DETECTION AND MANAGEMENT OF THREATS TO INFORMATION PRIVACY THROUGH PROTOCOL VULNERABILITIES IN IOT NETWORKS
Keywords:
smart home, risk, confidentiality, telecommunication system, fully connected topologyAbstract
This study presents a quantitative methodology for assessing and regulating information confidentiality risks in IoT systems by exploiting application-level protocol vulnerabilities. A “smart home” telecommunication model with a fully connected topology was developed, considering device vulnerabilities, potential attacks, and attacker capabilities. The proposed algorithms identify the weakest system components and generate effective protection measures. Experimental results demonstrate that the methodology enables accurate risk quantification and practical recommendations for enhancing system security. The approach has been validated in a real environment and can be adapted for diverse IoT network topologies.
References
Internet of Things and data placement. URL:https://infohub.delltechnologies.com/l/edge-to-core-and-the-internet-of-things-2/internet-of-things-and-data-placement
Пресс-релиз «Лаборатории Касперского». URL: https://www.kaspersky.ru/about/press-releases/2022_kolichestvo-atak-na-iot-ustrojstva-v-rossii-vyroslo-na-40-za-pervoe-polugodie-2022-goda
А.А. Болгов. Оценка риска безопасности в сетях Интернета вещей / А.А. Болгов, С.А. Ермаков, Л.В. Паринова, Н.И. Баранников // Информация и безопасность. 2020. Т. 23. Вып. 4. С. 561-566.
С.А. Ермаков. Оценка эффективности защищенности Iot-сети на примере реализации технологии умный дом / С.А. Ермаков, А.А. Болгов. // Информация и безопасность. 2019. Т. 22. Вып. 1. С. 130-133.
В.Е. Кунавин. Оценка и регулирование рисков реализации угроз несанкционированного доступа к данным автоматизированной информационной системы «умный дом»: методическое обеспечение / В.Е. Кунавин, С.А. Ермаков, А.А. Болгов // Информация и безопасность. 2020. Т. 24. Вып. 4. С. 511-520.
Investigating threats of information security in IoT apps and methods of protection against these threats, 2021. 187 p.
Security risk management for the internet of things URL: https://library.oapen.org/bitstream/handle/20.50 0.12657/47872/1/9781680836837.pdf/editor John Soldatos. USA, Hanover: now Publisher Inc. 2020. 288 p. P. 119-125
PRASH: A Framework for Privacy Risk Analysis of Smart Homes. URL: https://www.mdpi.com/1424-8220/21/19/6399/J. Bugeja, A. Jacobsson, P. Davidsson, 2021
Threat Level Assessment of Smart- Home Stakeholders Using EBIOS Risk Manager / N’guessan Yves-Roland Douha, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi; The Fifteenth International Conference on Emerging Security Information, Systems and Technologies (IARIA SECURWARE 2021): IARIA XPS Press. 2021/ 11. P. 31-40.
Smart home system network architecture. URL: https://researchprofiles.herts.ac.uk/en/publicatio ns/smart-home-system-network-architecture / C. Yang, E. Mistretta, S. Chaychian, J. Siau. // 1st International Conference on Smart Grid Inspired Future Technologies, SmartGIFT 2016 - Liverpool, United Kingdom Duration: Springer Verlag. 19 May 2016 - 20 May 2016. P. 174-183.
DREAD. URL: https://www.delphiplus.org/zashchishchennyi-kod/dread--metodika-otsenki-riska.html
Buil-Gil, D., Kemp, S., Kuenzel, S., Coventry, L., Zakhary, S., Tilley, D., & Nicholson, J. (2023). The digital harms of smart home devices: A systematic literature review. Computers in Human Behavior, 142, 107583. https://doi.org/10.1016/j.chb.2023.107583
Mahlous, A. R., & hamkorlar. (2023). Threat model and risk management for a smart home IoT system. Informatica, 47(2), 201-220. https://doi.org/10.31449/inf.v47i2.4526
Vardakis, G., & hamkorlar. (2024). Review of Smart-Home Security Using the Internet of Things. Electronics, 13(16), 3343. https://doi.org/10.3390/electronics13163343
Magara, T., & Zhou, Y. (2024). Internet of Things (IoT) of Smart Homes: Privacy and Security. Journal of Electrical and Computer Engineering, 2024, Article 7716956. https://doi.org/10.1155/2024/7716956
Uppuluri, S. (2024). Review of Security and Privacy-Based IoT Smart Home Access Control Devices. Wireless Networks, 30, 1234-1256. https://doi/10.1007/s11277-024-11405-8
Downloads
Published
How to Cite
License
Copyright (c) 2025 Nodirbek O'rinov, Anvar Kabulov, Sirojiddin Uzakov

This work is licensed under a Creative Commons Attribution 4.0 International License.
