<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Software Modeling and Implementation of Information Network for Smart Home Technology</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Juliy Boiko</string-name>
          <email>boiko_julius@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymir Druzhynin</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ilya Pyatin</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lesya Karpova</string-name>
          <email>rtlesya@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Khmelnytskyi National University</institution>
          ,
          <addr-line>11</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Khmelnytskyi Polytechnic Professional College by Lviv Polytechnic National University</institution>
          ,
          <addr-line>10, Zarichanska str., Khmelnytskyi, 29019</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska str., Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>str.</institution>
          ,
          <addr-line>Khmelnytskyi, 29016</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>296</fpage>
      <lpage>310</lpage>
      <abstract>
        <p>The article discusses the design and control of the Internet of Things networks. The requirements for effective network management are defined. A model of the information network based on Smart Home technology in the Cisco Packet Tracer environment is built, user authentication is established, the address space is partitioned, smart devices are selected, and the requirements for the bandwidth of the information network are analyzed. A popular approach to implementing a Smart Home is to use sensors and cameras to monitor the home environment and detect motion and control the home environment, which alerts homeowners in the event of a security breach. Indoor temperature, humidity levels, motion detection data, and water level readings collected by sensors can be stored in a database on the server for further analysis. The system also uses the generated logs to monitor performance and identify potential threats and signal in the event of security breaches. The proposed Smart Home strategy, in comparison to traditional approaches, is characterized by enhanced system integration, improved scalability, optimized resource utilization, and heightened security.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;internet of things</kwd>
        <kwd>smart home</kwd>
        <kwd>information network</kwd>
        <kwd>Wi-Fi</kwd>
        <kwd>smart devices 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        At present, the specifics of the deployment of the Internet of Things (IoT) environment are
characterized by the presence of a wide range of diverse and generally resource-limited applications.
There are a number of developed and standardized IoT protocols [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Among such technologies, it
is worth highlighting Zigbee, BLE, LoraWAN and Sigfox solutions, as well as individual solutions
for network management in the LWM2M, CoMI format [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Communication protocols are relevant
when using means with limited resources, and solutions have been developed for routing such
devices, such as 6LowPAN and RPL, respectively.
      </p>
      <p>
        However, as the analysis of works [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4, 5, 6</xref>
        ] shows, due to heterogeneity and certain resource
limitations, the implementation of IoT networks is associated with a number of problematic issues
that ultimately affect their performance. Mainly, as discussed in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], such problems are caused by the
quality of reliable communication, the consequences of network overload, and failure of IoT devices.
In this context, an important problem arises, directly related to the implementation of the flexible IoT
network management format to maintain performance indicators. Here, as noted in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], it is
important to ensure a low level of end-to-end latency or satisfactory energy efficiency. Analysis of
current works on IoT [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ] allows us to formulate a list of requirements for the implementation of
flexible control of IoT networks, among which it is necessary to highlight the functions of resource
provision, authentication, routing and monitoring [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. In addition, it is important to ensure timely
software updates for the relevant devices, in particular their firmware, error correction [
        <xref ref-type="bibr" rid="ref12 ref13 ref14">12,
13, 14</xref>
        ], etc. Thus, the implementation of the above functional slots allows us to form a network
service environment in order to maintain the performance indicators of IoT, in the form presented
in Figure 1.
      </p>
      <p>
        The model in Figure 1 includes IoT devices, IoT technologies, and IoT applications and services.
Devices usually have a wireless module that corresponds to a specific IoT technology: LoRa, ZigBee,
Wi-Fi. Information exchange is provided by a specific protocol. In this case, in the presented article,
when organizing the smart home (SH) network, we use Wi-Fi technology [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ]. At the top level
of the model, there are applications that allow you to configure the interaction of intelligent devices.
These are some applications and network services.
