
Telecommunication systems, networks and devices
Assessment and Monitoring of the Security of Information Resources as an Emergency Situation
|
V. Komarov, M. Buinevich
|
Read
Abstract: Formulation of the problem: control (evaluation) and monitoring of the information protection system (IPS) effectiveness are an integral part of the protected information objects operation process (state information systems, information systems of personal data, significant objects of critical information infrastructure). Imperfection of the control and monitoring means of the IPS together with her the vulnerabilities often leads to computer incidents with protected informatization object subsequent failure and/or degradation of its. One of the effective ways to solve this problem is the organization and implementation of preventive measures. The purpose of the work is reducing the response time and elimination of consequences from a computer incident caused by IPS measures to control (evaluate) the effectiveness. An additional goal is to neutralize information security threats implemented by an external intruder using sociotechnical methods (fishing). Methods: generalization and analysis of the existing regulatory and methodological support for the actions of information security units to carry out control (evaluation) measures, as well as in case of emergency situations and the occurrence of computer incidents. Novelty: the novelty elements is consideration of the event on ISP effectiveness control (evaluation) as a non-emergency situation in the informatization object operation under protect. Result: the necessity of introducing a threat to information security new class – the threat of information resource performance disruption caused by IPS control (assessment) and monitoring of the effectiveness are proved. Practical significance: the results of the work can be used to ensure organizations information resources security when the Center for Information Protection and Special Communication FSS of and territorial security bodies in relation to them measures to assess their security and the ability of bodies (organizations) to resist threats to information security.
Keywords: information resources, information protection system, computer incident, external intruder, security monitoring and assessment, information security threat, abnormal (emergency) situation.
DOI 10.31854/2307-1303-2023-11-4-1-14
|
Efficient Solutions for Data Transmission in Gas Transportation Systems: Research on Fiber Optic Technologies
|
V. Elagin, M. Dudnikova
|
Read
Abstract: Statement of the problem. Organization of a network for gas transportation systems based on dense wavelength division multiplexing is an important step in monitoring and control of industrial facilities. In the conditions of constant growth of the volume of transmitted information, there is a need to develop new technologies, especially in the field of spectral channel multiplexing. This will not only increase the network capacity, but also ensure more efficient management and monitoring of gas transportation systems. Implementation of such solutions will help to adapt to modern requirements and ensure reliability and safety of industrial facilities. The aim of this paper is to consider some aspects of designing fiber-optic data transmission systems for a general understanding of the technology as a whole and to determine the technology for subsequent application. The novelty element is a comparative analysis of existing data transmission technologies, which will reveal the advantages and disadvantages of building a network. Result: the analysis of the features, advantages and disadvantages of fiber-optic systems will form the basis of the theoretical part of the master's thesis. Theoretical / Practical significance. The results of the study can be applied to the creation of a network of gas transportation systems.
Keywords: optical fiber, wavelength, multiplexing.
DOI 10.31854/2307-1303-2023-11-4-15-23
|
Application of ESP-NOW Protocol to Improve Energy Efficiency of IoT Operation on the Example of Weather Station Development
|
K. Mironov, N. Bandurin, N. Shelukhin, V. Bobrovskiy
|
Read
Abstract: Problem Statement. In the conditions of the growing need for environmental monitoring, the creation of compact and energy-efficient meteorological stations for measuring microclimate parameters is an urgent task. Modern solutions often require high energy consumption and complex infrastructure, which limits their application in autonomous systems. Purpose: The aim of the work is to improve the energy efficiency of an autonomous weather station based on ESP32, providing temperature and humidity monitoring with real-time data visualisation. Methods: the autonomous weather station is built on a modular architecture including SHT31 sensor and ESP8266 microcontroller for metrics collection, ESP32 microcontroller for data processing and transmission via MQTT protocol, and Node-RED software platform for data visualisation. To ensure autonomy, an optimised power supply scheme is implemented using a lithium-ion battery, TP4056 charging module and ESP deep sleep mechanism. Novelty: in contrast to similar solutions, the presented weather station is highly energy-efficient and modularly flexible, allowing it to adapt to different usage scenarios. The use of energy saving combined with optimised data transmission via MQTT minimises energy costs and increases system stability. Results: A compact weather station with reliable data acquisition and transmission was developed and tested. Temperature and humidity parameters are displayed through an interactive data visualisation panel in Node-RED, providing graphs of changes and current metric values. The autonomy of the device is increased due to the energy saving mode and optimised power supply scheme, which allows the system to be used without frequent recharging. Practical relevance: the developed design can be used for microclimate monitoring in indoor environments, agricultural facilities and remote areas. The use of available components and open-source software makes the system cost-effective and easy to implement.
