DEVELOPMENT OF THE DOUBLE-CONTOUR PROTECTION CONCEPT IN SOCIO-CYBERPHYSICAL SYSTEMS

Main Article Content

Serhii Pohasii
Stanislav Milevskyi
Bogdan Tomashevsky
Natalya Voropay

Abstract

The rapid development of mobile Internet technologies LTE (Long-Term Evolution) not only predetermined the further development of cyber-physical systems, which are based on the synthesis of technologies of classical computer systems and LTE technologies, as well as integration with Internet-of-Things technologies. As a result, the emergence of sociocyberphysical systems predetermines further development based on this integration. The creation of mesh- and sensor networks also allows the development of smart technologies and systems based on their conglomeration. The development and creation of a quantum computer, on the one hand, will make it possible to make a technical breakthrough in computing resources, use artificial intelligence, and on the other hand, it can lead to “chaos” in ensuring the security of modern technologies and systems. So, based on the algorithms of Shor and Grover quantum cryptography, symmetric cryptosystems based on traditional cryptography algorithms, as well as asymmetric cryptosystems, including systems based on elliptic curve cryptography, can be broken. The paper proposes to use a new approach to building security systems based on the concept of internal and external security contours. At the same time, security contours of continuous business processes are considered. This approach provides an objective assessment of the current state of security of the socio-cyber system as a whole.

Article Details

How to Cite
Pohasii, S., Milevskyi, S., Tomashevsky, B., & Voropay, N. (2022). DEVELOPMENT OF THE DOUBLE-CONTOUR PROTECTION CONCEPT IN SOCIO-CYBERPHYSICAL SYSTEMS. Advanced Information Systems, 6(2), 57–66. https://doi.org/10.20998/2522-9052.2022.2.10
Section
Methods of information systems protection
Author Biographies

Serhii Pohasii, National Technical University “Kharkiv Polytechnic Institute”, Kharkiv

Candidate of Economic Sciences, Associate Professor, Department of Cyber Security

Stanislav Milevskyi, National Technical University “Kharkiv Polytechnic Institute”, Kharkiv

Candidate of Engineering Sciences, Associate Professor, Department of Cyber Security

Bogdan Tomashevsky, Ternopil Ivan Puluj National Technical University, Ternopil

Candidate of Engineering Sciences, Senior researcher, Department of Cyber Security

Natalya Voropay, National Technical University “Kharkiv Polytechnic Institute”, Kharkiv

Candidate of Engineering Sciences, Assistant, Department of Cyber Security

References

Gryshchuk, RV and Danyk, Yu. G. (2016), Fundamentals of cyber security, ZhNAEU, Zhytomyr, 2016, 636 p.

Yevseiev, S., Ryabukha, Yu., Milov, O., Milevskyi, S., Pohasii, S., Ivanchenko, Ye., Ivanchenko, I., Melenti, Ye., Opirskyy, I. and Pasko, I. (2021), “Development of a method for assessing forecast of social impact in regional communities”, Eastern-European Journal of Enterprise Technologies, 6/2 (114), pp. 30–47.

Feng, Xia and Jianhua, Ma (2011), “Building smart communities with cyber-physical systems”, SCI '11: Proceedings of 1st international symposium on From digital footprints to social and community intelligence, September 2011, pp. 1–6, DOI: https://doi.org/10.1145/2030066.2030068.

Guo, B., Yu, Z. and Zhou, X. (2015), “A Data-Centric Framework for Cyber-Physical-Social Systems”, IT Prof., 17, pp. 4–7, availble at: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7332207.

Kuang, L., Yang, L. and Liao, Y. (2015), “An Integration Framework on Cloud for Cyber Physical Social Systems Big Data”, IEEE Trans. Cloud Comput., availble at: https://ieeexplore.ieee.org/document/7364232.

Lin, C.C., Deng, D.J. and Jhong, S.Y. (2017), “A Triangular NodeTrix Visualization Interface for Overlapping Social Community Structures of Cyber-Physical-Social Systems in Smart Factories”, IEEE Trans. Emerg. Top. Comput., DOI: https://dl.acm.org/doi/10.1145/2030066.2030068.

