Skip to main content

Cellular Technology Based Overlay Networks for the Secure Control of Intelligent Mobile Objects: Models and Numerical Study

  • Conference paper
  • First Online:
Information and Communication Technologies in Education, Research, and Industrial Applications (ICTERI 2021)

Abstract

The chapter is devoted to the actual scientific and technical problem of implementation the secure remote control of overlay networks, presented in the form of intelligent mobile objects. The specificity of this class of networks is the use of existing cellular communication networks as a data transmission medium. The security of data transfer processes between the nodes of the overlay network is ensured by using the technology of private virtual networks. The chapter also shows options for using their modifications: with route regeneration for high-mobility networks and technology for nesting tunnels in low-mobility networks. Therefore, additional tasks were solved related to the choice of the trajectory of the nodes behavior in autonomous operation, ensuring a given level of survivability and reliability of the overlay network in terms of routing dynamics. The chapter shows the results of modeling various network attacks aimed at intercepting and replacing traffic in the chain “intelligent mobile object - control node”. A mathematical model is proposed for regenerating data transmission routes in a network from the point of view of Markov and semi-Markov processes. Examples of solving the problem of finding a quasi-optimal solution under conditions of lack of time for the regeneration of data transmission routes are given using the Wald scheme as an example. The obtained numerical studies of the proposed models prove the efficiency of the proposed approaches. Using the proposed approaches, it is possible to create full-fledged network segments within the global urban networks that provide the concept of “smart city”. Numerical studies have shown that data transmission with a sufficient degree of reliability is achieved while maintaining losses in the range from 7% to 45%. Otherwise, IMOs operate offline. The proposed models can be used in the development of methods for reengineering of existed and creating of modern resilient networks for IMO based on idea of proactive dynamical reconfiguration and real-time evolution considering changing requirements and environment parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Khan, M.A., Alvi, B.A., Safi, A., Khan, I.U.: Drones for good in smart cities: a review. In: Proceedings of International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), pp. 1–6 (2018)

    Google Scholar 

  2. Alsamhi, S.H., Ma, O., Ansari, M.S., Almalki, F.A.: Survey on collaborative smart drones and Internet of Things for improving smartness of smart cities. IEEE Access 7, 128125–128152 (2019)

    Article  Google Scholar 

  3. Miksa Hell, P., János Varga, P.: Accurate radiofrequency identification tracking in smart city railways by using drones. Interdiscip. Descrip. Complex Syst.: INDECS 16(3-A), 333–341 (2018)

    Google Scholar 

  4. Dodonov, A.G., Gorbachyk, O.S., Kuznietsova, M.G.: Management organization of mobile technical objects group. In: Selected Papers of the XVII International Scientific and Practical Conference on Information Technologies and Security (ITS 2017), pp. 1–7. CEUR Workshop Proceedings (2017)

    Google Scholar 

  5. Merlak, V., Smatkov, S., Kuchuk, N., Nechausov, A.: Recourses distribution method of university e-learning on the hyperconvergent platform. In: 9th International Conference on Dependable Systems, Service and Technologies (DESSERT’2018), pp. 136–140. IEEE (2018)

    Google Scholar 

  6. Dodonov, A.G., Gorbachyk, O.S., Kuznietsova, M.G.: Survivability of organizational management systems and the maintenance of critical infrastructure security. In: Selected Papers of the XIX International Scientific and Practical Conference “Information Technologies and Security” (ITS 2019), pp. 1–10. CEUR Workshop Proceedings (2019)

    Google Scholar 

  7. Kuchuk, H., Kovalenko, A., Ibrahim, B.F., Ruban, I.: Adaptive compression method for video information. Int. J. Adv. Trends Comput. Sci. Eng. 8(1.2), 66–69 (2019)

    Google Scholar 

  8. Tiutiunyk, V., Kalugin, V., Pysklakova, O., Levterov, A., Zakharchenko, Ju.: Development of civil defense systems and ecological safety. In 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), pp. 295–299. IEEE (2019)

    Google Scholar 

  9. Yu, T., Tang, J., Bai, L., Lao, S.: Collision avoidance for cooperative UAVs with rolling optimization algorithm based on predictive state space. Appl. Sci. 7(4), 329 (2017)

    Article  Google Scholar 

  10. Orda, L., Gehrke, O., Bindner, H.: Testing overlay networks in a smart grid using simulated and physical networks. In: 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1–7 (2019). https://doi.org/10.1109/SmartGridComm.2019.8909794

  11. Hansen, R.R., Probst, C.W.:Modelling and analysing overlay networks by ambients with wormholes. In: 2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU), pp. 1–4 (2018). https://doi.org/10.23919/ICMU.2018.8653596

