<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>P. Skladannyi);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Model and methodology for the formation of adaptive security profiles for the protection of wireless networks in the face of dynamic cyber threats⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Pavlo Skladannyi</string-name>
          <email>p.skladannyi@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuliia Kostiuk</string-name>
          <email>y.kostiuk@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Karyna Khorolska</string-name>
          <email>k.khorolska@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bohdan Bebeshko</string-name>
          <email>b.bebeshko@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Sokolov</string-name>
          <email>v.sokolov@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., 04053 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Mathematical Machines and Systems Problems of the National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>42 Ac. Glushkov ave., 03680 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The paper introduces a comprehensive model and accompanying methodology for constructing adaptive security profiles aimed at protecting wireless networks under dynamic cyber-threat conditions. The significance of the study stems from the ever-escalating complexity of attacks targeting wireless infrastructures, the widespread emergence of hybrid threat scenarios, the continual expansion of clientdevice diversity (including IoT endpoints), and the increasingly rapidly evolving risk landscape. The investigation was conducted with explicit reference to contemporary international cybersecurity standards-IEEE 802.11ax/802.11be, ISO/IEC 27033, ISO/IEC 15408, and NIST SP 800-53-and was guided by the principles of Zero-Trust architecture, which advocates a context-sensitive approach to designing access-control, authentication, encryption, and monitoring policies. The proposed model facilitates the creation of a family of security profiles that can be dynamically updated in accordance with the prevailing threat level, interaction modality, trust degree assigned to participating nodes, and detected behavioral anomalies within network traffic. The developed methodology incorporates a multifactorial risk assessment that considers the technological characteristics of the transmission medium, observed attack activity, interference levels, and the specific access context. Consequently, the model can underpin automated solutions that enhance cyber-resilience, certify the security posture of wireless networks, and enable dynamic, real-time audit mechanisms.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;adaptive security</kwd>
        <kwd>security profiles</kwd>
        <kwd>wireless network</kwd>
        <kwd>Zero Trust</kwd>
        <kwd>IEEE 802</kwd>
        <kwd>11</kwd>
        <kwd>dynamic threats</kwd>
        <kwd>risk assessment</kwd>
        <kwd>access policy</kwd>
        <kwd>audit</kwd>
        <kwd>international standards</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In the current era of digital transformation and the rapid deployment of wireless data-transmission
technologies, the demand for reliable, adaptive, and resilient protection of network infrastructure is
steadily increasing. Wireless networks that adhere to the IEEE 802.11ax and 802.11be standards are
now pervasive across corporate, industrial, governmental, and public domains, yet they remain
among the most vulnerable components of the contemporary information-and-communication
ecosystem. The open radio spectrum, highly dynamic connection topology, and elevated mobility
of client devices—including numerous IoT endpoints—create favorable conditions for sophisticated,
multi-stage attack campaigns, thereby necessitating a fundamental re-evaluation of existing
security mechanisms.</p>
      <p>Concurrently, regulatory bodies are intensifying their demands for the formal certification of
wireless-system security, stipulating that audits must evaluate not only architectural and technical
parameters but also each system’s capacity to react rapidly to shifting risk levels, detect anomalous
behaviour, and adapt access-control policies to the prevailing threat context. Conventional,
rulebased solutions—anchored in static configurations—frequently fail to satisfy the flexibility and
scalability imperatives of today’s cyber landscape. The emergence of the Zero-Trust Architecture
(ZTA) paradigm, which mandates the verification of every request irrespective of origin or network
location, further accentuates the urgency for novel, dynamically adaptive security mechanisms.</p>
      <p>The study advances an approach that constructs a formalised model for adaptive security-profile
management in wireless networks, thereby enabling not only the automated generation and
continual updating of security profiles, but also the dynamic adjustment of individual security
parameters with respect to the actual network state, observed behavioural deviations,
devicespecific trust levels, traffic intensity, and the activity of prospective threats. Moreover, the
integration of the proposed solution with comprehensive security-monitoring platforms—such as
security information and event management (SIEM) systems—significantly augments
contextaware response capabilities and sustains fine-grained, real-time access-control policies.</p>
      <p>The proposed mechanisms are grounded in contemporary international standards and
guidelines (NIST SP 800-53, ISO/IEC 27033, ISO/IEC 15408) and exhibit heightened effectiveness in
operational contexts that demand not only strict regulatory compliance but also rapid adaptation to
environmental fluctuations. Their deployment significantly increases the transparency of audit
procedures throughout the entire security-lifecycle, optimises both direct and indirect certification
expenditures, and formalises end-to-end security-assessment workflows through a rigorously
riskoriented logic. Accordingly, the adaptive security-profile model constitutes a robust foundation for
holistic, multilayered protection mechanisms in wireless networks, seamlessly integrating granular
automation, context-driven awareness, and continuously updated, dynamic risk evaluation. Its
utilisation not only equips organisations of varying scale to address an array of contemporary
cybersecurity challenges, but also facilitates the practical realisation of flexible, efficient, and
standardised approaches to safeguarding critical information-and-communication infrastructures.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature review</title>
      <p>
        A review of contemporary scientific literature affirms the increasing scholarly interest in
developing adaptive security profiles for wireless networks, particularly under conditions of
dynamic cyber threats. Khan et al. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] investigate the feasibility of deploying lightweight
authentication protocols within nascent 6G architectures, with specific attention to safeguarding
unmanned-aerial-vehicle communications. The authors survey state-of-the-art lightweight
authentication schemes and underscore the imperative to calibrate these mechanisms to
environmental volatility and the constrained computational resources of client devices—a position
that coheres with the broader objective of constructing adaptive security profiles for IoT-enabled
and conventional wireless infrastructures.
      </p>
      <p>
        Abie and Pirbhulal [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] have proposed an autonomous, adaptive security system for IoT
environments operating within 5 G networks. Their work introduces a dynamic risk-management
paradigm based on closed-loop feedback models, enabling the system to modify its security policies
in real time without human intervention. This methodology is highly relevant to the development
of adaptive security profiles that prioritise continuous monitoring and self-adjustment.
      </p>
      <p>
        Ahmadi’s investigation [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] occupies a particularly prominent position in the discourse on
adaptability, providing a detailed analysis of Zero-Trust Architecture deployment within
cloudnetwork environments. The study delineates both the key challenges and the prospective benefits
of applying machine-learning techniques to implement dynamic access-control and authentication
mechanisms, thereby empowering systems to adjust swiftly to emergent threat types and evolving
multi-stage attack scenarios.
      </p>
      <p>
        Within the domain of anomaly- and mixed-threat detection, Abdulkareem et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] performed a
large-scale comparative analysis of intrusion-detection mechanisms for both IoT and non-IoT
environments. Their study investigates the specific requirements for dynamic responses to
evolving traffic patterns and the nuanced challenges of engineering adaptive defence mechanisms—
considerations that are essential when constructing robust security profiles for wireless networks.
Particular attention should be directed to the study by Kamble and Jog [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], which introduces an
efficient key-management methodology for dynamic wireless-sensor networks. Their model
incorporates periodic key rotation and seamless adaptation to topological changes, thereby
supplying the degree of flexibility and scalability that contemporary wireless infrastructures
demand. Collectively, the reviewed literature confirms that the research community is vigorously
advancing toward the development of adaptive, self-configuring security frameworks that fully
accommodate risk dynamics, environmental context, device heterogeneity, and user behaviour.
This momentum establishes a solid scientific foundation for formulating a rigorous methodology to
generate adaptive security profiles as a pivotal component of wireless-network protection. Recent
studies by Shevchuk et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] highlight the critical role of designing secured services for
authentication, authorization, and accounting within dynamic network environments. Their work
underlines the importance of integrating adaptive security mechanisms that ensure reliable identity
management and access control, which are fundamental components in forming resilient security
profiles for wireless networks facing evolving cyber threats.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Research methods</title>
      <p>Techniques drawn from discrete mathematics, graph-analytic modelling, set theory, and fuzzy logic
were employed to implement the adaptive security-profile model. Behavioural analysis combined
with fuzzy-membership functions underpinned the construction of the trust model. Principles of
mathematical induction were applied to formally prove the correctness of the profile-update
mechanisms. Machine-learning algorithms, complemented by statistical analyses of risk dynamics,
facilitated robust anomaly detection. The overarching system architecture and operative workflows
were visualised by means of data-flow diagrams (DFDs) and associated graph structures.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Main material</title>
      <p>
        During the development of an adaptive wireless-network protection model, the evolution of the
IEEE 802.11 family of standards (802.11a/b/g/n/ac/ax/be)—which collectively define the
architectural foundations and information-security mechanisms of the wireless medium—was
thoroughly analysed. As the physical and data-link layers advanced, increasing emphasis was
placed on authentication controls, a consideration that is particularly critical given the
contemporary dynamics of cyber-threat landscapes. Early schemes (open authentication and
shared-key authentication) proved susceptible to numerous attacks; consequently, modern
implementations rely on Extensible Authentication Protocol (EAP) methods—specifically EAP-TLS,
PEAP, EAP-TTLS, EAP-FAST, and EAP-PWD [
        <xref ref-type="bibr" rid="ref1 ref2 ref7">1, 2, 7</xref>
        ]—which enable multifactor authentication,
X.509 digital certificates, dynamic session-key exchange, and context-aware configuration of access
profiles. In the cryptographic domain, the longstanding transition from the obsolete WEP
algorithm to current solutions embodied in WPA2 and WPA3 has been completed; these
frameworks employ AES-CCMP, AES-GCM, Simultaneous Authentication of Equals (SAE),
Protected Management Frames (PMF), and forward-secrecy techniques. The Advanced Encryption
Standard (AES) thereby continues to ensure data confidentiality and integrity within the inherently
open radio channel, serving as the fundamental means of protection.
      </p>
      <p>
        Threats can be categorised by their level of impact into signal-level attacks—such as jamming,
radio-frequency interference, and rogue access-point spoofing—and information-level attacks,
including traffic interception, man-in-the-middle insertion, and unauthorised resource access.
Hybrid assaults that blend physical-layer and logical-layer vectors demand highly flexible
mitigation capabilities. Consequently, the construction of adaptive security profiles enables the
dynamic selection of cryptographic primitives, granular access-control policies, and authentication
modalities on the basis of continuous risk evaluation, environmental context, and observed user
behaviour.
The proposed approach enhances the overall cybersecurity posture of the system and facilitates
seamless integration with dynamic auditing, continuous-monitoring, and formal certification
instruments that align with leading international standards—namely NIST SP 800-53, ISO/IEC
27033, and ISO/IEC 15408 [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Consequently, the adaptive security-profile model is positioned as a
pivotal component within the wireless-network security architecture, furnishing granular
contextual awareness, real-time adaptability, and sustained assurance of confidentiality, integrity,
and availability of information assets for organisations of diverse scale amid rapidly evolving
cyber-threat landscapes.
      </p>
      <p>Figure 1 presents a spatial architectural model for establishing adaptive wireless-network
protection, organised around a three-tier “input—processing—output” paradigm. The input tier
integrates the IEEE 802.11 standards suite, user context (trust levels and behavioural attributes),
and the principal threat vectors—namely, signal-level and information-level attacks. The processing
tier incorporates authentication modules (EAP-TLS, PEAP), cryptographic mechanisms (AES, SAE),
risk-assessment engines, and an adaptive-profile manager that synthesises policies commensurate
with the prevailing threat landscape. The output tier displays the resultant artefacts: generated
access-control policies, cryptographic requirements, audit logs, and compliance reports that align
with NIST and ISO/IEC specifications. Dashed connectors illustrate the logical interactions among
subsystems without obscuring the diagram’s elements. Collectively, the model highlights the
consolidation of standards, contextual data, and risk-driven management into a unified security
architecture.</p>
      <p>
        The study proposes a comprehensive methodology for assembling an adaptive family of security
profiles intended to safeguard wireless networks, explicitly accounting for the taxonomy of critical
information-security components that operate within an open radio environment. The
methodological foundation rests on rigorous mathematical modelling of profile structures
consistent with the requirements of the IEEE 802.11ax and 802.11be standards [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], complemented
by the design of a multi-layer security-assessment framework that simultaneously evaluates
architectural, cryptographic, contextual, and behavioural parameters.
      </p>
      <p>
        The construction of an adaptive security profile is performed with careful consideration of network
architecture, connection dynamics, traffic composition, and specific threat vectors. The peculiarities
of an open radio environment demand rigorous oversight of authentication, encryption, access
governance, and strict adherence to security policies. Essential profile components include:
zoneisolation mechanisms (VLANs, DMZs); state-of-the-art cryptographic protocols (AES-GCM, WPA3,
SAE) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]; authentication frameworks (EAP, TLS, RADIUS); and controls that limit the
dissemination of sensitive information in accordance with its classification and the corresponding
trust level. The methodology explicitly incorporates the provisions of national and international
standards (ISO/IEC, NIST, ETSI) [
        <xref ref-type="bibr" rid="ref10 ref3">3, 10</xref>
        ] that regulate cryptographic protection measures and
personal-data processing. Requirements are likewise defined for the physical infrastructure—
covering access points, controllers, client devices, intrusion-detection sensors, and
eventmonitoring tools. All components must be integrated into a continuous-monitoring system
underpinned by a clearly delineated distribution of responsibilities.
      </p>
      <p>
        Given the constant mobility of users and the prevalence of hybrid-access scenarios, network
nodes are treated as constituents of a remote infrastructure that remains susceptible to a spectrum
of attacks, including traffic interception, man-in-the-middle intrusions, authentication spoofing,
and forcible de-authentication. Accordingly, adaptive security profiles must enable the dynamic,
real-time adjustment of policies in direct response to the prevailing threat context. The proposed
model establishes a holistic security architecture that continuously aligns with risk fluctuations,
automates the selection of counter-measures, guarantees conformity with international standards
(ISO/IEC 27033, ISO/IEC 15408, NIST SP 800-53 [
        <xref ref-type="bibr" rid="ref10 ref3">3, 10</xref>
        ]), and ultimately augments the
cyberresilience of wireless infrastructure amid ongoing digital transformation.
      </p>
      <p>The analytical model for constructing an adaptive family of security profiles under dynamic
cyber-threat conditions relies on a graph-analytic framework that formalises the structure and
interrelationships among profiles of distinct tiers. A multi-level hierarchy is prescribed, wherein
each profile functions as a discrete structural entity governed by harmonised requirements for
access control, cryptographic provisions, and compliance monitoring. This arrangement enables
adaptive governance of protection levels in accordance with prevailing threats, user roles, network
topology, and resource categories.</p>
      <p>
        The hierarchical profile system is predicated on the principle of inheritance, wherein each
successive tier extends the functionality of its predecessor. The foundational—or base—profile is
devised with an enterprise-wide perspective, encompassing access points, routers, gateways, and
the associated authentication and monitoring subsystems. Its functional requirements span
authentication (EAP, TLS, the public-key infrastructure, and multifactor authentication) [
        <xref ref-type="bibr" rid="ref5 ref8">5, 8</xref>
        ];
encryption (AES, SAE, and Protected Management Frames); dynamic access control; and strict
data-isolation measures. The overall framework adheres to the regulatory directives of ISO/IEC
15408, ISO/IEC 27033, and NIST SP 800-53 [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Structurally, the profiles form an explicit
inheritance tree in which each tier maps to either a distinct threat class or a specific operational
role. For instance, guest connections are restricted to baseline privileges, whereas mission-critical
nodes are assigned profiles that incorporate fortified cryptographic safeguards, compulsory
multifactor authentication, channel isolation, and enhanced monitoring. In aggregate, the model
delivers a fully context-aware security posture, inherent scalability, seamless SIEM integration, and
robust certification alignment—factors that collectively elevate the cyber-resilience of the wireless
infrastructure.
      </p>
      <p>To ensure robust protection of wireless networks under conditions of dynamic cyber threats, it
is essential to create flexible, adaptive security profiles grounded in a comprehensive analysis of
network characteristics, device-trust levels, and the prevailing threat landscape. To illustrate the
overarching architecture for constructing such an adaptive security profile, a corresponding
structural-and-functional model has been devised. The accompanying diagram (Figure 2) depicts
the architecture for forming an adaptive security profile for wireless networks confronted with
dynamic cyber threats. The construction proceeds in sequential stages: first, the network topology
and device-trust levels are examined; next, threats are assessed at both the physical and
information layers, followed by risk modelling. Using these data, functional security requirement —
encompassing authentication, encryption, and access control—are derived. Subsequent steps
involve aggregating these requirements into a foundational functional package, establishing a
hierarchy of profiles by access tier (guest, standard, critical), and enabling real-time policy
adaptation. The final output is a formalised security profile that responds dynamically to shifts in
the threat environment while maintaining strict conformity with contemporary
informationsecurity standards.</p>
      <p>
        The generalised model that defines the adaptive family of security profiles 2[
        <xref ref-type="bibr" rid="ref11">, 11</xref>
        ] is anchored in
a canonical—or “typical”—profile and employs formalised methodologies grounded in set theory,
graph-analytic constructs, and risk-oriented modelling. It explicitly captures the dependencies
among security tiers, functional requirements, and interaction context, thereby guaranteeing
seamless adaptability to evolving cyber-threat conditions. The design adheres to a principle of
hierarchical inheritance: every successive profile augments its predecessor in both functional
breadth and protective depth. At the foundational tier, only minimal policies are enforced—such as
guest access safeguarded by baseline encryption [
        <xref ref-type="bibr" rid="ref12 ref5 ref8">5, 8, 12</xref>
        ]—whereas higher tiers introduce
advanced authentication schemes, behavioural-anomaly monitoring, adaptive encryption
mechanisms, and robust network segmentation.
