The article is devoted to the issues of protection against the loss of confidential information and unauthorized access to it in communication networks of intelligent systems. The conditions and tasks of using cryptographic methods to protect such systems are analyzed. Practical methods are proposed to increase the efficiency of communication in intelligent systems by protecting messages from unauthorized access, detection, localization, and recovery of damaged blocks of information, and application of optimization encryption. The method of vector encryption is based on the application of matrix lattices and localization of defective blocks of information by methods of the cross and redundant hashing methods.
Purpose. To perform research on group behavior in a multi-agent system during performing a consolidation task by simulation modeling in the created by the bionic prototype modeling environment. The research was considered as a preliminary step towards the creation of applied systems of group robotics. Methodology. We have applied graph theory, mathematical differential calculation, simulation modeling. Results. We have developed a mathematical model of the problem of consolidation of agents in a multi-agent system according to the scenario of leader persecution. The software implementation of the environment for studying the behavior of multi-agent systems in real time has been performed. Simulation of a multi-agent system with variation of system parameters and experimental conditions was performed. The directions of improvement of the modeling environment in order to bring the simulation closer to the real conditions of functioning of applied multi - agent systems are determined. Originality. We have developed an original research software environment for real-time swarm robotic tasks. Forms and means of monitoring the state of the multi-agent system and individual agents, suitable for rapid analysis by the researcher of the model experiment, are proposed. We have experimentally established the effectiveness of the proposed approach in the process of modeling the consolidation of a multicomponent system with high dynamic parameters. Practical value. We have tested the effectiveness of the bionic model of behavior of a multi-agent system in solving the problem of consolidation in the scenario of convergence of agents to the leader. Сonclusions. Practical usage of received results is possible at all stages of the life cycle of the swarm robotic applying intellectual systems, in particular, during identifying the optimal structure of links in the group of agents and the assessment of the adequacy of their behavior in the functional space. A further development of the research environment is in expanding functional possibilities to describe the scenes, the properties of the agents, the communication systems in the group, the types of consolidation. References 17, tables 0, figures 5.
The tasks of information security system include identifying potential or actual sources of threat to system’s work and minimizing consequences of unauthorized influence on it. While solving them, arises the need of restoration of the initial state of the information system, especially the data integrity. While performing information message analysis the other task may be finding differences between two data fragments or their instances. This paper offers methods of the complex solution of the information security tasks and the analysis of data streams using the means of cryptography and presents the experience of developing the reliable implementation of these methods. The developed methods allow detecting falsifications in data part of the sent message and restoring the initial message. During the cryptographic analysis, the area of change in a data block is localized using cross hashing which is performed by computing the hash of information message block by block. The result is the program implementation of the offered method of information stream analysis that is based on comparing three frames of input data. The effectiveness of detecting falsifications in a data stream depending on algorithm’s sensitivity was researched with the developed instrument. The dependence of the share of falsifications detected by the system in the information block on the established maximum allowable relative deviation from the median and the properties of the input stream, in particular, the division of the input data into frames, was experimentally revealed. It is expected that the advantages of the method will be higher in the preliminary stage of data flow analysis related to its segmentation before addressing the selected fragments to more accurate and specialized algorithms.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.