      </p>
      <p>
        In the works [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ] it was emphasized that the implementation of the SH project allows for an
unprecedented level of control and volume in order to gain access and control over home devices
from the subscriber's current location at the required time. In general, as noted in the works [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], the
main purpose of smart devices is to create an interconnected ecosystem inside the home, where IoT
technology is used as the main one for device control. As discussed in the works [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ], in this
context we can talk about the formation of a network of physical devices containing appropriate
sensors and allowing for data exchange in the IoT format [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>The content of the presented work is aimed at supplementing and implementing through
modeling the proposed concept of building an information network of the SH type. We used the
Cisco Packet Tracer (CPT) environment to design such a network. The implementation of the
proposed network architecture is realized through a user authentication mechanism, partitioning the
address space, choosing reasonable devices and analyzing the bandwidth requirements of the
proposed network. The proposed SH system uses generated logs to monitor performance and
identifies potential threats and signals in case of security breaches.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Control methods in IoT networks</title>
      <p>This section of the article analyses possible approaches to control methods in IoT networks. A
classification of control solutions in the network is presented. A low-power IoT control architecture
is described. Low-power IoT network management protocols have been developed to ensure and
optimize network performance while using small resources for network control operations.</p>
      <sec id="sec-2-1">
        <title>2.1. Conceptual foundations in IoT control solutions</title>
        <p>
          The concept of network control is based on a number of operations, among which it is advisable to
highlight: monitoring in relation to devices; providing the control process with routing and security.
The main direction of such operations is associated with increasing network performance, in
particular, in the context of minimizing delays, reducing energy consumption, localizing packet loss,
etc. Consequently, it is possible to highlight a typical control structure based on the formation of
logical subsystems based on a network manager, managed devices and agents. Thus, Figure 2
presents the concept of engaging functional elements activating the network control process [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ].
        </p>
        <p>According to Figure 2, the "Network Administrator" provides overall control of a group of nodes.
The "Controlled device" refers to a network device that provides a set of parameters (e.g. IP address,
CPU load, remaining battery charge, etc.) that are control (via read/write operations) by the network
manager. The "Agent" refers to the software running on the managed device. It collects raw data
from the control device and transmits it in a usable format to the network manager. The control
database contains information about the parameters of the control device. Messaging protocols can
be used to exchange information between the network manager and the control devices. This allows
the network manager to receive parameters from the control devices and make appropriate decisions
on reconfiguring the network devices.</p>
        <p>
          There are several key requirements for managing IoT networks. Accordingly, the key
requirements for effective IoT performance can be formulated as follows: scalability, fault tolerance,
energy efficiency, quality of service (QoS) [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ], and security. Consequently, IoT must provide low
power consumption with the ability to expand by adding new devices (Figure 3).
        </p>
        <p>It is equally important to satisfy the fault tolerance requirement. The point is that such a
requirement must guarantee that the network will perform as expected in the presence of a fault (e.g.
node fault, network fault, receiver fault, software fault) in the network. QoS characterizes the degree
of consumer satisfaction. This requirement includes mechanisms for localizing packet loss,
minimizing delays, etc. The energy efficiency requirement imposes obligations to perform the main
functions of IoT with minimal power consumption, which is especially relevant in the context of
using battery power.</p>
        <p>Next, we discuss such a requirement as security. Having a secure network is the key to preventing
potential risks of data forgery. Self-configuration refers to the ability of IoT devices to adapt their
behavior in accordance with the network state.</p>
        <p>By analyzing the listed requirements for IoT, approaches to implementing network control solutions
for devices with limited resources can be formed. These solutions can be used to create certain
categories (Figure 3) of control, in particular, as network control protocols for low-power IoT
networks, SDN-based platforms, cloud platforms, semantic frameworks, and machine learning
frameworks.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Low-power IoT network control approaches</title>
        <p>
          There are various network management protocols for remote control of devices with limited
resources. These protocols include: LWM2M [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ], CoMI, NETCONF Light and 6LowPAN-SNMP
(Figure 4).
