<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>June</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Development of a Methodology for Building a Multi- Contour Information Resource Protection System in Cyber-Physical Systems⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Serhii Yevseiev</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Pohasii</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vladyslav Sokol</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yevhen Melenti</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stanislav Milevskyi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Academy of Security Service of Ukraine</institution>
          ,
          <addr-line>Maksymovycha 22 03022 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University “Kharkiv Polytechnic Institute”</institution>
          ,
          <addr-line>Kyrpychova 2 61002 Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>0</volume>
      <fpage>9</fpage>
      <lpage>11</lpage>
      <abstract>
        <p>This paper presents a methodology for constructing a multi-layered information security system for cyberphysical systems (CPS), addressing modern challenges related to hybrid and post-quantum threats. The concept is based on five stages: threat probability assessment, preventive modeling, game-theoretical analysis, implementation of post-quantum cryptographic mechanisms (LDPC-based CCS), and multicontour security architecture development. The effectiveness of protection is evaluated using KPI(eff), KPIeffinv, and KPInorm indicators, particularly in the context of mobile wireless technologies (LoRa, Sigfox, LTE-M, NB-CPS). A modification of the GoBack-N protocol is proposed to enhance functional efficiency in wireless memory channels. The proposed models can be applied in the development of secure CPS for critical infrastructure and industrial IoT systems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cyber-physical systems</kwd>
        <kwd>multi-layered security</kwd>
        <kwd>post-quantum cryptography</kwd>
        <kwd>LDPC codes</kwd>
        <kwd>LPWAN1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>cryptographic algorithms, this approach offers a robust foundation for the creation of resilient and
effective cybersecurity systems.</p>
      <p>Specifically, the study proposes a five-stage methodology for constructing a multi-contour
security system for CPS, which includes: assessing the probability of threat realization; forming
preventive models based on the Lotka-Volterra equations; evaluating system effectiveness using
game-theoretical models; constructing integrated mechanisms for ensuring confidentiality, integrity,
and authenticity of information; and developing security strategies based on attacker resources. This
structured process enables a systematic and adaptive approach to securing information circulating
in CPS.</p>
      <p>A central component of the proposed methodology is the use of post-quantum cryptographic
systems — in particular, code-based cryptosystems (CCS) utilizing LDPC (low-density parity-check)
codes, which enable cryptographic transformations with high performance and moderate energy
consumption. This is especially relevant for wireless mobile technologies used in
resourceconstrained environments, such as LoRa, Sigfox, LTE-M, and NB-CPS, which are widely adopted in
low-power wide-area networks (LPWAN). The research demonstrates that implementing
cryptosystems based on LDPC codes significantly increases the overall effectiveness of security
systems while maintaining acceptable levels of latency and energy consumption.</p>
      <p>Special attention is given to modeling the interaction between the adversary and the CPS defense
system. To this end, mathematical tools such as game theory are applied, enabling analysis of conflict
scenarios and determination of optimal behavioral strategies under constrained resources. The
Lotka-Volterra “predator-prey” model has been adapted to cybersecurity tasks, incorporating the
hybrid nature and synergy of threats, as well as the financial and computational capabilities of the
adversaries.</p>
      <p>The study also presents a methodology for calculating the functional efficiency of CPS,
considering the probability of packet delivery, packet size, delivery time, system resilience, and more.
This methodology forms the basis for KPI-based security analysis, supporting economic justification
for the implementation of security technologies and ensuring the reliable operation of CPS in
highthreat environments.</p>
      <p>Thus, the conceptual framework presented in this work combines advanced techniques in
mathematical modeling, post-quantum cryptography, and intelligent risk assessment. It provides the
foundation for implementing an effective, flexible, and resilient information protection system for
CPS in a time of rapid technological progress and increasingly sophisticated cyber threats. The
relevance of this topic is confirmed by the growing number of cyber incidents affecting critical
infrastructure, the need to adapt to novel threats (including those emerging with the development
of quantum technologies), and the high demands for reliability, energy efficiency, and uninterrupted
operation of CPS across various domains of human activity.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Materials and methods</title>
      <p>The creation of large critical infrastructure systems and the intensification of research into the
dynamics of CPS require constant improvement and updating of the current apparatus for modeling
and controlling dynamic systems [1, 2; 3; 4, 5, 6]. Recently, the center of gravity of research has
shifted towards the development of a methodology for dynamic systems with changing parameters.
