<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">mireabulletin</journal-id><journal-title-group><journal-title xml:lang="ru">Russian Technological Journal</journal-title><trans-title-group xml:lang="en"><trans-title>Russian Technological Journal</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">2782-3210</issn><issn pub-type="epub">2500-316X</issn><publisher><publisher-name>RTU MIREA</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.32362/2500-316X-2026-14-2-17-28</article-id><article-id custom-type="edn" pub-id-type="custom">XDBAIA</article-id><article-id custom-type="elpub" pub-id-type="custom">mireabulletin-1461</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАЦИОННЫЕ СИСТЕМЫ. ИНФОРМАТИКА. ПРОБЛЕМЫ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATION SYSTEMS. COMPUTER SCIENCES. ISSUES OF INFORMATION SECURITY</subject></subj-group></article-categories><title-group><article-title>Архитектура распределенной системы тестирования устройств интернета вещей на этапе их разработки</article-title><trans-title-group xml:lang="en"><trans-title>Architecture of a distributed system for testing Internet of Things devices at the development stage</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-6111-455X</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Беляков</surname><given-names>Д. С.</given-names></name><name name-style="western" xml:lang="en"><surname>Belyakov</surname><given-names>D. S.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Беляков Данила Сергеевич, старший преподаватель, кафедра комплексной информационной безопасности электронно-вычислительных систем, факультет безопасности</p><p>634050, Томск, пр-т Ленина, д. 40</p></bio><bio xml:lang="en"><p>Danila S. Belyakov, Senior Lecturer, Department of Complex Information Security of Computer Systems, Faculty of Security</p></bio><email xlink:type="simple">cauze4concern@yandex.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Томский государственный университет систем управления и радиоэлектроники<country>Россия</country></aff><aff xml:lang="en">Tomsk State University of Control Systems and Radioelectronics<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2026</year></pub-date><pub-date pub-type="epub"><day>09</day><month>04</month><year>2026</year></pub-date><volume>14</volume><issue>2</issue><fpage>17</fpage><lpage>28</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Беляков Д.С., 2026</copyright-statement><copyright-year>2026</copyright-year><copyright-holder xml:lang="ru">Беляков Д.С.</copyright-holder><copyright-holder xml:lang="en">Belyakov D.S.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://www.rtj-mirea.ru/jour/article/view/1461">https://www.rtj-mirea.ru/jour/article/view/1461</self-uri><abstract><sec><title>Цели</title><p>Цели. Цель работы заключается в разработке архитектуры распределенной системы тестирования устройств интернета вещей (Internet of Things, IoT), обеспечивающей защищенную передачу тестовых сценариев и их изолированное исполнение на исполнительных модулях. Актуальность исследования обусловлена стремительным ростом числа IoT-устройств, функционирующих в недоверенных вычислительных средах, где процесс тестирования может создавать риски утечки конфиденциальных данных или несанкционированного вмешательства в программное обеспечение.</p></sec><sec><title>Методы</title><p>Методы. Проведен сравнительный анализ существующих решений, таких как NI TestStand, MagicDAQ, PHiLIP и KEOLABS ContactLAB. Выполнено сопоставление их архитектурных компонентов и процессов жизненного цикла тестовых сценариев.</p></sec><sec><title>Результаты</title><p>Результаты. На основании анализа выделены основные этапы жизненного цикла, на которых применяются рассмотренные инструменты: подготовка и хранение, передача и интерпретация, взаимодействие с тестируемым устройством, регистрация и анализ результатов. Кроме того, проведено сравнение существующих и предложенного архитектурных решений по ключевым характеристикам: предметная область применения, тип архитектуры (распределенная или централизованная), среда исполнения тестовых сценариев, масштабируемость системы, уровень изоляции среды исполнения, наличие механизмов защиты и возможность удаленного управления. Результаты работы представлены в виде предложенной архитектуры, включающей управляющий модуль и автономные исполнительные модули с изолированной виртуальной средой исполнения MicroPython. Для обеспечения безопасности предусмотрена передача тестовых сценариев по зашифрованному каналу связи с использованием протоколов CoAP и DTLS, а также выполнение кода тестовых сценариев в ограниченной среде, изолированной от основной операционной системы.