<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A model of a secure information system for cognitive data processing in IoT sensor networks for laboratory climatic testing⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yaroslav Tarasenko</string-name>
          <email>yaroslav.tarasenko93@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Chervotoka</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Orlov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Lada</string-name>
          <email>ladanatali256@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Shapoval</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrian Piskozub</string-name>
          <email>andriian.z.piskozub@lpnu.ua</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>State Scientific Research Institute of Armament and Military Equipment Testing and Certification</institution>
          ,
          <addr-line>18000 Cherkasy</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>90</fpage>
      <lpage>104</lpage>
      <abstract>
        <p>Information protection during data transmission in IoT-based sensor networks used in laboratory testing is an important task in the context of growing demand for laboratory climatic tests. The use of cognitive artificial intelligence in the process of managing laboratory climatic tests requires taking into account not only factors affecting the test object, but also factors of possible network-based attacks on the cyberphysical system. That is why the paper presents a model of a secure information system for cognitive data processing in IoT sensor networks. When cognitive information processing is performed, situational factors of the first kind (data on climatic conditions) and the second kind (potential network-based attacks) are taken into account. Data protection is implemented through cryptographic information transformation based on the generation of two-operand asymmetric CET-operations with an accuracy of up to the permutation of the second operand when transmitting information from sensors to the cognitive data processing unit (Algorithm I). To protect the information transmitted from the database to the cognitive processing unit, a synthesis of direct and inverse operations is used based on the generation of two-operand asymmetric CET-operations with an accuracy of up to the permutation of the first operand (Algorithm II). To protect the information transmitted from the cognitive data processing unit to the actuators, a synthesis of direct and inverse operations is used based on the generation of two-operand asymmetric CET-operations with an accuracy of up to the permutation of the transformation result (Algorithm III). Situational factors of the first kind affect the information, due to which encryption is performed according to algorithm I. The presence of algorithms II and III is due to situational factors of the second kind. A graphical and tabular representation of the information system model was formed, which determined the role and place of protection algorithms in the functional structure of an IoT-based sensor network. The analysis of the development in modeling managerial decision-making based on cognitive data processing, taking into account situational factors of the first and second kind under conditions of network-based attack simulation, showed improved efficiency. The development is 7% more efficient compared to the results of managerial decision-making by a person and 49% more efficient compared to the use of the LIMS considered in the work.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cryptographic information protection</kwd>
        <kwd>wireless sensor networks</kwd>
        <kwd>network-based attacks</kwd>
        <kwd>cognitive intelligence</kwd>
        <kwd>cognitive map</kwd>
        <kwd>CET-operations</kwd>
        <kwd>IoT based climatic testing</kwd>
        <kwd>laboratory information management systems</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Applying new technologies in production development and globalization processes impose high
requirements on the quality of any product, its safety and compliance with regulatory documents.
This situation leads to the search for ways to improve and expand the procedures for
confirmingthe quality of manufactured products. Determining the characteristics to confirm
reliability and quality is the task of research laboratories. Today, the problem of reproducing the
impact of environmental conditions on manufactured products in the laboratory by using secure
0000-0002-5902-8628 (Ya. Tarasenko); 0000-0002-1083-4178 (O. Chervotoka); 0000-0003-3840-4089 (S. Orlov);
00000002-7682-2970 (N. Lada); 0009-0000-5334-4841 (V. Shapoval); 0000-0002-3582-2835 (A. Piskozub)
2
)rs 1,8
lla 1,6 1,46
o
fd 1,4
so 1,2
lion 1
l
i(b 0,8
ize 0,6
tse 0,4
rak 0,2</p>
      <p>M 0
information systems is extremely relevant. According to a Value Market Report [1], the market for
climatic test chambers is expanding rapidly. The report provides data on the market size starting
from 2024 (USD 1.46 billion) and forecasts growth until 2033 (USD 1.79 billion) in increments of
2.33% (Figure 1).
1,79
2024
2025
2026
2027
2028
2029
2030
2031
2032</p>
      <p>2033
Year</p>
      <p>Presented data proves the relevance of laboratory testing for the impact of external climatic
factors. This report also identifies the prospects for the use and development of laboratory climate
testing technologies aimed at improving the accuracy and efficiency of testing processes. These
areas include automation of testing processes and data processing. It is noted that automation
integrated with the Internet of Things (IoT) technology in climate testing chambers has high
potential and can rapidly change the market. The analytical report proves that IoT technology
implemented in climate chambers enables automated real-time data processing, remote monitoring,
and test prediction approaches. This is confirmed by a review of the findings of the National
Institute of Standards and Technology (NIST), which confirms the high potential of IoT technology
to support product quality improvement processes.</p>
      <p>
        Automation of laboratory tests is an important component of improving the accuracy,
objectivity and reproducibility of the results obtained. Automation processes are researched,
improved and implemented to research laboratories in a wide range of areas. Paper [
        <xref ref-type="bibr" rid="ref7">2</xref>
        ] investigates
automation in clinical microbiology laboratories. The purpose of automation is to obtain accurate,
relevant, and timely results. The author suggests the use of artificial intelligence and specialized
information systems to achieve the needed level of automation. It is also appropriate to use
artificial intelligence in laboratory climatic testing, provided that the peculiarities of climatic
testing processes are taken into account. Such features include: a wide range of climatic impacts on
the test object, the importance of adjusting further procedures based on the object's response to
external factors, taking into account the results of previous tests, and the use of IoT sensor
networks. It is IoT sensor networks that are characterized by the presence of actuators which
influence laboratory testing procedures. Such conditions determine the need to use an alternative
direction of artificial intelligence in the process of automating laboratory climate tests, which is
cognitive artificial intelligence. The cognitive approach allows modelling operator behavior and
reactions of a real person when interacting with IoT-based cyber-physical systems in the context of
test process automation.
