<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Y. Tarasenko);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>embedded information processing⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yaroslav Tarasenko</string-name>
          <email>yaroslav.tarasenko93@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Orlov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Chervotoka</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Dmitriiev</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Lada</string-name>
          <email>ladanatali256@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Osadchyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Central Ukrainian National Technical University, pr. University</institution>
          ,
          <addr-line>8 25006, Kropivnitsky</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State Scientific Research Institute of Armament and Military Equipment Testing and Certification</institution>
          ,
          <addr-line>Vyacheslava Chornovola 164 18000, Cherkasy</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>The paper is devoted to solving the relevant problem of protecting information from leakage through thermal channels in systems with built-in information processing means. In the work it is presented a hierarchical modular model of intelligent protection against information leakage through temperaturebased transmission channels in IoT-oriented laboratory sensor networks with embedded information processing increase the reliability of information protection during laboratory tests against leakage through thermal channels by means of intelligent control of active protection processes. The results have proved the increase in the reliability of information protection during laboratory tests against leakage through thermal channels up to 20% in comparison with analogue protection systems. The means of intelligent control of active protection processes made it possible to develop an adaptive model of thermal covert channel protection. The proposed model of intelligent protection for temperature-based transmitting channels in laboratory sensor networks is based on intelligent management decision-making by a cyber-physical protection system through parametric linking of input data and physical changes in active protection. The proposed approach integrates three key components of input data: input physical, analytical and predictive parameters. It takes into account the influence of input physical parameters on output physical parameters as well as on the input predictive and analytical parameters. The protection system operates autonomously, adapting to input parameters, while ensuring the safety of laboratory equipment. The NIST statistical tests are used for detecting anomalies in thermal channel during the active protection is used. The contribution of this work lies in advancing intelligent active protection of IoT-based laboratory systems, ensuring reliable operation under security threats.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;thermal-side channel</kwd>
        <kwd>sensor networks</kwd>
        <kwd>cyber-physical systems</kwd>
        <kwd>adaptive security</kwd>
        <kwd>active defense systems</kwd>
        <kwd>total laboratory automation</kwd>
        <kwd>IoT oriented laboratory systems</kwd>
        <kwd>information leakage prevention 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The current pace of technical development, production volumes and diversity of high-tech
equipment require the development of highly effective procedures and means of confirming the
quality
of such
products. Technologies for confirming
quality
and
conducting technical
examinations by research laboratories need significant improvement in terms of automation and
intellectualization of processes. The paper [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] defines the prospects for the development of
socalled total laboratory automation (TLA) technologies. It notes the important advantages of using
these technologies, which include high efficiency and accuracy, reduced cost and time of laboratory
testing, and the ability to manage data. The use of TLA is an important component of the
competitiveness of research laboratories. The fact that TLA operates at three stages of data
processing during laboratory testing (pre-analytical, analytical and post-analytical) explains the
extreme relevance of information security measures during processing.
      </p>
      <p>
        TLA procedures are inextricably linked to the use of cyber-physical systems that operate in
laboratories and are controlled by corresponding information systems. These latest systems are based
on IoT technology and include built-in information processing systems. As noted in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], it is IoT
integration that is a priority area for unifying the laboratory environment. Embedded information
processing systems are necessary for real-time test process management and are the basic hardware
for the application of artificial intelligence in the implementation of TLA approaches.
      </p>
      <p>
        Along with the advantages of using IoT-oriented sensor networks, there is a threat of information
leakage through a number of channels. Work [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] provides a classification of information leakage
channels: network-based, host-based and physical. Since a cyber-physical system is used for TLA
application, network channels are associated with physical devices. Physical channels include
electromagnetic, power, thermal, acoustic, and optical channels. The thermal channel is one of the
least common but most vulnerable in the context of the system under consideration. The architecture
of a cyber-physical system with built-in information processing means involves placing various
sensor nodes and test devices at a short distance from each other. The laboratory management
system involves the use of video surveillance and, in some cases, thermal imaging. This situation is
highly conducive to information leakage via thermal channels. Work [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] explains possible
information leakage procedures, according to which the presence of a built-in laboratory data
processing processor and temperature sensors as components of devices that are nodes of a sensor
network fully satisfies the necessary and sufficient conditions for a full-fledged attack.
      </p>
      <p>An analysis of the most modern trends in the development of the material base of research
laboratories and challenges to the implementation of TLA technologies allows us to substantiate the
problem of developing technologies for protecting IoT-oriented laboratory sensor networks with
built-in information processing systems from leakage through thermal channels.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background and related work</title>
      <p>
        The problem of protecting information from leakage through thermal channels in systems with built-in
information processing means is relevant and is being addressed by the scientific community. Among
the works describing approaches to solving this problem is [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The authors propose protecting the
thermal channel of potential leakage of sensitive information for embedded systems through improved
thermal management using digital twin technology. The main disadvantage of using such protection in
the operation of equipment with embedded information processing systems is the increase in data
processing time. The speed of management decisions and response to environmental factors during
laboratory tests is a critical parameter. In this case, the use of technologies based solely on detecting
interference in the system is impractical. It is important to use active protection measures that do not
reduce the speed of operations performed by the processor embedded in the laboratory equipment.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], a number of active protection approaches are proposed, among which two are worth
considering in the context of information leakage through thermal channels. The approaches of interest
are known as shielding and jamming. The advantages of these approaches make it possible to develop
an active protection system. Such an active protection system must function on an appropriate basis,
which is an intelligent system for detecting incidents and managing active protection processes.
Modern developments in active protection systems do not take into account the need for adaptability.
Thus, in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], one of these approaches, jamming, is used. An important drawback of the authors'
proposed development when applied to the task of laboratory testing with an IoT-oriented sensor
network is reliability. The paper also notes that the bandwidth of thermal data transmission channels
can reach more than 45 bits/s. The iterative nature of the described approach, which consists of initial
analysis and subsequent channel jamming, allows a significant amount of information to be
transmitted. The lack of noise adaptability and the ability to control it opens up vulnerabilities in the
selection and overcoming of thermal noise frequency. Such characteristics of the system require its
significant improvement in the direction of intelligent control and increased adaptability to input
parameters, which will increase its reliability. There is a need for self-diagnosis of the system with the
possibility of further intelligent control of protection processes, which necessitates both the detection of
incidents and the execution of actions with the data transmission channel. In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], machine learning
approaches are used for adaptive protection control, but its focus is on energy efficiency rather than
equipment reliability. Work [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], like [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], is based on the jamming approach, but has the same
shortcomings for solving the task at hand, where it is important for the autonomous adaptive
protection control system to make management decisions.
      </p>
      <p>
        A significant number of works are devoted to incident detection procedures. Work [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] is devoted to
risk assessment in IoT-oriented systems, taking into account various types of threats, including physical
and remote access threats. The assessment approach proposed in the work is based on modelling
behavior and determining the possibility of threats being realized, which is similar in principle to the
modelling of a digital twin in work [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Promising areas for threat detection in IoT-oriented systems in
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] include automated incident detection and the use of machine learning algorithms. Work [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
evaluates the characteristics of modelling so-called honeypots, which can be used in the process of
forming the analytical apparatus of a neural network when assessing risks to the system by evaluating
influencing factors.
      </p>
      <p>
        Work [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] is devoted to improving the efficiency of continuous transmission of multidimensional
signals. Taking into account the thermal signal and its possible improved transmission is important for
increasing the reliability of active protection and improving operating conditions [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>A study of current sources revealed a lack of works dedicated to protecting information from
leakage through thermal channels in IoT-oriented systems with built-in information processing
capabilities. An insufficiently studied issue of intelligent response to detected incidents through the use
of an active adaptive protection system in laboratory testing tasks using an IoT-oriented sensor
network and embedded information processing systems has been identified.</p>
      <p>The contradiction that needs to be resolved lies in the need to ensure maximum reliability of
protection while maintaining the safety of equipment operation.</p>
      <p>The aim of the work is to increase the reliability of information protection during laboratory tests
against leakage through thermal channels by means of intelligent control of active protection processes.
