Keywords: platform, model, algorithm, computer network monitoring, wpa/wpa2, encryption
Remote workstation monitoring based on wireless technology
UDC 004.7
DOI: 10.26102/2310-6018/2020.28.1.024
One of the tasks of remote wireless workstation monitoring is to ensure data sharing security by remotely monitoring a workstation or portable devices based on Wi-Fi, 4G or Bluetooth. The developed model of application for mobile communication devices (ICC) serves to monitor and verify various operations on workstations (laptops) connected through a computer network Wi-Fi. Wireless information security protocols are compared. The application is based on Wi-Fi technology, which is protected by wireless security protocol WPA2 [1]. The WPA2 implements the AES block cipher to provide more reliable data encryption, but it is still vulnerable to several attacks due to the transmission of unencrypted control and control frames and the sharing of a group time key (GTK) between nodes connected to the wireless network. Secure communication between the server and the ICC creates the need to offer a security algorithm - simple and efficient to create a robust platform under an already existing wireless information security protocol, such as WPA/WPA2. The results of the workstation monitoring system, encryption algorithm are presented and the performance of the application module is estimated.
1. Sinitsyn Yu.I., Kunavin D.A. Model of a monitoring system for network distributed information infrastructure. Physical and mathematical and technical sciences as a postindustrial foundation for the evolution of the information society: a collection of articles of the International scientific and practical conference (December 15, 2017, Ufa). - Ufa: AETERNA, 2017;1(1):127-129. (In Russ)
2. Sinitsyn Yu.I., Vitkovsky N. Ye. Analysis of traffic management methods in distributed computer networks. Problems of the effective use of the scientific potential of society: a collection of articles of the International scientific and practical conference (December 10, 2017, Chelyabinsk). At 5 h. Part 4 / - Ufa: AETERNA, 2017;1(1):21-24. (In Russ)
3. Sinitsyn Y.I., Kunavin D. A. Monitoring system of the network information infrastructure of a medical institution. Norwegian Journal of development of the International Science 2018;1(1):45-51. (In Russ)
4. Sinitsyn Y. I., Vitkovsky N. E Monitoring traffic in a distributed computer network [Electronic resource]: certificate of state. registration of a computer program; copyright holder Feder. state budget. educate. institution of higher prof. Education "Orenburg. State University" - No. 2018614584 decl. 05/07/2018 registered in the registry of computer programs 06/26/2018. (In Russ)
Keywords: platform, model, algorithm, computer network monitoring, wpa/wpa2, encryption
For citation: Sinitsyn Y.I. Remote workstation monitoring based on wireless technology. Modeling, Optimization and Information Technology. 2020;8(1). URL: https://moit.vivt.ru/wp-content/uploads/2020/02/Sinizin_1_20_1.pdf DOI: 10.26102/2310-6018/2020.28.1.024 (In Russ).
Published 31.03.2020