      </p>
      <p>The analysis of modern challenges, current technological solutions and forecast of trends in the
development of laboratory testing technologies allows to substantiate the problem of developing
and improving mechanisms for automated data processing in IoT-based cyber-physical systems
through the introduction of information systems using cognitive artificial intelligence.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background and related work</title>
      <p>Laboratory Information Management Systems (LIMS) are now widely used in automating data
processing in laboratory testing. Such systems provide functionality for managing laboratory tests.
Paper [3] analyses such systems from the side of data management in testing research laboratories.
The authors note that the main task of LIMS is to automate the processes of storing data from
research experiments. The authors refer to other areas, such as communication, scheduling, etc., as
another class of software that is not related to LIMS. It can be agreed with this statement from the
point of view of the conceptual process in laboratory test data processing, in terms of data storage
mechanisms. Automated information systems of research laboratories are not limited to the
automatic storage of the results obtained, but also perform their processing. Thus, work [4]
describes the actual implementation of a specially developed LIMS in the National Health
Laboratory (Timor-Leste) in order to overcome the challenges of automating the work at research
laboratories, which include data processing. It is proposed to overcome such challenges with the
help of LIMS also in [5]. A significant advantage of the approach proposed by the authors is the
integration of LIMS with the IoT system and wireless sensor network to automate repetitive tasks
in laboratories. Automation of repetitive tasks does not allow for the implementation of a
fullfledged control system taking into account situational factors.</p>
      <p>In order to improve data processing, attempts are being made to use artificial intelligence as an
additional tool for automating management and decision-making processes. Paper [6] describes the
use of artificial intelligence in information management for robotic systems during laboratory
research. The approach is conceptually appropriate for an IoT-based system of automated
laboratory testing, but requires significant constructive adaptation.</p>
      <p>
        As already mentioned, the IoT-based approach of the automated laboratory testing system
involves the use of wireless sensor networks. Information from the sensors is transmitted via
wireless channels for processing by the information system, which in turn transmits the data to the
actuators in order to influence the testing processes depending on the situational decisions made.
This poses a threat to the integrity and confidentiality of the transmitted data. In order to protect
the information system and ensure the objectivity and reliability of information, it is important to
integrate security modules into the overall system model. Paper [7] discusses various approaches to
organizing the protection of online LIMS and provides a classification of threats, according to
which there are network-based, access-based and device-based attacks. In the case of considering
an IoT-based sensor network, network-based attacks are the most important. The approaches to
protecting the integrity and confidentiality of information from network-based attacks, including
those that exploit the vulnerabilities of wireless networks, include encryption. The work in the
field of strategies for securing IoT devices [8] proves the need to take into account the limited
memory resources of IoT devices for the implementation of encryption algorithms. Lightweight
cryptographic algorithms [9] are being developed and can be integrated into the laboratory test
information management system, but need to be improved to solve the problem of taking into
account situational factors. Work in the field of cybersecurity using information-driven operations
[
        <xref ref-type="bibr" rid="ref13 ref18 ref21">10</xref>
        ] allows encryption based on data obtained in a particular situation.
      </p>
      <p>An analysis of the functionality of existing LIMS has revealed their insufficiency for the full
automation of research laboratories that use IoT technologies due to the lack of implementation of
modern artificial intelligence approaches, in particular cognitive intelligence, in the systems. The
insufficiency of current LIMS developments in the field of laboratory climatic testing has been
identified. LIMS models do not take into account the situational factor and do not have an adequate
level of integrated information security tools.</p>
      <p>There is a need to develop a model of an information system for managing the process of
laboratory testing for the impact of external climatic factors through the use of an IoT-based sensor
network. A significant contribution to the development of information technologies for automating
the assessment of climatic impact parameters was made in [11]. The authors proposed an approach
based on operational monitoring data, which should be used in the process of processing
information obtained during the monitoring of IoT-based laboratory testing systems for the impact
of external climatic factors.</p>
      <p>Existing scientific works determine the need to develop a model of an information system for
data processing in IoT-based sensor networks for laboratory climatic testing, which takes into
account situational factors caused by both the impact of external climatic factors on the test object
and potential security threats to the sensor network.</p>
      <p>The aim of the work is to improve the efficiency of automated control in climatic laboratory
testing processes based on cognitive artificial intelligence through situational control of testing
processes taking into account the probable network-based attacks.</p>
      <p>To achieve this goal, the following tasks were set:




</p>
      <p>To form a psychological basis of human decision-making for cognitive modelling of
automated managerial decision-making processes.</p>
      <p>To model the processes of automated managerial decision-making by building a cognitive
map.</p>
      <p>To form a tabular and graphical representation of the information system model.