        </p>
        <p>LWM2M is a client-server protocol designed for low-power IoT device control. The LWM2M
server resides on the network manager device, and the LWM2M client is typically hosted on the
control devices. IoT device resources are organized into objects (e.g., a location object that contains
all the resources that provide location information for IoT devices). CoMI is a control interface
designed for low-power IoT devices and networks. This network control protocol enables resource
management operations of IoT devices. 6LowPAN-SNMP is an adaptation of SNMP for IPv6
lowpower wireless personal area network (6LowPAN). An example of such an architecture is shown in
Figure 5.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Building a smart home model</title>
      <p>In this chapter, we introduce the proposed SH network model. The process of setting up a wireless
SH network will be discussed. The format for setting up the connection between smart devices and
the server will be described.</p>
      <sec id="sec-3-1">
        <title>3.1. Setting up the SH network model</title>
        <p>SH systems are now being deployed in private companies, government agencies, and residential
buildings to automate operations that make life and work more convenient: they control lighting,
household appliances, monitor the home, etc. To build an SH model, we will use CPT. In Figure 6,
we present a structural diagram of the designed information network using SH technology. The
network has sections with wired and wireless connections. The global network provider connects
two offices using routers Router 1 and Router 2.</p>
        <p>SH network and monitoring of connected devices in the laptop web browser. Figure 8 shows the
settings window for connecting smart devices to the network - siren (IoT2 - Siren).</p>
        <p>The physical level
all smart devices are connected to the network, it is necessary to configure the actions performed
when certain events occur: when a window is opened, a siren is triggered, which can only be
excluded by the user; when a motion detector is triggered, the lighting is turned on. To do this, go
to the Conditions tab in the laptop web browser (Laptop 0) from the Home tab. The settings window
in the laptop browser is shown in Figure 10. The alarm setup - turning on the siren when a window
is opened is shown in Figure 11.</p>
        <p>If the alarm is not needed, we turn off the siren. Setting up smart devices in the laptop web
browser (Laptop 0) is shown in Figure 12.</p>
        <p>
          Routers and switches of the local network are connected using twisted pair category 5e (see Figure
6). For four pairs the transmission rate is up to 1000 Mbit/sec, for a two-pair twisted pair, respectively,
up to 100 Mbit/sec. The frequency band is 100 MHz [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ].
        </p>
        <p>
          Global connections with the provider are made using single-mode optic fiber [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ].
        </p>
        <p>To transmit packets to the global network, the first office has a gateway 192.168.1.250 with a
white IP address of 1.1.1.1. Another office has a gateway 192.168.2.1 with a white IP address of 2.2.2.2.
To work with smart devices in the network, there is a server 192.168.1.1 and workstations with a
wired and wireless connection.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Setting up and control of the global SH network</title>
        <p>When setting up a global network, we must be able to connect from the second office via the global
network to the first office. This is done using a gateway. In the network of the first office, the gateway
has the address 192.168.1.250. The Home/Office1 node setup window looks like (Figure 13).</p>
        <p>For the second office, the gateway has the address 192.168.2.1. For each network device, we must
write down the IP address of this device, the subnet mask, and the gateway. The Office2 node
configuration window looks like this (Figure 14).</p>
        <p>For office 2, we also need to specify a gateway to access the global network. In order for us to
have access from the first office to the second and from the second to the first, we need to set up
global connections. We have two routers. They have global IP addresses: for the first office 1.1.1.1
and for the second office 2.2.2.2. We need to record the default gateway in each office node - this is
the router at 192.168.1.250. We need to do the same with the second office.</p>
        <p>The window for configuring Gigabit Ethernet addresses of the provider node looks like (Figure
15).</p>
        <p>Before setting up routing tables on the routers, let's check for a connection with the first router
in the second office. On the Laptop 1 node, open the command line, as shown in Figure 16.</p>
        <p>To ensure communication between the second office and the first, requests from nodes at the first
address 192.168.1.0 with a mask of 255.255.255.0 must be redirected to the router port with the
address 2.2.2.3.</p>
        <p>Open the static address settings window for the Home/Office1 node and write down that all
requests from nodes 192.168.2.0 should be forwarded to router 1.1.1.3.</p>
        <p>Only after this we will configure the routing table on the provider router. All requests coming to
the 192.168.1.0 network should be transmitted to the router with the address 1.1.1.1, and requests to
the address 192.168.2.0 should be sent to the router with the address 2.2.2.2.</p>
        <p>Open the command line in the node (Laptop 0) of office 2 and ping node 11, located in the first
office. In this case, it is possible that the first three sent packets were lost, which is related to the
compilation of the routing table. When the routing table is configured with the server 192.168.1.1,
the first ping remains unanswered. Then three packets arrive successfully.</p>
        <p>Let's add a new device to the network - a tablet, from which we can control the operation of smart
devices in the house and configure them according to Figure 17.</p>
        <p>In Figure 17 we have shown the configuration in case of configured Wi-Fi parameters.</p>
        <p>After pinging the presence of Tablet PC 0 on the network, we connected to the web server
and checked the ability to control smart devices at home.</p>
        <p>After entering the login and password, a window opens in which all connected smart devices are
displayed, as shown in Figure 18.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Modeling the scaling process of the SH network</title>
        <p>By scaling the SH network, we added entrance doors to the building and garage. There is a device at
the door that records the state of closing and opening, which is connected to the network using a radio
module. We configure the connection of this device according to Figure 19.</p>
        <p>
          We set up the garage door in a similar way. We also included a sensor that works via Wi-Fi [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
        <p>Next, we established a connection between the smart devices and the server that controls them.