The use of methods for analyzing such systems allows us to dramatically expand the range of tasks
to be solved.</p>
      <p>
        Based on research [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref7 ref8 ref9">7, 8, 9, 10, 11, 12, 13</xref>
        ], a new methodology for building an information resource
security system is proposed based on methods and models for building multi-circuit security systems,
as well as mechanisms for providing basic security services based on post-quantum algorithms - CCS
with LDPC codes, which are characterized by speed and are used in mobile "Internet technologies".
Fig. 1–2 shows its structural and logical diagram [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
      </p>
      <p>
        It includes five stages [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]:
1) determining the probability of impact of threats on CPS;
2) forming models of preventive measures based on the Lotka-Volterra model;
3) assessing effectiveness based on game-theoretic approach models;
4) building integrated mechanisms to ensure confidentiality, integrity, authenticity and reliability
of CPS information resources;
5) determining the state and forming strategies for building multi-circuit protection systems.
Stage 1. Determining the likelihood of threats to the CPS
      </p>
      <p>To determine the probability of the impact of threats on CPS, we use an expert approach to
forming a threat classifier. To form an expert assessment, we use a modification of the threat
classifier, which is implemented programmatically at the link https://skl.sspu.sumy.ua/threat.</p>
      <p>To obtain an assessment of the current state of information security based on the proposed
concept of a two-circuit information protection system CPS, let us assume that “1” corresponds to
the maximum level of security provided by the security system as a whole, and “0” corresponds to
the absence of the required level of information protection.</p>
      <p>To determine the probability of a threat being realized with the limiting capabilities of protection
A and the limiting capabilities of attack B, we will use the probability density function of the random
variable x – F(x). The specified probability is determined by the difference F(B)–F(A), where A is the
limiting level of capabilities of the defense side, B is the limiting level of capabilities of the attack
side.</p>
      <sec id="sec-2-1">
        <title>Platform 1 – Threat criticality level</title>
      </sec>
      <sec id="sec-2-2">
        <title>Platform 2 – Component safety protection</title>
        <sec id="sec-2-2-1">
          <title>Platform 3 – Security services</title>
        </sec>
      </sec>
      <sec id="sec-2-3">
        <title>Platform 4 – Nature of directions</title>
      </sec>
      <sec id="sec-2-4">
        <title>Platform 5 – ISO/OSI infrastructure level</title>
        <p>Threats to security components
CS</p>
        <p>BS</p>
        <p>IS</p>
        <p>EXTERNAL SAFETY CIRCUIT
Protocol Lora/CCC Niederreiter
ІoТ
device</p>
        <p>Encryption/Deciption ССС
Niederreiter modifying</p>
        <p>LDPC-code</p>
        <p>Server
TrCPSS ESLRA = Tri | (PiA − CiA )  0Tri  Tr  TrLCPS = arg max
TrlTrCD Kl  Kl</p>
        <p>D A
Model taking into account the relationships between prey
species and predator species
Assessment of the
intensity of
changes in the
level of security</p>
        <p>SECURITY ASSESSMENT OF
CYBERPHYSICAL SYSTEMS
based on a finitCeFSstate
machine H</p>
        <p>Formation of
the security
level transition
function
Very Low
SI 0,2</p>
        <p>Low Middle High Critical
0,2 SI 0,4 0,4 SI 0,6 0,6 SI 0,8 0,8 SI 1,0
ССС Niederreiter on LDPC, МЕС, Loss-making codes
Security level
B
А</p>
        <p>Secret key a1, , an
Session key |V1|, |V2|</p>
        <p>H, X, P, D
Key data
generation
Protocol</p>
        <p>Hx = X × G × P × D
i</p>
        <p>SX = e × HXT</p>
        <p>SX
Encryption</p>
        <p>X-1, P-1, D-1
SX = cX* × HXT
c` = cX* × D-1 × P-1
c` = i` × G + e`
e = e` × P × D
Deciphering
i</p>
        <sec id="sec-2-4-1">
          <title>Estimating the streaming state of cyber-physical systems</title>
          <p>The level of security is defined as the share of those resources protected from cyberattacks as
(1)
(2)
S = F ( B) − F ( A) = </p>
          <p>B
−</p>
          <p>1
 2</p>
          <p>1 t− 2
e    dt − 
2</p>
          <p>A
−</p>
          <p>1
 2</p>
          <p>1 t− 2
e2   dt.</p>
          <p>
            To ensure the security of the entire protection system, we take into account the threats of the
internal and external contour:
– threats of the internal contour taking into account hybridity and synergy [
            <xref ref-type="bibr" rid="ref13 ref5 ref6">5, 6, 13</xref>
            ]:
W
– threats to the external contour, taking into account hybridity and synergy [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ]:
WhSyCbrPidEСSL,I ,A,Au,Af synerg = WsCynPeSrgESLС WsCynPeSrgESL I
