Skip to main content
Log in

Modeling of information influence on remote wireless network devices

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

A wireless network being affected by a broadcast storm attack has been considered to determine the availability of autonomous nodes and its ability to perform functional tasks under information influence. The conditions for the hacker attacks from a potential intruder have been determined. A wireless device availability analysis has been carried out. A model for determining the technical characteristics of the wireless self-organizing network device has been proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Kumar, P., Ylianttila, M., Gurtov, A., Lee, S.-G., and Lee, H.-J., An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor networks-based applications, MDPI Sens., 2014, vol. 14, no. 2, pp. 2732–2755.

    Article  Google Scholar 

  2. Sridhar, P., Sheikh-Bahaei, S., Xia, S., and Jamshidi, Mo., Multi agent simulation using discrete event and softcomputing methodologies, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2003, vol. 2, pp. 1711–1716.

    Google Scholar 

  3. Page, J., Zaslavsky, A., and Indrawan, M., Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities, Proc. of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), 2004, pp. 85–101.

    Google Scholar 

  4. Zikratov, I.A., Kozlova, E.V., and Zikratova, T.V., Analysis of vulnerabilities of robotic complexes with swarm intelligence, Nauchno-Tekh. Vestn. Inf. Tekhnol. Mekh. Opt., 2013, no. 5 (87), pp. 149–154.

    Google Scholar 

  5. Zikratov, I., Lebedev, I., and Gurtov, A., Trust and reputation mechanisms for multi-agent robotic systems, Lect. Notes Comput. Sci., 2014, vol. 8638, pp. 106–120.

    Article  Google Scholar 

  6. Wyglinski, A.M., Huang, X., Padir, T., Lai, L., Eisenbarth, T.R., and Venkatasubramanian, K., Security of autonomous systems employing embedded computing and sensors, IEEE Micro, 2013, vol. 33, no. 1, pp. 80–86.

    Article  Google Scholar 

  7. Lebedev, I.S. and Korzhuk, V.M., The monitoring of information security of remote devices of wireless networks, Lect. Notes Comput. Sci., 2015, vol. 9247, pp. 3–10.

    Article  Google Scholar 

  8. Prabhakar, M. and Singh, J.N., Mahadevan Nash equilibrium and Marcov chains to enhance game theoretic approach for VANET security, International Conference on Advances in Computing, ICAdC 2012, Bangalore, 2012, pp. 191–199.

    Google Scholar 

  9. Korzun, D.G., Nikolaevskiy, I., and Gurtov, A.V., Service intelligence support for medical sensor networks in personalized mobile health systems, Lect. Notes Comput. Sci., 2015, vol. 9247, pp. 116–127.

    Article  Google Scholar 

  10. Recommendation MSE-T Kh.805: Security Architecture for Systems that Provide Communication between Endpoints.

  11. Nikolaevskiy, I., Lukyanenko, A., Polishchuk, T., Polishchuk, V.M., and Gurtov, A.V., isBF: Scalable in-packet bloom filter based multicast, Comput. Commun., 2015, vol. 70, pp. 79–85.

    Article  Google Scholar 

  12. Kulikov, E.I., Prikladnoi statisticheskii analiz: Uchebnoe posobie dlya vuzov (Applied Statistical Analysis: Textbook for Universities), Moscow: Goryachaya liniya-Telekom, 2008, 2nd ed.

    Google Scholar 

  13. Komov, S.A., et al., Terminy i opredeleniya v oblasti informatsionnoi bezopasnosti (Terms and Definitions in the Field of Information Security), Moscow: AS-Trast, 2009.

    Google Scholar 

  14. Kumar, P., Gurtov, A.V., Linatti, J., Ylianttila, M., and Sain, M., Lightweight and secure session-key establishment scheme in smart home environments, IEEE Sensors J., 2015, vol. 16, no. 1.

    Google Scholar 

  15. Al-Naggar, Y. and Koucheryavy, A., Fuzzy logic and Voronoi diagram using for cluster head selection in ubiquitous sensor networks, Internet of Things, Smart Spaces, and Next Generation Networks and Systems. 14th International Conference, NEW2AN 2014 and 7th Conference, ruSMART 2014 Saint-Petersburg, Russia, August 27–29, 2014, 2014, pp. 319–330.

    Google Scholar 

  16. Chehri, A. and Hussein, T., Moutah survivable and scalable wireless solution for e-health and emergency applications, EICS4MED 2011. Proceedings of the 1st International Workshop on Engineering Interactive Computing Systems for Medicine and Health Care, Pisa, 2011, pp. 25–29.

    Google Scholar 

  17. Kucheryavyi, E.A., Ometov, A.Ya., and Andreev, D.S., On the role of wireless communication technologies in the development of the Internet of Things, Inf. Tekhnol. Telekommun., 2014, no. 3, pp. 31–40.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. E. Suhoparov.

Additional information

Original Russian Text © M.E. Suhoparov, N.A. Bazhaev, I.E. Krivtsova, I.S. Lebedev, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Suhoparov, M.E., Bazhaev, N.A., Krivtsova, I.E. et al. Modeling of information influence on remote wireless network devices. Aut. Control Comp. Sci. 51, 992–999 (2017). https://doi.org/10.3103/S0146411617080223

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411617080223

Keywords

Navigation