Abstract
The paper considers the problems of cybersecurity for distributed infocommunication networks, related to the violation of the access rights of the executable code of active data to network node resources (shared memory, radio channel reconfiguration, motion control functions, onboard node sensor).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Carvalho, A., Silva, V., Afonso, F., Cardoso, P., Cabral, J., Ekpanyapong, M., Montenegro, S., Tavares, A.: Full virtualization on low-end hardware: a case study. In: IECON Proceedings of Industrial Electronics Conference, 21 December 2016, pp. 4784–4789 (2016)
Understanding Full Virtualization, Paravirtualization, and Hardware Assist. VMware technical documentation. Accessed 18 Apr 2019. https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/ techpaper/VMware_paravirtualization.pdf
Chen, W., Xu, W., Wang, Zh., Dou, Q., Zhao, B.: A formalization of an emulation based co-designed virtual machine. In: 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 164–168 (2011). https://doi.org/10.1109/imis.2011.144
Craig Iain, D.: Virtual Machines. Springer, London (2006). 269 p. https://doi.org/10.1007/978-1-84628-246-1
Shi, Y., Gregg, D., Beatty, A., Ertl, M.A.: Virtual machine showdown: stack versus registers. https://www.usenix.org/legacy/events/vee05/full_papers/p153-yunhe.pdf. Accessed 18 Apr 2019
Polenov, M., Guzik, V., Lukyanov, V.: Hypervisors comparison and their performance testing. In: Advances in Intelligent Systems and Computing, vol. 763, pp. 148–157. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-91186-1_16
Cheng, Y., Chen, W., Wang, Z., Yu, X.: Performance-monitoring-based traffic-aware virtual machine deployment on NUMA systems. IEEE Syst. J. 11(2), 973–982 (2017). https://doi.org/10.1109/JSYST.2015.2469652
Rao, J., Wang, K., Zhou, X., Xu, C.: Optimizing virtual machine scheduling in NUMA multicore systems. In: 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA), Shenzhen, pp. 306–317 (2013). https://doi.org/10.1109/hpca.2013.6522328
Kuleshov, S.V., Tsvetkov, O.V.: Active data in digital software-defined systems. Informatsionno-izmeritelnye i upravlyayushchie sistemy 6, 12–19 (2014). (in Russia)
Alexandrov, V.V., Kuleshov, S.V., Zaytseva, A.A.: Active data in digital software defined systems based on SEMS structures. In: Gorodetskiy, A. (ed.) Smart Electromechanical Systems. Studies in Systems, Decision and Control, vol. 49, pp. 61–69. Springer, Cham (2016)
Samad, T., Bay, J.S., Godbole, D.: Network-centric systems for military operations in urban terra. The role of UAVs. J. Proc. IEEE. 95(1), 4118473, 92–107 (2007). https://doi.org/10.1109/jproc.2006.887327
Lysenko, O.I., Valuiskyi, S.V., Tachinina, O.M., Danylyuk, S.L.: A method of control by telecommunication airsystems for wireless AD HOC networks optimization. In: IEEE 3rd International Conference Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD) Proceedings, Kyiv, Ukraine, pp. 182–185, October 2015
Ono, F., Ochiai, H., Miura, R.: A wireless relay network based on unmanned aircraft system with rate optimization. IEEE Trans. Wirel. Commun. PP(99), 7562472 (2016). https://doi.org/10.1109/twc.2016.2606388
Kuleshov, S.V., Zaytseva, A., Aksenov, A.Y.: The conceptual view of unmanned aerial vehicle implementation as a mobile communication node of active data transmission network. Int. J. Intell. Unmanned Syst. 6(4), 174–183 (2018). https://doi.org/10.1108/IJIUS-04-2018-0010
Turing, A.M.: Correction to: on computable numbers, with an application to the entscheidungs problem. Proc. London Math. Soc. Ser. 2(43), 544–546 (1938)
Afanasyev, A.L., Garmonov, A.V., Kashchenko, G.A.: Analysis of security threats and secure routing protocols in MANET networks. In: Radiolocation, Radio Navigation, Communication: Materials of the XX International Scientific and Technical Conference (RLNC-2014), vol. 2. Voronezh: Publishing house SPC «CAКBOEE» OOO, pp. 846–857 (2014). (in Russia)
Anjum, F., Mouchtaris, P.: Security for Wireless Ad-hoc Networks. Wiley, Hoboken (2007)
Irshad, S., Halabi, B.H., Jamalul-Lail, A.M., Iftikhar, A., Daniyal, A.: Classification of attacks in vehicular ad hoc network (VANET). INFORMATION Int. Interdisc. J. 16 (5), 2995–3004 (2013)
Gohale, V., Gosh, S.K., Gupta, A.: Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks, 196–217. CRC Press (2011)
Zegzhda, D., Ivanov, P.V., Moskvin, D.A., Kubrin, D.S.: Actual security threats for vehicular and mobile ad hoc networks. Autom. Control Comput. Sci. 52, 993–999 (2018). https://doi.org/10.3103/S0146411618080308
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kuleshov, S.V., Aksenov, A.Y., Viksnin, I.I., Laskus, E.O., Belyaev, V.V. (2020). The Analysis of Cybersecurity Problems in Distributed Infocommunication Networks Based on the Active Data Conception. In: Arseniev, D., Overmeyer, L., Kälviäinen, H., Katalinić, B. (eds) Cyber-Physical Systems and Control. CPS&C 2019. Lecture Notes in Networks and Systems, vol 95. Springer, Cham. https://doi.org/10.1007/978-3-030-34983-7_48
Download citation
DOI: https://doi.org/10.1007/978-3-030-34983-7_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34982-0
Online ISBN: 978-3-030-34983-7
eBook Packages: EngineeringEngineering (R0)