AVAILABILITY RESEARCH OF REMOTE DEVICES FOR WIRELESS NETWORKS
Read the full article ';
For citation: Bazhayev N.A., Krivtsova I.E., Lebedev I.S. Availability research of remote devices for wireless networks. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2016, vol. 16, no. 3, pp. 467–473. doi: 10.17586/2226-1494-2016-16-3-467-473
We consider the wireless network under attack, aimed at "broadcast storm" initiation, in order to determine the availability of stand-alone units and the ability to carry out their functional tasks under information exposure. We determine a set of conditions for such type of attacks on the part of potential information interloper. The functional analysis of the systems based on wireless technology is made. We examine the remote device of a self-organizing wireless network as a queuing system M/M/1/n. Model dependencies are shown for normal system performance and at information exposure on the part of potential information interloper. Analytical simulation of wireless network functioning is carried out in the normal mode and under the attack aimed at "broadcast storm" initiation. An experiment is described which provides statistical information on operation of network remote devices. We present experiment results on carrying out attack at typical system transferring data by broabcast net scanning package at different noise intensities on the part of information interloper. The proposed model can be used to determine the technical characteristics of wireless ad-hoc network, develop recommendations for node configuration, aimed at countering "broadcast storm".
1. Kumar P., Ylianttila M., Gurtov A., Lee S.-G., Lee H.-J. An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor networks-based applications. Sensors, 2014, vol. 14, pp. 2732–2755. doi: 10.3390/s140202732
2. Sridhar P., Sheikh-Bahaei S., Xia S., Jamshidi Mo. Multi agent simulation using discrete event and soft-computing methodologies. Proc. IEEE Int. Conf. on Systems, Man and Cybernetics, 2003, vol. 2, pp.
3. Page J., Zaslavsky A., Indrawan M. Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. Proc. of the 1st International Workshop on Safety and Security in Multi-Agent Systems, SASEMAS. 2004, pp. 85–101.
4. Zikratov I.A., Kozlova E.V., Zikratova T.V. Vulnerability analysis of robotic systems with swarm intelligence. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2013, no. 5(87), pp. 149–154.
5. Zikratov I.A., Lebedev I.S., Gurtov A.V. Trust and reputation mechanisms for multi-agent robotic systems. Lecture Notes in Computer Science, 2014, vol. 8638, pp. 106–120. doi: 10.1007/978-3-319-10353-2_10
6. Wyglinski A.M., Huang X., Padir T., Lai L., Eisenbarth T.R., Venkatasubramanian K. Security of autonomous systems employing embedded computing and sensors. IEEE Micro, 2013, vol. 33, no. 1, pp. 80–86. doi: 10.1109/MM.2013.18
7. Lebedev I.S., Korzhuk V.M. The monitoring of information security of remote devices of wireless networks. Lecture Notes in Computer Science, 2015, vol. 9247, pp. 3–10. doi: 10.1007/978-3-319-23126-6_1
8. Prabhakar M., Singh J.N., Mahadevan G. Nash equilibrium and Marcov chains to enhance game theoretic approach for vanet security. Proc. Int. Conf. on Advances in Computing, ICAdC 2012. Bangalore, Karnataka, India, 2012, vol. 174, pp. 191–199. doi: 10.1007/978-81-322-0740-5_24
9. Korzun D.G., Nikolaevskiy I., Gurtov A.V. Service intelligence support for medical sensor networks in personalized mobile health systems. Lecture Notes in Computer Science, 2015, vol. 9247, pp. 116–127. doi: 10.1007/978-3-319-23126-6_11
10. Recommendation ITU-TX.805. Security Architecture for Systems Providing End-to-End Communications. 2003.
11. Nikolaevskiy I., Lukyanenko A., Polishchuk T., Polishchuk V.M., Gurtov A.V. isBF: Scalable in-packet bloom filter based multicast. Computer Communications, 2015, vol. 70, pp. 79–85. doi: 10.1016/j.comcom.2015.05.002
12. Kulikov E.I. Prikladnoi Statisticheskii Analiz [Applied Statistical Analysis]. 2nd ed. Moscow, Goryachaya Liniya-Telekom, 2008, 464 p.
13. Komov S.A. et. al. Terminy i Opredeleniya v Oblasti Informatsionnoi Bezopasnosti [Terms and Definitions in the Field of Information Security]. Мoscow, AS-Trast Publ., 2009, 304 p.
14. Kumar P., Gurtov A.V., Linatti J., Ylianttila M., Sain M. Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sensors Journal, 2015, vol. 16, no. 1, pp. 254–264. doi: 10.1109/JSEN.2015.2475298
15. Al-Naggar Y., Koucheryavy A. Fuzzy logic and Voronoi diagram using for cluster head selection in ubiquitous sensor networks. Lecture Notes in Computer Science, 2014, vol. 8638, pp. 319–330. doi: 10.1007/978-3-319-10353-2_28
16. Chehri A., Moutah H.T. Survivable and scalable wireless solution for E-health and emergency applications. Proc. 1st Int. Workshop on Engineering Interactive Computing Systems for Medicine and Health Care, EICS4MED 2011. Pisa, Italy, 2011, pp. 25–29.
17. Omjotov A., Koucheryavy Y., Andreev S. About the wireless technology role for the development of ”Internet of things”. IT&Telecom, 2014, no. 3(7), pp. 31–40.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License