On the issue of ensuring the safety of objects with “smart habitat”

  • Gennady Dik St. Petersburg University, Universitetsky pr., 35, Peterhof, 198504 St Petersburg, Russia
  • Alexander Bogdanov St. Petersburg University, Universitetsky pr., 35, Peterhof, 198504 St Petersburg, Russia
  • Nadezhda Shchegoleva St. Petersburg University, Universitetsky pr., 35, Peterhof, 198504 St Petersburg, Russia
  • Aleksandr Dik St. Petersburg University, Universitetsky pr., 35, Peterhof, 198504 St Petersburg, Russia
  • Alexander Degtyarev St. Petersburg University, Universitetsky pr., 35, Peterhof, 198504 St Petersburg, Russia
Article ID: 528
67 Views, 58 PDF Downloads
Keywords: smart habitat (SH); Internet of things (IoT); smart infrastructure; artificial intelligence (AI); security and safety system (SSS); smart environment; IT security

Abstract

The problems of ensuring the security of the smart ecosystem are considered, and an analysis of modern Internet of Things (IoT) devices used in the control loop of the smart habitat is carried out from the point of view of the possibility of protecting and depersonalizing the information circulating in it. The article pays special attention to the issue of integrating a specialized software platform into the smart environment infrastructure, which allows for a high level of not only IT security but also the overall security of the facility. It made an analysis of economic development and subsequent application of the integrated STB platform. Practical recommendations of the organization to improve the security of using the Internet of Things in ODR are considered.

References

[1]Shipments of Smart Home Devices Fell in 2022, But a Return to Growth is Expected in 2023. Available online: https://www.idc.com/getdoc.jsp?containerId=prUS50541723 (accessed on 1 August 2023).

[2]Smart home security system. Available online: https://in-bez.ru/articles/sistema-bezopasnosti-umnogo-doma/?ysclid=lrjooj1z9q866285954 (accessed on 1 October 2023).

[3]Vereshchagina EA, Kapetsky IO, Yarmonov AS. 317 Security issues of the Internet of things. Available online: https://izd-mn.com/PDF/20MNNPU21.pdf (accessed on 10 January 2024).

[4]Dik G, Bogdanov A, Shchegoleva N, et al. New Security Challenges of Internet of Things. In: Proceedings of the Computational Science and Its Applications—ICCSA 2023 Workshops; 3-6 July 2023; Athens, Greece. doi: 10.1007/978-3-031-37120-2_20

[5]Roberto Sandre. Thread and ZigBee for home and building automation Systems Engineer.

[6]Control Engineering Russia. Available online: https://controleng.ru/besprovodny-e-tehnologii/putivoditel-iot-3-wi-fi/ (accessed on 21 January 2024).

[7]Bluetooth. Available online: https://www.bluetooth.com/learn-about-bluetooth/tech-overview (accessed on 21 January 2024).

[8]Jonas Olsson. 6LoWPAN demystified. Texas Instruments. Available online: https://www.ti.com/lit/wp/swry013/swry013.pdf 510 (accessed on 21 January 2024).

[9]Wltd. Available online: https://wltd.org/posts/thedifferences-between-z-wave-versions-made-easy (accessed on 21 January 2024).

[10]Rayes A, Salam S. The Things in IoT: Sensors and Actuators//Internet of Things from Hype to Reality. Springer; 2017. pp. 57–77.

[11]Lee P. Architecture of the Internet of Things. DMK Press; 2020.

[12]Basic protocols, message sequence charts, and the verification of requirements specifications. Computer Networks. 2005; 49(5): 661-675.

[13]Chantsis F, Stais I, Calderon P, Deirmenzoglu E. Woods B. Practical Hacking of the Internet of Things. DMK Press; 2022.

[14]Leonova EM. About the problem of interfacing technical notification means of different manufacturers. Current Issues of Natural Science. 2022; 699-704.

[15]Bogdanov A, Shchegoleva N, Dik G, et al. “Smart Habitat”: Features of Building It Infrastructure, Main Problems of Building Data Networks Using 5G (6G) Technologies. In: Proceedings of the Computational Science and Its Applications—ICCSA 2022 Workshops; 4-7 July 2022; Malaga, Spain. pp. 628-638. doi: 10.1007/978-3-031-10542-5_43

[16]Bogdanov A, Dik A, Dik G, et al. K-Anonymity Versus PSI3 for Depersonalization and Security Assessment of Large Data Structures. International Conference on Computational Science and Its Applications. Springer Nature Switzerland; 2023. pp. 317-333.

[17]Bogdanov AV, Dik A, Shchegoleva N, et al. Protection of personal data using anonymization. In: Proceedings of the Computational Science and Its Applications—ICCSA 2021: 21st International Conference; 13-16 September 2021; Cagliari, Italy. pp. 447-459.

[18]Dik G, Bogdanov A, Shchegoleva N, et al. Challenges of IoT Identification and Multi-Level Protection in Integrated Data Transmission Networks Based on 5G/6G Technologies. Computers. 2022; 11(12): 178. doi: 10.3390/computers11120178

Published
2024-04-09
How to Cite
Dik, G., Bogdanov, A., Shchegoleva, N., Dik, A., & Degtyarev, A. (2024). On the issue of ensuring the safety of objects with “smart habitat”. Information System and Smart City, 3(1), 528. https://doi.org/10.59400/issc.v3i1.528
Section
Article