Research availability of devices based on wireless networks

The wireless self-organizing network under attack was considered. The aim was to organize “a broadcast storm” in order to determine the availability of individual units, and the ability to carry out their functional tasks in an information exposure. A number of conditions for t...

Full description

Bibliographic Details
Main Authors: Nurzhan Bazhayev, Ilya Lebedev, Irina Krivtsova, Igor Zikratov
Format: Article
Language:English
Published: FRUCT 2016-04-01
Series:Proceedings of the XXth Conference of Open Innovations Association FRUCT
Subjects:
Online Access:https://fruct.org/publications/fruct18/files/Baz.pdf
_version_ 1818333393040965632
author Nurzhan Bazhayev
Ilya Lebedev
Irina Krivtsova
Igor Zikratov
author_facet Nurzhan Bazhayev
Ilya Lebedev
Irina Krivtsova
Igor Zikratov
author_sort Nurzhan Bazhayev
collection DOAJ
description The wireless self-organizing network under attack was considered. The aim was to organize “a broadcast storm” in order to determine the availability of individual units, and the ability to carry out their functional tasks in an information exposure. A number of conditions for the organization of this type of attack by a potential intruder information security were identified. The analysis of system availability of devices based on wireless technologies was conducted. A model depending functioning of the system in the normal state and the implementation of an information system on the impact from a potential intruder was shown. The analytical modeling of self-organizing wireless network functioning normally and carrying out attacks aimed at organizing “broadcast storm.” An experiment that provides obtaining statistical information on the work of the self-organizing network of remote devices was disclosed. The results of the experiment of a typical attack system, to transmit data via a broadcast network scanning package. A qualitative idea of the proximity of theoretical and experimental distributions of packet loss probability for different values of the intensities of the noise packets from the offending information security was checked.
first_indexed 2024-12-13T13:50:55Z
format Article
id doaj.art-dcb5569444bf4790a2b8e3b6d840b34c
institution Directory Open Access Journal
issn 2305-7254
2343-0737
language English
last_indexed 2024-12-13T13:50:55Z
publishDate 2016-04-01
publisher FRUCT
record_format Article
series Proceedings of the XXth Conference of Open Innovations Association FRUCT
spelling doaj.art-dcb5569444bf4790a2b8e3b6d840b34c2022-12-21T23:43:12ZengFRUCTProceedings of the XXth Conference of Open Innovations Association FRUCT2305-72542343-07372016-04-0166418273210.1109/FRUCT-ISPIT.2016.7561504Research availability of devices based on wireless networksNurzhan Bazhayev0Ilya Lebedev1Irina Krivtsova2Igor Zikratov3ITMO University, Saint-Petersburg, Russian FederationITMO University, Saint-Petersburg, Russian FederationITMO University, Saint-Petersburg, Russian FederationITMO University, Saint-Petersburg, Russian FederationThe wireless self-organizing network under attack was considered. The aim was to organize “a broadcast storm” in order to determine the availability of individual units, and the ability to carry out their functional tasks in an information exposure. A number of conditions for the organization of this type of attack by a potential intruder information security were identified. The analysis of system availability of devices based on wireless technologies was conducted. A model depending functioning of the system in the normal state and the implementation of an information system on the impact from a potential intruder was shown. The analytical modeling of self-organizing wireless network functioning normally and carrying out attacks aimed at organizing “broadcast storm.” An experiment that provides obtaining statistical information on the work of the self-organizing network of remote devices was disclosed. The results of the experiment of a typical attack system, to transmit data via a broadcast network scanning package. A qualitative idea of the proximity of theoretical and experimental distributions of packet loss probability for different values of the intensities of the noise packets from the offending information security was checked.https://fruct.org/publications/fruct18/files/Baz.pdf Information securitywireless networkbroadcast storm
spellingShingle Nurzhan Bazhayev
Ilya Lebedev
Irina Krivtsova
Igor Zikratov
Research availability of devices based on wireless networks
Proceedings of the XXth Conference of Open Innovations Association FRUCT
Information security
wireless network
broadcast storm
title Research availability of devices based on wireless networks
title_full Research availability of devices based on wireless networks
title_fullStr Research availability of devices based on wireless networks
title_full_unstemmed Research availability of devices based on wireless networks
title_short Research availability of devices based on wireless networks
title_sort research availability of devices based on wireless networks
topic Information security
wireless network
broadcast storm
url https://fruct.org/publications/fruct18/files/Baz.pdf
work_keys_str_mv AT nurzhanbazhayev researchavailabilityofdevicesbasedonwirelessnetworks
AT ilyalebedev researchavailabilityofdevicesbasedonwirelessnetworks
AT irinakrivtsova researchavailabilityofdevicesbasedonwirelessnetworks
AT igorzikratov researchavailabilityofdevicesbasedonwirelessnetworks