Standard

Monitoring of the Information Security of Wireless remote devices. / Bazhayev, N.; Lebedev, I.; Korzhuk, V.; Zikratov, I.

9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2015. p. 233-236 7338553 (9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Harvard

Bazhayev, N, Lebedev, I, Korzhuk, V & Zikratov, I 2015, Monitoring of the Information Security of Wireless remote devices. in 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings., 7338553, 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings, Institute of Electrical and Electronics Engineers Inc., pp. 233-236, 9th International Conference on Application of Information and Communication Technologies, AICT 2015, Rostov-on-Don, Russian Federation, 14/10/15. https://doi.org/10.1109/ICAICT.2015.7338553

APA

Bazhayev, N., Lebedev, I., Korzhuk, V., & Zikratov, I. (2015). Monitoring of the Information Security of Wireless remote devices. In 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings (pp. 233-236). [7338553] (9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICAICT.2015.7338553

Vancouver

Bazhayev N, Lebedev I, Korzhuk V, Zikratov I. Monitoring of the Information Security of Wireless remote devices. In 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2015. p. 233-236. 7338553. (9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings). https://doi.org/10.1109/ICAICT.2015.7338553

Author

Bazhayev, N. ; Lebedev, I. ; Korzhuk, V. ; Zikratov, I. / Monitoring of the Information Security of Wireless remote devices. 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2015. pp. 233-236 (9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings).

BibTeX

@inproceedings{6a2df446e9f24bda991222357665cab6,
title = "Monitoring of the Information Security of Wireless remote devices",
abstract = "The organization of the Information Security of Wireless remote devices of the self-organizing wireless networks was discussed. The functionality of the systems based on wireless technology was analyzed. The properties of available nodes were considered. The notion of interoperability elements of self-organizing wireless networks was defined. A model of the interaction of remote devices was detected; and analyzes signs identifying anomalous behavior catch for different topologies were shown. A model of interaction of remote devices was detected; and analyzes signs identifying anomalous behavior of nodes for various kinds of topologies were shown. The results of the simulation states interoperability between the two devices is a self-organizing network based on the dependency model were identified. The levels of indicators for functionality of the system in the different modes and environment were shown. The characteristics that reflect the state of the system, which can be used in the statistical analysis to detect anomalous behavior of the remote devices, were defined. An approach to the evaluation that uses dedicated system characteristics was proposed. The experiment that provides obtaining statistical information on remote devices for different modes of self-organizing network was disclosed. The results of the system for the broadcast packet network scan with given technical specifications were presented. The dependences of sleeping and waking feedback devices for the different composition systems based on self-organizing wireless networks were given. The feature of the approach is that it allows using a built-in command set, which allows avoiding additional costs in the construction of the control systems for wireless sensor networks.",
keywords = "anomalous behavior, Information Security, model of the Information Security, multi-agent systems, wireless networks",
author = "N. Bazhayev and I. Lebedev and V. Korzhuk and I. Zikratov",
year = "2015",
month = nov,
day = "25",
doi = "10.1109/ICAICT.2015.7338553",
language = "English",
series = "9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "233--236",
booktitle = "9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings",
address = "United States",
note = "9th International Conference on Application of Information and Communication Technologies, AICT 2015 ; Conference date: 14-10-2015 Through 16-10-2015",

}

RIS

TY - GEN

T1 - Monitoring of the Information Security of Wireless remote devices

AU - Bazhayev, N.

AU - Lebedev, I.

AU - Korzhuk, V.

AU - Zikratov, I.

PY - 2015/11/25

Y1 - 2015/11/25

N2 - The organization of the Information Security of Wireless remote devices of the self-organizing wireless networks was discussed. The functionality of the systems based on wireless technology was analyzed. The properties of available nodes were considered. The notion of interoperability elements of self-organizing wireless networks was defined. A model of the interaction of remote devices was detected; and analyzes signs identifying anomalous behavior catch for different topologies were shown. A model of interaction of remote devices was detected; and analyzes signs identifying anomalous behavior of nodes for various kinds of topologies were shown. The results of the simulation states interoperability between the two devices is a self-organizing network based on the dependency model were identified. The levels of indicators for functionality of the system in the different modes and environment were shown. The characteristics that reflect the state of the system, which can be used in the statistical analysis to detect anomalous behavior of the remote devices, were defined. An approach to the evaluation that uses dedicated system characteristics was proposed. The experiment that provides obtaining statistical information on remote devices for different modes of self-organizing network was disclosed. The results of the system for the broadcast packet network scan with given technical specifications were presented. The dependences of sleeping and waking feedback devices for the different composition systems based on self-organizing wireless networks were given. The feature of the approach is that it allows using a built-in command set, which allows avoiding additional costs in the construction of the control systems for wireless sensor networks.

AB - The organization of the Information Security of Wireless remote devices of the self-organizing wireless networks was discussed. The functionality of the systems based on wireless technology was analyzed. The properties of available nodes were considered. The notion of interoperability elements of self-organizing wireless networks was defined. A model of the interaction of remote devices was detected; and analyzes signs identifying anomalous behavior catch for different topologies were shown. A model of interaction of remote devices was detected; and analyzes signs identifying anomalous behavior of nodes for various kinds of topologies were shown. The results of the simulation states interoperability between the two devices is a self-organizing network based on the dependency model were identified. The levels of indicators for functionality of the system in the different modes and environment were shown. The characteristics that reflect the state of the system, which can be used in the statistical analysis to detect anomalous behavior of the remote devices, were defined. An approach to the evaluation that uses dedicated system characteristics was proposed. The experiment that provides obtaining statistical information on remote devices for different modes of self-organizing network was disclosed. The results of the system for the broadcast packet network scan with given technical specifications were presented. The dependences of sleeping and waking feedback devices for the different composition systems based on self-organizing wireless networks were given. The feature of the approach is that it allows using a built-in command set, which allows avoiding additional costs in the construction of the control systems for wireless sensor networks.

KW - anomalous behavior

KW - Information Security

KW - model of the Information Security

KW - multi-agent systems

KW - wireless networks

UR - http://www.scopus.com/inward/record.url?scp=84960891342&partnerID=8YFLogxK

U2 - 10.1109/ICAICT.2015.7338553

DO - 10.1109/ICAICT.2015.7338553

M3 - Conference contribution

AN - SCOPUS:84960891342

T3 - 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings

SP - 233

EP - 236

BT - 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

T2 - 9th International Conference on Application of Information and Communication Technologies, AICT 2015

Y2 - 14 October 2015 through 16 October 2015

ER -

ID: 53920258