Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал: http://elartu.tntu.edu.ua/handle/lib/44852
Повний запис метаданих
Поле DCЗначенняМова
dc.contributor.advisorПасічник, Володимир Володимирович-
dc.contributor.authorКоваль, Максим Олексійович-
dc.contributor.authorKoval, Maksym Oleksiiovych-
dc.date.accessioned2024-06-03T13:29:37Z-
dc.date.available2024-06-03T13:29:37Z-
dc.date.issued2024-05-30-
dc.date.submitted2024-05-16-
dc.identifier.citationКоваль М.О. Дослідження захищених мережевих архітектур та протоколів Інтернету речей у «розумних містах»: кваліфікаційна робота на здобуття освітнього ступеня магістр за спеціальністю „122 – Комп’ютерні науки “ / М.О. Коваль – Тернопіль : ТНТУ, 2024. – 83 с.uk_UA
dc.identifier.urihttp://elartu.tntu.edu.ua/handle/lib/44852-
dc.description.abstractКваліфікаційна робота присв’ячена дослідженню захищених мережевих архітектур та протоколів Інтернету речей у «розумних містах» В першому розділі кваліфікаційної роботи розглянуто архітектуру системи Інтернету речей. Проаналізовано елементи безпеки в «розумних містах». Обґрунтовано важливість питань захисту та безпеки для протоколів ІоТ. В другому розділі кваліфікаційної роботи описано виклики безпеки та конфіденційності. Досліджено методології захисту архітектури «розумного міста» В третьому розділі кваліфікаційної роботи запропоновано компоненти безпечної архітектури ІоТ та протоколів в «розумному місті» В четвертому розділі кваліфікаційної роботи розглянуто забезпечення безпечної роботи з обладнанням. The qualification work is devoted to the study of secure network architectures and protocols of the Internet of Things in "smart cities" The first chapter of the qualification work describes the architecture of the Internet of Things system. The security elements in smart cities are analyzed. The importance of protection and security issues for IoT protocols is substantiated. The second section of the qualification work describes the security and privacy challenges. The methodologies for protecting the architecture of the "smart city" are investigated. The third section of the qualification work proposes components of a secure IoT architecture and protocols in the "smart city" The fourth section of the qualification work considers ensuring safe operation of equipment.uk_UA
dc.description.tableofcontentsВСТУП 8 1 АНАЛІЗ ПРЕДМЕТНОЇ ОБЛАСТІ 10 1.1 Архітектура системи Інтернету речей 13 1.2 Технології IoT 14 1.3 Елементи безпеки IoT 15 1.4 Розумні міста: безпека мережевого рівня 16 1.5 Соціально-технічна безпеки в розумних містах 19 1.6 Висновок до першого розділу 20 2 МЕТОДОЛОГІЯ ЗАХИСТУ АРХІТЕКТУРИ «РОЗУМНИХ МІСТ» 21 2.1 Виклики безпеки та конфіденційності в архітектурах IoT 21 2.2 Висновок до другого розділу 23 3 БЕЗПЕЧНІ АРХІТЕКТУРИ «РОЗУМНОГО МІСТА» 25 3.1 Архітектури «розумних міст» 25 3.1.1 IoT-A 25 3.1.2 iCore 28 3.1.3 BUTLER 31 3.1.4 OpenIoT 33 3.1.5 SMARTIE 35 3.1.6 COSMOS 36 3.1.7 COMPOSE 38 3.1.8 PRISMACLOUD 43 3.1.9 RERUM 45 3.2 Компоненти безпечної архітектури Інтернету речей для «розумного міста» 47 3.2.1 Чорні мережі 49 3.2.2 Довірений SDN контролер 50 3.2.3 Єдиний реєстр 50 3.2.4 Система управління ключами 51 3.3 Протоколи для застосунків «розумного міста» 52 3.4 Заходи безпеки IoT 56 3.4.1 ZigBee 56 3.4.2 Bluetooth 57 3.4.3 RFID 58 3.4.4 WiFi 59 3.5 Висновок до третього розділу 60 4 ОХОРОНА ПРАЦІ ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦІЯХ 61 4.1 Питання щодо охорони праці 61 4.2 Питання щодо безпеки в надзвичайних ситуаціях 64 4.3 Висновок до четвертого розділу 68 ВИСНОВКИ 69 ПЕРЕЛІК ДЖЕРЕЛ 71 ДОДАТКИuk_UA
dc.language.isoukuk_UA
dc.subjectрозумне містоuk_UA
dc.subjectsmart cityuk_UA
dc.subjectінтернет речейuk_UA
dc.subjectinternet of thingsuk_UA
dc.subjectбезпекаuk_UA
dc.subjectsecurityuk_UA
dc.subjectпротоколиuk_UA
