Information security
OVERVIEW OF THE INVESTIGATIONS IN THE AREA OF MONITORING AND COUNTERACTION TO THREATS TO INFORMATION-PSYCHOLOGICAL SECURITY IN SOCIAL NETWORKS
|
L. Vitkova |
Read
Abstract: The paper presents an overview of investigations in the field of social networks analysis, information conflicts, countering threats to information and psychological security of the state. The range of investigations devoted to the analysis, generalization and search for solutions in the field of information and psychological security in social networks is very limited. Although, at the same time aspects of technical information security have been worked out in deep details. Research subject. The subject of the investigation is the scientific schools, algorithms and methods of monitoring and counteraction to information operations in the Internet. Method. Fundamental investigations are reviewed. Core results. The investigation of the developments in the analyzed area showed that today there is a contradiction between the scientific provision of technical, informational and psychological aspects of information security. Practical relevance. The practical significance of the investigation results lie in the proposed solutions for the current challenges of the analyzed area. It is necessary to develop and implement a modern methodology for counteraction to information and psychological operations in complex social media and technical systems, in particular in social networks.
Keywords: information and psychological security, monitoring of social networks, social networks, counteraction, countermeasures.
|
MODELING AND ANALYSIS OF ENERGY EXHAUSTION ATTACKS IN DIGITAL CITY SYSTEMS
|
V. Desnitsky, N. Rudavin |
Read
Abstract: The article is devoted to energy exhaustion attacks in Digital City systems. Research subject. The subject of the study is models of threats to information security and an intruder conducting energy exhaustion attacks of in the subject area of Digital City. Method. Methods of analytical modeling are applied as well as an analysis of existing work in the subject area of energy exhaustion attacks. Core results. A detailed analysis of the state of research in the field of the energy exhaustion, a set of vulnerabilities associated with the exhaustion of resources of the Digital City systems is formed, as well as a model of the intruder performing this type of attacks has been constructed. Practical relevance. The results obtained in this paper can be used to improve the means of protecting the cyber physical systems of the Digital City from the possible type of energy exhaustion attacks of autonomous de-vices involved in the operation of such systems.
Keywords: Digital City, sensor networks, energy exhaustion attacks.
|
System analysis and mathematical modeling
IMMUNOCOMPUTING IN RADAR PATTERN RECOGNITION TASK |
D. Khrestinin, A. Pozdnyakov |
Read
Abstract: One of the tasks when developing radar recognition systems is to determine the optimal decision rule. The article considers the possibility of applying immunocomputing method to radar pattern recognition and its comparison with the decision rule based on the Bayesian criterion. Research subject. Decision rule – immunocomputing method. Method. The authors evaluated the effectiveness of radar recognition system by criterion "the number of correctly recognized objects" using Monte Carlo method by means of mathematical modelling. Core results. The possibility of applying immunocomputing method to radar pattern recognition is confirmed. Practical relevance. Research results show that under prior uncertainty immunocomputing method enables radar object recognition with high quality.
Keywords: Radar recognition, immunocomputing.
|
System analysis, information management and processing
UNIFICATION OF CONNECTION BETWEEN CYBER-PHYSICAL SYSTEMS AND SOURCES OF DATA
|
D. Levshun |
Read
Abstract: Interaction of microcontroller-based devices with data sources (different sensors, readers, detectors, alarms and other external electronic components) can be conditionally divided into the following types: initialization, read, write, event and de-initialization. It is important to note that, depending on the complexity of the data source being connected, certain types of interaction may remain unused. Research subject. In this paper, the development, debugging and testing of unified interaction of cyberphysical systems with data sources is presented. Method. Technical implementation is based on the principles of modularity and level-by-level development. Debugging and testing was carried out on the basis of a traffic generator, the functionality of which can be conditionally divided into two parts: load testing and simulation of the real system behavior. Core results. Load testing allowed to identify implementation errors associated with the transmission of messages of minimum size and buffer overflow, as well as incorrect processing of individual ASCII characters when transmitted through Serial. Simulation of the real system allowed to identify errors in the implementation of individual mechanisms of correlation of security events and to produce a correct display of data in the user interface of the system. Also, the simulation of the system allowed to significantly speed up the process of obtaining traffic dumps transmitted between the microcontrollers of the system, including specialized ones. Practical relevance. As a result of the work done, the connected library was obtained, which is a unified implementation of the interaction of Arduino-based devices with previously used data sources within the framework of our laboratory. This allowed us to accelerate the exchange of experience among the laboratory staff, to unify the code, and to speed up the process of developing new experimental stands and prototypes of the systems.
