Security Methodology of Cyber-Physical Systems and the Internet of Things in Intellectualization of Infrastructure Objects

: pp. 44 - 53
Lviv Polytechnic National University
Lviv Polytechnic National University
Lviv Polytechnic National University, Information Security Department
Lviv Polytechnic National University, Information Security Department

A multi-level structure of safe intellectualization of society’s infrastructure “objects – cyber-physical systems” in the functional space “selection – exchange of information – processing – management” is proposed according to the profiles – confidentiality, integrity, availability for “smart environmental monitoring”, “smart education”, “smart energy”, “intelligent transport system” and other subject areas.

The multi-level structure “objects – cyber-physical systems” of safe intellectualization is revealed by the paradigm “multi-level cyber-physical system – multi-level information security”, which is the basis for building complex security systems of technologies of physical space, communication environment and cyberspace.

A hierarchical model of Internet of Things security is built based on a three-layer architecture and the concept of “object – threat – protection”. The complex security model of the wireless communication environment of cyber-physical systems for segments of the intellectualization of society’s infrastructure is analysed. The presented methodology of safe processes of intellectualization allows the implementation of complex security systems of technologies for the functioning of society's infrastructure objects.

  1. Schwab Klaus. The Fourth Industrial Revolution. Geneva: World Economic Forum, 2016. Available at: (Accessed: 17 March 2024).
  2. Gajdzik Bozena. Grabowska Sandra and Saniuk Sebastian. A Theoretical Framework for Industry 4.0 and Its Implementation with Selected Practical Schedules // Energies 2021, 14, 940, DOI: 10.3390/en14040940
  3. Khan Firoz, Kumar R. Lakshmana, Kadry Seifedine, Nam Yunyoung, Meqdad Maytham N. Cyber physical systems: A smart city perspective // International Journal of Electrical and Computer Engineering (IJECE). Vol. 11. No. 4. August 2021. Pp. 3609–3616. DOI: 10.11591/ijece.v11i4.pp3609-3616
  4. Yaacoub Jean-Paul A., Salman Ola, Noura Hassan N., Kaaniche Nesrine, Chehab Ali, Malli Mohamad. Cyber-physical systems security: Limitations, issues and future trends, Microprocessors and Microsystems, Volume 77, 2020, 103201, ISSN 0141-9331. DOI: 10.1016/j.micpro.2020.103201
  5. Sandberg H. (2020). Cyber-Physical Security. In: Baillieul J., Samad T. (eds). Encyclopedia of Systems and Control. Springer, London. DOI: 10.1007/978-1-4471-5102-9_100112-1
  6. Opirskyy I., Tyshyk I., Susukailo V. Evaluation of the Possibility of Realizing the Crime of the Information System at Different Stages of TCP/IP (2021) 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies, AICT 2021 – Proceedings, pp. 261–265, Cited 0 times. DOI: 10.1109/AICT52120.2021.962893.
  7. Maksymovych V., Nyemkova E., Justice C., Shabatura M., Harasymchuk O., Lakh Y., Rusynko M. Simulation of Authentication in Information-Processing Electronic Devices Based on Poisson Pulse Sequence Generators. Electronics. (2022), 11(13):2039. DOI: 10.3390/electronics11132039
  8. Lombardi M., Pascale F., Santaniello D. Internet of Things: A General Overview between Architectures, Protocols and Applications. Information 2021, 12(2), 87. DOI: 10.3390/info12020087
  9. Wu C. K. Internet of Things Security. Architectures and Security Measures. Advances in Computer Science and Technology (In cooperation with the China Computer Federation (CCF). Springer, Singapore, 2021. 245 p. DOI: 10.1007/978-981-16-1372-2
  10. Gupta N., Garg U. (2022). A Proposed IoT Security Framework and Analysis of Network Layer Attacks in IoT. In: Sharma T. K., Ahn C. W., Verma O. P., Panigrahi B. K. (eds). Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, Vol. 1380. Springer, Singapore. DOI: 10.1007/978-981-16-1740-9_9
  11. Mykytyn H. V. Complex security system of cyber-physical system “iPhone – Wi-Fi, Bluetooth – sensors” /V. B. Dudykevych, G. V. Mykytyn, A. I. Rebets // Information processing systems.  2017.  No. 2 (148).  Pp. 84–87. DOI: 10.30748/soi.2017.148.16 [In Ukrainian].
  12. Dudykevych V. B. ZigBee, Wi-Fi and Bluetooth wireless sensor networks in cyber-physical systems: the “object – threat – protection” concept based on the OSI model / V. B. Dudykevych, H. V. Mykytyn, A. I. Rebets, M. V. Melnyk // Information processing systems. 2019. Issue 2 (157). Pp. 114–120. DOI: 10.30748/soi.2019.157.16 [In Ukrainian].
  13. Osterhage W. Wireless Network Security: Second Edition. CRC Press, 2018. 202 p. DOI: 10.1201/9781315106373
  14. Sako K., Tippenhauer N. O. (eds.) Applied Cryptography and Network Security. ACNS 2021. Lecture Notes in Computer Science, vol. 12726. Springer, Cham, 2021. 482 p. DOI: 10.1007/978-3-030-78372-3
  15. Chakraborty M., Jha R. K., Balas V. E., Sur S. N., Kandar D. (еds.) Trends in Wireless Communication and Information Security. Lecture Notes in Electrical Engineering, Vol. 740. Springer, Singapore, 2021. 416 p. DOI: 10.1007/978-981-33-6393-9
  16. Nazir R., Laghari A. A., Kumar K. et al. Survey on Wireless Network Security. Archives of Computational Methods in Engineering (2021). DOI: 10.1007/s11831-021-09631-5
  17. Zatserkovnyi V. I., Oberemok N. V., Tishaiev I. V., Kazanyuk T. A. Using of GIS technologies and remote sensing tools for monitoring of water objects // Science-Based Technologies. No. 1 (33), 2017. Рp. 78 88. DOI: 10.18372/2310-5461.33.11563 [In Ukrainian]
  18. Kropyvnytskyi V., Pavlyshyn M., Chumak V. Highly mobile environmental monitoring laboratory. [Electronic resource]. Available at: monitoryngu (Accessed: 17 March 2024). [In Ukrainian]
  19. Information security in the environment of wireless sensor networks: a monograph / M. B. Aleksander, S. M. Balaban, M. P. Karpinskyi, S. A. Raiba, V. M. Chyzh. Ternopil: publishing house Ivan Puluj TNTU, 2016. 160 p. Available at: (Accessed: 17 March 2024). [In Ukrainian]
  20. Awan S., Javaid N., Ulla, S., Khan A. U., Qamar A. M., Choi J.-G. Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks. Sensors 2022, 22, 411. DOI: 10.3390/s22020411
  21. Zhu L., Xiang H., Zhang K. A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks. Symmetry 2022, 14, 46. DOI: 10.3390/sym14010046