Elena Basan
Southern Federal University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Elena Basan.
security of information and networks | 2013
Evgeny Sergeevich Abramov; Elena Basan; Oleg B. Makarevich
In this paper we consider a clustering wireless sensor network which needs to be protected. The main aim of this article is development of a secure clustering wireless sensor network model with built-in detection and counteraction mechanisms against malicious impacts (attacks). Trust level calculation algorithm and cluster head (CH) election algorithm are introduced and secure clustering WSN model is described.
security of information and networks | 2017
Alexander S. Basan; Elena Basan; Oleg B. Makarevich
The aim of this paper is to analyze the ways of providing security for mobile robots groups control (MRGC) and to develop a security protocol for MRGC under limited computational and power resources away from the controlled area. The solution for this problem assumes features of group control systems and robot systems from the security point of view. The main problem connected with the development of a security system for mobile robots is the distinction of this type of the network from other networks. This demands the development of special methods and approaches that should take many specific factors such as limitations of computational resources and power into account. The proposed solution for MRGC is based on the use of trust concept for finding the validity of nodes and finding targets. In contrast to the existing approaches, this protocol uses several parameters to evaluate the trust that allows to expand the range of repelled attacks.
security of information and networks | 2015
Evgeny Sergeevich Abramov; Elena Basan; Oleg B. Makarevich
In this paper we consider a clustering wireless sensor network which needs to be protected. The main aim of this article is development of a secure clustering wireless sensor network model with built-in detection and counteraction mechanisms against malicious impacts (attacks). We develop trust management system (TMS), based on analyzing following parameters: residual energy level, send/received/forwarding data, control, routing packets, packets integrity, availability based on beacons, changing the address of the packet. System is efficient in preventing attacks and consumes less energy than analogs.
security of information and networks | 2018
Elena Basan; Oleg B. Makarevich; Alexandr S. Basan
This article studied the attacks that can be implemented in a network of mobile robots. The peculiarity of these attacks is that they, as a rule, use the vulnerabilities of wireless data transmission and the weakness of network protocols. The study was carried out using a simulation model of a group of mobile robots. It was modeled following attacks: denial of service, Black-Hole, Gray-Hole. In this case, it was analyzed the impact of the attacks on the energy consumption and the impact on network traffic. It was assessed the complexity of the implementation of various types of attacks. This analysis should make it clear with what intensity the attack should be conducted in order to damage the network. Also in this study, a method is proposed for calculating the trust of network nodes and the entire network as a whole based on the number of discarded packets.
security of information and networks | 2018
Maxim Pismensky; Elena Basan; Oleg B. Makarevich
The article deals with the application of FSTEC № 31 dated March 14, 2014 to the system consisting of mobile unmanned mobile robots and the operators workplace. The article compares with other standards in the field of information security. After that, the system of mobile robots is classified and the choice of measures for the protection of information takes place. The implementation of these measures and the analysis of this implementation are shown below. At the end, a conclusion was drawn on the application of FSTEC № 31 to such systems.
security of information and networks | 2018
Elena Basan; Oleg B. Makarevich; Andrew Stepenkin
Robotics1 is an actively developed technology, and groups of mobile robots have enormous potential for performing various tasks. To efficiently distribute and execution of tasks, it is necessary to use an appropriate cooperative control system (CCS). CCS can be used in an uncontrolled environment, where external impact is possible. From what follows the problem of determining the security of the CCS from external influences. The goal of the work is to develop a security assessment methodology for CCS. This goal of work involve the following objectives: the analysis of the wireless channel and possible attacks on it, the experimental study of these attacks, the development of a methodology based on results
cyber enabled distributed computing and knowledge discovery | 2017
Alexander S. Basan; Elena Basan; Oleg B. Makarevich
security of information and networks | 2016
Alexandr S. Basan; Elena Basan; Oleg B. Makarevich
cyber enabled distributed computing and knowledge discovery | 2016
Alexander S. Basan; Elena Basan; Oleg B. Makarevich
Voprosy kiberbezopasnosti | 2017
Alexander S. Basan; Elena Basan; Oleg B. Makarevich