DOI: 10.17586/2226-1494-2018-18-1-98-105


V. V. Semenov Victor V., I. S. Lebedev, M. E. Sukhoparov

Read the full article 
For citation: Semenov V.V., Lebedev I.S., Sukhoparov M.E. Approach to classification of the information security state of elements for cyber-physical systems by applying side electromagnetic radiation. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2018, vol. 18, no. 1, pp. 98–105 (in Russian). doi: 10.17586/2226-1494-2018-18-1-98-105


 We consider problematic issues of information security for cyber-physical systems. The analysis of the characteristics of autonomous objects has been carried out. The paper presents a model for the information security monitoring system based on the characteristics obtained as a result of the electromagnetic radiation analysis of the electronic components of the autonomous devices in cyber-physical systems. A typical scheme for the system state determination is shown. For reasons of the device features providing the infrastructure, information security state assessment is aimed at the analysis of the system normal functioning, rather than the search for signatures and characteristics of anomalies during various types of information attacks. An experiment is described providing statistical information on the operation of remote devices of cyber-physical systems where data accumulation for decision-making occurs by statistical information comparison. The experiment results on information impact on a typical system are presented. The proposed approach for the statistical data analysis of autonomous devices based on a naive Bayesian classifier can be used to determine the information security states. A special feature of our approach is the ability for quick adaptation and application of various mathematical apparatus, and machine learning methods to achieve given quality of probabilistic assessment of information security state. The implementation of this type of monitoring does not require the development of complex system applications. It allows for implementation of various system building architectures processing the autonomous object on-board or data transfer and state calculation on external computer nodes of monitoring and control systems.

Keywords: information security, cyber-physical systems, information security monitoring systems

 1.      Kotenko I.V., Saenko I.B. Creating new-generation cybersecurity monitoring and management systems.Herald of the Russian Academy of Sciences, 2014, vol. 84, no. 6, pp. 424–431. doi: 10.1134/S1019331614060033
2.      Rogachev G.N. Production method of describing automated controllers in the analysis of continuous-discrete control systems. Automatic Control and Computer Sciences, 2014, vol. 48, no. 5, pp. 249–256. doi: 10.3103/S0146411614050095
3.      Leshchev S.V.Electronic culture and virtual reality: the third digital wave of the NBIC paradigm. Vestnik Gumanitarnogo Fakul'teta IGKhTU, 2014, vol. 7, pp. 5–9. (In Russian)
4.      Krivtsova I., Lebedev I., Sukhoparov M., Bazhayev N., Zikratov I., Ometov A., Andreev S., Masek P., Fujdiak R., Hosek J. Implementing a broadcast storm attack on a mission-critical wireless sensor network. Lecture Notes in Computer Science, 2016, vol. 9674, pp. 297–308. doi: 10.1007/978-3-319-33936-8_23
5.      Sukhoparov M.E., Lebedev I.S. Detection method for personal networks anomalous behaviour.Information Security Problems. Computer Systems, 2017, no. 1, pp. 9–15. (In Russian)
6.      Bazhayev N.A., Lebedev I.S., Krivtsova I.E. Analysis of statistical data from network infrastructure monitoring to detect abnormal behavior of system local segments. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2017, vol. 17, no. 1, pp. 92–99. (In Russian) doi: 10.17586/2226-1494-2017-17-1-92-99
7.      Lebedev I.S., Bazhayev N., Sukhoparov M.E., Petrov V.I., Gurtov A.V. Analysis of the state of information security on the basis of surious emission electronic components. Proc. 20th Conference of Open Innovations Association FRUCT. St. Petersburg, Russia, 2017, pp. 216–221. doi: 10.23919/FRUCT.2017.8071314
8.      Nikolaevskiy I., Lukyanenko A., Polishchuk T., Polishchuk V.M., Gurtov A.V. isBF: scalable in-packet bloom filter based multicast. Computer Communications, 2015, vol. 70, pp. 79–85. doi: 10.1016/j.comcom.2015.05.002
9.      Al-Naggar Y., Koucheryavy A. Fuzzy logic and Voronoi diagram using for cluster head selection in ubiquitous sensor networks. Lecture Notes in Computer Science, 2014, vol. 8638, pp. 319–330. doi: 10.1007/978-3-319-10353-2_28 
10.   Chehri A., Moutah H.T. Survivable and scalable wireless solution for e-health and emergency applications. Proc. 1st Int. Workshop on Engineering Interactive Computing Systems for Medicine and Health Care. Pisa, Italy, 2011, pp. 25–29.
11.   Sukhoparov M.E., Lebedev I.S. Analysis of information security status based on adverse radiation of electronic components. Information Security Problems. Computer Systems, 2017, no. 2, pp. 92–98. (In Russian)
12.   Royakkers L., van Est R. A literature review on new robotics: automation from love to war. International Journal of Social Robotics, 2015, vol. 7, no. 5, pp. 549–570. doi: 10.1007/s12369-015-0295-x
13.   Chernyak L. Cyberphysical systems at start. Open Systems. DBMS, 2014, no. 2, pp. 10–13. (In Russian)
14.   Lee E.A., Neuendorffer S., Wirthlin M.J. Actor-oriented design of embedded hardware and software systems. Journal of Circuits, Systems and Computers, 2003, vol. 12, no. 3, pp. 231–260. doi: 10.1142/S0218126603000751
15.   Yusupov R.M., Ronzhin A.L. From smart devices to smart space. Herald of the Russian Academy of Sciences, 2010, vol. 80, no. 1, pp. 63–68. (In Russian)

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2019 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.