The article discusses the issues of the possibility of using a swarm of unmanned aerial vehicles in remote agricultural areas to create a wide coverage area for transmitting information from ground-based wireless sensor networks. Architectural solutions for flying sensor networks are studied and a simulation model is presented that integrates flying sensor networks (FSN) and ground wireless sensor networks (WSN) for data transmission. The model studies clustering of a swarm of UAVs using the K-means method and finding the shortest path when routing using Dijkstra's algorithm. Computer simulation of optimal routing for a swarm of 250 UAVs has been carried out.
KEYWORDS: Information security, Databases, Network security, Data storage, Standards development, Computer security, Network architectures, Diagnostics, Information technology, Computing systems
The time of widespread digitalization in Russia could not but affect small businesses, many developing companies use local networks for their work, but despite their active use, issues related to information security are often ignored. It is worth considering that the exchange of data in local networks often does not provide the basic principles of information security: confidentiality, integrity and availability of information. With this approach to information protection, leaks and data corruption can occur, which can seriously affect the development, status and reputation of the organization. Within the framework of this article, a cryptographic information security system will be developed for a local network, for a company that is engaged in the wholesale of medicines. This company has access to confidential data of customers and partners, information on supplies and purchases, as well as its own trade secrets - these are exactly the data that must be reliably protected so that the company can confidently stand on its feet and withstand competition in the market.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.