This article discusses the technology of the Internet of things, which is used to connect smart objects to the network, for intelligent control of the power system and automation of household processes. Intelligent power system management aimed at ensuring a more uniform use of electricity and minimizing energy losses during transmission and consumption of electricity. This technology is currently being promoted globally by utilities, scientific organizations, and governments. In this work, also, a conceptual model of a smart home is built in the Cisco Packet Tracer virtual constructor and diagrams of device interaction at all levels of network construction are given.
Keywords: internet of Things, IoT, cybersecurity, automation, Cisco Packet Tracer
Blockchain technology has been adopted in various fields, primarily in finance, through the use of cryptocurrencies. However, this technology is also useful in cyber security. This article discusses various Blockchain methodologies for the cybersecurity sector proposed by various researchers. This study showed that most researchers are focused on using Blockchain to secure IoT devices, networks and data. This paper looked at the strategies used by earlier researchers to secure three problematic IT areas using Blockchain. The main conclusion of the study was to ensure the integration and uniformity of solutions so that future researchers focus on a single Blockchain to create cybersecurity applications.
Keywords: blockchain, Internet of things, IoT, cyber security, computer security
IoT technologies have become an integral part of business and social life. This technology can be seen in almost every major city in Russia. Many leading countries are at relatively high levels of mass adoption of IoT technology. Many areas of the country's activities directly depend on the Internet of Things: “smart home”, “smart city”, digital agriculture, industrial automation, etc. It should be borne in mind that the diversified use of technologies entails a special interest of attackers and an increase in security threats. In this regard, specialists have a question of ensuring security. This article discusses the characteristics of IoT devices, the main security threats to narrowband IoT, and recommendations for countermeasures.
Keywords: IoT, NB-IoT, security, security threats, Cybercrime, Computer security