Protection of vehicle networks against unauthorized access through isolation of exchange protocols
DOI:
https://doi.org/10.18372/2073-4751.72.17458Keywords:
wireless information and telecommunication system, protocols of closed, limited and open access, combined analysis of signatures and protocols, unauthorized intrusionAbstract
The article is devoted to the study of methods of protection of wireless information and telecommunication systems of transport. According to the results of the analysis of the methods of organization and ensuring the quality of service in promising information and communication and computer networks of critical application, it was found that the main problems for networks are the heterogeneity of network traffic and overloading, which worsen QoS indicators. Congestion prevention is implemented by building a multi-level hierarchical structure, but the methods of coordinating the interaction protocols of autonomous network segments need improvement. The specificity of wireless networks is the propagation of signals through a free environment, that is, fundamentally open access to signals as carriers of information that is transmitted from one subscriber to another. Therefore, in addition to the general problems of managing information and telecommunication networks, the problems of protection against unauthorized interference and external interference of various origins are quite acute in wireless networks. To protect network segments with closed access from unauthorized intrusion (hacker attack on the network, interception of vehicle control), methods of isolating closed access protocols from restricted and open (general) access protocols have been developed. Statistical indicators of messages, in particular, the number of incoming and outgoing IP, TCP, UDP packets during the observation interval, the time of receiving and sending packets, etc., are parametrically incompatible, and the corresponding coefficients of mutual correlation are values of the second order of smallness; sets of signature indicators of closed access, restricted access, and open access messages and signatures of attacks are components of vectors that are almost orthogonal to each other, and their scalar products are values of the second order of smallness; according to the results of statistical and signature analysis, attempts of both accidental and intentional unauthorized interference to segments with closed and limited access are filtered.
References
Горбенко А.В. Методи та інструментальні засоби розробки комп’ютерних мереж інформаційно-управляючих систем критичного застосування. Автореферат. Канд. техн. наук. – Харків: Національний аерокосмічний університет ім. М.Є. Жуковського “Харківський авіаційний інститут”, 2004. – 20 с.
Stallings W. Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud. – Pearson Education, Inc., Old Tappan, New Jersey, 2016. – 538 p.
Водоп'янов С. В. Методи побудови автономних комп’ютерних сегментів аеровузлової мережі. – Дис. канд. техн. наук. – К.: НАУ, 2018. – 164 с.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.