Skip to main content

The Analysis of Cybersecurity Problems in Distributed Infocommunication Networks Based on the Active Data Conception

  • Conference paper
  • First Online:
Cyber-Physical Systems and Control (CPS&C 2019)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 95))

Included in the following conference series:

  • 1178 Accesses

Abstract

The paper considers the problems of cybersecurity for distributed infocommunication networks, related to the violation of the access rights of the executable code of active data to network node resources (shared memory, radio channel reconfiguration, motion control functions, onboard node sensor).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Carvalho, A., Silva, V., Afonso, F., Cardoso, P., Cabral, J., Ekpanyapong, M., Montenegro, S., Tavares, A.: Full virtualization on low-end hardware: a case study. In: IECON Proceedings of Industrial Electronics Conference, 21 December 2016, pp. 4784–4789 (2016)

    Google Scholar 

  2. Understanding Full Virtualization, Paravirtualization, and Hardware Assist. VMware technical documentation. Accessed 18 Apr 2019. https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/ techpaper/VMware_paravirtualization.pdf

  3. Chen, W., Xu, W., Wang, Zh., Dou, Q., Zhao, B.: A formalization of an emulation based co-designed virtual machine. In: 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 164–168 (2011). https://doi.org/10.1109/imis.2011.144

  4. Craig Iain, D.: Virtual Machines. Springer, London (2006). 269 p. https://doi.org/10.1007/978-1-84628-246-1

  5. Shi, Y., Gregg, D., Beatty, A., Ertl, M.A.: Virtual machine showdown: stack versus registers. https://www.usenix.org/legacy/events/vee05/full_papers/p153-yunhe.pdf. Accessed 18 Apr 2019

  6. Polenov, M., Guzik, V., Lukyanov, V.: Hypervisors comparison and their performance testing. In: Advances in Intelligent Systems and Computing, vol. 763, pp. 148–157. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-91186-1_16

  7. Cheng, Y., Chen, W., Wang, Z., Yu, X.: Performance-monitoring-based traffic-aware virtual machine deployment on NUMA systems. IEEE Syst. J. 11(2), 973–982 (2017). https://doi.org/10.1109/JSYST.2015.2469652

    Article  ADS  Google Scholar 

  8. Rao, J., Wang, K., Zhou, X., Xu, C.: Optimizing virtual machine scheduling in NUMA multicore systems. In: 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA), Shenzhen, pp. 306–317 (2013). https://doi.org/10.1109/hpca.2013.6522328

  9. Kuleshov, S.V., Tsvetkov, O.V.: Active data in digital software-defined systems. Informatsionno-izmeritelnye i upravlyayushchie sistemy 6, 12–19 (2014). (in Russia)

    Google Scholar 

  10. Alexandrov, V.V., Kuleshov, S.V., Zaytseva, A.A.: Active data in digital software defined systems based on SEMS structures. In: Gorodetskiy, A. (ed.) Smart Electromechanical Systems. Studies in Systems, Decision and Control, vol. 49, pp. 61–69. Springer, Cham (2016)

    Google Scholar 

  11. Samad, T., Bay, J.S., Godbole, D.: Network-centric systems for military operations in urban terra. The role of UAVs. J. Proc. IEEE. 95(1), 4118473, 92–107 (2007). https://doi.org/10.1109/jproc.2006.887327

  12. Lysenko, O.I., Valuiskyi, S.V., Tachinina, O.M., Danylyuk, S.L.: A method of control by telecommunication airsystems for wireless AD HOC networks optimization. In: IEEE 3rd International Conference Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD) Proceedings, Kyiv, Ukraine, pp. 182–185, October 2015

    Google Scholar 

  13. Ono, F., Ochiai, H., Miura, R.: A wireless relay network based on unmanned aircraft system with rate optimization. IEEE Trans. Wirel. Commun. PP(99), 7562472 (2016). https://doi.org/10.1109/twc.2016.2606388

  14. Kuleshov, S.V., Zaytseva, A., Aksenov, A.Y.: The conceptual view of unmanned aerial vehicle implementation as a mobile communication node of active data transmission network. Int. J. Intell. Unmanned Syst. 6(4), 174–183 (2018). https://doi.org/10.1108/IJIUS-04-2018-0010

    Article  Google Scholar 

  15. Turing, A.M.: Correction to: on computable numbers, with an application to the entscheidungs problem. Proc. London Math. Soc. Ser. 2(43), 544–546 (1938)

    Article  Google Scholar 

  16. Afanasyev, A.L., Garmonov, A.V., Kashchenko, G.A.: Analysis of security threats and secure routing protocols in MANET networks. In: Radiolocation, Radio Navigation, Communication: Materials of the XX International Scientific and Technical Conference (RLNC-2014), vol. 2. Voronezh: Publishing house SPC «CAКBOEE» OOO, pp. 846–857 (2014). (in Russia)

    Google Scholar 

  17. Anjum, F., Mouchtaris, P.: Security for Wireless Ad-hoc Networks. Wiley, Hoboken (2007)

    Book  Google Scholar 

  18. Irshad, S., Halabi, B.H., Jamalul-Lail, A.M., Iftikhar, A., Daniyal, A.: Classification of attacks in vehicular ad hoc network (VANET). INFORMATION Int. Interdisc. J. 16 (5), 2995–3004 (2013)

    Google Scholar 

  19. Gohale, V., Gosh, S.K., Gupta, A.: Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks, 196–217. CRC Press (2011)

    Google Scholar 

  20. Zegzhda, D., Ivanov, P.V., Moskvin, D.A., Kubrin, D.S.: Actual security threats for vehicular and mobile ad hoc networks. Autom. Control Comput. Sci. 52, 993–999 (2018). https://doi.org/10.3103/S0146411618080308

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sergey V. Kuleshov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kuleshov, S.V., Aksenov, A.Y., Viksnin, I.I., Laskus, E.O., Belyaev, V.V. (2020). The Analysis of Cybersecurity Problems in Distributed Infocommunication Networks Based on the Active Data Conception. In: Arseniev, D., Overmeyer, L., Kälviäinen, H., Katalinić, B. (eds) Cyber-Physical Systems and Control. CPS&C 2019. Lecture Notes in Networks and Systems, vol 95. Springer, Cham. https://doi.org/10.1007/978-3-030-34983-7_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34983-7_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34982-0

  • Online ISBN: 978-3-030-34983-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics