SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Yevdokymenko Maryna) "

Sökning: WFRF:(Yevdokymenko Maryna)

  • Resultat 1-4 av 4
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Kuzminykh, Ievgeniia, et al. (författare)
  • A performance evaluation of sensor nodes in the home automation system based on arduino
  • 2019
  • Ingår i: 2019 IEEE International Scientific-Practical Conference. - : Institute of Electrical and Electronics Engineers Inc.. - 9781728141848 ; , s. 511-516
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, a home automation system model was constructed with purpose to investigate of the correlation between the performance of wireless communication, power consumption of the constrained IoT devices and security. The series of experiments were conducted using sensor nodes connected to Arduino microcontroller and an RF 433 MHz wireless communication module. Measurements of the execution time and power consumption of the Arduino during data transfer with different security levels, as well as the analysis of the experimental results, were performed. The results show that the lifetime of the IoT device is determined by the communication speed, sleep mode management and depends on encryption. The obtained results can be used to minimize the power consumption of the device and improve communication efficiency. The results show that applied security reduces the productivity and lifetime of the sensor node not significantly. © 2019 IEEE.
  •  
2.
  • Kuzminykh, Ievgeniia, et al. (författare)
  • Investigation of the IoT Device Lifetime with Secure Data Transmission
  • 2019
  • Ingår i: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). - Cham : Springer Verlag. - 9783030308582 ; , s. 16-27
  • Konferensbidrag (refereegranskat)abstract
    • This paper represents the approach for estimation of the lifetime of the IoT end devices. The novelty of this approach is in the taking into account not only the energy consumption for data transmission, but also for ensuring the security by using the encryption algorithms. The results of the study showed the effect of using data encryption during transmission on the device lifetime depending on the key length and the principles of the algorithm used. © 2019, Springer Nature Switzerland AG.
  •  
3.
  • Lemeshko, Oleksandr, et al. (författare)
  • Complex Investigation of the Compromise Probability Behavior in Traffic Engineering Oriented Secure Routing Model in Software-Defined Networks
  • 2022
  • Ingår i: Lecture Notes in Electrical Engineering. - Cham : Springer. - 9783030924355 ; , s. 145-160
  • Konferensbidrag (refereegranskat)abstract
    • In the work, the complex investigation and analysis results of the compromise probability behavior in Traffic Engineering oriented secure routing model in software-defined networks have been presented. Within the framework of the study, the classical flow-based model based on load balancing in accordance with the principles of the Traffic Engineering concept was improved and supplemented with conditions that allow considering the network security parameters in the process of obtaining a routing solution. In this way it was obtained the secure traffic engineering routing model, the novelty of which lies in the modified conditions of load balancing considering such network characteristics as topology, features of the traffic transmitted, as well as links bandwidth and probabilities of their compromising. The use of such a model makes it possible to reduce the overload of network links with a high value of compromise probability, while more traffic will be transmitted over secure links without causing overload. Power and exponential forms of functional dependence of weighting coefficients on the link compromise probability have been used for comparison during obtaining the secure-based routing solutions. The secure traffic engineering routing flow-based model under investigation is proposed to use in a software-defined network data plane. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
  •  
4.
  • Yevdokymenko, Maryna, et al. (författare)
  • Proactive Approach for Security of the Infocommunication Network Based on Vulnerability Assessment
  • 2018
  • Ingår i: 2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, PIC S and T 2018 - Proceedings. - : IEEE. ; , s. 609-612
  • Konferensbidrag (refereegranskat)abstract
    • The paper explores methods for assessing vulnerabilities and assessing the spread of an attack in an infocommunication network. A proactive approach to the quantitative assessment of network security, which allows us to assess risks at the user and network level through the presence of vulnerabilities is presented. The proposed solutions will be useful for decision making and will be further integrated into a single metric for displaying the integrated level of security of the infocommunication network.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-4 av 4

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy