Serhii Voitenko, Volodymyr Druzhynin, Hanna Martyniuk, Tetiana Meleshko
{"title":"无人机作为无线网络信息安全威胁的来源","authors":"Serhii Voitenko, Volodymyr Druzhynin, Hanna Martyniuk, Tetiana Meleshko","doi":"10.47839/ijc.21.3.2695","DOIUrl":null,"url":null,"abstract":"This work deals with the identification of threats to wireless networks when considering an attacker from unmanned aerial vehicles. An analysis of heterogeneous networks built on 4 G technology, as objects of UAV attack, is performed. It is determined that the main problem of protecting wireless systems is the lack of protection of radio communication channels and the vulnerability of the base and subscriber station equipment. A model of the UAV as an intruder in the information security of wireless networks is built. The classification of various types of UAVs by targets and weapons of attack, methods of use and the ability to violate the criteria of protection of the information and telecommunication system is presented. A threat model that assesses the level of risks and losses in different types of attacks performed by different types of UAVs is built. It is expedient to use the received models as the basic ones when building a model of threats to a certain corporate network of the organization, developing ways and security means, estimating and controlling 4 G network protection against UAV.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":"12 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Unmanned Aerial Vehicles as a Source of Information Security Threats of Wireless Network\",\"authors\":\"Serhii Voitenko, Volodymyr Druzhynin, Hanna Martyniuk, Tetiana Meleshko\",\"doi\":\"10.47839/ijc.21.3.2695\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This work deals with the identification of threats to wireless networks when considering an attacker from unmanned aerial vehicles. An analysis of heterogeneous networks built on 4 G technology, as objects of UAV attack, is performed. It is determined that the main problem of protecting wireless systems is the lack of protection of radio communication channels and the vulnerability of the base and subscriber station equipment. A model of the UAV as an intruder in the information security of wireless networks is built. The classification of various types of UAVs by targets and weapons of attack, methods of use and the ability to violate the criteria of protection of the information and telecommunication system is presented. A threat model that assesses the level of risks and losses in different types of attacks performed by different types of UAVs is built. It is expedient to use the received models as the basic ones when building a model of threats to a certain corporate network of the organization, developing ways and security means, estimating and controlling 4 G network protection against UAV.\",\"PeriodicalId\":37669,\"journal\":{\"name\":\"International Journal of Computing\",\"volume\":\"12 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47839/ijc.21.3.2695\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47839/ijc.21.3.2695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
Unmanned Aerial Vehicles as a Source of Information Security Threats of Wireless Network
This work deals with the identification of threats to wireless networks when considering an attacker from unmanned aerial vehicles. An analysis of heterogeneous networks built on 4 G technology, as objects of UAV attack, is performed. It is determined that the main problem of protecting wireless systems is the lack of protection of radio communication channels and the vulnerability of the base and subscriber station equipment. A model of the UAV as an intruder in the information security of wireless networks is built. The classification of various types of UAVs by targets and weapons of attack, methods of use and the ability to violate the criteria of protection of the information and telecommunication system is presented. A threat model that assesses the level of risks and losses in different types of attacks performed by different types of UAVs is built. It is expedient to use the received models as the basic ones when building a model of threats to a certain corporate network of the organization, developing ways and security means, estimating and controlling 4 G network protection against UAV.
期刊介绍:
The International Journal of Computing Journal was established in 2002 on the base of Branch Research Laboratory for Automated Systems and Networks, since 2005 it’s renamed as Research Institute of Intelligent Computer Systems. A goal of the Journal is to publish papers with the novel results in Computing Science and Computer Engineering and Information Technologies and Software Engineering and Information Systems within the Journal topics. The official language of the Journal is English; also papers abstracts in both Ukrainian and Russian languages are published there. The issues of the Journal are published quarterly. The Editorial Board consists of about 30 recognized worldwide scientists.