Research availability of devices based on wireless networks

The wireless self-organizing network under attack was considered. The aim was to organize “a broadcast storm” in order to determine the availability of individual units, and the ability to carry out their functional tasks in an information exposure. A number of conditions for t...

Full description

Bibliographic Details
Main Authors: Nurzhan Bazhayev, Ilya Lebedev, Irina Krivtsova, Igor Zikratov
Format: Article
Language:English
Published: FRUCT 2016-04-01
Series:Proceedings of the XXth Conference of Open Innovations Association FRUCT
Subjects:
Online Access:https://fruct.org/publications/fruct18/files/Baz.pdf
Description
Summary:The wireless self-organizing network under attack was considered. The aim was to organize “a broadcast storm” in order to determine the availability of individual units, and the ability to carry out their functional tasks in an information exposure. A number of conditions for the organization of this type of attack by a potential intruder information security were identified. The analysis of system availability of devices based on wireless technologies was conducted. A model depending functioning of the system in the normal state and the implementation of an information system on the impact from a potential intruder was shown. The analytical modeling of self-organizing wireless network functioning normally and carrying out attacks aimed at organizing “broadcast storm.” An experiment that provides obtaining statistical information on the work of the self-organizing network of remote devices was disclosed. The results of the experiment of a typical attack system, to transmit data via a broadcast network scanning package. A qualitative idea of the proximity of theoretical and experimental distributions of packet loss probability for different values of the intensities of the noise packets from the offending information security was checked.
ISSN:2305-7254
2343-0737