scholarly journals ANALYSIS OF APPROACHES OF INFLUENCE OF ELECTRONIC WARFARE MEANS ON THE ON THE NETWORK-CENTRIC CONTROL SYSTEM

Author(s):  
A. Shyshatskyi ◽  
O. Sova ◽  
Yu. Zhuravskyi ◽  
O. Nalapko ◽  
Yu. Sokil ◽  
...  

The intensive development of information and control technologies, as well as their integration into a single information space, leads to an increase in the role of such technologies in the processes of control of troops (forces) and weapons, including high-precision ones. At the same time, the electronic material base of the information infrastructure created within the concept of network-centric warfare is potentially vulnerable to electronic warfare. In this article, the authors analyze the approaches to the influence of electronic warfare on network-centric control systems. In the course of the study, the authors solved the following interrelated tasks: identified information restrictions on the implementation of the network-centric war concept; the prospects for the development of electronic warfare systems that are focused on disruption of the operation of network-centric systems of military control and the prospective scientific and methodological approaches to substantiate the methods of radio-electronic influence on network-centric control systems. In the course of this research, the authors used the basic principles of electronic warfare theory, signal theory, communication theory, queuing systems and classical methods of scientific cognition - analysis and synthesis. According to the results of the study, the following conclusions can be drawn: perspective directions for the development of radio-electronic influences, oriented on the transport layer of communication networks, can be implemented as complexes of territorially distributed means of electronic control, implementing fundamentally new methods of suppression, and special software and bookmarks software (viruses) that are introduced into the telecommunications network equipment. It should be noted that the use of all the above radio-electronic effects is advisable only against packet networks with advanced topology. The use of such influences against networks with tree topology is pointless given the possibility of attaining the suppression effect of “classical” channel suppression

Author(s):  
O. Yula ◽  
O. Bidnyi ◽  
A. Vakula ◽  
O. Petrov ◽  
O. Kravchuk

The intensive development of information and control technologies, as well as their integration into a single information space, leads to an increase in the role of such technologies in the processes of control of troops (forces) and weapons, including high-precision ones. At the same time, the electronic material base of the information infrastructure created within the concept of network-centric warfare is potentially vulnerable to electronic warfare. In this article, the authors analyze the approaches to the impact of electronic warfare on network-centric control systems. In the course of the study, the authors solved the following interrelated tasks: identified information restrictions on the implementation of the network-centric war concept; the prospects for the development of electronic warfare systems that are focused on disruption of the operation of network-centric systems of military control and the prospective scientific and methodological approaches to substantiate the methods of radio-electronic impact on network-centric control systems. In the course of this research, the authors used the basic principles of electronic warfare theory, signal theory, communication theory, queuing systems and classical methods of scientific cognition – analysis and synthesis. According to the results of the study, the following conclusions can be drawn: perspective directions for the development of radio-electronic impact, oriented on the transport layer of communication networks, can be implemented as complexes of territorially distributed means of electronic control, implementing fundamentally new methods of suppression, and special software and bookmarks software (viruses) that are introduced into the telecommunications network equipment. It should be noted that the use of all the above radio-electronic effects is advisable only against packet networks with advanced topology. The use of such impacts against networks with tree topology is pointless since there is a possibility of attaining the suppression effect by“classical” channel suppression.


2021 ◽  
pp. 481-493
Author(s):  
Sarika Singh ◽  
Gargi Phadke

For any system to secure them industrial control system plays an important role in it. It helps to design the isolated procure system, specialized communication mechanisms is used to help for the setup. And with the help of this setup the flexibility, safety, threats, and vulnerabilities are the most important things to make. To secure them from risk assessment and other protection measurement need to specify with good instruments and security. The paper describes technical aspects on Denial of Service (Dos) attack. We also identify how smart grid communication networks works in security technical implementation guides of the different countries as a defense information systems agency. A brief chronicle of cyber storm on ICS; common challenges, some mitigation of those challenge, all levels of the multi-layered ICS architecture. This paper demonstrates railway control systems (RCS) compliance estimation of immovable control system design, operational scenarios that can be used for mitigation measures and security assessment.


Author(s):  
S. Yuness ◽  
E.S. Lobusov

The use of communication networks in control systems has several important advantages, such as the ability of information transfer and remote control of various objects, the possibility of modifications and maintenance. On the other hand, the time between reading measurements from the sensor and sending a control signal to the actuator depends on the network characteristics (topology and routing scheme), and such a time delay can greatly affect the overall network performance. Delays, distortions and loss of transmitted data not only degrade the performance of the network management system, but also destabilize it. The paper considers the use of Petri nets as a method for modeling networked control systems (NCS) on the example of designing an active suspension control system for a car. When modeling, the star and common bus topologies were used, the comparison of which revealed that control systems with the common bus topology function 40% faster than systems with the star topology.


