I. Zikratov, A. Kuzmin, Vladislav Akimenko, Viktor Niculichev, Lucas Yalansky
{"title":"Ensuring data integrity using blockchain technology","authors":"I. Zikratov, A. Kuzmin, Vladislav Akimenko, Viktor Niculichev, Lucas Yalansky","doi":"10.23919/FRUCT.2017.8071359","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071359","url":null,"abstract":"Blockchain is a relatively new technology that has shown a lot of possibilities. It emerged in 2009 as a public ledger of all Bitcoin transactions. Blockchain technology is finding applications in wide range of areas: digital assets and stocks, smart contracts, record keeping, ID systems, cloud storage, ride sharing, etc. We investigate the blockchains' activity in terms of how to store, retrieve and share files in decentralized network.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133047542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An expert system for mitigation actions","authors":"I. Karanta, Mika Rautila","doi":"10.23919/FRUCT.2017.8071302","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071302","url":null,"abstract":"This paper describes an approach, based on ontologies and expert system technology, for assisting the mitigation of advanced persistent threat (APT) attacks against critical infrastructures. We describe the approach, and a prototype expert system based on it. We delineate a case study, involving an APT against a financial information infrastructure. Finally, we outline some conclusions and recommendations for future work.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116438906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Afanasev, Yuri V. Fedosov, A. Krylova, S. Shorokhov
{"title":"An application of microservices architecture pattern to create a modular computer numerical control system","authors":"M. Afanasev, Yuri V. Fedosov, A. Krylova, S. Shorokhov","doi":"10.23919/FRUCT.2017.8071286","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071286","url":null,"abstract":"Currently, the most common approach to Computer Numerical Control (CNC) system design is a monolithic architecture. However, the introduction of the concept of Cyber-Physical Production Systems (CPPS) requires a paradigm shift in the design of control systems. This paper suggests a new approach to developing modular industrial equipment using a microservices architecture pattern. Microservices architecture features are addressed, as well as advantages and disadvantages. A heterogeneous computer network, where nodes communicate via a message queue, is proposed as a basis for the computer numerical control system. Fault tolerance is provided by modules full autonomy and reliable messaging. Furthermore, NoSQL database, guaranteeing high data accessibility and increased data access speed, is applied. An apparatus for selective photopolymer laser curing of free-form surfaces is considered as an example. Common setup structure, as well as main hardware and software modules, are described. Moreover, a distributed network latency simulation was carried out to prove the viability of the proposed microservices architecture.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"102 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115518817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data security evaluation for mobile android devices","authors":"I. Khokhlov, L. Reznik","doi":"10.23919/FRUCT.2017.8071306","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071306","url":null,"abstract":"Vast spreading of Android-based devices with embedded diverse sensors make them popular platforms for data collection in various research domains. However, Android OS complexity and vulnerabilities may facilitate sensor data manipulation and falsification that will have a high impact on data security and quality. This paper presents a data security and quality evaluation method based on a possibility assessment of malicious actions that exploit certain Android OS features and vulnerabilities as well as applications installed. It describes the Android OS architecture features related to security and major security mechanisms. The paper shows metrics chosen for data security evaluation and the developed method of their integration that computes Overall Security Evaluation Score representing sensor originated data trustworthiness level. The examples of Overall Security Evaluation Score calculation are presented and analyzed.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125542392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication network for remote monitoring of wind turbine based on infrared camera","authors":"Shahid Hussain, Young-Chon Kim","doi":"10.23919/FRUCT.2017.8071296","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071296","url":null,"abstract":"Recently, numerous monitoring techniques have been proposed to detect the failure of wind turbine (WT). These techniques were developed based on embedded system with several sensors and complex cabling requirements. Therefore, an Infrared (IR)-camera can be considered an effective visual tool with a large coverage area, high accuracy, reliability, and cost effectiveness. This paper proposes communication network architecture for remote monitoring of WT based on non-contact IR-cameras to detect the failures in real-time. Firstly, the feasibility study of various components such as electrical, mechanical and control system of WT which can be monitored through IR-camera was conducted. According to the feasibility study, the WT components are then prioritized into three different categories of high, low, and medium. According to the aforementioned categorization of WT components, three different types of IR-camera with a low, medium, and high resolution are used. The communication network is designed in two parts the internal communication network inside the WT and the external communication network between WT and remote control center. The amount of data traffic is numerically modeled with different parameters such as image resolutions, frame size, frame number, and data rates for the transmission of data. Since, the external communication network is usually shared by other sub-networks for different applications. This can lead the problem of high bandwidth demand and security issues. Therefore, different compression techniques such as MPEG-2 and H.264 are considered to evaluate the network performance. The communication network is modeled and simulated through OPNET. The simulation results show that the end-to-end delay of the IR-camera based monitoring can satisfy the IEEE 1646 standard timing requirements.