The paper presents a substantiation of the effectiveness of the implementation of IEEE 802.11 wireless network analysis subsystem using miniature spectrum analyzers. A practical implementation scheme, approaches to the software solution and hardware are shown. Design and implementation is presented.
The article is devoted to the problem of practical skills building and development of students majoring in 125 "Cybersecurity". An analysis of the professional competencies of future cybersecurity professionals, in particular, related to technical protection of information. It is proved that the use of virtual laboratories in the educational process helps to increase the efficiency of the educational process and allows to form and improve the professional competencies of the future cybersecurity engineer. Education becomes practice-oriented. The possibilities of a virtual laboratory workshop based on the NI Multisim environment are considered in the study of disciplines "Theory of circles and signals in information and cyberspace", "Component base and elements of circuitry in information security systems", "Signals and processes in information security systems". The Multisim system is used as part of the training of future cybersecurity professionals at Borys Grinchenko Kyiv University and has proven its effectiveness in practice.
The article presents a method which organizes men-in-the-middle attack and penetration test on Bluetooth Low Energy devices and ZigBee packets by using software define radio with sniffing and spoofing packets, capture and analysis techniques on wireless waves with the focus on BLE. The paper contains the analysis of the latest scientific works in this area, provides a comparative analysis of SDRs with the rationale for the choice of hardware, gives the sequence order of actions for collecting wireless data packets and data collection from ZigBee and BLE devices, and analyzes ways which can improve captured wireless packet analysis techniques. The results of the experimental setup, collected for the study, were analyzed in real time and the collected wireless data packets were compared with the one, which have sent the origin. The result of the experiment shows the weaknesses of local wireless networks.
The article is devoted to the definition of problems using of blockchain technologies, and ways to overcome them to create distributed, secure applications. The paper considers the theoretical fundamentals of blockchain technologies and blockchain applications, new models of blockchain business, blockchain applications development platform, blockchain applications security, blockchain applications development problems, prospects for further research. The analysis of recent research and publications in the field of blockchain technologies are made in the article. Based on this analysis, it was determined that the blockchain industry has not yet completed the process of generating a generally accepted multilevel technology description. The overview of existing models of business blockchain, their characteristics and areas of application are done in the article. Software tools for creating and maintaining blockchain applications are considered. The article deals with the features, advantages and problems of using blockchain technology for creating distributed, secure applications. The problem of integration of new and existing private systems with an open blockchains is considered. A possible solution to this problem is the creation of a blockchain authentication service to implement a global security level. Such a service can become a standard security infrastructure for new models of mixed private and public systems that will be useful to all participants in different areas of the economy. The directions of development of protected blockchain applications in the sphere of public administration and private business in Ukraine are determined. In addition, the priority tasks that need to be solved for successful implementation of technology in Ukraine are determined based on the analysis of the current state of development of blockchains. There are three main areas of development of blockade technology: standardization, application security and integration of block systems with existing private systems and modern technologies of artificial intelligence, large data and the Internet of things, and described prospects for further research for them.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.