1 / 11

TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI

TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI. THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF ENSURING. R. Nasimov. IoT architecture. Smart home s. Smart homes ecosystem. A Smart home platform integrates a set of:. Sensor devices ;

craigb
Download Presentation

TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF ENSURING R.Nasimov

  2. IoT architecture

  3. Smart homes

  4. Smart homes ecosystem A Smart home platform integrates a set of: • Sensor devices; • Network devices; • Utilities; • Different applications; • Different protocols; • Operating system; • Additional software; • Related remote services.

  5. Current position of IoT based environment • The number of IoT based DDoS attacks have been increasing since last years; • The damage was $3 trillion and this pattern will reach $6 trillion. • Moreover, HP study reveals that 70% of IoT devices vulnerable to attack that’s why criminals love IoT devices to attack them; • There just aren't great solutions in the market today; • Although device manufacturers "can't provide perfect security

  6. Common threats to smart home Smart home has different elements as well as different and unpredictable threat and attacks.

  7. Main requirements for smart homes

  8. Ensuring methods from attacks and threats • Security policy must be created for smart home enviroment; • There must be good collaboration among vendors, software developers, researchers, service providers and operators; • On demand identification methods between devices and between users and devices; • One initial step is educating consumers about the steps they can take to secure their devices and home networks; • Cryptographic infrastructure has to be created; • If good secure ecosystem can’t be created not only information or devices but also the whole family become under threat and under attacks. • There must be a monitoring identitiesto control, management and monitor home area ecosystem to prevent attacks and threats;

  9. Using cryptography for smart home environment Cryptography aims at many protection measures to protect data confidentiality and integrity rely on cryptographic functions. In a broad definition, cryptography support for security must include user’s protection and authentication, data protection and the cryptographic infrastructure. For example, such a support may implement: • For authentication primitives: • ouser/entity authentication; • message authentication and integrity. • For data protection: • symmetric or asymmetric encryption; • hash functions; • digital signature. • For cryptographic infrastructure: • random number generation; • key management.

  10. Conclusion • Since home network consists of heterogeneous network protocols and contains existing security threats and holes of Internet such as hacking, malicious codes, worms, viruses, DoS attacks and eavesdropping, due to connections to the open network; • On demand cryptographicauthorization mechanism should be applied that it identifies, authenticates, authorizes all kind of devices and home owners and provides information security. • Also, no smooth collaboration between all developers and consumers. This issue must be properly applied.

  11. THANK YOU FOR YOUR ATTENTION!

More Related