Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
Monitoring of the Information Security of Wireless remote devices. / Bazhayev, N.; Lebedev, I.; Korzhuk, V.; Zikratov, I.
9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2015. p. 233-236 7338553 (9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
}
TY - GEN
T1 - Monitoring of the Information Security of Wireless remote devices
AU - Bazhayev, N.
AU - Lebedev, I.
AU - Korzhuk, V.
AU - Zikratov, I.
PY - 2015/11/25
Y1 - 2015/11/25
N2 - The organization of the Information Security of Wireless remote devices of the self-organizing wireless networks was discussed. The functionality of the systems based on wireless technology was analyzed. The properties of available nodes were considered. The notion of interoperability elements of self-organizing wireless networks was defined. A model of the interaction of remote devices was detected; and analyzes signs identifying anomalous behavior catch for different topologies were shown. A model of interaction of remote devices was detected; and analyzes signs identifying anomalous behavior of nodes for various kinds of topologies were shown. The results of the simulation states interoperability between the two devices is a self-organizing network based on the dependency model were identified. The levels of indicators for functionality of the system in the different modes and environment were shown. The characteristics that reflect the state of the system, which can be used in the statistical analysis to detect anomalous behavior of the remote devices, were defined. An approach to the evaluation that uses dedicated system characteristics was proposed. The experiment that provides obtaining statistical information on remote devices for different modes of self-organizing network was disclosed. The results of the system for the broadcast packet network scan with given technical specifications were presented. The dependences of sleeping and waking feedback devices for the different composition systems based on self-organizing wireless networks were given. The feature of the approach is that it allows using a built-in command set, which allows avoiding additional costs in the construction of the control systems for wireless sensor networks.
AB - The organization of the Information Security of Wireless remote devices of the self-organizing wireless networks was discussed. The functionality of the systems based on wireless technology was analyzed. The properties of available nodes were considered. The notion of interoperability elements of self-organizing wireless networks was defined. A model of the interaction of remote devices was detected; and analyzes signs identifying anomalous behavior catch for different topologies were shown. A model of interaction of remote devices was detected; and analyzes signs identifying anomalous behavior of nodes for various kinds of topologies were shown. The results of the simulation states interoperability between the two devices is a self-organizing network based on the dependency model were identified. The levels of indicators for functionality of the system in the different modes and environment were shown. The characteristics that reflect the state of the system, which can be used in the statistical analysis to detect anomalous behavior of the remote devices, were defined. An approach to the evaluation that uses dedicated system characteristics was proposed. The experiment that provides obtaining statistical information on remote devices for different modes of self-organizing network was disclosed. The results of the system for the broadcast packet network scan with given technical specifications were presented. The dependences of sleeping and waking feedback devices for the different composition systems based on self-organizing wireless networks were given. The feature of the approach is that it allows using a built-in command set, which allows avoiding additional costs in the construction of the control systems for wireless sensor networks.
KW - anomalous behavior
KW - Information Security
KW - model of the Information Security
KW - multi-agent systems
KW - wireless networks
UR - http://www.scopus.com/inward/record.url?scp=84960891342&partnerID=8YFLogxK
U2 - 10.1109/ICAICT.2015.7338553
DO - 10.1109/ICAICT.2015.7338553
M3 - Conference contribution
AN - SCOPUS:84960891342
T3 - 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings
SP - 233
EP - 236
BT - 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 9th International Conference on Application of Information and Communication Technologies, AICT 2015
Y2 - 14 October 2015 through 16 October 2015
ER -
ID: 53920258