
Vladimir SokolovBorys Grinchenko Kyiv University · Faculty of Information Technologies and Management
Vladimir Sokolov
Doctor of Philosophy
About
60
Publications
10,511
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
144
Citations
Introduction
Security of wireless technologies
Skills and Expertise
Research experience
January 2020 - April 2020
September 2018 - December 2019
September 2009 - August 2018
State University of Telecommunications
Position
- Professor (Associate)
Education
October 2019 - October 2019
Institute of Telecommunications and Global Information Space
Field of study
- Information Technology
September 2001 - June 2005
Publications
Publications (60)
The paper introduces a new scheme of dynamic interference free channel allocation. The scheme is based on additional spectral analyzers in wireless networks IEEE 802.11. Design and implementation is presented.
The paper examines quantitative assessment of wireless distribution system security, as well as an assessment of risks from attacks and security violations. Furthermore, it describes typical security breach and formal attack models and five methods for assessing security. The proposed normalized method for assessing the degree of security assurance...
The article presents a method which organizes men-in-the-middle at-tack and penetration test on Bluetooth Low Energy devices and ZigBee packets by using software define radio with sniffing and spoofing packets, capture and analysis techniques on wireless waves with the focus on BLE. The paper contains the analysis of the latest scientific works in...
При формуванні баз даних, наприклад для задоволення потреб закладів охорони здоров’я, доволі часто виникає проблема щодо введення та подальшої обробки імен і прізвищ лікарів і пацієнтів, які є вузькоспеціалізованими за вимовою і написанням. Це пояснюється тим, що імена та прізвища людей не можуть бути унікальними, їх напис не підпадає під жодні пра...
Information security risk assessment is an important part of enterprises' management practices that helps to identify, quantify, and prioritize risks against criteria for risk acceptance and objectives relevant to the organization. Risk management refers to a process that consists of identification , management, and elimination or reduction of the...
This paper investigates the lifespan of an IoT device transmitting en-crypted data as a function of the encryption algorithm used and the packet length. We focus the analysis particularly on lightweight algorithms popular in IoT ecosystems , such as AES, XTEA, HIGHT, KLEIN, ECC, PRESENT, Serpent, Piccolo, Blowfish, and Twofish. The results of the s...
In the paper, we present a software pipeline for speech recognition to automate the creation of training datasets, based on desired unlabeled audios, for low resource languages and domain-specific area. Considering the commoditizing of speech recognition, more teams build domain-specific models as well as models for local languages. At the same tim...
Authentication and authorization are an indispensable piece of security in computer-based frameworks. As an option for biometrics, electroencephalography (EEG) authentication (authorization) presents focal points contrasted with other biological qualities. Brainwaves are difficult to reproduce, and diverse mental undertakings produce various brainw...
This paper outlines structures of different automatic speech recognition systems, hybrid and end-to-end, pros and cons for each of them, including the comparison of training data and computational resources requirements. Three main approaches to speech recognition are considered: hybrid Hidden Markov Model-Deep Neural Network, end-to-end Connection...
An overview of the properties of three classes of curves in generalized Edwards form Ea,d with two parameters is given. The known formulas for the odd degree isogenies on curves Ed with one parameter are generalized to all classes of curves in Edwards form, and Theorem 1 on the isogenic mapping of the points of these curves is proved. The analysis...
The paper presents a substantiation of the effectiveness of IEEE 802.11 wireless network analysis subsystem implementation using miniature spectrum analyzers. Also it was given an overview of firmware work scheme, development process of trial versions, monitoring system development approaches, current development stage, infrastructure for research...
This paper attempts to optimize the phonetic search processes for fuzzy matching tasks, such as deduplication of data in various databases and registers to reduce the number of errors in personal data entry (for instance, last names). The analysis of the most common last names in the territory of Ukraine shows that the majority of these last names...
The effectiveness of phishing attacks is being analyzed by many researchers. At the same time, researches often deal with the random sample of people suffered a phishing attack and are limited with analysis of consequences of unrelated cases without conducting an actual phishing experiment. Experiments typically involve a small number of respondent...
The number and complexity of cybercrime are constantly growing. New types of attacks and competition are emerging. The number of systems is growing faster than new cybersecurity professionals are learning, making it increasingly difficult to track users' actions in real-time manually. E-commerce is incredibly active. Not all retailers have enough r...
The article considers the problem of ensuring the availability and integrity of wireless subscribers in cellular and other wireless corporate networks. The article aims to determine the threshold values for the moment of failure of video transmission, quantitative parameters, artifacts, and the number of errors for the image. Show the dependence of...
The analysis of the 2-isogeny existence conditions of generalized Edwards form curves over a prime field, including complete, quadratic, and twisted Edwards curves, is presented. An overview of the properties of these three classes of curves is given. Generalization of the results known for the classes of complete and quadratic curves to the class...
The article considers the methods that affect the operation of the intrusion detection system. Using the "disconnection task," a two-stage criterion for detecting anomalies in computer networks has been formed, which provides an analysis of network infrastructure characteristics and their identification with specific computer attacks and provides t...
