Change search
Link to record
Permanent link

Direct link
BETA
Kuzminykh, Ievgeniia
Publications (6 of 6) Show all publications
Kuzminykh, I., Carlsson, A., Yevdokymenko, M. & Sokolov, V. Y. (2019). Investigation of the IoT Device Lifetime with Secure Data Transmission. In: Galinina O.,Andreev S.,Koucheryavy Y.,Balandin S. (Ed.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): . Paper presented at 19th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2019, and 12th Conference on Internet of Things and Smart Spaces, ruSMART 2019; St. Petersburg; Russian Federation; 26 August 2019 through 28 August (pp. 16-27). Springer Verlag, 11660
Open this publication in new window or tab >>Investigation of the IoT Device Lifetime with Secure Data Transmission
2019 (English)In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / [ed] Galinina O.,Andreev S.,Koucheryavy Y.,Balandin S., Springer Verlag , 2019, Vol. 11660, p. 16-27Conference paper, Published paper (Refereed)
Abstract [en]

This paper represents the approach for estimation of the lifetime of the IoT end devices. The novelty of this approach is in the taking into account not only the energy consumption for data transmission, but also for ensuring the security by using the encryption algorithms. The results of the study showed the effect of using data encryption during transmission on the device lifetime depending on the key length and the principles of the algorithm used. © 2019, Springer Nature Switzerland AG.

Place, publisher, year, edition, pages
Springer Verlag, 2019
Keywords
Cryptographic algorithms, Energy efficiency, IoT, Lifetime, Power consumption, Cryptography, Data transfer, Electric power utilization, Energy utilization, Next generation networks, Data encryption, Device lifetime, Encryption algorithms, End-devices, Key lengths, Secure data, Internet of things
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-18767 (URN)10.1007/978-3-030-30859-9_2 (DOI)9783030308582 (ISBN)
Conference
19th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2019, and 12th Conference on Internet of Things and Smart Spaces, ruSMART 2019; St. Petersburg; Russian Federation; 26 August 2019 through 28 August
Available from: 2019-10-21 Created: 2019-10-21 Last updated: 2019-10-21Bibliographically approved
Carlsson, A., Kuzminykh, I. & Gustavsson, R. (2019). Virtual Security Labs Supporting Distance Education in ReSeLa Framework. In: Auer M.E.,Tsiatsos T. (Ed.), Advances in Intelligent Systems and Computing: . Paper presented at 21st International Conference on Interactive Collaborative Learning, ICL 2018; Kos Island; Greece; 25 September 2018 through 28 September (pp. 577-587). Springer Verlag, 917
Open this publication in new window or tab >>Virtual Security Labs Supporting Distance Education in ReSeLa Framework
2019 (English)In: Advances in Intelligent Systems and Computing / [ed] Auer M.E.,Tsiatsos T., Springer Verlag , 2019, Vol. 917, p. 577-587Conference paper, Published paper (Refereed)
Abstract [en]

To meet the high demand of educating the next generation of MSc students in Cyber security, we propose a well-composed curriculum and a configurable cloud based learning support environment ReSeLa. The proposed system is a result of the EU TEMPUS project ENGENSEC and has been extensively validated and tested. © 2019, Springer Nature Switzerland AG.