To achieve this goal, the following scientific tasks were formulated:



</p>
      <p>To develop a parametric model for controlling the physical component of an IoT-oriented
device’s active protection system with built-in information processing capabilities.
To develop a model for intelligent measurement of input physical parameters.</p>
      <p>To describe the procedure for making management decisions.</p>
      <p>To propose a forecasting model for the application of active protection.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Formation of an intelligent protection model</title>
      <p>The protection system for the thermal data transmission channel in IoT-oriented sensor systems is
characterized by three components: an active physical countermeasure system, an intelligent
countermeasure process management system, and an intelligent analytics system. The
management system controls the physical protection elements in real time.</p>
      <p>Protection can be applied to IoT-oriented equipment with built-in information processing
capabilities – a built-in specialized microprocessor (system in package or SiP). Such a processor
heats the cover panel of IoT-oriented equipment. The transmission of information bits occurs due
to the fact of heating or cooling of the panel (0 or 1), as well as due to the speed of heating and
cooling.</p>
      <p>Intelligent protection involves responding to external factors and adjusting the system
accordingly by analyzing data using neural network technologies. The fundamental difference of
the proposed development lies in the ability to automatically adapt the physical protection of the
thermal data transmission channel from embedded computing systems in real time. The general
model of intelligent protection is modular and is represented by the formula:</p>
      <p>D=f ( F , K , P ) , (1)
where F is the analytics model for threat detection, K is a model for intelligent management
decision-making regarding system protection, P is a model for predicting the behavior of an
IoToriented sensor network, f is the integration function based on a parametric control model that
takes physical parameters into account.</p>
      <p>Since the sensor network is a cyber-physical system, data leakage can occur through neighboring
devices equipped with thermal sensors or through surveillance devices, including thermal imaging
equipment. To prevent this, it is necessary to consider the physical component of protection (Fig.
1), which is controlled by the intelligent component.</p>
      <p>The intelligent system requires physical management and analytical components. The physical
component is responsible for preventing information leakage at the physical level, the management
component analyses the input parameters and makes the appropriate decision, and the analytical
component conducts research on the bit stream. The general diagram of the proposed intelligent
protection of the thermal information transmission channel is shown in Figure 2.</p>
      <p>The protection system must be autonomous and not connected to an IoT-oriented sensor system
in order to prevent its compromise. Such requirements necessitate the intellectualization of the
protection system.</p>
      <p>An important aspect is adaptation to the type of processor, channel bandwidth, and data
transmission method through the analysis of input parameters, which are then converted into
physical variable parameters of the adaptive physical countermeasure system.</p>
      <sec id="sec-3-1">
        <title>3.1. Parametric model for controlling the physical component</title>
        <p>
          The protection system is activated after an event occurs in which the temperature of the case panel
may differ from the temperature of the built-in information processing device. Such an event is one
of the input parameters of the parametric model. When the panel's minimum heating temperature
is exceeded, the analytical system is activated. The time required to perform analytical actions can
reach 5 hours, since, according to [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], the information transfer threshold can be 20 bits/hour. The
analytical system requires at least 100 bits of information to form conclusions. During this time,
certain information can be transmitted, so the protection system must be enabled. A permanently
enabled system can damage the components of the test laboratory equipment and therefore must
respond adaptively to changes in input parameters.
