Treffer: Development of Information Security in the «Internet of Things».

Title:
Development of Information Security in the «Internet of Things».
Source:
AIP Conference Proceedings; 2019, Vol. 2188 Issue 1, p050022-1-050022-11, 11p
Database:
Complementary Index

Weitere Informationen

The Internet of Things, or IoT, refers to billions of physical devices around the world that are connected to the Internet for data collection and sharing. With cheap processors and wireless networks, it is possible that everything will be part of the IoT - from the tablet to the plane. This adds artificial intelligence to devices, allowing them to communicate without human intervention and combining the digital and physical worlds. The problem of constructing mechanisms for protecting multi-agent robotic systems from attacks by embedded intruder robots is considered. A class of so-called “soft” attacks using message interception, generation and transmission of misinformation to a team of robots, as well as carrying out other actions that do not have identifiable signs of the invasion of intruder robots, is considered. A theoretical security model for multi-agent robotic systems is proposed, which is based on the zonal security model and the police station model for distributed computing systems. The main idea underlying the proposed subject-object model of access control is that in addition to the entities of the subject and object, a logically independent entity - the police station - is introduced into the information system; this entity, in accordance with the concept of the appeal security monitor, has the function of checking legitimacy access and/or integrity of transactions spatially distributed within the region of subjects and objects. Thus, it is proposed to design an initially homogeneous multi-agent system as a heterogeneous one, in which, in addition to executing agents, there are agents designed exclusively for solving security tasks: identification and authentication, access control, key generation and distribution, and agents’ location analysis. In order to solve the last task, the region is divided into several zones, for which zonal and interzonal security procedures are introduced. The model efficiency is illustrated by an example of its use when constructing the protection mechanism of the classical iterative task of distributing the robots’ force assignment for several purposes. At that, the order of interaction of agents with the police stations of their zone and the implementation of the interzonal security policy are shown. [ABSTRACT FROM AUTHOR]

Copyright of AIP Conference Proceedings is the property of American Institute of Physics and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)