TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD

  • Slides: 11
Download presentation
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A

TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF ENSURING R. Nasimov

Io. T architecture

Io. T architecture

Smart homes

Smart homes

Smart homes ecosystem A Smart home platform integrates a set of: • Sensor devices;

Smart homes ecosystem A Smart home platform integrates a set of: • Sensor devices; • Network devices; • Utilities; • Different applications; • Different protocols; • Operating system; • Additional software; • Related remote services.

Current position of Io. T based environment - The number of Io. T based

Current position of Io. T based environment - The number of Io. T based DDo. S attacks have been increasing since last years; - The damage was $3 trillion and this pattern will reach $6 trillion. - Moreover, HP study reveals that 70% of Io. T devices vulnerable to attack that’s why criminals love Io. T devices to attack them; - There just aren't great solutions in the market today; - Although device manufacturers "can't provide perfect security

Common threats to smart home Smart home has different elements as well as different

Common threats to smart home Smart home has different elements as well as different and unpredictable threat and attacks.

Main requirements for smart homes

Main requirements for smart homes

Ensuring methods from attacks and threats • Security policy must be created for smart

Ensuring methods from attacks and threats • Security policy must be created for smart home enviroment; • There must be good collaboration among vendors, software developers, researchers, service providers and operators; • On demand identification methods between devices and between users and devices; • One initial step is educating consumers about the steps they can take to secure their devices and home networks; • Cryptographic infrastructure has to be created; • If good secure ecosystem can’t be created not only information or devices but also the whole family become under threat and under attacks. • There must be a monitoring identities to control, management and monitor home area ecosystem to prevent attacks and threats;

Using cryptography for smart home environment Cryptography aims at many protection measures to protect

Using cryptography for smart home environment Cryptography aims at many protection measures to protect data confidentiality and integrity rely on cryptographic functions. In a broad definition, cryptography support for security must include user’s protection and authentication, data protection and the cryptographic infrastructure. For example, such a support may implement: • For authentication primitives: • ouser/entity authentication; • message authentication and integrity. • For data protection: • symmetric or asymmetric encryption; • hash functions; • digital signature. • For cryptographic infrastructure: • random number generation; • key management.

Conclusion • Since home network consists of heterogeneous network protocols and contains existing security

Conclusion • Since home network consists of heterogeneous network protocols and contains existing security threats and holes of Internet such as hacking, malicious codes, worms, viruses, Do. S attacks and eavesdropping, due to connections to the open network; • On demand cryptographic authorization mechanism should be applied that it identifies, authenticates, authorizes all kind of devices and home owners and provides information security. • Also, no smooth collaboration between all developers and consumers. This issue must be properly applied.

THANK YOU FOR YOUR ATTENTION!

THANK YOU FOR YOUR ATTENTION!