The organization of the Information Security of Wireless remote devices of the self-organizing wireless networks was discussed. The functionality of the systems based on wireless technology was analyzed. The properties of available nodes were considered. The notion of interoperability elements of self-organizing wireless networks was defined. A model of the interaction of remote devices was detected; and analyzes signs identifying anomalous behavior catch for different topologies were shown. A model of interaction of remote devices was detected; and analyzes signs identifying anomalous behavior of nodes for various kinds of topologies were shown. The results of the simulation states interoperability between the two devices is a self-organizing network based on the dependency model were identified. The levels of indicators for functionality of the system in the different modes and environment were shown. The characteristics that reflect the state of the system, which can be used in the statistical analysis to detect anomalous behavior of the remote devices, were defined. An approach to the evaluation that uses dedicated system characteristics was proposed. The experiment that provides obtaining statistical information on remote devices for different modes of self-organizing network was disclosed. The results of the system for the broadcast packet network scan with given technical specifications were presented. The dependences of sleeping and waking feedback devices for the different composition systems based on self-organizing wireless networks were given. The feature of the approach is that it allows using a built-in command set, which allows avoiding additional costs in the construction of the control systems for wireless sensor networks.

Original languageEnglish
Title of host publication9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages233-236
Number of pages4
ISBN (Electronic)9781467368551
DOIs
StatePublished - 25 Nov 2015
Event9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Rostov-on-Don, Russian Federation
Duration: 14 Oct 201516 Oct 2015

Publication series

Name9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings

Conference

Conference9th International Conference on Application of Information and Communication Technologies, AICT 2015
Country/TerritoryRussian Federation
CityRostov-on-Don
Period14/10/1516/10/15

    Research areas

  • anomalous behavior, Information Security, model of the Information Security, multi-agent systems, wireless networks

    Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

ID: 53920258