Everything is shown in Figure 20.</p>
        <p>Now the user needs to remotely check whether the door lock is closed he can do this using the
IoT Server Device Conditions window, as shown in Figure 21.</p>
        <p>
          Below we present the calculation of the required SH network bandwidth [
          <xref ref-type="bibr" rid="ref28 ref29">28, 29</xref>
          ]. We take into
account that for each 0.1-megapixel resolution of the webcam, two Mbit/s of Internet rate are
required to ensure reliable connection (Table 1).
To calculate the bandwidth of the SH network at home using an IP video camera, the following
expression was used:
 =
 
· 1024 · 8 ·  ·
        </p>
        <p>106
where Ffs is the frame frequency; R is the video resolution; N is the total number of cameras
involved in the network.</p>
        <p>Below we present the calculation of the bandwidths of cameras with different codecs and
summarize it in Table 2.</p>
        <p>It is important to note that increasing the frame size affects the quality of recognition of small
details. If we set the camera to turn on when the motion detector is triggered, we can reduce the
required Internet rate. It should be emphasized that depending on the location of the video camera,
different bandwidth can be obtained. Here it is important to determine whether the cameras are
located outdoors or indoors. It should also be taken into account that some cameras have high
resolution or purity of recording of frame sequences, due to the built-in image processing algorithm.
In this case, the bandwidth increases.</p>
        <p>We also provide a flow chart for sending messages to an IoT network user (Figure 22).</p>
        <p>Frame frequency
(frames/sec)
,</p>
        <p>
          So, in accordance with Figure 22, we record the following sequence of actions. Using the built-in
Wi-Fi [
          <xref ref-type="bibr" rid="ref12 ref16">12, 16</xref>
          ], the IoT device sends information from the sensors to the cloud service. The IoT
platform forms a certain set of rules that have the ability to activate according to certain signs
opening the garage, opening the window or using the motion detector, that is, what is described
above in our network [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ]. The resulting set of rules includes a message service and information is
sent to e-mail. Thus, the rate of IoT response in the cloud service [
          <xref ref-type="bibr" rid="ref31 ref32">31, 32</xref>
          ] database increases.
        </p>
        <p>
          However, network control protocols are not able to meet all the requirements of low-power IoT
networks mentioned earlier. Let us consider cloud platforms for control low-power Internet
networks. Cloud computing is a model that provides ubiquitous, convenient, on-demand network
access to a shared pool of computing resources [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ]. The architecture of low-power IoT network
control on a cloud platform consists of three layers: 1) the first layer consists of resource-constrained
devices; 2) the second level consists of cloud infrastructure; 3) the third level consists of IoT
applications.
        </p>
        <p>The IoT network deployment solutions described in Section 2 formed the basis for the SH network
design process presented in Section 3.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>This paper describes the process of building a model of the SH network in the environment.
According to the simulation results, user authentication is established, the address space is
partitioned, smart devices are selected, and the bandwidth requirements of the IoT network are
analyzed. The owner can access the SH from anywhere in the world using a smartphone. The use of
sensors and cameras is configured to monitor the home environment and detect motion and control
the home environment, which alerts homeowners in the event of a security breach. Different
programming languages of sensor boards and smart devices are used to build the network. The
indoor temperature, humidity level, motion detection data and water level readings collected by the
sensors can be stored in the database on the server for further analysis. The system also uses the
generated logs to monitor performance and identify potential threats and alarms in case of security
breaches. The calculation of the required network bandwidth to support video data from multiple IP
cameras in SH settings is provided.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <article-title>"A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications,"</article-title>
          <source>IEEE Internet of Things Journal</source>
          ,
          <volume>4</volume>
          .5 (
          <year>2017</year>
          ):
          <fpage>1125</fpage>
          -
          <lpage>1142</lpage>
          , doi:10.1109/JIOT.
          <year>2017</year>
          .
