| Title |
Cellular Technology Based Overlay Networks For The Secure Control Of Intelligent Mobile Objects: Models And Numerical Study |
| ID_Doc |
13536 |
| Authors |
Tkachov V.; Kovalenko A.; Kharchenko V.; Hunko M.; Hvozdetska K. |
| Year |
2022 |
| Published |
Communications in Computer and Information Science, 1698 CCIS |
| DOI |
http://dx.doi.org/10.1007/978-3-031-20834-8_3 |
| Abstract |
The chapter is devoted to the actual scientific and technical problem of implementation the secure remote control of overlay networks, presented in the form of intelligent mobile objects. The specificity of this class of networks is the use of existing cellular communication networks as a data transmission medium. The security of data transfer processes between the nodes of the overlay network is ensured by using the technology of private virtual networks. The chapter also shows options for using their modifications: with route regeneration for high-mobility networks and technology for nesting tunnels in low-mobility networks. Therefore, additional tasks were solved related to the choice of the trajectory of the nodes behavior in autonomous operation, ensuring a given level of survivability and reliability of the overlay network in terms of routing dynamics. The chapter shows the results of modeling various network attacks aimed at intercepting and replacing traffic in the chain “intelligent mobile object - control node”. A mathematical model is proposed for regenerating data transmission routes in a network from the point of view of Markov and semi-Markov processes. Examples of solving the problem of finding a quasi-optimal solution under conditions of lack of time for the regeneration of data transmission routes are given using the Wald scheme as an example. The obtained numerical studies of the proposed models prove the efficiency of the proposed approaches. Using the proposed approaches, it is possible to create full-fledged network segments within the global urban networks that provide the concept of “smart city”. Numerical studies have shown that data transmission with a sufficient degree of reliability is achieved while maintaining losses in the range from 7% to 45%. Otherwise, IMOs operate offline. The proposed models can be used in the development of methods for reengineering of existed and creating of modern resilient networks for IMO based on idea of proactive dynamical reconfiguration and real-time evolution considering changing requirements and environment parameters. © 2022, Springer Nature Switzerland AG. |
| Author Keywords |
Intelligent mobile object; Network security; Overlay networks; Virtual private networks |