34 research outputs found

    Implementation and Evaluation of Nodal Distribution and Movement in a 5G Mobile Network

    No full text
    The determining factor in the accelerated pace of informatization is the increase in the speed and reliability of data transmission networks. In this regard, new and existing standards are developed and modernized. A lot of organizations are constantly working on the development and implementation of new generation communication networks. This article provides an overview of available software solutions that allow us to investigate and evaluate the behavior of data networks. In particular, tools suitable for mobile communication systems were determined, having sufficient built-in functionality and allowing us to add our own implementations. NS3 has been chosen as a suitable network simulator. Apart from the review, a solution for this tool was developed. It allows estimating the reliability of data transmission from the start movement of a network node at all times during its removal from a base station

    Implementation and Evaluation of Nodal Distribution and Movement in a 5G Mobile Network

    No full text
    The determining factor in the accelerated pace of informatization is the increase in the speed and reliability of data transmission networks. In this regard, new and existing standards are developed and modernized. A lot of organizations are constantly working on the development and implementation of new generation communication networks. This article provides an overview of available software solutions that allow us to investigate and evaluate the behavior of data networks. In particular, tools suitable for mobile communication systems were determined, having sufficient built-in functionality and allowing us to add our own implementations. NS3 has been chosen as a suitable network simulator. Apart from the review, a solution for this tool was developed. It allows estimating the reliability of data transmission from the start movement of a network node at all times during its removal from a base station

    IoT Security Mechanisms in the Example of BLE

    No full text
    In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-Energy devices, which are widespread in the market and whose radio modules are available from several manufacturers. This paper presents an overview of security mechanisms for the Bluetooth mesh network. This network provides encryption at two layers: network and upper transport layers, which increases the level of data security. The network uses sequence numbers for each message to protect against replay attacks. The introduction of devices into the network is provided with an encryption key, and the out-of-band (OOB) mechanism is also supported. At the moment, a comparison has been made between attacks and defense mechanisms that overlap these attacks. The article also suggested ways to improve network resiliency

    Information Security Methods—Modern Research Directions

    No full text
    In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the development of a comprehensive approach to assessing the security of the information systems. This direction includes the construction of an information security threats model and a protection system model, which allow to compile a complete list of threats and methods of protection against them. The main directions of information security tools development are dynamic methods of biometrics, methods for generating prime numbers for data encryption, steganography, methods and means of data protection in Internet of Things (IoT) systems. The article presents the main results of research in the listed areas of information security. The resultant properties in symmetric cryptography are based on the properties of the power of the generating functions. The authors have obtained symmetric principles for the development of primality testing algorithms, as discussed in the Appendix

    IoT Security Mechanisms in the Example of BLE

    No full text
    In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-Energy devices, which are widespread in the market and whose radio modules are available from several manufacturers. This paper presents an overview of security mechanisms for the Bluetooth mesh network. This network provides encryption at two layers: network and upper transport layers, which increases the level of data security. The network uses sequence numbers for each message to protect against replay attacks. The introduction of devices into the network is provided with an encryption key, and the out-of-band (OOB) mechanism is also supported. At the moment, a comparison has been made between attacks and defense mechanisms that overlap these attacks. The article also suggested ways to improve network resiliency

    Electrochemical Measurement of Interfacial Distribution and Diffusion Coefficients of Electroactive Species for Ion-Exchange Membranes: Application to Br2/Br− Redox Couple

    No full text
    A novel method has been proposed for rapid determination of principal transmembrane transport parameters for solute electroactive co-ions/molecules, in relation to the crossover problem in power sources. It is based on direct measurements of current for the electrode, separated from solution by an ion-exchange membrane, under voltammetric and chronoamperometric regimes. An electroactive reagent is initially distributed within the membrane/solution space under equilibrium. Then, potential change induces its transformation into the product at the electrode under the diffusion-limited regime. For the chronoamperometric experiment, the electrode potential steps backward after the current stabilization, thus inducing an opposite redox transformation. Novel analytical solutions for nonstationary concentrations and current have been derived for such two-stage regime. The comparison of theoretical predictions with experimental data for the Br2/Br− redox couple (where only Br− is initially present) has provided the diffusion coefficients of the Br− and Br2 species inside the membrane, D(Br−) = (2.98 ± 0.27) 10−6 cm2/s and D(Br2) = (1.10 ± 0.07) 10−6 cm2/s, and the distribution coefficient of the Br− species at the membrane/solution boundary, K(Br−) = 0.190 ± 0.005, for various HBr additions (0.125–0.75 M) to aqueous 2 M H2SO4 solution. This possibility to determine transport characteristics of two electroactive species, the initial solute component and its redox product, within a single experiment, represents a unique feature of this study

    Labelled tableaux for temporal logic with cardinality constraints

    No full text
    Abstract—Frequently when formalising systems that change over time, we must represent statements, coming from physical constraints or representational issues, stating that exactly n literals (or less than n literals) of a set hold. While we can write temporal formulae to represent this information, such formulae both complicate and increase the size of the specification and adversely affect the performance of provers. In this paper, we consider reasoning about problems specified in propositional linear time temporal logics in the presence of such constraints on literals. We present a sound, complete and terminating tableau calculus which embeds constraints into its construction avoiding their explicit evaluation. We use METTEL 2, an automated tableau prover generator, to provide an implementation of the calculus and give experimental results using the prover. I

    Electroactive polymeric material with condensed structure on the basis of magnesium(II) polyporphine

    No full text
    International audiencePrevious publication of the authors presented evidences that electroch emical oxidation of Mg(II) porphine (fully unsubstituted porphyrin, MgP) in acetonitrile (AN) at a very low potential leads to deposition of films at electrode surface corresponding to typical electroactive polymers, with their reversible transition betwee n the electronconducting and insulating states depending on the electrode potential/oxidation level ("film of type I"). It is demonstrated in the actual publication that these films in contact with a monomer-free solution are subject to an irreversible transformation to quite a different material ("film of type II") under the influence of a higher positive potential (above 0.5-0.6 V vs. Ag/Ag + in AN). Films with the same properties may also be obtained directly by electrooxidation of the monomer, MgP, at a sufficiently high potential. Films of type II possess a high redox activity and electronic conductivity within the whole potential interval of above 3 V in the width. Their grayish color is related to a constant absorption intensity within the whole range of wavelengths studied (320-1000 nm). On the basis of a combination of experimental observations (ATR IR ad XPS) and literature data the molecular structure of this new material is assumed to be polymer chains of directly linked porphine units (with a par tial loss of Mg cations), probably with multiple bonds (meso-meso and β-β type) between the neighboring units
    corecore