Project Title: Methodology for Increasing the Dependability of Information Systems for Critical Use with a Heterogeneous Wireless Interface
Project no.: 2022/45/P/ST7/03450
Host institution: Institute of Theoretical and Applied Informatics, Polish Academy of Sciences
Personal Investigator: Viacheslav Kovtun
Project Dates: 01/09/2023 - 31/08/2025
Alan Cooper said, "Inefficient mechanical systems can cost a couple of cents on every part, but poor information processes can lose an entire company." I will add this apt quote to the fact that due to poor information processes related to the critical system (nuclear power plant, controlled traffic light, self-driving car), you can lose not only business but also life.
The modern critical system is far from a "black box". It is a conglomeration of connected, synchronously functioning elements, including people – both operators and users. And communication is the factor that makes a set of elements of the system. Communication technologies as the basis of the information society are evolving extremely fast: 1, 2, 3, 4, 5G. This is when it comes to mobile technology, without which modern man can no longer imagine. Similarly, the implementation of modern information systems for critical use (ISCU) can not ignore the impact of heterogeneous communication interface on the quality of their operation.
But how do measure the quality of ISCU? To answer this question, let's pay attention to the term "dependability" in the title of the project. Dependability is a set of indicators that allow a comprehensive assessment of the reliability and information security of a modern system with hardware and information components.
To increase the dependability, it is necessary to formulate such an algorithm for influencing the controlled parameters of the target system, so that as a result, either reliability, information security, or both of these qualities increase. Human experience shows that such an algorithm can be formed by the enumeration method. But we do not think that such an approach is successful when it comes to ISCU. That is why we in the project will resort to mathematical modelling, which will allow us to obtain an adequate problematic mathematical description of 5G communication and service processes in ISCU. It is problematic because the real processes do not take place in ideal laboratory conditions.
In our models, we take into account the impact of five current issues in the context of the project theme.
The first problem is that the speed of the 5G connection is achieved by focusing the channel of information exchange between the subscriber and the base station. If there is an obstacle between these subjects (another person, a car), the canal begins to degrade until it breaks prematurely. The problem is complicated by the fact that both the subscriber and the obstacle can be mobile. Our task is to determine how many resources the base station can spend to compensate for the phenomenon of degradation of the channel of a particular subscriber without limiting the capabilities of other subscribers.
The second problem is similar to the first, but due to a "fundamental" reason. It manifests itself when the subscriber's apartment from the base station begins to close by, for example, a new building. Our goal is to exploit the phenomenon of heterogeneity and get around the hurdle by combining 5G and WiFi technology. It is important to rationally spatially place a set of WiFi routers.
The third problem is due to the resource-competitive nature of eMBB and mMTC technologies of the 5G platform. EMBB technology is focused on meeting the information needs of humans, and mMTC technology is focused on supporting the functioning of networks of Internet of Things (IoT) devices. The amount of communication resources of the base station is finite. Our task is to manage eMBB and mMTC traffic according to the set priorities. This problem will soon be significantly exacerbated. If IoЕ devices now generate compact textual content, in the coming years of Industry 4.0, these devices will actively generate video content (municipal video surveillance, virtually controlled industry).
The fourth problem is the threat of cyber-physical attacks on ISCU. If such an attack is successful, the hacker can, for example, gain control of automated municipal infrastructure, medical implants, self-driving vehicles, and from the information dimension to damage the physical dimension, endangering both property and human lives. Our task is to determine a rational protection scheme by the level of aggressiveness of the area of cyberspace, where the target ISCU operates, and the potential vulnerability of its components.
The fifth problem is that there is no perfect information security. Any system will end up in a non-functional state. However, the emergency transition of the ISCU to this state is unacceptable. When detecting signs of failure of the ISCU’s information security subsystem from the negative impact an appropriate information security protocol should be initiated. Our task is to assess the probability of such a circumstance, taking into account the level of aggressiveness of cyberspace and the cost of information security measures.
At final stage we will combine a set of mathematical models into a methodology, experimenting with which we will determine the optimal algorithms to increase the dependability of the ISCU with a heterogeneous wireless interface, which will be measured to prevent the above problems.
The results of the project will increase the reliability and security of Poland's critical information infrastructure, as well as make access to the information of each of its citizens more comfortable, as a more stable opportunity to communicate with family and friends is invaluable.
Published journal articles:
- V. Kovtun, O. Kovtun, K. Grochla, and K. Połys, “Assessment of Communication Resource Allocation by the Transmission Control Protocol for the Target Virtual Connection under Competitive Conditions,” Electronics, vol. 13, no. 7. MDPI AG, p. 1180, Mar. 22, 2024. doi: 10.3390/electronics13071180. Link Dataset
- V. Kovtun, K. Grochla, E. Zaitseva, and V. Levashenko, “The concept of optimal planning of a linearly oriented segment of the 5G network,” PLOS ONE, vol. 19, no. 4. Public Library of Science (PLoS), p. e0299000, Apr. 17, 2024. doi: 10.1371/journal.pone.0299000. Link Dataset
- V. Kovtun, K. Grochla, and K. Połys, “The concept of network resource control of a 5G cluster focused on the smart city’s critical infrastructure needs,” Alexandria Engineering Journal, vol. 94. Elsevier BV, pp. 248–256, May 2024. doi: 10.1016/j.aej.2024.03.038. Link Dataset
- V. Kovtun, K. Grochla, V. Kharchenko, M. A. Haq, and A. Semenov, “Stochastic forecasting of variable small data as a basis for analyzing an early stage of a cyber epidemic,” Scientific Reports, vol. 13, no. 1. Springer Science and Business Media LLC, Dec. 20, 2023. doi: 10.1038/s41598-023-49007-2. Link Dataset
Published conference papers:
- V. Kovtun, and O. Kovtun, “Service-Oriented Model for Handling mMTC Subscribers’ Traffic in a 5G Cluster.” In Proc. 5th 5th International Workshop on Intelligent Information Technologies & Systems of Information Security, CEUR-WS, vol. 3675, 2024; pp. 236-246. Link Dataset
- Kovtun, and O. Kovtun, “The Concept of Efficient Utilization of the Uplink Frequency Resource of a Smart Factory 5G Cluster by IIoT Devices.” In Proc. 8th International Conference on Computational Linguistics and Intelligent Systems. Volume I: Machine Learning Workshop, CEUR-WS, vol. 3664, 2024; pp. 273-283. Link Dataset
This research is part of the project No. 2022/45/P/ST7/03450 co-funded by the National Science Centre and the European Union Framework Programme for Research and Innovation Horizon 2020 under the Marie Skłodowska-Curie grant agreement No. 945339. For the purpose of Open Access, the author has applied a CC-BY public copyright licence to any Author Accepted Manuscript (AAM) version arising from this submission.