Abstract

At present, the Internet market of things is constantly expanding; it has covered almost all the most important areas: transport, housing and communal services, industry, agriculture, telecommunications and information technology. In connection with the constant increase in the number of attacks on IoT-devices, the issue of standardization of this technology is quite acute. The features of the of existing solutions and the new proposed Russian NB-Fi standard for IoT are presented in this article from the point of view of information security.

Highlights

  • At present, the Internet market of things is constantly expanding; it has covered almost all the most important areas: transport, housing and communal services, industry, agriculture, telecommunications and information technology

  • The features of the of existing solutions and the new proposed Russian NB-Fi standard for IoT are presented in this article from the point of view of information security

  • Attacks performed on IoT devices can be classifying according to their purpose: 1. Attacks aimed at causing physical harm to the user Examples of such attacks may be the car intelligent control system hacking to take it out of control and harm the driver or passenger; the disabling of medical life support equipment; breaking a smart car wash in order to block the owner's exit from the car and others

Read more

Summary

Introduction

The Internet market of things is constantly expanding; it has covered almost all the most important areas: transport, housing and communal services, industry, agriculture, telecommunications and information technology. One of the largest botnets that caused much damage was Mirai, later appeared Satori and his successor, Reaper Such large-scale attacks became possible due to the fact, that many users did not change the standard passwords in their devices, not taking into account the need to protect them. Old vulnerabilities, such as the vulnerability of CVE-2014-8361 in Realtek devices, as well as the 2012 vulnerability, which allows to detect the configuration of Serial-to-Ethernet converters, including Telnet-password, through a request to port 30718, are not eliminated This vulnerability directly affects the industrial Internet of things (IIoT) - serial interface converters underlie many systems that allow the operator of industrial equipment to remotely monitor its state, change settings and manage modes Started [1]. - Botnet - Spamming - Other purposes root admin test access DUP root DUP admin ubnt oracle postgres pi

Communication technology
New Russian standard and security
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.