Analysis of the current status of intelligent system "Internet of Things" and trends in the development

Main Article Content

Alla Goriushkina
https://orcid.org/0000-0002-2134-9485
Roman Korolev

Abstract

The subject of study in the article is the processes of analysis and evaluation of attack intelligent systems “Internet of Things” (IoT). The goal is to reduce the potential attacks due to the risks of intellectual functioning of the IoT systems, through the timely adoption of security measures. Objectives: the classification of attacks on all levels of intelligent systems, IoT, highlighting the main factors and their causes; the following results are obtained. The analysis of the current state of intelligent systems, IoT, analyzed all levels of functioning, and classification of hackers on the factors of their occurrence. The negative consequences negatively affecting the basic characteristics of the functioning of the IoT systems. As a result, a block diagram of attacks at all levels of the IoT. Conclusions. The article analyzes the current state of intelligent systems “Internet of Things” (IoT). It is shown that a significant increase in computer network devices connected to the network creates new opportunities for the development of modern society in the field of science and technology. However, the significant development of “Internet of Things” is directly proportional to increases the possibility of attacks in computer networks. Therefore, the scientific direction improvement of existing or development of new algorithms, models, and their implementation to ensure major safety criteria for IoT are relevant.

Article Details

How to Cite
Goriushkina, A., & Korolev, R. (2017). Analysis of the current status of intelligent system "Internet of Things" and trends in the development. Advanced Information Systems, 1(1), 34–37. https://doi.org/10.20998/2522-9052.2017.1.06
Section
Intelligent information systems
Author Biographies

Alla Goriushkina, National Technical University "Kharkiv Polytechnic Institute", Kharkiv

Candidate of Technical Sciences, Senior Lecturer of the Department of Computing Science and Programming

Roman Korolev, Ivan Kozhedub Kharkiv National Air Force University, Kharkiv

Candidate of Technical Sciences, Associate Professor of the Department of Military Use and Operation of Automated Control Systems

References

Chuankun, Wu. (2010), “A preliminary investigation on the security architecture of the Internetof Things”, Strategy and Policy Decision Research, 25(4), pp. 411–419.

Goldman, Sachs (2014), IoT Primer, The Internet of Things: Making Sense of the Next Mega-Trend, September 3, available at : http://www.goldmansachs.com/our-thinking/outlook/internet-of-things/iot-report.pdf (last accessed March 23, 2017).

International Telecommunication Union. ITU Internet reports 2005: The Internet of Things (2005), 212 p.

Ibrahim, Mashal, Osama, Alsaryrah, Tein-Yaw, Chung, Cheng-Zen, Yang, Wen-Hsing, Kuo and Dharma, P. Agrawal (2015), “Choices for interaction with things on internet and underlying issues”, Ad Hoc Networks, 28, pp. 68–90.

Jeyanthi ang N.,N.Ch.S.N. Iyengar. (2013), “Escape-on-sight: An efficient and scalable mechanism for escaping DDoS attacks in cloud computing environment”, Cybernetics and Information Technologies, 13(1), pp. 46–60.

Kang, Kai, Pang, Zhibo and Wang Cong (2013), “Security and privacy mechanism for health Internet of Things”, The Journal of China Universities of Posts and Telecommunications, 20 (Suppl. 2), pp. 64–68.

Kim Thuat Nguyen, Maryline Laurent and Nouha Oualha (2015), “Survey on secure communication protocols for the Internet of Things”, Ad Hoc Networks, 32, pp. 17–31.

Qazi Mamoon Ashraf ang Mohamed Hadi Habaebi (2015), “Autonomic schemes for threat mitigation in Internet of Things”, Journal of Network and Computer Applications, 49, pp. 112–127.

Jia, X.L., Feng, Q.Y. and Ma, C.Z. (2010) “An efficient anti-collision protocol for RFID tag identification”, IEEE Communications Letters, vol. 14, no. 11, pp.1014–1016.

Finkenzeller K. (2010), RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication, New York: Wiley. – 478 p.

Culler D {2003), “10 Emerging Technologies That Will Change the World”, Technology Review, pp. 33–49.

Lu, Y.X., Chen, T.B., Meng, Y. (2011), “Evalution guideling system and intelligent evaluation process on the Internet of Things,” American Journal of Engineering and Technology Research, vol. 11, no.9, pp.537-541.

Bang O., Choi J.H., Lee D. and Lee H. (2009), Efficient Novel Anti-collision Protocols for Passive RFID Tags, Auto-ID Labs White Paper WP-HARDWARE-050, MIT, 29 p.