Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2020

01-12-2020

Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach

Authors: D. S. Lavrova, R. S. Solovei

Published in: Automatic Control and Computer Sciences | Issue 8/2020

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The concept of applying the game-theoretic approach in wireless dynamic network infrastructure to counteract cyber-attacks is presented. This approach can enable an adaptive reconfiguration of the network structure as various types of cyber-attacks occur and ensure continuous network functioning even in the case of destructive information impacts.
Literature
1.
go back to reference Vasiliev, Y.S., Zegzhda, P.D., and Kuvshinov, V.I., Modern problems of cybersecurity, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2014, vol. 17, no. 3, pp. 210–214. Vasiliev, Y.S., Zegzhda, P.D., and Kuvshinov, V.I., Modern problems of cybersecurity, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2014, vol. 17, no. 3, pp. 210–214.
2.
go back to reference Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., and Suprun, A.F., The problem of innovative development of information security systems in the transport sector, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1105–1110.CrossRef Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., and Suprun, A.F., The problem of innovative development of information security systems in the transport sector, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1105–1110.CrossRef
3.
go back to reference Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V., Network security architectures for VANET, ACM International Conference Proceeding Series, 2017, pp. 73–79. Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V., Network security architectures for VANET, ACM International Conference Proceeding Series, 2017, pp. 73–79.
4.
go back to reference Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.CrossRef Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.CrossRef
5.
go back to reference Kalinin, M., Zegzhda, P., Zegzhda, D., Vasiliev, Y., and Belenko, V., Software defined security for vehicular ad hoc networks, 2016 International Conference on Information and Communication Technology Convergence, ICTC, 2016, pp. 533–537. Kalinin, M., Zegzhda, P., Zegzhda, D., Vasiliev, Y., and Belenko, V., Software defined security for vehicular ad hoc networks, 2016 International Conference on Information and Communication Technology Convergence, ICTC, 2016, pp. 533–537.
6.
go back to reference Kalinin, M.O., Krundyshev, V.M., Rezedinova, E.Y., and Reshetov, D.V., Hierarchical software-defined security management for large-scale dynamic networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 906–911.CrossRef Kalinin, M.O., Krundyshev, V.M., Rezedinova, E.Y., and Reshetov, D.V., Hierarchical software-defined security management for large-scale dynamic networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 906–911.CrossRef
7.
go back to reference Kalinin, M.O. and Minin, A.A., Security evaluation of a wireless ad-hoc network with dynamic topology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 899–901.CrossRef Kalinin, M.O. and Minin, A.A., Security evaluation of a wireless ad-hoc network with dynamic topology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 899–901.CrossRef
8.
go back to reference Zegzhda, P.D., Ivanov, D.V., Moskvin, D.A., and Kubrin, G.S., Actual security threats for vehicular and mobile ad hoc networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 993–999.CrossRef Zegzhda, P.D., Ivanov, D.V., Moskvin, D.A., and Kubrin, G.S., Actual security threats for vehicular and mobile ad hoc networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 993–999.CrossRef
9.
go back to reference Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337–344.CrossRef Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337–344.CrossRef
10.
go back to reference Kalinin, M.O., Permanent protection of information systems with method of automated security and integrity control, SIN'10: Proceedings of the 3rd International Conference of Security of Information and Networks, 2010, pp. 118–123. https://doi.org/10.1145/1854099.1854125 Kalinin, M.O., Permanent protection of information systems with method of automated security and integrity control, SIN'10: Proceedings of the 3rd International Conference of Security of Information and Networks, 2010, pp. 118–123. https://​doi.​org/​10.​1145/​1854099.​1854125
12.
go back to reference Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, 2018 IEEE Industrial Cyber-Physical Systems, ICPS, 2018, pp. 830–834. Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, 2018 IEEE Industrial Cyber-Physical Systems, ICPS, 2018, pp. 830–834.
13.
go back to reference Zegzhda, D.P. and Pavlenko, E.Y., Digital manufacturing security indicators, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1150–1159.CrossRef Zegzhda, D.P. and Pavlenko, E.Y., Digital manufacturing security indicators, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1150–1159.CrossRef
14.
go back to reference Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665–672.CrossRef Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665–672.CrossRef
15.
