Proceedings of International Conference on Applied Innovation in IT
2024/03/07, Volume 12, Issue 1, pp.1-10

Turing Machine Development for High-secure Data Link Encoding in the Internet of Things Channel


Victor Tikhonov, Abdullah Taher, Serhii Tikhonov, Kateryna Shulakova, Vlad Hluschenko and Andrii Chaika


Abstract: The work considers the issues of data stream encoding in the IoT systems and networks in the context of information security provision, with particular focus on the data link layer in wireless and wired telecommunication channels. The problem state of the art shows a great progress in the sphere of IT cybersecurity based on Advanced Encryption Standard. However, new tasks and related threats emerge, such as unmanned mobile devices of mass disposable with remote control, for which known approaches are not reliable and efficient enough. In this respect, the common algorithms of data link frame encoding are studied, and original formalization of typical frames proposed for static and dynamic representation. An original method introduced for high-secure data encoding with variable frame structure. A formal grammar of an abstract Turing machine (TM) is developed for data link encoding, which is based on ternary line-signaling and three-bit command system. Constructed typical frame-patterns with the use of TM syntax. General principles are formulated for the high-secure frame encoding with variable structure for packet-based streaming on the data link layer with the use of TM algorithm. The results of the work intend to improve the mobile objects cyber-threats protection, as well as to remote vehicle control and other IoT real-time applications.

Keywords: Internet of Things, Information Security, Data Link Encryption, Data Framing, Formal Grammar, Turing Machine, Packet-Based Streaming

DOI: 10.25673/1156354; PPN 1884579426

Download: PDF

References:

  1. D. Hanes, et al., "IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things," Cisco Press, USA, 2017, pp. 543.
  2. International Telecommunication Union, "ITU-T's Definition of NGN," 2004.
  3. S. Wali, "The Internet: Opportunities and Challenges," 2022.
  4. M. Aqeel, et al., "A Review of Security and Privacy Concerns in the Internet of Things (IoT)," 2022.
  5. IEEE Computer Society, "The Internet of Things (IoT) to Cloud: Computing and Communication Gateways," 2023.
  6. J.E. Hopcroft, et al., "Introduction to Automata Theory, Languages, and Computation," 3rd ed., Pearson Education, 2008, pp. 554, [Online]. Available: https://openlibrary.org/books/OL24357442M/Introduction_to_automata_theory_languages_and_computation.
  7. F.J. Duarte and T.S. Taylor, "Quantum entanglement in matrix notation," in "Quantum Entanglement Engineering and Applications," 2021, ch. 7, pp. 1-9.
  8. D. Craigen, et al., "Defining Cybersecurity," 2014, [Online]. Available: https://www.researchgate.com/publication/267631801_Defining_Cybersecurity.
  9. F. Schiliro, "Towards a Contemporary Definition of Cybersecurity," 2022, [Online]. Available: https://arxiv.org/ftp/arxiv/papers/2302/2302.02274.pdf.
  10. R. Kaur, D. Gabrijelčič, and T. Klobučar, "Artificial intelligence for cybersecurity: Literature review and future research directions," Elsevier, Information Fusion, vol. 97, 2023.
  11. F.D. Talbot, "The Internet is broken," MIT Technology Review, 2006, [Online]. Available: https://www.technologyreview.com/2006/02/15/229667/the-internet-is-broken/.
  12. A.C. Franco da Silva and P. Hirmer, "Models for Internet of Things Environments. A Survey," Information, vol. 11, no. 10, p. 487, 2020.
  13. J. Voas, "NIST Special Publication 800-183. Networks of Things," Computer Security Division, Information Technology Laboratory, 2016.
  14. C. Vleugels, "Human communication," [Online]. Available: https://osuokc.edu/sites/default/files/documents/arts/SPCH-1113-Speech-%26-Communication.pdf.
  15. V. Kota, "RC4 Cipher," 2021, [Online]. Available: https://www.linkedin.com/pulse/rc4-cipher-venkata -siva-naga-sai-kota?trk=public_profile_article view.
  16. D. Ghimiray, "Wi-Fi Security: WEP vs WPA or WPA2," [Online]. Available: https://www.avast.com/c-wep-vs-wpa-or-wpa2.
  17. G. Singh, "WEP Encryption and Its Vulnerability in Detail," 2023, [Online]. Available: https://tbhaxor.com/wep-encryption-in-detail.
  18. "How WPA2 differs to WEP and WPA," [Online]. Available: https://www.nfon.com/en/get-started/cloud-telephony/lexicon/knowledge-base-detail/wpa2.
  19. IDERA Inc., "What is AES 256-bit Encryption?", 2024, [Online]. Available: https://www.idera.com/aes-256-bit-encryption.
  20. "What is WPA3 vs. WPA2?" [Online]. Available: https://www.portnox.com/cybersecurity-101/wpa3.


    HOME

       - Call for Papers
       - Paper Submission
       - For authors
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 12, Issue 1 (ICAIIT 2024)        - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

DOI: http://dx.doi.org/10.25673/115729


        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.