Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics, 2015, Number 4, Pages 38–46 (Mi vagtu400)  

This article is cited in 1 scientific paper (total in 1 paper)

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

Analysis of information risks in the system of distributed monitoring based on the fog computing model

A. A. Finogeeva, A. G. Finogeeva, I. S. Nefedovaa, E. A. Finogeeva, V. A. Kamaevb

a Penza State University
b Volgograd State Technical University
Full-text PDF (935 kB) Citations (1)
References:
Abstract: The paper considers the aspects of information risk management in the systems of secured collection and distributed processing of huge sensor data. The objects of information threats are components of SCADA-systems of dispatch control and management in the services in energy supply and consumption. Collection and distribution of data processing are carried out spatially with the distributed sensors, devices of automation, accounting and control of energy sources and energy transport processes in the engineering of energy networks. At the wireless sensor network nodes, cellular modems and industrial controllers, metering and control of energy, a model of distributed "fog" calculations, with respect to which the basic components of information risks are considered, is actualized. The classification of information threats and attacks in the wireless transport medium "fog" calculations is presented. The methods and tools of protection of wireless sensor network (WSN), data collection nodes, wireless communications and data transmission are determined. Particular attention is paid to information security aspects of such a component of the "fog" computing as software agents and brokers.
Keywords: monitoring, sensor data protection, information risk, distributed data processing, "fog" computing, SCADA, wireless sensor network, information security.
Funding agency Grant number
Russian Foundation for Basic Research 15-37-50142
15-07-01720
15-57-54033
Received: 31.08.2015
Document Type: Article
UDC: 681.518.3
Language: Russian
Citation: A. A. Finogeev, A. G. Finogeev, I. S. Nefedova, E. A. Finogeev, V. A. Kamaev, “Analysis of information risks in the system of distributed monitoring based on the fog computing model”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2015, no. 4, 38–46
Citation in format AMSBIB
\Bibitem{FinFinNef15}
\by A.~A.~Finogeev, A.~G.~Finogeev, I.~S.~Nefedova, E.~A.~Finogeev, V.~A.~Kamaev
\paper Analysis of information risks in the system of distributed monitoring based on the fog computing model
\jour Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics
\yr 2015
\issue 4
\pages 38--46
\mathnet{http://mi.mathnet.ru/vagtu400}
Linking options:
  • https://www.mathnet.ru/eng/vagtu400
  • https://www.mathnet.ru/eng/vagtu/y2015/i4/p38
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Вестник Астраханского государственного технического университета. Серия: Управление, вычислительная техника и информатика
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2025