(2017), Cyber–Physical–Social Frameworks for Urban Big Data Systems: A Survey, DOI: http://dx.doi.org/10.3390/app7101017.

Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021), Synergy of building cybersecurity systems, РС ТЕСHNOLOGY СЕNTЕR, Kharkiv, 188 p., DOI: http://doi.org/10.15587/978-617-7319-31-2.

Shmatko, O., Balakireva, S., Vlasov, А., Zagorodna, N., Korol, О., Milov, O., Petrov, O., Pohasii, S., Rzayev, Kh. and Khvostenko V. (2020), “Development of methodological foundations for a classifier of threats to cyberphysical systems design”, Eastern-European Journal of Enterprise Technologies, 3/9 (105), pp. 6–19.

(2021), Report on Post-Quantum Cryptography, available at: http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8105.pdf.

Parthasarathy S. (2011), “Community discovery in social networks: applications, methods and emerging trends”, Social Network Data Analytics, pp 79–113, DOI: https://doi.org/10.1007/978-1-4419-8462-3_4.

Jimeng, Sun & Jie, Tang (2011), “A survey of models and algorithms for social influence analysis”, Social Network Data Analytics, pp 177–214, DOI: https://doi.org/10.1007/978-1-4419-8462-3_7.

Anagnostopoulos, A., Kumar, R. and Mahdian, M. (2008), “Influence and correlation in social networks” Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD’08), pp. 7–15, DOI: https://doi.org/10.1145/1401890.1401897.

Goyal, A., Bonchi, F. and Lakshmanan L. V. (2010), “Learning influence probabilities in social networks”, Proceedings of the 3st ACM International Conference on Web Search and Data Mining (WSDM’10), pp. 207–217, DOI: https://doi.org/10.1145/1718487.1718518.

Xiang, R., Neville, J. and Rogati, M. (2010), “Modeling relationship strength in online social networks”, Proceeding of the 19th international conference on World Wide Web (WWW’10), pp. 981–990, DOI: https://doi.org/10.1145/1772690.1772790.

Scripps, J., Tan, P.-N. and Esfahanian, A.-H. (2009), “Measuring the effects of preprocessing decisions and network forces in dynamic network analysis”, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD’09), pp. 747–756, DOI: https://doi.org/10.1145/1557019.1557102.

Merz, H., Hansemann, T. and Hübner, C. (2009), Building Automation: Communication systems with EIB/KNX, LON und BACnet / Springer-Verlag Berlin Heidelberg, 293 p.

(2017), KNX Technical Manual 2CKA001473B8668. KNX Technical Manual. Busch-Presence detector KNX, Busch-Watchdog Sky KNX, Busch-Jaeger Elektro GmbH, 198 p.

(2006), Technical documentation on KNX devices, ABB.

(2004), KNX Handbook, Version 1.1 Revision 1. Konnex Association.

(2016), ABB i-bus KNX KNX Security Panel GM/A 8.1 Product Manual, Busch-Watchdog Sky KNX lektro GmbH, 648 p.

Schilder Jü. and Reibel T. (2016), ABB GPG Building Automation Webinar ABB i-bus® KNX Basics and Products, March 3, 2016, Busch-Watchdog Sky KNX Busch-Jaeger Elektro GmbH, 86 p.

(2017), Manual for KNX Planning, Siemens Switzerland Ltd, 100 p.

(2010), Security Technology KNX-Intrusion Alarm System L240 Installation, Commissioning, Operation, Busch-Watchdog Sky KNX, Busch-Jaeger Elektro GmbH, 116 p.

(2021), "Cloud" 10 years old. From a startup in the emerging market to a successful company and new heights, available at: https://tadviser.com.

Yevseiev, S., Melenti, Y., Voitko, O., Hrebeniuk, V., Korchenko, A., Mykus, S., Milov, O., Prokopenko, O., Sievierinov О. & Chopenko, D. (2021), “Development of a concept for building a critical infrastructure facilities security system” ,Eastern-European Journal of Enterprise Technologies, Vol. 3(9(111), pp. 63–83, DOI: https://doi.org/10.15587/1729-4061.2021.233533.