go back to reference Zegzhda, D.P. and Pavlenko, E.Y., Cyber-sustainability of software-defined networks based on situational management, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 984–992.CrossRef Zegzhda, D.P. and Pavlenko, E.Y., Cyber-sustainability of software-defined networks based on situational management, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 984–992.CrossRef
16.
go back to reference Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60–64. Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60–64.
19.
go back to reference Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.CrossRef Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.CrossRef
20.
go back to reference Kalinin, M., Demidov, R., and Zegzhda, P., Hybrid neural network model for protection of dynamic cyber infrastructure, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 375–382. Kalinin, M., Demidov, R., and Zegzhda, P., Hybrid neural network model for protection of dynamic cyber infrastructure, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 375–382.
22.
go back to reference Burns, T., Roszkowska, E., Corte, U., and Machado des Johansson, N., Sociological game theory: Agency, social structures and interaction processes, Optimum, Stud. Ekon., 2017, pp. 187–199. Burns, T., Roszkowska, E., Corte, U., and Machado des Johansson, N., Sociological game theory: Agency, social structures and interaction processes, Optimum, Stud. Ekon., 2017, pp. 187–199.
23.
go back to reference Mas-Collel, A., Whinston, M.D., and Green, J.R., Microeconomic Theory, New York: Oxford Univ. Press, 1997.MATH Mas-Collel, A., Whinston, M.D., and Green, J.R., Microeconomic Theory, New York: Oxford Univ. Press, 1997.MATH
24.
go back to reference Ashkenazi, V.O., Primenenie teorii igr v voennom dele (Application of Game Theory in Military Affairs), Moscow: Sov. Radio, 1961. Ashkenazi, V.O., Primenenie teorii igr v voennom dele (Application of Game Theory in Military Affairs), Moscow: Sov. Radio, 1961.
25.
go back to reference Teoriya igr v upravlenii organizatsionnymi sistemami (Game Theory in Management of Organizational Systems), Gubko, M.V. and Novikov, D.A., Eds., Moscow: Sinteg, 2002. Teoriya igr v upravlenii organizatsionnymi sistemami (Game Theory in Management of Organizational Systems), Gubko, M.V. and Novikov, D.A., Eds., Moscow: Sinteg, 2002.
26.
go back to reference Roberts, F.S., Discrete Mathematical Models, with Applications to Social, Biological, and Environmental Problems, Prentice-Hall, 1976.MATH Roberts, F.S., Discrete Mathematical Models, with Applications to Social, Biological, and Environmental Problems, Prentice-Hall, 1976.MATH
29.
go back to reference Giocoli, N., Nash equilibrium, History Polit. Econ., 2004, vol. 36, no. 4. Giocoli, N., Nash equilibrium, History Polit. Econ., 2004, vol. 36, no. 4.
30.
go back to reference Myerson, R.B., Game Theory: Analysis of Conflict, London: Harvard Univ. Press, 1991.MATH Myerson, R.B., Game Theory: Analysis of Conflict, London: Harvard Univ. Press, 1991.MATH
31.
32.
go back to reference Kalinin, M.O., Krundyshev, V.M., Rezedinova, E.Y., and Reshetov, D.V., Hierarchical software-defined security management for large-scale dynamic networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 906–911.CrossRef Kalinin, M.O., Krundyshev, V.M., Rezedinova, E.Y., and Reshetov, D.V., Hierarchical software-defined security management for large-scale dynamic networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 906–911.CrossRef
33.
go back to reference Kalinin, M.O. and Pavlenko, E.Y., Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 673–678.CrossRef Kalinin, M.O. and Pavlenko, E.Y., Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 673–678.CrossRef
34.
go back to reference Kalinin, M.O., Krundyshev, V.M., and Semianov, P.V., Architectures for building secure vehicular networks based on SDN technology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 907–914.CrossRef Kalinin, M.O., Krundyshev, V.M., and Semianov, P.V., Architectures for building secure vehicular networks based on SDN technology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 907–914.CrossRef
35.
go back to reference Mekhanizmy funktsionirovaniya organizatsionnykh sistem (Mechanisms of Functioning of Organizational Systems), Burkov, V.N. and Kondrat’ev, V.V., Eds., Moscow: Nauka, 1981. Mekhanizmy funktsionirovaniya organizatsionnykh sistem (Mechanisms of Functioning of Organizational Systems), Burkov, V.N. and Kondrat’ev, V.V., Eds., Moscow: Nauka, 1981.
36.
go back to reference Currarini, S. and Morelli, M., Network formation with sequential demands, Rev. Econ. Des., 2000, vol. 5, pp. 229–250. Currarini, S. and Morelli, M., Network formation with sequential demands, Rev. Econ. Des., 2000, vol. 5, pp. 229–250.
37.
go back to reference Germeier, Yu.B., Igry s neprotivopolozhnymi interesami (Non-Antagonistic Games), Moscow: Nauka, 1976. Germeier, Yu.B., Igry s neprotivopolozhnymi interesami (Non-Antagonistic Games), Moscow: Nauka, 1976.
Metadata
Title
Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach
Authors
D. S. Lavrova
R. S. Solovei
Publication date
01-12-2020
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2020
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411620080210

Other articles of this Issue 8/2020

Automatic Control and Computer Sciences 8/2020 Go to the issue