On the issue of ensuring the safety of objects with “smart habitat”
Abstract
The problems of ensuring the security of the smart ecosystem are considered, and an analysis of modern Internet of Things (IoT) devices used in the control loop of the smart habitat is carried out from the point of view of the possibility of protecting and depersonalizing the information circulating in it. The article pays special attention to the issue of integrating a specialized software platform into the smart environment infrastructure, which allows for a high level of not only IT security but also the overall security of the facility. It made an analysis of economic development and subsequent application of the integrated STB platform. Practical recommendations of the organization to improve the security of using the Internet of Things in ODR are considered.
References
[1]Shipments of Smart Home Devices Fell in 2022, But a Return to Growth is Expected in 2023. Available online: https://www.idc.com/getdoc.jsp?containerId=prUS50541723 (accessed on 1 August 2023).
[2]Smart home security system. Available online: https://in-bez.ru/articles/sistema-bezopasnosti-umnogo-doma/?ysclid=lrjooj1z9q866285954 (accessed on 1 October 2023).
[3]Vereshchagina EA, Kapetsky IO, Yarmonov AS. 317 Security issues of the Internet of things. Available online: https://izd-mn.com/PDF/20MNNPU21.pdf (accessed on 10 January 2024).
[4]Dik G, Bogdanov A, Shchegoleva N, et al. New Security Challenges of Internet of Things. In: Proceedings of the Computational Science and Its Applications—ICCSA 2023 Workshops; 3-6 July 2023; Athens, Greece. doi: 10.1007/978-3-031-37120-2_20
[5]Roberto Sandre. Thread and ZigBee for home and building automation Systems Engineer.
[6]Control Engineering Russia. Available online: https://controleng.ru/besprovodny-e-tehnologii/putivoditel-iot-3-wi-fi/ (accessed on 21 January 2024).
[7]Bluetooth. Available online: https://www.bluetooth.com/learn-about-bluetooth/tech-overview (accessed on 21 January 2024).
[8]Jonas Olsson. 6LoWPAN demystified. Texas Instruments. Available online: https://www.ti.com/lit/wp/swry013/swry013.pdf 510 (accessed on 21 January 2024).
[9]Wltd. Available online: https://wltd.org/posts/thedifferences-between-z-wave-versions-made-easy (accessed on 21 January 2024).
[10]Rayes A, Salam S. The Things in IoT: Sensors and Actuators//Internet of Things from Hype to Reality. Springer; 2017. pp. 57–77.
[11]Lee P. Architecture of the Internet of Things. DMK Press; 2020.
[12]Basic protocols, message sequence charts, and the verification of requirements specifications. Computer Networks. 2005; 49(5): 661-675.
[13]Chantsis F, Stais I, Calderon P, Deirmenzoglu E. Woods B. Practical Hacking of the Internet of Things. DMK Press; 2022.
[14]Leonova EM. About the problem of interfacing technical notification means of different manufacturers. Current Issues of Natural Science. 2022; 699-704.
[15]Bogdanov A, Shchegoleva N, Dik G, et al. “Smart Habitat”: Features of Building It Infrastructure, Main Problems of Building Data Networks Using 5G (6G) Technologies. In: Proceedings of the Computational Science and Its Applications—ICCSA 2022 Workshops; 4-7 July 2022; Malaga, Spain. pp. 628-638. doi: 10.1007/978-3-031-10542-5_43
[16]Bogdanov A, Dik A, Dik G, et al. K-Anonymity Versus PSI3 for Depersonalization and Security Assessment of Large Data Structures. International Conference on Computational Science and Its Applications. Springer Nature Switzerland; 2023. pp. 317-333.
[17]Bogdanov AV, Dik A, Shchegoleva N, et al. Protection of personal data using anonymization. In: Proceedings of the Computational Science and Its Applications—ICCSA 2021: 21st International Conference; 13-16 September 2021; Cagliari, Italy. pp. 447-459.
[18]Dik G, Bogdanov A, Shchegoleva N, et al. Challenges of IoT Identification and Multi-Level Protection in Integrated Data Transmission Networks Based on 5G/6G Technologies. Computers. 2022; 11(12): 178. doi: 10.3390/computers11120178
Copyright (c) 2024 Gennady Dik, Alexander Bogdanov, Nadezhda Shchegoleva, Aleksandr Dik, Alexander Degtyarev
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it for any purpose, even commercially, under the condition that the authors are given credit. With this license, authors hold the copyright.