Notice: Undefined offset: 0 in C:\WebServers\home\\www\nb_specific\ on line 118
Eng During last 365 days Approved articles: 1963,   Articles in work: 321 Declined articles: 630 

Yur'eva R.A., Komarov I.I., Dorodnikov N.A. Designing the information interloper model for the multi-agent decentralized control robotic system

Published in journal "Software systems and computational methods", 2016-1 in rubric "Data encryption and data protection", pages 42-48.

Resume: The primary objective of the interloper is to keep a swarm of robots from performing their functions by any means including their destruction. The primary goal of the information security system is to provide the proper security level for the swarm of robots against any natural or artificial hindrances for it is necessary to take into account not only the information safety but also physical security of actors. For the physical security of a wide range of facilities (the authors offer to call them 'facilities under potential interloper's influence or FPIP) it is very important to prepare the list of potential threats, especially design threats. The list would allow to design a necessary system for the physical protection of a particular facility and to evaluate its efficiency. The composite element of the design threat is the interloper modeling and therefore development of such a model is a high priority. According to the guidline documents, the interloper model should be based on both the featurs of the facility and performed technological operations (stable factors) and variable factors, i.e. social conditions of the territory where the facility is located, social relations, psychological traits of a particular group of workers and/or individuals as well as the global, country's, regional environment, etc. Therefore, the model should take into account all kinds of factors that are related to various aspects of the reality and often divorced from one another. The authors of the present article analyze the offered interloper models from different points of view. Nevertheless, these models are interconnected, so examination of these connections is one of the goals of the vulnarability analysis. In case the obtained characteristics of the operational interloper model are below the desired characteristics of the design interloper model (for example, the number of interloper agents that can be potentially involved in the destructive activity is lower than the number of interlopers which activities are to be prevented by the designed Information Security System according to the design project prescribed for the facility, i.e. Z>), then the decision about sufficient facility hardness can be made meaning there is no need to perform unscheduled actions (facility vulnarability analysis with ISS performance evaluation, improvement of ISS, changes in the task execution technology, etc.).

Keywords: information security, multi-agent robotic system, decentralized control, interloper model, modeling, robotic system, destructive influence, swarm robotechnics, disorganized behavior, protective measures

DOI: 10.7256/2305-6061.2016.1.17946

This article can be downloaded freely in PDF format for reading. Download article

Iñaki Navarro and Fernando Matía An Introduction to Swarm Robotics.ETSI Industriales, Universidad Politécnica de Madrid, c/José Gutiérrez Abascal, 2, 28006 Madrid, SpainReceived 18 April 2012; Accepted 19 June 20127 F. Higgins, A. Tomlinson, and K.M. Martin, Survey on security challenges for swarm robotics, in Proceedings of the 5th International Conference on Autonomic and Autonomous Systems (ICAS '09), p. 307312, IEEE Computer Society, Los Alamitos, CA, USA, April 2009.
Zikratov I.A., Kozlova E.V., Zikratova T.V. Analiz uyazvimostey robototekhnicheskikh kompleksov s roevym intellektom // Nauchno-tekhnicheskiy vestnik informatsionnykh tekhnologiy, mekhaniki i optiki. 5(87), NIU ITMO, SPb., 2013. S. 149-154.
Karpov V.E. Upravlenie v staticheskikh royakh. Postanovka zadachi // Integrirovannye modeli i myagkie vychisleniya v iskusstvennom intellekte Sb. nauchnykh trudov VII y Mezhdunarodnoy nauchno-prakticheskoy konferentsii (Kolomna, 2022 maya 2013). S. 12.
Arustamov S.A., Genin M.G. Derev'ya ushcherbov kak model' otsenki riskov poter' dostupnosti posle provedeniya izmeneniy v finansovykh informatsionnykh sistemakh // Nauchno-tekhnicheskiy vestnik informatsionnykh tekhnologiy, mekhaniki i optiki. 2(84), NIU ITMO. SPb., 2013. S. 129-135.
Arustamov S.A., Dorodnikov N.A., Dorodnikova I.M Problemy ekspluatatsii korporativnykh setey, vyyavlenie ikh prichin // Nauchnye trudy sworld. 2013. 4, "Nauchnyy mir", Ivanovo. T. 12. S. 62-66.
Zikratov I.A., Odegov S.V., Smirnykh A.V. Otsenka riskov informatsionnoy bezopasnosti v oblachnykh servisakh na osnove lineynogo programmirovaniya // Nauchno-tekhnicheskiy vestnik informatsionnykh tekhnologiy, mekhaniki i optiki -2013. 1(83). S. 141-144.

Correct link to this article:
just copy this link to clipboard