The organization of the Information Security of Wireless remote devices of the self-organizing wireless networks was discussed. The functionality of the systems based on wireless technology was analyzed. The properties of available nodes were considered. The notion of interoperability elements of self-organizing wireless networks was defined. A model of the interaction of remote devices was detected; and analyzes signs identifying anomalous behavior catch for different topologies were shown. A model of interaction of remote devices was detected; and analyzes signs identifying anomalous behavior of nodes for various kinds of topologies were shown. The results of the simulation states interoperability between the two devices is a self-organizing network based on the dependency model were identified. The levels of indicators for functionality of the system in the different modes and environment were shown. The characteristics that reflect the state of the system, which can be used in the statistical analysis to detect anomalous behavior of the remote devices, were defined. An approach to the evaluation that uses dedicated system characteristics was proposed. The experiment that provides obtaining statistical information on remote devices for different modes of self-organizing network was disclosed. The results of the system for the broadcast packet network scan with given technical specifications were presented. The dependences of sleeping and waking feedback devices for the different composition systems based on self-organizing wireless networks were given. The feature of the approach is that it allows using a built-in command set, which allows avoiding additional costs in the construction of the control systems for wireless sensor networks.
[1]
James F. Peters,et al.
Approximation Spaces for Hierarchical Intelligent Behavioral System Models
,
2004,
MSRAS.
[2]
Prasanna Sridhar,et al.
Multi agent Simulation using Discrete Event and Soft -
,
2004
.
[3]
Mo M. Jamshidi,et al.
Multi-agent simulation using discrete event and soft-computing methodologies
,
2003,
SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[4]
Andrei V. Gurtov,et al.
Trust and Reputation Mechanisms for Multi-agent Robotic Systems
,
2014,
NEW2AN.
[5]
F. N. Shago,et al.
TECHNIQUE OF OPTIMAL AUDIT PLANNING FOR INFORMATION SECURITY MANAGEMENT SYSTEM
,
2014
.
[6]
Maria Indrawan,et al.
Countering security vulnerabilities using a shared security Buddy model schema in mobile agent communities
,
2004
.
[7]
Xinming Huang,et al.
Security of Autonomous Systems Employing Embedded Computing and Sensors
,
2013,
IEEE Micro.
[8]
G. Mahadevan,et al.
Nash Equilibrium and Marcov Chains to Enhance Game Theoretic Approach for Vanet Security
,
2013
.
[9]
Andrei V. Gurtov,et al.
An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications
,
2014,
Sensors.