Over the last decade, the area of electroencephalography (EEG) witnessed a progressive move from high-end large measurement devices, relying on accurate construction and providing high sensitivity, to miniature hardware, more specifically wireless wearable EEG devices. While accurate, traditional EEG systems need a complex structure and long period...
The paper shows an investigation utilizing assaults, for example, a phony passage and a phishing page. The past distributions on social building have been checked on, insights of separations are investigated and bearings and component of acknowledgment of assaults having components of social designing are examined. The information from the examinat...
An analysis is made of the properties and conditions for the existence of 3- and 5-isogenies of complete and quadratic supersingular Edwards curves. For the encapsulation of keys based on the SIDH algorithm, it is proposed to use isogeny of minimal odd degrees 3 and 5, which allows bypassing the problem of singular points of the 2nd and 4th orders,...
An analysis is made of the properties and conditions for the existence of 3-and 5-isogenies of complete and quadratic supersingular Edwards curves. For the encapsulation of keys based on the SIDH algorithm, it is proposed to use isogeny of minimal odd 3 and 5 degrees, which allows bypassing the problem of singular points of the 2 nd and 4 th orders...
These improvements open many possibilities in solving Natural Language Processing downstream tasks. Such tasks include machine translation, speech recognition, information retrieval, sentiment analysis, summarization, question answering, multilingual dialogue systems development, and many more. Language models are one of the most important componen...
An analysis is made of the properties and conditions for the existence of 3- and 5-isogenies of complete and quadratic supersingular Edwards curves. For the encapsulation of keys based on the SIDH algorithm, it is proposed to use isogeny of minimal odd degrees 3 and 5, which allows bypassing the problem of singular points of the 2nd and 4th orders,...
Caller ID parodying produces the valid Caller character, in this manner deciding seem to start from another client. This apparently basic assault strategy has been utilized in the developing communication fake and trick calls, bringing about significant financial trouble. Unfortunately, callerID spoofing is easy to implement but yet it is difficult...
The paper examines the possibility and practical approach of combining the higher education standards in Ukraine and the best international practices in the training “Cybersecurity” specialists, since the process of transformation and formation of the world information society will gain momentum. The National Sustainable Development Strategy (see 3...
Caller ID parodying produces the valid Caller character, in this manner deciding seem to start from another client. This apparently basic assault strategy has been utilized in the developing communication fake and trick calls, bringing about significant financial trouble. Unfortunately, callerID spoofing is easy to implement but yet it is difficult...
The problem of data security in IEEE 802.15.4 systems on Pololu Wixel devices is solved, examples of hardware and software implementation of encryption and decryption of different devices on the same platform are given. The proposed approaches can be used in the development, implementation and operation of wireless enterprise, industrial, and perso...
У роботі вирішене завдання безпечності передачі даних в системах типу IEEE 802.15.4 на пристроях Pololu Wixel, наведені приклади апаратно-програмної реалізації шифрування і розшифрування різними пристроями на одній платформі. Запропоновані підходи можуть бути використані при розробці, впровадженні та експлуатації безпроводових корпоративних, промис...
When compiling databases, for example to meet the needs of healthcare establishments, there is quite a common problem with the introduction and further processing of names and last names of doctors and patients that are highly specialized both in terms of pronunciation and writing. This is because names and last names of people cannot be unique, th...
The article presents the research and comparative analysis of the bandwidth of low-power wireless IoT devices as wireless switches. The following IoT devices were investigated: Raspberry Pi 3 Model B and Raspberry Pi Zero W. The DS18B20 and INA219 sensors investigated and analyzed the dependence of FTP multimedia data transmission speed on wireless...
The dissertation is devoted to the actual scientific and practical problem of developing methods for guaranteeing the reliability and functional safety of wireless infrastructure on based on hardware division of subscribers to increase its level of protection against security threats of diverse nature consisting of the developed theoretical foundat...
This paper represents the approach for estimation of the lifetime of the IoT end devices. The novelty of this approach is in the taking into account not only the energy consumption for data transmission, but also for ensuring the security by using the encryption algorithms. The results of the study showed the effect of using data encryption during...
The article presents the research and comparative analysis of the bandwidth of low-power wireless IoT devices as wireless switches. The following IoT devices were investigated: Raspberry Pi 3 Model B and Raspberry Pi Zero W. The DS18B20 and INA219 sensors investigated and analyzed the dependence of FTP multimedia data transmission speed on wireless...
The widespread use of wireless technologies leads to an ever-increasing number of users and permanently functioning devices. However, the growth of the number of wireless users in a limited space and a limited frequency range leads to an increase in their mutual influence, which ultimately affects the throughput of wireless channels and even the pe...
The article presents a method of organizing men-in-the-middle attack and penetration test on Bluetooth Low Energy devices and ZigBee packets using software define radio with sniffing and spoofing packets, capture and analysis techniques on wireless waves with the focus on Bluetooth. The paper contains the analysis of the latest scientific work in t...
