Skip to main content

Analysis of Security Problems in Groups of Intelligent Sensors

  • Conference paper
  • First Online:
Advances in Swarm Intelligence (ICSI 2021)

Abstract

Today, the creation of intelligent sensors became possible due to the development of the hardware base, the use of small boards, where the processor, memory, and network interfaces can be placed. Examples of such cards can be Raspberry Pi, Arduino, and others. These devices can be used to connect various sensors to them depending on the tasks. Today, there are many protocols for the exchange of messages between such sender devices, which ultimately leads to the creation of distributed networks with distributed functionality. Such systems can be decision-making and are like swarm intelligence, where each device performs its functions, but together they are a single system. This study will examine the information security issues of such systems. An analysis of threats and vulnerabilities for intelligent sensor systems was carried out. Demonstrated an attack on the secure ZigBee protocol, which is often used to create a network between smart sensors. The use of lightweight cryptography to minimize risks is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Educational portal Geekbrains Homepage. https://geekbrains.ru/posts/what_is_iot. Accessed 02 Dec 2020

  2. Yanovsky, G.: Assessment of voice quality in IP networks. Newsletter In 2, 91–94 (2018)

    Google Scholar�

  3. Evans, D.: The Internet of Things. How the Next Evolution of the Internet Is Changing Everything

    Google Scholar�

  4. Chernyak, L.: Platform of the Internet of Things. Open systems. DBMS, No. 7 (2012). Open Systems. Accessed 05 Dec 2020

    Google Scholar�

  5. Quackenbush, S.R., Barnwell, T.P., Clements M.A.: Objective Measures of Speech Quality. Prentice Hall (1988)

    Google Scholar 

  6. Disruptive Civil Technologies. Six Technologies with Potential Impacts on US Interests out to 2025

    Google Scholar 

  7. Coetzee, L., Olivrin, G.: Inclusion through the Internet of Things. In: Cheein, A. (ed.) Assistive Technologies, IntechOpen, Rijeka (2012)

    Google Scholar 

  8. Baker, B., Xiang, W., Atkinson, I.: Internet of Things for smart healthcare: technologies, challenges, and opportunities IEEE Access 5, 26521–26544 (2017)

    Google Scholar 

  9. Lin, H., Bergmann, N.W.: IoT Privacy and security challenges for smart home environments. Information 7(3), 44 (2016). https://doi.org/10.3390/info7030044

    Article  Google Scholar 

  10. Singh, S., Sharma, P.K., Moon, S.Y., Park, J.H.: Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J. Ambient Intell. Humanized Comput. 1–18 (2017). https://doi.org/10.1007/s12652-017-0494-4

  11. Weber, M, Boban, M.: Security challenges of the Internet of Things In: 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 638–643. IEEE, Opatija (2016)

    Google Scholar 

  12. Ali, B., Awad, A.I.: Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18(3), 1–17 (2018)

    Article  Google Scholar 

  13. Forsström, S., Butun, I., Eldefrawy, M., Jennehag, U., Gidlund, M.: Challenges of securing the industrial internet of things value chain In: 2018 Workshop on Metrology for Industry 4.0 and IoT, pp. 218–223. IEEE, Brescia (2018)

    Google Scholar 

  14. Feng, W., Qin, Y., Zhao, S., Feng, D.: Aaot: lightweight attestation and authentication of low-resource things in IoT and cps. Comput. Netw. 134, 167–182 (2018)

    Article  Google Scholar 

  15. Keoh, S.L., Kumar, S.S., Tschofenig, H.: Securing the Internet of Things: a standardization perspective. IEEE Internet Things J. 1(3), 265–275 (2014)

    Article  Google Scholar 

  16. Mano, Y., Faial, B., Nakamura, V., Gomes, H., Libralon, L., Meneguete, I., et al.: Exploiting IoT technologies for enhancing Health Smart Homes through patient identification and emotion recognition. Comput. Sci. (2016). https://doi.org/10.1016/j.comcom.2016.03.010

