<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>V. Dudykevych);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Universal security platform for intelligent cyber-physical technology of regional carbon dioxide monitoring⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Valerii Dudykevych</string-name>
          <email>valerii.b.dudykevych@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Halyna Mykytyn</string-name>
          <email>halyna.v.mykytyn@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sviatoslav Borduliak</string-name>
          <email>sviatoslav.borduliak.mkbst.2024@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yaroslav Fur</string-name>
          <email>yaroslav.fur.mkbas.2023@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Stepana Bandery str., 79000 Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>The concept of Industry 4.0 and Ukraine's Cybersecurity Strategy, in their respective vectors, foresee the development of methodological approaches for the application of secure intelligent technologies, particularly for the functional support of the emergency monitoring segment, including greenhouse gas emissions into the regional ecosystems of Ukraine. This study explores the aspects of developing an intelligent cyber-physical technology (ICPT) for monitoring carbon dioxide parameters in the air ecosystem based on a universal platform: “ICPT architecture-integrated security model-comprehensive security systems.” A multi-level ICPT architecture is proposed, enabling the selection of carbon dioxide concentration under the influence of both anthropogenic and natural factors on the regional air ecosystem within the framework of “control-processing-management.” This architecture serves as the foundation for creating an integrated multi-level security model for ICPT. The functional architecture of the multi-level ICPT is deployed at the technology levels: physical space (PS), communication environment (CE), and cybernetic space (CS). Based on the integrated security model and the “objectthreat-protection” concept, comprehensive security systems (CSS) have been developed for the ICPT levels-PS, CE, and CS-under the impact of both targeted and random threats. A software implementation of cryptographic protection for the ICPT cybernetic space database has been developed using the symmetric block encryption algorithm “Kalyna” in a programming language.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;intelligence</kwd>
        <kwd>emergencies</kwd>
        <kwd>monitoring</kwd>
        <kwd>carbon dioxide</kwd>
        <kwd>regional ecosystem</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>intelligent cyber-physical technology</kwd>
        <kwd>integrated model</kwd>
        <kwd>comprehensive security system</kwd>
        <kwd>database encryption</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Today, approaches to solving the problem of secure intelligence integration of Ukraine’s
infrastructure objects, particularly critical ones under global challenges, are actively developing.
The relevance of the cybersecurity vector is highlighted in the Industry 4.0 Concept, the COP 29
of advanced science
technologies based on systemic and synergistic principles. An effective tool for addressing the
problem of secure intelligence integration of societal infrastructure objects within the framework
(ICPTs) and their comprehensive security systems (CSSs) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Cyber-physical technologies, as one of the main tools for monitoring carbon dioxide within
emergency environments in a region, are developing along the vectors of architecture and
cybersecurity. Let us consider some trends in Ukraine and internationally. The application of
intelligent cyber-physical technologies within the Industry 4.0 Concept is an emerging field,
particularly involving artificial intelligence elements in industrial ICPTs for decision-making in
domain-specific societal areas [
        <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5">2–5</xref>
        ]. The study [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] explores models and methods for information
security based on a multi-loop approach to the secure functioning of information resources in
ICPTs. To ensure confidentiality and data integrity protection in ICPTs, the author [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] outlines
requirements for the use of cryptographic tools. The study [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] presents the direction of
development of cryptographic tools to ensure data security at the level of one of the segments—a
pseudorandom bit sequence generator with increased cryptographic security, which provides
effective counteraction to cybercrime in the subject areas of society’s infrastructure [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Today, the processes of interconnecting the architecture and security of cyber-physical
technologies are unfolding, particularly at the conceptual level in accordance with the paradigm
“multi-level ICPT—multi-level security” [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ], as well as models, methodology and an integrated
information technology security system [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ], which is being implemented in the field of safe
operation of cyber-physical power systems [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ]. Further advancements are being made in ICPT
architecture at the level of integrating computation, networking, and physical processes, as well as
their effective interdisciplinary application [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ]. The monograph [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] considers the application
of situational management methods to ensure the safe functioning of socio-cyber-physical systems,
logical and transformational rules that are the basis for building a situational cybersecurity
management system. In the area of information systems infrastructure security, a methodology for
detecting cybercrime using decoys based on blockchain technology is proposed in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. In line with
the vectors of Industry 4.0 tasks, the authors of [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] present a universal platform for the secure
intellectualisation of society’s infrastructure based on the concept of cyber-physical systems
security and the system security model of the three-tiered architecture of the Internet of Things.
