scholarly journals Method of constructing simulation models of information security in data transmission channels of telemetry systems

2014 ◽  
pp. 181-814
Author(s):  
T.N. Govorukhina ◽  
A.V. Mikhaylov
Author(s):  
Виталий Анатольевич Довгаль ◽  
Сусана Касеевна Меретукова ◽  
Денис Игоревич Шередько

Рассматриваются способы и особенности организации удаленного доступа сотрудниками коммерческой компании, выполняющими свои должностные обязанности, находясь вне офиса, что является актуальным в связи с необходимостью изоляции в условиях пандемии. Использование общедоступных каналов передачи данных требует применения эффективных систем безопасности информации. На основании рассмотрения угроз передачи данных, присущих удаленному доступу, и способов их нейтрализации в данной работе предлагаются варианты замены зарубежного программного обеспечения, используемого в российских коммерческих компаниях, аналогичным ему по реализуемым функциям отечественным в рамках тенденции импортозамещения. The article discusses the methods and features of organizing remote access by employees of a commercial company who perform their official duties while out of the office, which is relevant due to the need for isolation in a pandemic. The use of public data transmission channels requires the use of effective information security systems. Based on the consideration of data transmission threats inherent in remote access and ways to neutralize them, this paper suggests options for replacing foreign software used in Russian commercial companies with similar domestic functions in terms of the import substitution trend.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3801-3808

‘Privacy, privacy everywhere but not a safety method to implement it’: a harsh reality of today’s world. With the precipitation of more data (2 x 1019 bits of data is created in every 86400 seconds) in computer networks, involvement of meta-data in the form of images is essential. To keep data safe and secure in order to inculcate privacy, to eradicate any kind of eavesdropping, and to maintain confidentiality, integrity and availability of it, certain security measures are needed to make in account for. So in order to make it available, we required a technique through which we can securely transfer any kind of data over a network. In practise the information security can be achieved either by using Cryptography or Steganography. The process described in this paper is not a mediocre it is more scrupulous towards the security because it involves image encryption, steganography and image stitching. Initially we are encrypting an image using Blowfish algorithm then we are embedding the secret text into this encrypted image by modifying the least significant bit (LSB) of the image by our data. Moreover, to enhance the privacy and security we are stitching the above resultant image with the red, green and blue (RGB) components of a host image and thereby producing an image more secure than the one which the existing systems can form for data transmission..


2021 ◽  
Vol 6 (1(34)) ◽  
pp. 27-29
Author(s):  
D.A. Oskin ◽  
A.A. Gorshkov ◽  
S.A. Klimenko

The principles of construction and operation of the data collection and transmission system (DCTS) of an unmanned vessel are considered. A two-stage formulation of the problem of constructing a DCTS is proposed: the choice of methods and means of transmitting data from sensors to the data collection system, the choice of a method for transmitting data to the data collection system, the implementation of data transmission channels and, directly, the organization of data collection and storage for use in the autopilot device, implementation systems for receiving and synchronizing data and their placement in the storage system.


2012 ◽  
Vol 488-489 ◽  
pp. 881-885
Author(s):  
Ji Yeon Kim ◽  
Hyung Jong Kim ◽  
Jin Myoung Kim ◽  
Won Tae Kim

The term “cyber-physical system (CPS)” refers to a computing system that integrates physical processes and computational devices via a network. There are many physical and computational devices in a CPS, which can function automatically through inter-device interactions. Because a CPS is usually used for large-scale complex systems, to ensure reliable CPS operation, its design and execution should be verified through simulations. For CPS simulation, a communication protocol should be established for data transmission between physical systems and the corresponding simulation models during the simulation, including control algorithms for regulating differences between the two systems. First, because physical systems and simulation models are advanced in real time and logical time, respectively, time regulation methods should be included in the control algorithm. Second, to simulate various types of physical systems, a flexible simulation environment, independent of the operating environment such as the type of communication middleware, is required. In this paper, we propose a communication protocol for data transmission between physical systems and simulation models via a middle layer that contains the policies for handling the two different clocks of each system: virtual and real. The proposed communication protocol can be used not only for communication between the two systems but also for overcoming the problems caused by the differences in their operating environments. The contribution of this work is in that it defines a communication protocol and proposes methods for controlling different types of systems.


