无人机作为无线网络信息安全威胁的来源

Q3 Computer Science International Journal of Computing Pub Date : 2022-09-30 DOI:10.47839/ijc.21.3.2695
Serhii Voitenko, Volodymyr Druzhynin, Hanna Martyniuk, Tetiana Meleshko
{"title":"无人机作为无线网络信息安全威胁的来源","authors":"Serhii Voitenko, Volodymyr Druzhynin, Hanna Martyniuk, Tetiana Meleshko","doi":"10.47839/ijc.21.3.2695","DOIUrl":null,"url":null,"abstract":"This work deals with the identification of threats to wireless networks when considering an attacker from unmanned aerial vehicles. An analysis of heterogeneous networks built on 4 G technology, as objects of UAV attack, is performed. It is determined that the main problem of protecting wireless systems is the lack of protection of radio communication channels and the vulnerability of the base and subscriber station equipment. A model of the UAV as an intruder in the information security of wireless networks is built. The classification of various types of UAVs by targets and weapons of attack, methods of use and the ability to violate the criteria of protection of the information and telecommunication system is presented. A threat model that assesses the level of risks and losses in different types of attacks performed by different types of UAVs is built. It is expedient to use the received models as the basic ones when building a model of threats to a certain corporate network of the organization, developing ways and security means, estimating and controlling 4 G network protection against UAV.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Unmanned Aerial Vehicles as a Source of Information Security Threats of Wireless Network\",\"authors\":\"Serhii Voitenko, Volodymyr Druzhynin, Hanna Martyniuk, Tetiana Meleshko\",\"doi\":\"10.47839/ijc.21.3.2695\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This work deals with the identification of threats to wireless networks when considering an attacker from unmanned aerial vehicles. An analysis of heterogeneous networks built on 4 G technology, as objects of UAV attack, is performed. It is determined that the main problem of protecting wireless systems is the lack of protection of radio communication channels and the vulnerability of the base and subscriber station equipment. A model of the UAV as an intruder in the information security of wireless networks is built. The classification of various types of UAVs by targets and weapons of attack, methods of use and the ability to violate the criteria of protection of the information and telecommunication system is presented. A threat model that assesses the level of risks and losses in different types of attacks performed by different types of UAVs is built. It is expedient to use the received models as the basic ones when building a model of threats to a certain corporate network of the organization, developing ways and security means, estimating and controlling 4 G network protection against UAV.\",\"PeriodicalId\":37669,\"journal\":{\"name\":\"International Journal of Computing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47839/ijc.21.3.2695\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47839/ijc.21.3.2695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 1

摘要

这项工作涉及在考虑来自无人机的攻击者时对无线网络的威胁识别。对基于4g技术的异构网络作为无人机攻击对象进行了分析。确定了无线系统保护的主要问题是对无线电通信信道的保护不足以及基站和用户站设备的脆弱性。建立了无人机在无线网络信息安全中的入侵模型。根据攻击目标和武器、使用方法以及违反信息和电信系统保护标准的能力,对各类无人机进行了分类。建立了一个威胁模型,评估不同类型无人机在不同类型攻击中的风险和损失水平。在建立组织某企业网络的威胁模型、制定方式和安全手段、估算和控制4g网络对无人机的防护时,将接收到的模型作为基础模型是方便的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Unmanned Aerial Vehicles as a Source of Information Security Threats of Wireless Network
This work deals with the identification of threats to wireless networks when considering an attacker from unmanned aerial vehicles. An analysis of heterogeneous networks built on 4 G technology, as objects of UAV attack, is performed. It is determined that the main problem of protecting wireless systems is the lack of protection of radio communication channels and the vulnerability of the base and subscriber station equipment. A model of the UAV as an intruder in the information security of wireless networks is built. The classification of various types of UAVs by targets and weapons of attack, methods of use and the ability to violate the criteria of protection of the information and telecommunication system is presented. A threat model that assesses the level of risks and losses in different types of attacks performed by different types of UAVs is built. It is expedient to use the received models as the basic ones when building a model of threats to a certain corporate network of the organization, developing ways and security means, estimating and controlling 4 G network protection against UAV.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Computing
International Journal of Computing Computer Science-Computer Science (miscellaneous)
CiteScore
2.20
自引率
0.00%
发文量
39
期刊介绍: The International Journal of Computing Journal was established in 2002 on the base of Branch Research Laboratory for Automated Systems and Networks, since 2005 it’s renamed as Research Institute of Intelligent Computer Systems. A goal of the Journal is to publish papers with the novel results in Computing Science and Computer Engineering and Information Technologies and Software Engineering and Information Systems within the Journal topics. The official language of the Journal is English; also papers abstracts in both Ukrainian and Russian languages are published there. The issues of the Journal are published quarterly. The Editorial Board consists of about 30 recognized worldwide scientists.
期刊最新文献
Website Quality Measurement of Educational Government Agency in Indonesia using Modified WebQual 4.0 A Comparative Study of Data Annotations and Fluent Validation in .NET Attr4Vis: Revisiting Importance of Attribute Classification in Vision-Language Models for Video Recognition The Improved Method for Identifying Parameters of Interval Nonlinear Models of Static Systems Image Transmission in WMSN Based on Residue Number System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1