THE INTERNET OF THINGS AND ITS IMPACT ON NETWORK SECURITY: NEW THREATS AND SOLUTIONS
Abstract and keywords
Abstract:
The article analyzes the impact of Internet of Things technologies on the information security 
of networks. The study examines traditional and extended multi-level IoT security architectures, 
the main threats distributed across architectural levels, as well as new types of threats targeting artificial intelligence components. A review of the scientific literature highlights the high relevance of the problem in the context of the rapid growth in the number of connected devices and their limited resources. In this regard, practical recommendations for risk mitigation are proposed, including 
the use of lightweight cryptography, blockchain technologies, multi-level security based on the security-by-design principle, and compliance with regulatory requirements. Special attention is paid to mathematical modeling of risks and the effectiveness of protection mechanisms for resource-constrained IoT systems.

Keywords:
Internet of Things, information security, cyber threats, architecture, risk assessment
Text
Text (PDF): Read Download
References

1. S. Saravana Kumar, Balaji Kannan, "Enhancing Industrial IoT Security with AI and Cloud Computing: A Review of Threats and Solutions", 2025 International Conference on Modern Sustainable Systems (CMSS), pp.1082-1089, 2025.

2. DDoS-ataki v 2025 godu: cifry, trendy, analitika // StormWall. – 2026. – 23 yanvarya. – URL: https://stormwall.pro/resources/blog/ddos-trendy-2025 (data obrascheniya: 09.03.2026).

3. 12 urovney IIoT-arhitektury: ot periferiynyh datchikov do analitiki Big Data // BigDataSchool. – 2019. – 10 noyabrya. – URL: https://bigdataschool.ru/blog/iiot-architecture-levels-and-tools/ (data obrascheniya: 07.04.2026).

4. Ataki na Android i IoT vyrosli v neskol'ko raz v 2025 godu // SecPost. – 2025. – 6 noyabrya. – URL: https://secpost.ru/mobilnye-i-iot-ugrozy-2025-42-milliona-skachivanij-vredonosov-i-rost-atak-na-promyshlennost (data obrascheniya: 05.04.2026).

5. Emerging Threats & Vulnerabilities to Prepare for in 2025 // Dark Reading. – 2024. – 26 dekabrya. – URL: https://www.darkreading.com/vulnerabilities-threats/emerging-threats-vulnerabilities-prepare-2025 (data obrascheniya: 30.03.2026).

6. NIST utverdil standart bystroy kriptografii Ascon dlya zaschity IoT-ustroystv // Anti-Malware.ru. – 2025. – 15 avgusta. – URL: https://www.anti-malware.ru/news/2025-08-15-111332/47003 (data obrascheniya: 25.03.2026).

7. Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin. Blockchain based distributed trust management in IoT and IIoT: a survey. Journal of Supercomputing, 2024, 80 (15), pp.21867-21919. DOI: https://doi.org/10.1007/s11227-024-06286-4

8. Cyber Resilience Act // European Commission. Shaping Europe’s digital future. – 2025. – URL: https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act (data obrascheniya: 10.04.2026).

Login or Create
* Forgot password?