Abstract
The chapter is devoted to the actual scientific and technical problem of implementation the secure remote control of overlay networks, presented in the form of intelligent mobile objects. The specificity of this class of networks is the use of existing cellular communication networks as a data transmission medium. The security of data transfer processes between the nodes of the overlay network is ensured by using the technology of private virtual networks. The chapter also shows options for using their modifications: with route regeneration for high-mobility networks and technology for nesting tunnels in low-mobility networks. Therefore, additional tasks were solved related to the choice of the trajectory of the nodes behavior in autonomous operation, ensuring a given level of survivability and reliability of the overlay network in terms of routing dynamics. The chapter shows the results of modeling various network attacks aimed at intercepting and replacing traffic in the chain “intelligent mobile object - control node”. A mathematical model is proposed for regenerating data transmission routes in a network from the point of view of Markov and semi-Markov processes. Examples of solving the problem of finding a quasi-optimal solution under conditions of lack of time for the regeneration of data transmission routes are given using the Wald scheme as an example. The obtained numerical studies of the proposed models prove the efficiency of the proposed approaches. Using the proposed approaches, it is possible to create full-fledged network segments within the global urban networks that provide the concept of “smart city”. Numerical studies have shown that data transmission with a sufficient degree of reliability is achieved while maintaining losses in the range from 7% to 45%. Otherwise, IMOs operate offline. The proposed models can be used in the development of methods for reengineering of existed and creating of modern resilient networks for IMO based on idea of proactive dynamical reconfiguration and real-time evolution considering changing requirements and environment parameters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Khan, M.A., Alvi, B.A., Safi, A., Khan, I.U.: Drones for good in smart cities: a review. In: Proceedings of International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), pp. 1–6 (2018)
Alsamhi, S.H., Ma, O., Ansari, M.S., Almalki, F.A.: Survey on collaborative smart drones and Internet of Things for improving smartness of smart cities. IEEE Access 7, 128125–128152 (2019)
Miksa Hell, P., János Varga, P.: Accurate radiofrequency identification tracking in smart city railways by using drones. Interdiscip. Descrip. Complex Syst.: INDECS 16(3-A), 333–341 (2018)
Dodonov, A.G., Gorbachyk, O.S., Kuznietsova, M.G.: Management organization of mobile technical objects group. In: Selected Papers of the XVII International Scientific and Practical Conference on Information Technologies and Security (ITS 2017), pp. 1–7. CEUR Workshop Proceedings (2017)
Merlak, V., Smatkov, S., Kuchuk, N., Nechausov, A.: Recourses distribution method of university e-learning on the hyperconvergent platform. In: 9th International Conference on Dependable Systems, Service and Technologies (DESSERT’2018), pp. 136–140. IEEE (2018)
Dodonov, A.G., Gorbachyk, O.S., Kuznietsova, M.G.: Survivability of organizational management systems and the maintenance of critical infrastructure security. In: Selected Papers of the XIX International Scientific and Practical Conference “Information Technologies and Security” (ITS 2019), pp. 1–10. CEUR Workshop Proceedings (2019)
Kuchuk, H., Kovalenko, A., Ibrahim, B.F., Ruban, I.: Adaptive compression method for video information. Int. J. Adv. Trends Comput. Sci. Eng. 8(1.2), 66–69 (2019)
Tiutiunyk, V., Kalugin, V., Pysklakova, O., Levterov, A., Zakharchenko, Ju.: Development of civil defense systems and ecological safety. In 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), pp. 295–299. IEEE (2019)
Yu, T., Tang, J., Bai, L., Lao, S.: Collision avoidance for cooperative UAVs with rolling optimization algorithm based on predictive state space. Appl. Sci. 7(4), 329 (2017)
Orda, L., Gehrke, O., Bindner, H.: Testing overlay networks in a smart grid using simulated and physical networks. In: 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1–7 (2019). https://doi.org/10.1109/SmartGridComm.2019.8909794