</p></sec><sec><title>Выводы</title><p>Выводы. Проведенный сравнительный анализ продемонстрировал, что предлагаемое решение устраняет ключевые ограничения аналогов, связанные с отсутствием механизмов шифрования и изоляции исполнения. Разработанная архитектура повышает безопасность и надежность процесса тестирования IoT-устройств и может использоваться в недоверенных вычислительных средах для защиты интеллектуальной собственности и логики тестовых сценариев.</p></sec></abstract><trans-abstract xml:lang="en"><sec><title>Objectives</title><p>Objectives. The paper sets out to develop an architecture for a distributed testing system for Internet of Things (IoT) devices to ensure secure transmission and the isolated execution of test scenarios on dedicated execution modules. The study takes account of the rapid growth in the number of IoT devices operating in untrusted computing environments, in which the testing process can pose a risk of confidential data leakage or unauthorized interference with software components.</p></sec><sec><title>Methods</title><p>Methods. A comparative analysis of existing solutions such as NI TestStand, MagicDAQ, PHiLIP, and KEOLABS ContactLAB was conducted. Architectural components and test scenario life-cycle processes were examined and compared.</p></sec><sec><title>Results</title><p>Results. The analysis identified the main stages of the test scenario life cycle, including preparation and storage of scripts, transmission and interpretation, interaction with the device under test, as well as registration and analysis of results. In addition, existing and proposed architectural solutions were compared according to the following key characteristics: application domain; type of architecture (distributed or centralized); test scenario execution environment; system scalability; level of execution isolation; availability of protection mechanisms; capability for remote management. The results of the study are presented in the form of a proposed architecture that includes a control module and autonomous execution modules with an isolated virtual MicroPython environment. To ensure security, test scenarios are transmitted over an encrypted communication channel using constrained application protocol and datagram transport layer security (protocol, while the execution of test code takes place in a restricted environment isolated from the main operating system.</p></sec><sec><title>Conclusions</title><p>Conclusions. The comparative analysis confirmed that the proposed solution eliminates the key limitations of existing solutions, namely the lack of encryption mechanisms and isolation of execution. The developed architecture enhances the security and reliability of the IoT device testing process, offering protection for intellectual property and test scenario logic in untrusted computing environments.</p></sec></trans-abstract><kwd-group xml:lang="ru"><kwd>интернет вещей</kwd><kwd>IoT</kwd><kwd>функциональное тестирование</kwd><kwd>архитектура тестирования</kwd><kwd>тестовые сценарии</kwd></kwd-group><kwd-group xml:lang="en"><kwd>Internet of Things</kwd><kwd>IoT</kwd><kwd>functional testing</kwd><kwd>testing architecture</kwd><kwd>test scenarios</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Дьяков О.Н., Беляков Д.С., Калинин Е.О. Использование технологии ePKI для безопасного обновления встроенного программного обеспечения доверенных программно-аппаратных комплексов. Безопасность информационных технологий. 2025;32(2):152–177. https://doi.org/10.26583/bit.2025.2.12</mixed-citation><mixed-citation xml:lang="en">Dyakov O.N., Belyakov D.S., Kalinin E.O. Using ePKI technology to securely update of embedded software of trusted hardware and software system. Bezopasnost’ informatsionnykh tekhnologii = IT Security (Russia). 2025;32(2):152–177 (in Russ.). https://doi.org/10.26583/bit.2025.2.12</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Venugopal M., Nanda M., Anand G., Chandana Voora H. An integrated Hardware/Software Verification and Validation methodology for Signal Processing Systems. ITM Web Conf. 2022;50:02001. https://doi.org/10.1051/itmconf/20225002001</mixed-citation><mixed-citation xml:lang="en">Venugopal M., Nanda M., Anand G., Chandana Voora H. An integrated Hardware/Software Verification and Validation methodology for Signal Processing Systems. ITM Web Conf. 2022;50:02001. https://doi.org/10.1051/itmconf/20225002001</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Bures M., Cerny T., Ahmed B.S. Internet of Things: Current Challenges in the Quality Assurance and Testing Methods. arXiv. arXiv:1805.01241. 