dc.subjectprotocolsuk_UA
dc.subjectконфіденційнітьuk_UA
dc.subjectprivacyuk_UA
dc.subjectмережіuk_UA
dc.subjectnetworksuk_UA
dc.subjectмоніторингuk_UA
dc.subjectmonitoringuk_UA
dc.subjectціліснітьuk_UA
dc.subjectintegrityuk_UA
dc.titleДослідження захищених мережевих архітектур та протоколів Інтернету речей у «розумних містах»uk_UA
dc.title.alternativeResearch on protected network architectures and Internet protocols in "smart cities"uk_UA
dc.typeMaster Thesisuk_UA
dc.rights.holder© Коваль Максим Олексійович, 2024uk_UA
dc.contributor.committeeMemberМихалик, Дмитро Михайлович-
dc.coverage.placenameТНТУ ім. І.Пулюя, ФІС, м. Тернопіль, Українаuk_UA
dc.subject.udc004.9uk_UA
dc.relation.references1 Abid, Muhammad Aneeq, et al. "Evolution towards smart and software-defined internet of things." AI 3.1 (2022): 100-123.uk_UA
dc.relation.references2 Vermesan, Ovidiu, et al. "Internet of things strategic research and innovation agenda." Internet of things. River Publishers, 2022. 7-151.uk_UA
dc.relation.references3 Sankar, SM Udhaya, Mary Subaja Christo, and PS Uma Priyadarsini. "Secure and energy concise route revamp technique in wireless sensor networks." Intelligent Automation and Soft Computing 35.2 (2023): 2337-2351.uk_UA
dc.relation.references4 Menon, Varun G., et al. "An IoT-enabled intelligent automobile system for smart cities." Internet of Things 18 (2022): 100213.uk_UA
dc.relation.references5 Ismagilova, Elvira, et al. "Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework." Information Systems Frontiers (2022): 1-22.uk_UA
dc.relation.references6 Sharma, Avani, et al. "Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes." Computer Communications 160 (2020): 475-493.uk_UA
dc.relation.references7 HaddadPajouh, Hamed, et al. "A survey on internet of things security: Requirements, challenges, and solutions." Internet of Things 14 (2021): 100129.uk_UA
dc.relation.references8 Mishra, Nivedita, and Sharnil Pandya. "Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review." IEEE Access 9 (2021): 59353-59377.uk_UA
dc.relation.references9 Badr, Youakim, Xiaoyang Zhu, and Mansour Naser Alraja. "Security and privacy in the Internet of Things: threats and challenges." Service Oriented Computing and Applications 15.4 (2021): 257-271.uk_UA
dc.relation.references10 Malhotra, Parushi, et al. "Internet of things: Evolution, concerns and security challenges." Sensors 21.5 (2021): 1809.uk_UA
dc.relation.references11 Peng, Kai, et al. "Security challenges and opportunities for smart contracts in Internet of Things: A survey." IEEE Internet of Things Journal 8.15 (2021): 12004-12020.uk_UA
dc.relation.references12 Omolara, Abiodun Esther, et al. "The internet of things security: A survey encompassing unexplored areas and new insights." Computers & Security 112 (2022): 102494.uk_UA
dc.relation.references13 Syed, Abbas Shah, et al. "IoT in smart cities: A survey of technologies, practices and challenges." Smart Cities 4.2 (2021): 429-475.uk_UA
dc.relation.references14 Sharma, Rohit, and Rajeev Arya. "Security threats and measures in the Internet of Things for smart city infrastructure: A state of art." Transactions on Emerging Telecommunications Technologies 34.11 (2023): e4571.uk_UA
dc.relation.references15 Mansour, Mohammad, et al. "Internet of things: a comprehensive overview on protocols, architectures, technologies, simulation tools, and future directions." Energies 16.8 (2023): 3465.uk_UA
dc.relation.references16 Stergiou, Christos L., Elisavet Bompoli, and Konstantinos E. Psannis. "Security and privacy issues in IoT-based big data cloud systems in a digital twin scenario." Applied Sciences 13.2 (2023): 758.uk_UA
dc.relation.references17 Sarker, Iqbal H., et al. "Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions." Mobile Networks and Applications 28.1 (2023): 296-312.uk_UA
dc.relation.references18 Rekha, Shashi, et al. "Study of security issues and solutions in Internet of Things (IoT)." Materials Today: Proceedings 80 (2023): 3554-3559.uk_UA
dc.relation.references19 Ghazal, Taher M., et al. "Machine learning approaches for sustainable cities using internet of things." The Effect of Information Technology on Business and Marketing Intelligence Systems. Cham: Springer International Publishing, 2023. 1969-1986.uk_UA
dc.relation.references20 Rao, P. Muralidhara, and Bakkiam David Deebak. "Security and privacy issues in smart cities/industries: technologies, applications, and challenges." Journal of Ambient Intelligence and Humanized Computing 14.8 (2023): 10517-10553.uk_UA
dc.relation.references21 Al‐Turjman, Fadi, Hadi Zahmatkesh, and Ramiz Shahroze. "An overview of security and privacy in smart cities' IoT communications." Transactions on Emerging Telecommunications Technologies 33.3 (2022): e3677.uk_UA
dc.relation.references22 Haque, AKM Bahalul, Bharat Bhushan, and Gaurav Dhiman. "Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends." Expert Systems 39.5 (2022): e12753.uk_UA
dc.relation.references23 Vermesan, Ovidiu, et al. "Internet of things beyond the hype: Research, innovation and deployment." Building the Hyperconnected Society-Internet of Things Research and Innovation Value Chains, Ecosystems and Markets. River Publishers, 2022. 15-118.uk_UA
dc.relation.references24 Vasile, Mazilescu. "IoT as a Central Disruptive Technology in the Development of Hyperconnected Business and Social Models." Risk in Contemporary Economy (2021): 261-275.uk_UA
dc.relation.references25 Siwakoti, Yuba Raj, et al. "Advances in IOT security: Vulnerabilities, enabled Criminal Services, attacks and countermeasures." IEEE Internet of Things Journal (2023).uk_UA
dc.relation.references26 Jofre, Marc, et al. "Cybersecurity and privacy risk assessment of point-of-care systems in healthcare—a use case approach." Applied Sciences 11.15 (2021): 6699.uk_UA
dc.relation.references27 Ungurean, Ioan, and Nicoleta Cristina Gaitan. "A software architecture for the Industrial Internet of Things—A conceptual model." Sensors 20.19 (2020): 5603.uk_UA
dc.relation.references28 Zhao, Liqing, Bo Cheng, and Junliang Chen. "Service-oriented IoT resources access and provisioning framework for IoT context-aware environment." 2020 IEEE World Congress on Services (SERVICES). IEEE, 2020.uk_UA
dc.relation.references29 Benotmane, Meryem, Kaoutar Elhari, and Adil Kabbaj. "Survey of IoT Reference Architectures and Models and IoT Initiatives." Proceedings of the Future Technologies Conference (FTC) 2021, Volume 1. Springer International Publishing, 2022.uk_UA
dc.relation.references30 Fabrègue, Brian FG, and Andrea Bogoni. "Privacy and security concerns in the smart city." Smart Cities 6.1 (2023): 586-613.uk_UA
dc.relation.references31 Spirito, Maurizio, et al. "Internet of Things Applications-From Research and Innovation to Market Deployment." Internet of Things Applications-From Research and Innovation to Market Deployment. River Publishers, 2022. 243-285.uk_UA
dc.relation.references32 Baldini, Gianmarco, et al. "Internet of things privacy, security and governance." Internet of Things. River Publishers, 2022. 207-224.uk_UA
dc.relation.references33 Kh, Teeba, and Ibrahim Hamarash. "Model-based quality assessment of internet of things software applications: A systematic mapping study." (2020): 128-152.uk_UA
dc.relation.references34 Denti, Enrico. "Novel pervasive scenarios for home management: the Butlers architecture." SpringerPlus 3 (2014): 1-30.uk_UA
dc.relation.references35 Mahalle, Parikshit N., Gitanjali Rahul Shinde, and Arvind Vinayak Deshpande. The convergence of internet of things and cloud for smart computing. CRC Press, 2021.uk_UA