To perform modelling of climatic laboratory testing processes management based on
situational factors.</p>
      <p>To build algorithms for cryptographic transformation of information in transmitting over
wireless channels of the sensor network.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Modelling of the information system</title>
      <p>System modelling consists of several interrelated components. These include a psychological basis
with a formalized representation of concept formation in the form of an ontology. The cognitive
map, which is formed by the concepts’ set of the ontology is the basis for modelling the
information system using a directed graph. Situational management model and cryptographic
protection unit are integral components of the system. In situational modelling, it is mandatory to
take into account situational factors of environmental conditions and the results of the impact on
the test object measured by sensors (situational factors of the first kind) and factors of potential
network-based attacks on data transmission channels in an IoT-based wireless sensor network
(situational factors of the second kind). A schematic diagram of the components’ interaction in the
IoT-based sensor network with an information system of cognitive data processing, taking into
account situational factors of the first and second kind, is shown in Figure 2.</p>
      <p>Sensors that measure environmental conditions and the condition of the test object encrypt the
data and transmit it to the information system where it is processed taking into account
information about previous tests from the database. The decision on further actions is sent to the
actuators and entered into the database. Potential attacks affect the transmission of data from the
sensors to the information system, from the information system to the actuators, and from/to the
database.</p>
      <sec id="sec-3-1">
        <title>3.1. Psychological basis for cognitive modelling</title>
        <p>Artificial intelligence is required to process the information received from sensors and the
information about the results of previous tests from the database. Traditional approaches to
implementing a neural network are not sufficient for effective managerial decision-making during
laboratory tests on the impact of external climatic factors. A prerequisite is the modelling of human
actions. The main tool for meeting this requirement is cognitive artificial intelligence.</p>
        <p>The work [12] is of great importance for performing human thought simulation processes. The
results can be used in the process of forming a psychological basis for cognitive modelling of
managerial decision-making processes. The results should be used not to model the interaction
between artificial intelligence and humans, as noted in the paper, but to model human behavior in
managing laboratory tests. To model the behavior of objects in a wireless sensor network and
enable the system to respond according to the principle of human behavior, the structure of
interaction and relationships described in [13] was used.</p>
        <p>Paper [13] uses 3 main concepts that are appropriate to use as a psychological basis for
modelling human behavior: short-term memory, long-term memory, and integration of memory
types. In the context of solving the problem of forming a psychological basis for cognitive
modelling, all parameters of current tests are used as the concept of short-term memory. The
concept of long-term memory is the most significant ones recorded in the database based on the
data of previous tests. Integration is performed by prioritizing and assessing the data’s relevance to
the relevant psychological functional state based on the method described in [14]. An ontology is a
tool for describing concepts. The ontology provides the appropriate concept’s formation tools for
further cognitive modelling, as well as for situational managerial decision-making. The approach to
defining an ontology of typical processing and computer simulation tasks described in [15] can be
extended to take into account the basic concepts of the psychological basis for modelling human
behavior. The ontology is described by equation:</p>
        <p>O = { A = B ∪ C , K , K * , K ' = { ∑
n μS j ( k * , i )
j =1 ∑N μS j ( k * , i )
i=1
} , F { f ( . ) } ,
(1)
where A is the set of concepts that make up the terms of ontology; B is the set of possible tasks
during laboratory tests; C is the set of terms that reveal the content of possible tasks; K is the set of
parameters of current tests; K * is the set of the most important parameters in the test database; K '
is a set that performs memory integration by linking current events with those defined in the test
base; S is a functional psychological state; k * is an element from the test base; N is total number of
parameters of current tests; μ is similarity measure; n is number of possible psychological states of
interpretation; F is a set that contains an interpretation function; f(.) is an interpretation function
that forms an ontology glossary based on possible tasks.</p>
        <p>The ontology allows to structure the data of the subject area in the form of concepts for further
cognitive processing.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Cognitive map of information processing for automated managerial decisionmaking</title>
        <p>According to paper [16], structured data formed in the human brain during information processing
is based on dynamic memory processes. Such data can be the basis for information processing
using cognitive artificial intelligence. Cognitive maps and diagrams are the main tools for
representing structured knowledge. In the context of the current task, cognitive maps will be the
most useful. According to the mechanisms of abstraction from structure-based models presented in
[16], cognitive maps, in contrast to cognitive schemas, represent an association-based mechanism
and a graph-based mechanism. Associations make it possible to make decisions as close to human
as possible based on the processed data. The graph-based representation allows using data
processing in modelling managerial decision-making processes and integrating the data processing
into the information system, the model of which is presented in graphical form in 3.3.</p>
        <p>In this case, the structure-based model is the ontology, which, according to formula (1), already
takes into account dynamic memory processes.</p>
        <p>
          The cognitive map is built using the mechanisms presented in [
          <xref ref-type="bibr" rid="ref4">17</xref>
          ]. The cognitive map acts as
an oriented symbolic graph. The vertices of the graph are situations, the arcs are relations followed
by subsequent situations. The “+” sign reflects an increase in the importance of the resulting
situation with an increase in the importance of the situation that caused it, and the “–” sign reflects
a decrease in the importance of the resulting situation with an increase in the importance of the
situation that caused it. A cognitive map of information processing for automated management
decision-making by an information system is shown in Figure 3.
