Analysis of Technical Solutions for Identification of Internet Things in Modern Communication Networks


  • Viktor Vyshnivskyi State University of Telecommunications, Kyiv
  • Iryna Sribna State University of Telecommunications, Kyiv
  • Olha Zinchenko State University of Telecommunications, Kyiv



internet of things, digital object architecture, identification, delay, handle system, methods of queuing theory, digital object, global handle registry, local handle registry, local handle service


The article examines the current state of development of the Internet of Things and the principles of their identification; analysis of technical solutions for identification of the Internet of Things in modern communication networks; the parameters of quality of service and identification of devices and applications of the Internet of Things are investigated, and also the perspective method of construction of network architecture IoT with intermediate level of interaction which differs from known that allows to reduce network delay at exchange of service messages between local and global registers of system is investigated. Based on the obtained delay values, we can conclude that in order to minimize the delay, it is necessary to optimize the routes for accessing GHR servers. Considering the differences between the main components of the identification system, it is worth noting the combination of Global Handle Register and Local Handle Register in one object for testing. In the long run, this makes it possible to evaluate the multiple characteristics of the system at the application level. The resulting system in stationary execution also allows you to clearly demonstrate the speed of the identification rate, the route of service traffic and other parameters.

Author Biographies

Viktor Vyshnivskyi, State University of Telecommunications, Kyiv

Head of Department of Computer Science

Doctor of Engineering Science. Professor

Iryna Sribna , State University of Telecommunications, Kyiv

Department State Information Systems and Technologies

Candidate of Science (Engineering).  Associate Professor

Olha Zinchenko, State University of Telecommunications, Kyiv

Head of the Department of Artificial Intelligence

Candidate of Science (Engineering). Associate Professor


R. Kirichek, V. Kulik, and A. Koucheryavy, “False clouds for Internet of Things and methods of protection,” Proceedings of the 18th International Conference on Advanced Communication Technology (ICACT, Pyeongchang, South Korea, 31 January–3 February 2016). Piscataway, NJ: IEEE, 2016, pp. 201–205.

M. Al-Bahri, A. Yankovsky, R. Kirichek, and A. Borodin, “Smart System Based on DOA and IoT for Products Monitoring and Anti-Counterfeiting,” Proceedings of the 4th MEC International Conference on Big Data and Smart City (ICBDSC, Muscat, Oman, 15–16 January 2019). Piscataway, NJ: IEEE, 2019.

M. Al-Bahri, A. Yankovsky, A. Borodin, and R. Kirichek, “Testbed for Identify IoT-Devices Based on Digital Object Architecture," Internet of Things, Smart Spaces, and Next Generation Networks and Systems. Proceedings of the 18th International Conference, NEW2AN, and the 11th Conference, ruSMART (27–29 August 2018, St. Petersburg, Russia). Lecture Notes in Computer Science. Cham: Springer, vol. 11118, 2018, pp. 129–137.

M. Albahri, R. Kirichek, A. A. Ateya, A. Muthanna, and A. Borodin, “Combating Counterfeit for Io T System Based on DOA,” Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT, 5–9 November, 2018, Moscow, Russia). Piscataway, NJ: IEEE, 2018.

M. S. Al-Bahri, R. V. Kirichek, and D. D. Sazonov, “Modeling the system of identification of devices of the Internet of things based on the architecture of digital objects,” Proceedings of educational institutions of communication, vol. 5, no. 1, 2019, pp. 42–47. [in Russian]

M. Weyrich and C. Ebert, “Reference architectures for the internet of things,” IEEE Software, vol. 33, no. 1, 2016, pp. 112–116.

V. G. Ivanenko and N. V. Ushakov, “Digital watermarks in electronic document flow,” Security of information technologies, no. 3, pp. 37–42, 2017. [in Russian]