dc.relation.references36 Baldini, Gianmarco, et al. "Internet of things privacy, security and governance." Internet of Things. River Publishers, 2022. 207-224.uk_UA
dc.relation.references37 Kolarić, Siniša, and Dennis Shelden. "Toward an open IoT implementation for urban environments: The architecture of the DBL SmartCity platform." Smart Cities and Smart Governance: Towards the 22nd Century Sustainable City (2021): 345-372.uk_UA
dc.relation.references38 Camatti, Juliane Andressa, et al. "Comparative study of open IoT architectures with TOGAF for industry implementation." Procedia Manufacturing 51 (2020): 1132-1137.uk_UA
dc.relation.references39 Bhattacharjya, Aniruddha, et al. "Present scenarios of IoT projects with security aspects focused." Digital Twin Technologies and Smart Cities (2020): 95-122.uk_UA
dc.relation.references40 Spirito, Maurizio A., and Maria T. Delgado. "Internet of Things application scenarios, pilots and innovation." Building the Hyperconnected Society-Internet of Things Research and Innovation Value Chains, Ecosystems and Markets. River Publishers, 2022. 119-144.uk_UA
dc.relation.references41 bCEA, L. I. S. T. "USEIT Project: Empowering the Users to Protect Their Data." Security and Privacy in the Internet of Things: Challenges and Solutions 27 (2020): 1.uk_UA
dc.relation.references42 Das, Sangjukta, and Suyel Namasudra. "Multiauthority CP-ABE-based access control model for IoT-enabled healthcare infrastructure." IEEE Transactions on Industrial Informatics 19.1 (2022): 821-829.uk_UA
dc.relation.references43 Pitu L et al (eds) (2015) End-to-End Security and Privacy: Design and Open Specification COSMOS Project Deliverable D3.1.2, 30 April 2015uk_UA
dc.relation.references44 van Oorschot, Paul C. "Public Key Cryptography’s Impact on Society: How Diffie and Hellman Changed the World." Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman. 2022. 19-56.uk_UA
dc.relation.references45 Schreckling D et al (2015) The Compose Security Framework, COMPOSE Deliverable D5.4.2, 15 Nov 2015uk_UA
dc.relation.references46 Li, Peixuan, and Danfeng Zhang. "Towards a general-purpose dynamic information flow policy." 2022 IEEE 35th Computer Security Foundations Symposium (CSF). IEEE, 2022.uk_UA
dc.relation.references47 Koo, Jahoon, and Young-Gab Kim. "Resource identifier interoperability among heterogeneous IoT platforms." Journal of King Saud University-Computer and Information Sciences 34.7 (2022): 4191-4208.uk_UA
dc.relation.references48 Hussain, Mohamed Fazil, et al. "Analyzing Application Response Time Lag: in Mobile Edge and Fog Computing Environments." 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 2023.uk_UA
dc.relation.references49 Lorünser T, Länger T, Slamanig D, Pöhls HC (2016) PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. In: Proceedings of a workshop on security, privacy, and identity management in the cloud collocated at the 11th international conference on availability, reliability and security. ARES’16, Salzburg, Austria, 2016uk_UA
dc.relation.references50 Ghazal, Taher M., et al. "Internet of things connected wireless sensor networks for smart cities." The Effect of Information Technology on Business and Marketing Intelligence Systems. Cham: Springer International Publishing, 2023. 1953-1968.uk_UA
dc.relation.references51 Kabir, Sohag, Prosanta Gope, and Saraju P. Mohanty. "A security-enabled safety assurance framework for iot-based smart homes." IEEE Transactions on Industry Applications 59.1 (2022): 6-14.uk_UA
dc.relation.references52 Basharat, Asma, and Mohd Murtadha Bin Mohamad. "Security challenges and solutions for internet of things based smart agriculture: A review." 2022 4th International Conference on Smart Sensors and Application (ICSSA). IEEE, 2022.uk_UA
