Article 4216

Title of the article

INFORMATION RISKS ASSESSMENT IN DISTRIBUTED SYSTEMS OF DATA PROCESSING ON THE BASIS OF WIRELESS SENSOR NETWORKS

Authors

Finogeev Anton Alekseevich, Candidate of engineering sciences, associate professor, sub-department of CAD systems, Penza State University (40 Krasnaya street, Penza, Russia), fanton3@ya.ru
Finogeev Aleksey Germanovich, Doctor of engineering sciences, professor,sub-department of CAD systems, PenzaState University (40 Krasnaya street, Penza, Russia), alexeyfinogeev@gmail.com
Nefedova Irina Sergeevna, Postgraduate student, Penza State University (40 Krasnaya street, Penza, Russia), fanton3@ya.ru

Index UDK

004.056.5

DOI

10.21685/2072-3059-2016-2-4

Abstract

Background. The article considers information risk management aspects in systems of secured collection and distributed processing of large sensor data. The tar-gets of information threats are SCADA components of systems of centralized control and management in power supply and energy consumption services.
Materials and methods. Collection and distributed processing of data are implemented via spatially distributed sensors, devices of automation, control and registration of energy sources and transportation of energy in engineering power networks. Applied at wireless sensor network nodes, cell connection modems and industrial controllers of energy resources control and registration devices, the authors implement a model of distributed “fog” computing, according to which main components of information risks are considered.
Results. The article introduces a classification of information threats and attacks on wireless transporting environment of “fog” computing. The work determines methods and tools of protection of ZigBee sensor segments, data collection nodes, wireless communication channels and transmitted data. Special consideration is given to information safety provision regarding program agents and brokers of “fog” computing.
Conclusions. Ensuring protection and safety protocols execution at organization of access from spatiall distributed modules to agents and brokers of “fog” computing requires development of new models of protection due to limited computing and power resources of network nodes. Problems of information protectionareshifting from network perimeter and network infrastructure protection towards protection of sensor data and personnel with “fog” computing agents’ codes.

Key words

monitoring, sensor data protection, information risk, distributed data processing, fog computing, SCADA, wireless sensor network, information security.

Download PDF
References

1. Finogeev A. G., Dil'man V. B., Maslov V. A., Finogeev A. A. Prikladnaya informatika [Applied informatics]. 2011, no. 3 (33), pp. 83–93.
2. Kamaev V. A., Fionova L. R., Finogeev A. G., Finogeev A. A. International Journal of Applied Engineering Research – Research India Publications. 2015, vol. 10, no. 3, pp. 6499–6507.
3. Bonomi F., Milito Rodolfo, Zhu Jiang, Addepalli Sateesh Proceedings of the first edition of the MCC workshop on Mobile cloud computing. 2012, pp. 13–16.
4. Kamaev V. A., Finogeev A. G., Nefedova I. S., Finogeev E. A. Izvestiya Volgogradskogo gosudarstvennogo tekhnicheskogo universiteta. Ser. Aktual'nye problemy upravleniya, vychislitel'noy tekhniki i informatiki v tekhnicheskikh sistemakh [Proceedings of Volgograd State Technical University. Series: Topical problems of control, computer engineering and informatics in technical systems]. 2014, iss. 22, no. 25 (152), pp. 164–176.
5. ISO/IEC 27005:2008 Information technology. Security techniques. Information security risk management. Moscow, 2008.
6. Finogeev A. G., Nefedova I. S., Tkhay Kuang Vin' Izvestiya Volgogradskogo gosudarstvennogo tekhnicheskogo universiteta. Ser. Aktual'nye problemy upravleniya, vychislitel'noy tekhniki i informatiki v tekhnicheskikh sistemakh [Proceedings of Volgograd State Technical University. Series: Topical problems of control, computer engineering and informatics in technical systems]. 2014, iss. 20, no. 6 (133), pp. 129–138.
7. Zavgorodniy V. I. Informatsionnye riski i ekonomicheskaya bezopasnost' predpriyatiya [Information risks and economic safety of companies]. Moscow: Finakademiya, 2008, 160 p.
8. GOST R 50922–2006. Zashchita informatsii. Osnovnye terminy i opredeleniya [State standard R 50922–2006. Information protection. General terms and definitions].
9. Kamaev V. A., Natrov V. V. Izvestiya Volgogradskogo gosudarstvennogo tekhnicheskogo universiteta. Ser. Kontseptual'noe proektirovanie v obrazovanii, tekhnike i tekhnologii [Proceedings of Volgograd State Technical University. Series: Conceptual design in education, engineering and technology]. 2006,iss.2,no.2,pp.127–132.
10. Botvinkin P. V., Kamaev V. A., Nefedova I. S., Finogeev A. G., Finogeev E. A. Life Science Journal – Acta Zhengzhou University Overseas Edition (Life Sci J). 2014, vol. 11, Special Issue 11 (Supplement 1111s), pp. 384–388.
11. Finogeev A. G., Nefedova I. S., Finogeev E. A., Tkhay Kuang Vin', Botvinkin P. V. Prikaspiyskiy zhurnal. Upravlenie i vysokie tekhnologii [Caspian journal. Management and high technologies]. 2014, no. 1, pp. 12–23.

 

Дата создания: 30.09.2016 08:49
Дата обновления: 30.09.2016 10:18