2018. https://doi.org/10.48550/arXiv.1805.01241</mixed-citation><mixed-citation xml:lang="en">Bures M., Cerny T., Ahmed B.S. Internet of Things: Current Challenges in the Quality Assurance and Testing Methods. arXiv. arXiv:1805.01241. 2018. https://doi.org/10.48550/arXiv.1805.01241</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Mazhar T., Talpur D.B., Shloul T.A., Ghadi Y.Y., Haq I., Ullah I. Analysis of IoT Security Challenges and its Solutions Using Artificial Intelligence. Brain Sciences. 2023;13(4):683. https://doi.org/10.3390/brainsci13040683</mixed-citation><mixed-citation xml:lang="en">Mazhar T., Talpur D.B., Shloul T.A., Ghadi Y.Y., Haq I., Ullah I. Analysis of IoT Security Challenges and its Solutions Using Artificial Intelligence. Brain Sciences. 2023;13(4):683. https://doi.org/10.3390/brainsci13040683</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Minani J.B., Sabir F., Moha N., Guéhéneuc Y.G. A Multimethod Study of Internet of Things Systems Testing in Industry. IEEE Internet Things J. 2024;11(1):1662–1684. https://doi.org/10.1109/JIOT.2023.3291233</mixed-citation><mixed-citation xml:lang="en">Minani J.B., Sabir F., Moha N., Guéhéneuc Y.G. A Multimethod Study of Internet of Things Systems Testing in Industry. IEEE Internet Things J. 2024;11(1):1662–1684. https://doi.org/10.1109/JIOT.2023.3291233</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Папуловская Н.В., Изотов И.Н., Блиничкин Д.Ю., Катаев А.Ю. Разработка ядра платформы автоматизированного тестирования устройств интернета вещей. Int. J. Open Inf. Technol. 2021;9(6):38–45. https://elibrary.ru/ybxvtg</mixed-citation><mixed-citation xml:lang="en">Papulovskaya N.V., Izotov I.N., Blinichkin D.Y., Kataev A.Y. Core Platform Development for IoT-devices Automated Testing. Int. J. Open Inf. Technol. 2021;9(6):38–45 (in Russ.). https://elibrary.ru/ybxvtg</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Castelo Branco K.D.S., Dantas V.L.L., Carvalho L.M. Interoperability Testing Guide for the Internet of Things. In: Proceedings of the 30th Brazilian Symposium on Multimedia and the Web (WebMedia 2024). (Sociedade Brasileira de Computação). 2024. P. 188–196. https://doi.org/10.5753/webmedia.2024.242058</mixed-citation><mixed-citation xml:lang="en">Castelo Branco K.D.S., Dantas V.L.L., Carvalho L.M. Interoperability Testing Guide for the Internet of Things. In: Proceedings of the 30th Brazilian Symposium on Multimedia and the Web (WebMedia 2024). (Sociedade Brasileira de Computação). 2024. P. 188–196. https://doi.org/10.5753/webmedia.2024.242058</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Weiss K., Rottleuthner M., Schmidt T.C., Wählisch M. PHiLIP on the HiL: Automated Multi-Platform OS Testing with External Reference Devices. ACM Trans. Embed. Comput. Syst. (TECS). 2021;20(5s):1–26. https://doi.org/10.1145/3477040</mixed-citation><mixed-citation xml:lang="en">Weiss K., Rottleuthner M., Schmidt T.C., Wählisch M. PHiLIP on the HiL: Automated Multi-Platform OS Testing with External Reference Devices. ACM Trans. Embed. Comput. Syst. (TECS). 2021;20(5s):1–26. https://doi.org/10.1145/3477040</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Behnke I., Thamsen L., Kao O. Héctor: A Framework for Testing IoT Applications Across Heterogeneous Edge and Cloud Testbeds. In: Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion. ACM; 2019. P. 15–20. https://doi.org/10.1145/3368235.3368832</mixed-citation><mixed-citation xml:lang="en">Behnke I., Thamsen L., Kao O. Héctor: A Framework for Testing IoT Applications Across Heterogeneous Edge and Cloud Testbeds. In: Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion. ACM; 2019. P. 15–20. https://doi.org/10.1145/3368235.3368832</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Ziegler S., Fdida S., Viho C., Watteyne T. F-Interop – Online Platform of Interoperability and Performance Tests for the Internet of Things. In: Mitton N., Chaouchi H., Noel T., Watteyne T., Gabillon A., Capolsini P. (Eds.). Interoperability, Safety and Security in IoT. