Theoretical Aspects in Forming Complex Structure Signal

Author:

Manaenko Sergey,Dvornikov Sergey,Pshenichnikov Alexander

Abstract

Receiving and transmitting paths of modern radio communication systems are built on the basis of an open structure that provides hierarchical differentiation of access to the provided telecommunication services. However, this approach does not exclude the possibility of access to the transmitted content by unauthorized users. Hiding information by methods of cryptographic protection in such a situation only activates additional interest in transmission, therefore the most pragmatic solution is to use signals of a complex structure, which significantly complicate or even exclude the extraction of information from them by third-party users. The problem of regulating access selection in the development and design radio system elements is rather multifaceted and has a high degree of complexity. One of the directions for solving problems in this subject area is based on the well-known approaches to expanding the signal base, however, algorithms for their practical implementation were obtained without taking into account the limitations on the allocated resource and the very fact of using these algorithms. Based on the theory of systems and the general theory of communication, an approach to the formation of signal structures of a complex structure has been developed, which ensures an increase in the properties of their structural secrecy in relation to unauthorized users. At the same time, the known solutions at the physical level of signal spaces were refined, which made it possible to formalize the procedures for the formation of radio signals with specified properties. The method of formalizing the function of displaying the signal space based on the allocation of stochastic properties of pseudo-random sequences has been substantiated, which made it possible to ensure the uncertainty of their structure in case of unauthorized processing. The approbation of the proposed approach is given on the example of the formation of quadrature modulation signals, taking into account the subsequent analysis of their properties from various positions of legitimate and illegitimate users. The results obtained confirm the uncertainty during illegitimate processing with a slight deterioration in the noise immunity properties of radio communication systems. In general, this allows to conclude the adequacy of theoretical solutions. As an example, constellation diagrams of signals at the output of a quadrature receiver are presented. The set of proposed technical solutions presented in the work determines the novelty of this approach. The scientific problem to be solved belongs to the class of problems of synthesis of signals of complex structures.

Publisher

SPIIRAS

Subject

Artificial Intelligence,Applied Mathematics,Computational Theory and Mathematics,Computational Mathematics,Computer Networks and Communications,Information Systems

Reference45 articles.

1. Мальцев Г.Н., Харченко А.В., Штанько С.В. Сравнительный анализ методов ограничения и управления доступом в радиотехнических системах с широковещательной передачей информации // Труды Военно-космической академии имени А.Ф. Можайского. 2018. № 665. С. 56-68.

2. Макаренко С.И. Информационное противоборство и радиоэлектронная борьба в сетецентрических войнах начала XXI века // Санкт-Петербург. 2017.

3. Штанько С.В. Ограничение несанкционированного доступа в радиотехнических системах с широковещательной передачей информации // Информационно-управляющие системы. 2018. № 5 (96). С. 57-65.

4. Moldovyan D.N., Moldovyan N.A., Moldovyan A.A. Commutative encryption method based on Hidden logarithm problem. Bulletin of the South Ural State University. Series: Mathematical Modelling, Programming and Computer Software. 2020. vol. 13. no. 2. pp. 54-68.

5. Moldovyan A.A., Moldovyan N.A., Phieu N.H., Nguyen H.M., Tran C.M.Digital signature algorithms based on Hidden discrete logarithm problem. Advances in Intelligent Systems and Computing. 2020. vol. 1014. pp. 1-12.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3