Advertisement

Cybersecurity Risks Analyses at Remote Monitoring of Object’s State

  • T. I. BuldakovaEmail author
Chapter
Part of the Studies in Systems, Decision and Control book series (SSDC, volume 260)

Abstract

The problem of data protection at remote monitoring systems of the complex object state is considered. Such systems are robust real-time systems with high requirements for performance and reliability. Currently, they belong to the class of cyber-physical systems. The features of remote monitoring systems are noted. Solutions developed during the monitoring process are based on the received data and the analysis results. Therefore, in the remote monitoring systems it is necessary to ensure the noise immunity of information processes. It is shown that the degree of data security is assessed by the level of cybersecurity risk. Therefore, when remotely monitoring the state of a complex object, it is necessary to continuously assess the level of cybersecurity and take protective measures when this level exceeds a predetermined threshold value. The main stages of information risk management during remote monitoring are given. Requirements to the choice of the most effective methods for realization of this process are formulated. A methodology for managing cybersecurity risks in remote monitoring systems, which are assessed of the object’s state, and the results of its testing, using the example of a remote monitoring system for a human state, are proposed.

Keywords

Monitoring systems Information security Cybersecurity risks Risk management 

References

  1. 1.
    Lee, J., Bagheri, B., Kao, H.A.: A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manufact. Lett. 3, 18–23 (2015)CrossRefGoogle Scholar
  2. 2.
    Romero, D., Bernus, P., Noran, O., Stahre, J., Fast-Berglund, Å.: The operator 4.0: human cyber-physical systems & adaptive automation towards human-automation symbiosis work systems. In: IFIP Advances in Information and Communication Technology (2016).  https://doi.org/10.1007/978-3-319-51133-7_80
  3. 3.
    Loktev, D.A., Loktev, A.A.: Diagnostics of external defects of railway infrastructure by analysis of its images. In: Global Smart Industry Conference (GloSIC). Chelyabinsk, Russia (2018).  https://doi.org/10.1109/glosic.2018.8570083
  4. 4.
    Suyatinov, S.I.: Criteria and method for assessing the functional state of a human operator in a complex organizational and technical system. In: 2018 Global Smart Industry Conference (GloSIC), Chelyabinsk, Russia, pp. 1–6 (2018).  https://doi.org/10.1109/glosic.2018.8570088
  5. 5.
    Buldakova, T.I., Mikov, D.A.: Comprehensive approach to information security risk management. In: CEUR Workshop Proceedings, vol. 2081, paper 05, pp. 21–26 (2017)Google Scholar
  6. 6.
    Lee, M.-Ch.: Information security risk analysis methods and research trends: AHP and fuzzy comprehensive method. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 6(1), 29–45 (2014)Google Scholar
  7. 7.
    Appari, A., Johnson, M.E.: Information security and privacy in healthcare: current state of research. Int. J. Internet Enterp. Manage. 6(4), 279–314 (2010)CrossRefGoogle Scholar
  8. 8.
    Idhate, S., Bilapatre, A., Rathod, A., Kalbande, H.: Dam monitoring system using wireless sensor networks. Int. Res. J. Eng. Technol. 4(4), 1767–1769 (2017)Google Scholar
  9. 9.
    Ibrahim, A., Muhammad, R., Alshitawi, M., Alharbi, A., Almarshoud, A.: Intelligent green house application based remote monitoring for precision agricultural strategies: a survey. J. Appl. Sci. 15(7), 947–952 (2015)CrossRefGoogle Scholar
  10. 10.
    Bashi, N., Karunanithi, M., Fatehi, F., Ding, H., Walters, D.: Remote monitoring of patients with heart failure: an overview of systematic reviews. J. Med. Internet Res. 19(1), e18 (2017)CrossRefGoogle Scholar
  11. 11.
