Securing the Internet of Things via VPN technology

Authors

  • Mykhailo Hunko Kharkiv National University of Radio Electronics, Ukraine
  • Igor Ruban Kharkiv National University of Radio Electronics, Ukraine
  • Kateryna Hvozdetska Kharkiv National University of Radio Electronics, Ukraine

DOI:

https://doi.org/10.30837/csitic52021232903

Keywords:

Internet of Things, Virtual Private Network, security, data

Abstract

The speed at which the Internet of Things is evolving these days looks promising for the smart environment of the future. Along with the popularity of smart devices, concerns about the security of IoT devices are also growing because they are inherently resource-constrained, heterogeneous and they suffer from a lack of standard security controls or protocols. In particular, because of their inability to support today's secure network protocols and security mechanisms, standard security solutions are not suitable for dynamic Internet of Things environments that require large and smart infrastructure deployments. Current Internet of Things environments use predominantly cloud-based approaches so that data can be exchanged in unlimited quantities, leading to additional security and privacy risks. While standard security protocols such as virtual private networks have recently been implemented for certain Internet of Things environments, the implementation models presented have few variations and are virtually unscalable for any dynamically scalable Internet of Things deployment.

References

Коваленко А.А. Моделі транзитної комутації гетерогенних мереж / А.А. Коваленко, А.В. Аніщенко // Проблеми інформатизації. Тези доповідей шостої міжнародної НТК. – Черкаси: ЧДТУ; Баку: ВА ЗС АР; Бельсько-Бяла: УТіГН; Харків: НТУ «ХПІ», 2018. – 14-16 листопада 2018. – С. 78.

Lyu, M.; Sherratt, D.; Sivanathan, A.; Gharakheili, H.H.; Radford, A.; Sivaraman, V. Quantifying the reflective DDoS attack capability of household IoT devices. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks; ACM: New York, NY, USA, 2017; pp. 46–51.

Vitalii Tkachov, Anna Budko, Kateryna Hvozdetska and Daryna Hrebeniuk. Method of Building Dynamic Multi-hop VPN Chains for Ensuring Security of Terminal Access Systems // IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T): Kharkiv 06-09 oct. 2020, Kharkiv

Published

2021-05-30