WsCynPeSrgESL A
          </p>
          <p>WsCynPeSrSg ESL Au</p>
          <p>WsCynPeSrgESL Inv ,
HSMSecret keys of CCC
key selection generator</p>
          <p>CCC</p>
          <p>Key generator
(Niederreiter ССС)
Cyberspace platform
3
2</p>
          <p>wireless
communication
channels</p>
          <p>1
coder/decoder
(Niederreiter ССС )
Sensors, sensors, CPS
elements</p>
          <p>Service Cloud
Сloud computing</p>
          <p>Encoder
(Niederreiter ССС)</p>
          <p>Outer contour
wireless
communication</p>
          <p>channels
coder/decoder
(Niederreiter ССС)</p>
          <p>wireless
communication</p>
          <p>channels
wireless
communication
channels</p>
          <p>LPWAN alternatives
(e.g., Sigfox, LTE-M,</p>
          <p>NB-CPS</p>
          <p>Inner contour
(3)
(4)</p>
          <p>Cybersystems Platform</p>
          <p>
            Analysis of the classification of attackers allows us to form the set {Hj} CPS ISL, which determines
the levels of influence on the CPS of the internal circuit, as well as the set {Hj} CPS ESL, which
determines the levels of influence on the CPS of the external circuit. We determine the weight
coefficient of the attacker's "danger" by the formula [
            <xref ref-type="bibr" rid="ref12 ref5 ref6">, 5, 6,12</xref>
            ]:
 CICPSS = 1 N  CICPSS i ,
          </p>
          <p>N i=1</p>
          <p> ICCPSS i = ( iICS   iCРS )  prj  rmotiv ,
iCPSS ISL = WcCpPSS ISL WcCasPhSS ISL</p>
          <p>T CPSS ISL ,
CPSS ESL = WcCpPSS ESL WcCasPhSS ESL
i</p>
          <p>T CPSS ESL
– opportunity weights
offender for CPS ISL and
CPS ESL (in accordance);</p>
          <p>– the offender's computing resources</p>
          <p>– economic opportunities of attackers.</p>
          <p>
            The data on the criteria and indicators of expert assessment of its detection are given in the works
[
            <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
            ], allowing us to take into account that the attack is determined by a complex criterion that takes
into account the cost of implementation and the computational capabilities available to the attacker.
          </p>
          <p>
            Stage 2. Formation of models of preventive measures based on the Lotka-Volterra model [
            <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
            ]
Based on the proposed approach, the coefficients of the Lotka-Voltera model α=0.39, β=0.32,
γ=0.29, φ=0.27 were obtained, which take into account the synergy and hybridity of modern threats,
funding for the formation and improvement of the protection system, and also allows determining
the financial and computational capabilities of the attacker based on the identified threats.
          </p>
          <p>Development of evolving CPS security models, taking into account the computational capabilities
and the direction of targeted cyberattacks.</p>
          <p>The number of objects representing attack targets, taking into account their hybridity, can be
represented as follows:</p>
          <p>N1 = Q  N1Ci  AiC + N1Ii  AiI + N1Ai  AiA + ,
i=1  + N Au  AAu + N Aff  AAff </p>
          <p>1i i 1i i </p>
          <p>
            When implementing the algorithm, it is assumed that the parties to the conflict determine the
criticality of cyber threats, which are economically feasible to carry out and/or which need to protect
information resources (CPS), first of all. The birth rate of “victims” α is proposed to be used from [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ].
To assess the impact of modern threats on protection means β, we will use the expression in [
            <xref ref-type="bibr" rid="ref5 ref6 ref7">5, 6,7</xref>
            ].
To determine the coefficient of computational capabilities of the attacker φ, we will use the
classification of attackers, as presented in [
            <xref ref-type="bibr" rid="ref5 ref6 ref7">5, 6,7</xref>
            ],
          </p>
          <p>Weighting coefficient evaluation indicators
CiРS Ci РS 
Category
Critical</p>
          <p>High
Average</p>
          <p>Low</p>
          <p>Very low
The coefficient of possibility of preventive measures is represented as:</p>
          <p>WcCpPS</p>
          <p>(5)
rmotiv</p>
          <p>
            In [
            <xref ref-type="bibr" rid="ref11 ref5 ref6">5, 6, 11</xref>
            ], models of interaction of antagonistic agents in security systems were proposed. They
allowed to obtain solutions for two main problems in the field of cybersecurity: the interaction of a
system administrator and an attacker during the organization of the protection of information
resources. These problems are considered for two conditions: when the game matrix contains cost
estimates of resources and when the matrix reflects the probabilities of threat realization. Pure and
mixed strategies are defined for different initial conditions, which allows to exclude irrelevant
strategies.
