<?xml version="1.0"?>
<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Journal of Technical Research</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Journal of Technical Research</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Журнал технических исследований</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="print">2500-3313</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">122812</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>Информационные технологии и телекоммуникации</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>Information technology and telecommunication</subject>
    </subj-group>
    <subj-group>
     <subject>Информационные технологии и телекоммуникации</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">The internet of things and its impact on network security: new threats and solutions</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Интернет вещей и его влияние на безопасность сетей: новые угрозы и решения</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-8104-5758</contrib-id>
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Лоскутов</surname>
       <given-names>И. А.</given-names>
      </name>
      <name xml:lang="en">
       <surname>Loskutov</surname>
       <given-names>Ivan Andreevich</given-names>
      </name>
     </name-alternatives>
     <email>faxvex@ya.ru</email>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Ярусова</surname>
       <given-names>С. Д.</given-names>
      </name>
      <name xml:lang="en">
       <surname>Yarusova</surname>
       <given-names>S. D.</given-names>
      </name>
     </name-alternatives>
     <xref ref-type="aff" rid="aff-2"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">МИРЭА – Российский технологический университет</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">MIREA – Russian technological university</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-2">
    <aff>
     <institution xml:lang="ru">Колледж телекоммуникаций ордена Трудового красного знамени ФГБОУ ВО «Московский технический университет связи и информатики»</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">College of Telecommunications of the Order of the Red Banner of Labor Moscow Technical University of Communications and Informatics</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2026-03-31T00:00:00+03:00">
    <day>31</day>
    <month>03</month>
    <year>2026</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2026-03-31T00:00:00+03:00">
    <day>31</day>
    <month>03</month>
    <year>2026</year>
   </pub-date>
   <volume>12</volume>
   <issue>1</issue>
   <fpage>3</fpage>
   <lpage>9</lpage>
   <history>
    <date date-type="received" iso-8601-date="2026-01-18T00:00:00+03:00">
     <day>18</day>
     <month>01</month>
     <year>2026</year>
    </date>
    <date date-type="accepted" iso-8601-date="2026-02-20T00:00:00+03:00">
     <day>20</day>
     <month>02</month>
     <year>2026</year>
    </date>
   </history>
   <self-uri xlink:href="https://zh-szf.ru/en/nauka/article/122812/view">https://zh-szf.ru/en/nauka/article/122812/view</self-uri>
   <abstract xml:lang="ru">
    <p>В статье проводится анализ влияния технологий Интернета вещей на информационную безопасность сетей. В работе рассматривается традиционная и расширенная многоуровневая архитектура ИВ, основные угрозы, распределённые по уровням архитектуры, а также новые их виды, направленные на компоненты искусственного интеллекта. Обзор научной литературы показал высокую актуальность проблемы в условиях быстрого роста количества подключённых устройств и их ограниченных ресурсов. В связи с этим предложены практические рекомендации по минимизации рисков, включающие использование лёгкой криптографии, блокчейн-технологий, многоуровневой защиты по принципу security-by-design и соблюдения регуляторных требований. Особое внимание уделено математическому моделированию рисков и эффективности защитных механизмов для ресурсоограниченных ИВ-систем.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>The article analyzes the impact of Internet of Things technologies on the information security  of networks. The study examines traditional and extended multi-level IoT security architectures,  the main threats distributed across architectural levels, as well as new types of threats targeting artificial intelligence components. A review of the scientific literature highlights the high relevance of the problem in the context of the rapid growth in the number of connected devices and their limited resources. In this regard, practical recommendations for risk mitigation are proposed, including  the use of lightweight cryptography, blockchain technologies, multi-level security based on the security-by-design principle, and compliance with regulatory requirements. Special attention is paid to mathematical modeling of risks and the effectiveness of protection mechanisms for resource-constrained IoT systems.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>Интернет вещей</kwd>
