Improving the model of decision making about abnormal network state using a positioning system
Journal Title: Восточно-Европейский журнал передовых технологий - Year 2019, Vol 1, Issue 9
Abstract
<p>We have proposed to supplement the model of decision making about abnormal states of a wireless network under conditions of uncertainty by another attribute ‒ the location of wireless mobile and stationary devices in a controlled network.</p><p>The method of trilateration, based on the measurement of signal strength at three points, is considered. This method has a high accuracy of determining the location of a wireless device, provided that the most accurate model of radio waves propagation is constructed. However, given the specificity of radio waves propagation inside the premise, it is rather difficult to build such a model for them. Therefore, it is proposed to use the method of radio fingerprints. This method is based on the construction of radio maps for each of the three access points, which indicates the signal level from a typical wireless device located at a certain number of reference points. We have also considered the possibility of the combined application of two methods, which will make it possible to determine the location of a wireless device even when it is outside the radio map.</p><p>Experimental studies were carried out, including the creation of radio maps for a room of area 70 m² with 26 reference points. We employed three identical routers and a smartphone. During the experiment, it turned out that, depending on the orientation of the mobile device (in fact, its antenna), the measured power changes, so the radio maps were constructed based on average power for six different positions of the mobile device. It is shown that the level of the signal is almost independent of the door and window position in the room.</p>This analysis of the principles of organizing various types of attacks on wireless networks has revealed that accounting for the position makes it possible to detect attacks of the types "man in the middle" and "false access point" that were not identified by the base model. In addition, the improved model allows determining the source of interference at the "muting" attack
Authors and Affiliations
Ivan Antipov, Tetyana Vasilenko
Specific features of defect formation in the nSi <P> single crystals at electron irradiation
Based on measurements of infrared Fourier spectroscopy, Hall effect, and the tensor Hall-effect, we have established the nature, and determined the concentration, of the main types of radiation defects in the single crys...
Development of the model of the proactive approach in creation of distributed information systems
<p>We discuss an integrated approach to complex projects management, creating distributed information systems, which is based on the analysis of the relationship of project management processes, product creation, managem...
Studying the quality of drill pipes clamped in a wedge clamp
<p class="Default">Much attention has been recently paid to institutional measures aimed at improving quality of products related to petroleum machine building, in particular, the implementation of quality management sys...
DEVELOPMENT OF COMPOSITION FORMULATIONS, BASED ON NATURAL BISCHOFITE, TO PROTECT WOOD FROM FIRE
We have studied the chemical composition of natural bischofite extracted from well No. 1 at Zaturin deposit and revealed that the sufficient saturation of МgСl2 allows its use as an environmentally-oriented base for comp...
Development of the laser-foundry process for manufacture of bimetals
<p>The new highly effective method for the production of bimetal sheets was proposed. According to a thin surface layer of the functional component of the bimetal moving at a certain speed on a certain area is melted by...