Keywords: weather station, microclimate, ESP32, MQTT protocol, Node-RED, data visualization, autonomous device, environmental monitoring, ESP-NOW.
DOI 10.31854/2307-1303-2023-11-4-24-35
|
Problems of Using Digital Twins in Ensuring Information Security of Critical Information Infrastructure Facilities
|
E. Mityakov
|
Read
Abstract: Problem Statement. In the context of rapid digitalization of the economy and public administration, ensuring the information security (IS) of critical information infrastructure (CII) has become an increasingly urgent task. CII includes facilities that play a key role in the functioning of vital sectors of society such as energy, transportation, healthcare, industry, and others. As these systems grow in complexity, the need arises for advanced technologies to ensure their protection. One such tool is the use of digital twins (DTs), which enable the modeling of threats and the testing of security measures. However, the integration of DTs into IS tasks within CII encounters a number of challenges that must be addressed for the effective implementation of this technology. The aim of this study is to identify the key challenges associated with the use of digital twins in the context of CII information security. Methods. The research employs the analysis of standards, classification of problems by category (technical, organizational, legal), and evaluation of DT usage scenarios within CII. Novelty. This work identifies new aspects of DT application within CII, particularly related to model characteristics, as well as issues of verification and integrity control of digital models. Security concerns are addressed, including risks associated with open APIs and telemetry channels, which may serve as vectors for attacks. A set of measures is proposed to overcome these challenges, including the development of regulatory standards for DT usage and the enhancement of professional training. Results. Key challenges have been identified and classified into the following categories: technical, security-related, organizational, legal, and those arising from incorrect usage. Each category encompasses specific issues, the consequences of which range from modeling errors and reduced protection efficiency to threats of critical infrastructure compromise and loss of trust in the technology. Theoretical / Practical Significance. The results of this study contribute to improving approaches to ensuring the information security of CII through the use of digital twins. The proposed recommendations for addressing identified challenges can be used to enhance the reliability, safety, and effectiveness of DT implementation and operation in CII systems.
Keywords: information security, critical information infrastructure, digital twin, data synchronization, threat modelling.
DOI 10.31854/2307-1303-2023-11-4-36-47
|
Comparative Analysis of Two UAV Local Positioning Methods and Formulation of Requirements for Their Experimental Validation
|
S. Shalunov, A. Kurochkin, E. Izmesteva
|
Read
Abstract: Problem Statement. The paper addresses the problem of local positioning of unmanned aerial vehicles (UAVs) under conditions of limited accessibility to global navigation satellite system (GNSS) signals. The purpose of the study is to quantitatively assess the accuracy of two different UAV positioning methods based on range measurements and varying configurations of ground-based infrastructure. Methods. An analytical assessment of geometric factors affecting coordinate estimation accuracy is conducted. A field experiment program using reference GPS coordinates is developed for the calibration and validation of the obtained data. Numerically substantiated requirements are formulated for the placement of ground stations and measurement parameters. Results. It has been established that coordinate accuracy is strongly dependent on the relative positioning of ground stations and the flight altitude of the UAV. Functional dependencies between positioning error and key configuration parameters are derived. Quantitative criteria for the applicability of each method under specified conditions are obtained. Novelty and Practical Significance. For the first time, quantitative estimates of the applicability conditions for two local positioning methods in GNSS-denied environments are presented. The obtained results can be used in the design and preparation of field experiments for UAV navigation systems in safety-critical applications.
Keywords: local positioning, unmanned aerial vehicle, range-based method, angle-and-range method, navigation without satellite signals, field experiments, coordinate error, positioning accuracy assessment, reference coordinates, geometric configuration of ground stations, time synchronization, radionavigation measurements, positioning method comparison.
DOI 10.31854/2307-1303-2023-11-4-48-64
|
|
|