    Neusypin, K., Selezneva, M., Proletarsky, A.: Nonlinear information processing algorithm for navigation complex with increased degree of parametric identifiability. In: Dolinina, O., et al. (eds.) Recent Research in Control Engineering and Decision Making. ICIT-2019. Studies in Systems, Decision and Control, vol. 199, pp. 37–49 (2019).  https://doi.org/10.1007/978-3-030-12072-6_4
  12. 12.
    Xu, M., Sun, M., Wang, G., Huang, S.: Intelligent remote wireless streetlight monitoring system based on GPRS. In: Xiao, T., Zhang, L., Fei, M. (eds.) Communications in Computer and Information Science, vol. 324, pp. 228–237. Springer, Berlin, Heidelberg (2012)Google Scholar
  13. 13.
    Buldakova, T., Krivosheeva, D.: Data protection during remote monitoring of person’s state. In: Dolinina, O., et al. (eds.) Recent Research in Control Engineering and Decision Making. ICIT-2019. Studies in Systems, Decision and Control, vol. 199, pp. 3–14. Springer, Cham (2019).  https://doi.org/10.1007/978-3-030-12072-6_1
  14. 14.
    Kure, H.I., Islam Sh., Razzaque, M.A.: An integrated cyber security risk management approach for a cyber-physical system. Appl. Sci. 8(6), 898 (2018).  https://doi.org/10.3390/app8060898
  15. 15.
    Buldakova, T.I., Dzhalolov, ASh: Analysis of data processes and choices of data-processing and security technologies in situation centers. Sci. Tech. Inf. Process. 39(2), 127–132 (2012).  https://doi.org/10.3103/S0147688212020116CrossRefGoogle Scholar
  16. 16.
    Buldakova, T.I., Suyatinov, S.I.: Reconstruction method for data protection in telemedicine systems. In: Progress in Biomedical Optics and Imaging—Proceedings of SPIE, vol. 9448, Paper 94481U (2014).  https://doi.org/10.1117/12.2180644
  17. 17.
    Banerjee, A., Gupta, S.K.S., Venkatasubramanian, K.K.: PEES: physiology-based end-to-end security for mHealth. In: Proceedings of the 4th Conference on Wireless Health, Article No. 2 (2013)Google Scholar
  18. 18.
    Barabanov, A., Markov, A., Tsirlov, V.: Procedure for substantiated development of measures to design secure software for automated process control systems. In: 2016 International Siberian Conference on Control and Communications, SIBCON 2016—Proceedings, pp. 1–4 (2016).  https://doi.org/10.1109/sibcon.2016.7491660
  19. 19.
    Yuan, C., Li, J., Zhang, R., Liu, J.: Grey and fuzzy evaluation of information system distress recovery capability. In: 2nd International Conference on Advances in Computer Science and Engineering, CSE, pp. 298–302 (2013)Google Scholar
  20. 20.
    Chang, P.T., Hung, K.C.: Applying the fuzzy weighted average approach to evaluation network security systems. Compu. Math. Appl. 49, 1797–1814 (2005)CrossRefGoogle Scholar
  21. 21.
    Liu, F., Dai, K., Wang, Z.Y.: Research on the technology of quantitative security evaluation based on fuzzy number arithmetic operation. Fuzzy Syst. Math. 18(4), 51–54 (2004)Google Scholar
  22. 22.
    Jin, Y.: Fuzzy modeling of high-dimensional systems: complexity reduction and interpretability improvement. IEEE Trans. Fuzzy Syst. 8(2), 212–221 (2000)CrossRefGoogle Scholar
  23. 23.
    Buldakova, T.I., Suyatinov, S.I.: Registration and identification of pulse signal for medical diagnostics. In: Proceedings of SPIE—The International Society for Optical Engineering, vol. 4707, paper 48, pp. 343–350 (2002)Google Scholar
  24. 24.
    Mundt, C.W., Montgomery, K.N., Udoh, U.E., Barker, V.N.: A multiparameter wearable physiologic monitoring system for space and terrestrial applications. IEEE Trans. Inf. Technol. Biomed. 9(3), 382–391 (2005)CrossRefGoogle Scholar
  25. 25.
    Paradiso, R., Loriga, G., Taccini, N.: A wearable health care system based on knitted integrated sensors. IEEE Trans. Inf. Technol. Biomed. 9(3), 337–344 (2005)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Bauman Moscow State Technical UniversityMoscowRussia

Personalised recommendations