      </p>
      <p>
        The proposed model facilitates the creation of adaptive security profiles that are calibrated to
the network’s prevailing risk posture, device typology, client-trust level, data-sensitivity category,
and applicable regulatory obligations. It thus furnishes a structured framework for the automated
generation, continual updating, and systematic auditing of profiles within wireless environments—
an essential capability given the dynamic, targeted cyber-attacks that typify contemporary wireless
infrastructures [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Figure 3 illustrates the spatial architecture underlying the structural model of
an adaptive family of security profiles. Leveraging device type, trust level, data sensitivity, and the
outputs of threat and behavioural analyses, the methodology derives functional security
requirements encompassing authentication, encryption, and access-control mechanisms [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. These
requirements, in turn, inform the construction of a hierarchical set of profiles—categorised as basic,
intermediate, and high-security tiers. The final phase entails generating an adaptive profile that
integrates contextual factors and aligns with international standards, thereby delivering dynamic,
standards-compliant protection for wireless infrastructures.
      </p>
      <p>
        To systematise and facilitate comprehension of the proposed mathematical model for an
adaptive security profile, all formalised dependencies (Formulae 1–30) are grouped into four
functional layers, each aligned with its role within the overall protection structure. Layer 1 (Basic)
embraces the fundamental components that establish the system’s initial security-and-trust
framework: W0(baseline functional package), P Z (adaptive security profile), Trust (device-trust
model). Layer 2 (Risk Adaptation) incorporates dynamic mechanisms that react to changes in threat
level and interaction context—captured by Formula R (t ), Impact ( t ), ∆ P Z enabling the model to
adjust security policies in real time [
        <xref ref-type="bibr" rid="ref14 ref3">3, 14</xref>
        ]. Layer 3 (Performance Metrics) contains the formulas
used to assess the effectiveness of implemented security profiles, including integral criteria,
adaptation indices, and standards-compliance indicators E іnt, Aindex, Conf ISO, U ( P Z ). Layer 4
(Specialised Models) reflects the model’s extended capabilities: responding to zero-day attacks,
supporting Markov transitions between profiles, and operating under uncertainty through
fuzzylogic constructs (Z day, Markov, Fuzzy) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
In the proposed adaptive-protection model for wireless networks, the cluster of output states is
treated as a graph vertex corresponding to the baseline functional package of the security profile.
This package encompasses a set of fundamental security-functional requirements that specifies the
minimally sufficient suite of counter-measures necessary to safeguard the information
environment. Formalisation of the baseline functional package:
      </p>
      <p>
        W 0= { ( ui , c j ) ∨ ( ui ∈ U 0 , c j ∈ C 0 , c j⊨ ui },
where U 0 denotes the set of baseline threats (e.g., interception, spoofing, de-authentication), C 0
represents the set of baseline counter-measures (e.g., AES-GCM, WPA3, PMF) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], and the symbol
⊨ signifies logical correspondence or effective mitigation—that is, counter-measure c j removes or
markedly diminishes the risk of threat ui. Formalising the baseline functional package of the
security profile in this way makes it possible to specify the minimally required mapping between
canonical threats and the counter-measures that furnish the foundational level of protection for a
wireless network. The relation c j⊨ ui in Formula (1) indicates that a particular security
mechanism effectively neutralises a specific threat. This structured approach establishes a stable
basis for the subsequent construction of adaptive profiles, wherein W0 remains an invariant
baseline while additional requirements are incrementally layered according to the evolving threat
and risk context.
      </p>
      <p>Adaptive security profile for a specific class:</p>
      <p>
        P Z i =W 0⋃ W d = { ( uk , c l ) ∨ ( uk ∈ U , c l ∈ C , p ( uk , c l ) ≥ δ },
(2)
where Wd= {( u , c ) }denotes the set of additional security-functional requirements generated in
response to the external operating environment; p ( uk , c l )—is the concordance function that maps
a counter-measure to a threat (i.e., its effectiveness coefficient) and δ represents the concordance
threshold—the minimally acceptable protection level. An adaptive security profile for a given class
is thus formalised as the union of baseline and additional security-functional requirements, each
selected to match the prevailing threat landscape. Equation (2) describes the set of
“threat–countermeasure” pairs for which the concordance function p ( uk , c l ) exceeds the threshold δ , thereby
defining the minimally admissible level of defensive efficacy. Consequently, the profile adapts to its
environment by incorporating only those mechanisms that provide a sufficient degree of resistance
to current threats [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ]. This approach supports the flexible tuning of security policies in
accordance with the contextual factors and risk dynamics inherent in network interactions.
      </p>
      <p>Graph-structural model of the profile:
(1)
(3)</p>
      <p>
        M = { G x =( S x , E x , w x ) ∨ x ∈ { A , C , I . D } },
where S x denotes the set of graph vertices (security agents grouped by category), E x the set of
edges (interaction channels or dependencies among agents), and wx : E x →[
        <xref ref-type="bibr" rid="ref1">0 ,1</xref>
        ] the weight
function that quantifies the trust level or criticality of each connection. The graph-structural model
of the security profile formalises the web of relationships linking the system’s security agents.
According to Formula (3), the model M is expressed as a collection of graphs G x, with each graph
corresponding to a distinct security-service category: authentication (A), confidentiality (C),
integrity (I) or access control (D). Vertices S x represent individual security agents, whereas edges
E x depict the logical or physical channels through which those agents interact. The weighting
function wx enables assessment of the trustworthiness or criticality associated with every
connection, thereby supporting analysis of the profile’s resilience to threats and identification of
high-priority zones for security reinforcement [
        <xref ref-type="bibr" rid="ref14 ref17 ref18 ref2">2, 14, 17, 18</xref>
        ]. This methodology structures the
protection system and facilitates its adaptive reconfiguration in response to the evolving
operational conditions of the wireless network.
Functional target model for profile evaluation:
score ( PZ )=
      </p>
      <p>
        t1
∑ ∫ ( α x ∙ φ x ( S x ( t ) , R ( t ) )− β x ∙ C x ( t ) ) dt ,
x ∈ { A ,C , I . D } t0
where φx (S x (t ) , R (t ))is the response function of security service x to the risk profile R (t ) ,
C x (t ) denotes the dynamic cost of maintaining that service at time t and α x , β x are weighting
coefficients that express the relative importance of the service’s effectiveness and cost. The
functional target model for security-profile evaluation quantitatively determines the effectiveness
of adaptive protection over a given time interval. Formula (4) incorporates the integral
performance assessment of each security service—authentication, confidentiality, integrity, and
access control—during the period from t0 to t1. The function φx (S x (t ) , R (t )) characterises how
service x reacts to the risk profileR (t ), whereas C x( t ) captures the variable expenditures required
to sustain that service. The coefficients α x , β x enable a weighted consideration of both efficacy and
cost for each category [
        <xref ref-type="bibr" rid="ref15 ref19 ref3">3, 15, 19</xref>
        ]. This approach allows practitioners to dynamically evaluate the
suitability of a selected protection profile in the face of a changing threat landscape.
      </p>
      <p>Dynamic client-trust model:</p>
      <p>Trust ( a j , t )=
1 ∑N θ ij ∙ e−λ ∙|bi (t )−b j|,</p>
      <p>
        Z j i=1
where bi (t ) denotes the behavioural profile of a device / user at time t , b j represents the
reference (benchmark) behavioural model; θij are the weighting coefficients that quantify the
influence of individual behavioural factors on the overall trust level and λ is the
anomalysensitivity coefficient. The dynamic client-trust model provides a formal mechanism for evaluating,
in real time, the reliability of a device or user on the basis of its behavioural characteristics. The
quantity Trust (a j , t ) specifies the trust level assigned to agenta j at time t і and is computed as a
weighted mean deviation of its current behaviour bi (t ) from the reference model b j. The coefficient
θij captures the contribution of each behavioural indicator to the aggregate evaluation, while the
exponential function governed by λ models sensitivity to deviations by reducing the trust value in
the presence of significant anomalies. The normalisation factor Z j rescales the resulting metric to
the interval 0 to 1 [
        <xref ref-type="bibr" rid="ref14 ref2">2, 14</xref>
        ]. This model is critically important for adaptive security systems, as it
enables the dynamic adjustment of access-control policies in response to shifts in client behaviour
within a wireless-network environment.
