Research availability of devices based on wireless networks
The wireless self-organizing network under attack was considered. The aim was to organize “a broadcast storm” in order to determine the availability of individual units, and the ability to carry out their functional tasks in an information exposure. A number of conditions for t...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
FRUCT
2016-04-01
|
Series: | Proceedings of the XXth Conference of Open Innovations Association FRUCT |
Subjects: | |
Online Access: | https://fruct.org/publications/fruct18/files/Baz.pdf
|
_version_ | 1818333393040965632 |
---|---|
author | Nurzhan Bazhayev Ilya Lebedev Irina Krivtsova Igor Zikratov |
author_facet | Nurzhan Bazhayev Ilya Lebedev Irina Krivtsova Igor Zikratov |
author_sort | Nurzhan Bazhayev |
collection | DOAJ |
description | The wireless self-organizing network under attack was considered. The aim was to organize “a broadcast storm” in order to determine the availability of individual units, and the ability to carry out their functional tasks in an information exposure. A number of conditions for the organization of this type of attack by a potential intruder information security were identified. The analysis of system availability of devices based on wireless technologies was conducted. A model depending functioning of the system in the normal state and the implementation of an information system on the impact from a potential intruder was shown. The analytical modeling of self-organizing wireless network functioning normally and carrying out attacks aimed at organizing “broadcast storm.” An experiment that provides obtaining statistical information on the work of the self-organizing network of remote devices was disclosed. The results of the experiment of a typical attack system, to transmit data via a broadcast network scanning package. A qualitative idea of the proximity of theoretical and experimental distributions of packet loss probability for different values of the intensities of the noise packets from the offending information security was checked. |
first_indexed | 2024-12-13T13:50:55Z |
format | Article |
id | doaj.art-dcb5569444bf4790a2b8e3b6d840b34c |
institution | Directory Open Access Journal |
issn | 2305-7254 2343-0737 |
language | English |
last_indexed | 2024-12-13T13:50:55Z |
publishDate | 2016-04-01 |
publisher | FRUCT |
record_format | Article |
series | Proceedings of the XXth Conference of Open Innovations Association FRUCT |
spelling | doaj.art-dcb5569444bf4790a2b8e3b6d840b34c2022-12-21T23:43:12ZengFRUCTProceedings of the XXth Conference of Open Innovations Association FRUCT2305-72542343-07372016-04-0166418273210.1109/FRUCT-ISPIT.2016.7561504Research availability of devices based on wireless networksNurzhan Bazhayev0Ilya Lebedev1Irina Krivtsova2Igor Zikratov3ITMO University, Saint-Petersburg, Russian FederationITMO University, Saint-Petersburg, Russian FederationITMO University, Saint-Petersburg, Russian FederationITMO University, Saint-Petersburg, Russian FederationThe wireless self-organizing network under attack was considered. The aim was to organize “a broadcast storm” in order to determine the availability of individual units, and the ability to carry out their functional tasks in an information exposure. A number of conditions for the organization of this type of attack by a potential intruder information security were identified. The analysis of system availability of devices based on wireless technologies was conducted. A model depending functioning of the system in the normal state and the implementation of an information system on the impact from a potential intruder was shown. The analytical modeling of self-organizing wireless network functioning normally and carrying out attacks aimed at organizing “broadcast storm.” An experiment that provides obtaining statistical information on the work of the self-organizing network of remote devices was disclosed. The results of the experiment of a typical attack system, to transmit data via a broadcast network scanning package. A qualitative idea of the proximity of theoretical and experimental distributions of packet loss probability for different values of the intensities of the noise packets from the offending information security was checked.https://fruct.org/publications/fruct18/files/Baz.pdf Information securitywireless networkbroadcast storm |
spellingShingle | Nurzhan Bazhayev Ilya Lebedev Irina Krivtsova Igor Zikratov Research availability of devices based on wireless networks Proceedings of the XXth Conference of Open Innovations Association FRUCT Information security wireless network broadcast storm |
title | Research availability of devices based on wireless networks |
title_full | Research availability of devices based on wireless networks |
title_fullStr | Research availability of devices based on wireless networks |
title_full_unstemmed | Research availability of devices based on wireless networks |
title_short | Research availability of devices based on wireless networks |
title_sort | research availability of devices based on wireless networks |
topic | Information security wireless network broadcast storm |
url | https://fruct.org/publications/fruct18/files/Baz.pdf
|
work_keys_str_mv | AT nurzhanbazhayev researchavailabilityofdevicesbasedonwirelessnetworks AT ilyalebedev researchavailabilityofdevicesbasedonwirelessnetworks AT irinakrivtsova researchavailabilityofdevicesbasedonwirelessnetworks AT igorzikratov researchavailabilityofdevicesbasedonwirelessnetworks |