CREATION OF AN AUTOMATED INFORMATION PROCESSING SYSTEM WITH RESTRICTED ACCESS “INTERNET OF THINGS IN A ‘SMART CITY’: THREATS – SECURITY TECHNOLOGIES” IN THE INDUSTRY 4.0 SPACE

Authors

DOI:

https://doi.org/10.28925/2663-4023.2026.32.917

Keywords:

intellectualization of objects; security; Internet of Things; “smart city”; classification scheme; conceptual and information models; relational database; automated information processing system.

Abstract

Within the scope of Industry 4.0 tasks, this paper examines the issue of secure intellectualization of Ukraine's social infrastructure at the level of developing an automated restricted-access information processing system (AIPS with RA) in the Internet of Things (IoT) security segment of a “smart city” (SC) and algorithmic and software implementation using the Python programming language. An analytical review of known methodologies for developing secure automated information processing systems and approaches to ensuring the security of IoT systems was conducted. A qualitative analysis of the segments of a “smart city” – transport, health, energy, ecology – was carried out by grouping them at the level of the classification scheme of the subject area according to the “object – threat – protection” concept. A conceptual model of the subject area “Internet of Things in a ‘smart city’: threats – security technologies” was created based on the principles of system analysis – integrity, hierarchy, and multifacetedness. The criteria for selecting a relational database (RDB), SQLite database management system (DBMS), and Python programming language were justified, and an RDB information model was constructed for further algorithmic and software implementation. An algorithm for the secure operation of an automated information processing system at the authentication procedure level has been presented and, on this basis, a software implementation of the AIPS “Internet of Things in a Smart City: threats – security technologies” using Python for the segments: “smart transport”, “smart health”, “smart energy”, “smart ecology” at the web application level.

Downloads

Download data is not yet available.

References

Association of Industrial Automation Enterprises of Ukraine. (2018). Industry 4.0 development strategy. https://mautic.appau.org.ua/asset/42:strategia-rozvitku-4-0-v3.pdf

European Union Agency for Cybersecurity. (2021). International strategy of the EU Agency for Cybersecurity. https://www.enisa.europa.eu/sites/default/files/all_files/2022-02%20B16%20ENISA%20International%20Strategy.pdf

National Security and Defense Council of Ukraine. (2021). Cybersecurity Strategy of Ukraine for 2021–2025. https://www.rnbo.gov.ua/les/2021/STRATEGIYA%20KYBERBEZPEKI/proekt%20strategii_kyberbezpeki_Ukr.pdf

Dudykevych, V. B., Mykytyn, H. V., & Rebets, A. I. (2018). Quintessence of cyber-physical system information security. Bulletin of the National University “Lviv Polytechnic”. Series: Information Systems and Networks, (887), 58–68. http://nbuv.gov.ua/UJRN/VNULPICM_2018_887_10

Asatiani, A., Hakkarainen, T., Paaso, K., & Penttinen, E. (2024). Security by envelopment: A novel approach to data-security-oriented configuration of lightweight automation systems. European Journal of Information Systems, 33(5), 631–653. https://doi.org/10.1080/0960085X.2023.2217362

Balocon, O. H. (2024). Prioritizing information security: Analysis of software development life cycle methodologies using the NIST cybersecurity framework. Ignatian International Journal for Multidisciplinary Research, 2(4), 1495–1508.

Smyk, D., & Burak, N. (2025). Methods and means of data processing in modern automated systems. Bulletin of Lviv State University of Life Safety, 31, 41–49. https://doi.org/10.32447/20784643.31.2025.05

Panovyk, U. (2025). Information protection in automated systems based on a conceptual model with formalized efficiency evaluation. Cybersecurity: Education, Science, Technique, 4(28), 307–320. https://doi.org/10.28925/2663-4023.2025.28.798

Bobalo, Y. Y., Dudykevych, V. B., & Mykytyn, H. V. (2020). Strategic security of the “object – information technology” system. Lviv: Lviv Polytechnic Publishing House.

Milevskyi, S., Korol, O., Mykytyn, G., Lozova, I., Solnyshkova, S., Husarova, I., & Balagura, D. (2024). Development of the sociocyberphysical systems multi-contour security methodology. Eastern-European Journal of Enterprise Technologies, 127(9). https://doi.org/10.15587/1729-4061.2024.298844

Chirra, D. R. (2024). AI-enabled cybersecurity solutions for protecting smart cities against emerging threats.

Oliha, J. S., Biu, P. W., & Obi, O. C. (2024). Securing the smart city: A review of cybersecurity challenges and strategies. Engineering Science & Technology Journal, 5(2), 496–506. https://doi.org/10.53022/oarjms.2024.7.1.0013

Mohammed, A. (2024). Cybersecurity in smart cities: As cities become smarter, new vulnerabilities arise. Pioneer Research Journal of Computing Science, 1(1), 75–82. https://prjcs.com/index.php/prjcs/article/view/19

Mohammed, A. (2022). Cybersecurity in smart cities: Securing IoT and smart infrastructure. Journal of Innovative Technologies, 5(1). https://acadexpinnara.com/index.php/JIT/article/view/334

Chui, K. T., Gupta, B. B., Liu, J., Arya, V., Nedjah, N., Almomani, A., & Chaurasia, P. (2023). A survey of Internet of Things and cyber-physical systems: Standards, algorithms, applications, security, challenges, and future directions. Information, 14(7), 388. https://doi.org/10.3390/info14070388

Sharma, R., & Arya, R. (2023). Security threats and measures in the Internet of Things for smart city infrastructure: A state of the art. Transactions on Emerging Telecommunications Technologies, 34(11), e4571. https://doi.org/10.1002/ett.4571

Ali, J., Singh, S. K., Jiang, W., Alenezi, A. M., Islam, M., Daradkeh, Y. I., & Mehmood, A. (2025). A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks. Computer Communications, 229, 108000. https://doi.org/10.1016/j.comcom.2024.108000

Khomenko, Y. (2024). Modern methods, models and software tools for implementation and optimization of IoT systems. Information Technologies in Education, 55, 72–84. https://doi.org/10.14308/ite000782

Kovalenko, A., Yaroshevich, R., & Balenko, O. (2021). Internet of Things: Problems of information security and methods of improvement. Control, Navigation and Communication Systems, 2(64), 78–80. https://doi.org/10.26906/SUNZ.2021.2.078

Klimushin, P. S., & Petro, S. K. (2025). Communication technologies and specialized communication protocols for ensuring cybersecurity of the Internet of Things. LAW, 52. https://doi.org/10.32631/pb.2025.2.05

Zhurylo, O., Lyashenko, O., & Avetisova, K. (2023). Hardware security overview of fog computing end devices in the Internet of Things. Innovative Technologies and Scientific Solutions for Industries, 1(23), 57–71. https://doi.org/10.30837/ITSSI.2023.23.057

Andrushchak, I., & Kosheliuk, V. (2025). Specific aspects of designing an information security system to protect IoT networks from attacks. International Science Journal of Engineering & Agriculture, 4(5), 27–39. https://doi.org/10.46299/j.isjea.20250405.03

Oliinyk, Y., Platonenko, A., Cherevyk, V., Vorokhob, M., & Shevchuk, Y. (2025). Methods of information security in IoT technologies. Cybersecurity: Education, Science, Technique, 3(27), 100–108. https://doi.org/10.28925/2663-4023.2025.27.705

Yashchuk, V., Panovyk, U., Cherkas, S., Ivanusa, A., & Tkachuk, R. (2025). Comprehensive protection model of IoT devices in the home environment: Threats, vulnerabilities and neutralization methods. Bulletin of Lviv State University of Life Safety, 32, 125–140. https://doi.org/10.32447/20784643.32.2025.10

Malinovsky, V. I., Kuperstein, L. M., Lukichov, V. V., & Dudatev, A. V. (2024). Issues and approaches to improving security in data transmission channels of IoT systems and devices. Bulletin of Vinnytsia Polytechnic Institute, 4, 105–115. https://doi.org/10.31649/1997-9266-2024-175-4-104-114

Yuzevych, V., Obshta, A., Opirskyy, I., & Harasymchuk, O. (2024). Algorithm for assessing the degree of information security risk of a cyber-physical system for controlling underground metal constructions. CEUR Workshop Proceedings, 3702, 400–412.

Martseniuk, Y., Partyka, A., Harasymchuk, O., Nyemkova, E., & Karpiński, M. (2024). Shadow IT risk analysis in public cloud infrastructure. CEUR Workshop Proceedings, 3800, 22–31.

Dudykevych, V., Mykytyn, G., Stosyk, T., & Skladannyi, P. (2024). Platform for the security of cyber-physical systems and IoT in the intellectualization of society. Cybersecurity Providing in Information and Telecommunication Systems, 449–457.

Sethi, P., & Sarangi, S. R. (2017). Internet of Things: Architectures, protocols, and applications. Journal of Electrical and Computer Engineering, 2017, 9324035. https://doi.org/10.1155/2017/9324035

Dudykevych, V. B., Mykytyn, G. V., & Galunets, M. O. (2020). System model of information security for a smart city. Information Processing Systems, 2(161), 93–98. https://doi.org/10.30748/soi.2020.161.11

Arena, F., & Pau, G. (2019). An overview of vehicular communications. Future Internet, 11(2), 27. https://doi.org/10.3390/fi11020027

Abdulmalek, S., Nasir, A., Jabbar, W. A., Almuhaya, M. A., Bairagi, A. K., Khan, M. A. M., & Kee, S. H. (2022). IoT-based healthcare monitoring system towards improving quality of life: A review. Healthcare, 10(10). https://doi.org/10.3390/healthcare10101993

Orlando, M., Estebsari, A., Pons, E., Pau, M., Quer, S., Poncino, M., & Patti, E. (2021). A smart meter infrastructure for smart grid IoT applications. IEEE Internet of Things Journal, 9(14), 12529–12541. https://doi.org/10.1109/JIOT.2021.3137596

Dudykevych, V. B., Mykytyn, G. V., Bordulyak, S. M., & Fur, Y. M. (2025). Comprehensive security system for an intelligent cyber-physical emergency monitoring system. Modern Information Protection, 1, 249–258. https://doi.org/10.31673/2409-7292.2025.014428

Khatide, N. N., Laka, K. V., & Khauoe, T. N. (2025). Applications and challenges of network technologies in IoT-based biological water monitoring systems. https://doi.org/10.21203/rs.3.rs-7337247/v1

Madani, K. (2026). Water bankruptcy: The formal definition. Water Resources Management, 40, 78. https://doi.org/10.1007/s11269-025-04484-0

Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146–164. https://doi.org/10.1016/j.comnet.2014.11.008

Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84. https://doi.org/10.1109/MC.2017.201

Ouakasse, F., & Rakrak, S. (2022). CoAP and MQTT: Characteristics and security. International Conference on Networking, Intelligent Systems and Security, 157–167. https://doi.org/10.1007/978-3-031-15191-0_15

Mrabet, H., Belguith, S., Alhomoud, A., & Jemai, A. (2020). A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors, 20(13), 3625. https://doi.org/10.3390/s20133625

Bredesen, R., & Mujeye, S. (2025). Network segmentation security with the implementation of threats. Proceedings of the 8th International Conference on Software Engineering and Information Management, 137–141. https://doi.org/10.1145/3725899.3725920

Kumar, A., Abhishek, K., Ghalib, M. R., Shankar, A., & Cheng, X. (2022). Intrusion detection and prevention system for an IoT environment. Digital Communications and Networks, 8(4), 540–551. https://doi.org/10.1016/j.dcan.2022.05.027

Downloads


Abstract views: 0

Published

2026-03-27

How to Cite

Dudykevych, V., Mykytyn, H., Parchuk, Y., & Terpeliuk, M.-S. (2026). CREATION OF AN AUTOMATED INFORMATION PROCESSING SYSTEM WITH RESTRICTED ACCESS “INTERNET OF THINGS IN A ‘SMART CITY’: THREATS – SECURITY TECHNOLOGIES” IN THE INDUSTRY 4.0 SPACE. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(32), 45–70. https://doi.org/10.28925/2663-4023.2026.32.917