        </p>
        <p>The moment of activation of the protection system is determined using a numerical temperature
model that describes the thermal regime of the surface of the laboratory equipment housing panel,
the temperature of which rises under the influence of temperature fluctuations caused by the
heating of the processor (built-in information processing system).</p>
        <p>The heat flow of the case panel under the action of an internal heat source is calculated using
the differential equation of unsteady heat conduction for a flat plate:
∂ T =α ∂2 T , (2)
∂ τ ∂ x2
where T is the temperature, τ is time, x is the thickness of the case panel, α is the thermal
conductivity coefficient.</p>
        <p>Equation (2) is solved using the numerical method of finite differences with an implicit
calculation scheme using a non-uniform grid. The result of the solution is the dynamics of the
temperature change of the case panel surface under the action of the built-in information
processing device over time (Fig. 2). This determines the minimum heating temperature of the case
panel for the protection system to start.</p>
        <p>The increase in temperature on the surface of the case panel is recorded by temperature sensors,
and when it reaches a certain value (Target Temperature) at a certain point in time (Time to
Target), active protection is activated.</p>
        <p>The intelligent control approach requires consideration of the correlations between the input
physical parameters and the resulting adaptive changes in the protection system. For automated
control, it is necessary to form a set of parameters that affect the resulting states of the system.
Input parameters are divided into three classes: physical parameters, analytical parameters, and
predictive parameters (Table 1).</p>
        <p>A graphical representation of the relationship between the elements of the intelligent protection
model, taking into account the input and output parameters, is shown in Figure 4.
∂ T =α ∂2 T + f 2 ,
∂ τ ∂ x2 pc
(3)
where p is the density of the material, c is the heat capacity, f 2 is the heating intensity of the
panel.</p>
        <p>If the system investigates thermal equilibrium at a point on the shielding/jamming layer, air
density is used.</p>
        <p>In addition to panel heating, the influence of additional heat sources from the active protection
system must be taken into account. The influence of additional heat sources is modelled using the
following formula:</p>
        <p>N
Q ( x , t )=∑ l2i (t ) ∙ δ ( x− xi) , (4)</p>
        <p>i=1
where xi is the coordinate point of the additional source, δ ( x− xi ) is function that models the
additional source, l2 is the power of additional heat sources.</p>
        <p>Additional heat sources are integrated into the heat conduction equation as follows:
∂ T =α ∂2 T + 1 (f 2 (t )+ ∑N l2i (t ) ∙ δ ( x− xi)). (5)
∂ τ ∂ x2 pc i=1</p>
        <p>The boundary conditions for equations (2-5) are conditions of the III kind: on the inner surface
(x=0) – convective heat exchange with embedded information processing device; on the outer
surface (x=L) – convective heat exchange with the ambient air.</p>
        <p>The general form of the parametric model is presented as follows:</p>
        <p>T ( x , t )=f ( x , t ; F , L) , (6)
where F – input physical parameters of the system, L – output physical parameters of the system.</p>
        <p>Both classes of parameters are described in detail in Table 1.</p>
        <p>The detailed view of the parametric model for controlling the physical component of the active
protection system is presented as follows:</p>
        <p>T ( x , t )=f ( x , t ; f 1 , f 2 , f 3 , f 4 , l1 , l2 , l3 , l4 , l5 , l6) .
(7)</p>
        <p>The presented parametric model describes the dependencies of physical input and physical
output parameters.</p>
        <p>As shown in Figure 4, physical input parameters affect input analytical and input predictive
parameters. All three categories of parameters are involved in the system's management
decisionmaking process. When making a management decision, physical input parameters are taken into
account and, in addition to positioning the active protection elements in space, the duration and
frequency of switching on additional heat sources are determined. The physical output parameters
affected by intelligent protection, which is a physical interpretation of active protection, are shown
in Figure 5.</p>
        <p>An essential component of the system is the analytical component, which includes both incident
detection and the automatic decision-making procedure.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Model of intelligent measurement of input physical parameters</title>
        <p>The analytical component accepts two streams of input parameters: initial and post-processing
parameters. Initial parameters include input physical parameters, the intelligent measurement of
which affects the duration and frequency of the protection system activation. At the same time, the
thermal channel is analyzed for the presence of information transfer. The results of this analysis
can be considered post-processing parameters.</p>
        <p>
          Intelligent measurement involves interpreting the results of measuring input physical
parameters. The process of intelligent measurement is based on a procedure for determining the
weighting coefficients of the influence of input physical parameters on the output physical
parameters of the protection system. In accordance with the provisions set forth in [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], the
determination of the influence of indicators on output parameters is carried out using multivariate
regression. In this case, it is necessary to calculate the weight coefficients of the input parameters
for each output parameter using a multiplicative model:
        </p>
        <p>Eli=B0 f 1b1 ∙ f 2b2 ∙ f 3b3 ∙ l4b4 ,
where B0 is the constant coefficient of the regression equation, b1 is weight coefficient.</p>
        <p>Logarithmic transformation is used to convert the multiplicative model into a linear model. The
formula for the linear model takes the form:</p>
        <p>n
уl j=ω +∑ ωi f il j+ ε j ,
0</p>
        <p>i=1
ω=( FT F )−1 FT y .
