Modeling of information influence on remote wireless network devices

被引:0
作者
Suhoparov M.E. [1 ]
Bazhaev N.A. [2 ]
Krivtsova I.E. [2 ]
Lebedev I.S. [2 ]
机构
[1] AO NPK TRISTAN, St. Petersburg Branch, St. Petersburg
[2] St. Petersburg National Research University of Information Technologies, Mechanics, and Optics, St. Petersburg
关键词
device availability; information security; information security model; multiagent systems; vulnerability; wireless networks;
D O I
10.3103/S0146411617080223
中图分类号
学科分类号
摘要
A wireless network being affected by a broadcast storm attack has been considered to determine the availability of autonomous nodes and its ability to perform functional tasks under information influence. The conditions for the hacker attacks from a potential intruder have been determined. A wireless device availability analysis has been carried out. A model for determining the technical characteristics of the wireless self-organizing network device has been proposed. © 2017, Allerton Press, Inc.
引用
收藏
页码:992 / 999
页数:7
相关论文
共 17 条
  • [1] Kumar P., Ylianttila M., Gurtov A., Lee S.-G., Lee H.-J., An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor networks-based applications, MDPI Sens., 14, 2, pp. 2732-2755, (2014)
  • [2] Sridhar P., Sheikh-Bahaei S., Xia S., Jamshidi M., Multi agent simulation using discrete event and softcomputing methodologies, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2, pp. 1711-1716, (2003)
  • [3] Page J., Zaslavsky A., Indrawan M., Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities, Proc. of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp. 85-101, (2004)
  • [4] Zikratov I.A., Kozlova E.V., Zikratova T.V., Analysis of vulnerabilities of robotic complexes with swarm intelligence, Nauchno-Tekh. Vestn. Inf. Tekhnol. Mekh. Opt., 5, 87, pp. 149-154, (2013)
  • [5] Zikratov I., Lebedev I., Gurtov A., Trust and reputation mechanisms for multi-agent robotic systems, Lect. Notes Comput. Sci., 8638, pp. 106-120, (2014)
  • [6] Wyglinski A.M., Huang X., Padir T., Lai L., Eisenbarth T.R., Venkatasubramanian K., Security of autonomous systems employing embedded computing and sensors, IEEE Micro, 33, 1, pp. 80-86, (2013)
  • [7] Lebedev I.S., Korzhuk V.M., The monitoring of information security of remote devices of wireless networks, Lect. Notes Comput. Sci., 9247, pp. 3-10, (2015)
  • [8] Prabhakar M., Singh J.N., Mahadevan Nash equilibrium and Marcov chains to enhance game theoretic approach for VANET security, International Conference on Advances in Computing, ICAdC 2012, pp. 191-199, (2012)
  • [9] Korzun D.G., Nikolaevskiy I., Gurtov A.V., Service intelligence support for medical sensor networks in personalized mobile health systems, Lect. Notes Comput. Sci., 9247, pp. 116-127, (2015)
  • [10] Security Architecture for Systems that Provide Communication between Endpoints