doi: 10.17586/2226-1494-2019-19-3-492-498


PROCESSING OF SIGNAL INFORMATION IN PROBLEMS OF MONITORING INFORMATION SECURITY OF UNMANNED AUTONOMOUS OBJECTS

V. V. Semenov, I. S. Lebedev


Read the full article  ';
Article in Russian

For citation:
Semenov V.V., Lebedev I.S. Processing of signal information in problems of monitoring information security of unmanned autonomous objects. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2019, vol. 19, no. 3, pp. 492–498 (in Russian). doi: 10.17586/2226-1494-2019-19-3-492-498


Abstract
Subject of Research. We consider problematic issues of ensuring the information security of autonomous unmanned objects. Prerequisites are revealed that determine the need for external monitoring systems. The type and statistical characteristics are shown used for the analysis and classification of sound signals. Method. The proposed approach to analysis of information security state of an autonomous object is based on classification methods and allows identifying the current state based on the processing of digitized acoustic information. An experiment is described aimed at obtaining statistical information on various types of maneuvers of an unmanned object with a different location of the audio recorder. The obtained data were processed using two-layer feed-forward neural networks with sigmoid hidden neurons. Main Results. We have solved the problem of identifying the state of information security of autonomous unmanned objects based on processing of signal information obtained through side channels. Digitized information from acoustic sensor (microphone) located statically in the experiment area has been classified more accurately than from a microphone located directly on an autonomous object. With minimal accumulation of statistical information using the proposed approach, it has become possible to identify differences in maneuvers performed by unmanned objects, and, consequently, the state of information security of an object with a probability close to 0.7. Practical Relevance. The proposed approach for processing of signal information can be used as an additional independent element for information security state determination of autonomous objects of unmanned systems. The approach can be quickly adapted using various mathematical methods and machine learning to achieve probabilistic assessment with a given quality.

Keywords: information security, unmanned autonomous objects, data processing, neural networks, information security monitoring systems

References
1. Page J., Zaslavsky A., Indrawan M. Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. Proc. 1st Int. Workshop on Safety and Security in Multi-Agent Systems, SASEMAS, 2004, pp. 85–101.
2. Semenov V.V., Lebedev I.S., Sukhoparov M.E. Identification of the state of individual elements of cyber-physical systems based on external behavioral characteristics. Journal of Applied Informatics, 2018, vol. 13, no. 5, pp. 72–83 (in Russian).
3. Hayashi Y.I., Homma N., Watanabe T., Price W.O., Radasky W.A. Introduction to the special section on electromagnetic information security. Proc. IEEE Transactions on Electromagnetic Compatibility, 2013, vol. 55, no. 3, pp. 539–546. doi: 10.1109/ temc.2013.2255294
4. Kocher P., Jaffe J., Jun B. Introduction to differential power analysis and related attacks. Lecture Notes in Computer Science, 1998, vol. 1109, pp. 104–113.
5. de Souza Faria G., Kim H.Y. Differential audio analysis: a new side-channel attack on PIN pads. International Journal of Information Security, 2019, vol. 18, no. 1, pp. 73–84. doi: 10.1007/s10207-018-0403-7
6. Gupta H., Sural S., Atluri V., Vaidya J. A side-channel attack on smartphones: Deciphering key taps using built-in microphones. Journal of Computer Security, 2018, vol. 26, no. 2, pp. 255–281. doi: 10.3233/JCS-17975
7. Sukhoparov M.E., Semenov V.V., Lebedev I.S. Information security monitoring of elements of cyber-physical systems using artificial neural networks. Metody i Tekhnicheskie Sredstva Obespecheniya Bezopasnosti Informatsii, 2018, no. 27, pp. 59–60 (in Russian).
8. Semenov V.V., Lebedev I.S., Sukhoparov M.E. Approach to classification of the information security state of elements for cyber-physical systems by applying side electromagnetic radiation. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2018, vol. 18, no. 1, pp. 98– 105 (in Russian). doi: 10.17586/2226-1494-2018-18-1-98-105
9. Semenov V.V., Sukhoparov M.E., Lebedev I.S. An approach to classification of the information security state of elements of cyber-physical systems using side electromagnetic radiation. Lecture Notes in Computer Science, 2018, vol. 11118, pp. 289– 298. doi: 10.1007/978-3-030-01168-0_27
10. Al Faruque M.A., Chhetri S.R., Canedo A., Wan J. Acoustic side- channel attacks on additive manufacturing systems. Proc. ACM/ IEEE 7th Int. Conf. on Cyber-Physical Systems. Vienna, Austria, 2016. doi: 10.1109/ICCPS.2016.7479068
11. Genkin D., Shamir A., Tromer E. Acoustic cryptanalysis. Journal of Cryptology, 2017, vol. 30, no. 2, pp. 392–443. doi: 10.1007/s00145-015-9224-2
12. Farrokhmanesh M., Hamzeh A. Music classification as a new approach for malware detection. Journal of Computer Virology and Hacking Techniques, 2018, pp. 1–20. doi: 10.1007/s11416-018-0321-2
13. Lebedev I., Krivtsova I., Korzhuk V., Bazhayev N., Sukhoparov M., Pecherkin S., Salakhutdinova K. The analysis of abnormal behavior of the system local segment on the basis of statistical data obtained from the network infrastructure monitoring. Lecture Notes in Computer Science, 2016, vol. 9870, pp. 503–511. doi: 10.1007/978-3-319-46301-8_42
14. Marinenkov E.D., Viksnin I.I., Zhukova Iu.A., Usova M.A. Analysis of information interaction security within group of unmanned aerial vehicles. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2018, vol. 18, no. 5, pp. 817–825 (in Russian). doi: 10.17586/2226-1494-2018-18-5-817-825
15. Semenov V.V., Lebedev I.S. Analysis of information security of transport systems. Proc. 16th Int. Conf. on Regional Informatics RI-2018. St. Petersburg, 2018, pp. 324–325 (in Russian).
16. Sridhar P., Sheikh-Bahaei S., Xia S., Jamshidi M. Multi agent simulation using discrete event and soft-computing methodologies. Proc. IEEE Int. Conf. on Systems, Man and Cybernetics , 2003, vol. 2, pp. 1711–1716. doi: 10.1109/icsmc.2003.1244659
17. Krivtsova I., Lebedev I., Sukhoparov M., Bazhayev N., Zikratov I., Ometov A., Andreev S., Masek P., Fujdiak R., Hosek J. Implementing a broadcast storm attack on a mission-critical wireless sensor network. Lecture Notes in Computer Science, 2016, vol. 9674, pp. 297–308. doi: 10.1007/978-3-319-33936-8_23
18. Krivtsova I.E., Salakhutdinova K.I., Kuz’mich P.A Method of construction the signatures of executable files for identification purposes. Vestnik Policii, vol. 5, no. 3, pp. 97–105 (in Russian). doi: 10.13187/vesp.2015.5.97
 


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика