Studies some Aspects Information Security of Wireless Communication Networks

Article Preview

Abstract:

The efficiency of the functioning wireless cellular networks using modern information and computer technologies is analyzed. The constituent technical components of the vector quality of functioning of a wireless network segment in the event of a threat to the security of a telecommunication system and eliminating the threat of vulnerability have been studied. Some aspects information security of wireless cellular networks are considered from the point view of the characteristics information protection system and the reliability of the communication network.

You might also be interested in these eBooks

Info:

Periodical:

Engineering Headway (Volume 7)

Pages:

141-147

Citation:

Online since:

April 2024

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2024 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] B.Ya. Ryabko, A.N. Fionov. Fundamentals of modern cryptography and steganography. Goryachaya Liniya-Telecom. (2020).

Google Scholar

[2] Bayram G. Ibrahimov, Ramiz T. Humbatov, Rufat F. Ibrahimov. Cryptographic Methods and Means Protection Transmitted Information in Telecommunication Systems. The Proceedings of the 18th -IFAC Conference on Technology, Culture and International Stability. IEEE Explore. Elsevier. IFAC-Papers OnLine, 51, 30, (2018), 821-824.

DOI: 10.1016/j.ifacol.2018.11.187

Google Scholar

[3] D.A. Kostin, O. I. Shelukhin. Comparative analysis of machine learning algorithms for conducting classification of network encrypted traffic. T- Comm: Telecommunications and transport. 9, (2016), 46-52.

Google Scholar

[4] S.V. Gordeychik, V.V. Dubrovin. Security of wireless networks. (2008) .pp.145-196.

Google Scholar

[5] V.A Bogatyrev, A.V. Bogatyrev, S.V. Bogatyrev. Optimization intervals for checking the information security systems. Scientific and Technical Bulletin of Information Technologies, Mechanics and Optics.5 (93). (2014), 119-125.

DOI: 10.17586/2226-1494-2017-17-5-872-878

Google Scholar

[6] M.Liubogoshchev, K.Ragimova, A.Lyakhov, S.Tang, E.Khorov. Adaptive cloud-based extended reality: Modeling and optimization //IEEE Access, 9, (2021), 35287-35299.

DOI: 10.1109/access.2021.3062555

Google Scholar

[7] V.A. Tikhvinsky, S.V. Terentyev, V.A. Koval, E.E. Devyatkin. Development mobile communication networks from 5G Advanced to 6G: projects, technologies, architecture. M.: Technosphere, (2023).

Google Scholar

[8] A.Rustamov, K.Gurbanov, V. Katexliyev. Calculation of the destruction effectiveness of military ships' fire means according to the impact distance. National Security and Military Sciences, 3(9), 2023, pp.44-50.

Google Scholar

[9] Ibrahimov Bayram. Method for calculation indicators steganographic systems in multiservice communication networks. International Robotics & Automation Journal. Vol.9, Issue1, 2023. pp.40-43.

DOI: 10.15406/iratj.2023.09.00261

Google Scholar

[10] A. Lyakhov, V. Vishnevsky, M. Yakimov. Multicast QoS support in IEEE 802.16. Proceedings of the Third ACM International Workshop on QoS and Security for Wireless and Mobile Networks. Chania, Crete Island, Greece, Oct. 22, 2017. pp.63-70

DOI: 10.1145/1298239.1298251

Google Scholar

[11] Mathy Vanhoef , Frank Piessens. Advanced Wi-Fi attacks using commodity hardware.

DOI: 10.1145/2664243.2664260

Google Scholar