National Mining University

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1002r0 July 2011 Hyangsun You, LG Electronics Inc. Submission IPv6 for ah Author: Date: July 19, 2011 NameCompanyAddressPhone .
Advertisements

Emmanouel (Manos) Varvarigos Computer Technology Institute and Press "Diophantus“, CTI Greece Gathering and Processing Energy Consumption Data from Greek.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
IEEE ZigBee. Introduction It is a control technology that works by standardizing an existing wireless networking powered by small batteries It.
Lessons Learned in Smart Grid Cyber Security
ZigBee Based Smart Meter Networks Aniqua Z. Baset CSCE 813 Internet Security, Spring 2014.
Emerging Wireless Standards Understanding the Role of IEEE & ZigBee™ in AMR & Submetering Mapping Your Future: From Data to Value AMRA 2003 International.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Smart Grid Energy Generation Renewable Energy Distributed Generation Transmission & Distribution Load Management Demand Response Electrical Vehicles Charging.
“A TECHNOLOGY WHICH MAY OVERWRITE BLUETOOTH” BY V.BHEEM REDDY BTech(CSE) 07K91A0511.
International Telecommunication Union Committed to connecting the world 4 th ITU Green Standards Week Sébastien Ziegler © September.
Pritee Parwekar. Requirements and Standards Some requirements for WSN deployment include: –Fault tolerance –Lifetime –Scalability –Real-time data.
© 2006 San Diego Gas & Electric Company. All copyright and trademark rights reserved R Water Nexus Pilot San Diego Gas & Electric January 19,
CASE STUDY VICTORIOUS SECRET. PORTO Introduction PORTO | Popularity of home automation has been increasing greatly in recent years. Number of controllable.
Santa Clara 2008 Smart Meters and Home Automation Ember Corporation Bob Gohn VP Marketing
A smart grid delivers electricity from suppliers to consumers using two-way digital technology to control appliances at consumers' homes to save energy,
Arete Technology Confidential. 2 Security Threats on IoT Arete Technology Confidential When everything goes to the Internet, changing human life, it brings.
SDN & NFV Driving Additional Value into Managed Services.
Grid Wide IoT Gateway Supports open standards and technologies, with open interfaces that provide support for proprietary gas-meter reading protocols and.
Presented by Khaled Al Otaishan
Wi-Fi Technology.
Broadband Challenges 2017 Christopher Tamarin
Asset Performance Management
The Internet of Things for Health Care
Jordan Population and Housing Census 2015
Internet Of Things (IoT)
A brief introduction to IoT gateway
Connected Living Connected Living What to look for Architecture
Instructor Materials Chapter 6 Building a Home Network
Architecture for security monitoring in IoT environments
TRAFFICBRIDGE OVERVIEW
Security of In-Vehicle Software
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Ad-hoc Networks.
The Control Room… …is the Central Location of Visualized Information
UNIT II –Part 2.
Wireless Fidelity 1 1.
Internet of Things and its applications
Wireless Local Area Network (WLAN)
Ubiquitous Networking in support of UNIOT
Connected Living Connected Living What to look for Architecture
Presented by: Jeffrey D. Bombell, American Computer Technologies
Chapter 4: Wireless LANs
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Algorithms for Big Data Delivery over the Internet of Things
Title of presentation Name(s) of author / presenter / co-authors
Improving the WiFi Customer Experience
Use Case of LRLP Operation for IoT
The Web Sensor Gateway Architecture for ZIGBEE
Internet of Things (IoT)
Standards for the Internet of Things
Bluetooth Based Smart Sensor Network
Street Light Monitoring System
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
The Internet of Unsecure Things
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
IoT – Retail O.P Khanduja.
Connecting Things Data must travel from devices which are immersed in the urban environment toward information sinks, and vice versa. Cellular Mobile.
Internet of Things Stay Relevant in Digital Era
Internet of Things (IoT) for Industrial Development and Automation
Computer Security By: Muhammed Anwar.
فایل ارائه حاضر توسط مرکز تحقیقات درایران « اینترنتی از اشیاء» فناوری
Global megatrends (relevant for our business)
Internet of Things (IoT)
NB-IoT as enabler for mMTC
ELEC-E Smart Grid Smart Meters and Security Issues
LETI INNOVATION DAYS June 25th of 2019
IOT INTERNET OF THINGS. DEFINITION a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided.
Presentation transcript:

National Mining University PROTECTION OF INFORMATION IN COMMUNICATION NETWORKS authors: Yuliia Kovalova Vadym Mieshkov Dnipro, Ukraine 2017

Wireless sensor networks have found many applications and play an important role in infrastructure monitoring. The use of wireless technology provides many benefits from the increased availability of information resources, and the popularity of sensor networks is associated with the ability to work autonomously without the help of any infrastructure or interaction with a person. However, wireless technology and the autonomy of sensor networks generate new threats and increases the risk of information security. 2

Internet of Things (IoT) Types of wireless networks Personal Local Global WPAN WLAN Cellular (2G, 3G, 4G-LTE) 3

Internet of Things (IoT) LoRaWAN™ LoRaWAN™ is a Low Power Wide Area Network (LPWAN) specification intended for wireless battery operated Things in a regional, national or global network. LoRaWAN targets key requirements of Internet of Things such as secure bi- directional communication, mobility and localization services. The LoRaWAN specification provides seamless interoperability among smart Things without the need of complex local installations and gives back the freedom to the user, developer, businesses enabling the roll out of Internet of Things. 4

LoRaWAN network architecture is typically laid out in a star-of-stars topology in which gateways is a transparent bridge relaying messages between end-devices and a central network server in the backend. 5

Internet of Things (IoT) ZigBee Zigbee Smart Energy is the world’s leading standard for interoperable products that monitor, control, inform, and automate the delivery and use of energy and water. It is used to deliver innovative solutions for smart meters and the home area network (HAN) that allow consumers to know and control their energy use by connecting them to the smart grid and helps create greener homes by giving consumers the information and automation needed to easily reduce their consumption and save money. 6

ZigBee is an IEEE 802.15.4-based specification for high- level communication protocols. 7

In recent years, the rise in the number of cyber attacks has been on the plug-in user devices related to the Internet of Things (IoT). These devices are vulnerable to cyber attacks because they are not equipped with basic security features. The use of IoT devices for DDoS attacks is an accomplished fact. Wireless technology and autonomy of sensor networks generate new threats and increases the risk of information security. Inadequate physical and cryptographic protection makes them sensitive to interception, compromise and hacking. As a result, any encrypted data contained in these networks can be exploited by malicious people to commit attacks from the network, compromising the confidentiality of information. 8

Problems of safety of data networks Database management systems and IT infrastructure are the most critical from the point of view of cybernetic security. Cybernetic security is the most important component of a constantly developing modern network. Distribution of public "cloud" services is hampered not by security considerations, but by the need to comply with regulatory and legislative requirements. The Cloud Security Alliance has released a package of free programs called Governance, Risk Management and Compliance Stack, which allows many government requirements to be met. Cloud infrastructure can eliminate technological fragmentation, simplify IT management, make the most of existing investments in installed equipment and technologies, and increase the efficiency of business processes in energy companies. 9

the design of the information security system should be carried out at the stage of the technical task for building the system, since the success of any hacker attack is related to the vulnerability of the devices and their operating system, and not the applications installed on these devices. In this regard, the most urgent task of designing in-house and local networks of municipal monitoring, operating on unlicensed frequencies of the IMS (868 MHz and 2.4 GHz) band using LoRa and ZigBee technologies, is to encapsulate protected proprietary protocols into existing stacks. 10

Thank you for your attention!