ENSURING CYBER PROTECTION OF THE CORPORATE NETWORK OF DATA TRANSMISSION DURING THE ORGANIZATION OF INTERACTION BETWEEN IoT DEVICES OF RESEARCH LABORATORIES

Authors

DOI:

https://doi.org/10.31891/2219-9365-2025-82-48

Keywords:

sensor network, corporate network, IoT, laboratory tests, automated laboratories, corporate network protection, threat overlap, security convergence

Abstract

The paper analyzed the effectiveness of existing methods for protecting the corporate network of a research laboratory when interacting with IoT devices that are part of the sensor network of laboratory tests. The analysis was carried out taking into account the overlap of threats and the convergence of physical and information security of the cyber-physical system formed on the basis of their interaction. To obtain an accurate representation of the interaction of sensor and corporate networks under the influence of IoT device threats, a list of common threats of both networks and threats characteristic of each of them under the conditions of performing laboratory test tasks was determined. The vectors of influence of sensor network threats on threats to the corporate network were determined. Methods of protection against each threat were studied from the point of view of their advantages and disadvantages when applied to the cyber-physical system of laboratory tests and their integration potential was investigated. For each threat, the objects of potential attacks by attackers were identified. Based on the identified threats, protection methods and objects of potential attacks, a principle model of the impact of threats on the areas of corporate network protection was formed. The impact in conditions of overlapping threats and a double barrier of protection was taken into account. The impact of threats characteristic of the sensor network on the areas of corporate network protection was determined, which allowed us to take into account the convergence of physical and information security in the cyber-physical system. Research into the impact of threats based on the constructed principle model allowed us to prove an increase in the corporate network threat coefficient for 5 out of 8 objects of the corporate network protection area, which proves a decrease in the effectiveness of the use of protection methods and the need to take into account additional impact coefficients when ensuring corporate network protection when interacting with IoT devices in laboratory tests.

Published

2025-05-21

How to Cite

TARASENKO Я., TUROVSKY О., IVANKIN В., MATUSYAK П., & TOMASHEVSKYY М. (2025). ENSURING CYBER PROTECTION OF THE CORPORATE NETWORK OF DATA TRANSMISSION DURING THE ORGANIZATION OF INTERACTION BETWEEN IoT DEVICES OF RESEARCH LABORATORIES. MEASURING AND COMPUTING DEVICES IN TECHNOLOGICAL PROCESSES, 82(2), 334–343. https://doi.org/10.31891/2219-9365-2025-82-48