Improving the model of decision making about abnormal network state using a positioning system
Journal Title: Восточно-Европейский журнал передовых технологий - Year 2019, Vol 1, Issue 9
Abstract
<p>We have proposed to supplement the model of decision making about abnormal states of a wireless network under conditions of uncertainty by another attribute ‒ the location of wireless mobile and stationary devices in a controlled network.</p><p>The method of trilateration, based on the measurement of signal strength at three points, is considered. This method has a high accuracy of determining the location of a wireless device, provided that the most accurate model of radio waves propagation is constructed. However, given the specificity of radio waves propagation inside the premise, it is rather difficult to build such a model for them. Therefore, it is proposed to use the method of radio fingerprints. This method is based on the construction of radio maps for each of the three access points, which indicates the signal level from a typical wireless device located at a certain number of reference points. We have also considered the possibility of the combined application of two methods, which will make it possible to determine the location of a wireless device even when it is outside the radio map.</p><p>Experimental studies were carried out, including the creation of radio maps for a room of area 70 m² with 26 reference points. We employed three identical routers and a smartphone. During the experiment, it turned out that, depending on the orientation of the mobile device (in fact, its antenna), the measured power changes, so the radio maps were constructed based on average power for six different positions of the mobile device. It is shown that the level of the signal is almost independent of the door and window position in the room.</p>This analysis of the principles of organizing various types of attacks on wireless networks has revealed that accounting for the position makes it possible to detect attacks of the types "man in the middle" and "false access point" that were not identified by the base model. In addition, the improved model allows determining the source of interference at the "muting" attack
Authors and Affiliations
Ivan Antipov, Tetyana Vasilenko
Development of a model for determining a priority sequence of power transformers out of service
<p>The research is devoted to the development of a model and algorithm for making decisions on determining the priority of power transformers out of service. Reducing the reliability of EPS operation, caused by the objec...
Development of a technology for absorbing screening of command posts with electronic equipment
<p>The problem of creation of a technology for effective protection of rooms of control points with electronic equipment against powerful intentional and industrial interferences was studied. Development of ray weapons i...
Computer modeling of water cleaning in wetland taking into account of suffosion ang colmatation
<p>The mathematical model of filtering with regard to colmatation and suffusion in the system bioplato-filter 2. This saturated porous medium is considered in terms of a complex heterogeneous system "fill"-"concentration...
Traffic engineering in a software-defined network based on the decision-making method
<p>One of the main control tasks in a computer network is to organize an effective system of information delivery; this task is of particular relevance in the software defined network. Conventional routing tools do not m...
Study of anode processes during development of the new complex thiocarbamidecitrate copper plating electrolyte
<p>The kinetics of anodic reactions occurring on copper in thiocarbamide-citrate solutions was studied. Thiocarbamide forms stable copper (I) complexes of the cationic type with a coordination number equal to unity. Citr...