      </p>
      <p>The objective of this study is to develop a security methodology for intelligent cyber-physical
technology (ICPT) for monitoring carbon dioxide levels in the air ecosystem of a region under the
influence of technogenic and natural factors. This methodology follows the structure: “ICPT
architecture—multi-level security model—comprehensive security systems (CSSs)”, implementing a
constructive algorithm for secure functioning based on the “object—threat—protection” concept.
2. Architecture of the Multi-Level ICPT for Monitoring Carbon</p>
      <p>
        Dioxide in the Regional Ecosystem
In the context of the Emergency Monitoring Regulation [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], which addresses emergencies arising
from negative technogenic factors (such as greenhouse gas emissions, including carbon dioxide;
hazardous substances, including radioactive materials; accidents in power systems; emergency
situations in the oil and gas industry, etc.) and natural factors (such as geophysical, meteorological,
and medical-biological events), the application of effective intelligent technologies in the “control—
processing—management” domain is highly relevant. Among these technologies, multi-level
cyberphysical technologies (CPTs) play a key role. Figure 1 presents the functional structure of a
threelevel ICPT for air environment monitoring, focusing on carbon dioxide content at the following
levels: Physical Space (PS)—Sensors for collecting information on the state of the regional air
ecosystem.
Communication Environment (CE)—Wireless data exchange networks (Wi-Fi, GPS, LTE).
Cybernetic Space (CS)—A Geoinformation System (GIS) integrated with web applications and an
analytical center.
3.
      </p>
      <p>Multi-Level Security of the Intelligent Cyber-Physical Technology for Carbon
Dioxide Monitoring
In order to ensure the integrity of the security of the three-level ICPT for monitoring carbon
dioxide in the region’s ecosystem, the following are proposed: an integrated model of multi-level
security of the intelligent cyber-physical technology for monitoring carbon dioxide in the region’s
air ecosystem; integrated security systems for the physical space, communication environment, and
cyberspace of the ICPT, which provide methods and means of protection in the event of a complex
of random and targeted threats.
3.1. Integral Model of the Intelligent Cyber-Physical Technology for Carbon</p>
      <p>Dioxide Monitoring
The ICPT for CO₂ monitoring adopts a mandatory (multi-level) security policy, which offers a
higher level of protection compared to discretionary and role-based security policies. Key Features
of the Mandatory Security Policy for ICPT in Emergency Situations: (1) Definiteness of the
confidentiality lattice of information; assigning each system object the corresponding level of
confidentiality based on the value of information in relation to the object; (2) Satisfaction of
identification requirements for all subjects and objects of the system; (3) Implementation of an
algorithm to prevent information leakage between objects with different access levels.</p>
      <p>
        Mandatory access control ensures adherence to a set of security rules regulating user/system
access to specific resources. The mandatory security policy of the ICP technology enables:
assessment of threats and risks at the vulnerability identification level; implementation of access
and authentication policies at the level of establishing defined rules, as well as user authentication
mechanisms; data protection at the level of developing security strategies for confidential
information using encryption tools; staff training at the level of conducting relevant training
sessions; monitoring and responding to incidents at the level of implementing event tracking
systems in the system [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. The multi-level security model of the ICPT is illustrated in Figure 3.
3.2. Integrated Security System for the Physical Space of ICP Technology: Data
      </p>
      <p>Collection Sensors—Threats—Protection Technologies
Concentration Monitoring Sensors are installed at locations for monitoring greenhouse gas
emissions and are equipped with micro controllers for data processing, batteries, GPS modules, and
LTE system antennas for data transmission. The functional process of data collection, processing,
and transmission of carbon dioxide monitoring in the air ecosystem is depicted in Figure 2.</p>
      <p>
        In practice, the following models of Infrared (NDIR) analyzers for monitoring carbon dioxide
concentration in the region’s ecosystem are effectively used: RK300-03A (Figure 3a) and RK300-03B
(Figure 3b) CO2 Concentration Sensor [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]; CM1106SL-NS Super Low Power CO2 Sensor Module
(Figure 3c) [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
The RK300-03 model has two versions: for indoor installation—RK300-03A; for outdoor installation
—RK300-03B. The CM1106SL-NS model is a separate small electronic module for measuring carbon
dioxide concentration, installed in a protective housing, and allows continuous monitoring at
remote locations in real-time mode. The main characteristics of the carbon dioxide analyzers are
provided in Table 1. The STM32L072RBT6 micro controller performs: signal analysis from the
sensor, data storage, and in real-time mode, uses the LTE module with an antenna to transmit the
accumulated data to the cyber space of the ICP technology.