The path of the concept when making a decision in processing the received data by the system
from the moment of receipt to the moment of decision-making is described by analogy of [
          <xref ref-type="bibr" rid="ref4">17</xref>
          ] by
the formula:
ai → bk … → a Oj ,
(2)
where ai is an element of the concepts’ set in the ontology; bk is an element of the tasks’ set; a Oj
is a concept that represents the situation according to the model of the laboratory tests’ ontology;
(i, k, ..., j) is a path.
        </p>
        <p>The formed cognitive map is a necessary component for integration into the model of the
information system for cognitive processing of laboratory climatic testing data as one of the output
data streams responsible for deciding on further actions. The decision is made on the basis of
cognitive data processing.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Presentation of the information system model</title>
        <p>The methodological approach for modelling the information system was chosen from [18]. The
functional representation of the information system in tabular form as a F-system was used
(Table 1).
The represented table shows the functional model of a secure information system for cognitive
data processing in IoT sensor networks for laboratory climatic testing. The F-system has 11 states:
z0 is a start of tests; z1 is a measurement of environmental parameters by sensors; z2 is a
measurement of the test object state by sensors; z3 is a edge calculations in sensors; z4 is a
cryptographic transformation of the information by algorithm I; z5 is a connection with the
database; z6 is a cryptographic transformation of the information by algorithm II; z7 is a data
analysis; z8 is a decision-making; z9 is a cryptographic transformation of the information by
algorithm III; z10 is a execution of actions by actuators. The F-system has 2 input data streams and 3
output data streams. The input data streams are: x1 is a transmission of measured parameters; x2 is
a transmission of a control signal. The output data streams are: y1 is a signal to change the state of
the object or climatic conditions; y2 is a decision on further actions; y3 is a calculation results.</p>
        <p>The table displays the input data streams horizontally and the output data streams vertically in
accordance with the system state. The cells show the values of the system's transitions from one
state to another.</p>
        <p>Cognitive data processing is used to obtain a data stream that is responsible for deciding on
further actions.</p>
        <p>The graphical representation of Table 1 is performed using a directed graph (Figure 3). The
vertices of the graph represent the states of the system, and the arcs represent the transitions
between the states.</p>
        <p>Modelling of the information system in a formalized form is performed by means of a
discretedeterministic model according to the formula:</p>
        <p>F = ⟨Z , X , Y , φ , ϑ , z0 , y2 , S ⟩,
where Z is a set of states; X is a set of input data; Y is a set of output data; φ is a transition
function; ϑ is an output function; z0 is the initial state; y2 is decision making based on cognitive
modelling; S is a set of encryption algorithms.</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Situational model of climatic laboratory testing process management</title>
        <p>Managerial decisions made by the cognitive data processing module of the information system are
based on the management approach described in [19]. To make a managerial decision, the
significance of the situation for achieving the main goals (Table 2) of the information system
design, as well as situational goals of the first (Table 3) and second (Table 4) kind, is taken into
account according to the formula:</p>
        <p>S =rU1=41 S cK ' ∪ U4 S K' ' ∪ U3 S K''' ,</p>
        <p>l =1 c m=1 c
where S is a situation; S cK ' reflects the level of achievement of the main goal C in accordance
with the evaluation characteristic of combining short-term and long-term memory when building
an ontology; S cK' ' reflects the level of achievement of the situational goal of the first kind C'; S cK'''
reflects the level of achievement of the situational goal of the second kind C''.</p>
        <p>Objectives from C1 to C4 are functional objectives, from C5 to C9 are information objectives, from
C10 to C11 are information security objectives, and from C12 to C14 are management objectives.</p>
        <p>Situational objectives of the second kind are caused by potential attacks on data transmission
channels in an IoT-based information system.
С1
С2
С3
С4
С1
С2
С3</p>
        <p>The technique of adapting laboratory tests to changes caused by external climatic factors and
changes in the test object under the influence of these factors and potential network-based attacks,
according to the results of the study [19], is determined by the formula:</p>
        <p>SA : ( C n ∪ С 'n ∪ С 'n' , a Oj ) →K ∈ K ' ; ,.
(5)</p>
        <p>Situational objectives of the first kind are caused by external climatic factors in the test object.
Potential attacks involve the use of encryption algorithms for information transmitted over
wireless channels in an IoT-based sensor network for laboratory climate testing.</p>
      </sec>
      <sec id="sec-3-5">
        <title>3.5. Constructing the algorithms for cryptographic transformation of information</title>
        <p>In the context of low resources in the presented system and the need to ensure the encoding and
decoding of information at three transmission directions (when transmitting information from
sensors to the cognitive data processing unit, which includes the encryption-decryption component
of information, from the database to the cognitive data processing unit and from the cognitive data
processing unit to the actuators), the use of traditional cryptographic algorithms is a difficult task
to implement. In represented information system model, it is necessary to ensure the speed of
operations as close to real-time as possible. In this case, it is advisable to use low-resource
CETencryption [9]. The peculiarity of the CET-encryption is that it is streaming, provides a high speed
of cryptographic transformation of information and guarantees bidirectional transmission between
the components of the IoT-based sensor network [20–25].</p>
        <p>In this information system, it is advisable to use asymmetric network operations to ensure the
encryption of the same information using the same key sequences but with the construction of
different ciphers.</p>
        <p>Among the CET-operations, it is advisable to distinguish strict cryptographic transformation
operations that provide maximum uncertainty of encryption results [26]. These CET-operations
guarantee the transformation of each bit of the operation with a probability of 0,5. Each
oneoperand CET-operation implements one substitution table. Two-operand CET-operations
implement several substitution tables. The choice of the substitution table for converting the first
operand is determined by the value of the second operand in which the pseudo-random sequence is
entered. The group of two-bit two-operand CET-operations of strict cryptographic encoding is
shown in Table 5.</p>
        <p>When constructing cryptographic systems, it is advisable to use not one two-operand
CEToperation, but a group of operations with specified properties.</p>
        <p>Constructing a group of modified two-operand CET-operations with permutation accuracy is
possible on the basis of three synthesis options:


</p>
        <p>Up to permutation of the first operand</p>
        <sec id="sec-3-5-1">
          <title>Up to permutation of the second operand</title>
          <p>C i ( x , y )=C ( C i ( x ) , y ) .
C i ( x , y )=C ( x , C i ( y ) ) .,</p>
        </sec>
        <sec id="sec-3-5-2">
          <title>With permutation accuracy of the transformation result</title>
          <p>C i ( x , y )=C i ( C ( x , y ) ) .,
(6)
(7)
(8)</p>
          <p>Generating a group of two-operand operations is possible by using the method of synthesis of
two-operand two-bit operations with permutation accuracy.</p>
          <p>On the basis of (6)–(8), it is possible to implement a pseudo-random sequence generator that
will select the encoding operation based on the information received from the sensors. It should be
noted that, for example, when using (7), the entire group of operations presented in Table 5 will be
implemented in a pseudo-random sequence. When using (6) and (8), operations that are not
included in the specified mathematical group will be generated. This may increase the uncertainty
of choosing a CET-operation to be used in the cryptographic transformation. However, not all
generated operations will meet the requirements of strict cryptographic encoding.
C3=C'6=[x1⋅(γ1⊕γ2)⊕x2⋅(γ1⊕γ2)]⊕[γ1] C6=C'3=[x1⋅(γ1⊕γ2)⊕x2⋅(γ1⊕γ2)]⊕[γ2]
x1⋅(γ1⊕γ2)⊕x2⋅(γ1⊕γ2) γ1 x1⋅(γ1⊕γ2)⊕x2⋅(γ1⊕γ2) γ2</p>
          <p>Synthesizing groups of CET-operations with permutation accuracy based on (6)–(8) will allow
to build generators of pseudo-random sequences of CET-operations with the same properties to
ensure the construction of cryptographic algorithms for stream encryption.</p>
          <p>In the presented information system, it is advisable to implement cryptographic protection of
information based on the generation of two-operand asymmetric CET-operations with an accuracy
up to permutation of the second operand when transmitting information from sensors to the
cognitive data processing unit (algorithm I). The generated direct and reverse asymmetric
twooperand CET-operations will belong to the synthesized group with the accuracy up to permutation
of the second operand and will have the same cryptographic properties.</p>
          <p>To implement the cryptographic protection of information from the database to the cognitive
data processing unit, it is advisable to use the synthesis of direct and inverse operations based on
the generation of two-operand asymmetric CET-operations with an accuracy up to permutation of
the first operand (algorithm II).</p>
          <p>To implement the cryptographic protection of information from the cognitive data processing
unit to the actuators, it is advisable to use the synthesis of direct and inverse operations based on
the generation of two-operand asymmetric CET-operations with an accuracy up to the
permutation of the transformation result (algorithm III).</p>
          <p>The situational factors of the first kind affect the information used for encryption by algorithm
I. The presence of algorithms II and III is due to situational factors of the second kind (potential
attacks) to increase the reliability of information protection during transmission over wireless
channels of a sensor network and protect from network-based attacks.</p>
        </sec>
      </sec>
      <sec id="sec-3-6">
        <title>3.6. Efficiency of the information system model</title>
        <p>Evaluation of the effectiveness of an information system requires taking into account the level of
achievement of situational factors, such as those determined by the research objectives and the
need to protect the information system. The level’s value of situational goals achievement for
proposed development can be compared with similar solutions. This can determine the
effectiveness of proposed development. According to the approach described in work [27], to
obtain level’s value of situational goals achievement, it is necessary to determine the
implementation level of the situational strategy by the formula:
n
∑ Rijk ∙ Raj O
^R = j =1 j
i</p>
        <p>S n
,,
(9)
where R ijk are the relevant solutions; R ajO is a solution of the final stage according to the
j
cognitive map; S n is the total number of situational decisions.</p>
        <p>B is the set of possible tasks during laboratory tests;
For each strategy, the achievement’s level of situational goals is calculated using the formula:</p>
        <p>E i = ∑ E 'j ^Ri . (10)</p>
        <p>To obtain the value of the development efficiency, the modelling of testing a personal computer
motherboard with a network-based attack situation was performed. As the data of previous tests,
an information sample of 15 similar boards of different technical condition and manufacturers was
used.</p>
        <p>Calculating the achievement level of situational strategies based on the modelling results proved
the increased efficiency of the proposed development by 7% compared to the results of human
decision-making and by 49% compared to the use of LIMS discussed in Section 2.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>The paper develops a model of a secure information system for cognitive data processing in
IoTbased sensor networks for laboratory testing tasks based on cognitive artificial intelligence through
situational management of laboratory testing processes, which makes it possible to automate the
process of making managerial decisions taking into account protection against network-based
attacks.</p>
      <p>According to the modelling results, the proposed development demonstrates an efficiency that is
7% higher than human decision-making and 49% higher than the use of classical LIMS, taking into
account the risks of network-based attacks.</p>
      <p>At the work it was obtained following scientific results:</p>
      <p>A psychological basis for decision-making by cognitive artificial intelligence based on
ontological modelling was formed by using the concepts of short-term, long-term, and
integrated memory through assessing functional psychological states, which made it
possible to perform cognitive modelling of automated managerial decision-making
processes.</p>
      <p>A cognitive map of data processing in IoT-based sensor networks based on cognitive
modelling was built by forming a directed graph using the transitions of concepts in the
