Abstract
Today, the creation of intelligent sensors became possible due to the development of the hardware base, the use of small boards, where the processor, memory, and network interfaces can be placed. Examples of such cards can be Raspberry Pi, Arduino, and others. These devices can be used to connect various sensors to them depending on the tasks. Today, there are many protocols for the exchange of messages between such sender devices, which ultimately leads to the creation of distributed networks with distributed functionality. Such systems can be decision-making and are like swarm intelligence, where each device performs its functions, but together they are a single system. This study will examine the information security issues of such systems. An analysis of threats and vulnerabilities for intelligent sensor systems was carried out. Demonstrated an attack on the secure ZigBee protocol, which is often used to create a network between smart sensors. The use of lightweight cryptography to minimize risks is proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Educational portal Geekbrains Homepage. https://geekbrains.ru/posts/what_is_iot. Accessed 02 Dec 2020
Yanovsky, G.: Assessment of voice quality in IP networks. Newsletter In 2, 91–94 (2018)
Evans, D.: The Internet of Things. How the Next Evolution of the Internet Is Changing Everything
Chernyak, L.: Platform of the Internet of Things. Open systems. DBMS, No. 7 (2012). Open Systems. Accessed 05 Dec 2020
Quackenbush, S.R., Barnwell, T.P., Clements M.A.: Objective Measures of Speech Quality. Prentice Hall (1988)
Disruptive Civil Technologies. Six Technologies with Potential Impacts on US Interests out to 2025
Coetzee, L., Olivrin, G.: Inclusion through the Internet of Things. In: Cheein, A. (ed.) Assistive Technologies, IntechOpen, Rijeka (2012)
Baker, B., Xiang, W., Atkinson, I.: Internet of Things for smart healthcare: technologies, challenges, and opportunities IEEE Access 5, 26521–26544 (2017)
Lin, H., Bergmann, N.W.: IoT Privacy and security challenges for smart home environments. Information 7(3), 44 (2016). https://doi.org/10.3390/info7030044
Singh, S., Sharma, P.K., Moon, S.Y., Park, J.H.: Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J. Ambient Intell. Humanized Comput. 1–18 (2017). https://doi.org/10.1007/s12652-017-0494-4
Weber, M, Boban, M.: Security challenges of the Internet of Things In: 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 638–643. IEEE, Opatija (2016)
Ali, B., Awad, A.I.: Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18(3), 1–17 (2018)
Forsström, S., Butun, I., Eldefrawy, M., Jennehag, U., Gidlund, M.: Challenges of securing the industrial internet of things value chain In: 2018 Workshop on Metrology for Industry 4.0 and IoT, pp. 218–223. IEEE, Brescia (2018)
Feng, W., Qin, Y., Zhao, S., Feng, D.: Aaot: lightweight attestation and authentication of low-resource things in IoT and cps. Comput. Netw. 134, 167–182 (2018)
Keoh, S.L., Kumar, S.S., Tschofenig, H.: Securing the Internet of Things: a standardization perspective. IEEE Internet Things J. 1(3), 265–275 (2014)
Mano, Y., Faial, B., Nakamura, V., Gomes, H., Libralon, L., Meneguete, I., et al.: Exploiting IoT technologies for enhancing Health Smart Homes through patient identification and emotion recognition. Comput. Sci. (2016). https://doi.org/10.1016/j.comcom.2016.03.010
Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R.P., Ni, W.: Anatomy of threats to the Internet of Things. IEEE Commun. Surv. Tutor. 21(2), 1636–1675 (2019). SECOND QUARTER
Shachar, S., et al.: Security test bed for Internet-of-Things devices. IEEE Trans. Reliab. 68(1), 23–44 (2019)
Atamli, A.W., Martin, A.: Threat-based Security analysis for the Internet of Things. In: International Workshop on Secure Internet of Things, pp. 36–43 (2014)
Zhou, W., Yu, B.: A cloud-assisted malware detection and suppression framework for wireless multimedia system in IoT based on dynamic differential game. China Commun. 209–223 (2018)
Sandy Carielli (Entrust Datacard), Matt Eble (Praetorian), Frederick Hirsch (Fujitsu), Ekaterina Rudina (Kaspersky), Ron Zahavi (Microsoft). IoT Security Maturity Model: Practitioner’s Guide Version 1.0 129 p. (2019)
National Institute of Standards and Technology. Framework for Improving Critical Infrastructure Cybersecurity .Version 1.1. 16 April (2018). 55 p
Jurafsky, D., Martin, J.: Speech and Language Processing, 2nd Edition, 2nd edn. Prentice Hall, Upper Saddle River (2008)
Mano, L.Y., Faiçal, B.S., Nakamura, L.H.V., Gomes, P.H., Libralon, G.L., et al.: Exploiting IoT technologies for enhancing Health Smart Homes through patient identification and emotion recognition. Comput Commun. 89–90, 178–190 (2016)
Mohd, B.J., Hayajneh, T.: Lightweight block ciphers for IoT: energy optimization and survivability techniques, IEEE Access 6, 35 966–35 978 (2018)
McKay, K., Bassham, L., Turan, M.S., Mouha, N.: Report on lightweight cryptography (nistir8114), National Institute of Standards and Technology (NIST), (2017)
Toshihiko, O.: Lightweight cryptography applicable to various IoT devices. NEC Tech. J. 12(1), 67–71 (2017)
Research Gate [Electronic resource], https://www.researchgate.net/publication/342434954_Lightweight_Cryptography_for_IoT_A_State-of-the-Art. Accessed 03 Dec 2020
Panasenko, S.: Encryption algorithms. Special reference book. SPb.: BHV-Petersburg (2009)
Federal Information Processing Standards Publication 197 (FIPS PUB 197). Specification for the Advanced Encryption Standard (AES). // Department of Commerce, National Institute of Standards and Technology, Information Technology Laboratory, 26 November (2001)
Perspectives of System Informatics: 12th International Andrei P. Ershov Informatics Conference, PSI 2019, Novosibirsk, Russia, 2–5 July 2019, Revised Selected Papers/Bjørner N., Virbitskaite I., Voronkov A. - Springer International Publishing, –P. 249. – (Theoretical Computer Science and General Issues). - ISBN 978-3-030-37486-0 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
� 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Grigoryan, K., Olefirenko, E., Basan, E., Lapina, M., Mecella, M. (2021). Analysis of Security Problems in Groups of Intelligent Sensors. In: Tan, Y., Shi, Y. (eds) Advances in Swarm Intelligence. ICSI 2021. Lecture Notes in Computer Science(), vol 12689. Springer, Cham. https://doi.org/10.1007/978-3-030-78743-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-78743-1_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78742-4
Online ISBN: 978-3-030-78743-1
eBook Packages: Computer ScienceComputer Science (R0)