      </p>
      <p>The spatial model of the adaptive security profile, P Z3 D is conceived as a three-tier structure
that formalises the dynamic interaction among the contextual, computational, and control
components of the security system. The model is defined as a tuple comprising three layers:</p>
      <p>P Z 3 D =( LContext , L Processing , LControl ),
where each tier constitutes a set of operators acting upon the profile:</p>
      <p>LContext= { f k : I oT , Trust , Risk } ,</p>
      <p>L Processing= { gk : EAP , AES , SIEM } ,</p>
      <p>LControl= { hk : ACL , PolicyUpdate , Comp lianceC h eck } ,</p>
      <p>
        The Context layer (LContext) comprises the set of operators f k, that ingest external-context
sources—such as IoT-device states, client-trust levels, and risk assessments. Serving as the input
tier, this layer generates the initial evaluation of the security profile in accordance with the
(4)
(5)
(6)
(7)
(8)
(9)
surrounding environment. The Processing layer (L Processing) contains the operators gk that execute
authentication mechanisms (EAP), cryptographic safeguards (AES), and event-telemetry collection
for SIEM platforms [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. It is responsible for performing the protective functions dictated by the
predefined policies. The Control layer (LControl) is represented by the operator set hkwhich enforces
access control (ACL), updates policies (PolicyUpdate) and verifies compliance with security
requirements (ComplianceCheck). This tier undertakes decision-making and dynamically tunes the
profile in response to evolving conditions. Consequently, the P Z3 D model embodies the principle
of a modular hierarchy, wherein each layer fulfils a distinct role in the formation and adaptation of
the security profile, thereby guaranteeing integrity, scalability, and sensitivity to context.
      </p>
      <p>
        Any modification to the parameters within the set of functional requirements triggers an update
of the security profile, whereas its foundation—the baseline functional package—remains
immutable. This design adheres to the principle of modularity, whereby core mechanisms are fixed
and only the supplementary components evolve in accordance with the network’s current state.
The protective profile is therefore represented as the union of security-requirement sets that
encompass both baseline and dynamic elements across four key functions—authentication ( A),
confidentiality (C), integrity (I), and access control (D) is each modelled as a corresponding
subgraph of agents [
        <xref ref-type="bibr" rid="ref12 ref15">12, 15</xref>
        ]. Baseline agents G xbase provide continuous support for the minimal
protection level, while dynamic agents G xdyn are activated whenever the threat level rises or the
context shifts. Formally, this relationship can be expressed as:
      </p>
      <p>
        PZ =
where G xbase denotes the baseline agents of service x , while G xbase represents the dynamic
(adaptive) agents that are activated when the threat level rises. This approach preserves the
stability of the protective environment through the immutable core components and, at the same
time, provides flexibility and adaptability by dynamically expanding the profile in response to
current threats [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Such a design maintains an essential balance among effectiveness,
performance, and security—an equilibrium that is critically important amid dynamic cyber-threat
conditions.
      </p>
      <p>
        By integrating temporal variations in protection parameters, the adaptive security-profile model
can be expressed as a time-dependent function P Z ( t ) that reflects the dynamic activity of each
security service and its current significance [
        <xref ref-type="bibr" rid="ref14 ref2 ref3">2, 3, 14</xref>
        ]. The corresponding formalisation is as
follows:
|W total|=|W 0|+|W d |=n +m,
where S x( t ) represents the operational intensity of security service x at time t, ω x( t ) is the
weighting function that captures that service’s relative significance; andT denotes the integration
horizon (i.e., the observation period). This time-dependent formulation permits a quantitative
assessment of both the effectiveness and the contextual relevance of the protection profile under
dynamic conditions [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. By integrating over time, the system can track fluctuations in service
loading and adjust security policies in accordance with prevailing threat levels, thereby upholding
the necessary flexibility and sensitivity to changes within the network environment.
      </p>
      <p>
        Given that the baseline set of security-functional requirements W0 and the additional set Wd
are generated independently, they share no intersection. Consequently, no element of one set is
duplicated in the other, and the total number of all pertinent security-profile requirements can be
expressed as the simple sum of their cardinalities [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]:
(11)
(12)
where |W0|= n denotes the number of baseline security-functional requirements; |W d|=m
represents the number of additional requirements generated in response to external influences or
shifts in the threat landscape; and |W total| is the aggregate set of requirements that define the
parameters of the adaptive security profile. This formalism permits an exact appraisal of the total
security measures that must be implemented within the adaptive profile and provides for the
flexible scaling of protection policies commensurate with any increase in the complexity or density
of attacks.
      </p>
      <p>
        Each adaptive security profile can be formalised as a set of functional requirements that are
mapped onto the corresponding security services [
        <xref ref-type="bibr" rid="ref16 ref17 ref2">2, 16, 17</xref>
        ]. This approach permits a granular
evaluation of the profile in four domains: authentication (A), confidentiality (C), integrity (I), and
access control (D). Formally, the representation is:
      </p>
      <p>PZ =⋃x ∈ { A ,C , I , D } ( ⋃g ∈ Gx FT R g ),
where F T R g designates the set of Functional Technical Requirements associated with agent g
and G x represents the set of security agents assigned to functional service x. This projection
renders the adaptive profile in a structured form that explicitly reflects the roles and functional
purposes of every component within the protection system. Such formalisation significantly
enhances the transparency of security-management processes and facilitates seamless integration
with auditing, certification, and regulatory-compliance systems.</p>
      <p>
        To evaluate the protection level of a wireless network and to analyse the subsequent
effectiveness of its security profile, a multilevel system of criteria has been proposed that
encompasses the principal facets of information security. One of the key layers focuses on
cryptographic criteria, which characterise the strength and resilience of the employed encryption
algorithms [
        <xref ref-type="bibr" rid="ref12 ref16 ref20">12, 16, 20</xref>
        ]. These criteria are formalised as an integral metric:
      </p>
      <p>
        K sec=α 1 ∙ l k +α 2 ∙ Rk +α 3 ∙ f IV,
where lk denotes the key length (e.g., 128, 192, or 256 bits); R k specifies the key-rotation
algorithm type (the presence of periodic renewal markedly enhances protection); f IV expresses the
effectiveness of initialization-vector utilisation (for example, preventing IV reuse in AES-GCM)
[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]; and α1 , α2 , α3 are weighting coefficients that capture the relative significance of each
parameter in the composite security score. The resulting formula provides a rigorous, quantitative
means of evaluating the cryptographic resilience of a given security profile, facilitates comparative
analysis among alternative configurations, and supports evidence-based algorithm selection in light
of prevailing threat conditions [
        <xref ref-type="bibr" rid="ref14 ref21 ref22">14, 21, 22</xref>
        ]. Moreover, it serves as a foundational element within the
integrated model for assessing the security of wireless networks.
      </p>
      <p>
        The authentication criteria in the adaptive security-profile model play a pivotal role in
establishing trust in connected devices and users [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. To facilitate a quantitative assessment of
authenticity, an integral metric has been devised:
      </p>
      <p>
        Ascore=δ 1 ∙ M EAP+δ 2 ∙ Cert use+δ 3 ∙ MFA,
(15)
where M EAP denotes the degree of support for contemporary EAP-based authentication
methods (e.g., EAP-TLS, PEAP, EAP-TTLS) [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]; Cert use represents the presence and
implementation quality of public-key digital certificates (PKI); MFA indicates the availability of
multi-factor authentication (for instance, password plus hardware token or biometrics); and
δ 1 , δ 2 , δ 3 are the weighting coefficients that express the relative importance of each component in
the consolidated assessment [
        <xref ref-type="bibr" rid="ref15 ref20">15, 20</xref>
        ]. This criterion makes it possible to align the deployed
authentication mechanisms with the requirements of current standards—particularly ISO/IEC
27001 and NIST SP 800-63—and to compare the effectiveness of different security implementations
(13)
(14)
when constructing an adaptive profile [
        <xref ref-type="bibr" rid="ref24 ref25">24, 25</xref>
        ]. The resulting value Ascore indicates how closely the
present authentication implementation satisfies the target trust level and may be used to trigger
dynamic updates of access-control policies.
      </p>
      <p>
        Assessing device trust is a critical element in forming an adaptive security profile, because it
considers the behavioural characteristics of the node and the current risk level associated with its
activity [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. This is formalised by the following integral model:
(16)
(17)
      </p>
      <p>T
T ( u )= ∫ μ beh ( u , t ) ∙ θ risk ( t ) dt ,</p>
      <p>
        O
where T ( u ) denotes the integral trust score for device uuu over the interval [0,T], μ beh ( u , t ) is
the behavioural function that gauges the conformity of the device’s actions to its reference profile
at moment t, θ risk ( t ) is the time-varying risk coefficient that reflects the prevailing threat
conditions in the network environment [
        <xref ref-type="bibr" rid="ref27 ref4">4, 27</xref>
        ]. This model enables the system to determine—on the
basis of accumulated behavioural statistics and the current threat landscape—whether the access
rights of a given device should be maintained, escalated, or revoked [
        <xref ref-type="bibr" rid="ref15 ref17">15, 17</xref>
        ]. It is an indispensable
element of a Zero-Trust architecture, wherein trust is continuously verified rather than presumed.