Place, publisher, year, edition, pages
Springer Verlag, 2019
Series
Advances in Intelligent Systems and Computing, ISSN 2194-5357 ; 917
Keywords
CDIO, Cyber security, Distance learning, OpenStack, Remote lab, Training lab, Virtualization, Computer programming, Computer science, Distance education, Cloud-based, High demand, Learning support, Remote-labs, Virtual security, E-learning
National Category
Computer Sciences
Identifiers
urn:nbn:se:bth-17781 (URN)10.1007/978-3-030-11935-5_55 (DOI)2-s2.0-85063026787 (Scopus ID)9783030119348 (ISBN)
Conference
21st International Conference on Interactive Collaborative Learning, ICL 2018; Kos Island; Greece; 25 September 2018 through 28 September
Available from: 2019-04-05 Created: 2019-04-05 Last updated: 2019-04-05Bibliographically approved
Kuzminykh, I. & Carlsson, A. (2018). Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture. In: Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds) (Ed.), Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2018, ruSMART 2018. Lecture Notes in Computer Science, vol 11118: . Paper presented at NEW2AN 2018/ruSMART 2018, St. Petersburg (pp. 52-63). Springer, 11118
Open this publication in new window or tab >>Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture
2018 (English)In: Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2018, ruSMART 2018. Lecture Notes in Computer Science, vol 11118 / [ed] Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds), Springer, 2018, Vol. 11118, p. 52-63Conference paper, Published paper (Refereed)
Abstract [en]

This paper represents new functional architecture for the Internet of Things systems that use an avatar concept in displaying interaction between components of the architecture. Object-oriented representation of “thing” in the avatar concept allows simplify building and deployment of IoT systems over the web network and bind “things” to such application protocols as HTTP, CoAP, and WebSockets mechanism. The assets and stakeholders for ensuring security in IoT were specified. These assets are needed to isolate the risks associated with each of assets of IoT system. Example of Thing Instance’s description and its functionality using JSON format is shown also in the paper.

Place, publisher, year, edition, pages
Springer, 2018
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 11118
Keywords
IoT, Avatar, Thing instance, Threat assessment, Security risk assessment
National Category
Engineering and Technology
Identifiers
urn:nbn:se:bth-17128 (URN)10.1007/978-3-030-01168-0_6 (DOI)000477765900006 ()978-3-030-01167-3 (ISBN)978-3-030-01168-0 (ISBN)
Conference
NEW2AN 2018/ruSMART 2018, St. Petersburg
Available from: 2018-10-15 Created: 2018-10-15 Last updated: 2019-09-10Bibliographically approved
Popov, O. Y. & Kuzminykh, I. (2018). Analysis of methods for reducing topology in wireless sensor networks. In: 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET 2018 - Proceedings: . Paper presented at 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET, Lviv-Slavske, Ukraine (pp. 529-532). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Analysis of methods for reducing topology in wireless sensor networks
2018 (English)In: 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET 2018 - Proceedings, Institute of Electrical and Electronics Engineers Inc. , 2018, p. 529-532Conference paper, Published paper (Refereed)
Abstract [en]

This paper describes the phases of deployment of wireless sensor networks, and more attention is given to the phase of reducing topology and to methods by which this can be achieved. A comparison of hierarchy-based topology construction algorithms is presented. Algorithms use a simple, distributed and energy efficient topology mechanism that discovers a optimal connected dominant set (CDS) to disable unnecessary nodes, providing important wireless sensor network characteristics such as full coverage and connectivity. © 2018 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2018
Keywords
Critical Transmission Range, CTR, TC, Topology Construction Algorithm, Topology Control, Wireless Sensor Network, WSN, Energy efficiency, Sensor nodes, Technetium, Wireless sensor networks, Critical transmission ranges, Dominant set, Energy efficient topologies, Topology construction, Topology
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-16337 (URN)10.1109/TCSET.2018.8336257 (DOI)000465121700105 ()2-s2.0-85047532588 (Scopus ID)9781538625569 (ISBN)
Conference
14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET, Lviv-Slavske, Ukraine
Available from: 2018-06-07 Created: 2018-06-07 Last updated: 2019-06-28Bibliographically approved
Kuzminykh, I. (2018). Avatar Conception for “Thing” Representation in Internet of Things. In: Proccedings of SNCNW 2018, Karlskrona, May 31 - June 1, 2018: . Paper presented at 14th Swedish National Computer Networking Workshop (SNCNW 2018), Karlskrona (pp. 46-49).
Open this publication in new window or tab >>Avatar Conception for “Thing” Representation in Internet of Things
2018 (English)In: Proccedings of SNCNW 2018, Karlskrona, May 31 - June 1, 2018, 2018, p. 46-49Conference paper, Poster (with or without abstract) (Refereed)
Abstract [en]

The complexity of ensuring IoT security is that the system is heterogeneous, consists of many assets on each of the architecture layer. Many experts in IoT security focus on threat analysis  and risk assessments to estimate the impact if a security incident or a breach occurs.

