<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">The method of increasing the security of IoT devices by implementing the dynamic change of the Bluetooth address</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Inna</forename><surname>Mykhalchuk</surname></persName>
							<email>inna.mykhalchuk@knu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>Volodymyrska Str., 60</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yurii</forename><surname>Shcheblanin</surname></persName>
							<email>shcheblanin.yurii@knu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>Volodymyrska Str., 60</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Toroshanko</surname></persName>
							<email>oleksandr.toroshanko@knu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>Volodymyrska Str., 60</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hanna</forename><surname>Martyniuk</surname></persName>
							<email>ganna.martyniuk@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Mariupol State University</orgName>
								<address>
									<addrLine>Preobrazhenska Str., 6</addrLine>
									<postCode>03037</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="department">State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</orgName>
								<orgName type="institution">Maksym Zalizniak Str</orgName>
								<address>
									<addrLine>3/6</addrLine>
									<postCode>03142</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">The method of increasing the security of IoT devices by implementing the dynamic change of the Bluetooth address</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">32C63ED6F7F5AC66B75973E61A9B022E</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:00+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>ІоТ</term>
					<term>protection methods</term>
					<term>data analysis</term>
					<term>attack vector</term>
					<term>network security</term>
					<term>Bluetooth</term>
					<term>access control systems</term>
					<term>attack classification</term>
					<term>information security 1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The paper examines the possibilities of use and vulnerability of devices that, according to the concept of construction and use, belong to the Internet of Things. Modern technological solutions for collecting and transmitting primary data mostly focus on Internet of Things devices. They are actively used in various spheres of industry and everyday life. At the same time, the low price, technological limitations and the lack of uniform standards affected their security level. There are known cases when attackers, exploiting the vulnerabilities of Internet of Things devices, launched an attack on the company's information system and caused financial and reputational damage. Typical solutions for the construction of IoT systems, in most cases, allow attackers to implement attacks on vital components of such systems and create a threat to the lives of users, causing reputational and financial losses. Such devices are connected to the control unit with Bluetooth technology and are identified by the name of the device and its Bluetooth address. These parameters are the main vector of the intruder's attack on Internet of Things devices. The paper proposes a method of increasing the level of security of IoT devices by introducing a dynamic change of the Bluetooth address. The central control unit of the Internet of Things devices will initiate the process of dynamic, random over time, change of the Bluetooth address of the devices, which will limit the time interval of possible influence of the attacker on the device.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Privacy and security issues become especially relevant when it comes to the Internet of Things (IoT). IoT is a concept that defines the connection of various physical objects to the Internet for data exchange and interaction <ref type="bibr" target="#b0">[1]</ref>. These objects can include any devices or sensors that can receive, transmit and process data. IoT allows data to be collected in real-time, providing the opportunity for optimal management and monitoring of various systems. This technology is used in various fields, such as industry, agriculture, medicine, transport, home automation ("Smart Home" technology) and others. At the same time, IoT technology is one of the main attack vectors, attackers can use these systems for various purposes, such as collecting information about users, affecting network resources or the process of managing connections of IoT devices, affecting vital end devices IoT, etc. <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b3">4]</ref>, which requires increased attention to IoT security issues. Security mechanisms of IoT systems are aimed at ensuring the protection of devices from unauthorized access, protection of network connections from attacks and detection of possible threats.</p><p>This includes the use of various techniques such as encryption, authentication, authorization, buffer overflow protection, and others <ref type="bibr" target="#b4">[5]</ref>. It is also important to take into account the technological features of the functioning of IoT devices, monitor potential threats and use a comprehensive approach to their protection, including technical and organizational measures, such as compliance with security protocols, conducting training and raising awareness among users.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Formulation of the research task</head><p>Ensuring cybersecurity in IoT systems requires the development and implementation of a comprehensive protection system that includes both technical and organizational mechanisms. Technical protection mechanisms include encryption, authentication and authorization, access control, monitoring and analysis of security events and other methods that allow you to protect devices and their data from cyber criminals <ref type="bibr" target="#b5">[6]</ref>.