          <volume>2683200</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Kamaldeep</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Malik</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Dutta</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Granjal</surname>
          </string-name>
          ,
          <article-title>"IoT-Sentry: A Cross-Layer-Based Intrusion Detection System in Standardized Internet of Things,"</article-title>
          <source>IEEE Sensors Journal</source>
          ,
          <volume>21</volume>
          .24 (
          <year>2021</year>
          ):
          <fpage>28066</fpage>
          -
          <lpage>28076</lpage>
          , doi:10.1109/JSEN.
          <year>2021</year>
          .
          <volume>3124886</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Garcés-Jiménez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rodrigues</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Gómez-Pulido</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Raposo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Gómez-Pulido</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Sá</given-names>
            <surname>Silva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Boavida</surname>
          </string-name>
          ,
          <article-title>"Industrial Internet of Things embedded devices fault detection and classification. A case study,"</article-title>
          <source>Internet of Things</source>
          ,
          <volume>25</volume>
          (
          <year>2024</year>
          ):
          <volume>101042</volume>
          , doi:10.1016/j.iot.
          <year>2023</year>
          .
          <volume>101042</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>X.</given-names>
            <surname>Deng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Pei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Xue</surname>
          </string-name>
          ,
          <article-title>"Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT Networks,"</article-title>
          <source>IEEE Transactions on Network and Service Management</source>
          ,
          <volume>20</volume>
          .1 (
          <year>2023</year>
          ):
          <fpage>684</fpage>
          -
          <lpage>696</lpage>
          , doi:10.1109/TNSM.
          <year>2022</year>
          .
          <volume>3213807</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Campbell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. E.</given-names>
            <surname>Hariri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Parvania</surname>
          </string-name>
          ,
          <article-title>"Asynchronous Distributed IoT-Enabled Customer Characterization in Distribution Networks: Theory and Hardware Implementation,"</article-title>
          <source>IEEE Transactions on Smart Grid</source>
          ,
          <volume>13</volume>
          .6 (
          <year>2022</year>
          ):
          <fpage>4392</fpage>
          -
          <lpage>4404</lpage>
          , doi: 10.1109/TSG.
          <year>2022</year>
          .
          <volume>3182210</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rostami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Goli-Bidgoli</surname>
          </string-name>
          ,
          <article-title>"An overview of QoS-aware load balancing techniques in SDNbased IoT networks</article-title>
          ,
          <source>" Journal of Cloud Computing</source>
          ,
          <volume>13</volume>
          .89 (
          <year>2024</year>
          ), doi:10.1186/s13677-024-00651- 7.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K.</given-names>
            <surname>Erzun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Avoub</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Mercati</surname>
          </string-name>
          , T. Rosing,
          <article-title>Improving Mean Time to Failure of IoT Networks with Reliability-Aware Routing</article-title>
          ,
          <source>in: Proceedings of the 2021 10th Mediterranean Conference on Embedded Computing</source>
          ,
          <string-name>
            <surname>MECO</surname>
          </string-name>
          , IEEE Press, Budva, Montenegro,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi:10.1109/MECO52532.
          <year>2021</year>
          .
          <volume>9460211</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. -T. Zhou</surname>
          </string-name>
          ,
          <article-title>"FEMTO: Fair and Energy- Minimized Task Offloading for Fog-Enabled IoT Networks,"</article-title>
          <source>IEEE Internet of Things Journal</source>
          ,
          <volume>6</volume>
          .3 (
          <year>2019</year>
          ):
          <fpage>4388</fpage>
          -
          <lpage>4400</lpage>
          , doi:10.1109/JIOT.
          <year>2018</year>
          .
          <volume>2887229</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>P.</given-names>
            <surname>Anitha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. S.</given-names>
            <surname>Vimala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Shreyas</surname>
          </string-name>
          ,
          <article-title>"Comprehensive review on congestion detection, alleviation, and control for IoT networks,"</article-title>
          <source>Journal of Network and Computer Applications</source>
          ,
          <volume>221</volume>
          (
          <year>2024</year>
          ):
          <volume>103749</volume>
          , doi:10.1016/j.jnca.
          <year>2023</year>
          .
          <volume>103749</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <article-title>"An IoT-Enabled Control Paradigm for Building Process Control: An Experimental Study,"</article-title>
          <source>IEEE Internet of Things Journal</source>
          ,
          <volume>11</volume>
          .9 (
          <year>2024</year>
          ):
          <fpage>15465</fpage>
          -
          <lpage>15474</lpage>
          , doi:10.1109/JIOT.
          <year>2023</year>
          .
          <volume>3348125</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>C.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Yashiro</surname>
          </string-name>
          , AFWA:
          <article-title>Flexible IoT Access Control Framework with Web API Integration</article-title>
          ,
          <source>in: Proceedings of the 2022 IEEE 4th Global Conference on Life Sciences and Technologies</source>
          , IEEE Press, LifeTech, Osaka, Japan,
          <year>2022</year>
          , pp.
          <fpage>354</fpage>
          -
          <lpage>356</lpage>
          , doi:10.1109/LifeTech53646.
          <year>2022</year>
          .
          <volume>9754921</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Boiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Pyatin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Eromenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Karpova</surname>
          </string-name>
          ,
          <article-title>Evaluation of the Capabilities of LDPC Codes for Network Applications in the 802</article-title>
          .11ax Standard, in: Joby,
          <string-name>
            <given-names>P.P.</given-names>
            ,
            <surname>Alencar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.S.</given-names>
            ,
            <surname>Falkowski-Gilski</surname>
          </string-name>
          , P. (Eds.),
          <source>IoT Based Control Networks and Intelligent Systems. Lecture Notes in Networks and Systems</source>
          , volume
          <volume>789</volume>
          , Springer, Singapore,
          <year>2024</year>
          , pp.
          <fpage>369</fpage>
          <lpage>383</lpage>
          , doi:10.1007/
          <fpage>978</fpage>
          -981-99-6586- 1_
          <fpage>25</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Boiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Druzhynin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Buchyk</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Pyatin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kulko</surname>
          </string-name>
          ,
          <article-title>"Methodology of FPGA Implementation and Performance Evaluation of Polar Coding for 5G Communications"</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          ,
          <volume>3654</volume>
          (
          <year>2024</year>
          ):
          <fpage>15</fpage>
          -
          <lpage>24</lpage>
          , urn:nbn:de:
          <fpage>0074</fpage>
          -
          <lpage>3654</lpage>
          -7.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Boiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Druzhynin</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Pyatin,</surname>
          </string-name>
          <article-title>"Performance Analysis of Concatenated Coding for OFDM Under Selective Fading Conditions"</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          ,
          <volume>3624</volume>
          (
          <year>2023</year>
          ):
          <fpage>403</fpage>
          -
          <lpage>413</lpage>
          , https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3624</volume>
          /Paper_33.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Boni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bianchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ricci</surname>
          </string-name>
          , I. De Munari,
          <article-title>"NB-IoT and</article-title>
          <string-name>
            <surname>Wi-Fi Technologies</surname>
          </string-name>
          :
          <article-title>An Integrated Approach to Enhance Portability of Smart Sensors,"</article-title>
          <source>IEEE Access</source>
          ,
          <volume>9</volume>
          (
          <year>2021</year>
          ):
          <fpage>74589</fpage>
          -
          <lpage>74599</lpage>
          ,
          <year>2021</year>
          , doi:10.1109/ACCESS.
          <year>2021</year>
          .
          <volume>3082006</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Boiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Pyatin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Druzhynin</surname>
          </string-name>
          ,
          <article-title>Possibilities of the MUSIC Algorithm for WI-FI Positioning According to the IEEE 802.11az Standard, in:</article-title>
          <source>Proceedings of the 2023 IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics</source>
          , UkrMiCo, IEEE Press, Kyiv, Ukraine,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi:10.1109/UKRMICO61577.
          <year>2023</year>
          .
          <volume>10380354</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Nedashkivskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Klymash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Pliushch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Moshenchenko</surname>
          </string-name>
          ,
          <article-title>Smart House Management System</article-title>
          , in: Klymash,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Luntovskyy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Beshley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Melnyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Schill</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (Eds.),
          <source>Emerging Networking in the Digital Transformation Age. Lecture Notes in Electrical Engineering</source>
          , volume
          <volume>965</volume>
          , Springer, Cham,
          <year>2023</year>
          , pp.
