Research availability of devices based on wireless networks
The wireless self-organizing network under attack was considered. The aim was to organize “a broadcast storm” in order to determine the availability of individual units, and the ability to carry out their functional tasks in an information exposure. A number of conditions for t...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
FRUCT
2016-04-01
|
Series: | Proceedings of the XXth Conference of Open Innovations Association FRUCT |
Subjects: | |
Online Access: | https://fruct.org/publications/fruct18/files/Baz.pdf
|
Summary: | The wireless self-organizing network under attack was considered. The aim was to organize “a broadcast storm” in order to determine the availability of individual units, and the ability to carry out their functional tasks in an information exposure. A number of conditions for the organization of this type of attack by a potential intruder information security were identified. The analysis of system availability of devices based on wireless technologies was conducted. A model depending functioning of the system in the normal state and the implementation of an information system on the impact from a potential intruder was shown. The analytical modeling of self-organizing wireless network functioning normally and carrying out attacks aimed at organizing “broadcast storm.” An experiment that provides obtaining statistical information on the work of the self-organizing network of remote devices was disclosed. The results of the experiment of a typical attack system, to transmit data via a broadcast network scanning package. A qualitative idea of the proximity of theoretical and experimental distributions of packet loss probability for different values of the intensities of the noise packets from the offending information security was checked. |
---|---|
ISSN: | 2305-7254 2343-0737 |