Presentation is loading. Please wait.

Presentation is loading. Please wait.

TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.

Similar presentations


Presentation on theme: "TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF."— Presentation transcript:

1 TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI
THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF ENSURING R. Nasimov

2 IoT architecture

3 Smart homes

4 Smart homes ecosystem Sensor devices; Network devices; Utilities;
A Smart home platform integrates a set of: Sensor devices; Network devices; Utilities; Different applications; Different protocols; Operating system; Additional software; Related remote services.

5 Current position of IoT based environment
The number of IoT based DDoS attacks have been increasing since last years; The damage was $3 trillion and this pattern will reach $6 trillion. Moreover, HP study reveals that 70% of IoT devices vulnerable to attack that’s why criminals love IoT devices to attack them; There just aren't great solutions in the market today; Although device manufacturers "can't provide perfect security

6 Common threats to smart home
Smart home has different elements as well as different and unpredictable threat and attacks.

7 Main requirements for smart homes

8 Ensuring methods from attacks and threats
Security policy must be created for smart home enviroment; There must be good collaboration among vendors, software developers, researchers, service providers and operators; On demand identification methods between devices and between users and devices; One initial step is educating consumers about the steps they can take to secure their devices and home networks; Cryptographic infrastructure has to be created; If good secure ecosystem can’t be created not only information or devices but also the whole family become under threat and under attacks. There must be a monitoring identities to control, management and monitor home area ecosystem to prevent attacks and threats;

9 Using cryptography for smart home environment
Cryptography aims at many protection measures to protect data confidentiality and integrity rely on cryptographic functions. In a broad definition, cryptography support for security must include user’s protection and authentication, data protection and the cryptographic infrastructure. For example, such a support may implement: For authentication primitives: ouser/entity authentication; message authentication and integrity. For data protection: symmetric or asymmetric encryption; hash functions; digital signature. For cryptographic infrastructure: random number generation; key management.

10 Conclusion Since home network consists of heterogeneous network protocols and contains existing security threats and holes of Internet such as hacking, malicious codes, worms, viruses, DoS attacks and eavesdropping, due to connections to the open network; On demand cryptographic authorization mechanism should be applied that it identifies, authenticates, authorizes all kind of devices and home owners and provides information security. Also, no smooth collaboration between all developers and consumers. This issue must be properly applied.

11 THANK YOU FOR YOUR ATTENTION!


Download ppt "TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF."

Similar presentations


Ads by Google