PDFTo download article.

UDC 004.738.5ʼ056

DOI: 10.15507/0236-2910.028.201801.085-094

 

The Analysis of Threats to Information Security of Protocols and Lighting Control Systems

Sergey N. Ivliyev
Head of Information Security and Service Chair, Institute of Electronics and Lighting Engineering, National Research Mordovia State University (68 Bolshevistskaya St., Saransk 430005, Russia), Ph.D. (Engineering), ResearcherID: E-1697-2014, ORCID: http://orcid.org/0000-0002-6101-3388, This email address is being protected from spambots. You need JavaScript enabled to view it.

Svetlana L. Krylova
Senior Lecturer, Information Security and Service Chair, Institute of Electronics and Lighting Engineering, National Research Mordovia State University (68 Bolshevistskaya St., Saransk 430005, Russia), ResearcherID: L-7324-2017, ORCID: http://orcid.org/0000-0003-4083-9209, This email address is being protected from spambots. You need JavaScript enabled to view it.

Stanislav A. Shikov
Lecturer, Information Security and Service Chair, Institute of Electronics and Lighting Engineering, National Research Mordovia State University (68 Bolshevistskaya St., Saransk 430005, Russia), ResearcherID:S-2514-2016, ORCID: http://orcid.org//0000-0002-8412-5163, This email address is being protected from spambots. You need JavaScript enabled to view it.

Introduction: The paper considers the possible threats to information security when using PLC-technologies (power lines). Such technical solutions allow controlling and providing feedback with controllable devices. However, these technologies do not meet the safety requirements. The purpose of this investigation is to explore the problem and suggest solutions.
Materials and Methods: The aims and methods of investigation are presented. The conducted researches and the list of solved problems are indicated. The analysis of information security threats has been carried out.
Results: The study presents a general information system model. The model of threats to the lighting control system was developed using the Dali protocol.
Discussion and Conclusions: The authors have analyzed the factors that determine vulner-abilities of the analyzed examples. The level of safety in the segment of lighting control protocols must be increased. We provide the list of minimum measures to ensure the safe operation of lighting systems. The findings of this study have a number of important implications for future practice.

Keywords: information security, information security threat, information system, lighting control, PLC-technologies

For citation: Ivliyev S. N., Krylova S. L., Shikov S. A. The Analysis of Threats to Information Security of Protocols and Lighting Control Systems. Vestnik Mordovskogo universiteta = Mordovia University Bulletin. 2018; 28(1):85–94. DOI: 10.15507/0236- 2910.028.201801.085-094

 

Лицензия Creative Commons
This work is licensed under a Creative Commons Attribution 4.0 License.

Joomla templates by a4joomla