Мониторинг удаленных рабочих станций на основе беспроводной технологии
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

Remote workstation monitoring based on wireless technology

Sinitsyn Y.I.  

UDC 004.7
DOI: 10.26102/2310-6018/2020.28.1.024

  • Abstract
  • List of references
  • About authors

One of the tasks of remote wireless workstation monitoring is to ensure data sharing security by remotely monitoring a workstation or portable devices based on Wi-Fi, 4G or Bluetooth. The developed model of application for mobile communication devices (ICC) serves to monitor and verify various operations on workstations (laptops) connected through a computer network Wi-Fi. Wireless information security protocols are compared. The application is based on Wi-Fi technology, which is protected by wireless security protocol WPA2 [1]. The WPA2 implements the AES block cipher to provide more reliable data encryption, but it is still vulnerable to several attacks due to the transmission of unencrypted control and control frames and the sharing of a group time key (GTK) between nodes connected to the wireless network. Secure communication between the server and the ICC creates the need to offer a security algorithm - simple and efficient to create a robust platform under an already existing wireless information security protocol, such as WPA/WPA2. The results of the workstation monitoring system, encryption algorithm are presented and the performance of the application module is estimated.

1. Sinitsyn Yu.I., Kunavin D.A. Model of a monitoring system for network distributed information infrastructure. Physical and mathematical and technical sciences as a postindustrial foundation for the evolution of the information society: a collection of articles of the International scientific and practical conference (December 15, 2017, Ufa). - Ufa: AETERNA, 2017;1(1):127-129. (In Russ)

2. Sinitsyn Yu.I., Vitkovsky N. Ye. Analysis of traffic management methods in distributed computer networks. Problems of the effective use of the scientific potential of society: a collection of articles of the International scientific and practical conference (December 10, 2017, Chelyabinsk). At 5 h. Part 4 / - Ufa: AETERNA, 2017;1(1):21-24. (In Russ)

3. Sinitsyn Y.I., Kunavin D. A. Monitoring system of the network information infrastructure of a medical institution. Norwegian Journal of development of the International Science 2018;1(1):45-51. (In Russ)

4. Sinitsyn Y. I., Vitkovsky N. E Monitoring traffic in a distributed computer network [Electronic resource]: certificate of state. registration of a computer program; copyright holder Feder. state budget. educate. institution of higher prof. Education "Orenburg. State University" - No. 2018614584 decl. 05/07/2018 registered in the registry of computer programs 06/26/2018. (In Russ)

Sinitsyn Yuri Ivanovich
Candidate of Technical Sciences
Email: siniza1960@mail.ru

Orenburg State University

Orenburg, Russian Federation

Keywords: platform, model, algorithm, computer network monitoring, wpa/wpa2, encryption

For citation: Sinitsyn Y.I. Remote workstation monitoring based on wireless technology. Modeling, Optimization and Information Technology. 2020;8(1). Available from: https://moit.vivt.ru/wp-content/uploads/2020/02/Sinizin_1_20_1.pdf DOI: 10.26102/2310-6018/2020.28.1.024 (In Russ).

542

Full text in PDF