      </p>
      <p>Let’s consider the integrated security system of the intellectual cyber-physical technology at the
physical space level, the components of which are sensors (Table 2).</p>
      <sec id="sec-1-1">
        <title>Security Technologies – Security</title>
      </sec>
      <sec id="sec-1-2">
        <title>Profiles (confidentiality, integrity, availability)</title>
      </sec>
      <sec id="sec-1-3">
        <title>Methods of</title>
      </sec>
      <sec id="sec-1-4">
        <title>Protection Protection Tools</title>
        <p>3.3. Integrated Security System of the Communication Environment of ICTF:</p>
        <p>Wireless Communication Technologies—Threats—Protection Technologies
In the ICTF monitoring system of carbon dioxide in the region’s ecosystem, several wireless
communication technologies are used for data transmission: LTE technology for transmitting
monitoring data from sensors to the cybernetic space of ICTF; GPS technology for precise location
determination of each sensor; Wi-Fi technology for wireless data transmission within the analytical
center, as well as a possible replacement for LTE technology in certain cases.</p>
        <p>The advantages of LTE technology include availability, reliability, and the ability to function
over long distances. This technology is characterized by high bandwidth and low latency, which is
essential for real-time monitoring, such as tracking spikes in carbon dioxide concentration in city
ecosystems during peak hours.</p>
        <p>GPS is a satellite navigation system that provides information about the location of the carbon
dioxide monitoring sensor in the air ecosystem and the time, under any weather conditions,
anywhere on Earth where there is an unobstructed line of sight to four or more GPS satellites (the
full constellation consists of 24 satellites). GPS system modules are used in carbon dioxide
measurement sensors. Recording the exact location of each sensor along with its monitoring data
provides a GIS that can automatically generate a 3D map of carbon dioxide concentration in the
region’s ecosystem.</p>
        <p>Wi-Fi is a standard for wireless local area network (LAN) connections that enables
communication between various devices over short distances (up to several dozen meters) based on
the IEEE 802.11 standard. Among the main advantages of Wi-Fi technology are mobility,
convenience, transmission speed, and energy efficiency. Wi-Fi technology allows network
deployment without the need for wiring, simplifying and speeding up the installation and
modification process. It also provides Internet access anywhere with coverage, which is especially
convenient for mobile devices, and is effectively used to support the operation of Internet of Things
devices.</p>
        <p>Let’s consider the integrated security system of wireless technologies at the communication
environment level of ICTF (Table 3).</p>
      </sec>
      <sec id="sec-1-5">
        <title>Security Technologies – Security</title>
      </sec>
      <sec id="sec-1-6">
        <title>Profiles (confidentiality, integrity, availability)</title>
      </sec>
      <sec id="sec-1-7">
        <title>Methods of</title>
      </sec>
      <sec id="sec-1-8">
        <title>Protection</title>
        <sec id="sec-1-8-1">
          <title>Partitioning</title>
          <p>available resources
into time intervals</p>
          <p>Increasing
network
bandwidth</p>
          <p>Conducting
periodic checks on
operational modes
and network
configuration
Logging failures,
malfunctions,
system crashes</p>
          <p>Functional
control of
hardware and
software in IM (K)</p>
        </sec>
        <sec id="sec-1-8-2">
          <title>Avoid transmitting</title>
          <p>confidential
information over
unsecured
communication
channels
Modulation, signal
manipulation
Conduct periodic
checks on
operational modes,
3.4. Integrated Security System of the Cybernetic Space of ICTF: Geoinformation</p>
          <p>System—Threats—Protection Technologies
The Geoinformation System for Monitoring Carbon Dioxide in the Air Ecosystem of the Region is
the core of the ICTF. It is a complex decision-support system that: consolidates the functions of
organizing, storing, analyzing, and visualizing regional geographic data; integrates hardware and
software, data, and functions. It physically consists of databases, data storage, and workstations for
analysts with specialized software (SW), all connected in a local network. The GIS is built on the
basis of professional software packages, such as ArcGIS, and the complete life cycle of processing
monitoring data covers the following stages:</p>
          <p>
            The Geoinformation System for Monitoring Carbon Dioxide in the Air Ecosystem of the Region
in the cybernetic space of ICTF operates as follows [
            <xref ref-type="bibr" rid="ref25">25</xref>
            ]:
1. Data Collection/Selection: The functioning of GIS in the cybernetic space of ICTF focuses
on: gathering spatial and attribute data from existing sources (datasets, satellite imagery,
etc.); selecting data from the physical space (sensors of ICTF).
