- unauthorized telephone tapping;
- the UID tracking location and movements of
users wishing to remain anonymous;
- password reuse attacks by guessing a
combination of characters, checking all possible
combinations using special tools.
F. Misuse of the network for material income
generation by theft of intellectual property, personal
data, and brand.
G. Attacks on the technology management, the
operational status of the devices (denial of service
which leads to the shutdown of the system); structure
management using Trojans or other viruses.
4 CONCLUSION
Today, there is not a single secure Internet of Thing
system in the world. The main reasons for this are the
desire of the manufacturer to lower the cost of the
product; lack of necessary standards and
recommendations for ensuring the network
information security; impossibility of authorization
and authentication of many components used in the
system into the global network (Huang, 2011).
Systematic and purposeful work is essential for
creating the effective Internet of Things security,
including:
- monitoring the vulnerability of devices during
the production stage;
- the use of modern standards for the secure
application development in creating software;
- creation of opportunities for software updates;
- minimizing the vulnerability of P-code (device
independent code) through logistics management,
ranging from the production stage to the stage of
equipment installation at the facility;
- prevention of physical capture of structures that
receive and process information of a certain type, and
form sensations;
- improvement of the security protection of the
sensor network perception node in an environment
which is not served by people,
- prevention of sensor problems (seizure of a
gateway node, information leakage, violation of data
integrity, depletion of energy sources, overloads,
denial of service, installation of illegitimate devices,
unauthorized copying of a node);
- protection of communication networks from
unauthorized access, interception of information,
breach of confidentiality, viruses, network worms, the
use of software vulnerabilities in order to attack a
computer system, the use of a set of software tools to
conceal processes, files, drivers, as well as events
occurring in the system and its parameters;
- exclusion of the authentication problem which
can result in information attacks on the network;
- addressing the software vulnerabilities caused
by developer-made errors and the program kernel,
processing of incomplete exception types, use of code
with weak protection, insufficient processing of
arrays that can become full of hackers, errors in Big
Data and database processing, improper indexing or
incorrect database queries, violations in distributed
operating applications, virtual platforms, clouds;
- creation of software simulations of the outdoor
environment for servers;
- avoidance of significant discrepancies between
the emulator and device at the stage of power supply,
processor performance, memory;
- complex load, performance, interaction of
modules testing;
- exclusion of access to data as a result of using a
keyboard shortcuts or through certain actions.
The use of the Internet of Things in many areas is
still significantly limited by information security
problems. However, the thorough analysis of the
situation, achievements in this filed and the
recommendations submitted by the specialists will
help address these issues, promote further practice-
based implementation of this technology.
REFERENCES
Castilho, S. D., Godoy, E. P., Castilho, T. W. L., & Salmen,
A. F. (2017). Proposed model to implement high-level
information security in internet of things. 2nd
International Conference on Fog and Mobile Edge
Computing, FMEC 2017, pages 165-170.
doi:10.1109/FMEC.2017.7946425
Evsutin, O. O., Kokurina, A. S., and Meshcheryakov, R. V.
(2019). A review of methods of embedding information
in digital objects for security in the internet of things.
Computer Optics, 43(1): 137-154. doi:10.18287/2412-
6179-2019-43-1-137-154
Hong, S., Park, S., Park, L. W., Jeon, M., & Chang, H.
(2018). An analysis of security systems for electronic
information for establishing secure internet of things
environments: Focusing on research trends in the
security field in south korea. Future Generation
Computer Systems, 82: 769-782.
doi:10.1016/j.future.2017.10.019
Huang, M. (2011). Research on information security
evaluation of internet of things electronic commerce
based on AHP.
doi:10.4028/www.scientific.net/AMR.217-218.1355
Irshad, M. (2017). A systematic review of information
security frameworks in the internet of things (IoT).
Proceedings - 18th IEEE International Conference on
INFSEC 2021 - International Scientific and Practical Conference on Computer and Information Security
138