dc.relation.references53 Alam, Iqbal, et al. "A survey of network virtualization techniques for Internet of Things using SDN and NFV." ACM Computing Surveys (CSUR) 53.2 (2020): 1-40.uk_UA
dc.relation.references54 Syed, A.S.; Sierra-Sosa, D.; Kumar, A.; Elmaghraby, A. IoT in smart cities: A survey of technologies, practices and challenges. Smart Cities 2021, 4, 429–475.uk_UA
dc.relation.references55 Ahad, Mohd Abdul, et al. "Enabling technologies and sustainable smart cities." Sustainable cities and society 61 (2020): 102301.uk_UA
dc.relation.references56 De Koninck, Tobia, et al. "Experimental validation of IEEE 802.11 ah propagation models in heterogeneous smarty city environments." GLOBECOM 2020-2020 IEEE Global Communications Conference. IEEE, 2020.uk_UA
dc.relation.references57 Mamatas, Lefteris, et al. "Protocol-adaptive strategies for wireless mesh smart city networks." IEEE Network 37.2 (2023): 136-143.uk_UA
dc.relation.references58 Bouzid, S. E., et al. "Wireless sensor and actuator network deployment optimization for a lighting control." International Journal of Computer and Communication Engineering 9.2 (2020): 15.uk_UA
dc.relation.references59 Yang, Chen, et al. "Using 5G in smart cities: A systematic mapping study." Intelligent Systems with Applications 14 (2022): 200065.uk_UA
dc.relation.references60 Zohourian, Alireza, et al. "IoT Zigbee device security: A comprehensive review." Internet of Things (2023): 100791.uk_UA
dc.relation.references61 Adi, Puput Dani Prasetyo, et al. "A performance evaluation of ZigBee mesh communication on the Internet of Things (IoT)." 2021 3rd East Indonesia Conference on Computer and Information Technology (EIConCIT). IEEE, 2021.uk_UA
dc.relation.references62 Lacava, Andrea, et al. "Securing Bluetooth Low Energy networking: An overview of security procedures and threats." Computer Networks 211 (2022): 108953.uk_UA
dc.relation.references63 Costa, Filippo, et al. "A review of RFID sensors, the new frontier of internet of things." Sensors 21.9 (2021): 3138.uk_UA
dc.relation.references64 Taneja, Ashu, et al. "An improved WiFi sensing based indoor navigation with reconfigurable intelligent surfaces for 6G enabled IoT network and AI explainable use case." Future Generation Computer Systems 149 (2023): 294-303.uk_UA
dc.relation.references65 Aziz, Azlan Abd, and Syamsuri Yaacob. "IoT Performance and Security Analysis Based on WiFi Systems." Proceedings of the Multimedia University Engineering Conference (MECON 2022). Vol. 214. Springer Nature, 2023.uk_UA
dc.relation.references66 Стручок В.С. Безпека в надзвичайних ситуаціях. Методичний посібник для здобувачів освітнього ступеня «магістр» всіх спеціальностей денної та заочної (дистанційної) форм навчання / В.С.Стручок. — Тернопіль: ФОП Паляниця В. А., 2022. — 156 сuk_UA
dc.relation.references67 Stanko, A., Palka, O., Matiichuk, L., Martsenko, N., & Matsiuk, O. (2021, September). Smart City: A Review of Model Architecture and Technology. In 2021 IEEE 16th International Conference on Computer Sciences and Information Technologies (CSIT) (Vol. 2, pp. 273-277). IEEE.uk_UA
dc.relation.references68 Palka, O., Kunanets, N., Pasichnyk, V., Matsiuk, O., & Matsiuk, S. (2023). Comparative Analysis of Smart City Platforms. In COLINS (3) (pp. 487-499).uk_UA
dc.contributor.affiliationТНТУ ім. І. Пулюя, Факультет комп’ютерно-інформаційних систем і програмної інженерії, Кафедра комп’ютерних наук, м. Тернопіль, Українаuk_UA
dc.coverage.countryUAuk_UA
Розташовується у зібраннях:122 — комп’ютерні науки

Файли цього матеріалу:
Файл Опис РозмірФормат 
Mag_2024_SNnm_61_Koval_M_O.pdf1,47 MBAdobe PDFПереглянути/відкрити


Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.

Інструменти адміністратора