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer; 2017. V. 190. P. 49–55. URL: https://link.springer.com/chapter/10.1007/978-3-319-52727-7_7. Accessed July 07, 2025.</mixed-citation><mixed-citation xml:lang="en">Ziegler S., Fdida S., Viho C., Watteyne T. F-Interop – Online Platform of Interoperability and Performance Tests for the Internet of Things. In: Mitton N., Chaouchi H., Noel T., Watteyne T., Gabillon A., Capolsini P. (Eds.). Interoperability, Safety and Security in IoT. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer; 2017. V. 190. P. 49–55. Available from URL: https://link.springer.com/chapter/10.1007/978-3-319-52727-7_7. Accessed July 07, 2025.</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Olianas D., Leotta M., Ricca F. MATTER: A tool for generating end-to-end IoT test scripts. Software Qual. J. 2021;30(2): 389–423. URL: https://link.springer.com/article/10.1007/s11219-021-09565-y. Accessed July 07, 2025.</mixed-citation><mixed-citation xml:lang="en">Olianas D., Leotta M., Ricca F. MATTER: A tool for generating end-to-end IoT test scripts. Software Qual. J. 2021;30(2): 389–423. Available from URL: https://link.springer.com/article/10.1007/s11219-021-09565-y. Accessed July 07, 2025.</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Schieferdecker I., Kretzschmann S., Rennoch A., Wagner M. IoT-Testware – An Eclipse Project. In: 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS). IEEE; 2017. https://doi.org/10.1109/QRS.2017.59</mixed-citation><mixed-citation xml:lang="en">Schieferdecker I., Kretzschmann S., Rennoch A., Wagner M. IoT-Testware – An Eclipse Project. In: 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS). IEEE; 2017. https://doi.org/10.1109/QRS.2017.59</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Беляков Д.С., Калинин Е.О., Конев А.А., Шелупанов А.А., Мицель А.А. Модели жизненного цикла и угрозы безопасности микросхемы во время ее разработки и эксплуатации. Доклады Томского государственного университета систем управления и радиоэлектроники (Доклады ТУСУР). 2023;26(1):76–81. https://doi.org/10.21293/1818-0442-2023-26-1-76-81</mixed-citation><mixed-citation xml:lang="en">Belyakov D.S., Kalinin E.O., Konev A.A., Shelupanov A.A., Mitsel A.A. Life-cycle models and security threats to the microchip during its development and exploitation. Doklady Tomskogo gosudarstvennogo universiteta sistem upravleniya i radioehlektroniki (Doklady TUSUR) = Proceedings of TUSUR University. 2023;26(1):76–81 (in Russ.). https://doi.org/10.21293/1818-0442-2023-26-1-76-81</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Конев А.А. Модель угроз безопасности защищенного микроконтроллера и обрабатываемой им информации. Доклады Томского государственного университета систем управления и радиоэлектроники (Доклады ТУСУР). 2022;25(4):80–87. https://doi.org/10.21293/1818-0442-2022-25-4-80-87</mixed-citation><mixed-citation xml:lang="en">Konev A.A. Security threat model for protected microcontroller and the information it processes. Doklady Tomskogo gosudarstvennogo universiteta sistem upravleniya i radioehlektroniki (Doklady TUSUR) = Proceedings of TUSUR University. 2022;25(4):80–87 (in Russ.). https://doi.org/10.21293/1818-0442-2022-25-4-80-87</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Restuccia G., Tschofenig H., Baccelli E. Low-Power IoT Communication Security: On the Performance of DTLS and TLS 1.3. In: Proceedings 2020 9th IFIP International Conference on Performance Evaluation and Modeling in Wireless Networks (PEMWN). https://doi.org/10.23919/PEMWN50727.2020.9293085</mixed-citation><mixed-citation xml:lang="en">Restuccia G., Tschofenig H., Baccelli E. Low-Power IoT Communication Security: On the Performance of DTLS and TLS 1.3. In: Proceedings 2020 9th IFIP International Conference on Performance Evaluation and Modeling in Wireless Networks (PEMWN). https://doi.org/10.23919/PEMWN50727.2020.9293085</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Lowther D., Jacob D., Trevor J., Singer J. Secure Scripting with CHERIoT MicroPython. In: Proceedings of the 34th ACM SIGPLAN International Conference on Compiler Construction. ACM; 2025. P. 180–191. https://doi.org/10.1145/3708493.3712694</mixed-citation><mixed-citation xml:lang="en">Lowther D., Jacob D., Trevor J., Singer J. Secure Scripting with CHERIoT MicroPython. In: Proceedings of the 34th ACM SIGPLAN International Conference on Compiler Construction. ACM; 2025. P. 180–191. https://doi.org/10.1145/3708493.3712694</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
