Redirigiendo al acceso original de articulo en 16 segundos...
ARTÍCULO
TITULO

Counteraction to the hidden destructive impact in swarms of unmanned aerial vehicles

I. I. Viksnin    
E. D. Marinenkov    

Resumen

The paper deals with the issue of information security in the unmanned aerial vehicles' swarm. In connection with the active development of this technology and its application in various spheres of human activity, one of the most important creation aspects of such a group is the destructive information impact countering of various kinds. The authors analyze the information interaction of swarm agents, dividing it into internal and external, based on the nature of the transmitted information messages. Describing the information interaction of the swarm, the authors develop a set-theoretic model that allows to determine the existing vulnerabilities. Based on the analysis of the identified vulnerabilities exposed to both destructive information interaction and hidden destructive information interaction, the authors propose an approach to countering destructive information impact on the basis of information security traditional methods ? mobile cryptography, authentication methods, the model of police stations, improved for use in the context of decentralized systems. To detect violations of information semantic integrity, the authors propose an innovative method of countering the hidden destructive information interaction based on reputation mechanisms. Due to evaluative characteristics of all agents of the group, in the form of reputation criterion, the method allows to identify intruders who carry out not only intentional but also unintentional hidden destructive impact. In the view of information security, the method reduces the probability of the first and second kind errors. To demonstrate the efficiency of the proposed approaches, an experiment is carried out, showing the effectiveness of the methods used in terms of errors of the I and II kind.

 Artículos similares

       
 
Hui Zhang, Shuai Ji, Mingming Shao, Houxu Pu and Liping Zhang    
The purpose of this study was to achieve non-destructive detection of the internal defects of in-shell walnuts using X-ray radiography technology based on improved Faster R-CNN network model. First, the FPN structure was added to the feature-extraction l... ver más
Revista: Applied Sciences

 
James Marcus Griffin, Steven Jones, Bama Perumal and Carl Perrin    
Welding inspection is a critical process that can be severely time-consuming, resulting in productivity delays, especially when destructive or invasive processes are required. This paper defines the novel approach to investigate the physical correlation ... ver más
Revista: Acoustics

 
Ying Zhang, Qi Zhang, Yu Zhang and Zhiyuan Zhu    
Ocean wireless sensor networks (OWSNs) play an important role in marine environment monitoring, underwater target tracking, and marine defense. OWSNs not only monitor the surface information in real time but also act as an important relay layer for under... ver más

 
Costas P. Providakis, Maria G. Mousteraki and Georgia C. Providaki    
Without affecting the integrity or stability of the heritage monuments, vibration-based techniques provide useful solutions for acquiring global information about them. By studying the dynamic response to suitable excitation sources, it is feasible to de... ver más
Revista: Infrastructures

 
Abdelrahman Khalifa, Bashar Bashir, Abdullah Alsalman, Sambit Prasanajit Naik and Rosa Nappi    
Evaluating and predicting the occurrence and spatial remarks of climate and rainfall-related destructive hazards is a big challenge. Periodically, Sinai Peninsula is suffering from natural risks that enthuse researchers to provide the area more attention... ver más
Revista: Water