          </p>
          <p>These elements form the basis of a taxonomy of games and their models. Models built on game
theory help to identify a number of relevant tasks for ensuring key aspects of security:
confidentiality, integrity, availability and authenticity.</p>
          <p>
            Stage 4. Building integrated mechanisms to ensure confidentiality, integrity, authenticity and
reliability of CPS information resources [
            <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
            ]
          </p>
          <p>
            To provide basic services, it is proposed to use Niederreiter CCS, which are discussed in detail in
[
            <xref ref-type="bibr" rid="ref10 ref12 ref5 ref6 ref8">5, 6, 8, 10, 12</xref>
            ].
          </p>
          <p>The formation of the public key for the Niederreiter CCS is carried out by multiplying the masking
matrices by the generating or verification matrices:</p>
          <p>H LDPCu = X u  H LDPCu  Pu , u {1, 2,..., r}.</p>
          <p>Xai
The syndromic sequence is transmitted to the communication channel:</p>
          <p>S * = ( en )  H LDPC T .</p>
          <p>Xai
where is an additional session key for each information packet. A specific algorithm is used for
Niederreiter CCS.</p>
          <p>On the receiver side, the authorized user, knowing the masking matrices, applies a fast soft
decoding algorithm for decryption.</p>
          <p>The use of post-quantum asymmetric cryptosystems allows achieving the required level of
security in providing security services. The use of LDPC codes allows for easy integration of mobile
wireless technologies based on IEEE802.XX standards.</p>
          <p>At stage 5, the state is determined and strategies are formed for building multi-circuit protection
systems.</p>
          <p>It is proposed to divide the CPS into two subsystems: security and infrastructure. The inner loop
of the CPS provides the necessary set of services and functionality, while the outer loop is a
management system (MS) built on the basis of a synthesis of wireless networks and cloud
technologies.
(7)
(8)</p>
          <p>This approach facilitates the synthesis of internal and external circuits, taking into account the
operational efficiency, energy efficiency and relative security of each of them. In addition, it allows
you to objectively assess the threats of each circuit, taking into account the computing resources and
financial capabilities of attackers. Fig. 1–2 presents a structural diagram of the concept of two-circuit
security CPS.</p>
          <p>Based on the research conducted, a comprehensive indicator of CPS functional efficiency has been
proposed, which allows assessing the overall performance and reliability of the system, taking into
account security, confidentiality, economic costs, and quality of service.</p>
          <p>To build a model of a complex indicator of CPS functional efficiency taking into account the
proposed factors, it is necessary to determine how each of them affects the overall efficiency of the
system and combine them into a formula.</p>
          <p>The methodology for assessing the functional efficiency of data transmission based on a complex
indicator allows you to obtain emergent properties, taking into account the synthesis of a complex
indicator of the effectiveness of investments in the security of CPS information resources, the results
of the assessment of modern threats in CPS, their hybridity and synergy, as well as the results of an
express assessment of the stability and efficiency of the software (or software-hardware)
implementation of cryptographic algorithms.</p>
          <p>Calculating the efficiency indicator KPI(eff) and taking into account the parameters, the
calculation for each technology requires normalization of the parameters.</p>
          <p>B – security system stability for the chosen strategy</p>
          <p>To calculate the comprehensive indicator of the effectiveness of investments in ensuring the
security of information resources in LPWAN, KPIeffinv, a normalized multifactor approach can be used.