          <fpage>268</fpage>
          <lpage>283</lpage>
          , doi:10.1007/978-3-
          <fpage>031</fpage>
          -24963-1_
          <fpage>15</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. N.</given-names>
            <surname>Silva</surname>
          </string-name>
          , K. Han,
          <article-title>"Internet of Things Based Energy Aware Smart Home Control System,"</article-title>
          <source>IEEE Access</source>
          ,
          <volume>4</volume>
          (
          <year>2016</year>
          ):
          <fpage>7556</fpage>
          -
          <lpage>7566</lpage>
          , doi:10.1109/ACCESS.
          <year>2016</year>
          .
          <volume>2621752</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>D.</given-names>
            <surname>Pal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Funilkul</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Charoenkitkarn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kanthamanon</surname>
          </string-name>
          ,
          <article-title>"Internet-of-Things and Smart Homes for Elderly Healthcare: An End User Perspective,"</article-title>
          <source>IEEE Access</source>
          ,
          <volume>6</volume>
          (
          <year>2018</year>
          ):
          <fpage>10483</fpage>
          -
          <lpage>10496</lpage>
          , doi:10.1109/ACCESS.
          <year>2018</year>
          .
          <volume>2808472</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>P.</given-names>
            <surname>Malini</surname>
          </string-name>
          ,
          <string-name>
            <surname>Dr. K.R. Kavitha</surname>
          </string-name>
          ,
          <article-title>"An efficient deep learning mechanisms for IoT/Non-IoT devices classification and attack detection in SDN-enabled smart environment,"</article-title>
          <source>Computers &amp; Security</source>
          ,
          <volume>141</volume>
          (
          <year>2024</year>
          ):
          <volume>103818</volume>
          , doi:10.1016/j.cose.
          <year>2024</year>
          .
          <volume>103818</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <article-title>"DevTag: A Benchmark for Fingerprinting IoT Devices,"</article-title>
          <source>IEEE Internet of Things Journal</source>
          ,
          <volume>10</volume>
          .7(
          <year>2023</year>
          ):
          <fpage>6388</fpage>
          -
          <lpage>6399</lpage>
          , doi:10.1109/JIOT.
          <year>2022</year>
          .
          <volume>3225580</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>D.</given-names>
            <surname>Wajgi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.V.</given-names>
            <surname>Tembhurne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Wajgi</surname>
          </string-name>
          , T. Jain, Communication in IoT Devices, in: Gunjan,
          <string-name>
            <given-names>V.K.</given-names>
            ,
            <surname>Ansari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.D.</given-names>
            ,
            <surname>Usman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Nguyen</surname>
          </string-name>
          , T. (Eds.),
          <article-title>Modern Approaches in IoT and Machine Learning for Cyber Security</article-title>
          .
          <source>Internet of Things</source>
          . Springer, Cham,
          <year>2024</year>
          , pp
          <fpage>21</fpage>
          <lpage>44</lpage>
          , doi:10.1007/978-3-
          <fpage>031</fpage>
          - 09955-
          <issue>7</issue>
          _
          <fpage>2</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jamali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. Shahgholi</given-names>
            <surname>Ghahfarokhi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Abedini</surname>
          </string-name>
          ,
          <article-title>"Improving Performance of Association Control in IEEE 802.11ah-Based Massive IoT Networks,"</article-title>
          <source>IEEE Internet of Things Journal</source>
          ,
          <volume>9</volume>
          .11 (
          <year>2022</year>
          ):
          <fpage>8572</fpage>
          -
          <lpage>8583</lpage>
          , doi:10.1109/JIOT.
          <year>2021</year>
          .
          <volume>3114192</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Baranwal, Quality of Service (QoS) in Internet of Things</article-title>
          ,
          <source>in: Proceedings of the 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages</source>
          , IoTSIU, IEEE Press, Bhimtal, India,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi:10.1109/IoT-SIU.
          <year>2018</year>
          .
          <volume>8519862</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>A.J.</given-names>
            <surname>Simla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Rekha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.M.</given-names>
            <surname>Leo</surname>
          </string-name>
          ,
          <article-title>"Agricultural intrusion detection (AID) based on the internet of things and deep learning with the enhanced lightweight M2M protocol,"</article-title>
          <source>Soft Computing</source>
          (
          <year>2023</year>
          ).
          <source>doi: 10.1007/s00500-023-07935-1.</source>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Boiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Druzhynin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Zeniv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Eromenko</surname>
          </string-name>
          .
