Category Archives: Issue # 1(28)

MULTI-MEASURE NAVIGATION SAFETY ESTIMATION AND DIGITAL REPRESENT FOR MARINE AREA


UDC 004.8
DOI:10.26102/2310-6018/2020.28.1.003

V.M. Grinyak, Y.S. Ivanenko, V.I. Lulko, A.V. Shulenina, A.V. Shurygin


The paper is devoted to the problem of ensuring the safe movement of ships. The problem of assessing the safety of a traffic pattern implemented in a specific water area is considered. Five different safety metrics are introduced. The first metric – “traffic intensity” – the traditionally used traffic density estimate, is calculated as the number of vessels passing through a particular section of the water area per unit time. It is supplemented by the metrics “intensity plus speed” (second) and “intensity plus size of ships” (third). When calculating them, respectively, the speed of the vessels and their length, which determine the “weight” of each vessel, are taken into account. The fourth metric – “stability of traffic parameters” – takes into account the nature of the movement of ships in terms of the regularity of their courses and speeds. The paper discusses various options for the metric, to illustrate the simplest of them is implemented – an estimate of the standard deviation of the ship’s course. The fifth metric – “traffic saturation” – characterizes the density of movement of ships in terms of the possibility of their maneuvers. The metric appeals to the traditional model representations of the collective motion parameters of the vessels in the form of a “speed-course” diagram and makes it possible to indirectly assess the difficulty of decision-making by skippers and the emotional burden on traffic participants. In the discussion of the results of the work, the option of integrating the five proposed metrics in the form of a system of rules giving an integrated assessment of traffic safety in a particular section of the water area is considered. The work is accompanied by the results of calculations of the proposed metrics on real data on the movement of ships in the Tsugaru Strait and their discussion. It is shown that the proposed system of metrics allows you to create a systematic idea of the degree of danger of traffic implemented in the water area.

Keywords: marine safety, traffic intensity, ship trajectory, ship traffic, traffic area, аutomatic
identification system.

Full text:
GrinyakSoavtors_1_20_1.pdf

DEVELOPMENT OF A WIRELESS CONTROL SYSTEM ON THE BASIS OF «THE INTERNET OF THINGS» CONCEPT


UDC 004.021
DOI:10.26102/2310-6018/2020.28.1.002

A.I. Afanasiev, V.N. Knyazev


In the article it is discussed current issues and problems of developing wireless control systems based on the concept of «Internet of Things». As important problems here there are an insufficient flexibility and efficiency of the choice of communication channels for data transmission, the insufficient protection of communication channels and the ways to solve these problems were proposed. The scientific novelty is in the development of an adaptive algorithm for selecting a channel for data transmission, which is different from the well-known algorithms by higher flexibility and reliability. The flexibility (adaptability) of the algorithm is the automatic identification of available channels, and the reliability is providing of guaranteed transfer of the control commands. Also there were proposed a modified encryption algorithm based on the combined using of a symmetric encryption algorithm GOST 34.12-2015 and an asymmetric encryption algorithm on elliptic curves, allowing to increase the level of reliability of the protected interaction between the components of the control system while ensuring a sufficient speed of message transmission. There was designed a wireless control system with using an ontological and visual modelling among other things. The results, which were received in the course of the study were used as the basis for creating hardware and software of an automated control system for «IoT» devices for a private house.

Keywords: Internet of Things, smart house, wireless interaction, control system, communication channel, encryption, ontological and visual modeling.

Full text:
AfanasyevKnyazev_1_20_1.pdf

METHODS OF ACCEPTABLE OPTIONS FORMATION OF ORGANIZATIONAL STRUCTURE AND THE STRUCTURE OF THE AUTOMATED INFORMATION SECURITY MANAGEMENT SYSTEM


UDC 004.054.53
DOI:10.26102/2310-6018/2020.28.1.001

V.V.Selifanov, R.V.Meshcherykov


To ensure comprehensive information protection, it is necessary to use various means of information protection, distributed by levels and segments of the information system. This creates a contradiction, which consists in the presence of a large number of different means of information protection and the inability to ensure their joint coordinated application in ensuring the protection of information due to the lack of an automated control system. One of the tasks that contribute to the solution of this problem is the task of generating a feasible organizational structure and the structure of such an automated control system, whose results would provide these options and choose the one that is optimal under given initial parameters and limitations.Тhe problem is solved by reducing the General problem to a particular problem of splitting into subgraphs of the original graph of the automated cyber defense control system. In this case, the subgraphs will correspond to the subsystems of the automated cyber defense management system at different levels and will provide a visual representation of the process of acceptable variants formation of the organizational composition and structure of such an automated control system. As a result of the operation of splitting into subtasks of the graph, a set of acceptable variants of the organizational composition and structures of the automated cyber defense management system are supposed to be obtained, based on which the optimal choice is made under the given initial parameters and restrictions. As a result, the technique of formation of admissible variants of organizational structure and structure by the automated control system of cyber defense is received.

Keywords: information security, cybersecurity, information protection, control, automated control systems.

Full text:
SelifanovMeshcherykov_1_20_1.pdf