IOT TIZIMLARIDA XESH FUNKSIYALARIDAN FOYDALANISHNING XAVFSIZLIK VA SAMARADORLIK JIHATLARI
Keywords:
IoT, xesh funksiyalari, kriptografiya, maʼlumotlar butunligi, autentifikatsiya, xavfsizlik, SHA-256, resurs cheklovlariAbstract
Internet of Things (IoT) texnologiyasining jadal rivojlanishi butun dunyo bo‘ylab ulangan qurilmalar sonini keskin oshirmoqda. So‘nggi statistik ma’lumotlarga ko‘ra, 2024 yilga kelib dunyoda 15 milliarddan ortiq IoT qurilmalari faoliyat ko‘rsatmoqda, bu raqam 2025 yilga borib 25 milliardga yetishi kutilmoqda. Bu o‘sish nafaqat texnologik taraqqiyotni, balki kiberxavfsizlik sohasida
yangi muammolarni ham keltirib chiqarmoqda. IoT tizimlarining o‘ziga xos xususiyatlari – cheklangan protsessor quvvati, kam xotira, past energiya sarfi – an’anaviy kriptografik usullarni qo‘llashni qiyinlashtiradi. Ayniqsa, sog‘liqni saqlash, moliya, transport va energetika kabi muhim sohalarda IoT qurilmalarining ishonchliligi va xavfsizligi inson hayoti bilan bevosita bog‘liq bo‘lishi mumkin. Shu sababli, resurslar chegaralangan muhitda samarali ishlay oladigan kriptografik yechimlarni ishlab chiqish dolzarblik kasb etmoqda. Xesh funksiyalari IoT tizimlarida ma’lumotlar butunligini tekshirish, parollarni xavfsiz saqlash va raqamli imzolarni yaratishda asosiy vositadir. Biroq, turli xesh algoritmlarining xavfsizlik darajasi va samaradorligi turlicha bo‘lib, ularni maqsadli tanlash va qo‘llash talab etiladi. Ushbu maqolaning asosiy maqsadi IoT muhitida eng ko‘p qo‘llaniladigan xesh algoritmlarining tezlik, energiya sarfi va xavfsizlik ko‘rsatkichlarini qiyosiy tahlil qilish, shu asosida turli soha va talablar uchun optimal algoritmlarni tavsiya etishdan iborat.
References
1. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks,
2. Mouha, N., & Mennink, B. (2017). The Design Space of Lightweight Cryptography.In NIST Workshop on Lightweight Cryptography.
4. Koo, B., Roh, D., Kim, H., Jung, Y., Sung, J., & Lee, D. G. (2017). CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices. In International Conference on Information Security and Cryptology (pp. 3-25). Springer, Cham.
5. Toshpulatov A.A. (2021) "IoT qurilmalarida energiya tejovchi kriptografik algoritmlar" - "Telekommunikatsiya va axborotlashtirish" ilmiy-amaliy jurnali, №2, 28-34 betlar
6. Hakimova Z.Sh. (2020) "Smart-shahar tizimlarida xavfsizlik muammolari va yechimlari" - "Zamonaviy texnologiyalar" ilmiy jurnali, №4, 15-22 betlar
7. Yusupov O.R. (2019) "Kiberxavfsizlik: zamonaviy tahdidlar va himoya usullari" - Toshkent: "O'zbekiston" nashriyoti
8. McGinthy, J. M., & Michaels, A. J. (2018). Energy Consumption of Cryptographic Algorithms on Resource-Constrained Devices. Journal of Cybersecurity.
9. Toshkhujaev, S. Karimov, A. (2022). Yengil Kriptografiya: Nazariya va Amaliyot. O‘zbekiston Axborot Texnologiyalari Jurnali.
10. Biryukov, A., Perrin, L. (2017). State of the Art in Lightweight Symmetric Cryptography. IACR Cryptology ePrint Archive.
11. NIST Special Publication 800-185 (2016). SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions.
12. Aumasson, J. P., Neves, S., Wilcox-O’Hearn, Z., & Winnerlein, C. (2013). BLAKE2: Simpler, Smaller, Fast as MD5. Applied Cryptography and Network Security.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Allanov Orif Menglimuratovich, Saidahmedov Eldor Islomovich

This work is licensed under a Creative Commons Attribution 4.0 International License.