    Article  Google Scholar�

  17. Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R.P., Ni, W.: Anatomy of threats to the Internet of Things. IEEE Commun. Surv. Tutor. 21(2), 1636–1675 (2019). SECOND QUARTER

    Google Scholar 

  18. Shachar, S., et al.: Security test bed for Internet-of-Things devices. IEEE Trans. Reliab. 68(1), 23–44 (2019)

    Article  MathSciNet  Google Scholar 

  19. Atamli, A.W., Martin, A.: Threat-based Security analysis for the Internet of Things. In: International Workshop on Secure Internet of Things, pp. 36–43 (2014)

    Google Scholar 

  20. Zhou, W., Yu, B.: A cloud-assisted malware detection and suppression framework for wireless multimedia system in IoT based on dynamic differential game. China Commun. 209–223 (2018)

    Google Scholar 

  21. Sandy Carielli (Entrust Datacard), Matt Eble (Praetorian), Frederick Hirsch (Fujitsu), Ekaterina Rudina (Kaspersky), Ron Zahavi (Microsoft). IoT Security Maturity Model: Practitioner’s Guide Version 1.0 129 p. (2019)

    Google Scholar 

  22. National Institute of Standards and Technology. Framework for Improving Critical Infrastructure Cybersecurity .Version 1.1. 16 April (2018). 55 p

    Google Scholar 

  23. Jurafsky, D., Martin, J.: Speech and Language Processing, 2nd Edition, 2nd edn. Prentice Hall, Upper Saddle River (2008)

    Google Scholar 

  24. Mano, L.Y., Faiçal, B.S., Nakamura, L.H.V., Gomes, P.H., Libralon, G.L., et al.: Exploiting IoT technologies for enhancing Health Smart Homes through patient identification and emotion recognition. Comput Commun. 89–90, 178–190 (2016)

    Article  Google Scholar 

  25. Mohd, B.J., Hayajneh, T.: Lightweight block ciphers for IoT: energy optimization and survivability techniques, IEEE Access 6, 35 966–35 978 (2018)

    Google Scholar 

  26. McKay, K., Bassham, L., Turan, M.S., Mouha, N.: Report on lightweight cryptography (nistir8114), National Institute of Standards and Technology (NIST), (2017)

    Google Scholar 

  27. Toshihiko, O.: Lightweight cryptography applicable to various IoT devices. NEC Tech. J. 12(1), 67–71 (2017)

    Google Scholar 

  28. Research Gate [Electronic resource], https://www.researchgate.net/publication/342434954_Lightweight_Cryptography_for_IoT_A_State-of-the-Art. Accessed 03 Dec 2020

  29. Panasenko, S.: Encryption algorithms. Special reference book. SPb.: BHV-Petersburg (2009)

    Google Scholar 

  30. Federal Information Processing Standards Publication 197 (FIPS PUB 197). Specification for the Advanced Encryption Standard (AES). // Department of Commerce, National Institute of Standards and Technology, Information Technology Laboratory, 26 November (2001)

    Google Scholar 

  31. Perspectives of System Informatics: 12th International Andrei P. Ershov Informatics Conference, PSI 2019, Novosibirsk, Russia, 2–5 July 2019, Revised Selected Papers/Bjørner N., Virbitskaite I., Voronkov A. - Springer International Publishing, –P. 249. – (Theoretical Computer Science and General Issues). - ISBN 978-3-030-37486-0 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maria Lapina .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

� 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Grigoryan, K., Olefirenko, E., Basan, E., Lapina, M., Mecella, M. (2021). Analysis of Security Problems in Groups of Intelligent Sensors. In: Tan, Y., Shi, Y. (eds) Advances in Swarm Intelligence. ICSI 2021. Lecture Notes in Computer Science(), vol 12689. Springer, Cham. https://doi.org/10.1007/978-3-030-78743-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78743-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78742-4

  • Online ISBN: 978-3-030-78743-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics