INTEGRAL MODEL OF INTERNET OF THINGS SECURITY IN THE SPACE OF INFRASTRUCTURE OBJECTS’ INTELLECTUALIZATION

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.28.848

Keywords:

intellectualization of objects; Internet of Things architecture; security models; integrated multi-level model; authentication; data encryption; symmetric block algorithm.

Abstract

The article explores the issues of architecture models and security in the Internet of Things (IoT) within the context of the intellectualization of societal infrastructure objects. An analytical review of well-known methodologies and models for developing IoT architecture and establishing approaches to ensuring their security is conducted. The classical reference IoT architecture model by the International Telecommunication Union (ITU-T), based on Recommendation Y.2060, is elaborated. This model is structured into components within the functional domain and the environment of management and security. The first layer of the ITU-T reference architecture model is analyzed — the device network, which functionally interacts with physical objects in the smart environment at the level of data collection and transmission. The architecture of the seven-layer reference model by the IoT World Forum is described, featuring such functions as data analysis based on criteria, data formatting, cryptographic data processing, data reduction, and data evaluation based on threshold values. The IoT security model based on the Cisco architecture is considered, reflecting the relationship within the “IoT architecture — security” space at the level of the “IoT functioning — protection” structure. Based on the Cisco security model, an integrated multi-level IoT security model is developed for a wide range of industrial infrastructure objects, including critical ones. This model follows the structure “IoT architecture — threats — security methods — protection technologies” and is deployed at levels of authentication, authorization, encryption, trust management, network policy, security analytics, and threat prediction through corresponding algorithms and protection technologies for all components of the IoT ecosystem. Algorithmic and software tools for cryptographic data exchange protection are developed, based on the symmetric block authenticated encryption algorithm AES-256-GCM, implemented in the Python programming language as a practical realization of the integrated IoT security model at the OpenVPN protocol level using UDP technology.

Downloads

Download data is not yet available.

References

Association of Industrial Automation Enterprises of Ukraine. (2018). Industry 4.0 development strategy. https://mautic.appau.org.ua/asset/42:strategia-rozvitku-4-0-v3.pdf

EU Agency for Cybersecurity. (2021). International strategy of the EU Agency for Cybersecurity. https://www.enisa.europa.eu/sites/default/files/all_files/2022-02-16%20ENISA%20International%20Strat

egy.pdf

National Security and Defense Council of Ukraine. (2021). Cybersecurity Strategy of Ukraine for 2021–2025.

Bobalo, Yu. Ya., Dudykevych, V. B., & Mykytyn, H. V. (2020). Strategic security of the “object – information technology” system. National University “Lviv Polytechnic”.

Hategekimana, F., Whitaker, T. J. L., Pantho, M. J. H., & Bobda, C. (2020). IoT device security through dynamic hardware isolation with cloud-based update. Journal of Systems Architecture, 109, 101827. https://doi.org/10.1016/j.sysarc.2020.101827

Omar, A. H. E., Soubra, H., Moulla, D. K., & Abran, A. (2024). An innovative honeypot architecture for detecting and mitigating hardware Trojans in IoT devices. IoT, 5(4), 730–755. https://doi.org/10.3390/iot5040033

Aung, P. P., Aslam, S., & Chong, C. W. (2024). PUF-based lightweight security subsystems for IoT hardware: A concept. In: Selected Proceedings from the 2nd International Conference on Intelligent Manufacturing and Robotics, ICIMR 2024, Lecture Notes in Networks and Systems, vol. 1316. Springer. https://doi.org/10.1007/978-981-96-3949-6_31

Jasim, W. A., Kwyja, Y. M., Al-Mfarji, A. M. F., & Mohammed, M. (2024). An exhaustive examination of architectural methods for hardware security mechanisms in IoT devices. Radioelectronics, Nanosystems, Information Technologies, 16(5), 643–656. https://doi.org/10.17725/j.rensit.2024.16.643

Cano Quiveu, G., Ruiz-de-Clavijo-Vázquez, P., & Bellido, M. J. (2021). Embedded LUKS (E-LUKS): A hardware solution to IoT security. Electronics, 10(23), 3036. https://doi.org/10.3390/electronics10233036

Elmaghbub, A., & Hamdaoui, B. (2024). Domain-agnostic hardware fingerprinting-based device identifier for zero-trust IoT security. IEEE Wireless Communications, 31(2), 42–48. https://doi.org/10.1109/MWC.001.2300420

Bharathi, R., & Parvatham, N. (2020). Hardware-based physical layer security solutions and algorithms for IoT devices on FPGA platform. International Journal of Innovative Technology and Exploring Engineering, 9(3), 2128–2132. https://doi.org/10.35940/ijitee.C8752.019320

Rozlomii, I. O., Symoniuk, V. P., Naumenko, S. V., & Mykhailovskyi, P. V. (2024). Security model of interconnected computing devices based on a lightweight encryption scheme for IoT. Computer-Integrated Technologies: Education, Science, Production, 55, 191–198. https://doi.org/10.36910/6775-2524-0560-2024-55-24

Tymenko, A. V., Shkarupylo, V. V., & Smolii, V. V. (2020). Neural network model for controlling hardware compatibility of IoT system components. Bulletin of Zaporizhzhia National University. Physical and Mathematical Sciences, (2), 52–59. https://doi.org/10.26661/2413-6549-2020-2-07

Yevdokymov, S. O. (2025). Modeling threats and developing security strategies for protecting IoT railway networks. Information Technologies and Computer Engineering. Scientific Works of VNTU, (1), 37–45. http://dx.doi.org/10.31649/2307-5376-2025-1-37-45

Lohutova, O., & Belei, O. (2019). Data transmission security for the Internet of Things. Cybersecurity: Education, Science, Technology, 2(6), 18. https://doi.org/10.28925/2663-4023.2019.6.618

Samoylenko, M. (2020). Security issues in the implementation practice of Internet of Things technology. Computer-Integrated Technologies: Education, Science, Production, (41), 198–204. https://doi.org/10.36910/6775-2524-0560-2020-41-31

ITU, Telecommunication Standardization Sector of. (2012). Overview of the Internet of Things (Recommendation ITU-T Y.2060). International Telecommunication Union. https://www.itu.int/rec/T-REC-Y.2060

Zhurakovskyi, B. Yu., & Zeniv, I. O. (2021). Internet of Things technologies. Igor Sikorsky Kyiv Polytechnic Institute.

ITU, Telecommunication Standardization Sector. (2019). Architectural reference models of devices for Internet of Things applications (Recommendation ITU-T Y.4460). International Telecommunication Union. https://www.itu.int/rec/T-REC-Y.4460

Cisco Systems. (2014). The Internet of Things reference model. https://dl.icdst.org/pdfs/files4/0f1d1327c5195d1922175dd77878b9fb.pdf

Dasgupta, D., Roy, A., & Nag, A. (2017). Continuous Authentication. In: Advances in User Authentication. Infosys Science Foundation Series(). Springer, Cham, 185-233. https://doi.org/10.1007/978-3-319-58808-7_6

Downloads


Abstract views: 0

Published

2025-06-26

How to Cite

Dudykevych, V., Mykytyn, H., & Murak, T. (2025). INTEGRAL MODEL OF INTERNET OF THINGS SECURITY IN THE SPACE OF INFRASTRUCTURE OBJECTS’ INTELLECTUALIZATION. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(28), 41–56. https://doi.org/10.28925/2663-4023.2025.28.848