INCREASING THE LEVEL OF SECURITY OF INTERNET THINGS NETWORK SYSTEMS DUE TO ENCRYPTION OF DATA ON DEVICES WITH LIMITED COMPUTER SYSTEMS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2021.11.124135

Keywords:

Internet of Things; IoT; network security; devices with limited computing resources; encryption algorithms; Vernam's cipher.

Abstract

Because IoT devices work with data that may be confidential or confidential, that data must be protected. Due to the peculiarities of platforms and the implementation of such systems, namely: first, the use of devices with limited computing characteristics, which makes it impossible to use traditional means of information protection and data transmission protocols, and secondly. systems, and provide them with sufficient computing resources due to the impossibility of laying power lines, thirdly, the lack of standards for the implementation of these devices in the existing infrastructure, there are serious threats to the confidentiality, integrity and availability of information.

The article considers the model of the IoT system, oneM2M standard presented by the European Institute of Communication Standards. IoT devices are designed with the necessary network connectivity, but often do not provide reliable network security. Network security is a critical factor in the deployment of IoT devices. The situation is complicated by the fact that IoT largely consists of limited devices. A limited device usually has a very limited cycle of power, memory, and processing. IoT devices are particularly vulnerable to threats because many of the current IoT devices do not support encryption.

Several known encryption algorithms were selected for analysis: RSA, Vernam cipher, El Gamal scheme. After analyzing the above algorithms, a prototype of the IoT system was developed using limited devices, which provides absolute cryptographic stability. The prototype consists of a gateway in the role of a Raspberry pi 3 B + microcomputer, a limited Arduino Nano device with a connected sensor and a software implementation of the above-mentioned Vernam cipher with all the tasks.

Downloads

Download data is not yet available.

References

Lightweight Cryptography | CSRC. (b.d.). NIST Computer Security Resource Center | CSRC. https://csrc.nist.gov/Projects/Lightweight-Cryptography

oneM2M Security solutions oneM2M TS-0003. European Institute of Telecommunication Standards ETSI. World Wide Web. https://www.etsi.org/deliver/etsi_ts/118100_118199/118103/02.12.01_60/ts_118103v021201p.pdf.

OWASP Internet of Things. (b.d.). OWASP Foundation | Open Source Foundation for Application Security. https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Vulnerabilities

Bachinsky, R.V., & Kupetsky, A.V. (2018). Series: Information Systems and Frames. Bulletin of the National University "Lvivska Politechnika", (887), 18–24. http://nbuv.gov.ua/UJRN/VNULPICM_2018_887_5

Kuznetsov, D. I. & Ryabchina, L. S. (2019). Information security systems for Internet speeches. Bulletin of Kryvorizkiy National University, (49), 80-83.

Petrenko, A. I. (2019). Cryptology in the Internet of speeches. Model and information systems in economics, (97), 155-163. http://nbuv.gov.ua/UJRN/Mise_2019_97_18

Beley, O. I. & Logutova, T.G. (2019). Safe transmission of tributes for Internet speeches, Cyberbezpeka: education, science, technology, 2 (6), 6-18.

Bormann, C., Ersue, M., Keranen A. (2014). Terminology for Constrained-Node Networks. Internet Engineering Task Force (IETF). World Wide Web. https://tools.ietf.org/html/rfc7228.

Shannon, C. E. (b.d.). A Mathematical Theory of Cryptography. World Wide Web. https://www.iacr.org/museum/shannon/shannon45.pdf

Henk, C. A. (2005). Encyclopedia of Cryptography and Security. Springer Science + Business Media.

Downloads


Abstract views: 431

Published

2021-03-25

How to Cite

Chernenko , R., Riabchun , O. ., Vorokhob , M., Anosov, A. ., & Kozachok , . V. . (2021). INCREASING THE LEVEL OF SECURITY OF INTERNET THINGS NETWORK SYSTEMS DUE TO ENCRYPTION OF DATA ON DEVICES WITH LIMITED COMPUTER SYSTEMS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(11), 124–135. https://doi.org/10.28925/2663-4023.2021.11.124135

Most read articles by the same author(s)

<< < 1 2