Library
|
Your profile |
Software systems and computational methods
Reference:
Yur'eva R.A., Komarov I.I., Dorodnikov N.A.
Designing the information interloper model for the multi-agent decentralized control robotic system
// Software systems and computational methods.
2016. ¹ 1.
P. 42-48.
URL: https://en.nbpublish.com/library_read_article.php?id=67596
Yur'eva R.A., Komarov I.I., Dorodnikov N.A. Designing the information interloper model for the multi-agent decentralized control robotic systemAbstract: The primary objective of the interloper is to keep a swarm of robots from performing their functions by any means including their destruction. The primary goal of the information security system is to provide the proper security level for the swarm of robots against any natural or artificial hindrances for it is necessary to take into account not only the information safety but also physical security of actors. For the physical security of a wide range of facilities (the authors offer to call them 'facilities under potential interloper's influence or FPIP) it is very important to prepare the list of potential threats, especially design threats. The list would allow to design a necessary system for the physical protection of a particular facility and to evaluate its efficiency. The composite element of the design threat is the interloper modeling and therefore development of such a model is a high priority. According to the guidline documents, the interloper model should be based on both the featurs of the facility and performed technological operations (stable factors) and variable factors, i.e. social conditions of the territory where the facility is located, social relations, psychological traits of a particular group of workers and/or individuals as well as the global, country's, regional environment, etc. Therefore, the model should take into account all kinds of factors that are related to various aspects of the reality and often divorced from one another. The authors of the present article analyze the offered interloper models from different points of view. Nevertheless, these models are interconnected, so examination of these connections is one of the goals of the vulnarability analysis. In case the obtained characteristics of the operational interloper model are below the desired characteristics of the design interloper model (for example, the number of interloper agents that can be potentially involved in the destructive activity is lower than the number of interlopers which activities are to be prevented by the designed Information Security System according to the design project prescribed for the facility, i.e. Z>Ó), then the decision about sufficient facility hardness can be made meaning there is no need to perform unscheduled actions (facility vulnarability analysis with ISS performance evaluation, improvement of ISS, changes in the task execution technology, etc.). Keywords: information security, multi-agent robotic system, decentralized control, interloper model, modeling, robotic system, destructive influence, swarm robotechnics, disorganized behavior, protective measures
This article can be downloaded freely in PDF format for reading. Download article
References
1. Iñaki Navarro and Fernando Matía An Introduction to Swarm Robotics.ETSI Industriales, Universidad Politécnica de Madrid, c/José Gutiérrez Abascal, 2, 28006 Madrid, SpainReceived 18 April 2012; Accepted 19 June 20127 F. Higgins, A. Tomlinson, and K.M. Martin, “Survey on security challenges for swarm robotics,” in Proceedings of the 5th International Conference on Autonomic and Autonomous Systems (ICAS '09), p. 307–312, IEEE Computer Society, Los Alamitos, CA, USA, April 2009.
2. Zikratov I.A., Kozlova E.V., Zikratova T.V. Analiz uyazvimostei robototekhnicheskikh kompleksov s roevym intellektom // «Nauchno-tekhnicheskii vestnik informatsionnykh tekhnologii, mekhaniki i optiki». ¹ 5(87), NIU ITMO, SPb., 2013. S. 149-154. 3. Karpov V.E. Upravlenie v staticheskikh royakh. Postanovka zadachi // «Integrirovannye modeli i myagkie vychisleniya v iskusstvennom intellekte» Sb. nauchnykh trudov VII –i Mezhdunarodnoi nauchno-prakticheskoi konferentsii (Kolomna, 20–22 maya 2013). S. 12. 4. Arustamov S.A., Genin M.G. Derev'ya ushcherbov kak model' otsenki riskov poter' dostupnosti posle provedeniya izmenenii v finansovykh informatsionnykh sistemakh // «Nauchno-tekhnicheskii vestnik informatsionnykh tekhnologii, mekhaniki i optiki». ¹ 2(84), NIU ITMO. SPb., 2013. S. 129-135. 5. Arustamov S.A., Dorodnikov N.A., Dorodnikova I.M Problemy ekspluatatsii korporativnykh setei, vyyavlenie ikh prichin // «Nauchnye trudy sworld». 2013. ¹ 4, "Nauchnyi mir", Ivanovo. T. 12. S. 62-66. 6. Zikratov I.A., Odegov S.V., Smirnykh A.V. Otsenka riskov informatsionnoi bezopasnosti v oblachnykh servisakh na osnove lineinogo programmirovaniya // Nauchno-tekhnicheskii vestnik informatsionnykh tekhnologii, mekhaniki i optiki -2013. ¹ 1(83). S. 141-144. |