INTEGRAL MODEL OF INTERNET OF THINGS SECURITY IN THE SPACE OF INFRASTRUCTURE OBJECTS’ INTELLECTUALIZATION
DOI:
https://doi.org/10.28925/2663-4023.2025.28.848Keywords:
intellectualization of objects; Internet of Things architecture; security models; integrated multi-level model; authentication; data encryption; symmetric block algorithm.Abstract
The article explores the issues of architecture models and security in the Internet of Things (IoT) within the context of the intellectualization of societal infrastructure objects. An analytical review of well-known methodologies and models for developing IoT architecture and establishing approaches to ensuring their security is conducted. The classical reference IoT architecture model by the International Telecommunication Union (ITU-T), based on Recommendation Y.2060, is elaborated. This model is structured into components within the functional domain and the environment of management and security. The first layer of the ITU-T reference architecture model is analyzed — the device network, which functionally interacts with physical objects in the smart environment at the level of data collection and transmission. The architecture of the seven-layer reference model by the IoT World Forum is described, featuring such functions as data analysis based on criteria, data formatting, cryptographic data processing, data reduction, and data evaluation based on threshold values. The IoT security model based on the Cisco architecture is considered, reflecting the relationship within the “IoT architecture — security” space at the level of the “IoT functioning — protection” structure. Based on the Cisco security model, an integrated multi-level IoT security model is developed for a wide range of industrial infrastructure objects, including critical ones. This model follows the structure “IoT architecture — threats — security methods — protection technologies” and is deployed at levels of authentication, authorization, encryption, trust management, network policy, security analytics, and threat prediction through corresponding algorithms and protection technologies for all components of the IoT ecosystem. Algorithmic and software tools for cryptographic data exchange protection are developed, based on the symmetric block authenticated encryption algorithm AES-256-GCM, implemented in the Python programming language as a practical realization of the integrated IoT security model at the OpenVPN protocol level using UDP technology.
Downloads
References
Association of Industrial Automation Enterprises of Ukraine. (2018). Industry 4.0 development strategy. https://mautic.appau.org.ua/asset/42:strategia-rozvitku-4-0-v3.pdf
EU Agency for Cybersecurity. (2021). International strategy of the EU Agency for Cybersecurity. https://www.enisa.europa.eu/sites/default/files/all_files/2022-02-16%20ENISA%20International%20Strat
egy.pdf
National Security and Defense Council of Ukraine. (2021). Cybersecurity Strategy of Ukraine for 2021–2025.
Bobalo, Yu. Ya., Dudykevych, V. B., & Mykytyn, H. V. (2020). Strategic security of the “object – information technology” system. National University “Lviv Polytechnic”.
Hategekimana, F., Whitaker, T. J. L., Pantho, M. J. H., & Bobda, C. (2020). IoT device security through dynamic hardware isolation with cloud-based update. Journal of Systems Architecture, 109, 101827. https://doi.org/10.1016/j.sysarc.2020.101827
Omar, A. H. E., Soubra, H., Moulla, D. K., & Abran, A. (2024). An innovative honeypot architecture for detecting and mitigating hardware Trojans in IoT devices. IoT, 5(4), 730–755. https://doi.org/10.3390/iot5040033
Aung, P. P., Aslam, S., & Chong, C. W. (2024). PUF-based lightweight security subsystems for IoT hardware: A concept. In: Selected Proceedings from the 2nd International Conference on Intelligent Manufacturing and Robotics, ICIMR 2024, Lecture Notes in Networks and Systems, vol. 1316. Springer. https://doi.org/10.1007/978-981-96-3949-6_31
Jasim, W. A., Kwyja, Y. M., Al-Mfarji, A. M. F., & Mohammed, M. (2024). An exhaustive examination of architectural methods for hardware security mechanisms in IoT devices. Radioelectronics, Nanosystems, Information Technologies, 16(5), 643–656. https://doi.org/10.17725/j.rensit.2024.16.643
Cano Quiveu, G., Ruiz-de-Clavijo-Vázquez, P., & Bellido, M. J. (2021). Embedded LUKS (E-LUKS): A hardware solution to IoT security. Electronics, 10(23), 3036. https://doi.org/10.3390/electronics10233036
Elmaghbub, A., & Hamdaoui, B. (2024). Domain-agnostic hardware fingerprinting-based device identifier for zero-trust IoT security. IEEE Wireless Communications, 31(2), 42–48. https://doi.org/10.1109/MWC.001.2300420
Bharathi, R., & Parvatham, N. (2020). Hardware-based physical layer security solutions and algorithms for IoT devices on FPGA platform. International Journal of Innovative Technology and Exploring Engineering, 9(3), 2128–2132. https://doi.org/10.35940/ijitee.C8752.019320
Rozlomii, I. O., Symoniuk, V. P., Naumenko, S. V., & Mykhailovskyi, P. V. (2024). Security model of interconnected computing devices based on a lightweight encryption scheme for IoT. Computer-Integrated Technologies: Education, Science, Production, 55, 191–198. https://doi.org/10.36910/6775-2524-0560-2024-55-24
Tymenko, A. V., Shkarupylo, V. V., & Smolii, V. V. (2020). Neural network model for controlling hardware compatibility of IoT system components. Bulletin of Zaporizhzhia National University. Physical and Mathematical Sciences, (2), 52–59. https://doi.org/10.26661/2413-6549-2020-2-07
Yevdokymov, S. O. (2025). Modeling threats and developing security strategies for protecting IoT railway networks. Information Technologies and Computer Engineering. Scientific Works of VNTU, (1), 37–45. http://dx.doi.org/10.31649/2307-5376-2025-1-37-45
Lohutova, O., & Belei, O. (2019). Data transmission security for the Internet of Things. Cybersecurity: Education, Science, Technology, 2(6), 18. https://doi.org/10.28925/2663-4023.2019.6.618
Samoylenko, M. (2020). Security issues in the implementation practice of Internet of Things technology. Computer-Integrated Technologies: Education, Science, Production, (41), 198–204. https://doi.org/10.36910/6775-2524-0560-2020-41-31
ITU, Telecommunication Standardization Sector of. (2012). Overview of the Internet of Things (Recommendation ITU-T Y.2060). International Telecommunication Union. https://www.itu.int/rec/T-REC-Y.2060
Zhurakovskyi, B. Yu., & Zeniv, I. O. (2021). Internet of Things technologies. Igor Sikorsky Kyiv Polytechnic Institute.
ITU, Telecommunication Standardization Sector. (2019). Architectural reference models of devices for Internet of Things applications (Recommendation ITU-T Y.4460). International Telecommunication Union. https://www.itu.int/rec/T-REC-Y.4460
Cisco Systems. (2014). The Internet of Things reference model. https://dl.icdst.org/pdfs/files4/0f1d1327c5195d1922175dd77878b9fb.pdf
Dasgupta, D., Roy, A., & Nag, A. (2017). Continuous Authentication. In: Advances in User Authentication. Infosys Science Foundation Series(). Springer, Cham, 185-233. https://doi.org/10.1007/978-3-319-58808-7_6
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Валерій Дудикевич, Галина Микитин, Тарас Мурак

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.