+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

articles

Authors: Gavrishev A., Burmistrov V., Osipov D.     Published in № 4(58) 28 august 2015 year
Rubric: Information security

Assessment the security of wireless alarm from unauthorized access based on the concepts of fuzzy logic

Nowadays, the world has witnessed a significant increase in the number of stolen vehicles. One of the main reasons for the high number of thefts is the use of wireless alarm systems. One of the vulnerabilities of wireless signaling is between the mobile radio remotes control and alarm stationary control unit that carries control commands that may be intercepted, viewed or tampered with. Currently, there are many ways of ensuring information security of the radio channel. However, there are no methods for assessing signaling radio bearer security from unauthorized access. The purpose of this paper is to provide a method of quantitative and qualitative evaluation of security radio signals from unauthorized access. The analysis showed that at present there are no perfect valuation techniques protected from unauthorized access. In addition to the drawbacks of each method individually, many of them have a common negative feature is the fact, not security assessment is comprehensive and focused on one or more threats to information security. The authors proposed a method of quantitative and qualitative evaluation of security against unauthorized wireless access, including automotive, signaling, based on the concepts of fuzzy logic. To substantiate the results obtained evaluated radio alarm security against unauthorized access three different wireless car alarms that have different methods of protection against threats such as browsing, interception and substitution. The proposed method of quantitative and qualitative evaluation of security radio signal from unauthorized access different: a comprehensive assessment of security wireless alarm radio from unauthorized access, simple math, simple software implementation and adequate representation of the probability of different types of wireless alarm counter threats to information security in the radio channel.

Key words

alarm, radio, unauthorized access, security assessment, fuzzy logic

The author:

Gavrishev A.

Degree:

Senior Lecturer, North-Caucasus Federal University

Location:

Stavropol

The author:

Burmistrov V.

Degree:

Postgraduate, FSAEI HPE North-Caucasus Federal University

Location:

Stavropol

The author:

Osipov D.

Degree:

PhD in Technique, FSAEI HPE North-Caucasus Federal University

Location:

Stavropol