</p><p>Organizational security mechanisms include security policies, security audit procedures, training, and user awareness of safe practices. For example, educating users about password security and prohibiting them from using the same password on multiple devices can reduce the risks of a hack. In addition, security mechanisms in IoT systems are important from the point of view of protection against cyber terrorism. In today's world, cyber terrorists can use different methods to attack IoT systems, such as DDoS attacks, malware distribution, phishing and social engineering <ref type="bibr" target="#b6">[7]</ref>.</p><p>These attacks can paralyze the functioning of IoT devices, significantly reduce their reliability and resilience, and lead to data loss and leakage of confidential information. Another aspect of relevance is the rapid growth in the number of IoT devices used in various industries such as transportation, industry, healthcare, and others. These devices collect and process large amounts of data, which can lead to serious problems related to the protection of confidential information and ensuring the safety of users in case of compromise.</p><p>Therefore, the development and implementation of effective protection mechanisms in IoT systems is an extremely important task that will reduce the risks of hacking and cyber-attacks, ensure the safety and confidentiality of devices and the information stored on them, as well as ensure the stability and reliability of devices in various fields of use. One of the main problems in IoT systems is the lack of safety and security standards and regulations. This means that device manufacturers can take different approaches to securing and protecting their devices, which can create vulnerabilities and risks for users <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>.</p><p>In addition, software updates and patches that contain fixes for identified vulnerabilities are not always distributed to users in a timely and efficient manner. Another challenge is the complexity of securing IoT systems, as they can contain a large number of different components and devices that communicate with each other over wireless networks. This leads to an increase in attack vectors and a decrease in the effectiveness of protection. In this regard, the development and implementation of effective protection mechanisms in IoT systems is an extremely difficult task that requires a comprehensive approach. To ensure the security of IoT systems, it is necessary to consider all elements of the system as a whole structure and ensure their interaction from the point of view of security and protection <ref type="bibr" target="#b9">[10]</ref>. To do this, it is necessary to develop and use new technologies and standards that allow protection against various types of attacks, as well as increase the efficiency of updating and patching software.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">A method of increasing the security of IoT devices</head><p>Technologically, IoT devices can be combined into specialized subsystems that, with the help of a central control unit, interact with each other and solve certain tasks. As an example, consider the "smart home" system shown in Figure <ref type="figure" target="#fig_0">1</ref>  <ref type="bibr" target="#b10">[11]</ref>.</p><p>The main elements of the IoT system are <ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref>:</p><p>• Connected devices -are physical devices or sensors capable of collecting and transmitting data over the network (for example, temperature, humidity and motion sensors that connect to the information transmission network). • Data collection tools -are components that provide collection, aggregation and processing of data received from connected devices (for example, cloud platforms, local servers or embedded data collection systems).</p><p>• Communication networks -are network resources that provide data transfer between connected devices and data collection devices (for example, Wi-Fi, Bluetooth, ZigBee, Z-Wave, LTE, NB-IoT, and others).</p><p>• Cloud services -сloud platforms provide resources to store, process and analyze the large amount of data received from connected devices, and they can also provide tools for IoT application development and system management.</p><p>• Analytics and artificial intelligence -these components provide processing and analysis of information from a large volume of data collected from connected devices, and can use machine learning algorithms and other artificial intelligence techniques to obtain valuable information and predict future events. For example, data analysis can help predict technical problems with devices before they occur, as well as optimize energy consumption and ensure high efficiency of systems built using IoT devices.</p><p>• Management systems -are components that provide management of connected IoT devices and applications. They can provide interfaces for monitoring and controlling devices using mobile applications or web interfaces.</p><p>• Security blocks -the components that protect connected IoT devices and data from malicious attacks. These may include cryptographic protocols, remote authentication methods and other security methods. Because the concept of a "smart house", to increase capabilities, involves the connection of additional IoT devices, the probability of implementing attacks on the system as a whole, due to the vulnerabilities of individual IoT devices, also increases.</p><p>To develop a method of increasing the security of IoT devices in the "smart home" system, we will classify threats according to their origin and methods of implementation <ref type="bibr" target="#b15">[16]</ref>:</p><p>1. By origin:</p><p>• Internal threats: These are threats arising from the actions of service company employees who have access to IoT devices. Such threats may include abuse of privileges, misuse of data or intentional distortion of the functions of devices and the "smart home" system as a whole. • External threats: these are threats that come from outside the boundaries of the "smart home" system and are aimed at its components. Such threats may include hacker attacks, phishing attacks, viruses, and more.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">By methods of implementation:</head><p>• Security attacks: These are threats used to hack IoT devices and gain unauthorized access to them and the system in which they function. Such threats are implemented by intercepting the technological data of IoT devices, making changes to the functioning of the system, disclosing confidential data, etc.