Information security in intelligent mass transit management systems
https://doi.org/10.21683/1729-26462022-22-3-62-68
Abstract
Aim. The paper examines matters related to the definition of the architecture and requirements for data communication networks as part of intelligent mass transit management systems.
Methods. The paper suggests a network architecture using multiprotocol label switching (MPLS) technology and traffic routing. If the core of a local area network is implemented using fully-connected topology, the use of flow labels allows predefining information exchange routes between servers and applications of an information and telecommunications network (ITS). Multiprotocol label switching (MPLS) is the foundation of control and information acquisition networks of ITS. That allows adopting common interfaces to the subsystems that perform various functions within an ITS, e.g., control and diagnostics, minimizing the time of information delivery to management servers and sending critical control commands, as well as using common Ethernet or 4G/5G wireless interfaces.
Conclusions. The path installation/removal principle, when applied to critical facilities, significantly complicates attacks and collection of information on the network structure of ITS.
About the Authors
V. М. AlekseevRussian Federation
Victor М. Alekseev, Doctor of Engineering, Professor, Professor of the Department of Management and Protection of Information
Moscow
S. N. Chichkov
Russian Federation
Sergey N. Chichkov, post-graduate student, Department of Management and Protection of Information
Moscow
References
1. Kharitonova E.V. Graphs and networks. Ulyanovsk: UlSTU; 2006. (in Russ.)
2. Nadeau T. MPLS Network Management MIBs, Tools, and Techniques. Morgan Kaufmann Publishers; 2002.
3. Alexeev V.M., Baranov L.A., Sidorenko V.G., Kulagin M.A. Building Architecture of Intelligent Control System for Urban Rail Transit System. World of transport and transportation 2021;1(92):18-46.
4. Ivakhnenko A.G. Longterm forecasting and management of complex systems. Technics; 1975. (in Russ.)
5. Devyanin P.N. Computer systems security models. Moscow: Hotline-Telecom; 2018. (in Russ.)
6. Klein D. Relying on firewalls? Here’s why you’ll be hacked. Network Security 2021;1:9-12.
7. Udipi S. The event data management problem: getting the most from network detection and response. Network Security 2021;1:12-14.
8. Wood M. How SASE is defining the future of network security. Network Security 2020;12:6-8.
9. Harrington J. Network Security. A Practical Approach. Morgan Kaufmann Publishers; 2005.
10. Wentzel E.S. Probability theory. Moscow: GIFML; 1962. (in Russ.)
Review
For citations:
Alekseev V.М., Chichkov S.N. Information security in intelligent mass transit management systems. Dependability. 2022;22(3):62-68. (In Russ.) https://doi.org/10.21683/1729-26462022-22-3-62-68