×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Modeling the concept of a smart home in a virtual environment Cisco Packet Tracer

    This article discusses the technology of the Internet of things, which is used to connect smart objects to the network, for intelligent control of the power system and automation of household processes. Intelligent power system management aimed at ensuring a more uniform use of electricity and minimizing energy losses during transmission and consumption of electricity. This technology is currently being promoted globally by utilities, scientific organizations, and governments. In this work, also, a conceptual model of a smart home is built in the Cisco Packet Tracer virtual constructor and diagrams of device interaction at all levels of network construction are given.

    Keywords: internet of Things, IoT, cybersecurity, automation, Cisco Packet Tracer

  • Analysis of technologies for building an automated system "Smart Home"

    One of the topics of automation and monitoring that is gaining popularity is the technology of building the Smart Home system. This technology is a home automation system, which refers to the remote monitoring and control of home appliances. With the growth of the Internet and the development of technologies such as artificial intelligence, the Internet of things and cloud technologies, there is great potential and opportunity for remote access, control and monitoring of network devices. This article will review various smart home automation systems and technologies in terms of different functions. In the study, the main focus is on the concept of a home automation system in which control and monitoring operations are carried out using wireless communications.

    Keywords: internet of things, smart home, NB-IoT automation, cyber security

  • Analysis of characteristics and functionality of IoT devices

    The concept of the Internet of Things (IoT) allows devices to communicate with each other and share resources using the Internet as a wireless medium. In smart homes, IoT allows the owner, who is far from home, to control it via the Internet. The ease of use and rich features of home automation systems have made them popular. Some people need home automation systems to make their home appliances easier and more convenient to operate, and they are also very useful for people with disabilities and the elderly. However, the useful features and functionality of IoT devices do not stop there. Scientific directions are being formed to analyze the efficiency of energy consumption and methods for preventing various disasters, where the main role is played by the technologies of the Internet of things. This article analyzes the standard models of smart home automation devices. The paper discusses the functionality of IoT devices through a virtual environment for building network models Cisco Packet Tracer.

    Keywords: internet of things, IoT, automation, data analysis, data collection, cyber security

  • Overview of the Internet of Things Security Threats

    The concept of the Internet of Things (IoT) was introduced by Kevin Ashton at the Massachusetts Institute of Technology in 1998. The vision of the concept is that objects, “things”, embrace each other and, therefore, see IoT, in which each object has its own individual volume identity and can interact with other objects. Internet objects can make a big difference in size from small to very large. The Internet of Things is turning into ordinary products such as cars, buildings, and machines into smart devices, connected objects that can communicate with people, applications, and others with devices. In the article, we observe the widespread use of the Internet in large cities and its impact on various industries. The paper discusses the security threat of the Internet of Things, resulting in security recommendations.

    Keywords: IoT, NB-IoT, security, security threats, Cybercrime, Computer security

  • The role of Blockchain technology in the implementation of cybersecurity

    Blockchain technology has been adopted in various fields, primarily in finance, through the use of cryptocurrencies. However, this technology is also useful in cyber security. This article discusses various Blockchain methodologies for the cybersecurity sector proposed by various researchers. This study showed that most researchers are focused on using Blockchain to secure IoT devices, networks and data. This paper looked at the strategies used by earlier researchers to secure three problematic IT areas using Blockchain. The main conclusion of the study was to ensure the integration and uniformity of solutions so that future researchers focus on a single Blockchain to create cybersecurity applications.

    Keywords: blockchain, Internet of things, IoT, cyber security, computer security

  • Narrowband Internet of Things security threats and countermeasures

    IoT technologies have become an integral part of business and social life. This technology can be seen in almost every major city in Russia. Many leading countries are at relatively high levels of mass adoption of IoT technology. Many areas of the country's activities directly depend on the Internet of Things: “smart home”, “smart city”, digital agriculture, industrial automation, etc. It should be borne in mind that the diversified use of technologies entails a special interest of attackers and an increase in security threats. In this regard, specialists have a question of ensuring security. This article discusses the characteristics of IoT devices, the main security threats to narrowband IoT, and recommendations for countermeasures.

    Keywords: IoT, NB-IoT, security, security threats, Cybercrime, Computer security