+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Authors

Osipov D.

Degree
PhD in Technique, FSAEI HPE North-Caucasus Federal University
E-mail
dmtrosipov@yandex.ru
Location
Stavropol
Articles

Assessment the security of wireless alarm from unauthorized access based on the concepts of fuzzy logic

Nowadays, the world has witnessed a significant increase in the number of stolen vehicles. One of the main reasons for the high number of thefts is the use of wireless alarm systems. One of the vulnerabilities of wireless signaling is between the mobile radio remotes control and alarm stationary control unit that carries control commands that may be intercepted, viewed or tampered with. Currently, there are many ways of ensuring information security of the radio channel. However, there are no methods for assessing signaling radio bearer security from unauthorized access. The purpose of this paper is to provide a method of quantitative and qualitative evaluation of security radio signals from unauthorized access. The analysis showed that at present there are no perfect valuation techniques protected from unauthorized access. In addition to the drawbacks of each method individually, many of them have a common negative feature is the fact, not security assessment is comprehensive and focused on one or more threats to information security. The authors proposed a method of quantitative and qualitative evaluation of security against unauthorized wireless access, including automotive, signaling, based on the concepts of fuzzy logic. To substantiate the results obtained evaluated radio alarm security against unauthorized access three different wireless car alarms that have different methods of protection against threats such as browsing, interception and substitution. The proposed method of quantitative and qualitative evaluation of security radio signal from unauthorized access different: a comprehensive assessment of security wireless alarm radio from unauthorized access, simple math, simple software implementation and adequate representation of the probability of different types of wireless alarm counter threats to information security in the radio channel.
Read more...

Comparative analysis of methods of assessing the protection of wireless fire alarm systems

A comparative analysis of methods for assessing the security of wireless fire alarm systems based on the analysis of numerical samples representing the assessment of security, using the apparatus of mathematical statistics. Using a variety of nonparametric tests (criterion of signs, the Wilcoxon test) in the program Statistica the average and confidence intervals of sample means (graphic diagram «box and whiskers») that are close enough to each other. The average and confidence intervals that show the security assessment based on fuzzy logic, is slightly higher than the average and confidence intervals that show the security assessment based on the matrix of fuzzy rules. This is interpreted as a higher quantitative evaluation of security based on fuzzy logic in comparison with a quantitative evaluation of security based on the matrix of fuzzy rules and, consequently, more accurate identification protection. Also the proposed approach the comparative analysis of quantitative indicators potentially can be extended to a wider class of problems of information security, such as comparative analysis of various «related» methods of assessment.
Read more...