Hansen, R.R., Probst, C.W.:Modelling and analysing overlay networks by ambients with wormholes. In: 2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU), pp. 1–4 (2018). https://doi.org/10.23919/ICMU.2018.8653596
Cui, Z., Liao, J., Wang, J., Qi, Q., Wang, J.: Cooperative traffic management for co-existing overlays. In: 2015 IEEE 40th Conference on Local Computer Networks (LCN), pp. 466–469 (2015). https://doi.org/10.1109/LCN.2015.7366354
Aljehani, M., Inoue, M.: Communication and autonomous control of multi-UAV system in disaster response tasks. In: Jezic, G., Kusek, M., Chen-Burger, Y.H., Howlett, R., Jain, L. (eds.) Agent and Multi-Agent Systems: Technology and Applications, vol. 74, pp. 123–132. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59394-4_12
Liu, D., et al.: Self-organizing relay selection in UAV communication networks: a matching game perspective. IEEE Wirel. Commun. 26(6), 102–110 (2019)
Li, B., Fei, Z., Zhang, Y., Guizani, M.: Secure UAV communication networks over 5G. IEEE Wirel. Commun. 26(5), 114–120 (2019)
Kuchuk, G., Kovalenko, A., Kharchenko, V., Shamraev, A.: Resource-oriented approaches to implementation of traffic control technologies in safety-critical I&C systems. In: Kharchenko, V., Kondratenko, Y., Kacprzyk, J. (eds.) Green IT Engineering: Components, Networks and Systems Implementation. SSDC, vol. 105, pp. 313–337. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-55595-9_15
Kuchuk, G., Kharchenko, V., Kovalenko, A., Ruchkov, E.: Approaches to selection of combinatorial algorithm for optimization in network traffic control of safety-critical systems. In: Proceeding of IEEE East-West Design and Test Symposium, Yerevan, Armenia, pp. 384–389 (2016)
Kolisnyk, M.: Vulnerability analysis and method of selection of communication protocols for information transfer in Internet of Things systems. Radioelectron. Comput. Syst. 1(97), 133–149 (2021). https://doi.org/10.32620/reks.2021.1.12
Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., Meskin, N.: Cybersecurity for industrial control systems: a survey. Comput. Secur. 89, 1–19 (2019). https://doi.org/10.1016/j.cose.2019.101677
Lysenko, S., Kharchenko, V., Bobrovnikova, K., Shchuka, R.: Computer systems resilience in the presence of cyber threats: taxonomy and ontology. Radioelectron. Comput. Syst. 1(93), 17–28 (2020). https://doi.org/10.32620/reks.2020.1.02
Johnson, G.: Cyber robust systems: the vulnerability of the current approach to cyber security. In: Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems, pp. 163–174. IGI Global (2020)
Morozova, O., Nicheporuk, A., Tetskyi, A., Tkachov, V.: Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks. Radioelectron. Comput. Syst. 4(100), 145–156 (2021). https://doi.org/10.32620/reks.2021.4.12
Tkachov, V., Hunko, M., Volotka, V.: Scenarios for implementation of nested virtualization technology in task of improving cloud firewall fault tolerance. In: 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), pp. 759–763. IEEE (2019)
Hardeo Sahai, A.K.: A visual BASIC program to determine wald’s sequential sampling plan. Rev. Investig. Oper. 25, 84–96 (2004)
Kolisnyk, K., Deineko, D., Sokol, T., Kutsevlyak, S., Avrunin, O.: Application of modern internet technologies in telemedicine screening of patient conditions. In: 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), pp. 459–464. IEEE (2019)
Jo, J.H., Sharma, P.K., Sicato, J.C.S., Park, J.H.: Emerging technologies for sustainable smart city network security: issues, challenges, and countermeasures. J. Inf. Process. Syst. 15(4), 765–784 (2019)
Sajassi, A., Drake, J., Bitar, N., Shekhar, R., Uttaro, J., Henderickx, W.: A network virtualization overlay solution using ethernet VPN (eVPN). IETF RFC 8365 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Tkachov, V., Kovalenko, A., Kharchenko, V., Hunko, M., Hvozdetska, K. (2022). Cellular Technology Based Overlay Networks for the Secure Control of Intelligent Mobile Objects: Models and Numerical Study. In: Ermolayev, V., et al. Information and Communication Technologies in Education, Research, and Industrial Applications. ICTERI 2021. Communications in Computer and Information Science, vol 1698. Springer, Cham. https://doi.org/10.1007/978-3-031-20834-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-20834-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20833-1
Online ISBN: 978-3-031-20834-8
eBook Packages: Computer ScienceComputer Science (R0)