The CDIO initiative has been developed with the participation of scientists,
industry representatives, engineers and students as a template. CDIO is an open
source model that is accessible to all top technical specialties, can be
tailored to specific needs and is accepted by an increasing number of technical
higher education institutions around the...
To date, there is a need for the development of efficient data and device exchange protocols that this exchange will provide, since standard protocols used in traditional networks can not fully meet the needs of a new type of network. The article describes the process of development and implementation of a full-scale model of noise-resistant and se...
This article discusses the available Software Defined Radios (SDRs), compatible software, message formats, and also shows how it is possible to do penetration tests using SDR for Bluetooth Low Energy (BLE) and ZigBee technologies.
The rapid development of "smart" devices leads to explosive growth of unprotected or partially protected home networks. These networks are easy prey for unauthorized access, the collection of personal information (including from surveillance cameras), interference in the operation of individual devices and the entire system as a whole. In addition,...
The paper analyzes the physical fundamentals of spectrum analysis and security threats due to the inability to provide sufficient level of data integrity and availability in wireless networks. The device for the construction of spectrum analyzers was searched. The analysis of hardware and circuitry of systems is made. Based on these data, solutions...
The widespread use of wireless technologies leads to an ever-increasing number of users and permanently functioning devices. However, the growth of the number of wireless users in a limited space and a limited frequency range leads to an increase in their mutual influence, which ultimately affects the throughput of wireless channels and even the pe...
The paper shows an investigation utilizing assaults, for example, a phony passage and a phishing page. The past distributions on social building have been checked on, insights of separations are investigated and bearings and component of acknowledgment of assaults having components of social designing are examined. The information from the examinat...
The article deals with the development, implementation and research of the spectrum analyzers that can be used in sensor networks and Internet systems of things. As an operating frequency range, 2.4-2.5 GHz ISM is selected. At the stage of hardware selection, a comparative analysis of existing available microcontrollers for the analysis of the spec...
The article presents a study using attacks such as a fake access point and a phishing page. The previous publications on social engineering have been reviewed, statistics of break-ups are analyzed and directions and mechanism of realization of attacks having elements of social engineering are analyzed. The data from the research in three different...
This article attempts to create a software and hardware complex that can work autonomously and demonstrates the ease of implementation of attacks on denial of service on wireless networks, which in turn emphasizes the need to provide comprehensive protection of wireless networks.
KEYWORDS bot, botnet, wireless network, denial of service attack.
The article introduces a new scheme of dynamic interference free channel allocation. The scheme is based on additional spectral analyzers in wireless networks IEEE 802.11. Design and implementation is presented.
This laboratory workshop was created within the framework of the project ENGENSEC (544455-TEMPUS-1-2013-1-SE-TEMPUS-JPCR) and is part of the master’s degree in cybersecurity. The workshop was evaluated in State University of Telecommunications (Ukraine), Blekinge Institute of Technology (Sweden), and Kharkiv National University of Radioelectronics...
When using an accelerating metal-lamellar cylindrical lens to increase the signal level towards the remote subscriber of the wireless access system, a shadowing effect can be exerted on users outside the main lobe of the radiation pattern of this lens. The report presents the results of an experimental study of the field structure in the azimuth di...
The paper addresses new results of research on the use of an accelerating lens to increase throughput, range and noise immunity of exchange in a certain priority direction in the system of wireless access of IEEE 802.11 standard. Compared with previous works, efforts have been focused on solving these problems as applied to the MIMO systems, in whi...
We consider the experimental results and calculations of the impact of directed properties of the antennas with the range of 2.4 GHz on solving the problem of the “last mile” in wireless technology standard IEEE 802.11b. In the experiments to focus energy in a given subscriber direction there are applied electromagnetic accelerating metal-lamellar...
Projects
Projects (3)
An electronic scientific professional journal "Cybersecurity: Education, Science, Technique" is devoted to covering issues of research of theoretical, scientific, technical and technological problems related to the organization, creation of methods and means of ensuring protection of information and information security during its storage, processing and transmission from using modern mathematical methods and information technologies, as well as directions of scientific researches such as architecture and components of computer systems, modeling of information processes and computers modern systems, methods and algorithms of modern information technologies and software engineering.
Investigation of the mutual influence of wireless networks of different standards. Search for methods of sealing the spectrum and solving the problem of the last mile using accelerating lens antennas.
Development of Double Diploma Master Programs in Cyber Security
Web site: http://engensec.eu/























































![Fig. 1. IoT device operation cycle Then, according to [26], the...](profile/Ievgeniia-Kuzminykh/publication/335766322/figure/fig1/AS:802936670150656@1568446428174/IoT-device-operation-cycle-Then-according-to-26-the-traditional-power-consumption_Q320.jpg)














































