Abstract
The paper deals with problematic issues of information security in cyber-physical systems. Performance analysis of autonomous objects has been carried out. An information security monitoring system model based on the characteristics resulting from the analysis of electromagnetic radiation from electronic components in standalone devices of cyber-physical systems is presented. A typical scheme for determining the state of a system is shown. Due to the features of equipment sustaining the infrastructure, assessment of an information security state is aimed at analyzing normal system operation rather than searching for signatures and characteristics of anomalies during various types of information attacks. An experiment that provides statistical information on the operation of remote devices of cyber-physical systems has been disclosed, whereby data for decision-making are accumulated by comparing statistical information. The experimental results on information influence on a typical system are presented. The proposed approach for analyzing statistical data of standalone devices based on a naive Bayesian classifier can be used to determine information security states. A special feature of the approach is the ability to rapid adaptation and application of various mathematical tools and machine learning methods to achieve a desired quality of probabilistic evaluation.
Implementation of this type of monitoring does not require a development of complex system applications while allowing implementation of various architectures for system construction that are capable of processing on-board an autonomous object or of communicating data and calculating the state on external computer nodes of monitoring and control systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kotenko, I.V., Sayenko, I.B.: Creation of new systems for monitoring and managing cybersecurity. Bull. Russ. Acad. Sci. 84(11), 993–1001 (2014)
Rogachev, G.N.: Production method of describing automated controllers in the analysis of continuous-discrete control systems. Autom. Control Comput. Sci. 48(5), 249–256 (2014)
Leschev, S.V.: Electronic culture and virtual reality: the third digital wave of the NBIC paradigm. Bull. Hum. Fac. Ivanovo State Chem. Technol. Univ. 7, 5–9 (2014)
Krivtsova, I., et al.: Implementing a broadcast storm attack on a mission-critical wireless sensor network. In: Mamatas, L., Matta, I., Papadimitriou, P., Koucheryavy, Y. (eds.) WWIC 2016. LNCS, vol. 9674, pp. 297–308. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33936-8_23
Sukhoparov, M.E., Lebedev, I.S.: Method for detecting abnormal behavior of personal networks. Prob. Inf. Secur. Comput. Syst. 1, 9–15 (2017)
Bazhayev, N., Lebedev, I.S., Krivtsova, I.E.: Analysis of statistical data for monitoring the network infrastructure to detect abnormal behavior of the local segment of the system. Sci. Tech. Bull. Inf. Technol. Mech. Opt. 17(1/107), 92–99 (2017)
Lebedev, I.S., Bazhayev, N., Sukhoparov, M.E., Petrov, V.I., Gurtov, A.V.: Analysis of the state of information security on the basis of surious emission electronic components. In: Proceedings of the 20th Conference of Open Innovations Association FRUCT, pp. 216–221 (2017)
Nikolaevskiy, I., Lukyanenko, A., Polishchuk, T., Polishchuk, V.M., Gurtov, A.V.: isBF: scalable in-packet bloom filter based multicast. Comput. Commun. 70, 79–85 (2015)
Al-Naggar, Y., Koucheryavy, A.: Fuzzy logic and voronoi diagram using for cluster head selection in ubiquitous sensor networks. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN 2014. LNCS, vol. 8638, pp. 319–330. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10353-2_28
Chehri, A., Moutah, H.T.: Survivable and scalable wireless solution for E-health and emergency applications. In: Proceedings of the 1st International Workshop on Engineering Interactive Computing Systems for Medicine and Health Care (EICS4MED 2011), Pisa, Italy, pp. 25–29 (2011)
Sukhoparov, M.E., Lebedev, I.S.: Analysis of the state of information security based on spurious emission of electronic components. Inf. Secur. Prob. Comput. Syst. 2, 92–98 (2017)
Royakkers, L., van Est, R.: A literature review on new robotics: automation from love to war. Int. J. Social Robot. 7(5), 549–570 (2015)
Chernyak, L.: Cyberphysical systems at the start. Open Syst. 2, 10–13 (2014)
Lee, E.A., Neuendorffer, S., Wirthlin, M.J.: Actor-oriented design of embedded hardware and software systems. J. Circ. Syst. Comput. 12, 231–260 (2003)
Yusupov, R.M., Ronzhin, A.L.: From smart devices to the intellectual space. Bull. Russ. Acad. Sci. 80(1), 45–51 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Semenov, V., Sukhoparov, M., Lebedev, I. (2018). An Approach to Classification of the Information Security State of Elements of Cyber-Physical Systems Using Side Electromagnetic Radiation. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2018 2018. Lecture Notes in Computer Science(), vol 11118. Springer, Cham. https://doi.org/10.1007/978-3-030-01168-0_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-01168-0_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01167-3
Online ISBN: 978-3-030-01168-0
eBook Packages: Computer ScienceComputer Science (R0)