</p><p>• Privacy attacks: These are threats used to violate the privacy of IoT users. Such threats may include location tracking, interception of messages, collection of user information, etc.</p><p>• Availability attacks: These are threats used to interfere with the normal functioning of IoT devices and smart home subsystems. Such threats may include DDoS attacks on the device, jamming the data transmission channels between the IoT device and the control unit, making changes to the settings of IoT devices and subsystems, etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">By type of IoT devices:</head><p>• Threats to Home IoT Devices: These are threats arising from connecting home devices to the Internet, such as routers, routers, home security systems, etc. Such devices can become the target of attacks due to their vulnerabilities and lack of protection.</p><p>• Threats to industrial IoT devices: These are threats arising from connecting industrial devices to the Internet, such as manufacturing process sensors, medical equipment, access control systems, etc. Such devices can be the target of hacker attacks or be used as entry points to hack other systems on the network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">By the scale of influence:</head><p>• Local threats: These are threats that affect individual IoT devices or small groups of devices, such as home networks.</p><p>• Global threats: These are threats that have a large-scale impact on IoT systems, such as largescale hacking attacks on the critical network infrastructure or energy and transport management systems.</p><p>One of the most common threats to IoT systems are attacks on the network layer. These attacks can include various methods such as intercepting traffic, modifying data packets, injecting forged packets into the network, sending fake requests, and more. Another type of threat to IoT systems is application layer attacks. These attacks can include exploits, software hacking, phishing attacks, and other methods. Another type of threat to IoT systems is hardware-level attacks. These attacks may include exploits that exploit vulnerabilities in physical access to IoT devices <ref type="bibr" target="#b16">[17]</ref>.</p><p>Most often, Bluetooth technology is used to connect IoT devices to the "smart home" control unit and the Internet. Bluetooth is a wireless data transmission standard designed to provide short-range connections between various electronic devices, allowing information to be exchanged between various devices without the need for cables. Bluetooth works over short distances, usually within a few meters, and uses radio waves to exchange data wirelessly. This technology is widely used for transmission, establishing connections between devices, as well as connecting IoT devices to the network. Bluetooth supports different versions with different capabilities and data rates.</p><p>The use of wireless technologies allows to reduce the risk of system hacking due to physical access to IoT devices, at the same time, Bluetooth technology has several potential security disadvantages that must be taken into account when using it <ref type="bibr" target="#b17">[18]</ref>.</p><p>A Bluetooth connection can be vulnerable to data interception attacks, especially over open or weakly secured connections. To reduce the likelihood of this, it is recommended to use Bluetooth 4.0 and above technology, which involves the use of the Bluetooth LE Privacy function. This feature implements the process of generating "advertisement packets" with random MAC addresses, which prevents an attacker from identifying and affecting the device.</p><p>But how do surrounding devices see that the device has a different address? When first connected, a special trusted relationship is established between the devices, after the connection, the two devices will have different encryption keys, one of which is for privacy. This key is called the Identity Resolution Key (IRK). IRK allows the first device to translate these random MAC addresses that appear in "advertisement packets" from the second device into the real MAC address of the second device. This feature is available to devices that you trust. Privacy Bluetooth Smart operates with Bluetooth version 4.0 of the core specification <ref type="bibr" target="#b18">[19,</ref><ref type="bibr" target="#b19">20]</ref>.</p><p>But not all devices of the IoT system can support Bluetooth version 4.0, the following types of threats are relevant for such devices <ref type="bibr" target="#b20">[21]</ref>:</p><p>• Bluejacking and Bluesnarfing: Bluejacking involves sending unknown messages or contacts on other users' Bluetooth devices without their proper consent. Bluesnarfing is an attack in which an attacker can gain unauthorized access to data on a Bluetooth device.</p><p>• Pairing attacks: The pairing process of Bluetooth devices can be vulnerable to attacks, especially if weak or common PIN codes are used. Using Authorized Devices: Attacks that use devices that are already authorized to connect to the system.</p><p>Each Bluetooth device has a unique address. This address consists of 6 bytes and is similar to a MAC address, in the format MM:MM:MM:XX:XX:XX, where the upper three bytes, labelled M, contain information about the manufacturer of the chip. By the remaining three lower X bytes, an attacker can determine the device model, which significantly reduces the device's security <ref type="bibr" target="#b18">[19]</ref>.</p><p>To reduce the vulnerability of IoT devices implemented using Bluetooth technology, it is possible to implement dynamic replacement of the Bluetooth address of IoT devices, this will ensure the anonymity of the devices, and reduce the risk of their tracking and identification.</p><p>The main idea of this method is to initiate the process of dynamically changing the device's Bluetooth address on the side of the control unit according to a random law.</p><p>Since attackers usually discover a device by its Bluetooth address, dynamically changing the Bluetooth address reduces the likelihood of hacking attacks or interception of the connection. If a device consistently uses the same address, it can make it vulnerable to eavesdropping or identifying its owner. Changing the address allows you to preserve the privacy of the user and makes it difficult to determine his identity. Changing the Bluetooth address also allows you to exclude prohibited devices from the network.