Keywords: cyber-physical system, unification of connection, traffic generator, microcontroller.
|
Telecommunication systems, networks and devices
HIGH DENSITY Wi-Fi NETWORKS COVERAGE STRATEGIES
|
A. Vikulov, A. Paramonov |
Read
Abstract: When making predictive modelling of the high density wireless networks the designer typically solves the problem of the signal coverage strategies selection, i.e. the set of approaches to the antenna configurations choice and access points placement. The work analyses main approaches to Wi-Fi coverage planning and their advantages and disadvantages in relation to high user density WLANs. Research subject. The present work is devoted to different wireless signal coverage strategies. Method. The ground for this work is: Wi-Fi solution vendors design guides and own more than 5-year design practice. Core results. The main coverage strategies proposed by the WLAN solution vendors for the high density WLANs have been analyzed. Practical relevance. The analysis carried out gives practical recommendations for high density WLANs implementation.
Keywords: IEEE 802.11, requirements, coverage, coverage strategy, high density, WLAN, Wi-Fi.
|
IMPLEMENTATION OF OPERATOR NETWORKS EVALUATION METHODOLOGY FOR COMPLIANCE WITH ITU-T RECOMMENDATIONS Y.1540, Y.1541
|
S. Vladimirov, I. Alekseev, A. Voronov |
Read
Abstract: The provision of services by telecom operators on subscriber access networks requires continuous monitoring of the quality of such services. With the increase in the volume of offered and provided services, especially with the growth of the subscriber base, the operator networks are faced with the fact that the quality provided on the network does not correspond to the previously declared. In some cases, even well-developed technical support of the telecommunications operator can not determine the "bottleneck" in the data network in case of failures of certain types of provided services, related to the specific application of the network transport protocols. The software tool developed by the authors and offered for use on networks will allow not only to quickly find bottlenecks, but also to evaluate networks in terms of compliance with ITU-T recommendations Y.1540, Y.1541. Research subject. Fragments of data transmission networks, including subscriber access networks and service aggregation networks. Method. Separate evaluation of networks using TCP and UDP protocols using the programs developed by the authors. Core results. Programs for evaluating data networks have been developed. Testing of heterogeneous operator networks has been carried out. Practical relevance. The developed software makes it possible to use it as a basis for constructing software and hardware systems for monitoring networks and services from telecom operators.
Keywords: Quality of Service (QoS), operator networks, ITU-T recommendations Y.1540 and Y.1541, packet delivery time, packet delivery delay variation.
|
NETWORK PERFORMANCE ANALYSIS OF IP GATEWAYS BASED ON SINGLE-BOARD MICROCOMPUTERS FOR SMART HOME TASKS
|
S. Vladimirov, R. Kurazhev, A. Averyanov |
Read
Abstract: Research subject. The article presents an analysis of the use of existing budgetary implementation of a smart home network based on serially produced equipment. We consider the use of a single-board microcomputer as the controlling router of a smart home network with the organization of addition local gateways based on small-size network modules. Method. Estimation of channel capacity using the iperf traffic generator. Core results. The results of load testing of OrangePi R and Hi-Link HLK-RM04 microcomputers. Practical relevance. We propose a comprehensive solution for building a smart home network with a core based on a single-board microcomputer with expansion modules and organization of separately managed functional network segments based on HLK-RM04 modules.
