METHODS, TECHNOLOGIES, AND MECHANISMS OF CYBERSECURITY IN INTERNET OF THINGS (IOT) SYSTEMS

Authors

  • Yu.S. Koryakina Institute of Machine Science, Automation and Geomechanics, National Academy of Sciences of the Kyrgyz Republic
  • B.O. Elizarov Institute of Information Technologies, Kyrgyz State Technical University named after I. Razzakov

Keywords:

Internet of Things (IoT), cybersecurity, IoT threats, protection architectures, cryptography, Zero Trust, SIEM, XDR, SOAR, secure IoT systems

Abstract

This article presents a comprehensive analysis of threats and methods for ensuring the security of Internet of Things (IoT) devices. Key categories of threats are considered, including network attacks, physical impacts, application-level vulnerabilities, and risks to data privacy. A review of modern methods for protecting IoT devices is provided, covering measures at the network, hardware, and software levels, cryptographic technologies, as well as advanced approaches such as Zero Trust architecture, integration with SIEM/XDR/SOAR systems, and the use of artificial intelligence for anomaly detection. Special attention is given to the construction of secure IoT architectures and cybersecurity mechanisms that account for the limited computational resources of devices and the specifics of their operation. Based on the analysis of threats and existing technologies, recommendations are formulated for selecting and combining protection methods for different types of IoT systems. The presented material can be used by researchers and practitioners in developing IoT infrastructure security strategies and designing systems resilient to cyberattacks.

References

1. Meneghello, F., Calore, M., Zucchetto, D., Polese, M., Zanella, A. IoT: Internet of Threats? A survey of practical security vulnerabilities in real IoT devices // IEEE Internet of Things Journal. – 2019. – Vol. 6, No. 5. – P. 8182–8201. DOI: 10.1109/JIOT.2019.2935189.

2. Lee, I., Lee, K. Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management // Future Internet. – 2021. – Vol. 13, No. 6. – Article 154. DOI: 10.3390/fi13060154.

3. Sharma, V., You, I., Kumar, R. IoT Security: Review, Blockchain Solutions, and Open Challenges // Future Generation Computer Systems. – 2021. – Vol. 122. – P. 42–61. DOI: 10.1016/j.future.2021.03.019.

4. Bertino, E., Islam, N. Botnets and Internet of Things Security // Computer. – 2017. – Vol. 50, No. 2. – P. 76–79. DOI: 10.1109/MC.2017.62.

5. Fernandez-Carames, T.M., Fraga-Lamas, P. A Review on the Use of Blockchain for the Internet of Things // IEEE Access. – 2018. – Vol. 6. – P. 32979–33001. DOI: 10.1109/ACCESS.2018.2842685.

6. Alrawais, A., Alhothaily, A., Hu, C., Cheng, X. Fog Computing for the Internet of Things: Security and Privacy Issues // IEEE Internet Computing. – 2017. – Vol. 21, No. 2. – P. 34–42. DOI: 10.1109/MIC.2017.37.

7. Mosenia, A., Jha, N.K. A Comprehensive Study of Security of Internet-of-Things // IEEE Transactions on Emerging Topics in Computing. – 2017. – Vol. 5, No. 4. – P. 586–602. DOI: 10.1109/TETC.2016.2606384.

8. Zhang, Z.-K., Cho, M.C.Y., Shieh, S., Wang, Y.-C. IoT Security: Ongoing Challenges and Research Opportunities // IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA). – 2014. – P. 230–234. DOI: 10.1109/SOCA.2014.58.

9. Hassan, W.H. Current research on Internet of Things (IoT) security: A survey // Computer Networks. – 2019. – Vol. 148. – P. 283–294. DOI: 10.1016/j.comnet.2018.11.025.

10. Maple, C. Security and privacy in the internet of things // Journal of Cyber Policy. – 2017. – Vol. 2, No. 2. – P. 155–184. DOI: 10.1080/23738871.2017.1366536.

11. Корякин, С. В. Современные тенденции развития систем информационной безопасности / С. В. Корякин // Проблемы автоматики и управления. – 2017. – № 2(33). – С. 82-91. – EDN ZXPAXD.

12. Корякин, С. В. Аналитический обзор технологий построения аппаратно-ориентированных облачных систем защиты информации с применением нейросетевых технологий / С. В. Корякин // Проблемы автоматики и управления. – 2025. – № 2(53). – С. 41–51. – EDN RCCRHC.

Downloads

Published

2026-01-19

Issue

Section

INFORMATION SECURITY