An approach to ensuring availability of wireless mesh networks for crisis management is proposed. The approach comprises, first, means for automatic scanning of the network nodes and formation of its graph model, second, algorithms for analyzing the dynamically changing graph network and, third, decision-making tool for automated spatial movement of drones equipped with additional router nodes to places of real and potential network availability violations to eliminate these violations. A hardware-software prototype of the availability ensuring components has been developed. The constructed solutions, including their subjection to energy resource exhaustion attacks have been analyzed.
wireless mesh network, network availability, crisis management, drones, energy resource exhaustion attacks
1. Portmann M., Pirzada A.A. Wireless mesh networks for public safety and crisis management applications // IEEE Engineering Management Review. 2011. Vol. 39. № 4. P. 114-122
2. Dalmasso I., Galletti I., Giuliano R., Mazzeng, F. WiMAX networks for emergency management based on UAVs // 2012 IEEE First AESS European: conference on Satellite Telecommunications (ESTEL). Rome, 2012. P. 1-6
3. Padalkar S., Korlekar A., Pacharaney U. Data gathering in wireless sensor network for energy efficiency with and without compressive sensing at sensor node // 2016 International Conference on Communication and Signal Processing (ICCSP). Melmaruvathur, 2016. P. 1 356-1 359
4. XBee Java Library. URL: https: //www.digi.com/resources/documentation/digidocs/ 90001438 (data obrascheniya: 06.07.2018)
5. Desnickiy V.A., Kotenko I.V. Proektirovanie zaschischennyh vstroennyh ustroystv na osnove konfigurirovaniya // Problemy informacionnoy bezopasnosti. Komp'yuternye sistemy. 2013. № 1. S. 44-54
6. Dong C., Ding J., Lin J. Segmented polynomial RSSI-LQI ranging modelling for ZigBee-based positioning systems, 2016 35th Chinese Control: conference (CCC). Chengdu, 2016. P. 8 387-8 390
7. Desnitsky V., Kotenko I. Expert knowledge based design and verification of secure systems with embedded devices // Lecture Notes in Computer Science. 2014. T. 8 708. P. 194-210