FUNCTIONAL MODELING AND ALGORITHMIZATION OF PROCESSES FOR ENSURING CYBER RESILIENCE OF AUTOMATED DISPENSING SYSTEMS FOR PERSONAL PROTECTIVE EQUIPMENT

Authors

DOI:

https://doi.org/10.35546/kntu2078-4481.2025.4.3.15

Keywords:

cyber resilience, Industrial Internet of Things, edge computing, fail-safe, hash chaining, service availability, denial-of-service attacks, process automation, occupational safety, business continuity

Abstract

The article addresses the urgent scientific and practical problem of ensuring cyber resilience and operational continuity of automated personal protective equipment (PPE) dispensing systems under destructive cyber impacts. In the Industry 4.0 era, digitalization covers critical occupational safety processes; however, the increasing reliance on network stability creates significant risks of blocking access to protective equipment during cyber incidents. The study provides a comprehensive analysis of the vulnerabilities inherent in classic centralized Industrial Internet of Things (IIoT) architectures. These systems are characterized by a critical reliance on server infrastructure availability and susceptibility to "functional paralysis" during Denial-of-Service (DoS) attacks. Specifically, the limitations of traditional Fail-Secure approaches are highlighted, as they are unacceptable for critical occupational safety infrastructure where the physical availability of resources is the priority, rather than access blocking. The methodological basis of the research is functional modeling of business processes using the IDEF0 standard. This approach allowed for the decomposition of the emergency management process and the identification of critical vulnerabilities at the transaction commitment stage. To address these issues, a hybrid architecture and algorithmic support based on Edge Computing technology are proposed. This enables the decentralization of decision-making logic and transfers the access rights validation process directly to the endpoint level. The developed adaptive cyber resilience algorithm is implemented based on a three-state Finite State Machine (FSM): normal operation (ONLINE), transitional mode (DEGRADED), and emergency mode (OFFLINE). To protect the integrity of offline transactions and prevent data falsification in an isolated environment, a mechanism of cryptographic record encapsulation using hash chaining technology based on the SHA-256 algorithm is applied. Simulation results, conducted using Python, confirm the approach's effectiveness. The experiments demonstrated that under conditions of a prolonged DoS attack, the proposed system ensures a service availability rate of over 98%, whereas the classic architecture demonstrates a complete cessation of service. Furthermore, the effectiveness of the implemented batch data synchronization protocol, which prevents network overload during the connection recovery phase, was proven.

References

Lezzi M., Corallo A., Lazoi M., Nimis A. В Measuring cyber resilience in industrial IoT: a systematic literature review. Management Review Quarterly. 2025. URL: https://doi.org/10.1007/s11301-025-00495-8.

Yang H., Dai L., Ma Y., Li Q., Xia Y. Resilient MPC With Switched Cost Functions for Cyber-Physical Systems Against DoS Attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems 2025. Vol. 55. P. 4444–4457. https://doi.org/10.1109/tsmc.2025.3555826.

Tang X., Zhao K., Qu H., Wang J. Adaptive event‐triggered efficient output feedback model predictive control for networked interval type‐2 T–S fuzzy system with data loss. International Journal of Robust and Nonlinear Control. 2023. Vol. 34. P. 1673–1695. https://doi.org/10.1002/rnc.7049.

Wang Y., Zhu F. Consensus Control for Nonlinear Multi-Agent Systems. IEEE Transactions on Automation Science and Engineering. 2025. Vol. 22. P. 10470–10483. https://doi.org/10.1109/tase.2024.3524258.

Dildar M., Khan A., Abbasi I., Akhtar R., Ruqaishi K., Sarwar S. End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things. IEEE Access. 2025. Vol. 13. P. 20584–20598: https://doi.org/10.1109/access.2025.3535821.

Oh T. Blockchain-Enabled Security Enhancement for IoT Networks: Integrating LEACH Algorithm and Distributed Ledger Technology. Journal of Machine and Computing. 2025: https://doi.org/10.53759/7669/jmc202505038.

Segovia-Ferreira M., Rubio-Hernán J., Cavalli A., García-Alfaro J. Survey on Cyber-Resilience Approaches for Cyber-Physical Systems. ACM Computing Surveys. 2023. Vol. 56. P. 1–37: https://doi.org/10.1145/3652953.

Liu S., Trivedi A., Yin X., Zamani M. Secure-by-Construction Synthesis of Cyber-Physical Systems. Annu. Rev. Control. 2022. Vol. 53. P. 30–50. https://doi.org/10.1016/j.arcontrol.2022.03.004.

Bakirtzis G., Sherburne T., Adams S., Horowitz B., Beling P., Fleming C. An ontological metamodel for cyber- physical system safety, security, and resilience coengineering. Software and Systems Modeling. 2020. Vol. 21. P. 113–137: https://doi.org/10.1007/s10270-021-00892-z.

Крайнюк О. В., Буц Ю. В., Барбашин В. В., Яцюк М. В. Використання штучного інтелекту для управління безпекою праці. Комунальне господарство міст. Серія: Технічні науки та архітектура. 2023. № 6(180). С. 207–214. https://doi.org/10.33042/2522-1809-2023-6-180-207-213

Крайнюк О., Буц Ю., Барбашин В., Козодой Д., Козодой О. Інтелектуальні системи управління безпекою праці на основі штучного інтелекту: перспективи інтеграції в українське законодавство. Комунальне господарство міст. 2024. № 6(187). С. 242–251. https://doi.org/10.33042/2522-1809-2024-6-187-242-251.

Крайнюк О. В., Буц Ю. В., Богатов О. І., Лоцман П. І., Барбашин В. В. Управління засобами індивідуального захисту за допомогою вендингових автоматів. The 9th International scientific and practical conference “Study of world opinion regarding the development of science”. 2022. P. 672–678. URL: https://doi.org/10.46299/ISG.2022.2.9.

Published

2025-12-31