Логотип репозиторію
  • English
  • Українська
  • Увійти
    Новий користувач? Зареєструйтесь. Забули пароль?
Логотип репозиторію
  • Фонди та зібрання
  • Пошук за критеріями
  • English
  • Українська
  • Увійти
    Новий користувач? Зареєструйтесь. Забули пароль?
  1. Головна
  2. Переглянути за автором

Перегляд за Автор "Pedan, Stanislav I."

Зараз показуємо 1 - 2 з 2
Результатів на сторінці
Налаштування сортування
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    Analysis of routing protocols characteristics in ad-hoc network
    (National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2024) Hryschuk, Iryna A.; Astrakhantsev, Andrii A.; Pedan, Stanislav I.; Globa, Larysa S.
    Background. Wireless ad-hoc networks are becoming increasingly prevalence in remote areas, in extreme environments, even in military operations, and in scenarios where setting up infrastructure networks is not possible. Research of ad-hoc routing protocols problems allows improving the efficiency of their operation in conditions of high variability in packet loss or instability of network operation when the speed of users changes. Objective. The purpose of the paper is analysis of packet loss dependency from a network operation time, study of a user speed influence on a network efficiency, and research of network operation efficiency with different routing protocols. Methods. The method of routing protocols efficiency evaluation is the simulation of their operation in an ad-hoc network on a test data set and research of a network indicators dependency in time under different loads and changing mobility of users. Results. The conducted research demonstrated that user’s mobility at different speeds significantly affects the network operation as a whole. The instability of users' positions leads to a significant increase in route search time and packet transmission time. Among researched GPSR, DSDV, and AODV protocols, the latter proved to be the best because it has the lowest percentage of data loss and the lowest average time of message send and receive operations. Conclusions. The work is dedicated to the actual problem of developing and setting parameters of ad-hoc network. Received research results indicate the need to choose the optimal routing protocol depending on specific application conditions, such as user movement speed and network stability. The proposed solutions can be the first stage of complex processing of packets in the mobile network and justify the choice of AODV protocol as a basis for further improvement.
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    Method for improving security of IoT devices pairing
    (National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2024) Pedan, Stanislav I.; Melnik, Maksim V.; Alieksieiev, Mykola O.; İnci Umakoğlu
    Background. The usage of IoT technologies leads to the social, technological and financial development of society. While complex systems play an important role in the IoT, the design, integration and use of simple devices really drive the technology's widespread adoption. At the same time, ensuring a high level of security for simple IoT devices is a difficult task. The reasons for this are device limited computing resources and low power consumption requirements. It prevents the implementation of most modern cryptographic protocols for simple IoT devices. From a security point of view, the most critical communication stage is device pairing, when shared encryption keys are formed to establish a secure communication channel. Objective. The purpose of the paper is to analyse the main vulnerabilities of a simple IoT device pairing process and develop a method for improving security of this process. The method should provide proximity-based device authentication and pairing process protection against known attacks, such as man-in-the-middle attack. Methods. The method of pairing process security improvement includes proximity-based device authentication using analysis of the wireless signal strength. The security of the authentication method is proven analytically and by results of practical experiments with measurement of wireless signal strength change with distance and obstacles between devices. Results. Performed research demonstrated that the proposed method guarantees secure user authentication at a close distance between devices and protection against attacker located at least 10 meters from the paired device. Provided theoretical calculations and experimental results show that the level of attacker's wireless signal power increase required for a successful attack exceeds technical capabilities of existing communication devices. Conclusions. The article solves an important issue of improving the security of simple device pairing. The proposed method of proximity-based IoT device authentication provides pairing process protection against man-in-the-middle attacks. Mathematical calculations were confirmed by conducting a number of experiments to research wireless signal power change depending on the distance and types of obstacles between devices. The proposed authentication method can be integrated into the existing JustWorks protocol for connecting simple IoT devices using the BLE communication channel.

DSpace software copyright © 2002-2025 LYRASIS

  • Налаштування куків
  • Зворотній зв'язок