where ωi is weight coefficient.</p>
        <p>The least squares method is used to determine the coefficients. The formula for determining the
coefficients takes the form:</p>
        <p>In intelligent measurement tasks, the dependence formed by regression analysis is converted
into a neuron, which is described by the formula:</p>
        <p>k
A =σ ( ∑ ωk f k + ε ). (11)</p>
        <p>k=1</p>
        <p>
          It is also important to take into account the results of post-processing. One of the NIST tests is
used to analyze bits. The system selects the necessary test based on the frequency of bit
transmission through the thermal channel. Statistical properties are studied based on one of the
approaches described in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. Entropy analysis is performed, statistical dependencies and bit pair
correlations are studied. When the statistical coefficient is denoted as S, then the formula
describing the analytical neuron takes the form:
        </p>
        <p>k
^A =σ ( ∑ ω f + ωk+1 f 'k+1+ ε ) ,</p>
        <p>k k
k=1</p>
        <p>R=⟨ F , L , A , ^A ⟩ .</p>
        <p>where f 'k+1 is an additional input parameter obtained as a result of post-processing, ωk+1 is the
weight coefficient of the additional input parameter.</p>
        <p>
          Work [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] describes a model that takes into account sets of initial processes with sets of goal
scenarios in the process of managing complex organizational and technological objects in the
context of cyber threats. This model can be adapted for the current task of managing an adaptive
active protection system, taking into account the intelligent measurement of input physical
parameters. The model of intelligent measurement of input physical parameters is described as
follows:
        </p>
        <p>This model allows to describe the analytical component of the protection system. In order to
describe the process of management decision-making, it is necessary to take into account input
(8)
(9)
(10)
(12)
(13)
physical as well as input analytical and prognostic parameters. As can be seen from Figure 3, the
input analytical and prognostic parameters are indirectly influenced by the input physical
parameters. This situation requires the formation of a formalized procedure for management
decision-making.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Management decision-making procedure</title>
        <p>A management decision is made on the basis of intellectual processing of physical prognostic and
analytical input parameters, taking into account the hierarchical influence of physical parameters
on analytical and prognostic ones. The hierarchical structure is represented as follows:
,
(14)
where α ci, βmi are the coefficients of influence of physical parameters on analytical and prognostic
parameters, respectively, γ 0 is the coefficient of direct influence of physical inputs on physical
output parameters, ϑ m, θc are the coefficients of indirect influence of input analytical and
prognostic parameters on physical output parameters.</p>
        <p>Taking into account the indirect influence, the equation for the linear model y takes the form:
i j i l i
y =γ 0+∑ γi f i+∑ Θc (∑ α ci f i+ω(c+1) f ('c+1)+ ε(ck))+ ∑ ϑ m ∑ βmi f i+ ε(mp)+ ε . (15)
n=1 c=1 n=1 m=1 n=1</p>
        <p>This takes into account both the direct influence on output parameters as well as indirect
influence of physical input parameters on analytical and predictive inputs, which ultimately causes
a change in physical output parameters.</p>
        <p>
          Management decisions are based on the approach described in [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. Management decision
situations take into account the level of influence q of the input parameter on the output physical
parameter. The set of influence parameters is divided into three categories: the influence of
physical parameters on analytical and prognostic input parameters; the direct influence of physical
