Information Security of IoT Wireless Segment
Created by W.Langdon from
gp-bibliography.bib Revision:1.8194
- @InProceedings{Parotkin:2018:GloSIC,
-
author = "Nikolay Y. Parotkin and Vyacheslav V. Zolotarev",
-
booktitle = "2018 Global Smart Industry Conference (GloSIC)",
-
title = "Information Security of {IoT} Wireless Segment",
-
year = "2018",
-
abstract = "The most probable threats for the Internet of Things
(IoT) wireless connection channel according to the
classification of the Federal agency of technical and
export control and Department of Homeland security were
considered in the article. The analysis of standard
means of IEEE 802.11 networks protection implementation
in the IoT infrastructure was conducted. The
description of the adopted approaches to protection,
based on the open source software, was made. The task
solution of optimal wireless network coverage zone
planning together with signal power maximization on the
IoT devices of legitimate access points by automated
means, which will reduce the probability of its switch
to non-authorized points in case of a re-authentication
attack was considered in the frames of the first
approach. A described software solves the task of
multi-criteria optimization of a wireless network
model, based on the user's source data, which reflect
the place of network exploitation place with the help
of the modified genetic programming algorithm. The
results of the theoretical calculation and practical
measurement of signal levels as well as the evaluation
of the calculations' accordance were presented. The
second approach, considered in the article, is the
system of wireless segment monitoring on the
single-board computer basis. It enables one to detect
suspicious frames in radio air and dangerous access
points according to the white list. The described
System can localize and counteract the intruder's
access point depending on response parameters and
inform the holder about the fact and details of an
incident. The advantage of the measures' complex,
described in the article, is the ability of optimal
installation of such a monitoring device with the
coverage of all protected IoT performance zone, based
on the network coverage map with the vulnerable points
on the area.",
-
keywords = "genetic algorithms, genetic programming",
-
DOI = "doi:10.1109/GloSIC.2018.8570144",
-
month = nov,
-
notes = "Also known as \cite{8570144}",
- }
Genetic Programming entries for
Nikolay Y Parotkin
Vyacheslav V Zolotarev
Citations