Skip to main content

The Monitoring of Information Security of Remote Devices of Wireless Networks

Part of the Lecture Notes in Computer Science book series (LNCCN,volume 9247)

Abstract

The issues of information security monitoring of remote of devices self-organizing wireless networks are discussed. The model of interaction of the remote devices is shown, the analyzed characteristics of identification of node abnormal behavior for different types of topologies are identified. The approach to the assessment with the use of the selected features of the system is suggested. The experiment, providing the obtainment of statistical information about the remote devices in different modes of ad-hoc networks is revealed. The results of the system activity for a broadcast packet of network scanning with given characteristics are presented. The dependences of the responses from sleeping and waking devices for variable system structure based on ad-hoc wireless networks are given. The feature of this approach is that it allows using the built-in set of commands that gives the opportunity to avoid additional costs when constructing the control system for wireless sensor networks.

Keywords

  • Information security
  • Wireless networks
  • Multi-agent systems
  • Abnormal behavior
  • The vulnerability
  • The model of information security

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-23126-6_1
  • Chapter length: 8 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   89.00
Price excludes VAT (USA)
  • ISBN: 978-3-319-23126-6
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   119.99
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kumar, P., Ylianttila, M., Gurtov, A., Lee, S.-G., Lee, H.-J.: An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Networks-based Applications. MDPI Sensors 14(2), 2732–2755 (2014)

    CrossRef  Google Scholar 

  2. Sridhar, P., Sheikh-Bahaei, S., Xia, S., Jamshidi, Mo.: Multi agent simulation using discrete event and soft-computing methodologies. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 1711–1716 (2003)

    Google Scholar 

  3. Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proc. of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp. 85–101 (2004)

    Google Scholar 

  4. Peters, J.F.: Approximation spaces for hierarchical intelligent behavioral system models. Advances in Soft Computing (28), 13–30 (2005)

    Google Scholar 

  5. Zikratov, I.A., Kozlova, E.V., Stratowa, T.V.: The analysis of vulnerabilities of robotic systems with swarm intelligence. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 5(87), 149–154 (2013)

    Google Scholar 

  6. Gvozdev, V.A., Zikratov, I.A., Lebedev, I.S., Lapshin, S.V., Solov’ev, I.N.: Prognostic evaluation of software architectures security. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 4(80), 126–130 (2012)

    Google Scholar 

  7. Zikratov, I.A., Lebedev, I.S., Gurtov, A.V.: Trust and Reputation Mechanisms for Multi-agent Robotic Systems. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2014. LNCS, vol. 8638, pp. 106–120. Springer, Heidelberg (2014)

    Google Scholar 

  8. Wyglinski, A.M., Huang, X., Padir, T., Lai, L., Eisenbarth, T.R., Venkatasubramanian, K.: Security of autonomous systems employing embedded computing and sensors. IEEE Micro 33(1), art. no. 6504448, 80–86 (2013)

    Google Scholar 

  9. Bobtsov, A., Nikiforov, V.O.: Adaptive output control: tasks, applied problems and solutions. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 1(83). S.1–S.14 (2013)

    Google Scholar 

  10. Maltsev, G.N., Dzhumkov, V.V.: A generalized model of a discrete communication channel with grouping errors. Information and Control Systems 1, 27–33 (2013)

    Google Scholar 

  11. Prabhakar, M., Singh, J.N., Mahadevan, G.: Nash Equilibrium and Marcov Chains to Enhance Game Theoretic Approach for Vanet Security. In: Aswatha Kumar, M., Selvarani, R., Kumar, T.V.S. (eds.) Proceedings of ICAdC. AISC, vol. 174, pp. 191–199. Springer, Heidelberg (2013)

    CrossRef  Google Scholar 

  12. Komov, S. A. and others: Terms and definitions in the field of information security. – M., AC-trust, 2009. -304 S.

    Google Scholar 

  13. Koval, E.N., Lebedev, I.S.: Total security model of the robotic systems. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 4(86) S.153–S.154 (2013)

    Google Scholar 

  14. Zikratov, I.S., Stratowa, T.V., Lebedev, I.S., Gurtov, V.A.: Building a Model of trust and reputation to the objects of multi-agent robotic systems with decentralized control. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 3(91), 30–39 (2014)

    Google Scholar 

  15. Shago, F.N., Zikratov, I.A.: The optimization system of planning of audit of information security management. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 2(90), 111–118 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Viktoria Korzhuk .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Lebedev, I., Korzhuk, V. (2015). The Monitoring of Information Security of Remote Devices of Wireless Networks. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. ruSMART NEW2AN 2015 2015. Lecture Notes in Computer Science(), vol 9247. Springer, Cham. https://doi.org/10.1007/978-3-319-23126-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23126-6_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23125-9

  • Online ISBN: 978-3-319-23126-6

  • eBook Packages: Computer ScienceComputer Science (R0)