</p><p>The block diagram of the method of dynamic replacement of the Bluetooth address of the "smart home" IoT devices is shown in Figure <ref type="figure" target="#fig_1">2</ref>.</p><p>The sender application is a special software deployed in the IoT device network control unit. The database of which stores the list of IoT devices identified and authenticated in the system and implements the function of generating the Bluetooth address of the IoT device according to a random law. The newly generated Bluetooth address is encrypted and transmitted to the recipient's application. The receiver application, this special software is deployed in the IoT device, where the generated Bluetooth address of the device is decoded and the process of rewriting the new Bluetooth address to the IoT device memory is initiated.</p><p>The receiving application generates a message about the status of the IoT device and transmits it to the control unit (sending application), where the technological information is checked and, in the case of its confirmation, the Bluetooth address of the IoT device is overwritten (replaced) in the database of the control unit.  The sender application transmits to the IoT device (receiver application) a command to complete the address replacement cycle and return to normal operation mode to the new Bluetooth address.</p><p>The receiver application (IoT device) switches to normal operating mode and transmits data to the control unit.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusions</head><p>Enhancing security in an IoT system that uses Bluetooth networking is a critical task because IoT devices often collect and share critical information. At the same time, the locations of the devices allow attackers to stay in their area of operation for a long time, and use specialized software and hardware tools to implement attacks on the IoT device and the IoT system as a whole.</p><p>The work analyzed the structure of the "smart home" system implemented using IoT devices, classified threats and determined that the most vulnerable are those implemented using Bluetooth technology. A method of dynamically changing the Bluetooth address of IoT devices was proposed, the implementation of the method will allow to significantly increase the security of IoT devices that are outside the controlled zone and concerning which an attacker can carry out illegal actions (collection of network data for their analysis and compromise, etc.).</p><p>The directions of further research will be focused on the development of a method of increasing the security of the central control unit of the IoT system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Declaration on Generative AI</head><p>The author(s) have not employed any Generative AI tools.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Smart home system.</figDesc><graphic coords="3,115.20,416.64,370.08,222.96" type="vector_box" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Structural diagram of the implementation of the method of dynamic replacement of the Bluetooth address.</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">The Internet of Things</title>
		<author>
			<persName><forename type="first">S</forename><surname>Greengard</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2015">2015</date>
			<publisher>The MIT Press</publisher>
			<pubPlace>London, England</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">5 Essential Steps to Ensure Secure Communication with IoT Devices</title>
		<author>
			<persName><forename type="first">K</forename><surname>Oliynyk</surname></persName>
		</author>
		<ptr target="https://webbylab.com/blog/5-essential-steps-to-ensure-secure-communication-with-iot-devices" />
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Research of authentication methods in mobile applications</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Shcheblanin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Oliinyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kurchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Toroshanko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Korshun</surname></persName>
		</author>
		<ptr target="https://ceur-ws.org/Vol-3421/short14.pdf" />
	</analytic>
	<monogr>
		<title level="j">CEUR Workshop Proceedings</title>
		<imprint>
			<biblScope unit="volume">3421</biblScope>
			<biblScope unit="page" from="266" to="271" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Means of implementing the concept of &quot;Smart Home</title>
		<author>
			<persName><forename type="first">D</forename><surname>Ivanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Diordiev</surname></persName>
		</author>
		<ptr target="http://elar.tsatu.edu.ua/bitstream/123456789/8228/1/СБОРНИК%20МЕА-2019-51-52.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceeding of Problems of mechanization and electrification of technological processes</title>
				<meeting>eeding of Problems of mechanization and electrification of technological processes<address><addrLine>Melitopol</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="51" to="52" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">F</forename><surname>Hu</surname></persName>
		</author>
		<title level="m">Security and Privacy in Internet of Things (IoTs)</title>
				<meeting><address><addrLine>Boca Raton, USA</addrLine></address></meeting>
		<imprint>
			<publisher>CRC Press</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">F</forename><surname>Chantzis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Stais</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Calderon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Deirmentzoglou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Woods</surname></persName>
		</author>
		<title level="m">The definitive guide to hacking the world of the Internet of Things (IoT)</title>
				<meeting><address><addrLine>San Francisco, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Starch Press Inc</publisher>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Security Challenges of the Internet of Things</title>
		<author>
			<persName><forename type="first">L</forename><surname>Goeke</surname></persName>
		</author>
		<ptr target="https://www.theseus.fi/bitstream/handle/10024/128420/Goeke_Lisa.pdf?sequence=1" />
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Data processing through the lifecycle of aviation radio equipment</title>
		<author>
			<persName><forename type="first">O</forename><surname>Solomentsev</surname></persName>
		</author>
		<idno type="DOI">10.1109/CSIT56902.2022.10000844</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of IEEE 17th International Conference on Computer Sciences and Information Technologies (CSIT), IEEE</title>
				<meeting>IEEE 17th International Conference on Computer Sciences and Information Technologies (CSIT), IEEE<address><addrLine>Lviv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="146" to="151" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Heteroskedasticity analysis during operational data processing of radio electronic systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Zaliskyi</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-981-16-4486-3_18</idno>
	</analytic>
	<monogr>
		<title level="m">Data science and security</title>
		<title level="s">Lecture Notes in Networks and Systems</title>
		<editor>
			<persName><forename type="first">S</forename><surname>Shukla</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Unal</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Varghese Kureethara</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><forename type="middle">K</forename><surname>Mishra</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><forename type="middle">S</forename><surname>Han</surname></persName>
		</editor>
		<meeting><address><addrLine>Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">290</biblScope>
			<biblScope unit="page" from="168" to="175" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Russell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Van Duren</surname></persName>
		</author>
		<title level="m">Practical Internet of Things Security</title>
				<meeting><address><addrLine>Great Britain</addrLine></address></meeting>
		<imprint>
			<publisher>Packt Publishing</publisher>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Home Automation. For Dummies. For Dummies</title>
		<author>
			<persName><forename type="first">D</forename><surname>Spivey</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>Wiley</publisher>
			<pubPlace>New Jersey</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Kranz</surname></persName>
		</author>
		<title level="m">Building the Internet of things: implement new business models, disrupt competitors, and transform your industry</title>
				<meeting><address><addrLine>New Jersey</addrLine></address></meeting>
		<imprint>
			<publisher>Wiley</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Bahga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Madisetti</surname></persName>
		</author>
		<ptr target="http://www.internet-of-things-book.com" />
		<title level="m">Internet of Things (IoT): A Hands-On Approach</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Securing the Internet of Things</title>
		<author>
			<persName><forename type="first">S</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">D</forename><surname>Xu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2022">2022</date>
			<publisher>Syngress is an imprint of Elsevier</publisher>
			<pubPlace>Cambridge, MA, USA</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A probability estimation of aircraft departures and arrivals delays</title>
		<author>
			<persName><forename type="first">I</forename><surname>Ostroumov</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-86960-1_26</idno>
	</analytic>
	<monogr>
		<title level="m">Computational Science and Its Applications -ICCSA 2021. ICCSA 2021</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">O</forename><surname>Gervasi</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">12950</biblScope>
			<biblScope unit="page" from="363" to="377" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Internet of Things technologies</title>
		<author>
			<persName><forename type="first">B</forename><surname>Zhurakovskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Zeniv</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021</date>
			<pubPlace>NTU, Kyiv</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><surname>Ghole</surname></persName>
		</author>
		<ptr target="https://www.einfochips.com/blog/attacks-on-iot-devices-using-bluetooth/" />
		<title level="m">Attacks on IoT devices using Bluetooth</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Kofler</surname></persName>
		</author>
		<title level="m">Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity, Wubbeling, Rheinwerk Computing</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Woolley</surname></persName>
		</author>
		<ptr target="https://www.bluetooth.com/blog/bluetooth-technology-protecting-your-privacy/" />
		<title level="m">Bluetooth technology protecting your privacy</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Vulnerability analysis of bluetooth technology, Scientific Notes of the Tavria National University named after V.I. Vernadsky</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Garist</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Radio engineering and telecommunications</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="issue">72</biblScope>
			<biblScope unit="page" from="27" to="31" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Protection of public WI-FI access points</title>
		<author>
			<persName><forename type="first">N</forename><surname>Frolova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Mykhalchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Tyshchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Technical Sciences and Technologies</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="123" to="135" />
			<date type="published" when="2022">2022</date>
		</imprint>
		<respStmt>
			<orgName>National University ; Chernihiv Polytechnic</orgName>
		</respStmt>
	</monogr>
	<note>Journal of the</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