          <article-title>"Increasing the efficiency of information transmission in communication channels,"</article-title>
          <source>Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)</source>
          ,
          <volume>19</volume>
          .3 (
          <year>2020</year>
          ):
          <fpage>1306</fpage>
          -
          <lpage>1315</lpage>
          . doi:
          <volume>10</volume>
          .11591/ijeecs.v19.
          <year>i3</year>
          .
          <fpage>pp1306</fpage>
          -
          <lpage>1315</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>P.S.</given-names>
            <surname>Macheso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.G.D.</given-names>
            <surname>Thulu</surname>
          </string-name>
          ,
          <article-title>Roles of Optical Fiber Sensors in the Internet of Things: Applications and Challenges</article-title>
          , in: Ranganathan,
          <string-name>
            <surname>G.</surname>
          </string-name>
          , EL Allioui,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Piramuthu</surname>
          </string-name>
          , S. (Eds.),
          <article-title>Soft Computing for Security Applications</article-title>
          .
          <source>Advances in Intelligent Systems and Computing</source>
          , volume
          <volume>1449</volume>
          , Springer, Singapore,
          <year>2023</year>
          , pp.
          <fpage>923</fpage>
          <lpage>933</lpage>
          , doi:10.1007/
          <fpage>978</fpage>
          -981-99-3608-3_
          <fpage>64</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>E.</given-names>
            <surname>Manziuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Barmak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Krak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Mazurets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Pylypiak</surname>
          </string-name>
          ,
          <article-title>Method of features analysis on transition data</article-title>
          ,
          <source>in: Proceedings of the 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory</source>
          ,
          <string-name>
            <surname>ATIT</surname>
          </string-name>
          , IEEE Press, Kyiv, Ukraine,
          <year>2021</year>
          , pp.
          <fpage>272</fpage>
          -
          <lpage>277</lpage>
          , doi:10.1109/ATIT54053.
          <year>2021</year>
          .
          <volume>9678787</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kushnir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kosovan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kroialo</surname>
          </string-name>
          ,
          <article-title>"Method of encrypting images based on two multidimensional chaotic systems using fuzzy logic,"</article-title>
          <source>Radioelectronic and Computer Systems</source>
          ,
          <volume>4</volume>
          (
          <year>2022</year>
          ):
          <fpage>117</fpage>
          -
          <lpage>128</lpage>
          , doi:10.32620/reks.
          <year>2022</year>
          .
          <volume>4</volume>
          .09.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>J.</given-names>
            <surname>Boiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Pyatin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Eromenko</surname>
          </string-name>
          ,
          <article-title>Analysis of Signal Synchronization Conditions in 5G Mobile Information Technologies</article-title>
          ,
          <source>in: Proceedings of the 2022 IEEE 16th International Conference on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering, TCSET, IEEE Press, Lviv-Slavske, Ukraine,
          <year>2022</year>
          , pp.
          <fpage>01</fpage>
          -
          <lpage>06</lpage>
          , doi: 10.1109/tcset55632.
          <year>2022</year>
          .
          <volume>9766899</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Lan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <article-title>"Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach,"</article-title>
          <source>IEEE Access</source>
          ,
          <volume>7</volume>
          (
          <year>2019</year>
          ):
          <fpage>9368</fpage>
          -
          <lpage>9383</lpage>
          , doi: 10.1109/ACCESS.
          <year>2018</year>
          .
          <volume>2890432</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32] ,
          <article-title>-based services in network management solutions,"</article-title>
          <source>in: Proceedings of the 2020 43rd International Convention on Information, Communication and Electronic Technology</source>
          ,
          <string-name>
            <surname>MIPRO</surname>
          </string-name>
          , IEEE Press, Opatija, Croatia,
          <year>2020</year>
          , pp.
          <fpage>419</fpage>
          -
          <lpage>424</lpage>
          , doi: 10.23919/MIPRO48935.
          <year>2020</year>
          .
          <volume>9245117</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>I.</given-names>
            <surname>Pyatin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Boiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Eromenko</surname>
          </string-name>
          ,
          <article-title>"Algorithmization and Hardware Implementation of Polar Coding for 5G Telecommunications,"</article-title>
          <source>Transport and Telecommunication Journal</source>
          ,
          <volume>25</volume>
          .3 (
          <year>2024</year>
          ):
          <fpage>300</fpage>
          -
          <lpage>310</lpage>
          , doi: 10.2478/ttj-2024-0022.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>