Analysis of information security problems
News of the Kabardin-Balkar scientific center of RAS, no. 6-2 (2018), pp. 30-43.

Voir la notice de l'article provenant de la source Math-Net.Ru

To date, the direction associated with robotics is actively developing. The main focus is on the development of protocols, methods, algorithms for group control of robots. At the same time, robotic systems are actively being introduced into industrial production, as well as into the military industry. The high rate of development of these systems will lead to the fact that they will be used in everyday life. Development of a security system for a robotic system, a wireless sensor network, or an “Internet of things” system is a non-trivial task. It is necessary to take into account the physical insecurity of the nodes, limited computing and energy resources and wireless transmission medium.
Keywords: robotic system, attacks, attack detection systems, trust, authentication, encryption.
@article{IZKAB_2018_6-2_a4,
     author = {A. S. Basan and E. S. Basan and O. B. Makarevich},
     title = {Analysis of information security problems},
     journal = {News of the Kabardin-Balkar scientific center of RAS},
     pages = {30--43},
     publisher = {mathdoc},
     number = {6-2},
     year = {2018},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/IZKAB_2018_6-2_a4/}
}
TY  - JOUR
AU  - A. S. Basan
AU  - E. S. Basan
AU  - O. B. Makarevich
TI  - Analysis of information security problems
JO  - News of the Kabardin-Balkar scientific center of RAS
PY  - 2018
SP  - 30
EP  - 43
IS  - 6-2
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/IZKAB_2018_6-2_a4/
LA  - ru
ID  - IZKAB_2018_6-2_a4
ER  - 
%0 Journal Article
%A A. S. Basan
%A E. S. Basan
%A O. B. Makarevich
%T Analysis of information security problems
%J News of the Kabardin-Balkar scientific center of RAS
%D 2018
%P 30-43
%N 6-2
%I mathdoc
%U http://geodesic.mathdoc.fr/item/IZKAB_2018_6-2_a4/
%G ru
%F IZKAB_2018_6-2_a4
A. S. Basan; E. S. Basan; O. B. Makarevich. Analysis of information security problems. News of the Kabardin-Balkar scientific center of RAS, no. 6-2 (2018), pp. 30-43. http://geodesic.mathdoc.fr/item/IZKAB_2018_6-2_a4/

[1] E. S. Abramov, E. S. Basan, “Razrabotka modeli zaschischennoi klasternoi besprovodnoi sensornoi seti”, Izvestiya YuFU. Tekhnicheskie nauki. Razdel II. Bezopasnost informatsionnykh sistem i setei, 2013, 48–56

[2] Shantala Patil, Dr Vijaya Kumar, Sonali Singha, Rashique Jamil, “A Survey on Authentication Techniques for Wireless Sensor Networks”, International Journal of Applied Engineering Research, 7:11 (2012)

[3] E. S. Abramov, E. S. Basan, “Analiz stsenariev atak na besprovodnye sensornye seti”, Materialy XIII mezhdunarodnoi nauchno-prakticheskoi konferentsii «IB-2013», v. 1, Izd-vo TTI YuFU, Taganrog, 2013, 60–72

[4] Karan Singh, R. S. Yadav, Ranvijay, “A review paper on Adhoc network security”, International Journal of Computer Science and Security, 2007

[5] B. Yu, M. P. Singh, “An evidential model of distributed reputation management”, Proceedings of First International Joint Conference on Autonomous Agents and Multiagent Systems, 2002, 294–301

[6] Anatolij Bezemskij , Loukas George, J. Anthony Richard, Gan Diane, “Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle”, 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security, 61–68

[7] A. Fagiolini, G. Dini, A. Bicchi, “Distributed Intrusion Detection for the Security of Industrial Cooperative Robotic Systems”, 19th World Congress The International Federation of Automatic Control (Cape Town, South Africa, August 24-29, 2014)

[8] Anatolij Bezemskij , Loukas George, J. Anthony Richard, Gan Diane, “Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle”, 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security, 61–68 | DOI

[9] Monsh Mehrnoosh , Vikramajeet Khatri, Raimo Kantola, Zheng Yan, “An Orchestrated Security Platform for Internet of Robots”, Green, Pervasive, and Cloud Computing (GPC 2017), LNCS, 10232, eds. Au M., Castiglione A., Choo KK., Palmieri F., Li KC., Springer, Cham, 2017, 298–312

[10] S. S. Wang, K. Q. Yan, S. C. Wang, C. W. Liu, “An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks”, Expert Syst. Appli., 38 (2011), 15234–15243 | DOI | MR

[11] A. Agah, S. K. Das, K. Basu, M. Asadi, “Intrusion detection in sensor networks: A no cooperative game approach”, Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (30 Aug.–1 Sept. 2004), IEEE Xolore Press, 343–346

[12] G. Wang, Dong k. Kim, G. Cho, “A Secure Cluster Formation Scheme in Wireless Sensor Networks”, International Journal of Distributed Sensor Networks, 2012, 14

