Modeling and analysis of security incidents for mobile communication mesh Zigbee-based network

The paper is aimed at researching the subject area, models and prototypes of secure mobile communication mesh networks providing support and operational management in critical emergency situations. Such a network represents a command technical complex that provides services of text messages and medi...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2017 XX IEEE International Conference on Soft Computing and Measurements (SCM) s. 500 - 502
Hlavní autoři: Desnitsky, V. A., Kotenko, I. V.
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.05.2017
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The paper is aimed at researching the subject area, models and prototypes of secure mobile communication mesh networks providing support and operational management in critical emergency situations. Such a network represents a command technical complex that provides services of text messages and media data transfer, database services, web services, etc. A two-layer network architecture using Arduino microcontrollers and XBee Series 2 modules, implementing business processes and wireless communications by ZigBee protocol is proposed. The two-layer character of the network allows organizing isolation of data flows between particular subnets, nodes and users effectively. Methods of analytical modeling and simulation of intruder actions on the base of a generalized intruder model of embedded devices are applied. Experiments were conducted to simulate security incidents and detect them on the physical implementation of the mobile communication network prototype.
AbstractList The paper is aimed at researching the subject area, models and prototypes of secure mobile communication mesh networks providing support and operational management in critical emergency situations. Such a network represents a command technical complex that provides services of text messages and media data transfer, database services, web services, etc. A two-layer network architecture using Arduino microcontrollers and XBee Series 2 modules, implementing business processes and wireless communications by ZigBee protocol is proposed. The two-layer character of the network allows organizing isolation of data flows between particular subnets, nodes and users effectively. Methods of analytical modeling and simulation of intruder actions on the base of a generalized intruder model of embedded devices are applied. Experiments were conducted to simulate security incidents and detect them on the physical implementation of the mobile communication network prototype.
Author Kotenko, I. V.
Desnitsky, V. A.
Author_xml – sequence: 1
  givenname: V. A.
  surname: Desnitsky
  fullname: Desnitsky, V. A.
  email: desnitsky@comsec.spb.ru
  organization: St. Petersburg Inst. for Inf. & Autom., St. Petersburg, Russia
– sequence: 2
  givenname: I. V.
  surname: Kotenko
  fullname: Kotenko, I. V.
  organization: St. Petersburg Nat. Res. Univ. of Inf. Technol., Mech. & Opt., St. Petersburg, Russia
BookMark eNotj8tKxDAUQCPoQsfZC27yA615tE2ylOILZnDhrFw43CQ3Y7BNpOkg_XsFZ3E4uwPnipynnJCQG85qzpm5e-u3tWBc1coo1glzRtZGad5K3XHNmbwkH9vscYjpQCH5P2BYSiw0B1rQHac4LzQmFz2mudCQJzpmGwekLo_jMUUHc8yJjlg-6Xs8WMTKQkFPE84_efq6JhcBhoLrk1dk9_iw65-rzevTS3-_qaJhcwXcWd2CDo1FxjSA6QxrvZS8UZyFDqDtlGuFtloIYdGgsOAEb1iwApSXK3L7n42IuP-e4gjTsj9Ny19KXVH7
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/SCM.2017.7970629
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781538618103
1538618109
EndPage 502
ExternalDocumentID 7970629
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-a1cb85a8f4be008aa96905d3314710f6aa567c528b8222be9e2bac2140fb2a7d3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:05 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-a1cb85a8f4be008aa96905d3314710f6aa567c528b8222be9e2bac2140fb2a7d3
PageCount 3
ParticipantIDs ieee_primary_7970629
PublicationCentury 2000
PublicationDate 2017-May
PublicationDateYYYYMMDD 2017-05-01
PublicationDate_xml – month: 05
  year: 2017
  text: 2017-May
PublicationDecade 2010
PublicationTitle 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM)
PublicationTitleAbbrev SCM
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.63985
Snippet The paper is aimed at researching the subject area, models and prototypes of secure mobile communication mesh networks providing support and operational...
SourceID ieee
SourceType Publisher
StartPage 500
SubjectTerms Analytical models
Logic gates
Mobile communication
Mobile computing
mobile network
modeling
Security
security incidents
Sensors
Social network services
zigBee
Title Modeling and analysis of security incidents for mobile communication mesh Zigbee-based network
URI https://ieeexplore.ieee.org/document/7970629
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwGP3YhgdPKpv4mxw82q1t2vw4D4cXx8AdhgdHkn7RHtbK2vn3m7R1KnjxEPgIhcJXwutL3ssDuHWcJ-KWJYFC7giKpdRVCQ1S5oV_2mGSacMm-HwuViu56MHd3guDiI34DMe-bM7ys9Ls_FbZhEseslj2oc85a71aXyePoZw8TR-9VIuPu8d-5aU0cDE7-t-LjmH07bsjiz2inEAPiyG8-LgybxonjvS70V4iQkpLqi57jvj9cm-4rYj7BSWbUrulTsxP6wfZYPVGnvNXjRh45MpI0QrAR7Cc3S-nD0GXihDkMqwDFRktUiVsotHht1LS8ds0ozRyMBNappRrs0ljoT30a5QYa2Vix6OsjhXP6CkMirLAMyCRCLWxkY5MKhMjEsnQGiOoYXGYKWTnMPStWb-3916su65c_D19CYe--60Y8AoG9XaH13BgPuq82t40H-sTE32ZvQ
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwGP2YU9CTyib-NgePdkvT9EfOwzFxGwN3GB4cSfpFd1gr6-bfb9LWqeDFQyGUQOEL4fUl730P4NZyHj82EfckxpagmCCwIx54YeSEf8pikq7CJuLxOJnNxKQBd1svDCKW4jPsuGF5l5_meuOOyrqxiGnExA7shpwzWrm1vu4eqeg-9UZOrBV36om_ElNKwOgf_u9TR9D-dt6RyRZTjqGBWQteXGCZs40TS_vtU7URIbkhRZ0-R9yJubPcFsT-hJJlruxmJ_qn-YMssXgjz4tXheg57EpJVknA2zDt3097A6_ORfAWgq496WuVhDIxXKFFcCmFZbhhGgS-BRpqIiltoXXIEuXAX6FApqRmlkkZxWScBifQzPIMT4H4CVXa-MrXoeA64SJCo3US6IjRVGJ0Bi1Xmvl71fliXlfl_O_XN7A_mI6G8-HD-PECDtxKVNLAS2iuVxu8gj39sV4Uq-ty4T4BPWSdBA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+XX+IEEE+International+Conference+on+Soft+Computing+and+Measurements+%28SCM%29&rft.atitle=Modeling+and+analysis+of+security+incidents+for+mobile+communication+mesh+Zigbee-based+network&rft.au=Desnitsky%2C+V.+A.&rft.au=Kotenko%2C+I.+V.&rft.date=2017-05-01&rft.pub=IEEE&rft.spage=500&rft.epage=502&rft_id=info:doi/10.1109%2FSCM.2017.7970629&rft.externalDocID=7970629