ontology of laboratory climatic tests, which allowed to perform modelling of automated
managerial decision-making processes in the information system of cognitive data
processing
A model of the information system for laboratory test management based on a cognitive
data processing map was formed by means of tabular, graphical and formalized
representation through the F-system and directed graph, which made it possible to
integrate the cognitive approach of automatic decision-making into an IoT-based sensor
network of laboratory climatic tests, taking into account network-based attacks.</p>
      <p>Modelling the management of climatic laboratory testing processes depending on the main
situational factors, situational factors of the first (external influences and the object's
reaction) and the second (potential network-based attacks) kind was carried out by taking
into account the importance of the situation for achieving the goals through the use of an
ontological model of situational management with regard to risks, which allowed to form a
model of managerial decision-making by the information system of cognitive information
processing.</p>
      <p>The choice of a stream encryption algorithm based on the generation of pseudo-random
sequence of modified CET-operations with an accuracy up to permutation is determined by
the requirements for cryptographic stability and available information resources. Algorithm
I provides a change in the order of one-operand CET-operations when modifying a
twooperand CET-operation. Therefore, when using it, it is possible to determine the
requirements for converting a block of information. Algorithms II and III, in the process of
modifying a two-operand CET-operation, modify one-operand CET-operations, and
therefore change the lookup tables. An increase in the number of lookup tables provides an
increase in cryptographic stability. However, the implementation of the requirements for
converting a block of information is significantly complicated.</p>
      <p>The practical value lies in the possibility of implementing the protected information
management systems with the ability to automate the management of testing processes according
to the developed model for real implementation in IoT-based research laboratories for climatic
testing.</p>
      <p>The prospect of further research is to expand the scope of secure data processing to the field of
mechanical laboratory testing. A promising direction is to predict the behavior of the test object
during climatic laboratory tests, taking into account cyber threats and automated formation of a
digital twin model in IoT-based laboratory tests.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.
[1] Global Environmental Test Chambers Market Report, Environmental Test Chambers Market
Size, Share, Growth, and Industry analysis Report Segmented by Type (Temperature and</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>Africa)</source>
          ,
          <fpage>2025</fpage>
          -
          <lpage>2033</lpage>
          .
          <source>Value Market Report</source>
          ,
          <year>2025</year>
          . https://www.valuemarketresearch.
          <source>com/report/</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>environmental-test-chambers-market [2]</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Mencacci</surname>
          </string-name>
          , G. V.
          <string-name>
            <surname>De Socio</surname>
            , E. Pirelli,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Bondi</surname>
          </string-name>
          , E. Cenci, Laboratory Automation, Informatics,
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>in Cellular Infection Microbiology</source>
          <volume>13</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3389/fcimb.
          <year>2023</year>
          .
          <volume>1188684</volume>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname> A. M. Alamer</surname>
          </string-name>
          , et al.,
          <source>Impact of Implementing Laboratory Information Management Systems</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          17.2 (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .18011/
          <year>2022</year>
          .
          <volume>04</volume>
          (
          <issue>1</issue>
          )
          <fpage>1783</fpage>
          .1792 [4]
          <string-name>
            <given-names>T.</given-names>
            <surname>Oakley</surname>
          </string-name>
          , et al.,
          <article-title>Implementation of a Laboratory Information Management System (LIMS) for</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <source>BMC Medical Informatics and Decision Making 25.1</source>
          (
          <year>2025</year>
          ). doi:
          <volume>10</volume>
          .1186/s12911-024-02831-
          <issue>6</issue>
          [5]
          <string-name>
            <given-names>J. N.</given-names>
            <surname>Wangere</surname>
          </string-name>
          , E. 
          <string-name>
            <surname>Mwambe</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
           Flavian,
          <string-name>
            <surname>R.</surname>
          </string-name>
           Sinde, Development of Smart Laboratory
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>Sci. Res</source>
          . Eng.
          <volume>08</volume>
          .04 (
          <year>2022</year>
          )
          <fpage>01</fpage>
          -
          <lpage>14</lpage>
          . doi:
          <volume>10</volume>
          .31695/ijasre.
          <year>2022</year>
          .
          <volume>8</volume>
          .
          <issue>4</issue>
          .
          <issue>1</issue>
          [6]
          <string-name>
            <given-names>S. U.</given-names>
            <surname>Khan</surname>
          </string-name>
          , V. 
          <string-name>
            <given-names>K.</given-names>
            <surname>Moller</surname>
          </string-name>
          , R. 