2. Data Storage: The GIS of ICTF uses databases and data storage systems to store and manage
the collected data. These systems organize data for efficient search, updates, and sharing.
Relational or spatial databases, such as PostgreSQL/PostGIS or Esri’s File Geodatabase, are
used. File formats include Shapefiles, GeoTIFF, KML, GeoJSON, etc.
3. Data Processing and Management: Raw data often requires pre-processing before use, such
as cleaning (removing errors or inconsistencies), projection and transformation (bringing
data into a unified coordinate system), and integration (combining multiple datasets and
creating a unified representation). Computer programs like ArcGIS are used for this and
subsequent stages.
4. Spatial Data Analysis: GIS of ICTF allows spatial analysis of prepared data using algorithms
and tools: layer overlay (combining layers to identify relationships and correlations),
proximity analysis (finding the nearest objects, e.g., locating the nearest CO2 sensor to a
specific facility), and terrain and elevation analysis (using 3D data to analyze the impact of
terrain on the distribution of carbon dioxide, or the dynamics of CO2 distribution in dense
urban areas).
          </p>
          <p>Data Visualization: GIS of ICTF visually represents data through maps, graphs, and 3D
models. These visualizations help analysts and users understand spatial relationships and
patterns, make informed decisions, and generate reports using interactive or printed maps.
Decision Support: The GIS of ICTF for carbon dioxide emission monitoring in the region
serves as the main tool for data processing, analysis, and, based on this, supporting
decision-making related to managing greenhouse gases, complying with established plans
and agreements, and preventing emergencies in the region.</p>
          <p>Let’s consider the comprehensive security system of the ICTF at the level of the cybernetic
space, the main component of which is the GIS (Table 4).</p>
        </sec>
        <sec id="sec-1-8-3">
          <title>Loss and Error detection and Tools for</title>
          <p>modification of correction implementing
information algorithms. electronic digital
during selection, Data hashing. signatures.</p>
          <p>transmission, and Data encryption. Firewalls.</p>
          <p>Geographic processing. Electronic digital Antivirus
Information Loss of signature method. software.
System for data information due to Conducting periodic Access control
processing, improper storage system configuration and segregation
analysis, storage, of archived data. checks. systems.
and decision- Errors during Defining Checkpoints.
making for system requirements for Key and
management: configuration. specialists who electronic locks.
Databases, data Failures, configure the Alarm systems.
storage malfunctions, and systems. Emergency
Cloud crashes of Logging failures, generators.
environment hardware and malfunctions, and Uninterruptible
Hardware and software systems. crashes. power supplies
software (client Incorrect Functional control of (UPS).
applications) overlaying of data hardware and Automated attack
layers in GIS due software in the detection system
to improper information system sensors.
formatting. (IS). Tools for creating
Unauthorized Data backup. and storing
destruction, Automated data backup copies.
modification, or format verification Change logs for
copying of IP data. before import. configurations
Blocking access to Strengthening user and algorithms.</p>
          <p>and process
authentication
mechanisms.</p>
        </sec>
        <sec id="sec-1-8-4">
          <title>Hash functions,</title>
          <p>hash tables.</p>
          <p>Use of certified
antivirus
software.</p>
          <p>Configuring
systems for
protection against
denial-of-service
(DDoS) attacks.
Regular scanning
of GIS software
and information
for malicious
components.</p>
        </sec>
        <sec id="sec-1-8-5">
          <title>Targeted threats:</title>
        </sec>
        <sec id="sec-1-8-6">
          <title>Infection of Organization of Tools for</title>
          <p>databases with internal and external implementing
malicious secure document electronic digital
software. management. signatures.
