THE MODEL OF PROVIDING CYBER SECURITY OF THE INTERNET OF THINGS
DOI: 10.31673/2412-4338.2024.020515
Abstract
The Internet of Things is considered to be a new stage in the development of the Internet, where physical objects connected to the network exchange data, and each device can independently interact and establish connections with billions of other things. The Internet of Things allows people to perform various tasks remotely, which will make life much easier in the future.
This article explores the specifics of the technology and the importance of developing contingency plans to recover from potential IoT cyberattacks. Special attention will be paid to the role of government entities in ensuring the security of IoT networks, including the development of regulations and cooperation with the private sector and academic institutions.
The Internet of Things encompasses a variety of steps: computational, communication-based, temporal and data-based. How these functions as a single system utilizing commercially available components that can be purchased easily and at a low cost. As the number of IoT devices continues to increase, it is expected to have a total of 36 billion members and significant changes will occur. The IoT market is expanding rapidly, this will allow communication service providers, industries and companies to have a large potential for revenue.
The article discusses existing approaches to this issue and their benefits and drawbacks. A general description of innovative cybersecurity strategies and approaches is presented, including a new combination of practical strategies and innovative solutions. Components of the model, including access control, data encryption, network monitoring, and intrusion detection, are detailed in depth. Particular attention is devoted to partnerships with IoT device manufacturers in order to successfully apply the proposed model in real life. The conclusion states that cyber security should be constantly improved and altered in response to the increasing dangers and the development of IoT technologies.
Keywords: cyber security, Internet of Things, legal framework, IoT, mathematical model, software code.
References
1. Alkunidry D., Alhuwaysi S., Alharbi R. Security Threads and IoT Security. Journal of Computer and Communications. 2023. Vol. 11, No. 09. P. 76–83. (accessed 11/03/2024).
2. Editorial: Security and Privacy in Internet of Things / J. M. de Fuentes and others. Mobile Networks and Applications. 2018. Vol. 24, No. 3. P. 878–880. URL: https://doi.org/10.1007/s11036-018-1150-8 (date of access: 11/03/2024).
3. ETSI EN 303 645 V2.1.1 (2020-06). CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements. Valid from 2020-06-19. Kind. officer 2020. 34 p.
4. The new IoT cybersecurity standard. Worldvision is an online store of security systems. URL: https://worldvision.com.ua/poyavilsya-novyy-globalnyy-standart-interneta-veshchey-dlya-kiberbezopasnosti/ (access date: 03/13/2024).
5. Filinovych V.V. Cybersecurity and the Internet of Things: Legal Aspect. Civil and labor law. 2020. Vol. 4, No. 57. P. 122–125.
6. On the protection of personal data: Law of Ukraine dated June 1, 2010 No. 2297-VI: as of October 27 2022 URL: https://zakon.rada.gov.ua/laws/show/2297-17#Text (access date: 03/15/2024).
7. Didenko D. Common attacks on IoT and protection against them. Corewin. URL: https://corewin.ua/blog/attacks-on-iot-how-protect/ (access date: 03/15/2024).
8. ETSI EN 303 645 for IoT Security - Onward Security, a DEKRA company. Onward Security Corp. URL: https://www.onwardsecurity.com/en/lab_security-detail/ETSIEN303645/ (access date: 03/20/2024).
9. Pickavet H. Why IoT Security Is So Critical | TechCrunch. TechCrunch. URL: https://techcrunch.com/2015/10/24/why-iot-security-is-so-critical/ (accessed 03/19/2024).
10. Security of IoT Devices / E. Buenrostro and others. Journal of Cyber Security Technology. 2018. Vol. 2, No. 1. P. 1–13. (access date: 03/20/2024).