Опубликована: Июнь 5, 2024
Язык: Английский
Опубликована: Июнь 5, 2024
Язык: Английский
Eastern-European Journal of Enterprise Technologies, Год журнала: 2024, Номер 4(9 (130)), С. 18 - 33
Опубликована: Авг. 30, 2024
The development of data transmission systems based on wireless radio communication channels allowed the construction fundamentally new networks – mesh networks, which are used not only in smart technologies, but basis for cyber-physical and socio-cyber-physical (objects critical infrastructure). object is process ensuring reliable secure use channels. A mathematical model information resources protection system functioning proposed to ensure signs immunity security automated system. To identify threats, a unified classifier flow state estimation technique used, take into account hybridity synergy targeted (mixed) attacks points infrastructure elements, as well that circulates and/or stored, determined. assessment compliance with regulators’ requirements, both international regulatory acts, presence ability elements required level taken account. approach allows determine: coefficients internal availability channel, vector potential lagging magnetic field result work. When evaluating coefficient channel availability, it coherent reception signal. At same time, factor much higher than 1, provides sufficient information. technical solution will allow confidentiality, integrity, authenticity reliability 100 %The %
Язык: Английский
Процитировано
1GSC Advanced Research and Reviews, Год журнала: 2024, Номер 18(3), С. 208 - 233
Опубликована: Март 15, 2024
The network interface layer of the TCP/IP protocol suite, primarily comprised Internet Protocol (IP), serves as backbone modern internet communication. With its efficient data delivery, layer, presents key challenges in terms performance, security, and privacy. This comprehensive survey delves into these three crucial aspects, analyzing inherent vulnerabilities, limitations provide solutions related problems. performance analysis explores throughput, latency, bandwidth constraints, along with such allocation optimization techniques. Vulnerabilities within Network Interface Layer, including denial-of-service attacks MAC address spoofing, are discussed, a review existing security mechanisms. Privacy flaws examined, covering tracking, profiling risks, anonymization techniques, while also addressing privacy considerations on Things. analyzes several case studies providing comparative protocols, support real world scenarios high density environment, risks smart homes networks. findings understanding complexities surrounding issues future directions potential solutions.
Язык: Английский
Процитировано
0Опубликована: Июнь 5, 2024
Язык: Английский
Процитировано
0