2004 ◽  
Vol 52 (3-4) ◽  
pp. 379-389
Author(s):  
Dmitar Stevanovic ◽  
Miljko Eric ◽  
Dusan Starcevic

Author(s):  
Lei Chen ◽  
Wen-Chen Hu ◽  
Ming Yang ◽  
Lei Zhang

E-mail services are the method of sending and receiving electronic messages over communication networks. Web services on the other hand provide a channel of accessing interlinked hypermeida via the World Wide Web. As these two methods of network communications turn into the most popular services over the Internet, applied cryptography and secure authentication protocols become indispensable in securing confidential data over public networks. In this chapter, we first review a number of cryptographic ciphers widely used in secure communication protocols. We then discuss and compare the popular trust system Web of Trust, the certificate standard X.509, and the standard for public key systems Public Key Infrastructure (PKI). Two secure e-mail standards, OpenPGP and S/MIME, are examined and compared. The de facto standard cryptographic protocol for e-commerce, Secure Socket Layer (SSL) / Transport Layer Security (TLS), and XML Security Standards for secure web services are also discussed.


Sensors ◽  
2019 ◽  
Vol 19 (20) ◽  
pp. 4455 ◽  
Author(s):  
Figueroa-Lorenzo ◽  
Añorga ◽  
Arrizabalaga

Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations. Modbus is an application protocol that allows communication between millions of automation devices. Unfortunately, Modbus lacks basic security mechanisms, and this leads to multiple vulnerabilities, due to both design and implementation. This issue enables certain types of attacks, for example, man in the middle attacks, eavesdropping attacks, and replay attack. The exploitation of such flaws may greatly influence companies and the general population, especially for attacks targeting critical infrastructural assets, such as power plants, water distribution and railway transportation systems. In order to provide security mechanisms to the protocol, the Modbus organization released security specifications, which provide robust protection through the blending of Transport Layer Security (TLS) with the traditional Modbus protocol. TLS will encapsulate Modbus packets to provide both authentication and message-integrity protection. The security features leverage X.509v3 digital certificates for authentication of the server and client. From the security specifications, this study addresses the security problems of the Modbus protocol, proposing a new secure version of a role-based access control model (RBAC), in order to authorize both the client on the server, as well as the Modbus frame. This model is divided into an authorization process via roles, which is inserted as an arbitrary extension in the certificate X.509v3 and the message authorization via unit id, a unique identifier used to authorize the Modbus frame. Our proposal is evaluated through two approaches: A security analysis and a performance analysis. The security analysis involves verifying the protocol's resistance to different types of attacks, as well as that certain pillars of cybersecurity, such as integrity and confidentiality, are not compromised. Finally, our performance analysis involves deploying our design over a testnet built on GNS3. This testnet has been designed based on an industrial security standard, such as IEC-62443, which divides the industrial network into levels. Then both the client and the server are deployed over this network in order to verify the feasibility of the proposal. For this purpose, different latencies measurements in industrial environments are used as a benchmark, which are matched against the latencies in our proposal for different cipher suites.


Author(s):  
Wilfried Elmenreich ◽  
◽  
Imre J. Rudas ◽  

This issue contains selected papers from the International IEEE Conference on Computational Cybernetics that took place in August 2003 in Hungary at the site of lake Balaton. Computational Cybernetics is the synergetic integration of Cybernetics and Computational Intelligence techniques. Cybernetics was defined by Wiener as "the science of control and communication, in the animal and the machine". The word "cybernetics" itself stems from the Greek "kybernetes" that means pilot or governor. Thus, the science of computational Cybernetics is especially concerned with the comparative study of automatic control systems. Furthermore, Computational Cybernetics covers not only mechanical, but biological (living), social and economical systems and for this uses computational intelligence based results of communication theory, signal processing, information technology, control theory, the theory of adaptive systems, the theory of complex systems (game theory, operational research), and computer science. We have selected 14 papers from the conference covering the fields of system design and modeling, neural networks, and fuzzy control, which resemble the great variety of computational cybernetics. While it is sometimes difficult to integrate over these differing fields, we expect the evolution of future intelligent systems at the service of mankind by the synergetic integration of these different areas. It is our hope that the papers in this issue will inspire and help our readers in the development of advanced intelligent systems.


2002 ◽  
Vol 11 (02) ◽  
pp. 187-211
Author(s):  
PETER H. BAUER ◽  
MIHAIL L. SICHITIU ◽  
KAMAL PREMARATNE

This paper introduces a discrete time model for time-variant delays and investigates the very nature of such delays. It is shown that a linear system-delay interface is a system theoretic necessity for the construction of composite linear systems with time-variant delays. Based on this analysis, two interfaces of particular importance are presented and used to obtain new, simple to check stability results for queue control systems. The relevance of the presented modeling and stability results on queue control systems to QoS control in modern communication networks is illustrated via several examples.


Sign in / Sign up

Export Citation Format

Share Document