The calculation uses parameters such as energy efficiency, power consumption, and security system
stability, which can affect the security of information resources.</p>
          <p>The coefficient of the comprehensive indicator of the effectiveness of security investments KPIeffinv
(LPWAN) can be represented as a weighted sum of normalized factors:</p>
          <p>KPIeffinv = w1
w4</p>
          <p>Bi
Bi max</p>
          <p>P</p>
          <p>P max
+ ... + wт
+ w2</p>
          <p>Bn
Bn max
,</p>
          <p>Ef
Ef max
+ w3(1 −</p>
          <p>Ed</p>
          <p>) +
Ed max
(10)
w 1,m, B i,
Ef – energy efficiency.</p>
          <p>Ed – energy consumption.</p>
          <p>Bi – stability of the security system.
wi – weighting factors (determine the importance of each factor).</p>
          <p>Parameters marked max are the maximum possible values for normalization. All weighting
factors are equal to 0.25.</p>
          <p>To calculate the efficiency indicators KPI(eff), it is necessary to use the changed degree of
information secrecy when applying crypto-code constructions on the proposed LDPC codes,
allowing to provide an integrated increase in the level of reliability (due to error correction
properties), efficiency (compatible with symmetric cryptography algorithms in terms of
cryptographic conversion speed) and the required level of energy consumption, the results of
comparative studies on the criteria of efficiency, energy consumption. Synthesis with the proposed
technologies based on CCS (NSCC) will allow not only to provide the required level of the main
criteria of modern wireless networks, but also to fundamentally change the methodological
foundations of building security systems.</p>
          <p>Thus, Lora technologies with post-quantum protection algorithms - crypto-code constructions
with LDPC codes, which allow building asymmetric and/or hybrid cryptosystems (LoRa HSCC and
LoRa CCC) allow ensuring the necessary level of efficiency in the post-quantum period. This takes
into account not only the possibility of counteracting targeted (mixed) attacks with signs of hybridity
and synergy (the possibility of integration with social engineering methods), but also increasing the
level of reliability and the possibility of their use in smart technologies with limited energy-intensive
requirements. To increase the functional efficiency indicator KPI(eff) CPS, it is proposed to use data
exchange management protocols that will ensure the necessary indicators: data transmission
efficiency, noise immunity and security.</p>
          <p>One such protocol is the Go-Back-N loopback data exchange control protocol, which allows for
the required level of functional efficiency of the CPS.</p>
          <p>KPI(eff)</p>
          <p>1
0.5</p>
          <p>
            To evaluate the CPS of continuous frame feedback control, the efficiency is calculated as follows
[
            <xref ref-type="bibr" rid="ref14 ref15 ref16 ref17">14, 15, 16, 17</xref>
            ] A modification of the Go-Back-N method formula involves retransmission of the
packet window when an error is detected, which may affect the probability of successful delivery (P)
which may slightly decrease if the error is not detected often, retransmissions may increase the
delivery time T, and energy consumption increases due to retransmissions.
          </p>
          <p>The generalized formula has the following form:</p>
          <p>KPI (eff _GBN ) =
 B  P  (1 − Pretry)  KPIeffin  KPInorm,
(11)
where Pr etry factor takes into account the probability of retransmission of packets in the event
of an error. This factor is critical for “Go-Back-N” because it must take into account the probability
that an error could lead to a retransmission.</p>
          <p>To calculate KPI(eff) by the Return-to-N method for channels with memory taking into account the
probability of packet errors, taking into account the probability of an error within a packet, the
mathematical expectation of the length of the packet errors, and the standard deviation of the values
given in Table 3, we will use the following modified formula</p>
          <p>KPI ( eff _ GBN _mem ) = (
(1 − (
where Ре – probability of an error in the package.</p>
          <p>E(L) – mathematical expectation of the length of the error packet.</p>
          <p>σ(L) – standard deviation of the error packet length, which takes into account the variability in
the number of packets that can be lost due to errors.</p>
          <p>(</p>
          <p>– cumulative distribution function of the normal distribution (Laplace
function), which takes into account the probability of an error in the batch (the closer the function
value is to 1, the greater the probability that errors will be detected and corrected).</p>
          <p>Analysis of Fig. 3 and Table 3 shows that the use of crypto-code structures with LDPC codes
(LoRa CCC with LDPC codes) and hybrid crypto-code structures with LDPC codes (LoRa CCC with
LDPC codes) increase the complex efficiency index by an order of magnitude by providing security
services (confidentiality, integrity and authenticity of data). However, in the conditions of using a
full-scale quantum computer and additional use of the damage algorithm (multi-stream
cryptography), the complex efficiency index decreases by 9% (LoRa HCCC with LDPC codes KPIeff is
0.7505, and LoRa CCC with LDPC codes KPIeff is 0.5273), but at the same time the required level of
security is ensured.</p>
          <p>KPI(effGBN_LoraCCC)
KPI(effGBN_LoraНCCC)</p>
          <p>KPI(effGBN_EC-GSM-CPS)
KPI(effGBN_NB-CPS)
KPI(effGBN_Lora)
KPI(effGBN_LTE)</p>
          <p>KPI(effGBN_Sigfox)</p>
          <p>The channel model with memory provides a more “objective” model of real communication
channels, as it takes into account the possibility of packetization of errors in the channel. The results
shown in Fig. 4 and Table 3 confirm that the complex efficiency indicator, as well as the channel
model without memory, increases by 10% (LoRa HSCC with LDPC codes KPIeff is 0.917235, and LoRa
CCC with LDPC codes KPIeff is 0.644446). However, the necessary level of security is ensured, which
in the conditions of the emergence of a full-scale quantum computer (post-quantum period) and the