[13] W. R. Pires, T. H. De, Paula Figueiredo, H.C. Wong and A.A.F. Loureiro, “Malicious node detection in wireless sensor”, Proceedings 18th International, Parallel and Distributed Processing Symposium (PDS' 04), 2004, 1–7

[14] T. V. Phuong, L. Hung, S. Cho, Y. K. Lee, S. Lee, “An Anomaly detection algorithm for detecting attacks in wireless sensor networks”, Proceedings of the 4th IEEE International Conference on Intelligence and Security Informatics (ISI' 06), Springer-Verlag, Berlin–Heidelberg, 2006, 735–736 | DOI

[15] V. Umarani, K. Soma Sundaram, “Survey of Various Trust Models and Their Behavior in Wireless Sensor Networks”, International Journal of Emerging Technology and Advanced Engineering, 3:10, October (2013), 180–189

[16] F. Gómez Mármol, G. Martínez Pérez, “Providing Trust in Wireless Sensor Networks using a Bio-inspired Technique”, Telecommunication Systems Journal, 46:2 (2011), 163–180 | DOI

[17] I. A. Zikratova, T. V. Zikratova, I. S. Lebedeva, A. V. Gurtov, “Postroenie modeli doveriya i reputatsii k ob'ektam multiagentnykh robototekhnicheskikh sistem s detsentralizovannym upravleniem”, Nauchno-tekhnicheskii vestnik informatsionnykh tekhnologii, mekhaniki i optiki, 2014, no. 3 (91), 30–38

[18] J. W. Ho., “Zone-based trust management in sensor networks”, IEEE International Conference on Pervasive Computing and Communications, 2009, 1–2

[19] Chen-xu Liu, Yun Liu, Zhen-Jiang Zhang, “Improved Reliable Trust-Based and Energy-Efficient Data Aggregation for Wireless Sensor Networks”, International Journal of Distributed Sensor Networks, 2013, 1–11 | DOI

[20] S. Ganeriwal, L. K. Balzano, M. B. Srivastava, “Reputationbased framework for high integrity sensor networks”, ACM Trans. Sen. Netw., 4:3 (2008), 1–37 | DOI

[21] R. Zhou, K. Hwang, “Power Trust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing”, IEEE Transactions on Parallel and Distributed Systems, 18:4 (2007), 460–473 | DOI

[22] L. Eschenauer, V. D. Gligor, “A Key Management Scheme for Distributed Sensor Networks”, Proceedings of the 9th ACM Conference on Computing and Communications, 2002, 41–47

[23] B. C.C. Lai, D. D. Hwang, S. P. Kim, I. Verbauwhede, “Reducing radio energy consumption of key management protocols for wireless sensor networks”, International Symposium on Low Power Electronics and Design, 2004, 351–356

[24] S. Zhu, S. Setia, S. Jajodia, “LEAP: Efficient Security Mechanisms For Large-Scale Distributed Sensor Networks”, ACM Conference on Computing and Communication Security, 2003 | MR

[25] R. L. Rivest, A. Shamir, L. Adleman, “A Method for Obtaining Digital Signatures and Public-key «Cryptosystems»”, Commun. ACM, 21:2, Feb (1978), 120–126 | DOI | MR | Zbl

[26] R. Watro, D. Kong, F. C. Sue et al, “TinyPK: Securing Sensor Networks with Public Key Technology”, Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004, 59–64

[27] Y. Zhou, Y. Zhang, Y. Fang, “Access Control in Wireless Sensor Networks”, Ad Hoc Networks, 5 (2007), 3–13 | DOI | Zbl

[28] T. Aura, Cryptographically Generated Addresses (CGA), IETF, RFC 3972, Mar. 2005

[29] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes”, Advances in Cryptology, Lecture Notes in Computer Science, 196, eds. G. R. Blakley and D. Chaum, Springer Berlin Heidelberg, 1985, 47–53 | DOI | MR | Zbl

[30] Jian Yi, Shi Haoshan, Zhao Honggang, “A Broadcast Authentication Solution Based on a Graded Merkle Tree for Wirelss Sensor Networks”, Transaction on system simulation, 19:24 (2007)

[31] J. Schaheen, D. Ostry, “Confidential and Secure Broadcast in Wireless Sensor Networks”, Proceedings of the 18th Annual IEEE International Symposium on Personal Indoor and Mobile Radio Communications, 2007, 1–5

[32] S. Yu-long, M. A. Jian-feng, “PEI Qing qi: An Access Control Scheme in Wireless Sensor Networks”, Proceedings of 2007 IFIP International Conference on Network and Parallel Computing Workshops, 362–367

[33] M. Bellare, R. Canetti, H. Krawczyk, “Keying Hash Functions for Message Authentication”, Advances in Cryptology CRYPTO '96, Lecture Notes in Computer Science, 1109, ed. N. Koblitz | MR | Zbl