Using preventive measures for the purpose of assuring information security of wireless communication channels

The task we consider is counteraction to the information security incidents. The special feature of the described solution is an integrated application of the methods ensuring implementation of the preventive measures aimed at increasing the complexity of information security threat implementation on a compact device. It provides tasks required for support of wireless communication channels in an environment exposed to an information influence. A prototype of the compact device based on form-factor PC-104+ relevant to the set objectives is offered and tested, its operation principles are described. There is an assessment of response to information attacks, and the states of the devices are modeled in various modes and during introduction of additional protection elements.

[1]  G. Eda,et al.  Strong Optical Absorption and Photocarrier Relaxation in 2-D Semiconductors , 2015, IEEE Journal of Quantum Electronics.

[2]  Andrei V. Gurtov,et al.  isBF: scalable in-packet bloom filter based multicast , 2013, SAC '13.

[3]  Andrei Gurtov,et al.  Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.

[4]  Andrey Koucheryavy,et al.  Fuzzy Logic and Voronoi Diagram Using for Cluster Head Selection in Ubiquitous Sensor Networks , 2014, NEW2AN.

[5]  G. Mahadevan,et al.  Nash Equilibrium and Marcov Chains to Enhance Game Theoretic Approach for Vanet Security , 2013 .

[6]  Andrei V. Gurtov,et al.  isBF: Scalable in-packet bloom filter based multicast , 2015, Comput. Commun..

[7]  Andrei V. Gurtov,et al.  Service Intelligence Support for Medical Sensor Networks in Personalized Mobile Health Systems , 2015, NEW2AN.

[8]  R. Adams Proceedings , 1947 .

[9]  Xinming Huang,et al.  Security of Autonomous Systems Employing Embedded Computing and Sensors , 2013, IEEE Micro.

[10]  N. Bazhayev,et al.  Monitoring of the Information Security of Wireless remote devices , 2015, 2015 9th International Conference on Application of Information and Communication Technologies (AICT).

[11]  Ilya Lebedev,et al.  The Monitoring of Information Security of Remote Devices of Wireless Networks , 2015, NEW2AN.

[12]  Andrei V. Gurtov,et al.  Trust and Reputation Mechanisms for Multi-agent Robotic Systems , 2014, NEW2AN.