          <string-name>
            <given-names>J. N.</given-names>
            <surname>Frandsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mansourver</surname>
          </string-name>
          ,
          <string-name>
            <surname>Real-Time</surname>
            <given-names>AI</given-names>
          </string-name>
          -driven Quality
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>OT-2 Liquid Handling Robot, Appl. Intell. 55.6</source>
          (
          <year>2025</year>
          ). doi:
          <volume>10</volume>
          .1007/s10489-025-06334-
          <issue>3</issue>
          [7]
          <string-name>
            <given-names>A. E.</given-names>
             
            <surname>Pena-Molina</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
           
          <string-name>
            <given-names>M.</given-names>
            <surname>Larrondo-Petrie</surname>
          </string-name>
          ,
          <article-title>Safety and Security Considerations for Online</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>Laboratory</given-names>
            <surname>Management Systems</surname>
          </string-name>
          ,
          <source>J. Cybersecur. Privacy 5</source>
          .2 (
          <year>2025</year>
          )
          <article-title>24</article-title>
          . doi:
          <volume>10</volume>
          .3390/jcp5020024 [8]
          <string-name>
            <given-names>I.</given-names>
            <surname>Rozlomii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yarmilko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Naumenko</surname>
          </string-name>
          , Innovative Resource-Saving Security Strategies for IoT
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Devices</surname>
            ,
            <given-names>J. Edge Comput.</given-names>
          </string-name>
          (
          <year>2025</year>
          ). doi:
          <volume>10</volume>
          .55056/jec.748 [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Rudnytskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Babenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rudnytskyi</surname>
          </string-name>
          , T. Korotkyi,
          <article-title>Generating a Sequence of Asymmetric</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>Technol. Society 16.1</source>
          (
          <year>2025</year>
          ). doi:
          <volume>10</volume>
          .32689/maup.it.
          <year>2025</year>
          .
          <volume>1</volume>
          .28 [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Babenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Myroniuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Lavdanskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tarasenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Myroniuk</surname>
          </string-name>
          , Information-Driven
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <source>formation and Telecommunication Systems</source>
          ,
          <volume>3654</volume>
          ,
          <year>2024</year>
          ,
          <fpage>137</fpage>
          -
          <lpage>149</lpage>
          . doi:
          <volume>10</volume>
          .5281/zenodo.10953299 [11]
          <string-name>
            <given-names>O.</given-names>
            <surname>Yehorova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Mislyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Khomenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Loboda</surname>
          </string-name>
          , Modeling the Distribution of Pollutants in
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Communications</surname>
            <given-names>Technologies</given-names>
          </string-name>
          , Springer Nature Switzerland, Cham,
          <year>2024</year>
          ,
          <fpage>486</fpage>
          -
          <lpage>495</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>doi:10</source>
          .1007/978-3-
          <fpage>031</fpage>
          -71801-4_
          <fpage>36</fpage>
          [12]
          <string-name>
            <given-names>R.</given-names>
            <surname>Salas-Guerra Cognitive AI</surname>
          </string-name>
          <article-title>Framework: Advances in the Simulation of Human Thought,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>arXiv</surname>
          </string-name>
          ,
          <year>2025</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2502.
          <volume>04259</volume>
          [13]
          <string-name>
            <given-names>W. A.</given-names>
            <surname>Jasim</surname>
          </string-name>
          , R. 
          <string-name>
            <given-names>A.</given-names>
            <surname>Hussein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. M.</given-names>
            <surname>Basheer</surname>
          </string-name>
          , H. A. A. 
          <string-name>
            <surname>Algashamy</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
           
          <string-name>
            <surname>Turovsky</surname>
          </string-name>
          , Advanced
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>Digital</given-names>
            <surname>Communities</surname>
          </string-name>
          ,
          <source>J. Ecohumanism</source>
          <volume>3</volume>
          .5 (
          <year>2024</year>
          )
          <fpage>353</fpage>
          -
          <lpage>364</lpage>
          . doi:
          <volume>10</volume>
          .62754/joe.v3i5.
          <volume>3911</volume>
          [14]
          <string-name>
            <given-names>V. P.</given-names>
            <surname>Shapoval</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. V.</given-names>
            <surname>Tarasenko</surname>
          </string-name>
          ,
          <article-title>Method of Intelligent Video Monitoring of Primary Signs of</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>Technical Sciences 2.2</source>
          (
          <year>2025</year>
          )
          <fpage>222</fpage>
          -
          <lpage>227</lpage>
          . doi:
          <volume>10</volume>
          .32782/
          <fpage>2663</fpage>
          -
          <lpage>5941</lpage>
          /
          <year>2025</year>
          .2.2/30 [15]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Lupenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Volianyk</surname>
          </string-name>
          ,
          <article-title>Improved Ontological Model of the Knowledge Base Expert</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>Cyclic</given-names>
            <surname>Signals</surname>
          </string-name>
          ,
          <source>Environmental Safety and Natural Resources 52.4</source>
          (
          <year>2024</year>
          )
          <fpage>92</fpage>
          -
          <lpage>98</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <source>doi:10</source>
          .32347/
          <fpage>2411</fpage>
          -
          <lpage>4049</lpage>
          .
          <year>2024</year>
          .
          <volume>4</volume>
          .