inputs on physical output parameters; the indirect influence of input analytical and prognostic
parameters on physical output parameters. The following formula is used to make a management
decision and reflect situation S:
        </p>
        <p>S= Ur=c 1 Sqα∪ Ul=m1 Sqβ∪ Uz=i1 Sqγ∪ Uν=c1 Sθq∪Ub=m1 Sϑq . (16)</p>
        <p>The formed analytical component is related to the predictive component of the protection
model. The task is to form a predictive model.</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Forecasting model in the application of active protection</title>
        <p>
          According to [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], it is proposed to use the ARIMAX model to form a forecast, taking into account
the regression analysis and lags of the predicted parameters. This model, unlike other forecasting
models, allows considering external (exogenous) variables, that is important for taking into account
the influence of additional factors, while maintaining acceptable computational requirements. For
each predicted variant, the following formula is used:
        </p>
        <p>p Q i
yt=c +∑ ϕk yt−k +∑ θq εt−q+∑ βn f n ,t + εt ,
k=1 q=1 n=1
(17)
where yt is the predicted indicator at time t, c is a constant, εt is a random error, ϕk is the
autoregression coefficient, yt−k – previous values of the forecast series, θq are moving average
coefficients, εt−q – previous forecast residuals, βn is an impact coefficient, f n ,t is a value of the
exogenous factor at time t.</p>
        <p>This formula describes the forecasting model.</p>
      </sec>
      <sec id="sec-3-5">
        <title>3.5. The results’ evaluation and discussion</title>
        <p>To evaluate the effectiveness of the intelligent protection proposed in this work, a software tool
was developed for modelling and analyzing the temperature dynamics of the thermal data
transmission channel. Using the model, the influence of changes in the initial parameters of the
adaptive active protection system on the possibility of data transmission through the thermal
channel was investigated. The simulation results are shown in Figure 6.</p>
        <p>Figure 6:
Temperature change dynamics during the operation of the active protection system.</p>
        <p>The following conditions were specified for the simulation: CPU temperature – 100 degrees
Celsius after 60 seconds of its usage, case temperature from 25 to 47 over a period of 600 seconds.
When the minimum panel heating temperature of 30 degrees was reached, the protection system
was activated at time intervals determined by the control system based on the input data. The
simulation considered the use of an embedded information processing device Siemens SIMATIC
S7-1200 and an aluminum case panel with thickness of 2 mm. The selection of hardware and
materials is not limited to those presented but is intended to demonstrate the behavioral patterns of
the system.</p>
        <p>
          To evaluate the effectiveness, metrics similar to those defined in a similar work [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] were used,
namely bit error rate (BER) and energy efficiency. Characteristics typical of the proposed
development were added, which qualitatively distinguish it from analogues – equipment safety and
protection adaptability.
        </p>
        <p>
          As a result of modelling, it was established that BER is 97%, which is 3% higher than the
analogue, and energy efficiency is 23.47 W, which is lower than the analogue. For an objective and
comprehensive assessment of efficiency, the method described in [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] was used. Four criteria were
used: BER (Br), energy efficiency (Ef ), equipment safety (Es), and adaptability ( Ad). Integral
efficiency is determined by the formula:
        </p>
        <p>E= Br + Ef + Es + Ad . .</p>
        <p>4
The summary linguistic assessment is presented in Table 2.
(18)</p>
        <p>The efficiency of the development was denoted as E r, and the efficiency of the analogue as E a.
