INTERNET - BUYUMLAR IOT AFZALLIKLARI VA XAVFSIZLIK MUAMMOLARI

Authors

  • Akbar Doniyorovich Normurodov
  • Alisher Bahodirovich Rustamov

Keywords:

Narsalar Interneti (IoT) texnologiyalari, raqamli texnologiyalar, Internet, tarmoq, kiberxavfsizlik, kibertahdid, simsiz aloqa, aqlli texnologiyalar, IoT gadjetlari, identifikatsiya, Intrusion Detection System (IDS), ma’lumotlar maxfiyligi.

Abstract

Bugungi kunda barchamizga ma’lumki raqamli texnologiyalar barcha sohalarni rivojlanishida muhim ahamiyat kasb etish bilan birgalikda, mintaqalarni takomillashtirish, rivojlantirish uchun ham muhim qadamlardan biri bo‘lmoqda. Bu esa sohalarda elektron xizmatlardan foydalanish orqali rivojlanib borishini ta’minlamoqda. Shu jumladan, Narsalar Interneti (IoT) texnologiyalarini keng qo‘llanilishi tufayli tashkilotlar keng ko‘lamli imkoniyatlarga ega bo‘lishi bilan birgalikda salbiy oqibatlarga ham duch kelishmoqda va o‘z imkoniyatlaridan kelib chiqib tizim xavfsizligiga ham katta e’tibor qaratishlari muhim masalalardan biriga aylanib bormoqda. Ushbu maqolada Internet - buyumlar IoT (Internet of Things) afzalliklari va xavfsizlik muammolari haqida fikr mulohazalar yuritilgan.

References

Amin, F.; Abbasi, R.; Rehman, A.; Choi, G.S. An Advanced Algorithm for Higher Network Navigation in Social Internet of Things Using Small-World Networks. Sensors 2019, 19, 2007. [Google Scholar] [CrossRef] [PubMed]

Patel, K.K.; Patel, S.M.; Scholar, P. Internet of things-IOT: Definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 2016, 6, 6122–6131. [Google Scholar]

Hammoudi, S.; Aliouat, Z.; Harous, S. Challenges and research directions for Internet of Things. Telecommun. Syst. 2018, 67, 367–385. [Google Scholar] [CrossRef]

Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645– 1660. [Google Scholar] [CrossRef]

Taherdoost, H. Blockchain-Based Internet of Medical Things. Appl. Sci. 2023, 13, 1287. [Google Scholar] [CrossRef]

Chaudhary, S.; Johari, R.; Bhatia, R.; Gupta, K.; Bhatnagar, A. CRAIoT: Concept, review and application (s) of IoT. In Proceedings of the 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 18–19 April 2019; pp. 1–4. [Google Scholar]

Thakor, V.A.; Razzaque, M.A.; Khandaker, M.R.A. Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities. IEEE Access 2021, 9, 28177–28193. [Google Scholar] [CrossRef]

Mrabet, H.; Belguith, S.; Alhomoud, A.; Jemai, A. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors 2020, 20, 3625. [Google Scholar] [CrossRef]

Hamad, S.A.; Sheng, Q.Z.; Zhang, W.E.; Nepal, S. Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies. IEEE Commun. Surv. Tutor. 2020, 22, 1372–1391. [Google Scholar] [CrossRef]

Harbi, Y.; Aliouat, Z.; Harous, S.; Bentaleb, A.; Refoufi, A. A Review of Security in Internet of Things. Wirel. Pers. Commun. 2019, 108, 325–344. [Google Scholar] [CrossRef]

Adat, V.; Gupta, B.B. Security in Internet of Things: Issues, challenges, taxonomy, and architecture. Telecommun. Syst. 2018, 67, 423–441. [Google Scholar] [CrossRef]

Noor, M.B.M.; Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 2019, 148, 283–294. [Google Scholar] [CrossRef]

Neshenko, N.; Bou-Harb, E.; Crichigno, J.; Kaddoum, G.; Ghani, N. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations. IEEE Commun. Surv. Tutor. 2019, 21, 2702–2733. [Google Scholar] [CrossRef]

Narayanan, U.; Paul, V.; Joseph, S. Decentralized blockchain based authentication for secure data sharing in Cloud-IoT: DeBlock-Sec. J. Ambient Intell. Humaniz. Comput. 2021, 13, 769–787. [Google Scholar] [CrossRef]

Ahmed, M.I.; Kannan, G. Cloud-Based Remote RFID Authentication for Security of Smart Internet of Things Applications. J. Inf. Knowl. Manag. 2021, 20, 2140004. [Google Scholar] [CrossRef]

Kumar, P.; Chouhan, L. A privacy and session key based authentication scheme for medical IoT networks. Comput. Commun. 2021, 166, 154–164. [Google Scholar] [CrossRef]

Usmanova, N. B., Mirzayev, D. A., Ergashev, F. A., & Yunusova, D. A. (2023). Field monitoring application based on video surveillance: Evaluation of system performance. In E3S Web of Conferences (Vol. 443, p. 06016). EDP Sciences.

Anuradha, M.; Jayasankar, T.; Prakash, N.; Sikkandar, M.Y.; Hemalakshmi, G.; Bharatiraja, C.; Britto, A.S.F. IoT enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocess. Microsyst. 2021, 80, 103301. [Google Scholar] [CrossRef]

Irshad, A.; Usman, M.; Chaudhry, S.A.; Bashir, A.K.; Jolfaei, A.; Srivastava, G. Fuzzy- in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server. IEEE Trans. Reliab. 2020, 70, 1014–1025. [Google Scholar] [CrossRef]

Chaudhry, S.A.; Farash, M.S.; Kumar, N.; Alsharif, M.H. PFLUA-DIoT: A pairing free lightweight and unlinkable user access control scheme for distributed IoT environments. IEEE Syst. J. 2020, 16, 309–316. [Google Scholar] [CrossRef]

Mishra, N.; Pandya, S. Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review. IEEE Access 2021, 9, 59353–59377. [Google Scholar] [CrossRef]

Hameed, A.; Alomary, A. Security issues in IoT: A survey. In Proceedings of the 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), Sakhier, Bahrain, 22–23 September 2019; pp. 1–5. [Google Scholar]

Lu, Y.; Da Xu, L. Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics. IEEE Internet Things J. 2019, 6, 2103–2115. [Google Scholar] [CrossRef]

Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]

Jurcut, A.; Niculcea, T.; Ranaweera, P.; Le-Khac, N.-A. Security Considerations for Internet of Things: A Survey. SN Comput. Sci. 2020, 1, 1–19. [Google Scholar] [CrossRef]

Kouicem, D.E.; Bouabdallah, A.; Lakhlef, H. Internet of things security: A top-down survey. Comput. Netw. 2018, 141, 199–221. [Google Scholar] [CrossRef]

Downloads

Published

2023-11-10