TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD
- Slides: 11
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF ENSURING R. Nasimov
Io. T architecture
Smart homes
Smart homes ecosystem A Smart home platform integrates a set of: • Sensor devices; • Network devices; • Utilities; • Different applications; • Different protocols; • Operating system; • Additional software; • Related remote services.
Current position of Io. T based environment - The number of Io. T based DDo. S attacks have been increasing since last years; - The damage was $3 trillion and this pattern will reach $6 trillion. - Moreover, HP study reveals that 70% of Io. T devices vulnerable to attack that’s why criminals love Io. T devices to attack them; - There just aren't great solutions in the market today; - Although device manufacturers "can't provide perfect security
Common threats to smart home Smart home has different elements as well as different and unpredictable threat and attacks.
Main requirements for smart homes
Ensuring methods from attacks and threats • Security policy must be created for smart home enviroment; • There must be good collaboration among vendors, software developers, researchers, service providers and operators; • On demand identification methods between devices and between users and devices; • One initial step is educating consumers about the steps they can take to secure their devices and home networks; • Cryptographic infrastructure has to be created; • If good secure ecosystem can’t be created not only information or devices but also the whole family become under threat and under attacks. • There must be a monitoring identities to control, management and monitor home area ecosystem to prevent attacks and threats;
Using cryptography for smart home environment Cryptography aims at many protection measures to protect data confidentiality and integrity rely on cryptographic functions. In a broad definition, cryptography support for security must include user’s protection and authentication, data protection and the cryptographic infrastructure. For example, such a support may implement: • For authentication primitives: • ouser/entity authentication; • message authentication and integrity. • For data protection: • symmetric or asymmetric encryption; • hash functions; • digital signature. • For cryptographic infrastructure: • random number generation; • key management.
Conclusion • Since home network consists of heterogeneous network protocols and contains existing security threats and holes of Internet such as hacking, malicious codes, worms, viruses, Do. S attacks and eavesdropping, due to connections to the open network; • On demand cryptographic authorization mechanism should be applied that it identifies, authenticates, authorizes all kind of devices and home owners and provides information security. • Also, no smooth collaboration between all developers and consumers. This issue must be properly applied.
THANK YOU FOR YOUR ATTENTION!
- Tashkent information technology university
- After me after me after me
- If any man comes after me
- Dua e sabah
- Attahiyyatu
- Maro tashkent
- Tashkent medical academy fee structure
- Tashkent institute of textile and light industry
- Toy named after president
- Juno awards history
- Diode i-v characteristics
- The rogerian argument model is named after