      </p>
      <p>
        The system-level risk quantifies the aggregate danger facing the wireless network at a specific
instant, accounting for both the probability of individual threats materialising and the potential
impact of each [
        <xref ref-type="bibr" rid="ref10 ref12 ref14 ref16 ref28 ref29">10, 12, 14, 16, 28, 29</xref>
        ]. Formally, the risk level is expressed as a weighted sum:
n
R ( t )= ∑ pi ( t ) ∙ S i,
      </p>
      <p>
        i=1
where R ( t ) represents the overall system-risk level at time t, pi ( t ) is the probability of
occurrence of threat i, S i denotes the magnitude of damage or impact that the system would incur
should threat imaterialise and n is the total number of identified threats. This model makes it
possible to assess risk dynamics in real time and serves as a basis for adapting security profiles to
the prevailing threat climate [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The computed value of R ( t ) can directly trigger changes in
access-control policies, the activation of additional counter-measures, or adjustments to
devicetrust levels [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. It is likewise integrated into the global function for reactive profile updating,
which is a key element in the construction of context-aware security systems.
      </p>
      <p>The profile-adaptation index reflects the sensitivity of the security profile to variations in the
system’s risk level, indicating how rapidly and flexibly protection parameters are modified in
response to changes in the threat environment. Formally, it is defined as:</p>
      <p>
        Aindex= ∂∂PRZ((tt)) = ∂∂PRZ
,
(18)
where Aindex denotes the profile-adaptation index; P Z ( t ) is the adaptive security profile at
moment t, R ( t ) represents the risk level at the same moment; and ∂ P Z is the derivative of the
∂ R
security profile with respect to the risk level, capturing the system’s instantaneous response to
changing threats. The index is a critical indicator of the effectiveness of the adaptive-security
management system because it quantifies the capability of the system to reconfigure itself
promptly—for example, to tighten authentication policies, modify cryptographic parameters, or
activate additional counter-measures—when risk increases [
        <xref ref-type="bibr" rid="ref14 ref22">14, 22</xref>
        ]. A high Aindex value signifies a
highly flexible system, an attribute that is vitally important for wireless networks operating under
dynamic cyber-threat conditions.
      </p>
      <p>
        The integral effectiveness of the profile is a generalised metric that expresses the extent to
which the functional capabilities of the adaptive security profile are realised over the time interval
[0, T] relative to the maximum attainable level of effectiveness. Formally, this metric is defined by
the following equation [
        <xref ref-type="bibr" rid="ref14 ref26">14, 26</xref>
        ]:
      </p>
      <p>T
∫ S real ( t ) dt
E int= TO
,
(19)
∫ S max ( t ) dt</p>
      <p>O</p>
      <p>
        The formula enables a quantitative appraisal of how effectively the security profile performs its
functions throughout the entire operational period. E int values approaching 1 indicate a high
degree of conformity between the implemented measures and the prescribed policies and
requirements. Conversely, values that fall markedly below 1 signal that the desired security level
has not been achieved and that the profile—or the mechanisms through which it is enforced—must
be re-evaluated [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        The standards-compliance assessment is a pivotal indicator in the certification and audit of
security solutions, particularly in the context of adaptive protection profiles for wireless networks.
This metric determines the extent to which the implemented security profile fulfils the
requirements of international standards such as ISO/IEC 27033 or NIST SP 800-53 [
        <xref ref-type="bibr" rid="ref12 ref15">12, 15</xref>
        ]:
(20)
(21)
(22)
# ( PZ ∩ S )
Conf ISO=# S
      </p>
      <p>,
∆ P Z = Ψ
∂ R ( t ) ∂ T ( u )</p>
      <p>,
∂ t ∂ t
,
where S is the set of security requirements specified by the relevant standard (e.g., ISO/IEC
27033, NIST SP 800-53); P Z is the set of functional security requirements implemented in the
profile; # ( P Z ∩ S )denotes the number of requirements that are both implemented in the profile
and mandated by the standard; and # S is the total number of requirements contained in that
standard. The resulting metric, which ranges from 0 to 1, quantifies the degree to which the
security system conforms to regulatory and technical specifications. A high Conf ISOvalue signifies
that the system is prepared for formal certification and that its security policies are transparent.</p>
      <p>
        The reactive-profile-update function is a critical mechanism that enables the system to adapt to
changes in the threat landscape and in user behaviour in real time [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]:
      </p>
      <p>Resilience mix=( ij ),</p>
      <p>
        S
pij
where Ψ denotes the decision function that governs policy updates;
is the rate of
∂ T ( u )
change of the system-level risk over time; and is the rate of change of trust assigned to a
∂ t
user or device. This function enables the system to modify the security-profile configuration
automatically in line with risk dynamics and behavioural anomalies—an especially critical
capability for safeguarding wireless networks amid highly dynamic cyber-threat conditions [
        <xref ref-type="bibr" rid="ref21 ref22">21,
22</xref>
        ]. Reactive updates ensure that the protection level remains aligned with the current context and
help minimise the probability of a successful attack [
        <xref ref-type="bibr" rid="ref14 ref18 ref23">14, 23, 18</xref>
        ].
      </p>
      <p>
        The composite-attack resilience assessment formalises the adaptive-protection system’s
capacity to withstand simultaneous, interacting, or overlapping threat vectors—for example, a
combination of a man-in-the-middle attack with forced de-authentication or radio-frequency
interference [
        <xref ref-type="bibr" rid="ref16 ref27 ref31">16, 27, 31</xref>
        ].
∂ R ( t )
∂ t
where S ij denotes the counter-measure strength and pij represents the combined probability of
the interacting threats i and j. This indicator makes it possible to evaluate the worst-case scenario
under composite attacks and to determine whether the system can maintain a secure operational
mode when exposed to highly sophisticated threat combinations. It is employed to identify critical
threat pairings that require heightened attention when forming an adaptive profile [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        Formalising the profile-to-enterprise-policy alignment enables a quantitative appraisal of how
well the functional security requirements coincide with the organisation’s incumbent
informationprotection policy [
        <xref ref-type="bibr" rid="ref25 ref9">9, 25</xref>
        ]. Such an assessment is essential for confirming that the derived adaptive
profile satisfies the enterprise’s strategic and regulatory mandates. The corresponding formula is
expressed as:
      </p>
      <p>
        X conf = i=1
k
∑ δ i ∙ match ( FTRi , Policy i )
k
,
where S ij is the counter-measure strength, Policy i represents the corresponding security policy
defined within the enterprise ICS, match ( FTRi , Policy i ) is a Boolean or fuzzy compliance
function for aligning a functional technical requirement with the policy (e.g., 1 is the full
compliance, 0.5 is the partial compliance, 0 is the non-compliance), δ i is the weighting coefficient
that captures the importance of the i-the requirement and k is the total number of functional
requirements evaluated [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. This indicator serves as a metric for the conformity of the adaptive
security profile with the organisation’s internal regulations. It can be applied during security
audits, formal certification processes, or when adjusting security policies to accommodate new
technological conditions.
      </p>
      <p>The global adaptive meta-function specifies the overall utility of the constructed adaptive
security profile in a dynamic environment, explicitly balancing the effectiveness of each protective
service against the costs of sustaining that service:</p>
      <p>U ( PZ )=</p>
      <p>
        ( w +x ∙ E x −w -x ∙ C x ),
where x ∈ { A , C , I , D } denotes the service categories—authentication (A), confidentiality (C),
integrity (I), and access control (D); E x is the effectiveness score for service x, C x represents its
operational cost; w+x is the weighting coefficient that captures the importance of the service’s
effectiveness; and w-x is the weighting coefficient that reflects the significance of its cost. This
utility function underpins the multi-criteria optimisation of the profile: maximising protective
effectiveness while minimising expenditure makes it possible to select the most balanced
adaptiveprofile configuration for the prevailing conditions and requirements 1[
        <xref ref-type="bibr" rid="ref21 ref3">3, 21</xref>
        ].
      </p>
      <p>The Markov-based transition probability to a new profile formalises the mechanism for
dynamically updating the adaptive security profile on the basis of changing risk levels, trust
assessments, and the cost of switching between profiles. This construct ensures flexible
responsiveness of the security system within a volatile cyber environment. The corresponding
expression is given by:
(23)
(24)
(25)</p>
      <p>P ( P Z i → P Z j )= f ( ∆ R , ∆ T , cos t switch ),</p>
      <p>
        The model rests on the principles of Markov processes, whereby the system’s next state depends
solely on its current state and the observed changes in its environment [
        <xref ref-type="bibr" rid="ref14 ref17 ref29">14, 17, 29</xref>
        ]. This property
enables the real-time implementation of intelligent and economically justified security-profile
management.
      </p>
      <p>
        The fuzzy-logic threat-assessment model accommodates uncertainty and incomplete
information about the security landscape [
        <xref ref-type="bibr" rid="ref16 ref27 ref32">16, 27, 32</xref>
        ]. It delivers a flexible evaluation of threat
levels in situations where classical techniques are insensitive to weakly formalised data—for
example, in behavioural analytics or when detecting novel attack types [
        <xref ref-type="bibr" rid="ref11 ref18 ref8">8, 11, 18</xref>
        ]. The model is
formalised by the following expression:
μ risk ( t )= min ( μ inputi , μ threati ),
(26)
where μ risk ( t ) denotes the membership function indicating the degree to which conditions at
moment t belong to a designated threat class; μ inputi represents the membership grade of the ith
input parameter (e.g., traffic volume, type of user action) with respect to a fuzzy concept such as
“anomalous” or “risky”; μ threati is the membership grade of threat i within the set of known or
anticipated hazards; and max and min are the standard Mamdani operators employed to construct
the aggregated membership function. This approach enables the dynamic adaptation of protection
policies by heightening the system’s sensitivity to weak, inconspicuous, or as-yet unclassified
threats.
      </p>
      <p>The cumulative-threat impact model for an adaptive profile describes the aggregate effect
exerted by multiple threats on the protection system over a specified time interval. Such a model is
essential for evaluating the accumulated risk that influences profile adaptation under conditions of
the continual presence of dynamic cyber threats. The formal expression is: ‹formula to be inserted›.</p>
      <p>
        Impact ( t )= ∫ ( ∑ pi ( s ) ∙ ρi ( s ))ds ,
t n
0 i=1
where Impact ( t ) is a cumulative metric that assesses the total impact of threats on the security
system over timet, pi ( s ) is probability of threat, ρi ( s ) is its impact at a given time s. The indicator
allows an adaptive system to assess when the accumulated risk exceeds thresholds and requires a
change in the current security profile or an increase in the level of protection, providing proactive
security management in the face of prolonged or repeated attack exposure. Impact ( t ) determines
the critical indicator of accumulated risk, which allows assessing the threat impact for the entire
time period [0, t] [
        <xref ref-type="bibr" rid="ref16 ref22 ref30">16, 22, 30</xref>
        ]. This value is integrated into the DFD model (Figure 4) as a parameter
that is transferred from the Risk and Trust Evaluation Engine (P2) to the Profile Generation (P3)
module to decide whether to strengthen the security profile.
      </p>
      <p>
        The Wireless Infrastructure Segment Criticality Model allows you to determine how important
a particular network segment is in terms of security, taking into account the value of assets and
associated risks [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]:
      </p>
      <p>where γk is weighting factor of segment importance k, Val ( a j ) is asset value a j, and Risk j is
the risk associated with this asset.</p>
      <p>The profile resilience equation in the risk management system assesses the ability of the
security profile to counter threats, taking into account efficiency, risks and degradation factors
[14, 29]:</p>
      <p>Crit segmentk =γ k ∙ ∑ ( Val ( a j ) ∙ Risk j ),</p>
      <p>j
μ risk =
∑ E x
x
∑ R x + D x
x
(27)
(28)
(29)
where E x is the efficiency of the security service x, R x is the risk of threats to the service x, and
D x is the degradation factor (for example, due to outdated algorithms or vulnerability exploitation).</p>
      <p>
        The Zero-Day Threat Readiness Index reflects the speed of the adaptive security profile’s
response to the rapid increase in risk characteristic of unknown attacks [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]:
∂ P Z ( t )
∂ t
|R ( t )→ ∞,
(30)
      </p>
      <p>This metric provides a formal gauge of the system’s capacity to adjust its security profile to
unforeseen threats in real time. The accompanying formulae enable a comprehensive accounting
not only of structural and contextual facets of adaptive protection, but also of behavioural
dynamics, risk levels, transition logic between profiles, and the influence of pertinent standards.
Collectively, they constitute a robust mathematical foundation for an intelligently managed,
adaptive protection system safeguarding wireless infrastructure amid an evolving and hostile
cyber-threat landscape.</p>
      <p>To capture the logic underlying adaptive-profile formation in wireless networks, a general
structural-and-functional process model was constructed using the Data-Flow Diagram (DFD)
methodology. The model incorporates interactions among external data sources, the system’s
principal processing modules, and the knowledge bases that guide security-profiling decisions in
the face of dynamic cyber threats. This structured approach delineates every stage of adaptive
protection—from the collection of primary data to profile deployment and the continual updating
of policies in response to shifting risk conditions.</p>
      <p>Figure 4 presents a comprehensive Data-Flow Diagram (DFD) that depicts the end-to-end
process for forming adaptive security profiles to protect wireless networks under dynamic
cyberthreat conditions. The diagram encompasses every functional tier of the system—from the
acquisition of raw data through to profile deployment and the continual updating of trust metrics.
The external entities comprise the Client Device, Network Administrator, SIEM System, and
Threat-Intelligence Provider, which collectively establish the contextual boundary of incoming
information streams.</p>
      <p>The first stage (P1) conducts an environmental and behavioural analysis of devices, capturing
telemetry, identification artefacts, and activity characteristics. These data are forwarded to the
Risk-and-Trust Assessment module (P2), where the current risk level and device-specific trust score
are computed using records housed in the Threat and Trust databases (DB_Threats and DB_Trust).</p>
      <p>Subsequently, the Security-Profile Generation stage (P3) constructs a baseline set of
requirements (W₀) and appends adaptive components (W_d) in accordance with the prevailing risk
context. This procedure references the Standards Repository (DB_Standards) to guarantee
compliance with ISO/IEC 27033, NIST SP 800-53, and related frameworks. Profiling modules P3–P4
also ingest the Impact(t) indicator, which aggregates cumulative risk effects and serves as a
criterion for adaptively updating security policies in light of long-term threat exposure.</p>
      <p>The Decision-Making module (P4) evaluates the generated profile against administrator-defined
access policies and selects the most pertinent protection set. The chosen profile is delivered to the
Implementation module (P5), which enforces encryption, authentication, access control, and traffic
isolation in strict conformity with the profile parameters.</p>
      <p>All activities are recorded in the security-event log and processed by the Audit module (P6); the
resulting log data are written back to DB_Trust and DB_Profiles to refine behavioural baselines and
enhance subsequent adaptive responses.</p>
      <p>
        Collectively, the model realises a holistic, dynamically responsive protection cycle for wireless
infrastructures, embodying Zero-Trust principles, automated profile updates, rigorous adherence to
international standards, and the orchestration of a multilayered security architecture [
        <xref ref-type="bibr" rid="ref33 ref34">33, 34</xref>
        ].
      </p>
      <p>
        The adaptive security-profile model is founded on adherence to ISO/IEC 15408 (Common
Criteria for Information Technology Security Evaluation), enabling the systematic structuring of
functional requirements for the protection of wireless networks [
        <xref ref-type="bibr" rid="ref12 ref15 ref25">12, 15, 25</xref>
        ]. The principal
evaluation domains encompass cryptography, authentication, trust management, and data
integrity.
      </p>
      <p>
        Cryptographic support corresponds to the FCS (Functional Cryptographic Support) class and
covers algorithm selection (FCS_COP.1.1), key-management procedures (FCS_CKM.1.1–2.1), and
integrity-verification schemes—such as GCM (Galois/Counter Mode) and CCMP (Counter Mode
with CBC-MAC Protocol) [
        <xref ref-type="bibr" rid="ref20 ref25 ref27">20, 25, 27</xref>
        ]. Authentication services are assessed under the FIA
(Identification and Authentication) class, with particular emphasis on the Extensible
Authentication Protocol (EAP) family—EAP-TLS (TLS-based), PEAP, TTLS, and related variants.
The FIA_SOS component governs secret-quality requirements, whereas FPT_SSP.2 specifies
mutual-authentication obligations [
        <xref ref-type="bibr" rid="ref14 ref16 ref20">14, 16, 20</xref>
        ].
      </p>
      <p>
        Trust level (LoT) is categorised into five gradations, ranging from LoT1—minimal safeguards
such as WEP-40—to LoT5, which mandates comprehensive protection incorporating EAP-TLS,
SIEM (Security Information and Event Management), IDS/IPS (Intrusion Detection/Prevention
Systems), and Zero-Day-attack detection [
        <xref ref-type="bibr" rid="ref13 ref30">13, 30</xref>
        ].
      </p>
      <p>Figure 5 depicts the hierarchical security-profile model, illustrating a five-tier classification by
trust level. The tiers span from TL1 (baseline mechanisms, e.g., WEP-40) through TL5
(fullspectrum defence with EAP-TLS, SIEM, IDS/IPS, and Zero-Day analytics). Each successive tier
inherits the attributes of its predecessor while augmenting them with enhanced control,
encryption, and monitoring capabilities.</p>
      <p>The methodology mandates a comprehensive audit of the target system’s configuration,
encompassing a detailed appraisal of its deployed cryptographic and authentication mechanisms.
When these mechanisms satisfy the criteria associated with a higher security tier, the
corresponding trust level is elevated, enabling the security profile to self-adapt to the prevailing
risk context while maintaining conformity with international standards such as ISO/IEC 27033
(network security), ISO/IEC 15408, and NIST SP 800-53 (information-system security controls).
Moreover, the audit findings serve as inputs for constructing a granular risk map, optimising
access-control policies, and prioritising protective measures in alignment with the current threat
model. This process supports the dynamic updating of security profiles, thereby ensuring
continuous compliance with evolving regulatory mandates and contemporary cybersecurity best
practices.</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>The model and methodology developed in this work for forming adaptive security profiles for the
protection of wireless networks provide a rigorous foundation for building flexible, scalable, and
risk-oriented information-security systems in a dynamic cyber environment. The proposed
approach constructs a formalised, multi-level hierarchy of security profiles that can be
automatically updated on the basis of behavioural assessments, trust levels, network topology,
traffic characteristics, and the prevailing threat landscape.</p>
      <p>The study demonstrates that traditional static access policies are inadequate for countering
contemporary, multi-vector threats—particularly in open-air wireless channels. By contrast,
introducing adaptive profiles that integrate cryptographic controls, authentication mechanisms,
behavioural analytics, and contextual risk assessment markedly enhances cyber-resilience.</p>
      <p>A key emphasis is the seamless integration with international standards—IEEE 802.11ax/be,
ISO/IEC 15408, ISO/IEC 27033, and NIST SP 800-53—and with Zero-Trust architecture, thereby
providing a coherent framework for constructing and certifying profiles. The accompanying
mathematical models formalise the logic of security-parameter adaptation, performance-evaluation
mechanisms, adaptation indices, trust metrics, and transition functions between profiles, enabling
precise characterisation of the security system’s behaviour across both time and space. Collectively,
Models (1)–(30) establish a comprehensive mathematical scaffold for building adaptive, certifiable,
and scalable security profiles that operationalise Zero Trust in wireless environments.</p>
      <p>The proposed model is deployable within corporate Wi-Fi, IoT, and cloud-service security
architectures, greatly enhancing its practical value. Specifically, the algorithms can be applied to
the design of secure wireless infrastructures, the creation of IoT-oriented profiles, the protection of
cloud services and mobile access, and the segmentation of Wi-Fi zones. The methodology is
likewise relevant for automated security-audit platforms and expert evaluations of
wirelessnetwork compliance with security standards.</p>
      <p>In sum, the results of this study address current challenges in information security by elevating
the adaptability and dynamic resilience of wireless networks and by establishing a unified
methodology to safeguard the confidentiality, integrity, and availability of information resources
within heterogeneous digital environments.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A. S.</given-names>
             
            <surname>Khan</surname>
          </string-name>
          , et al.,
          <article-title>A Survey on 6G Enabled Light Weight Authentication Protocol for UAVs, Security</article-title>
          , Open Research Issues and Future Directions, Appl. Sci.
          <volume>13</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/app13010277
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>H.</given-names>
            <surname> Abie</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
           Pirbhulal,
          <article-title>Autonomous Adaptive Security Framework for 5G-</article-title>
          <string-name>
            <surname>Enabled</surname>
            <given-names>IoT</given-names>
          </string-name>
          ,
          <source>CoRR abs/2406</source>
          .03186 (
          <year>2024</year>
          ).
          <source>doi:10.48550/arXiv.2406.03186</source>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Ahmadi,
          <article-title>Zero Trust Architecture in Cloud Networks: Application, Challenges</article-title>
          and
          <string-name>
            <given-names>Future</given-names>
            <surname>Opportunities</surname>
          </string-name>
          ,
          <source>J. Eng. Res. Reports</source>
          <volume>26</volume>
          (
          <issue>2</issue>
          ) (
          <year>2024</year>
          )
          <fpage>215</fpage>
          -
          <lpage>228</lpage>
          . doi:
          <volume>10</volume>
          .9734/jerr/2024/v26i21083
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
             A. 
            <surname>Abdulkareem</surname>
          </string-name>
          , et al.,
          <article-title>Network Intrusion Detection: An IoT and Non IoT-Related Survey</article-title>
          , in: IEEE Access,
          <volume>12</volume>
          ,
          <year>2024</year>
          ,
          <fpage>147167</fpage>
          -
          <lpage>147191</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2024</year>
          .3473289
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
             B. 
            <surname>Kamble</surname>
          </string-name>
          , V. V. 
          <string-name>
            <surname>Jog</surname>
          </string-name>
          ,
          <article-title>Efficient Key Management for Dynamic Wireless Sensor Network</article-title>
          ,
          <source>in: 2017 2nd IEEE Int. Conf. on Recent Trends in Electronics, Information &amp; Communication Technology (RTEICT)</source>
          ,
          <year>2017</year>
          ,
          <fpage>583</fpage>
          -
          <lpage>586</lpage>
          . doi:
          <volume>10</volume>
          .1109/RTEICT.
          <year>2017</year>
          .8256663
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
             
            <surname>Shevchuk</surname>
          </string-name>
          et al.,
          <source>Designing Secured Services for Authentication</source>
          , Authorization, and Accounting of Users, in: Cybersecurity Providing in Information and Telecommunication
          <string-name>
            <surname>Systems (CPITS-2023-II)</surname>
          </string-name>
          ,
          <year>2023</year>
          ,
          <volume>3550</volume>
          ,
          <fpage>217</fpage>
          -
          <lpage>225</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Susukailo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Opirsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yaremko</surname>
          </string-name>
          ,
          <article-title>Methodology of ISMS Establishment Against Modern Cybersecurity Threats</article-title>
          ,
          <source>in: Lecture Notes in Electrical Engineering</source>
          , Springer International Publishing, Cham,
          <year>2021</year>
          , pp.
          <fpage>257</fpage>
          -
          <lpage>271</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -92435-5_
          <fpage>15</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Bashir</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           H. 
          <article-title>Mir, An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Network</article-title>
          , in: 
          <source>2013 Int. Conf. on Advanced Electronic Systems (ICAES)</source>
          ,
          <year>2013</year>
          ,
          <fpage>257</fpage>
          -
          <lpage>261</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICAES.
          <year>2013</year>
          .6659404
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Buffer and Priority Optimization for Security Assurance in Bluetooth Networks</article-title>
          ,
          <source>Inf. Syst. Technol. Secur</source>
          .
          <volume>2</volume>
          (
          <issue>8</issue>
          ) (
          <year>2025</year>
          )
          <fpage>5</fpage>
          -
          <lpage>16</lpage>
          . doi:
          <volume>10</volume>
          .17721/ISTS.
          <year>2024</year>
          .
          <volume>8</volume>
          .
          <fpage>5</fpage>
          -
          <lpage>16</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Rzaieva</surname>
          </string-name>
          , et al.,
          <source>Methods of Modeling Database System Security, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          ,
          <volume>3654</volume>
          ,
          <year>2024</year>
          ,
          <fpage>384</fpage>
          -
          <lpage>390</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Skladannyi</surname>
          </string-name>
          , et al.,
          <source>Development of Modular Neural Networks for Detecting Different Classes of Network Attacks, Cybersecur. Educ. Sci. Technol</source>
          .
          <volume>3</volume>
          (
          <issue>27</issue>
          ) (
          <year>2025</year>
          )
          <fpage>534</fpage>
          -
          <lpage>548</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2025</year>
          .
          <volume>27</volume>
          .772
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Ingle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. U.</given-names>
            <surname>Nimbhorkar</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          <article-title>Review on Secure Communication Protocol for Wireless Ad Hoc Network</article-title>
          , in: 
          <source>2015 Int. Conf. on Pervasive Computing (ICPC)</source>
          ,
          <year>2015</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/PERVASIVE.
          <year>2015</year>
          .7087205
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Skladannyi</surname>
          </string-name>
          , et al.,
          <source>Development of Modular Neural Networks for Detecting Different Classes of Network Attacks, Electron. Sci. J. Cybersecur. Educ. Sci. Technol</source>
          .
          <volume>3</volume>
          (
          <issue>27</issue>
          ) (
          <year>2025</year>
          )
          <fpage>534</fpage>
          -
          <lpage>548</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2025</year>
          .
          <volume>27</volume>
          .772
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>C.-Y. Lee</surname>
            , et al.,
            <given-names>A Hardware</given-names>
          </string-name>
          <string-name>
            <surname>Validation</surname>
          </string-name>
          <article-title>Framework for a Networked Dynamic Multi-factor Security Protocol</article-title>
          ,
          <source>in: 6th Int. Conf. on Advanced Communication Technologies and Networking</source>
          ,
          <year>2023</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          , doi:10.1109/CommNet60167.