action of targeted (mixed) attacks with signs of hybridity and synergy provides the necessary level
of security of the CPS infrastructure elements.</p>
          <p>The proposed methodology for assessing the flow state of an automated data transmission system
via wireless communication channels provides an increased level of objectivity in assessing not only
targeted attacks (taking into account the financial, computational and human capabilities of the
attacker). In addition, it provides an analysis of critical points (points of possible unauthorized
penetration into the infrastructure), as well as the ability to counter cyberattacks based on special
mechanisms, taking into account the security levels that are defined.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusion</title>
      <p>This study presents a comprehensive methodology for constructing a multi-contour information
security system for cyber-physical systems (CPS), addressing the current challenges associated with
hybrid and post-quantum threats. The proposed approach is strategically significant for the
protection of infrastructure operating in a dynamic technological landscape characterized by rapid
growth in wireless communication and computing technologies.</p>
      <p>The methodology is structured around five interrelated stages: assessing the probability of threat
realization, modeling preventive measures using the Lotka–Volterra equations, applying
gametheoretical models to evaluate protection strategies, implementing post-quantum cryptographic
mechanisms based on LDPC codes, and designing an adaptive multi-contour CPS security
architecture. This transition from reactive to proactive cybersecurity management ensures both
realtime threat mitigation and systemic resilience.</p>
      <p>The first stage introduces a method for estimating the likelihood of threat implementation using
a probability density function that compares the defensive and offensive capabilities. The model
considers both external and internal threats and incorporates hybrid and synergistic characteristics
of attacks, offering a robust and realistic assessment framework. This dual-contour perspective
enables the differentiation between system-level vulnerabilities and network-level exposures.</p>
      <p>At the second stage, preventive actions are modeled through a modified Lotka–Volterra system,
traditionally used to represent “predator-prey” dynamics. This model allows the representation of
economic and computational resources available to both attackers and defenders. Key coefficients
(α, β, γ, φ) reflect the aggressiveness, resilience, and scalability of both threats and defensive
mechanisms, providing a simulation framework for developing rational defense prioritization.</p>
      <p>The third stage employs game theory to analyze the interactions between attackers and system
administrators, allowing the definition of optimal (pure or mixed) strategies under conditions of
uncertainty and limited resources. This approach is particularly useful for modeling real-time
decision-making and enables the elimination of non-viable defense scenarios in complex adversarial
environments.</p>
      <p>In the fourth stage, the research focuses on designing cryptographic mechanisms that ensure
confidentiality, integrity, authenticity, and trustworthiness of transmitted data. The study justifies
the use of CCC Niederreiter built on LDPC codes, which demonstrate high efficiency, fault tolerance,
and low computational overhead. These cryptosystems are compatible with resource-constrained
mobile and wireless devices and provide resilience to attacks from quantum computing.</p>
      <p>The fifth and final stage proposes a dual-contour architectural model for CPS, separating the
system into operational (internal) and managerial (external) subsystems. The internal contour
manages service delivery and real-time control, while the external contour integrates wireless and
cloud-based technologies for remote administration and communication. This division ensures
layered security and allows for differentiated risk assessment and mitigation strategies for each
subsystem.</p>
      <p>In addition to the architectural framework, the paper introduces a novel method for evaluating
CPS functional efficiency under adversarial conditions. The proposed KPI(eff) metric aggregates
parameters such as data delivery probability, packet size, delivery time, security robustness, and
energy efficiency. It was demonstrated that the integration of LDPC-based cryptographic
mechanisms in LoRa wireless technologies significantly improves these performance indicators
compared to other LPWAN alternatives (e.g., Sigfox, LTE-M, NB-CPS).</p>
      <p>Furthermore, the study assesses the impact of modifying the Go-Back-N protocol for wireless
channels with and without memory. It was shown that accounting for retransmission probabilities
and packet error rates improves reliability and bandwidth utilization in noisy environments, thus
enhancing communication stability.</p>
      <p>The major scientific contribution of this work lies in the formalization of a layered security
strategy for CPS using mathematical threat behavior models, advanced cryptographic techniques,
and real-time efficiency evaluation tools. This approach provides a framework for adaptive security
systems that not only defend against external intrusions but also dynamically respond to evolving
threats and self-correct their operations.</p>
      <p>The findings of this research are applicable to the design of secure CPS across a range of
industries, including smart grids, industrial automation, e-health, intelligent transport systems,
military technology, and smart cities. They also open new avenues for future studies in adaptive
selforganizing cybersecurity mechanisms, hybrid cryptographic systems, and resistance to adversarial
AI and quantum computing-based attacks.</p>
      <p>In conclusion, the proposed methodology increases the overall efficiency of CPS security systems
by 4.78% (based on KPI calculations) and lays the foundation for a paradigm shift from passive
defense to emergent security governance. In an era where digital resources are strategic assets, such
an approach ensures sustainable, secure, and intelligent operations of next-generation CPS.
