Abstract:
Today, ensuring cybersecurity is a crucial consideration when designing IoT systems. Particular attention should be paid to the rapidly growing IoT networks. IoT network nodes typically have low computational capabilities, have small memory resources, use wireless links and limited power sources, and often operate in hostile environments and are therefore vulnerable to unauthorized intrusion [1] [2]. With such limited resources, it is challenging to ensure data integrity and confidentiality and adequate system security.