Modeling and analysis of security incidents for mobile communication mesh Zigbee-based network
The paper is aimed at researching the subject area, models and prototypes of secure mobile communication mesh networks providing support and operational management in critical emergency situations. Such a network represents a command technical complex that provides services of text messages and medi...
Uloženo v:
| Vydáno v: | 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM) s. 500 - 502 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.05.2017
|
| Témata: | |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The paper is aimed at researching the subject area, models and prototypes of secure mobile communication mesh networks providing support and operational management in critical emergency situations. Such a network represents a command technical complex that provides services of text messages and media data transfer, database services, web services, etc. A two-layer network architecture using Arduino microcontrollers and XBee Series 2 modules, implementing business processes and wireless communications by ZigBee protocol is proposed. The two-layer character of the network allows organizing isolation of data flows between particular subnets, nodes and users effectively. Methods of analytical modeling and simulation of intruder actions on the base of a generalized intruder model of embedded devices are applied. Experiments were conducted to simulate security incidents and detect them on the physical implementation of the mobile communication network prototype. |
|---|---|
| AbstractList | The paper is aimed at researching the subject area, models and prototypes of secure mobile communication mesh networks providing support and operational management in critical emergency situations. Such a network represents a command technical complex that provides services of text messages and media data transfer, database services, web services, etc. A two-layer network architecture using Arduino microcontrollers and XBee Series 2 modules, implementing business processes and wireless communications by ZigBee protocol is proposed. The two-layer character of the network allows organizing isolation of data flows between particular subnets, nodes and users effectively. Methods of analytical modeling and simulation of intruder actions on the base of a generalized intruder model of embedded devices are applied. Experiments were conducted to simulate security incidents and detect them on the physical implementation of the mobile communication network prototype. |
| Author | Kotenko, I. V. Desnitsky, V. A. |
| Author_xml | – sequence: 1 givenname: V. A. surname: Desnitsky fullname: Desnitsky, V. A. email: desnitsky@comsec.spb.ru organization: St. Petersburg Inst. for Inf. & Autom., St. Petersburg, Russia – sequence: 2 givenname: I. V. surname: Kotenko fullname: Kotenko, I. V. organization: St. Petersburg Nat. Res. Univ. of Inf. Technol., Mech. & Opt., St. Petersburg, Russia |
| BookMark | eNotj8tKxDAUQCPoQsfZC27yA615tE2ylOILZnDhrFw43CQ3Y7BNpOkg_XsFZ3E4uwPnipynnJCQG85qzpm5e-u3tWBc1coo1glzRtZGad5K3XHNmbwkH9vscYjpQCH5P2BYSiw0B1rQHac4LzQmFz2mudCQJzpmGwekLo_jMUUHc8yJjlg-6Xs8WMTKQkFPE84_efq6JhcBhoLrk1dk9_iw65-rzevTS3-_qaJhcwXcWd2CDo1FxjSA6QxrvZS8UZyFDqDtlGuFtloIYdGgsOAEb1iwApSXK3L7n42IuP-e4gjTsj9Ny19KXVH7 |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/SCM.2017.7970629 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9781538618103 1538618109 |
| EndPage | 502 |
| ExternalDocumentID | 7970629 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i90t-a1cb85a8f4be008aa96905d3314710f6aa567c528b8222be9e2bac2140fb2a7d3 |
| IEDL.DBID | RIE |
| IngestDate | Thu Jun 29 18:38:05 EDT 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-a1cb85a8f4be008aa96905d3314710f6aa567c528b8222be9e2bac2140fb2a7d3 |
| PageCount | 3 |
| ParticipantIDs | ieee_primary_7970629 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-May |
| PublicationDateYYYYMMDD | 2017-05-01 |
| PublicationDate_xml | – month: 05 year: 2017 text: 2017-May |
| PublicationDecade | 2010 |
| PublicationTitle | 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM) |
| PublicationTitleAbbrev | SCM |
| PublicationYear | 2017 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.63985 |
| Snippet | The paper is aimed at researching the subject area, models and prototypes of secure mobile communication mesh networks providing support and operational... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 500 |
| SubjectTerms | Analytical models Logic gates Mobile communication Mobile computing mobile network modeling Security security incidents Sensors Social network services zigBee |
| Title | Modeling and analysis of security incidents for mobile communication mesh Zigbee-based network |
| URI | https://ieeexplore.ieee.org/document/7970629 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwGP3YhgdPKpv4mxw82q1t2vw4D4cXx8AdhgdHkn7RHtbK2vn3m7R1KnjxEPgIhcJXwutL3ssDuHWcJ-KWJYFC7giKpdRVCQ1S5oV_2mGSacMm-HwuViu56MHd3guDiI34DMe-bM7ys9Ls_FbZhEseslj2oc85a71aXyePoZw8TR-9VIuPu8d-5aU0cDE7-t-LjmH07bsjiz2inEAPiyG8-LgybxonjvS70V4iQkpLqi57jvj9cm-4rYj7BSWbUrulTsxP6wfZYPVGnvNXjRh45MpI0QrAR7Cc3S-nD0GXihDkMqwDFRktUiVsotHht1LS8ds0ozRyMBNappRrs0ljoT30a5QYa2Vix6OsjhXP6CkMirLAMyCRCLWxkY5MKhMjEsnQGiOoYXGYKWTnMPStWb-3916su65c_D19CYe--60Y8AoG9XaH13BgPuq82t40H-sTE32ZvQ |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwGP2YU9CTyib-NgePdkvT9EfOwzFxGwN3GB4cSfpFd1gr6-bfb9LWqeDFQyGUQOEL4fUl730P4NZyHj82EfckxpagmCCwIx54YeSEf8pikq7CJuLxOJnNxKQBd1svDCKW4jPsuGF5l5_meuOOyrqxiGnExA7shpwzWrm1vu4eqeg-9UZOrBV36om_ElNKwOgf_u9TR9D-dt6RyRZTjqGBWQteXGCZs40TS_vtU7URIbkhRZ0-R9yJubPcFsT-hJJlruxmJ_qn-YMssXgjz4tXheg57EpJVknA2zDt3097A6_ORfAWgq496WuVhDIxXKFFcCmFZbhhGgS-BRpqIiltoXXIEuXAX6FApqRmlkkZxWScBifQzPIMT4H4CVXa-MrXoeA64SJCo3US6IjRVGJ0Bi1Xmvl71fliXlfl_O_XN7A_mI6G8-HD-PECDtxKVNLAS2iuVxu8gj39sV4Uq-ty4T4BPWSdBA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+XX+IEEE+International+Conference+on+Soft+Computing+and+Measurements+%28SCM%29&rft.atitle=Modeling+and+analysis+of+security+incidents+for+mobile+communication+mesh+Zigbee-based+network&rft.au=Desnitsky%2C+V.+A.&rft.au=Kotenko%2C+I.+V.&rft.date=2017-05-01&rft.pub=IEEE&rft.spage=500&rft.epage=502&rft_id=info:doi/10.1109%2FSCM.2017.7970629&rft.externalDocID=7970629 |