According to the calculations of integral efficiency, E r = 0,75, and E a = 0,625. The analysis proved
an increase in efficiency by 0,125, or 20%.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions</title>
      <p>The paper developed a hierarchical modular model of intelligent protection for temperature-based
transmitting channels in laboratory sensor networks with embedded information processing based
on intelligent management decision-making by a cyber-physical protection system through
parametric linking of input data and physical changes in active protection, which made it possible
to ensure the reliability of protection while maintaining the safety of equipment operation thanks
to the formed adaptive active protection system. Software was developed that allowed the
presented models to be verified. The effectiveness of the protection system has been increased by
20% compared to the existing similar approach. The following scientific results were obtained in
the work:</p>
      <p>A parametric model for controlling the physical component of the active protection system
of IoT-oriented laboratory equipment, combined into a sensor network, was developed
based on the determination of non-stationary thermal conductivity by studying the thermal
equilibrium at the point on the shielding/jamming layer, which made it possible to form the
dependence of the input and output physical parameters.</p>
      <p>A model for the intelligent measurement of input physical parameters was developed based
on regression analysis by determining weight coefficients using the least squares method,
which made it possible to describe the analytical component of the protection model, taking
into account the statistical analysis of bits passing through the thermal communication
channel.</p>
      <p>A procedure for making management decisions based on situational management was
developed by intelligently processing physical prognostic and analytical input parameters,
taking into account the hierarchical influence of physical parameters on analytical and
prognostic ones, which made it possible for the active protection system to respond
adaptively to changes in physical input parameters.</p>
      <p>A forecasting model for the application of active protection based on the ARIMAX model
has been developed by taking into account the regression analysis performed, which made
it possible to form probable event scenarios based on the input physical parameters and
previous results.</p>
      <p>The practical significance lies in the possibility of implementing intelligent active protection for
IoT-oriented equipment in research laboratories, combined into a sensor network and equipped
with built-in information processing capabilities during laboratory testing.</p>
      <p>The prospect for further research is to expand the protected channels of information leakage and
to search for optimal ways to integrate the protection of thermal channels of information leakage
into a multi-channel intelligent protection system.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Nam</surname>
          </string-name>
          , H.-D. Park,
          <article-title>Revolutionizing laboratory practices: pioneering trends in total laboratory automation</article-title>
          ,
          <source>Annals of Laboratory Medicine</source>
          (
          <year>2025</year>
          ). https://doi.org/10.3343/alm.
          <year>2024</year>
          .0581
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>I.</given-names>
            <surname>Miketic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Dhananjay</surname>
          </string-name>
          , E. Salman,
          <article-title>Covert channel communication as an emerging security threat in 2.5D/3D integrated systems</article-title>
          ,
          <source>Sensors</source>
          <volume>23</volume>
          (
          <year>2023</year>
          )
          <year>2081</year>
          . https://doi.org/10.3390/s23042081
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. Z.</given-names>
            <surname>Benelhaouare</surname>
          </string-name>
          , I. Mellal,
          <string-name>
            <given-names>M.</given-names>
            <surname>Oumlaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Lakhssassi</surname>
          </string-name>
          ,
          <article-title>Mitigating thermal side-channel vulnerabilities in FPGA-based SiP systems using thermal digital twin technology</article-title>
          ,
          <source>Electronics</source>
          <volume>13</volume>
          (
          <year>2024</year>
          )
          <article-title>4176</article-title>
          . https://doi.org/10.3390/electronics13214176
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P.</given-names>
            <surname>Rahimi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Selective noise-based countermeasure against thermal covert channel attacks in multi-core systems</article-title>
          ,
          <source>Journal of Low Power Electronics and Applications</source>
          <volume>12</volume>
          (
          <year>2022</year>
          )
          <article-title>25</article-title>
          . https://doi.org/10.3390/jlpea12020025
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gonzalez-Gomez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. B.</given-names>
            <surname>Sikal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Khdr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Bauer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Henkel</surname>
          </string-name>
          ,
          <article-title>Balancing security and efficiency: mitigation of power-based covert channels</article-title>
          ,
          <source>IEEE Trans. CAD Integrated Circuits Syst</source>
          .
          <volume>43</volume>
          (
          <year>2024</year>
          )
          <fpage>3395</fpage>
          -
          <lpage>3406</lpage>
          . https://doi.org/10.1109/tcad.
