{"id":"https://openalex.org/W4236833209","doi":"https://doi.org/10.3103/s0146411619070241","title":"Design and Security Analysis of a Fragment of Internet of Things Telecommunication System","display_name":"Design and Security Analysis of a Fragment of Internet of Things Telecommunication System","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W4236833209","doi":"https://doi.org/10.3103/s0146411619070241"},"language":"en","primary_location":{"id":"doi:10.3103/s0146411619070241","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411619070241","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113054211","display_name":"V. A. Alexandrov","orcid":null},"institutions":[{"id":"https://openalex.org/I173089394","display_name":"ITMO University","ror":"https://ror.org/04txgxn49","country_code":"RU","type":"education","lineage":["https://openalex.org/I173089394"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"V. A. Alexandrov","raw_affiliation_strings":["ITMO University, 197101, St. Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"ITMO University, 197101, St. Petersburg, Russia","institution_ids":["https://openalex.org/I173089394"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002944317","display_name":"Vasily Desnitsky","orcid":"https://orcid.org/0000-0002-3748-5414"},"institutions":[{"id":"https://openalex.org/I4210103826","display_name":"St. Petersburg Institute for Informatics and Automation","ror":"https://ror.org/01ccb9w37","country_code":"RU","type":"facility","lineage":["https://openalex.org/I1313323035","https://openalex.org/I4210097085","https://openalex.org/I4210103826"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"V. A. Desnitsky","raw_affiliation_strings":["St. Petersburg Institute for Informatics and Automation, Russian Academy of Sciences, 199178, St. Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"St. Petersburg Institute for Informatics and Automation, Russian Academy of Sciences, 199178, St. Petersburg, Russia","institution_ids":["https://openalex.org/I4210103826"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112404954","display_name":"D. Y. Chaly","orcid":null},"institutions":[{"id":"https://openalex.org/I198371094","display_name":"Yaroslavl State University","ror":"https://ror.org/044s2fj67","country_code":"RU","type":"education","lineage":["https://openalex.org/I198371094"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"D. Y. Chaly","raw_affiliation_strings":["Demidov Yaroslavl Stat University, 150003, Yaroslavl, Russia"],"affiliations":[{"raw_affiliation_string":"Demidov Yaroslavl Stat University, 150003, Yaroslavl, Russia","institution_ids":["https://openalex.org/I198371094"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5002944317","https://openalex.org/A5112404954","https://openalex.org/A5113054211"],"corresponding_institution_ids":["https://openalex.org/I173089394","https://openalex.org/I198371094","https://openalex.org/I4210103826"],"apc_list":null,"apc_paid":null,"fwci":0.6783,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.81376955,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"53","issue":"7","first_page":"851","last_page":"856"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14042","display_name":"Technology and Security Systems","score":0.1931000053882599,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14042","display_name":"Technology and Security Systems","score":0.1931000053882599,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13535","display_name":"Wireless Sensor Networks and IoT","score":0.17599999904632568,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.1606999933719635,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8788275122642517},{"id":"https://openalex.org/keywords/fragment","display_name":"Fragment (logic)","score":0.7156800031661987},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5964239835739136},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.5557321310043335},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.46652090549468994},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41451483964920044},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4075058698654175},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.29998844861984253},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09007185697555542}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8788275122642517},{"id":"https://openalex.org/C2776235265","wikidata":"https://www.wikidata.org/wiki/Q18392052","display_name":"Fragment (logic)","level":2,"score":0.7156800031661987},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5964239835739136},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.5557321310043335},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46652090549468994},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41451483964920044},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4075058698654175},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.29998844861984253},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09007185697555542}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3103/s0146411619070241","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411619070241","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2054546630","https://openalex.org/W4401480991","https://openalex.org/W6610409228"],"related_works":["https://openalex.org/W1973480752","https://openalex.org/W2805502594","https://openalex.org/W4253208712","https://openalex.org/W1603677234","https://openalex.org/W3132641048","https://openalex.org/W2217679042","https://openalex.org/W2525971763","https://openalex.org/W2984753899","https://openalex.org/W2783178962","https://openalex.org/W1896179566"],"abstract_inverted_index":{"This":[0],"paper":[1,104],"comprises":[2],"the":[3,10,18,24,27,31,51,75,134,138,143,165,169,174,195,206,213,220,223,231],"development":[4,20],"and":[5,38,96,150,160,180,199,234],"implementation":[6,106,156,191,201],"of":[7,12,14,21,26,29,46,53,107,120,128,142,148,153,157,168,173,177,182,192,194,202,212,225,230,236],"systems":[8],"using":[9,23],"concept":[11,25],"Internet":[13,28,52],"Things.":[15],"Due":[16],"to":[17,59,73,80,115,187,219],"active":[19],"industries":[22],"Things,":[30],"information":[32],"security":[33,151],"problem":[34],"is":[35,57,71,124,215],"getting":[36],"more":[37,39],"important.":[40],"To":[41,66],"create":[42],"a":[43,117,162],"protected":[44,118],"module":[45],"information-telecommunication":[47],"system":[48],"which":[49,123],"implements":[50],"Things":[54],"concept,":[55],"it":[56,70],"important":[58,197],"take":[60],"into":[61],"account":[62],"all":[63],"its":[64],"aspects.":[65],"determine":[67],"relevant":[68,92],"threats,":[69],"necessary":[72,97,125],"use":[74,224],"detailed":[76],"risk":[77],"analysis":[78,229],"according":[79],"existing":[81],"standards.":[82],"Then":[83],"choosing":[84],"protection":[85],"measures,":[86],"one":[87,193],"must":[88],"rely":[89],"on":[90],"identified":[91],"threats.":[93],"Actual":[94],"threats":[95,198],"protective":[98,203],"actions":[99],"are":[100],"determined":[101],"in":[102,113,137],"this":[103],"for":[105,126,164,205],"Smart":[108,121,144,154,178],"House":[109,179],"computer":[110],"appliance":[111],"module,":[112],"order":[114],"develop":[116],"part":[119],"House,":[122],"realization":[127],"room":[129],"access":[130],"control.":[131],"We":[132],"solved":[133],"following":[135],"tasks":[136],"work,":[139],"namely,":[140],"description":[141,147],"Home":[145],"system;":[146,170],"steps":[149],"evaluation":[152,172,235],"Home;":[155],"hardware":[158],"assembly":[159],"writing":[161],"code":[163],"selected":[166,175,207],"fragment":[167,176],"safety":[171],"identification":[181],"actual":[183],"threats;":[184,189],"making":[185],"recommendations":[186],"counter":[188],"software":[190,200],"most":[196],"measures":[204],"threat.":[208],"The":[209],"key":[210],"peculiarity":[211],"work":[214],"an":[216],"integrated":[217],"approach":[218],"design":[221],"by":[222],"specific":[226],"intruder":[227],"models,":[228],"system\u2019s":[232],"assets":[233],"their":[237],"security.":[238]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