2016 ◽  
pp. 66-71
Author(s):  
Adam Panteleevich Razgonov ◽  
◽  
Alexander Yurievich Lebedev ◽  
Anton Yurievich Zhuravlyov ◽  
Sergey Alexandrovich Shchigolev ◽  
...  

2013 ◽  
Vol 380-384 ◽  
pp. 3807-3810
Author(s):  
Ke Nian Wang ◽  
Hui Min Du

In the GPU system, pipeline image processing is facing the problem that a large amount of data to be processed, complicated processing procedure, more data transmission channels, and etc. All of these lead to low processing speed and large circuit area. This paper proposed a FPGA design of the pipeline image processing in GPU. The design has been implemented by foam extrusion pipeline architecture and validated on Xilinx Virtex XC6VLX550T FPGA. The results show that the consumption of resources is 390726.09 and the speed is 200MHz.


2014 ◽  
Vol 511-512 ◽  
pp. 120-125
Author(s):  
Qian Ye ◽  
Meng Wu ◽  
Yu Fei Wang

QoS assurance and information security are important for multimedia data transmission in wireless multimedia sensor networks. First, the status of multimedia sensor networks was introduced. Then research status of QoS assurance and information security of wireless multimedia sensor networks was surveyed, and the related open issues were also analyzed. Finally, the technology routes to solve the open issues were also studied and discussed. We argue that trusted QoS architecture considering various applications with different QoS requirements is important for wireless multimedia sensor networks. And network conditions and protocol layers must be well designed in QoS-aware secure multimedia routing mechanism to satisfy QoS requirements of multiple traffic classes. Technologies of information hiding, multimedia data resolution, and multi-routing can be used for privacy protection in wireless multimedia sensor networks.


2020 ◽  
Vol 218 ◽  
pp. 04008
Author(s):  
Yang Shen

In the era of big data, due to the great influence of big data itself, Internet information security has also become the focus of attention. In order to avoid disturbing people’s lives, this article summarizes the opportunities and challenges in the era of big data based on previous work experience. This article analyzes and studies five aspects including establishing complete laws and regulations, protecting personal information, applying big data technology to public security systems, doing a good job in data management and classification, and ensuring the security of data transmission. The author discusses specific measures for the maintenance of Internet information security in the era of big data from the above five aspects.


2021 ◽  
Vol 2021 (2) ◽  
pp. 229-241
Author(s):  
Vera L. LUKICHEVA ◽  
◽  
Andrey A. PRIVALOV ◽  
Daniil D. TITOV ◽  
◽  
...  

Objective: To analyze the impact of computer attacks on the performance quality of data transmission channels and channeling systems. It is also necessary to take into account the capabilities of an intruder to introduce malware into channeling systems when committing a computer attack. Methods: To determine the required design ratios, several options for setting various distribution functions characterizing the parameters used as input data and types of inbound streams have been considered, taking into account the parameters of the intruder’s computer attack model set by the values of the probability of successful attack. Mathematical modeling is carried out using the method of topological transformation of stochastic networks. The exponential, momentum and gamma distributions are considered as distribution functions of random variables. The solutions are presented for inbound streams corresponding to the Poisson, Weibull, and Pareto models. Results: The proposed approach makes it possible to assess the performance quality of data transmission channels in the context of computer attacks. These assessments make it possible to analyze the state and develop guidelines for improving the performance quality of communication channels against the destructive information impact of the intruder. Various variants of the functions of random variables distribution and various types of the inbound stream were used for modeling, making it possible to compare them, as well as to assess the possibility of using them in channels that provide users with different services. Practical importance: The modeling results can be used to build communication management decision support systems, as well as to detect attempts of unauthorized access to the telecommunications resource of transportation management systems. The proposed approach can be applied in the development of threat models to describe the capabilities of the intruder (the ‘Intruder Model’).


Sign in / Sign up

Export Citation Format

Share Document