INCREASING THE LEVEL OF SECURITY OF INTERNET THINGS NETWORK SYSTEMS DUE TO ENCRYPTION OF DATA ON DEVICES WITH LIMITED COMPUTER SYSTEMS
DOI:
https://doi.org/10.28925/2663-4023.2021.11.124135Keywords:
Internet of Things; IoT; network security; devices with limited computing resources; encryption algorithms; Vernam's cipher.Abstract
Because IoT devices work with data that may be confidential or confidential, that data must be protected. Due to the peculiarities of platforms and the implementation of such systems, namely: first, the use of devices with limited computing characteristics, which makes it impossible to use traditional means of information protection and data transmission protocols, and secondly. systems, and provide them with sufficient computing resources due to the impossibility of laying power lines, thirdly, the lack of standards for the implementation of these devices in the existing infrastructure, there are serious threats to the confidentiality, integrity and availability of information.
The article considers the model of the IoT system, oneM2M standard presented by the European Institute of Communication Standards. IoT devices are designed with the necessary network connectivity, but often do not provide reliable network security. Network security is a critical factor in the deployment of IoT devices. The situation is complicated by the fact that IoT largely consists of limited devices. A limited device usually has a very limited cycle of power, memory, and processing. IoT devices are particularly vulnerable to threats because many of the current IoT devices do not support encryption.
Several known encryption algorithms were selected for analysis: RSA, Vernam cipher, El Gamal scheme. After analyzing the above algorithms, a prototype of the IoT system was developed using limited devices, which provides absolute cryptographic stability. The prototype consists of a gateway in the role of a Raspberry pi 3 B + microcomputer, a limited Arduino Nano device with a connected sensor and a software implementation of the above-mentioned Vernam cipher with all the tasks.
Downloads
References
Lightweight Cryptography | CSRC. (b.d.). NIST Computer Security Resource Center | CSRC. https://csrc.nist.gov/Projects/Lightweight-Cryptography
oneM2M Security solutions oneM2M TS-0003. European Institute of Telecommunication Standards ETSI. World Wide Web. https://www.etsi.org/deliver/etsi_ts/118100_118199/118103/02.12.01_60/ts_118103v021201p.pdf.
OWASP Internet of Things. (b.d.). OWASP Foundation | Open Source Foundation for Application Security. https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Vulnerabilities
Bachinsky, R.V., & Kupetsky, A.V. (2018). Series: Information Systems and Frames. Bulletin of the National University "Lvivska Politechnika", (887), 18–24. http://nbuv.gov.ua/UJRN/VNULPICM_2018_887_5
Kuznetsov, D. I. & Ryabchina, L. S. (2019). Information security systems for Internet speeches. Bulletin of Kryvorizkiy National University, (49), 80-83.
Petrenko, A. I. (2019). Cryptology in the Internet of speeches. Model and information systems in economics, (97), 155-163. http://nbuv.gov.ua/UJRN/Mise_2019_97_18
Beley, O. I. & Logutova, T.G. (2019). Safe transmission of tributes for Internet speeches, Cyberbezpeka: education, science, technology, 2 (6), 6-18.
Bormann, C., Ersue, M., Keranen A. (2014). Terminology for Constrained-Node Networks. Internet Engineering Task Force (IETF). World Wide Web. https://tools.ietf.org/html/rfc7228.
Shannon, C. E. (b.d.). A Mathematical Theory of Cryptography. World Wide Web. https://www.iacr.org/museum/shannon/shannon45.pdf
Henk, C. A. (2005). Encyclopedia of Cryptography and Security. Springer Science + Business Media.