Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Cyber Resilient Platform for Internet of Things (IIOT/IOT)ED Systems: Survey of Architecture Patterns

View through CrossRef
Purpose of the article: development of tools for building the cyber resilient platform for Internet of things (IIoT/IoT). The urgency of development the cyber resilient platform for Internet of things (IIoT/IoT) is to provide the required security and resilience of critical information infrastructure of the Russian Federation in the face of rising security threats, and imperfection of the known models, methods and means for data collection and processing in IIoT/IoT networks, based on the wireless technology Sigfox, LoRaWaN, “Strij/”Vaviot” (XNB/Nb-Fi), NBIoT. Research methods: It uses the author’s models and methods of similarity and dimensions theory of the distributed computing, as well as the domestic technology of wireless communication Logic Inter Node Connection (LINC) (http:// aura360.ru/), as well as the domestic FenixOS operating system (https://fenix.link/kontakty/), designed for collecting and processing the telemetry data. Results: Developed tools for building the cyber resilient platform for Internet of things (IIoT/IoT). The article presents the main scientific and technical results of solving this problem. The research was carried out within the framework of the Federal project “Information security” of the national program “Digital economy of the Russian Federation”. It is important to note that the results allowed designing a prototype of the domestic Internet of things (IIoT/IoT) platform with self-healing data reception and transmission paths between smart devices
Title: Cyber Resilient Platform for Internet of Things (IIOT/IOT)ED Systems: Survey of Architecture Patterns
Description:
Purpose of the article: development of tools for building the cyber resilient platform for Internet of things (IIoT/IoT).
The urgency of development the cyber resilient platform for Internet of things (IIoT/IoT) is to provide the required security and resilience of critical information infrastructure of the Russian Federation in the face of rising security threats, and imperfection of the known models, methods and means for data collection and processing in IIoT/IoT networks, based on the wireless technology Sigfox, LoRaWaN, “Strij/”Vaviot” (XNB/Nb-Fi), NBIoT.
Research methods: It uses the author’s models and methods of similarity and dimensions theory of the distributed computing, as well as the domestic technology of wireless communication Logic Inter Node Connection (LINC) (http:// aura360.
ru/), as well as the domestic FenixOS operating system (https://fenix.
link/kontakty/), designed for collecting and processing the telemetry data.
Results: Developed tools for building the cyber resilient platform for Internet of things (IIoT/IoT).
The article presents the main scientific and technical results of solving this problem.
The research was carried out within the framework of the Federal project “Information security” of the national program “Digital economy of the Russian Federation”.
It is important to note that the results allowed designing a prototype of the domestic Internet of things (IIoT/IoT) platform with self-healing data reception and transmission paths between smart devices.

Related Results

An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)
An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)
The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). These advancem...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
The architecture of differences
The architecture of differences
Following in the footsteps of the protagonists of the Italian architectural debate is a mark of culture and proactivity. The synthesis deriving from the artistic-humanistic factors...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create th...

Back to Top