Design and security analysis of a fragment of Internet of Things telecommunication system
Modelirovanie i analiz informacionnyh sistem, Tome 23 (2016) no. 6, pp. 767-776.

Voir la notice de l'article provenant de la source Math-Net.Ru

This paper comprises the development and implementation of systems using the concept of Internet of Things. In terms of active development of industries, use the concept of the Internet of Things, the information security problem is urgent. To create a protected module of information-telecommunication system which implements the Internet of Things concept, it is important to take into account all its aspects. To determine relevant threats, it is necessary to use the detailed risk analysis according to existing GOST standards when choosing protection measures, one must rely on identified relevant threats. Actual threats and necessary protective actions are determined in this paper for implementation of Smart House computer appliance module, in order to develop a protected part of Smart House, which is necessary for realization of room access control. We solved the following tasks in the work, namely, a description of the system Smart Home, a description of steps and evaluation system security Smart Home; implementation of hardware assembly and writing a code for the selected fragment of the system; safety evaluation of the selected fragment Smart House and identification of actual threats; make recommendations to counter current threats; software implementation of one of the most urgent threats and software implementation of protective measures for a selected threat. A feature of the work is an integrated approach to the design with the use of the intruder models, analysis of the system's assets and evaluation of their security.
Keywords: Internet of Things, information security.
@article{MAIS_2016_23_6_a7,
     author = {V. A. Alexandrov and V. Desnitsky and D. Yu. Chaly},
     title = {Design and security analysis of a fragment of {Internet} of {Things} telecommunication system},
     journal = {Modelirovanie i analiz informacionnyh sistem},
     pages = {767--776},
     publisher = {mathdoc},
     volume = {23},
     number = {6},
     year = {2016},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/MAIS_2016_23_6_a7/}
}
TY  - JOUR
AU  - V. A. Alexandrov
AU  - V. Desnitsky
AU  - D. Yu. Chaly
TI  - Design and security analysis of a fragment of Internet of Things telecommunication system
JO  - Modelirovanie i analiz informacionnyh sistem
PY  - 2016
SP  - 767
EP  - 776
VL  - 23
IS  - 6
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/MAIS_2016_23_6_a7/
LA  - ru
ID  - MAIS_2016_23_6_a7
ER  - 
%0 Journal Article
%A V. A. Alexandrov
%A V. Desnitsky
%A D. Yu. Chaly
%T Design and security analysis of a fragment of Internet of Things telecommunication system
%J Modelirovanie i analiz informacionnyh sistem
%D 2016
%P 767-776
%V 23
%N 6
%I mathdoc
%U http://geodesic.mathdoc.fr/item/MAIS_2016_23_6_a7/
%G ru
%F MAIS_2016_23_6_a7
V. A. Alexandrov; V. Desnitsky; D. Yu. Chaly. Design and security analysis of a fragment of Internet of Things telecommunication system. Modelirovanie i analiz informacionnyh sistem, Tome 23 (2016) no. 6, pp. 767-776. http://geodesic.mathdoc.fr/item/MAIS_2016_23_6_a7/

[1] Morgan S., Internet Trends: 2007, http://www.slideshare.net/rmesquita/morgan-stanley-technology-internet-trends

[2] Informacionnaja tehnologija. Metody i sredstva obespechenija bezopasnosti. Chast 3. Metody menedzhmenta bezopasnosti informacionnyh tehnologij, GOST R ISO/MJeK TO 13335-3-2007, 2007 (in Russian)

[3] Information technology. Security techniques. Part 1. Concepts and models for information and communications technology security management, GOST R ISO/MJeK TO 13335-1-2006, 2006 (in Russian)

[4] Richardson M., Uolles S., Zavodim Raspberry Pi, Amperka, 2013, 230 pp. (in Russian)

[5] Lutc M., Programmirovanie na Python, v. 2, Simvol-Pljus, 2011, 992 pp. (in Russian)

[6] Abraham D. G., Dolan G. M., Double G. P., “Transaction Security System”, IBM Systems Journal, 30:2 (1991), 230–243 | DOI

[7] Desnitsky V. A., Chechulin A. A., “Obobshhennaja model narushitelja i verifikacija informacionno-telekommunikacionnyh sistem so vstroennymi ustrojstvami”, Tehnicheskie nauki — ot teorii k praktike, 39, NP “SibAK”, 2014, 7–21 (in Russian)