Information security threats in wireless sensor networks: modeling and analysis

DOI: 10.31673/2412-9070.2024.050729

Authors

  • Н. В. Руденко, (Rudenko N. V.) State University of Information and Communication Technologies, Kyiv
  • М. М. Шрам, (Shram M. M.) State University of Information and Communication Technologies, Kyiv

DOI:

https://doi.org/10.31673/2412-9070.2024.050729

Abstract

The article deals with current problems of information security in wireless sensor networks (BSM). In particular, attention is paid to modeling and analyzing potential threats that may affect the confidentiality, integrity and availability of data in such networks. An overview of existing protection methods is carried out, their advantages and disadvantages are determined. A new approach to threat classification based on vulnerability and attack analysis is proposed, and models for assessing information security risks in BSM are developed. The results of the study can be used to improve the protection of wireless sensor networks in various industries, including healthcare, industry, and national security.
Subject of research. The subject of the research is tools for modeling and analyzing threats to information security of wireless sensor networks.
Method. The paper uses methods of mathematical modeling and System Analysis.
Main results. The analysis of current threats to the information security of wireless sensor networks is carried out. A comparative analysis of the means of simulation modeling of wireless sensor networks and attacking influences in them is carried out. Two models of representation of wireless sensor networks for solving threat modeling problems are proposed.
Practical significance. The results of the work can be used to model and evaluate the security of complex wireless sensor networks with a large number of nodes in the conditions of organizational complexity of using fully functional instances of wireless sensor networks to solve information security problems.

Keywords:
Information Security, Wireless Sensor Networks, threats, threat modeling, threat analysis, cybersecurity, information security, network attacks, data encryption, authentication.

Published

2024-11-14

Issue

Section

Articles