Abstract
The issues of information security monitoring of remote of devices self-organizing wireless networks are discussed. The model of interaction of the remote devices is shown, the analyzed characteristics of identification of node abnormal behavior for different types of topologies are identified. The approach to the assessment with the use of the selected features of the system is suggested. The experiment, providing the obtainment of statistical information about the remote devices in different modes of ad-hoc networks is revealed. The results of the system activity for a broadcast packet of network scanning with given characteristics are presented. The dependences of the responses from sleeping and waking devices for variable system structure based on ad-hoc wireless networks are given. The feature of this approach is that it allows using the built-in set of commands that gives the opportunity to avoid additional costs when constructing the control system for wireless sensor networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kumar, P., Ylianttila, M., Gurtov, A., Lee, S.-G., Lee, H.-J.: An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Networks-based Applications. MDPI Sensors 14(2), 2732–2755 (2014)
Sridhar, P., Sheikh-Bahaei, S., Xia, S., Jamshidi, Mo.: Multi agent simulation using discrete event and soft-computing methodologies. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 1711–1716 (2003)
Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proc. of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp. 85–101 (2004)
Peters, J.F.: Approximation spaces for hierarchical intelligent behavioral system models. Advances in Soft Computing (28), 13–30 (2005)
Zikratov, I.A., Kozlova, E.V., Stratowa, T.V.: The analysis of vulnerabilities of robotic systems with swarm intelligence. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 5(87), 149–154 (2013)
Gvozdev, V.A., Zikratov, I.A., Lebedev, I.S., Lapshin, S.V., Solov’ev, I.N.: Prognostic evaluation of software architectures security. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 4(80), 126–130 (2012)
Zikratov, I.A., Lebedev, I.S., Gurtov, A.V.: Trust and Reputation Mechanisms for Multi-agent Robotic Systems. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2014. LNCS, vol. 8638, pp. 106–120. Springer, Heidelberg (2014)
Wyglinski, A.M., Huang, X., Padir, T., Lai, L., Eisenbarth, T.R., Venkatasubramanian, K.: Security of autonomous systems employing embedded computing and sensors. IEEE Micro 33(1), art. no. 6504448, 80–86 (2013)
Bobtsov, A., Nikiforov, V.O.: Adaptive output control: tasks, applied problems and solutions. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 1(83). S.1–S.14 (2013)
Maltsev, G.N., Dzhumkov, V.V.: A generalized model of a discrete communication channel with grouping errors. Information and Control Systems 1, 27–33 (2013)
Prabhakar, M., Singh, J.N., Mahadevan, G.: Nash Equilibrium and Marcov Chains to Enhance Game Theoretic Approach for Vanet Security. In: Aswatha Kumar, M., Selvarani, R., Kumar, T.V.S. (eds.) Proceedings of ICAdC. AISC, vol. 174, pp. 191–199. Springer, Heidelberg (2013)
Komov, S. A. and others: Terms and definitions in the field of information security. – M., AC-trust, 2009. -304 S.
Koval, E.N., Lebedev, I.S.: Total security model of the robotic systems. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 4(86) S.153–S.154 (2013)
Zikratov, I.S., Stratowa, T.V., Lebedev, I.S., Gurtov, V.A.: Building a Model of trust and reputation to the objects of multi-agent robotic systems with decentralized control. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 3(91), 30–39 (2014)
Shago, F.N., Zikratov, I.A.: The optimization system of planning of audit of information security management. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 2(90), 111–118 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Lebedev, I., Korzhuk, V. (2015). The Monitoring of Information Security of Remote Devices of Wireless Networks. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. ruSMART NEW2AN 2015 2015. Lecture Notes in Computer Science(), vol 9247. Springer, Cham. https://doi.org/10.1007/978-3-319-23126-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-23126-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23125-9
Online ISBN: 978-3-319-23126-6
eBook Packages: Computer ScienceComputer Science (R0)