          <year>2023</year>
          .10365286
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>N. F.</given-names>
             
            <surname>Syed</surname>
          </string-name>
          , et al.,
          <article-title>Zero Trust Architecture (ZTA): A Comprehensive Survey</article-title>
          , in: IEEE Access,
          <volume>10</volume>
          ,
          <year>2022</year>
          ,
          <fpage>57143</fpage>
          -
          <lpage>57179</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2022</year>
          .3174679
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Vaidehi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
             Kayalvizhi, N. C. 
            <surname>Sekar</surname>
          </string-name>
          ,
          <article-title>Secure Data Aggregation in Wireless Sensor Networks</article-title>
          ,
          <source>in: 2nd Int. Conf. on Computing for Sustainable Global Development (INDIACom)</source>
          ,
          <year>2015</year>
          ,
          <fpage>2179</fpage>
          -
          <lpage>2184</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>A System for Assessing the Interdependencies of Information System Agents in Information Security Risk Management using Cognitive Maps</article-title>
          ,
          <source>in: Cyber Hygiene &amp; Conflict Management in Global Information Networks</source>
          <year>2024</year>
          ,
          <volume>3925</volume>
          ,
          <year>2025</year>
          ,
          <fpage>249</fpage>
          -
          <lpage>264</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          et al.,
          <source>Information and Intelligent Forecasting Systems based on the Methods of Neural Network Theory, in: Proc. Smart Information Systems and Technologies (SIST)</source>
          ,
          <year>2023</year>
          ,
          <fpage>168</fpage>
          -
          <lpage>173</lpage>
          . doi:
          <volume>10</volume>
          .1109/SIST58284.
          <year>2023</year>
          .10223499
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Kryvoruchko</surname>
          </string-name>
          , et al.,
          <source>Analysis of Technical Indicators of Efficiency and Quality of Intelligent Systems, J. Theor. Appl. Inf. Technol</source>
          .
          <volume>101</volume>
          (
          <issue>24</issue>
          ) (
          <year>2023</year>
          )
          <fpage>127</fpage>
          -
          <lpage>139</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>H</surname>
          </string-name>
          .-Y. 
          <article-title>Chien, Dynamic Public Key Certificates with Forward Secrecy</article-title>
          , Electron. 
          <volume>10</volume>
          (
          <issue>16</issue>
          ) (
          <year>2009</year>
          ). doi:
          <volume>10</volume>
          .3390/electronics10162009
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Dammak</surname>
          </string-name>
          , et al.,
          <article-title>Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments</article-title>
          ,
          <source>in: IEEE Transactions on Network and Service Management</source>
          ,
          <volume>17</volume>
          , no.
          <issue>3</issue>
          ,
          <year>2020</year>
          ,
          <fpage>1742</fpage>
          -
          <lpage>1757</lpage>
          . doi:
          <volume>10</volume>
          .1109/TNSM.
          <year>2020</year>
          .3002957
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22] M. 
          <string-name>
            <surname>Z.</surname>
          </string-name>
           
          <article-title>Ali, Dynamic Allocation of Data Security in Wireless Sensor Networks</article-title>
          ,
          <source>in: IEEE Conference on Dependable, Autonomic and Secure Computing (DASC)</source>
          ,
          <year>2024</year>
          ,
          <fpage>33</fpage>
          -
          <lpage>39</lpage>
          . doi:
          <volume>10</volume>
          .1109/DASC64200.
          <year>2024</year>
          .00011
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>F.</given-names>
            <surname> </surname>
          </string-name>
          <article-title>A. Qazi, Study of Zero Trust Architecture for Applications and Network Security, in: IEEE 19th Int. Conf. on Smart Communities: Improving Quality of Life using ICT, IoT and AI</article-title>
          (HONET),
          <year>2022</year>
          ,
          <fpage>111</fpage>
          -
          <lpage>116</lpage>
          . doi:
          <volume>10</volume>
          .1109/HONET56683.
          <year>2022</year>
          .10019186
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Integrated Protection Strategies and Adaptive Resource Distribution for Secure Video Streaming over a Bluetooth Network, in: Cybersecurity Providing in Information and Telecommunication Systems II,</article-title>
          <year>3826</year>
          ,
          <year>2024</year>
          ,
          <fpage>129</fpage>
          -
          <lpage>138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Models and Algorithms for Analyzing Information Risks during the Security Audit of Personal Data Information System</article-title>
          ,
          <source>in: Cyber Hygiene &amp; Conflict Management in Global Information Networks</source>
          <year>2024</year>
          ,
          <volume>3925</volume>
          ,
          <year>2025</year>
          ,
          <fpage>155</fpage>
          -
          <lpage>171</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Information Protection and Secure Data Exchange in Wireless Mobile Networks with Authentication and Key Exchange Protocols, Cybersecur</article-title>
          .
          <source>Educ. Sci. Technol</source>
          .
          <volume>1</volume>
          (
          <issue>25</issue>
          ) (
          <year>2024</year>
          )
          <fpage>229</fpage>
          -
          <lpage>252</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2024</year>
          .
          <volume>25</volume>
          .229252
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Bahaa</surname>
          </string-name>
          , et al.,
          <article-title>Monitoring Real Time Security Attacks for IoT Systems using DevSecOps: A Systematic Literature Review</article-title>
          , Inform.
          <volume>12</volume>
          (
          <issue>4</issue>
          ) (
          <year>2021</year>
          )
          <article-title>154</article-title>
          . doi:
          <volume>10</volume>
          .3390/info12040154
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>C.</given-names>
             
            <surname>Hamroun</surname>
          </string-name>
          , et al.,
          <article-title>Intrusion Detection in 5G and Wi-Fi Networks: A Survey of Current Methods, Challenges, and Perspectives</article-title>
          , in: IEEE Access,
          <volume>13</volume>
          ,
          <year>2025</year>
          ,
          <fpage>40950</fpage>
          -
          <lpage>40976</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2025</year>
          .3546338
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Method for Protecting GRID Environments from Malicious Code During Computational Task Execution, Cybersecur</article-title>
          .
          <source>Educ. Sci. Technol</source>
          .
          <volume>3</volume>
          (
          <issue>27</issue>
          ) (
          <year>2025</year>
          )
          <fpage>22</fpage>
          -
          <lpage>40</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2025</year>
          .
          <volume>27</volume>
          .710
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>F.</given-names>
             
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Jiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhou</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Feng</surname>
          </string-name>
          ,
          <source>Information Security Network Intrusion Detection System Based on Machine Learning, in: 2024 Int. Conf.e on Data Science and Network Security</source>
          ,
          <year>2024</year>
          ,
          <fpage>01</fpage>
          -
          <lpage>04</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICDSNS62112.
          <year>2024</year>
          .10691041
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>S. S. Abd</given-names>
            <surname>El Dayem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
             R. M. 
            <surname>Rizk</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
           
          <string-name>
            <given-names>A.</given-names>
            <surname>Mokhtar</surname>
          </string-name>
          ,
          <article-title>Security for Wireless Sensor Network</article-title>
          ,
          <source>in: 6th Int. Conf. on Information Communication and Management (ICICM)</source>
          ,
          <year>2016</year>
          ,
          <fpage>173</fpage>
          -
          <lpage>177</lpage>
          . doi:
          <volume>10</volume>
          .1109/INFOCOMAN.
          <year>2016</year>
          .7784237
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>X.</given-names>
             
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
             
            <surname>Qiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Novel</given-names>
            <surname>Semi-Supervised Anomaly</surname>
          </string-name>
          <article-title>Detection Method for Network Intrusion Detection</article-title>
          ,
          <source>in: 2022 IEEE 22nd Int. Conf. on Communication Technology (ICCT)</source>
          ,
          <year>2022</year>
          ,
          <fpage>1276</fpage>
          -
          <lpage>1280</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICCT56141.
          <year>2022</year>
          .10073098
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Skladannyi</surname>
          </string-name>
          , et al.,
          <article-title>Improving the Security Policy of the Distance Learning System based on the Zero Trust Concept</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          ,
          <volume>3421</volume>
          ,
          <year>2023</year>
          ,
          <fpage>97</fpage>
          -
          <lpage>106</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>R. </given-names>
            <surname>Syrotynskyi</surname>
          </string-name>
          , et al.,
          <article-title>Methodology of Network Infrastructure Analysis as Part of Migration to Zero-Trust Architecture</article-title>
          ,
          <source>in: Cyber Security and Data Protection</source>
          ,
          <volume>3800</volume>
          ,
          <year>2024</year>
          ,
          <fpage>97</fpage>
          -
          <lpage>105</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>