          <year>2024</year>
          .3438999
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <article-title>Mitigation of enhanced thermal covert channel in many-core systems</article-title>
          ,
          <source>IEEE Trans. CAD Integrated Circuits Syst</source>
          .
          <volume>39</volume>
          (
          <year>2020</year>
          )
          <fpage>3276</fpage>
          -
          <lpage>3287</lpage>
          . https://doi.org/10.1109/tcad.
          <year>2020</year>
          .3012642
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>I.</given-names>
            <surname>Rozlomii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yarmilko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Naumenko</surname>
          </string-name>
          ,
          <article-title>Vulnerability modeling in cybersecurity of intelligent infrastructure networks</article-title>
          ,
          <source>in: Lecture Notes in Networks and Systems</source>
          , Springer,
          <year>2025</year>
          ,
          <fpage>234</fpage>
          -
          <lpage>348</lpage>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -90735-7_
          <fpage>19</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K. T.</given-names>
            <surname>Chui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. B.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Arya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Nedjah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Almomani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Chaurasia</surname>
          </string-name>
          ,
          <article-title>Survey of IoT and cyber-physical systems: standards, security</article-title>
          , challenges,
          <source>Information</source>
          <volume>14</volume>
          (
          <year>2023</year>
          )
          <article-title>388</article-title>
          . https://doi.org/10.3390/info14070388
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Korchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Breslavskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yevseiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zhumangalieva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zvarych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kazmirchuk</surname>
          </string-name>
          ,
          <article-title>Linguistic standards construction for honeypot efficiency assessment</article-title>
          ,
          <source>Eastern-European Journal of Enterprise Technologies</source>
          <volume>1</volume>
          (
          <year>2021</year>
          )
          <fpage>14</fpage>
          -
          <lpage>23</lpage>
          . DOI:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2021</year>
          .225346
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>L.</given-names>
            <surname>Berkman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Turovsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kyrpach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Varfolomeeva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Dmytrenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Pokotylo</surname>
          </string-name>
          ,
          <article-title>Code structure analysis for multidimensional signal transmission channels</article-title>
          ,
          <source>Eastern-European Journal of Enterprise Technologies</source>
          <volume>5</volume>
          (
          <year>2021</year>
          )
          <fpage>70</fpage>
          -
          <lpage>81</lpage>
          . DOI:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2021</year>
          .242357
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>T.</given-names>
            <surname>Prokopenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lanskykh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Prokopenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Pidkuiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tarasenko</surname>
          </string-name>
          ,
          <article-title>Ontological SCRUMbased project situation management under risk</article-title>
          ,
          <source>Eastern-European Journal of Enterprise Technologies</source>
          <volume>6</volume>
          (
          <year>2023</year>
          )
          <fpage>47</fpage>
          -
          <lpage>54</lpage>
          . https://doi.org/10.15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2023</year>
          .292526
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>C.</given-names>
            <surname>Foreman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Yeung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. J.</given-names>
            <surname>Curchod</surname>
          </string-name>
          ,
          <article-title>Statistical testing and randomness extraction for RNG improvement</article-title>
          ,
          <source>Entropy</source>
          <volume>26</volume>
          (
          <year>2024</year>
          )
          <article-title>1053</article-title>
          . https://doi.org/10.3390/e26121053
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>T.</given-names>
            <surname>Prokopenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tarasenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Lavdanska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rudnytskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Rudnytska</surname>
          </string-name>
          ,
          <article-title>Technology for alternative management of organizational objects under cyber threats</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>3187</volume>
          (
          <year>2021</year>
          )
          <fpage>170</fpage>
          -
          <lpage>181</lpage>
          . https://doi.org/10.5281/zenodo.11119888
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Selmy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. K.</given-names>
            <surname>Mohamed</surname>
          </string-name>
          , W. Medhat,
          <article-title>Predictive analytics framework for sensor data with deep learning</article-title>
          ,
          <source>Neural Computing and Applications</source>
          (
          <year>2024</year>
          ).
          <source>DOI: 10.1007/s00521-023-09398-9</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>