z-logo
open-access-imgOpen Access
One approach to the design of individual mathematical models of security in wireless sensor networks
Author(s) -
Yevgen Kotukh,
Volodymyr O. Lyubchak,
O. P. Strakh
Publication year - 2021
Publication title -
radiotekhnika
Language(s) - English
Resource type - Journals
eISSN - 2786-5525
pISSN - 0485-8972
DOI - 10.30837/rt.2021.4.207.08
Subject(s) - wireless sensor network , computer science , mode (computer interface) , key distribution in wireless sensor networks , variety (cybernetics) , constant (computer programming) , process (computing) , software , wireless , wireless network , distributed computing , computer network , telecommunications , artificial intelligence , programming language , operating system
The current level of development of engineering and technology is characterized by a constant expansion of the variety and complexity of mechanical and controlled objects, the operation of which occurs in a continuous-discrete time mode. One of these objects is the process of spreading malicious software in wireless sensor networks, the constant growth of trends towards which is due to their use as a single type of self-organized data transmission network with the least labor intensity and low cost. The concept of building sensor networks has not been formed at all. Therefore, the study of certain properties of such networks is very important for both domestic and world science. Moreover, for the strategically important sectors of the country, in particular defense, the protection of wireless sensor networks is a very important component. A new model of malware distribution is proposed, which is described by some boundary value problem for an impulsive dynamical system on a time scale.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom