Abstract
This paper comprises the development and implementation of systems using the concept of Internet of Things. Due to the active development of industries using the concept of the Internet of Things, the information security problem is getting more and more important. To create a protected module of information-telecommunication system which implements the Internet of Things concept, it is important to take into account all its aspects. To determine relevant threats, it is necessary to use the detailed risk analysis according to existing standards. Then choosing protection measures, one must rely on identified relevant threats. Actual threats and necessary protective actions are determined in this paper for implementation of Smart House computer appliance module, in order to develop a protected part of Smart House, which is necessary for realization of room access control. We solved the following tasks in the work, namely, description of the Smart Home system; description of steps and security evaluation of Smart Home; implementation of hardware assembly and writing a code for the selected fragment of the system; safety evaluation of the selected fragment of Smart House and identification of actual threats; making recommendations to counter threats; software implementation of one of the most important threats and software implementation of protective measures for the selected threat. The key peculiarity of the work is an integrated approach to the design by the use of specific intruder models, analysis of the system’s assets and evaluation of their security.
Similar content being viewed by others
REFERENCES
Morgan, S., Internet Trends: 2007. http://www.slideshare.net/rmesquita/morgan-stanley-technology-internet-trends.
GOST R ISO/MEK TO 13335-3-2007: Information Technology. Security Methods and Tools. Part 3. Information technology Security Management Methods, 2007. http://ohranatruda.ru/ot_biblio/normativ/data_normativ/51/51065.html.
GOST R ISO/MEK 13335-1-2006: Security Methods and Tools. Part 1. Concepts and Models for Information and Communications Technology Security Management, 2006. http://www.gosthelp.ru/gost/gost271.html.
Richardson, M., Wallace, S., and Wallace, S.P., Getting Started with Raspberry Pi, O’Reilly Media, Inc., 2012.
Lutts, M., Programmirovanie na Python (Programming with Python), Simvol-Plyus, 2011, vol. 2.
Abraham, D.G., Dolan, G.M., and Double, G.P., Transaction security system, IBM Syst. J., 1991, vol. 30, no. 2, pp. 230–243.
Desnitskii, V.A. and Chechulin, A.A., A generalized intruder model and verification of information and telecommunication systems with integrated devices, Tekh. Nauki Teor. Prakt., 2014, no. 39, pp. 7–21.
Funding
This research was financially supported by grants of RFBR (project nos. 16-37-50035, 14-07-00697, 14-07-00417, 19-07-00953, 16-29-09482ofi_m, and 16-37-50035).
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors declare that they have no conflicts of interest.
About this article
Cite this article
Alexandrov, V.A., Desnitsky, V.A. & Chaly, D.Y. Design and Security Analysis of a Fragment of Internet of Things Telecommunication System. Aut. Control Comp. Sci. 53, 851–856 (2019). https://doi.org/10.3103/S0146411619070241
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411619070241