          <fpage>92</fpage>
          -
          <lpage>98</lpage>
          [16]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <surname>Y.</surname>
          </string-name>
           
          <article-title>Jin, Structural Knowledge: From Brain to Artificial Intelligence</article-title>
          , Artificial
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>Intell</surname>
          </string-name>
          .
          <source>Rev. 58.9</source>
          (
          <year>2025</year>
          ).
          <source>doi:10.1007/s10462-025-11270-2</source>
          [17]
          <string-name>
            <given-names>I.</given-names>
            <surname>Karpunin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zinchenko</surname>
          </string-name>
          ,
          <source>Cognitive Modelling of Intellectual Systems of Analysis of the</source>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <article-title>Financial Condition of the Entity, Cybersecur</article-title>
          .
          <source>Educ. Sci. Tech</source>
          .
          <volume>1</volume>
          .
          <issue>21</issue>
          (
          <year>2023</year>
          )
          <fpage>75</fpage>
          -
          <lpage>85</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <source>doi:10</source>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2023</year>
          .
          <volume>21</volume>
          .
          <volume>7585</volume>
          [18]
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Farid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Thompson</surname>
          </string-name>
          , W. 
          <article-title>Schoonenberg, A Tensor-based Formulation of Hetero-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <source>Functional Graph Theory, Sci. Reports</source>
          <volume>12</volume>
          .1 (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1038/s41598-022-19333-y [19]
          <string-name>
            <given-names>T.</given-names>
            <surname>Prokopenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lanskykh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Prokopenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Pidkuiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tarasenko</surname>
          </string-name>
          , Development of the
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <surname>Conditions</surname>
          </string-name>
          ,
          <string-name>
            <surname>Eastern-European</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <source>Enterprise Technol. 6</source>
          .
          <issue>3</issue>
          (
          <issue>126</issue>
          ) (
          <year>2023</year>
          )
          <fpage>47</fpage>
          -
          <lpage>54</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          4061.
          <year>2023</year>
          .
          <volume>292526</volume>
          [20]
          <string-name>
            <given-names>V.</given-names>
            <surname>Dudykevych</surname>
          </string-name>
          , et al.,
          <article-title>Platform for the Security of Cyber-Physical Systems and the IoT in the</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <surname>Telecommunication</surname>
            <given-names>Systems</given-names>
          </string-name>
          , CPITS, vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>449</fpage>
          -
          <lpage>457</lpage>
          . [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Novytskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kriuchkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          , Determining the Error Distribution of
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <source>Global Information Networks (CH&amp;CMiGIN)</source>
          , vol.
          <volume>4024</volume>
          (
          <year>2025</year>
          )
          <fpage>133</fpage>
          -
          <lpage>143</lpage>
          . [22]
          <string-name>
            <given-names>O.</given-names>
            <surname>Mykhaylova</surname>
          </string-name>
          , et al.,
          <article-title>Resistance to Replay Attacks of Remote Control Protocols using the 433</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <surname>Systems</surname>
          </string-name>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>98</fpage>
          -
          <lpage>110</lpage>
          . [23]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          , et al.,
          <article-title>Method for Increasing the Various Sources Data Consistency for IoT</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <surname>Sensors</surname>
          </string-name>
          , in
          <source>: IEEE 9th Int. Conf. on Problems of Infocommunications, Science and Technology</source>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          (
          <year>2023</year>
          )
          <fpage>522</fpage>
          -
          <lpage>526</lpage>
          . doi:
          <volume>10</volume>
          .1109/PICST57299.
          <year>2022</year>
          .
          <volume>10238518</volume>
          [24]
          <string-name>
            <given-names>O.</given-names>
            <surname>Bahatskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bahatskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <article-title>Smart Home Subsystem for Calculating the Quality of</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>168</fpage>
          -
          <lpage>173</lpage>
          . [25]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sadykov</surname>
          </string-name>
          , et al.,
          <article-title>Technology of Location Hiding by Spoofing the Mobile Operator IP Address,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          (
          <year>2021</year>
          )
          <fpage>22</fpage>
          -
          <lpage>25</lpage>
          . doi:
          <volume>10</volume>
          .1109/UkrMiCo52950.
          <year>2021</year>
          .
          <volume>9716700</volume>
          [26]
          <string-name>
            <given-names>D.</given-names>
            <surname>Jancarczyk</surname>
          </string-name>
          , et al.,
          <article-title>Two-Operand Operations of Strict Stable Cryptographic Coding with</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <string-name>
            <given-names>Different</given-names>
            <surname>Operands</surname>
          </string-name>
          ' Bits.
          <source>In: 2020 IEEE Int. Symposium on Smart and Wireless Systems within</source>
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <source>SWS)</source>
          , IEEE,
          <year>2020</year>
          . doi:
          <volume>10</volume>
          .1109/idaacs-sws50031.
          <year>2020</year>
          .
          <volume>9297067</volume>
          [27]
          <string-name>
            <given-names>T.</given-names>
            <surname>Prokopenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lanskykh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Prokopenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Pidkuiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tarasenko</surname>
          </string-name>
          , Development of the
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <string-name>
            <surname>Technology</surname>
          </string-name>
          ,
          <string-name>
            <surname>Eastern-European</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <source>Enterprise Technol. 1</source>
          .
          <issue>3</issue>
          (
          <issue>121</issue>
          ) (
          <year>2023</year>
          )
          <fpage>38</fpage>
          -
          <lpage>45</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>