Abstract:
The implementation of the smart city concept implies a transition from traditional computer networks with a clear information perimeter to next-generation networks. Distributed subsystems of a smart city are characterized by a reconfigurable network topology, openness, node mobility, and the construction of information protection based on distributed ledgers, which also opens up new opportunities for intruders. The situation is complicated by the fact that the speed of creating new digital infrastructures exceeds the speed of developing security tools that meet current challenges. Given the specific properties of the secured object, the dynamics of security threats, and the limited choice of security mechanisms, it is necessary to continuously evaluate the security efficiency and reconfigure it to maintain a higher level of security. As a result of the analysis of existing solutions for information security evaluation, it was found that they operate in a proactive mode and do not take into account the high dynamics of the "threat-protection" system. This paper presents a constructed model for evaluating the efficiency of information security, based on a nonlinear dynamic model of competition for influence on the functioning of the information infrastructure. To maintain a sustainable state of the smart city system, it is necessary to meet the criterion on the ratio of the speed of detection and development of a computer attack in the infrastructure. The developed experimental model emulated the scenarios of development of computer attacks "exploitation of software vulnerability "distributed denial of service "black hole and "majority attack" using the test sample of the intelligent transport network VANET in the smart city in various configurations of the security system. During the comparative analysis of different configurations of the VANET security system, it was shown that a test case implementing attack detection using a convolutional neural network, dynamic routing based on the ant swarm algorithm, and the Hashgraph protocol with an embedded trust model satisfies the sustainability criterion. The use of the proposed evaluation model allows for reasonable control and dynamic adjustment of the security configuration.
Keywords:distributed ledger, sustainability criterion, competition model, efficiency assessment, speed of computer attack, sustainability point, smart city.