Declaration on Generative AI
The authors have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Holovka</surname>
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Information threats in a globalized world: economics, politics, society (experience of Ukraine)</article-title>
          .
          <source>Baltic Journal of Economic Studies</source>
          ,
          <volume>2</volume>
          (
          <issue>3</issue>
          ),
          <fpage>42</fpage>
          -
          <lpage>47</lpage>
          . doi: https://doi.org/10.30525/
          <fpage>2256</fpage>
          -
          <lpage>0742</lpage>
          /2016-2-3-
          <fpage>42</fpage>
          -47.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>DeBenedictis</surname>
            <given-names>K.</given-names>
          </string-name>
          .
          <source>Russian “Hybrid Warfare” and the Annexation of Crimea. Bloomsbury Publishing</source>
          .
          <year>2021</year>
          . doi: https://doi. org/10.5040/9780755640027.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Haig Z.</given-names>
            ,
            <surname>Hajdu</surname>
          </string-name>
          <string-name>
            <surname>V.</surname>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>New Ways in the Cognitive Dimension of Information Operations</article-title>
          .
          <source>Land Forces Academy Review</source>
          ,
          <volume>22</volume>
          (
          <issue>2</issue>
          ),
          <fpage>94</fpage>
          -
          <lpage>102</lpage>
          . doi: https://doi.org/10.1515/raft-2017-0013.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Forrest</surname>
            <given-names>J.</given-names>
          </string-name>
          <article-title>Digital influence warfare in the age of social media</article-title>
          .
          <source>Praeger</source>
          ,
          <year>2021</year>
          .
          <volume>303</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Pohasii</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseiev</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Milov</surname>
            <given-names>O.</given-names>
          </string-name>
          <article-title>and others. Development and analysis of game-theoretical models of security systems agents interaction</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          ,
          <year>2020</year>
          . №
          <volume>4</volume>
          (
          <issue>104</issue>
          ). P.
          <volume>15</volume>
          -
          <fpage>29</fpage>
          . (індексується базою Scopus)
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Pohasii</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseiev</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ryabukha</surname>
            <given-names>Y.</given-names>
          </string-name>
          <article-title>and others. Development of a method for assessing forecast of social impact in regional communities</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          ,
          <year>2021</year>
          . № 6/2 (
          <issue>114</issue>
          ). P.
          <volume>30</volume>
          -
          <fpage>43</fpage>
          . (індексується базою Scopus)
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Ekshmidt</surname>
            <given-names>V.</given-names>
          </string-name>
          ().
          <source>Verbal Manipulation: Persuasion and Suggestion. Movni i kontseptualni kartyny svitu, 1</source>
          ,
          <year>2015</year>
          .
          <fpage>275</fpage>
          -
          <lpage>281</lpage>
          . URL: http://nbuv.gov.ua/UJRN/Mikks_
          <year>2015</year>
          _
          <volume>1</volume>
          _
          <fpage>31</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Kolmogorova</surname>
            <given-names>A. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinin</surname>
            <given-names>A. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malikova</surname>
            <given-names>A. V.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Linguistic principles and computational linguistics methods for the purposes of sentiment analysis of cyrillic texts</article-title>
          .