Destruction or Use of backup access Firewalls.
damage of channels to Antivirus
hardware. information software.
Unauthorized resources (IR). Access control
access to Expanding and segregation
information bandwidth for systems.
systems (IS). protection against Checkpoints.
Disabling or denial-of-service Key and
malfunctioning of attacks. electronic locks.
security systems Limiting access to Alarm systems.
for IS. IR/connection to the Emergency
Interception of Internet. generators.
information Use of certified Uninterruptible
during different licensed software. power supplies
lifecycle stages. Control and (UPS).
Use of malicious segregation of Sensors for
software or logic access. automated attack
bombs during Identification, detection
various stages of authentication, and procedures.
the information authorization. Tools for creating
lifecycle. Database encryption. and storing
Violation of Data hashing. backup copies.
algorithms, Data backup. Change logs for
configuration of Encryption of data configurations
hardware and processing processes. and algorithms.
software systems. Limiting access to Hash functions,
Breach of integrity automated hash tables.
or authenticity of information Regular scanning
information. processing systems. of GIS software</p>
        </sec>
        <sec id="sec-1-8-7">
          <title>Implementation of malicious software to modify spatial data.</title>
          <p>DDoS attacks
disrupting GIS
server operation.
Disclosure of
confidential
information.</p>
        </sec>
        <sec id="sec-1-8-8">
          <title>Conducting periodic</title>
          <p>checks of system
configurations and
operational modes of
hardware and
software.</p>
          <p>Use of certified
antivirus software.</p>
          <p>Configuration of
systems for
protection against
denial-of-service
(DDoS) attacks.</p>
          <p>and information
systems for
malicious
components.
4. Program implementation of database encryption for ICTS: the
“Kalyna” algorithm, tools of the C# programming language
The symmetric block cipher algorithm “Kalyna”. For cryptographic protection of confidential data
in the ICTS monitoring of carbon dioxide in the regional air ecosystem, we apply a database
encryption procedure based on the symmetric block cipher algorithm “Kalyna.” The symmetric
block cipher algorithm “Kalyna” (DSTU 7624:2014) has the following features: it provides
satisfactory, high, and very high security levels (block and key lengths of 128, 256, and 512 bits); a
transparent and understandable design; an AES-like structure; four different S-boxes with
optimized cryptographic properties; increased MDS matrix size; a single set of lookup tables for
ECB encryption in the software implementation (improved encryption and decryption performance
for different modes of operation); efficient in both software and hardware implementations, sharing
common lookup tables with the “Kupina” hash function (DSTU 7564:2014). The block and key
lengths in bits, as well as the corresponding number of algorithm cycles, are provided in Table 5.</p>
          <p>The stages of the algorithm, the main ones being byte substitution in the S-boxes, row shifting,
and column mixing (linear transformation using the MDS matrix), are shown in Figure 4.</p>
          <p>Depending on the key length, “Kalyna” ensures sufficient reliability based on cryptanalysis
methods: for a 128-bit block, after the 5th cycle (out of 10 or 14 cycles); for a 256-bit block, after the
6th cycle (out of 14 or 18 cycles); for a 512-bit block, after the 8th cycle (out of 18).</p>
          <p>C# Programming Language: A modern object-oriented programming language developed by
Microsoft as part of the .NET framework. C#, known for its versatility and performance, is used for
creating a wide range of applications, including desktop software, web applications, mobile apps,
and games. With features like garbage collection, static typing, and an extensive standard library,
C# allows developers to write clean and efficient code.</p>
          <p>It is especially suitable for enterprise-level applications due to its seamless integration with
the .NET ecosystem and support for cross-platform development. C# is often chosen for working
with databases in backend development due to its strong typing, LINQ (Language Integrated
Query), and effective support for asynchronous programming. These features enable secure,
efficient, and readable code for accessing databases and manipulating data. Additionally, it is used
in advanced database management tools such as Entity Framework Core, providing ORM
(ObjectRelational Mapping) capabilities that reduce boilerplate code. In combination with ASP.Net Core, a
powerful framework for creating scalable and high-performance web applications, C# and Entity
Framework Core offer a robust toolkit for developing database-driven systems.</p>
          <p>
            Entity Framework Core (EF Core): A modern and extensible ORM framework for .NET platform
applications, EF Core allows developers to work with databases using C# objects and LINQ. It
supports a wide range of databases, including SQL Server, PostgreSQL, MySQL, and SQLite,
making it a versatile choice for different projects. EF Core offers features such as change tracking
in databases, migrations (database updates based on code changes), and three development
approaches—Code-First (Figure 5 [
            <xref ref-type="bibr" rid="ref26">26</xref>
            ]), Model-First, and Database-First.
