoT-devices.