SIMULATION AN UNRELIABLE WIRELESS SENSOR NETWORK MOT BY A HETEROGENEOUS QUEUING NETWORK
DOI:
https://doi.org/10.26906/SUNZ.2020.4.122Keywords:
wireless sensor network, unreliable mot, queuing network, reliability characteristics, information security threatsAbstract
The subject matter of the article is the operation of a wireless sensor network in an unfriendly environment. The goal of the study is the simulation of processes occurring in wireless sensor networks, a comprehensive description of their main modes of operation and the analysis of "bottlenecks" to improve the reliability of the network and minimize threats to its information security. The tasks to be solved are: based on the analysis of the technology for building a wireless sensor network and the functioning of its elements; to determine the reliability characteristics that have an impact on information security; to determine the structure of the Queuing network similar in structure to the wireless sensor network as an object of research; to determine the main characteristics of the sensor network mot as a Queuing network; to determine analytical dependencies for finding the characteristics of an unreliable wireless sensor network mot. General scientific and special methods of scientific knowledge are used. The obtained results allow us to understand and study the processes occurring in wireless queuing networks and to predict network operation in a hostile environment. The ability to estimate the number of packets lost gives you an understanding of the reliability of network mots. Conclusions. Wireless sensor networks can be defined as distributed communication systems. The reliability characteristics of their structural elements have an impact on information security. The wireless sensor network may be simulated by the queuing network. The main characteristics of the sensor network mot can be defined as the characteristics of the queuing network. These analytical dependencies allow you to determine the characteristics of the unreliable node needed to analyze the "bottlenecks", to improve the reliability of the network and minimize threats to the wireless sensor network information security
Downloads
References
Sergiyevskiy, M. “Wireless Sensor Networks”, [Online], available at: http://www.compress.ru/Article.aspx?id=17950.
Karl, H and Willig, A (2005). Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, Ltd., Hoboken, US.
Karabutov, A. “Sensor Networks”, [Online], available at: http://offline.computerra.ru/2004/553/35459/.
Xiang, L., (2013), “Design Of Household Control System Based On ZigBee, GSM and TCP/IP Protocol, 10th IEEE International Conference on Control and Automation (ICCA), pp. 1372-1375.
Кучук Н.Г., Гавриленко С.Ю., Лукова-Чуйко Н.В., Собчук В.В. Перерозподіл інформаційних потоків у гіперконвенгертній системі / С.Ю. Гавриленко. Сучасні інформаційні системи. 2019. Т.3, No2. С. 116-121. DOI: https://doi.org/10.20998/2522-9052.2019.2.20
Nechausov A., Mamusuĉ I., Kuchuk N. Synthesis of the air pollution level control system on the basis of hyperconvergent infrastructures. Сучасні інформаційні системи. 2017. Т. 1, No 2. С. 21-26. DOI: https://doi.org/10.20998/2522-9052.2017.2.04
Mozhaiev M., Kuchuk N., Usatenko M. (2019) The method of jitter determining in the telecommunication network of a computer system on a special software platform. Innovative technologies and scientific solutions for industries, 2019. Vol. 4 (10), pp. 134-140. doi: https://doi.org/10.30837/2522-9818.2019.10.134
Зиков І. С., Кучук Н. Г., Шматков С. І. Синтез архітектури комп'ютерної системи управління транзакціями e-learning. Сучасні інформаційні системи. 2018. Т. 2, No 3. С. 60–66. DOI: https://doi.org/10.20998/2522-9052.2018.3.10
Гахов Р.П. Моделирование трафика беспроводной сети передачи данных / Р. П. Гахов, Н. Г. Кучук// Научные ведомости БелГУ. – 2014. – No 1 (172). – Вып. 29(1). – С. 175-181.
Свиридов А. C., Коваленко А. А., Кучук Г. А. Метод перерозподілу пропускної здатності критичної ділянки мережі на основі удосконалення ON/OFF-моделі трафіку. Сучасні інформаційні системи. 2018. Т. 2, No 2. С. 139–144. DOI: https://doi.org/10.20998/2522-9052.2018.2.24
Кучук Н. Г. Метод зменшення часу доступу до слабкоструктурованих даних / Н. Г. Кучук, В. Ю. Мерлак, В. В. Скородєлов // Сучасні інформаційні системи = Advanced Information Systems. – 2020. – Т. 4, No 1. – С. 97-102. doi: https://doi.org/10.20998/2522-9052.2020.1.14
Korchenko, O. Alyeksander M., Nadzhi Abdu and Petrenko, O. (2016), “Analysis of threats and mechanisms for ensuring information security in sensor networks”, Zakhyst informatsiyi, Vol. 18, no1, pp. 48-56.
Stetsenko, I.V. (2010), Modelyuvannya system: navch. posib. [Systems Modeling: Tutorial. tool.],: CHDTU, Cherkasy, UA.
Tananko, I. Ye. and Dolgov, V. I. (2018), Fundamentals of system modeling: textbook. allowance, Nauka, Saratov, RU.
Lozhkovsʹkyy, A.H. (2010), Teoriya masovoho obsluhovuvannya v telekomunikatsiyakh [Queuing theory in telecommunications], Odesʹka natsionalʹna akademiya zvʺyazku, Odesa, UA.