    <kwd>информационная безопасность</kwd>
    <kwd>киберугрозы</kwd>
    <kwd>архитектура</kwd>
    <kwd>оценка рисков</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>Internet of Things</kwd>
    <kwd>information security</kwd>
    <kwd>cyber threats</kwd>
    <kwd>architecture</kwd>
    <kwd>risk assessment</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">S. Saravana Kumar, Balaji Kannan, &quot;Enhancing Industrial IoT Security with AI and Cloud Computing: A Review of Threats and Solutions&quot;, 2025 International Conference on Modern Sustainable Systems (CMSS), pp.1082-1089, 2025.</mixed-citation>
     <mixed-citation xml:lang="en">S. Saravana Kumar, Balaji Kannan, &quot;Enhancing Industrial IoT Security with AI and Cloud Computing: A Review of Threats and Solutions&quot;, 2025 International Conference on Modern Sustainable Systems (CMSS), pp.1082-1089, 2025.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">DDoS-атаки в 2025 году: цифры, тренды, аналитика // StormWall. – 2026. – 23 января. – URL: https://stormwall.pro/resources/blog/ddos-trendy-2025 (дата обращения: 09.03.2026).</mixed-citation>
     <mixed-citation xml:lang="en">DDoS-ataki v 2025 godu: cifry, trendy, analitika // StormWall. – 2026. – 23 yanvarya. – URL: https://stormwall.pro/resources/blog/ddos-trendy-2025 (data obrascheniya: 09.03.2026).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">12 уровней IIoT-архитектуры: от периферийных датчиков до аналитики Big Data // BigDataSchool. – 2019. – 10 ноября. – URL: https://bigdataschool.ru/blog/iiot-architecture-levels-and-tools/ (дата обращения: 07.04.2026).</mixed-citation>
     <mixed-citation xml:lang="en">12 urovney IIoT-arhitektury: ot periferiynyh datchikov do analitiki Big Data // BigDataSchool. – 2019. – 10 noyabrya. – URL: https://bigdataschool.ru/blog/iiot-architecture-levels-and-tools/ (data obrascheniya: 07.04.2026).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Атаки на Android и IoT выросли в несколько раз в 2025 году // SecPost. – 2025. – 6 ноября. – URL: https://secpost.ru/mobilnye-i-iot-ugrozy-2025-42-milliona-skachivanij-vredonosov-i-rost-atak-na-promyshlennost (дата обращения: 05.04.2026).</mixed-citation>
     <mixed-citation xml:lang="en">Ataki na Android i IoT vyrosli v neskol'ko raz v 2025 godu // SecPost. – 2025. – 6 noyabrya. – URL: https://secpost.ru/mobilnye-i-iot-ugrozy-2025-42-milliona-skachivanij-vredonosov-i-rost-atak-na-promyshlennost (data obrascheniya: 05.04.2026).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Emerging Threats &amp; Vulnerabilities to Prepare for in 2025 // Dark Reading. – 2024. – 26 декабря. – URL: https://www.darkreading.com/vulnerabilities-threats/emerging-threats-vulnerabilities-prepare-2025 (дата обращения: 30.03.2026).</mixed-citation>
     <mixed-citation xml:lang="en">Emerging Threats &amp; Vulnerabilities to Prepare for in 2025 // Dark Reading. – 2024. – 26 dekabrya. – URL: https://www.darkreading.com/vulnerabilities-threats/emerging-threats-vulnerabilities-prepare-2025 (data obrascheniya: 30.03.2026).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">NIST утвердил стандарт быстрой криптографии Ascon для защиты IoT-устройств // Anti-Malware.ru. – 2025. – 15 августа. – URL: https://www.anti-malware.ru/news/2025-08-15-111332/47003 (дата обращения: 25.03.2026).</mixed-citation>
     <mixed-citation xml:lang="en">NIST utverdil standart bystroy kriptografii Ascon dlya zaschity IoT-ustroystv // Anti-Malware.ru. – 2025. – 15 avgusta. – URL: https://www.anti-malware.ru/news/2025-08-15-111332/47003 (data obrascheniya: 25.03.2026).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin. Blockchain based distributed trust management in IoT and IIoT: a survey. Journal of Supercomputing, 2024, 80 (15), pp.21867-21919.</mixed-citation>
     <mixed-citation xml:lang="en">Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin. Blockchain based distributed trust management in IoT and IIoT: a survey. Journal of Supercomputing, 2024, 80 (15), pp.21867-21919.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Cyber Resilience Act // European Commission. Shaping Europe’s digital future. – 2025. – URL: https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act (дата обращения: 10.04.2026).</mixed-citation>
     <mixed-citation xml:lang="en">Cyber Resilience Act // European Commission. Shaping Europe’s digital future. – 2025. – URL: https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act (data obrascheniya: 10.04.2026).</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
