350 rub
Journal Neurocomputers №10 for 2016 г.
Article in number:
Spoofing resistant encoding information in radio channels with active analyzer
Authors:
A.A. Petlevanniy - Post-graduate in a Military College, Krasnodar Higher Military School named after S.M. Shtemenko E-mail: t911sr@mail.ru O.A. Finko - Dr.Sc. (Eng.), Professor, Krasnodar Higher Military School named after S.M. Shtemenko E-mail: ofinko@yandex.ru
Abstract:
This paper presents different approaches of prevention of false data entry that is processed in modern packet radio networks. Gradually discusses three protocols that describe the sequence of actions to be taken by the sending and receiving parties, and their analysis from the point of view of the analyst. In the first protocol proposes to use gamming cipher - method of crypto-graphic protection of information used in this paper, however, is not to ensure the confidentiality of data. It shows how to com-bine the strengths of encryption and jamproof signal coding implemented in the error-control equipment (ECE), working at the data link layer of the OSI model existing packet radio networks. The analysis of the first protocol shows that in pure form design is not applicable - analyst can construct an algorithm of breaking the proposed protection. Due to this, a second protocol was of-fered that allows to go from guaranteed breaking of protection systems by the analyst to probability breaking. In consequence of the analysis was obtained the obvious estimated probability of success simulative actions of the analyst. Presented a numerical example that simulates the sequence of actions of the analyst to simulate the system based on the Hamming code [7, 4, 3], us-ing the methods of linear algebra on the example of constructing a fundamental system of solutions relative to the set of va-riables unknown gamma. There were described jamproof codes suitable for use in conjunction with the proposed method of cryptographic protection of information. For the purpose of further enhance the degree of protection is given to the consideration of the third protocol, the analysis of which is carried out by the authors at the present time. In consequence given the conclu-sions of the research topic, provides a new challenge for further research in this subject area.
Pages: 13-21
References

 

  1. Boricov V.I., Zinchuk V.M., Limarev A.E., Nemchilov A.V., CHaplygin A.A. Prostranstvennye i verojatnostno-vremennye kharakteristiki ehffektivnosti stancijj otvetnykh pomekh pri podavlenii sistem radiosvjazi / Pod red. V.I. Borisova. M.: RadioSoft. 2008. 362 s.
  2. Finko O.A. Gruppovojj kontrol assimetrichnykh kriptosistem metodami moduljarnojj arifmetiki // Materialy XIV Mezhdunar. shkoly-seminara «Sintez i slozhnost upravljajushhikh sistem» (Nizhnijj Novgorod, 27 oktjabrja - 1 nojabrja 2003 g.) / Pod red. O.B. Lupanova. Nizhnijj Novgorod: Izdatelstvo Nizhegorodskogo pedagogicheskogo universiteta. 2003. S. 85-86.
  3. Finko O.A., Samojjlenko D.V. Konstrukcii, kontrolirujushhie oshibki, na osnove dejjstvujushhikh kriptograficheskikh standartov // Trudy XIII Mezhdunar. konf. «Diskretnye modeli v teorii upravljajushhikh sistem (Moskva, 6 - 9 aprelja 2009 g.) / Otv. red. V.B. Alekseev, V.A. Zakharov. M.: Izdatelskijj otdel fakulteta VMiK MGU im. M.V. Lomonosova. 2009. S. 318-320.
  4. Finko O.A., Samojjlenko D.V. Imitoustojjchivaja peredacha dannykh v zashhishhennykh sistemakh odnonapravlennojj svjazi na osnove polinomialnykh klassov vychetov // Nelinejjnyjj mir. 2013. № 9. S. 647-658.
  5. Blejjkhut R. Teorija i praktika kodov, kontrolirujushhikh oshibki. M.: Mir. 1986. 576 s.