For example,Бобцов

ANALYSIS OF INFORMATION INTERACTION SECURITY WITHIN GROUP OF UNMANNED AERIAL VEHICLES

Annotation

Subject of Research. The paper presents analysis of information interaction of the elements within the group of unmanned aerial vehicles and their vulnerability to destructive information impact. At the moment, this problem is relevant for devices used in civil areas. In addition, the task of identifying hidden destructive information impact is an unsolved problem within the group of unmanned aerial vehicles. Method. A set-theoretical model of information interaction within the group of unmanned aerial vehicles is developed based on comparative evaluation results of the group control strategies. The developed model is analyzed, that gives the possibility to identify and evaluate the vulnerable elements, which carry out information interaction and are subjected to destructive information impact. Experiments are carried out, where destructive information is introduced into the process of information interaction (both internal and external), leading to disruption of the agent or group as a whole. Main Results. The information interaction of unmanned aerial vehicles group requires security factor increasing for contraction of the destructive information impact and a hidden destructive information impact. Hidden destructive information impact cannot be detected by classical approaches to information security, therefore, it is necessary to develop new methods to increase the information interaction security from such attacks. Practical Relevance. The results of the set-theoretical model analysis of information interaction within unmanned aerial vehicles group will enable the development of new information security methods to eliminate specific vulnerabilities associated not only with the classical, but also with the "soft" impact methods. They will be in demand for the use in autonomous robotic systems.

Keywords

Articles in current issue