This email address is being protected from spambots. You need JavaScript enabled to view it.
 
+7 (4912) 72-03-73
 
Интернет-портал РГРТУ: https://rsreu.ru

UDC 004.056.53

MODELS AND TECHNOLOGIES OF INTERNET OF THINGS SECURE NETWORK CONSTRUCTION

S. A. Lesko, Ph.D. (Tech.), associate professor of KB-3 department «System Control and Modeling» RTU MIREA, Moscow, Russia;
orcid.org/0000-0002-6641-1609, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
D. O. Zhukov, Dr. Sc. (Tech.), KB-8 «Information Confrontation» Department, RTU MIREA, Moscow, Russia;
orcid.org/0000-0002-1211-5214, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
P. Yu. Pushkin, Ph.D. (Tech.), Head of KB-3 «System Control and Modeling» Department, RTU MIREA, Moscow, Russia;
orcid.org/0000-0003-3684-550X, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

The widespread adoption of modern Internet of Things (IoT) technologies will largely be based on information security, as well as protecting data privacy. This turns out to be a rather complicated problem in IoT due to the deployment and mobility features. Since IoT allows many persistent things to be tracked and linked, a large amount of personal information can be automatically collected and processed. Protection of privacy in IoT will become more serious than in a traditional network, since the number of vectors of attacks on IoT devices (things) will be knowingly greater. Many of the existing technologies at the moment are available for domestic use, and are not suitable for industrial applications, in which high demands are placed on information security. The article discusses the mechanisms for implementing attacks in IoT, security requirements, as well as the construction of a secure architecture and the use of key security technologies (encryption mechanisms, communication security and cryptographic algorithms).

Key words: Internet of Things (IoT), IoT security threats, security requirements, building a secure architecture, encryption mechanisms, ensuring communication security, cryptographic algorithms.

 Download