Abstract
The article analyzes information security strategies, such as a strategic cooperative game of chicken, balancing business incentives and striving for brinkmanship, and ensuring sufficient security with minimal effort for customers and consumers while not impairing—and in some cases improving—the privacy of their infrastructure and the Internet of Things (IoT) security maturity model (SMM). The benefits of the latter strategy are estimated by selecting an architecture with the core of the IoT SMM in the form of a hierarchy of security practices. Algorithms ensuring privacy and protection from threats are analyzed. A methodology for analyzing and selecting the best architecture for multicore hierarchical clustering of computer systems is proposed. An expert system based on the on-chip MCNPAoC SBIS 1879BM8Y instrument module MS 127.05 with the proposed user interface is implemented.
REFERENCES
Rudina, E. and Goncharov, U., Maturity model of security of the Internet of Things: A boon for the development of secure systems of AO Laboratoriya Kasperskogo, 2019.
Jozwiak, L., Introduction to modern cyber-physical systems and their quality-driven design, Proc. 8th Mediterranean Conf. on Embedded Computing, CPS & IoT, MECO’2019, Budva, Montenegro, 2019, pp. 3–65.
Horst, F., A survey of problems in authenticated communication and control, MIT Lincoln Laboratory, 1958.
Chernikov, A., Chernikov, V., Vixne, P., and Shelukhin, A., New core of signal processor core NMC4 of set neuro matrix, Proc. 6th Moscow Supercomputing Forum, 2015, pp. 12–13.
Ruchkin, V., Fulin, V., Romanchuk, V., Koryachko, A., and Ruchkina, E., Personal trusted platform module for the multi-core system of 5G security and privacy, 2020 ELEKTRO, Taormina, Italy, 2020, IEEE, 2020, pp. 1–4. https://doi.org/10.1109/ELEKTRO49696.2020.9130294
Ruchkin, V.N., Kostrov, B.V., and Svirina, A.G., Sistemy iskusstvennogo intellekta. Neiroseti i neirokomp’yutery. Uchebnik (Artificial Intelligence Systems: Neural Networks and Neurocomputers: Textbook), Moscow: Kurs, 2018.
Ruchkin, G., Soldatov, V., Fulin, B., Kostrov, E., and Ruchkina, E., Macros for coding information encryption & decryption in trusted platform module, 2020 Int. Multi-Conf. on Industrial Engineering and Modern Technologies (FarEastCon), Vladivostok, 2020, IEEE, 2020, pp. 1–5. https://doi.org/10.1109/FarEastCon50210.2020.9271523
Zlobin, V.K. and Ruchkin, V.N., Neiroseti I neirokomp’yutery. Uchebnoe posobie (Neural Networks and Neurocomputers), St. Petersburg: BKhV-Peterburg, 2011.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by O. Pismenov
About this article
Cite this article
Ruchkin, V.N., Kostrov, B.V. & Fulin, V.A. Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture. Aut. Control Comp. Sci. 56, 970–980 (2022). https://doi.org/10.3103/S014641162208020X
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S014641162208020X