In order to provide the general security requirements for the IoT system using threat risk modelling, the first thing to do is to identify the main security stakeholders, security assets, possible attacks, and, finally, threats for the IoT system. Using this general IoT threat model as a basis you can create a specific set of security objectives for a specific IoT application domain.

In this paper we will try to highlight the assets that necessary for further analysis of the treat model for Internet of Things. We will also specify the stakeholders who are the connecting link between IoT devices, services and customers, as well as link between transfer and displaying the client commands onto smart things.

For describing the model of component interaction in IoT system we will use the avatar-oriented approach since it allows us to merge objects into a system of objects. IoT Service has a more complex structure than a single entity. The application can use several services to display all information to end user, can aggregate data from several devices.

To manipulate data objects the avatar representation approach is most appropriate, then you can easily connect or disconnect microservices, data from things, visual representation of data.

Keywords
IoT, Avatar, Thing instance Threat assessment Security risk assessment.
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-17130 (URN)
Conference
14th Swedish National Computer Networking Workshop (SNCNW 2018), Karlskrona
Available from: 2018-10-15 Created: 2018-10-15 Last updated: 2018-10-17Bibliographically approved
Kuzminykh, I., Carlsson, A., Franksson, R. & Liljegren, A. (2018). Measuring a LoRa Network: Performance, Possibilities and Limitations. In: Galinina O., Andreev S., Balandin S., Koucheryavy Y. (Ed.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): . Paper presented at 18th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2018 and 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018; St. Petersburg; Russian Federation; 27 August 2018 through 29 August 2018 (pp. 116-128). Springer, 11118
Open this publication in new window or tab >>Measuring a LoRa Network: Performance, Possibilities and Limitations
2018 (English)In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / [ed] Galinina O., Andreev S., Balandin S., Koucheryavy Y., Springer, 2018, Vol. 11118, p. 116-128Conference paper, Published paper (Refereed)
Abstract [en]

Low power wide area (LPWA) technologies becomes popular for IoT use cases because LPWA is enable the broad range communications and allows to transmit small amounts of information in a long distance. Among LPWA technologies there are LTE-M, SigFox, LoRa, Symphony Link, Ingenu RPMA, Weightless, and NB-IoT. Currently all these technologies suffer from lack of documentation about deployment recommendation, have non-investigated limitations that can affect implementations and products using such technologies. This paper is focused on the testing of LPWAN LoRa technology to learn how a LoRa network gets affected by different environmental attributes such as distance, height and surrounding area by measuring the signal strength, signal to noise ratio and any resulting packet loss. The series of experiments for various use cases are conducted using a fully deployed LoRa network made up of a gateway and sensor available through the public network. The results will show the LoRa network limitation for such use cases as forest, city, open space. These results allow to give the recommendation for companies during early analysis and design stages of network life circle, and help to choose properly technology for deployment an IoT application.

Place, publisher, year, edition, pages
Springer, 2018
Series
Lecture Notes in Computer Science ; 11118
Keywords
IoT, LoRa, LPWAN, Transmission range, Arduino, Raspberry Pi
National Category
Engineering and Technology
Identifiers
urn:nbn:se:bth-17129 (URN)10.1007/978-3-030-01168-0_11 (DOI)000477765900011 ()978-3-030-01167-3 (ISBN)978-3-030-01168-0 (ISBN)
Conference
18th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2018 and 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018; St. Petersburg; Russian Federation; 27 August 2018 through 29 August 2018
Available from: 2018-10-15 Created: 2018-10-15 Last updated: 2019-09-10Bibliographically approved
Organisations

Search in DiVA

Show all publications