DETECTION AND MANAGEMENT OF THREATS TO INFORMATION PRIVACY THROUGH PROTOCOL VULNERABILITIES IN IOT NETWORKS

Authors

Keywords:

smart home, risk, confidentiality, telecommunication system, fully connected topology

Abstract

This study presents a quantitative methodology for assessing and regulating information confidentiality risks in IoT systems by exploiting application-level protocol vulnerabilities. A “smart home” telecommunication model with a fully connected topology was developed, considering device vulnerabilities, potential attacks, and attacker capabilities. The proposed algorithms identify the weakest system components and generate effective protection measures. Experimental results demonstrate that the methodology enables accurate risk quantification and practical recommendations for enhancing system security. The approach has been validated in a real environment and can be adapted for diverse IoT network topologies.

References

Internet of Things and data placement. URL:https://infohub.delltechnologies.com/l/edge-to-core-and-the-internet-of-things-2/internet-of-things-and-data-placement

Пресс-релиз «Лаборатории Касперского». URL: https://www.kaspersky.ru/about/press-releases/2022_kolichestvo-atak-na-iot-ustrojstva-v-rossii-vyroslo-na-40-za-pervoe-polugodie-2022-goda

А.А. Болгов. Оценка риска безопасности в сетях Интернета вещей / А.А. Болгов, С.А. Ермаков, Л.В. Паринова, Н.И. Баранников // Информация и безопасность. 2020. Т. 23. Вып. 4. С. 561-566.

С.А. Ермаков. Оценка эффективности защищенности Iot-сети на примере реализации технологии умный дом / С.А. Ермаков, А.А. Болгов. // Информация и безопасность. 2019. Т. 22. Вып. 1. С. 130-133.

В.Е. Кунавин. Оценка и регулирование рисков реализации угроз несанкционированного доступа к данным автоматизированной информационной системы «умный дом»: методическое обеспечение / В.Е. Кунавин, С.А. Ермаков, А.А. Болгов // Информация и безопасность. 2020. Т. 24. Вып. 4. С. 511-520.

Investigating threats of information security in IoT apps and methods of protection against these threats, 2021. 187 p.

Security risk management for the internet of things URL: https://library.oapen.org/bitstream/handle/20.50 0.12657/47872/1/9781680836837.pdf/editor John Soldatos. USA, Hanover: now Publisher Inc. 2020. 288 p. P. 119-125

PRASH: A Framework for Privacy Risk Analysis of Smart Homes. URL: https://www.mdpi.com/1424-8220/21/19/6399/J. Bugeja, A. Jacobsson, P. Davidsson, 2021

Threat Level Assessment of Smart- Home Stakeholders Using EBIOS Risk Manager / N’guessan Yves-Roland Douha, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi; The Fifteenth International Conference on Emerging Security Information, Systems and Technologies (IARIA SECURWARE 2021): IARIA XPS Press. 2021/ 11. P. 31-40.

Smart home system network architecture. URL: https://researchprofiles.herts.ac.uk/en/publicatio ns/smart-home-system-network-architecture / C. Yang, E. Mistretta, S. Chaychian, J. Siau. // 1st International Conference on Smart Grid Inspired Future Technologies, SmartGIFT 2016 - Liverpool, United Kingdom Duration: Springer Verlag. 19 May 2016 - 20 May 2016. P. 174-183.

DREAD. URL: https://www.delphiplus.org/zashchishchennyi-kod/dread--metodika-otsenki-riska.html

Buil-Gil, D., Kemp, S., Kuenzel, S., Coventry, L., Zakhary, S., Tilley, D., & Nicholson, J. (2023). The digital harms of smart home devices: A systematic literature review. Computers in Human Behavior, 142, 107583. https://doi.org/10.1016/j.chb.2023.107583

Mahlous, A. R., & hamkorlar. (2023). Threat model and risk management for a smart home IoT system. Informatica, 47(2), 201-220. https://doi.org/10.31449/inf.v47i2.4526

Vardakis, G., & hamkorlar. (2024). Review of Smart-Home Security Using the Internet of Things. Electronics, 13(16), 3343. https://doi.org/10.3390/electronics13163343

Magara, T., & Zhou, Y. (2024). Internet of Things (IoT) of Smart Homes: Privacy and Security. Journal of Electrical and Computer Engineering, 2024, Article 7716956. https://doi.org/10.1155/2024/7716956

Uppuluri, S. (2024). Review of Security and Privacy-Based IoT Smart Home Access Control Devices. Wireless Networks, 30, 1234-1256. https://doi/10.1007/s11277-024-11405-8

Published

2025-11-16

How to Cite

O'rinov, N., Kabulov, A., & Uzakov, S. (2025). DETECTION AND MANAGEMENT OF THREATS TO INFORMATION PRIVACY THROUGH PROTOCOL VULNERABILITIES IN IOT NETWORKS. The Descendants of Al-Fargani, 1(4), 18–25. Retrieved from https://al-fargoniy.uz/index.php/journal/article/view/922

Issue

Section

Статьи

Categories

Most read articles by the same author(s)