Please use this identifier to cite or link to this item: http://dx.doi.org/10.25673/118112
Title: Context-Defined Model of Open Systems Interaction for IoT Cybersecurity Issues Study
Author(s): Tikhonov, Victor
Siemens, EduardLook up in the Integrated Authority File of the German National Library
Vasiliu, Yevhen
Sitnikov, Valery
Taher, Abdullah
Tykhonova, Olena
Shulakova, Kateryna
Tikhonov, Serhii
Granting Institution: Hochschule Anhalt
Issue Date: 2024-11-30
Extent: 1 Online-Ressource (10 Seiten)
Language: English
Abstract: The article considers the issues of IoT systems and networks privacy. The complex researches on general system theory state of the art has been surveyed, as well as cybersecurity aspects of IoT technologies and models analyzed over the past decades with respect to the Industry 4.0 concept and industrial IoT architecture. A comprehensive decomposition formalism proposed on the base of M. Mesarowic system theory for presenting the complex cybersecurity object of study as a set of its parts. An original context-defined model of open systems interaction S-CDM has been constructed for cybersecurity issues study with the use of J. Neumann classification and A. Uemov system triad. The S-CDM model is shaped in 3-layer hierarchical graph. The first S-CDM layer displays the cybersecurity problem as a set of relations between the key players of information market  resources, clients and agents. The second S-CDM layer adds the network technologies impact on the relations between the key market-players. The third S-CDM layer includes a “degree of trust” factor into the key market-player relationships. The introduced context-defined model enables to reduce the overall problem complexity of the IoT cybersecurity study to a number of less complex and easy-handled partial tasks. As an example, a particular local version of the S-CDM model is considered in the form of six independent tasks for AI-aided methods of cybersecurity provision. The results of the work intend to contribute general system researches in the sphere of network system modelling and IoT privacy.
URI: https://opendata.uni-halle.de//handle/1981185920/120071
http://dx.doi.org/10.25673/118112
Open Access: Open access publication
License: (CC BY-SA 4.0) Creative Commons Attribution ShareAlike 4.0(CC BY-SA 4.0) Creative Commons Attribution ShareAlike 4.0
Appears in Collections:International Conference on Applied Innovations in IT (ICAIIT)

Files in This Item:
File Description SizeFormat 
1-5-ICAIIT_2024_12(2).pdf1.1 MBAdobe PDFThumbnail
View/Open