A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit <a rel="external noopener" href="http://nti.khai.edu/ojs/index.php/reks/article/download/reks.2021.1.12/1451">the original URL</a>. The file type is <code>application/pdf</code>.
<i title="National Aerospace University - Kharkiv Aviation Institute">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/l43a47wlofb5pf2cvkqidlgdhi" style="color: black;">RADIOELECTRONIC AND COMPUTER SYSTEMS</a>
The subject of study in the paper is the analysis of technologies, architectures, vulnerabilities and cyberattacks, communication patterns of smart objects, messaging models, and Internet of Things (IoT) / Web of Things (WoT) protocols for solving applied problems of critical and non-critical systems. The goal is to develop a method for selecting messaging models and application-level protocols in non-critical and critical multi-level IoT/WoT systems, provided that the type of access to<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32620/reks.2021.1.12">doi:10.32620/reks.2021.1.12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/72ysxqhxune77hrgdacjq4uhyu">fatcat:72ysxqhxune77hrgdacjq4uhyu</a> </span>
more »... ent objects is initially determined by the initial data, as well as analysis of vulnerabilities and attacks using these protocols. Objectives: to formalize the procedure for choosing communication protocols for IoT/WoT systems; analyze possible vulnerabilities of communication protocols; develop a method for selecting communication protocols for given initial data, depending on the selected type of communication template for smart objects; check practically the proposed method. The methods of research are methods of system analysis. The following results were obtained. The analysis of the features of communication protocols is conducted by comparing the main interrelated characteristics of IoT/WoT, the results of which are presented in the form of a table. A method has been developed for selecting communication protocols, depending on the selected type of communication template. The analysis of possible vulnerabilities of communication protocols and possible attacks using these protocols is conducted. The author has tested the method using the example of a corporate system (Smart House) based on the WoT concept. Findings. The scientific novelty of the results obtained is as follows: the analysis conducted in the paper shows that currently there is no unified approach to the choice of a messaging model and application-level protocols for building IoT/WoT, depending on the selected type of communication template for smart objects. The method for selecting communication protocols for the given conditions (for each IoT system its interaction pattern will correspond, depending on which components interact with each other), improved by the authors of the paper, makes it possible to simplify the task of using separate protocols for given IoT systems, considering vulnerabilities of protocols.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210420064852/http://nti.khai.edu/ojs/index.php/reks/article/download/reks.2021.1.12/1451" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/78/c2/78c265adae7cf8efa4c1ee3ea335fb8755866a81.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32620/reks.2021.1.12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>