  12. Cui, Z., Liao, J., Wang, J., Qi, Q., Wang, J.: Cooperative traffic management for co-existing overlays. In: 2015 IEEE 40th Conference on Local Computer Networks (LCN), pp. 466–469 (2015). https://doi.org/10.1109/LCN.2015.7366354

  13. Aljehani, M., Inoue, M.: Communication and autonomous control of multi-UAV system in disaster response tasks. In: Jezic, G., Kusek, M., Chen-Burger, Y.H., Howlett, R., Jain, L. (eds.) Agent and Multi-Agent Systems: Technology and Applications, vol. 74, pp. 123–132. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59394-4_12

    Chapter  Google Scholar 

  14. Liu, D., et al.: Self-organizing relay selection in UAV communication networks: a matching game perspective. IEEE Wirel. Commun. 26(6), 102–110 (2019)

    Article  Google Scholar 

  15. Li, B., Fei, Z., Zhang, Y., Guizani, M.: Secure UAV communication networks over 5G. IEEE Wirel. Commun. 26(5), 114–120 (2019)

    Article  Google Scholar 

  16. Kuchuk, G., Kovalenko, A., Kharchenko, V., Shamraev, A.: Resource-oriented approaches to implementation of traffic control technologies in safety-critical I&C systems. In: Kharchenko, V., Kondratenko, Y., Kacprzyk, J. (eds.) Green IT Engineering: Components, Networks and Systems Implementation. SSDC, vol. 105, pp. 313–337. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-55595-9_15

    Chapter  Google Scholar 

  17. Kuchuk, G., Kharchenko, V., Kovalenko, A., Ruchkov, E.: Approaches to selection of combinatorial algorithm for optimization in network traffic control of safety-critical systems. In: Proceeding of IEEE East-West Design and Test Symposium, Yerevan, Armenia, pp. 384–389 (2016)

    Google Scholar 

  18. Kolisnyk, M.: Vulnerability analysis and method of selection of communication protocols for information transfer in Internet of Things systems. Radioelectron. Comput. Syst. 1(97), 133–149 (2021). https://doi.org/10.32620/reks.2021.1.12

    Article  Google Scholar 

  19. Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., Meskin, N.: Cybersecurity for industrial control systems: a survey. Comput. Secur. 89, 1–19 (2019). https://doi.org/10.1016/j.cose.2019.101677

    Article  Google Scholar 

  20. Lysenko, S., Kharchenko, V., Bobrovnikova, K., Shchuka, R.: Computer systems resilience in the presence of cyber threats: taxonomy and ontology. Radioelectron. Comput. Syst. 1(93), 17–28 (2020). https://doi.org/10.32620/reks.2020.1.02

  21. Johnson, G.: Cyber robust systems: the vulnerability of the current approach to cyber security. In: Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems, pp. 163–174. IGI Global (2020)

    Google Scholar 

  22. Morozova, O., Nicheporuk, A., Tetskyi, A., Tkachov, V.: Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks. Radioelectron. Comput. Syst. 4(100), 145–156 (2021). https://doi.org/10.32620/reks.2021.4.12

  23. Tkachov, V., Hunko, M., Volotka, V.: Scenarios for implementation of nested virtualization technology in task of improving cloud firewall fault tolerance. In: 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), pp. 759–763. IEEE (2019)

    Google Scholar 

  24. Hardeo Sahai, A.K.: A visual BASIC program to determine wald’s sequential sampling plan. Rev. Investig. Oper. 25, 84–96 (2004)

    Google Scholar 

  25. Kolisnyk, K., Deineko, D., Sokol, T., Kutsevlyak, S., Avrunin, O.: Application of modern internet technologies in telemedicine screening of patient conditions. In: 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), pp. 459–464. IEEE (2019)

    Google Scholar 

  26. Jo, J.H., Sharma, P.K., Sicato, J.C.S., Park, J.H.: Emerging technologies for sustainable smart city network security: issues, challenges, and countermeasures. J. Inf. Process. Syst. 15(4), 765–784 (2019)

    Google Scholar 

  27. Sajassi, A., Drake, J., Bitar, N., Shekhar, R., Uttaro, J., Henderickx, W.: A network virtualization overlay solution using ethernet VPN (eVPN). IETF RFC 8365 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andriy Kovalenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tkachov, V., Kovalenko, A., Kharchenko, V., Hunko, M., Hvozdetska, K. (2022). Cellular Technology Based Overlay Networks for the Secure Control of Intelligent Mobile Objects: Models and Numerical Study. In: Ermolayev, V., et al. Information and Communication Technologies in Education, Research, and Industrial Applications. ICTERI 2021. Communications in Computer and Information Science, vol 1698. Springer, Cham. https://doi.org/10.1007/978-3-031-20834-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20834-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20833-1

  • Online ISBN: 978-3-031-20834-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics