Abstract
A wireless network being affected by a broadcast storm attack has been considered to determine the availability of autonomous nodes and its ability to perform functional tasks under information influence. The conditions for the hacker attacks from a potential intruder have been determined. A wireless device availability analysis has been carried out. A model for determining the technical characteristics of the wireless self-organizing network device has been proposed.
Similar content being viewed by others
References
Kumar, P., Ylianttila, M., Gurtov, A., Lee, S.-G., and Lee, H.-J., An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor networks-based applications, MDPI Sens., 2014, vol. 14, no. 2, pp. 2732–2755.
Sridhar, P., Sheikh-Bahaei, S., Xia, S., and Jamshidi, Mo., Multi agent simulation using discrete event and softcomputing methodologies, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2003, vol. 2, pp. 1711–1716.
Page, J., Zaslavsky, A., and Indrawan, M., Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities, Proc. of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), 2004, pp. 85–101.
Zikratov, I.A., Kozlova, E.V., and Zikratova, T.V., Analysis of vulnerabilities of robotic complexes with swarm intelligence, Nauchno-Tekh. Vestn. Inf. Tekhnol. Mekh. Opt., 2013, no. 5 (87), pp. 149–154.
Zikratov, I., Lebedev, I., and Gurtov, A., Trust and reputation mechanisms for multi-agent robotic systems, Lect. Notes Comput. Sci., 2014, vol. 8638, pp. 106–120.
Wyglinski, A.M., Huang, X., Padir, T., Lai, L., Eisenbarth, T.R., and Venkatasubramanian, K., Security of autonomous systems employing embedded computing and sensors, IEEE Micro, 2013, vol. 33, no. 1, pp. 80–86.
Lebedev, I.S. and Korzhuk, V.M., The monitoring of information security of remote devices of wireless networks, Lect. Notes Comput. Sci., 2015, vol. 9247, pp. 3–10.
Prabhakar, M. and Singh, J.N., Mahadevan Nash equilibrium and Marcov chains to enhance game theoretic approach for VANET security, International Conference on Advances in Computing, ICAdC 2012, Bangalore, 2012, pp. 191–199.
Korzun, D.G., Nikolaevskiy, I., and Gurtov, A.V., Service intelligence support for medical sensor networks in personalized mobile health systems, Lect. Notes Comput. Sci., 2015, vol. 9247, pp. 116–127.
Recommendation MSE-T Kh.805: Security Architecture for Systems that Provide Communication between Endpoints.
Nikolaevskiy, I., Lukyanenko, A., Polishchuk, T., Polishchuk, V.M., and Gurtov, A.V., isBF: Scalable in-packet bloom filter based multicast, Comput. Commun., 2015, vol. 70, pp. 79–85.
Kulikov, E.I., Prikladnoi statisticheskii analiz: Uchebnoe posobie dlya vuzov (Applied Statistical Analysis: Textbook for Universities), Moscow: Goryachaya liniya-Telekom, 2008, 2nd ed.
Komov, S.A., et al., Terminy i opredeleniya v oblasti informatsionnoi bezopasnosti (Terms and Definitions in the Field of Information Security), Moscow: AS-Trast, 2009.
Kumar, P., Gurtov, A.V., Linatti, J., Ylianttila, M., and Sain, M., Lightweight and secure session-key establishment scheme in smart home environments, IEEE Sensors J., 2015, vol. 16, no. 1.
Al-Naggar, Y. and Koucheryavy, A., Fuzzy logic and Voronoi diagram using for cluster head selection in ubiquitous sensor networks, Internet of Things, Smart Spaces, and Next Generation Networks and Systems. 14th International Conference, NEW2AN 2014 and 7th Conference, ruSMART 2014 Saint-Petersburg, Russia, August 27–29, 2014, 2014, pp. 319–330.
Chehri, A. and Hussein, T., Moutah survivable and scalable wireless solution for e-health and emergency applications, EICS4MED 2011. Proceedings of the 1st International Workshop on Engineering Interactive Computing Systems for Medicine and Health Care, Pisa, 2011, pp. 25–29.
Kucheryavyi, E.A., Ometov, A.Ya., and Andreev, D.S., On the role of wireless communication technologies in the development of the Internet of Things, Inf. Tekhnol. Telekommun., 2014, no. 3, pp. 31–40.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © M.E. Suhoparov, N.A. Bazhaev, I.E. Krivtsova, I.S. Lebedev, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
About this article
Cite this article
Suhoparov, M.E., Bazhaev, N.A., Krivtsova, I.E. et al. Modeling of information influence on remote wireless network devices. Aut. Control Comp. Sci. 51, 992–999 (2017). https://doi.org/10.3103/S0146411617080223
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411617080223