These approaches allow the generation and updating of databases either from code, models, or
existing databases, enabling Object-Relational Mapping, i.e., modeling a database with objects
described in code and vice versa.
          </p>
          <p>The software implementation of database encryption for the ICFT. Using EF Core and the
CodeFirst approach, a database was generated in the Microsoft SQL Server DBMS. The database contains
entities such as Sensor and Measurement (Figure 6), which respectively track the sensors and store
information about the sampling of carbon dioxide concentration in the regional ecosystem. One
sensor can conduct multiple measurements of carbon dioxide concentration, but each measurement
corresponds to a specific sensor that carried it out. Therefore, the relationship between the entities
in the database is one-to-many.</p>
          <p>In Figure 6: Measurements stores monitoring records, and Sensors stores the installed sensors.
The Measurements entity stores particularly sensitive data that require special protection,
specifically the Location (location) and Co2Concentration (the measured carbon dioxide
concentration) fields. Other data, such as the sensor ID or the date of the measurement, do not
require encryption. This means that database encryption should be done at the field or column
level, rather than at the file or table level, in order to preserve the ability to search for relevant
records and work with the database without the need for decryption.</p>
          <p>The database encryption for IKFT is carried out at the application level, as it preserves the
flexibility of working with the DBMS, access to key management, and data security. The
cryptographic protection software implements: encryption of selected confidential data just before
storing it in the database; decryption of data during reading. The encryption implementation uses
the “Kalyna-128/128” configuration, meaning both the block size and the key length are 128 bits, as
the data being stored fits into a 16-byte block, and larger blocks would unnecessarily occupy
database memory. However, the algorithm configuration can always be changed, for example, by
applying “Kalyna-128/256” with a 256-bit key length for improved cryptographic strength.</p>
          <p>Figure 7 illustrates the process of recording the carbon dioxide concentration measurement in
the database: the sensor ID (already stored in the database), the location of the measurement, and
the recorded carbon dioxide concentration value for the regional ecosystem are entered.
Figure 8 shows the data stored in the database. Since the data in the columns MeasurementId
(measurement ID), SensorId (sensor ID), and DateTime (date and time of recording) are not
encrypted, it is possible to work with the database and monitoring data (such as searching) without
decryption. However, the data in the Location and Co2 Concentration columns is encrypted.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>5. Conclusion</title>
      <p>The work presents the methodological foundations of the security of the intelligent cyber-physical
technology in the air ecosystem of the region under the influence of technogenic and natural
factors with (1) the architecture of the multi-level IKFT “sensors—wireless communication
technologies—geographic information system”; (2) the integral model of multi-level security for
IKFT; (3) integrated security systems for multi-level IKFT—physical space, communication
environment, and cybernetic space according to the “object—threat—protection” concept; (4)
software implementation of cryptographic protection of the IKFT cybernetic space database based
on the symmetric block cipher “Kalyna” using C# programming language tools. It enables the
application of the IKFT security platform as a result of the transformation of the tools, which
represents the development of systemic approaches to the secure monitoring of emergency
situations in the region, particularly greenhouse gas emissions for the global challenges of society.
Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Cybersecurity</given-names>
            <surname>Strategy of Ukraine</surname>
          </string-name>
          2021
          <article-title>-2025</article-title>
          . https://www.rnbo.gov.ua/files/2021/ STRATEGIYA%20KYBERBEZPEKI/proekt%20strategii_
          <fpage>kyberbezpeka</fpage>
          -Eng.docx
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kozhedub</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kramska</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Gyrda, Analysis of Human Factor Influence on Cyber-Physical System, Inf</article-title>
          . Technol. Secur.,
          <volume>8</volume>
          (
          <issue>1</issue>
          ) (
          <year>2020</year>
          )
          <fpage>102</fpage>
          -
          <lpage>115</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>I. </given-names>
            <surname>Opirskyy</surname>
          </string-name>
          , et al.,
          <source>Modern Methods of Ensuring Information Protection in Cybersecurity Systems using Artificial Intelligence and Blockchain Technology</source>
          , Kharkiv: Technology
          <string-name>
            <surname>Center</surname>
            <given-names>PC</given-names>
          </string-name>
          ,
          <year>2025</year>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>978</fpage>
          -617-8360-12-2
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Meytus</surname>
          </string-name>
          , et al.,
          <article-title>Cyber-Physical Systems as a basis for Intellectualization of Smart Enterprises, Control Syst</article-title>
          .
          <source>Comput.</source>
          ,
          <volume>4</volume>
          (
          <issue>282</issue>
          ) (
          <year>2019</year>
          )
          <fpage>14</fpage>
          -
          <lpage>26</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Islam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Riaz</surname>
          </string-name>
          ,
          <article-title>Complexity Analysis of Industrial Scale Cyber Physical Systems</article-title>
          , in: 2024
          <source>IEEE 7th Int. Conf. Ind. Cyber-Physical Syst. (ICPS)</source>
          ,
          <year>2024</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Pogasiy,
          <article-title>Models and Methods of Information Protection in Cyber-Physical Systems</article-title>
          , Inf. Secur.,
          <volume>28</volume>
          (
          <issue>2</issue>
          ) (
          <year>2022</year>
          )
          <fpage>67</fpage>
          -
          <lpage>79</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>O.</surname>
          </string-name>
           
          <article-title>Sholohon, Security in Cyber-Physical Systems</article-title>
          ,
          <source>in: Cyber-Physical Systems Achievements and Challenges: Mater. First Sci. Semin</source>
          .,
          <year>2015</year>
          ,
          <fpage>132</fpage>
          -
          <lpage>137</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Mandrona</surname>
          </string-name>
          , et al.,
          <article-title>Generator of Pseudorandom Bit Sequence with Increased Cryptographic Immunity, Metall</article-title>
          . Min. Ind.,
          <volume>6</volume>
          (
          <issue>5</issue>
          ) (
          <year>2014</year>
          )
          <fpage>24</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Bilous</surname>
          </string-name>
          , et al.,
          <article-title>Cyber Evidence Software as the Digital Forensics Tools in the Investigation of Cybercrime, in: Cybersecurity Providing in Inf</article-title>
          .
          <source>and Telecom. Systems</source>
          , vol.
          <volume>3991</volume>
          (
          <year>2025</year>
          )
          <fpage>26</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Bobalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Dudykevych</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
           
          <article-title>Mykytyn, Strategic Security of the System “Object-Information Technology,” Lviv: Lviv Polytech</article-title>
          . Univ. Press,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>F. J.</given-names>
            <surname>Furrer</surname>
          </string-name>
          ,
          <article-title>Safe and Secure System Architectures for Cyber-Physical Systems</article-title>
          , Inf. Spektrum,
          <volume>46</volume>
          (
          <year>2023</year>
          )
          <fpage>96</fpage>
          -
          <lpage>103</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00287-023-01533-z
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Bobalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Dudykevych</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
           
          <article-title>Mykytyn, Information Technologies for Data Collection: Concept, Methodological Approaches</article-title>
          , Security: A Monograph, Lviv: Spolom,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Lakhno</surname>
          </string-name>
          , et al.,
          <article-title>Management of Information Protection based on the Integrated Implementation of Decision Support Systems</article-title>
          , East.-
          <string-name>
            <surname>Eur</surname>
          </string-name>
          . J.
          <string-name>
            <surname>Enterp</surname>
          </string-name>
          . Technol.,
          <volume>5</volume>
          (
          <issue>9</issue>
          (
          <issue>89</issue>
          )) (
          <year>2017</year>
          )
          <fpage>36</fpage>
          -
          <lpage>41</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2017</year>
          .111081
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Mittal</surname>
          </string-name>
          , et al.,
          <article-title>Cyber-Physical System Resilience</article-title>
          , in: S. Mittal,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Tolk (Eds.),
          <source>Complexity Challenges in Cyber-Physical Systems</source>
          , John Wiley &amp; Sons,
          <year>2019</year>
          ,
          <fpage>301</fpage>
          -
          <lpage>337</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.</given-names>
            <surname>Susukailo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Opirsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yaremko</surname>
          </string-name>
          ,
          <article-title>Methodology of ISMS Establishment Against Modern Cybersecurity Threats</article-title>
          , in: Lect. Notes Electr. Eng., Cham: Springer Int. Publ.,
          <year>2021</year>
          ,
          <fpage>257</fpage>
          -
          <lpage>271</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -92435-5_
          <fpage>15</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J. B.</given-names>
            <surname>Nakirya</surname>
          </string-name>
          ,
          <article-title>Cyber-Physical Systems: Integrating Computing with Physical Processes, Res</article-title>
          .
          <source>Output J. Eng. Sci. Res</source>
          .,
          <volume>3</volume>
          (
          <issue>2</issue>
          ) (
          <year>2024</year>
          )
          <fpage>49</fpage>
          -
          <lpage>52</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yu</surname>
          </string-name>
          , et al.,
          <article-title>A Survey on Cyber-Physical Systems Security</article-title>
          , IEEE Internet Things J.,
          <volume>10</volume>
          (
          <issue>24</issue>
          ) (
          <year>2023</year>
          )
          <fpage>21670</fpage>
          -
          <lpage>21686</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yevseiev</surname>
          </string-name>
          , et al.,
          <source>Models of Socio-Cyber-Physical Systems Security: A Monograph</source>
          , Kharkiv: PC Technology Center,
          <year>2023</year>
          ,.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vasylyshyn</surname>
          </string-name>
          , et al.,
          <article-title>A Model of Decoy System based on Dynamic Attributes for Cybercrime Investigation</article-title>
          ,
          <string-name>
            <surname>East</surname>
          </string-name>
          .-
          <source>Eur. J. Enterp. Technol., 1</source>
          .9(
          <issue>121</issue>
          ) (
          <year>2023</year>
          )
          <fpage>6</fpage>
          -
          <lpage>20</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2023</year>
          .273363
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>V.</given-names>
            <surname>Dudykevych</surname>
          </string-name>
          , et al.,
          <article-title>Platform for the Security of Cyber-Physical Systems and the IoT in the Intellectualization of Society</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          ,
          <year>2024</year>
          ,
          <fpage>449</fpage>
          -
          <lpage>457</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <article-title>Regulations on the Interaction of Subjects of Monitoring</article-title>
          , Surveillance,
          <source>Laboratory Control and Forecasting of Emergencies</source>
          ,
          <year>2018</year>
          . https://dsns.gov.ua/upload/1/2/6/3/6/2018-2-24-reglamentmonatoring.odt
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>O.</given-names>
            <surname>Milov</surname>
          </string-name>
          , et al.,
          <article-title>Development of Methodology for Modeling the Interaction of Antagonistic Agents in Cybersecurity Systems</article-title>
          , East.-
          <source>Eur. J. Enterp. Technol., 2</source>
          .9(
          <issue>98</issue>
          ) (
          <year>2019</year>
          )
          <fpage>56</fpage>
          -
          <lpage>66</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2019</year>
          .164730
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Carbon</given-names>
            <surname>Dioxide Analyzer</surname>
          </string-name>
          RK300-03.
          <year>2021</year>
          . https://en.gassensor.com.cn/Product_files/Specifica tions/CM1106SL-NS%
          <article-title>20Super%20Low%20Power%20CO2%20Sensor%20Module%20Specificatio n</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>Carbon</given-names>
            <surname>Dioxide Analyzer CM1106SL-NS</surname>
          </string-name>
          .
          <year>2015</year>
          . https://img.yfisher.
          <source>com/m6041/04e2e9a294e 39c7b82321b88ab538d90.pdf</source>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>F.</given-names>
            <surname>Mukherjee</surname>
          </string-name>
          , Introduction to Geographic Information Systems, United States: Rowman &amp; Littlefield Publ.,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Entity</given-names>
            <surname>Framework Core Code First: Introduction</surname>
          </string-name>
          , Best Practices, Repository Pattern,
          <source>Clean Architecture</source>
          ,
          <year>2024</year>
          . https://medium.com/@codebob75/
          <article-title>entity-framework-core-code-firstintroduction-best-practices-repository-pattern-clean-22b6152bcb81</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>