Author:
Manaenko Sergey,Dvornikov Sergey,Pshenichnikov Alexander
Abstract
Receiving and transmitting paths of modern radio communication systems are built on the basis of an open structure that provides hierarchical differentiation of access to the provided telecommunication services. However, this approach does not exclude the possibility of access to the transmitted content by unauthorized users. Hiding information by methods of cryptographic protection in such a situation only activates additional interest in transmission, therefore the most pragmatic solution is to use signals of a complex structure, which significantly complicate or even exclude the extraction of information from them by third-party users. The problem of regulating access selection in the development and design radio system elements is rather multifaceted and has a high degree of complexity. One of the directions for solving problems in this subject area is based on the well-known approaches to expanding the signal base, however, algorithms for their practical implementation were obtained without taking into account the limitations on the allocated resource and the very fact of using these algorithms. Based on the theory of systems and the general theory of communication, an approach to the formation of signal structures of a complex structure has been developed, which ensures an increase in the properties of their structural secrecy in relation to unauthorized users. At the same time, the known solutions at the physical level of signal spaces were refined, which made it possible to formalize the procedures for the formation of radio signals with specified properties. The method of formalizing the function of displaying the signal space based on the allocation of stochastic properties of pseudo-random sequences has been substantiated, which made it possible to ensure the uncertainty of their structure in case of unauthorized processing. The approbation of the proposed approach is given on the example of the formation of quadrature modulation signals, taking into account the subsequent analysis of their properties from various positions of legitimate and illegitimate users. The results obtained confirm the uncertainty during illegitimate processing with a slight deterioration in the noise immunity properties of radio communication systems. In general, this allows to conclude the adequacy of theoretical solutions. As an example, constellation diagrams of signals at the output of a quadrature receiver are presented. The set of proposed technical solutions presented in the work determines the novelty of this approach. The scientific problem to be solved belongs to the class of problems of synthesis of signals of complex structures.
Subject
Artificial Intelligence,Applied Mathematics,Computational Theory and Mathematics,Computational Mathematics,Computer Networks and Communications,Information Systems
Reference45 articles.
1. Мальцев Г.Н., Харченко А.В., Штанько С.В. Сравнительный анализ методов ограничения и управления доступом в радиотехнических системах с широковещательной передачей информации // Труды Военно-космической академии имени А.Ф. Можайского. 2018. № 665. С. 56-68.
2. Макаренко С.И. Информационное противоборство и радиоэлектронная борьба в сетецентрических войнах начала XXI века // Санкт-Петербург. 2017.
3. Штанько С.В. Ограничение несанкционированного доступа в радиотехнических системах с широковещательной передачей информации // Информационно-управляющие системы. 2018. № 5 (96). С. 57-65.
4. Moldovyan D.N., Moldovyan N.A., Moldovyan A.A. Commutative encryption method based on Hidden logarithm problem. Bulletin of the South Ural State University. Series: Mathematical Modelling, Programming and Computer Software. 2020. vol. 13. no. 2. pp. 54-68.
5. Moldovyan A.A., Moldovyan N.A., Phieu N.H., Nguyen H.M., Tran C.M.Digital signature algorithms based on Hidden discrete logarithm problem. Advances in Intelligent Systems and Computing. 2020. vol. 1014. pp. 1-12.