          <source>Current Issues in Philology and Pedagogical Linguistics</source>
          ,
          <volume>1</volume>
          (
          <issue>29</issue>
          ),
          <fpage>139</fpage>
          -
          <lpage>148</lpage>
          . doi: https://doi.org/10.29025/2079-6021- 2018-
          <volume>1</volume>
          (
          <issue>29</issue>
          )
          <string-name>
            <surname>-</surname>
          </string-name>
          139-148.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Lytvyn</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uhryn</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hrendus</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naum</surname>
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Analysis of statistical methods for stable combinations determination of keywords identification</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>2</volume>
          (
          <issue>2</issue>
          (
          <issue>92</issue>
          )),
          <fpage>23</fpage>
          -
          <lpage>37</lpage>
          . doi: https:// doi.org/10.15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2018</year>
          .
          <volume>126009</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Molodetska-Hrynchuk</surname>
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Outreaches content tracing technique for social networking services</article-title>
          .
          <source>Radio Electronics</source>
          , Computer Science, Control,
          <volume>2</volume>
          (
          <issue>41</issue>
          ),
          <fpage>117</fpage>
          -
          <lpage>126</lpage>
          . doi: https://doi.org/10.15588/
          <fpage>1607</fpage>
          -3274-2017-2-13.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Savchuk</surname>
            <given-names>V. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hryshchuk</surname>
            <given-names>R. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hryshchuk</surname>
            <given-names>O. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musienko</surname>
            <given-names>A. P.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Intelligent system for evaluating destructive nature of text content of social networks based on fuzzy logic</article-title>
          .
          <source>Sciencebased technologies</source>
          ,
          <volume>38</volume>
          (
          <issue>2</issue>
          ). doi: https://doi.org/10.18372/
          <fpage>2310</fpage>
          -
          <lpage>5461</lpage>
          .
          <fpage>38</fpage>
          .12838.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Palchuk</surname>
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Methods of Content-Monitoring and Content-Analysis of Information Flows: Modern Features</article-title>
          .
          <source>Academic Papers of The Vernadsky National Library of Ukraine</source>
          ,
          <volume>48</volume>
          ,
          <fpage>506</fpage>
          -
          <lpage>526</lpage>
          . doi: https://doi.org/10.15407/np.48.506.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Snitsarenko</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nakonechnyi</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikhieiev</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hrytsiuk</surname>
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>The approach to automated internet monitoring system creation</article-title>
          .
          <source>2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT)</source>
          . doi: https://doi.org/10.1109/ atit49449.
          <year>2019</year>
          .9030446
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Kuznetsov</surname>
            <given-names>O. O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliinykov</surname>
            <given-names>R. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horbenko</surname>
            <given-names>Yu. I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pushkariov</surname>
            <given-names>A. I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dyrda</surname>
            <given-names>O. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horbenko</surname>
            <given-names>I. D.</given-names>
          </string-name>
          <article-title>Justification of requirements, design, and analysis of promising symmetric cryptographic transformations based on block ciphers. Bulletin of the National University "Lviv Polytechnic"</article-title>
          .
          <source>Computer Systems and Networks</source>
          .
          <year>2014</year>
          . № 806, с.
          <fpage>124</fpage>
          -
          <lpage>141</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Sobchuk</surname>
            <given-names>V. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laptev</surname>
            <given-names>O. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohasii</surname>
            <given-names>S. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barabash</surname>
            <given-names>A. O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salanda</surname>
            <given-names>I. P</given-names>
          </string-name>
          .
          <article-title>Mathematical model for protecting an information network based on hierarchical hypernetworks</article-title>
          .
          <source>Scientific discussion. Praha</source>
          , Czech Republic,
          <year>2021</year>
          . Vol 1. No 61.
          <string-name>
            <surname>Р</surname>
          </string-name>
          .
          <volume>31</volume>
          -
          <fpage>36</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>[16] GOST 34</source>
          .
          <fpage>601</fpage>
          -
          <lpage>90</lpage>
          . Information technology.
          <source>Set of standards for automated systems. Automated systems. Stages of development</source>
          . URL:http://online.budstandart.com/ua/catalog/docpage.html?id_doc=
          <fpage>53626</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Ian</surname>
            <given-names>F Akyildiz</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tommaso Melodia</surname>
          </string-name>
          , and
          <string-name>
            <surname>Kaushik R Chowdury.</surname>
          </string-name>
          <article-title>Wireless multimedia sensor networks: A survey</article-title>
          .
          <source>IEEE Wireless Communications</source>
          ,
          <volume>14</volume>
          (
          <issue>6</issue>
          ):
          <fpage>32</fpage>
          -
          <lpage>39</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>