Keywords: Network gateway, IP gateway, smart home, OrangePi R1 microcomputer, Hi-Link HLKRM04 module, iperf traffic generator.
|
DEVELOPMENT OF ALGORITHMS FOR AUTOMATED DATA ANALYSIS IN MEDICAL APPLICATIONS INTERNET OF THINGS |
V. Efimov, R. Pirmagomedov |
Read
Abstract: Technological solutions based on the Internet of Things concept has gone beyond the boundaries of the entertainment sector and are used in such mission-critical sec-tors as industrial production management, transport, and healthcare. In healthcare, IoT devices, provides access to health data in real time and in a convenient format. In total, the use of the Internet of things in healthcare allows one to quickly and efficiently respond any changes in the functional state of the body and the patient's symptoms. Due to the pervasive Informatization and deployment of new diagnostic tools, there are large amounts of data requires analysis. In recent years, numerous studies on the collection and analysis of the Big Data. However, all industries have their own unique specifics and require individual implementation approaches. This article discusses the medical applications of the Internet of Things and the problems of data analysis that need to be addressed while implementation of such applications in practice. In particular, we consider the issues of automated analysis of big data using cloud computing based on Hadoop.
Keywords: Internet of things, big data, data science.
|
COMPARATIVE EVALUATION OF MODELS AND METHODS OF NETWORK SLICING
|
S. Muhizi, R. Kirichek
|
Read
Abstract: Subject research. The work is devoted to the main models and methods of network slices in modern communication networks. Work objective. The main goal of the work is to identify, analyze and compare current network slicing models and methods. Method. In addition to the scientific, systemic and institutional approaches, we used the graph approach and algebraic methods, as well as methods of complex analysis. Core results. Are identified and analyzed the main models and methods of network slicing, their functional features and differences and is given their comparative estimation evaluation. Work relevance. The importance and relevance of this work is defined by the fact that physical network infrastructures are built inefficiently and expensively when delivering service on customer demand.
Keywords: 5G/IMT-2020, SDN, NFV, network slicing model, network slicing method, network slice.
|
DEVELOPMENT OF APPLICATIONS AND SERVICES AUGMENTED REALITY
|
A. Rochev, M. Makolkina |
Read
Abstract: The widespread use of augmented reality technology in various fields and industries, not only in life, but also in industry, makes it necessary to systematize the existing applications and requirements that they place on communication networks. Which in turn leads to the development of new traffic models, taking into account the features of the provision of augmented reality services. Of particular interest is this task when integrating applications of augmented reality and the concept of the Internet of Things. Research subject. The article is devoted to the analysis of applications and services of augmented reality. Method. Classification of applications of augmented reality is carried out depending on the scope of application, features of the provision of services are identified, depending on the type of content. Core results. Established features of the implementation of augmented reality services. Identified new requirements for communication networks with new applications. Practical relevance. The presented classification and features of the implementation of augmented reality applications will further allow the development and study of augmented reality traffic models.
Keywords: augmented reality, Internet of Things, communication networks, quality of service and quality of experience.
|
DEPENDENCE OF EFFICIENCY OF BUILDING AND FUNCTIONING OF THE WSN ON THE ACCURACY OF POSITIONING KNOTS
|
E. F. Houndonougbo, I. Grishin, A. Paramonov |
Read
Abstract: The capabilities of modern microelectronics and wireless network technologies open up prospects for creating a variety of network systems with a wide range of applications, among which wireless sensor networks are particularly noteworthy. The principal possibility of determining the location of sensor network objects in space (sensor positioning) makes these systems attractive due to the additional information component, which, together with the main parameter or set of monitoring parameters, can provide a comprehensive picture of the system's operation, therefore improving the positioning accuracy is an actual problem today. Research subject. The article examines the influence of the positioning accuracy of sensor nodes on the efficiency of building and functioning of a wireless sensor network. Method. The computational experiment was chosen as the research method. Core results. The dependences of the efficiency of routing and energy costs on the value of the relative positioning error are obtained. The relative value of the positioning error is determined, which provides the required performance indicators of the sensor network. Practical relevance. The analysis will improve the management efficiency of the wireless sensor network and the rational use of its resources.
Keywords: efficiency, sensor nodes, positioning, routing.
|
© SPbSUT © Authors
|
|
|