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115814899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile edge computing applications for connectivity management","authors":"E. Pencheva, I. Atanasov","doi":"10.23919/FRUCT.2017.8071334","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071334","url":null,"abstract":"Connectivity management is the ability to connect and manage mobile devices in Machine-to-Machine (M2M) communications. Resilient and scalable connectivity management, which is fundamental to M2M solutions, may be achieved by using Mobile Edge Computing (MEC) technology. MEC enables applications to timely response to dynamic changes in radio conditions and thus to improve effectiveness of connectivity management. In this paper, we present models of device connectivity management that may be supported by MEC applications. We suggest a method for automatic detection of undesired interaction between applications using standard reasoning over description logic.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121138189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SCA as mobile security threat","authors":"A. Levina, Pavel Borisenko, R. Mostovoy","doi":"10.23919/FRUCT.2017.8071317","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071317","url":null,"abstract":"Recent time the mobile phones became the main device for the modern society members. Of course, it means that they also became the main target of the attackers. Our team is working on the issue of the mobile security regarding the side-channel attacks. We have faced with a number of challenges which the attacker has to overcome to obtain the sensitive data, but at the same time our research shows that the severity level of the side-channel attacks threat for the mobile security is even more high then we can assume. The instrument available for the any potential malefactor, the consumer-level device, and realy simple technique of the trace gathering allow to distinguish the cryptographic operations in dependency on the used input data. Although on this equipment level the obtaining of the key data is not possible, the attacking algorythms designed during the our research will allow to reach this goal on the more detailed signal records.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127491403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic routing and spectrum allocation to minimize fragmentation in elastic optical networks","authors":"Yadi Xu, Young-Chon Kim","doi":"10.23919/FRUCT.2017.8071356","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071356","url":null,"abstract":"The exponential growth in Internet traffic requires a high-capacity transmission platform and emphasizes the importance of a multi-granularity transport network due to heterogeneous connection requests. Elastic Optical Network has been considered as a promising solution because of large transport capacity and bandwidth flexibility. Routing and spectrum allocation is one of important problems in EON. However, with spectrum continuity constraint and contiguity constraint, the set-up and tear-down of light paths may cause fragmentation problem which refers to small-sized and uncontiguous spectrums. The fragmentation increases the connection blocking probability and decrease spectrum utilization. In this paper a novel routing and spectrum allocation algorithm is proposed to minimize fragmentation in EON. The proposed algorithm consists of routing problem and the spectrum allocation problem. In the first step, K-shortest paths algorithm is employed and candidate paths are found according to the distance between source and destination. In the second step, fragmentation-aware spectrum allocation algorithm is applied. We define block cost function to determine appropriate spectral block for connection request. The block cost function is based on the state of neighboring frequency slots to minimize the fragmentation after spectrum allocation. The performance of proposed algorithm is evaluated in terms of blocking probability and spectrum utilization.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Viksnin, Ruslan Gataullin, A. Muradov, Ivan P. Danilov, N. Tursukov, A. Chechet
{"title":"Modeling people behavior in emergency situations","authors":"I. Viksnin, Ruslan Gataullin, A. Muradov, Ivan P. Danilov, N. Tursukov, A. Chechet","doi":"10.23919/FRUCT.2017.8071351","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071351","url":null,"abstract":"A model of human behavior in emergency situations in confined spaces with a complex structure. A distinctive feature of this model is that the information influence of the behavior of agents in the group is individual. The level of exposure to the influence of the information agent depends on the type, based on some factors, such as location relative to the group members, the physical and functional characteristics of the individual membership. By the functional affiliation is meant the role of agent upon condition the absence of some external destructive influences. The proposed model describes four possible physical states of the agent: alive and active; alive and passive, wounded; received critical damage, unable to move; dead. The developed theoretical foundations models have been implemented in a software environment simulation by the example of incident in the club “Lame Horse” located in Perm, Russia, 05.12.2009. The experiments showed results corresponds to the actual outcome of the incident model operating results with considering the probability of deviations.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TRIK studio: Technical introduction","authors":"D. Mordvinov, Yurii Litvinov, T. Bryksin","doi":"10.23919/FRUCT.2017.8071326","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071326","url":null,"abstract":"This paper presents TRIK Studio — an environment for visual (and textual) programming of robotic kits, which is used in educational organizations across Russia and Europe. First part of the article provides overview of the system — its purpose, features, differences from similar programming environments, general difficulties of robot programming and solutions proposed by TRIK Studio. Second part presents implementation details of TRIK Studio and its most interesting components. This article combines five fields of study: robotics, domain-specific visual modeling, education, formal methods and methods of program analysis. Main contribution of this article is detailed technical description of TRIK Studio as complex and successful open-source cross-platform robot programming environment written in C++/Qt, and first part of the article can also be interesting for teachers as it provides an overview of existing robot programming tools and related problems.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130364977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}