Urban and suburban transport intelligent management. Textbook - страница 8

Шрифт
Интервал


It is worth noting that with the development of IoT, it is necessary to guarantee sufficient security of solutions, since they operate with a large amount of confidential data that directly affects the most important production processes. For this purpose, measures are carried out aimed at:

– Security of devices and sensors. Device security is implemented through device authentication, partial message encryption, and sensor firmware updates.;

– Connection protection. Ensuring the confidentiality of data and their protection from unauthorized modification is necessary when transferring data between the device and the IoT platform. Here the protection is based on Transport Layer Security (TLS) technology. At the same time, the data is encrypted to prevent unauthorized listening and understanding of the content.

1.1.3 Authentication as an important factor of the Internet of Things

It is necessary to ensure the following security properties of Internet of Things devices:

1) a reliable access and authentication system based on cryptography. Encryption is necessary to protect communication between iOS devices, and cryptographic device identifiers are needed for this. You need to make sure that only authorized users have access to connected devices;

2) cryptographic security of the software. Using the PKI system to sign the code and verify its authenticity;

3) software updates throughout the entire lifecycle of devices.

From the point of view of ensuring the security of Yota networks should be provided:

1) cryptographic data protection;

2) the absence of critical dependencies on connectivity. Maintaining critical functionality by the system even in the absence of communication;

3) creating an additional device specification that describes in detail the required security policy for a specific device. [31]

The security of the cloud platform is ensured by:

1) control of access to device resources. The application declares a set of resources that it would like to access, while the platform provides a list of devices with these resources. Accordingly, the user gets the opportunity to choose which devices and their capabilities this application can have access to, thereby authorizing the application.;

2) two-factor user authentication technology to increase the level of security;