Advertisement

The Monitoring of Information Security of Remote Devices of Wireless Networks

  • Ilya Lebedev
  • Viktoria Korzhuk
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9247)

Abstract

The issues of information security monitoring of remote of devices self-organizing wireless networks are discussed. The model of interaction of the remote devices is shown, the analyzed characteristics of identification of node abnormal behavior for different types of topologies are identified. The approach to the assessment with the use of the selected features of the system is suggested. The experiment, providing the obtainment of statistical information about the remote devices in different modes of ad-hoc networks is revealed. The results of the system activity for a broadcast packet of network scanning with given characteristics are presented. The dependences of the responses from sleeping and waking devices for variable system structure based on ad-hoc wireless networks are given. The feature of this approach is that it allows using the built-in set of commands that gives the opportunity to avoid additional costs when constructing the control system for wireless sensor networks.

Keywords

Information security Wireless networks Multi-agent systems Abnormal behavior The vulnerability The model of information security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kumar, P., Ylianttila, M., Gurtov, A., Lee, S.-G., Lee, H.-J.: An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Networks-based Applications. MDPI Sensors 14(2), 2732–2755 (2014)CrossRefGoogle Scholar
  2. 2.
    Sridhar, P., Sheikh-Bahaei, S., Xia, S., Jamshidi, Mo.: Multi agent simulation using discrete event and soft-computing methodologies. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 1711–1716 (2003)Google Scholar
  3. 3.
    Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proc. of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp. 85–101 (2004)Google Scholar
  4. 4.
    Peters, J.F.: Approximation spaces for hierarchical intelligent behavioral system models. Advances in Soft Computing (28), 13–30 (2005)Google Scholar
  5. 5.
    Zikratov, I.A., Kozlova, E.V., Stratowa, T.V.: The analysis of vulnerabilities of robotic systems with swarm intelligence. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 5(87), 149–154 (2013)Google Scholar
  6. 6.
    Gvozdev, V.A., Zikratov, I.A., Lebedev, I.S., Lapshin, S.V., Solov’ev, I.N.: Prognostic evaluation of software architectures security. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 4(80), 126–130 (2012)Google Scholar
  7. 7.
    Zikratov, I.A., Lebedev, I.S., Gurtov, A.V.: Trust and Reputation Mechanisms for Multi-agent Robotic Systems. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2014. LNCS, vol. 8638, pp. 106–120. Springer, Heidelberg (2014)Google Scholar
  8. 8.
    Wyglinski, A.M., Huang, X., Padir, T., Lai, L., Eisenbarth, T.R., Venkatasubramanian, K.: Security of autonomous systems employing embedded computing and sensors. IEEE Micro 33(1), art. no. 6504448, 80–86 (2013)Google Scholar
  9. 9.
    Bobtsov, A., Nikiforov, V.O.: Adaptive output control: tasks, applied problems and solutions. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 1(83). S.1–S.14 (2013)Google Scholar
  10. 10.
    Maltsev, G.N., Dzhumkov, V.V.: A generalized model of a discrete communication channel with grouping errors. Information and Control Systems 1, 27–33 (2013)Google Scholar
  11. 11.
    Prabhakar, M., Singh, J.N., Mahadevan, G.: Nash Equilibrium and Marcov Chains to Enhance Game Theoretic Approach for Vanet Security. In: Aswatha Kumar, M., Selvarani, R., Kumar, T.V.S. (eds.) Proceedings of ICAdC. AISC, vol. 174, pp. 191–199. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  12. 12.
    Komov, S. A. and others: Terms and definitions in the field of information security. – M., AC-trust, 2009. -304 S.Google Scholar
  13. 13.
    Koval, E.N., Lebedev, I.S.: Total security model of the robotic systems. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 4(86) S.153–S.154 (2013)Google Scholar
  14. 14.
    Zikratov, I.S., Stratowa, T.V., Lebedev, I.S., Gurtov, V.A.: Building a Model of trust and reputation to the objects of multi-agent robotic systems with decentralized control. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 3(91), 30–39 (2014)Google Scholar
  15. 15.
    Shago, F.N., Zikratov, I.A.: The optimization system of planning of audit of information security management. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 2(90), 111–118 (2014)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Saint Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University)Saint-PetersburgRussia

Personalised recommendations