150 likes | 212 Views
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI. THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF ENSURING. R. Nasimov. IoT architecture. Smart home s. Smart homes ecosystem. A Smart home platform integrates a set of:. Sensor devices ;
E N D
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF ENSURING R.Nasimov
Smart homes ecosystem A Smart home platform integrates a set of: • Sensor devices; • Network devices; • Utilities; • Different applications; • Different protocols; • Operating system; • Additional software; • Related remote services.
Current position of IoT based environment • The number of IoT based DDoS attacks have been increasing since last years; • The damage was $3 trillion and this pattern will reach $6 trillion. • Moreover, HP study reveals that 70% of IoT devices vulnerable to attack that’s why criminals love IoT devices to attack them; • There just aren't great solutions in the market today; • Although device manufacturers "can't provide perfect security
Common threats to smart home Smart home has different elements as well as different and unpredictable threat and attacks.
Ensuring methods from attacks and threats • Security policy must be created for smart home enviroment; • There must be good collaboration among vendors, software developers, researchers, service providers and operators; • On demand identification methods between devices and between users and devices; • One initial step is educating consumers about the steps they can take to secure their devices and home networks; • Cryptographic infrastructure has to be created; • If good secure ecosystem can’t be created not only information or devices but also the whole family become under threat and under attacks. • There must be a monitoring identitiesto control, management and monitor home area ecosystem to prevent attacks and threats;
Using cryptography for smart home environment Cryptography aims at many protection measures to protect data confidentiality and integrity rely on cryptographic functions. In a broad definition, cryptography support for security must include user’s protection and authentication, data protection and the cryptographic infrastructure. For example, such a support may implement: • For authentication primitives: • ouser/entity authentication; • message authentication and integrity. • For data protection: • symmetric or asymmetric encryption; • hash functions; • digital signature. • For cryptographic infrastructure: • random number generation; • key management.
Conclusion • Since home network consists of heterogeneous network protocols and contains existing security threats and holes of Internet such as hacking, malicious codes, worms, viruses, DoS attacks and eavesdropping, due to connections to the open network; • On demand cryptographicauthorization mechanism should be applied that it identifies, authenticates, authorizes all kind of devices and home owners and provides information security. • Also, no smooth collaboration between all developers and consumers. This issue must be properly applied.