Method of formation of a group signal based on pseudorandom permutation of chaotic signals implementations

Authors

  • Владимир Викторович Корчинский Odessa National Academy of Telecommunications named after O.S. Popov 65029, Odessa, St. Kovalska, 1, Ukraine

DOI:

https://doi.org/10.15587/2312-8372.2013.12106

Keywords:

chaotic signal, orthogonality, confidential, signature, unauthorized access, security, channel, protection

Abstract

In the last decade, the methods of information protection in respect to the first level of the reference model OSI have been acquiring a particular interest. An important place belongs to the emergence of complex modulation types, the development of broadband transmission systems and the implementation of the phenomenon of the dynamical chaos in the modern theory of information and communication. As a result, it becomes possible to create signal constructions, which have the properties of the transmission security, i.e. masking, which aim to reduce the effectiveness of unauthorized access devices for interception of messages at the level of physical channel.

The noise signals with repeatability of generated processes present a real interest for advanced communications, for example implementations of dynamic chaos.

The aim of the article is to develop a method of formation of a group signal based on a set of mutually orthogonal sequences of chaotic realizations with pseudorandom permutation when choosing an individual channel.

We have proposed a method of formation of a group signal based on a set of mutually orthogonal sequences of chaotic realizations for the communication system with code division of channels. To increase the structural security of transmission in a communication system we proposed to perform the permutation of orthogonal pseudorandom chaotic sequences for each individual channel according to a given principle.

Author Biography

Владимир Викторович Корчинский, Odessa National Academy of Telecommunications named after O.S. Popov 65029, Odessa, St. Kovalska, 1

Ph.D., associate professor


Department of information security and data

References

  1. Куприянов, А.И. Теоретические основы радиоэлектронной борьбы [Текст] / А. И. Куприянов, А. В. Сахаров. – М.: Вузовская книга, 2007. – 356 с.
  2. Шаньгин, А.И. Информационная безопасность компьютерных систем и сетей [Текст] / А.И. Шаньгин. – М.: ИД «Форум»: ИФРА-М, 2008. – 416 с.
  3. Гуляев, Ю.В. Информационные технологии на основе динамического хаоса для передачи, обработки, хранения и защиты информации [Текст] / Ю.В. Гуляев, Р.В. Беляев, Г.М. Воронцов и др. // Радиотехника и электроника. – 2003. – Т. 48. – № 10. – С. 1157–1185.
  4. Корчинский, В.В. Повышение структурной скрытности передачи систем с хаотическими сигналами [Текст] / В.В. Корчинский // Восточно-Европейский журнал передовых технологий. – 2013. – T. 1, N 9(61). – С. 53-57. – Режим доступу : URL : http://journals.uran.ua/eejet/article/view/9514.
  5. Захарченко, Н. В. Эффективность использования таймерных сигнальных конструкций в системах передачи с кодовым разделением каналов [Текст] / Н. В. Захарченко, В. В. Корчинский, Б. К. Радзимовский // Наукові праці ДонНТУ. – 2011. – Випуск № 20(182). – С. 145–151.
  6. Захарченко, Н. В. Многопользовательский доступ в системах передачи с хаотическими сигналами [Текст] / Н. В. Захарченко, В. В. Корчинский, Б. К. Радзимовский // Восточно-Европейский журнал передовых технологий. – 2011. – T. 5, N 9(53). – С. 26-29. – Режим доступу : URL : http://journals.uran.ua/eejet/article/view/1300.
  7. Richard, K. Recommendations of the National Institute of Standards and Technology [Text] / K. Richard, T. Walsh, W. Fries. – NIST SP 800-58. – 2005. – P. 93.
  8. Базова модель ВВС. – Geneva. Recomendation CCITT X.200. Reference Model of open systems interconnection for CCITT applications // Стандарт ISO 7498-1:1984. – 1991. – Р. 31.
  9. Carvalho, M. Using Mobile Agents as Roaming Security Guards to Test and Improve Security of Hosts and Networks Proceedings of the 2004 ACM Symposium on Applied Computing (SAC'04) [Text] / M. Carvalho, T. Cowin, N. Suri, M. Breedy, K. Ford. – ACM. – 2004.
  10. Pedireddy, T. Prototype Multi Agent Network Security System. Proceedings of the AAMAS'03. [Text] / T. Pedireddy, J. Vidal. – ACM. – 2003.
  11. Menezes, R. Self-Organization and Computer Security Proceedings of the 2005 ACM Symposium on Applied Computing (SAC'05) [Text] / R. Menezes. – ACM. – 2004.
  12. Valeyev, S. Multiagent Technology and Information System Security Proceedings of the 7th International Workshop on Computer Science and Information Technologies CSIT’2005. [Text] / S. Valeyev, T. Bakirov, D. Pogorelov, I. Starodumov. – Ufa, Russia, 2005. – Vol.1. – P. 195–200.
  13. Kupriyanov, A., Sakharov, A.V. (2007) Speculatiuis fundamenta electronic militia. Moscow: Vuzovskaya librum, 356 p.
  14. Shangin, A.I. (2008) Information securitatem computer ratio quod networks. Moscow: Publishing Domus "Forum": Ifrane-M, 416 p.
  15. Gulyaev, Y., Belyaev, R.V., Vorontsov, G.M. (2003) Information technology substructio in dynamic chaos pro transmissio, processus, repono et tutela of notitia. Radiotekhnika i elektronika, V. 48, № 10, 1157–1185.
  16. Korchinsky, V.V. (2013). Increase of the structural stealthiness of transmission of systems with chaotic signals. Eastern-European Journal Of Enterprise Technologies, 1(9(61)), 53-57.
  17. Zakharchenko, N.V., Korchinsky, V.V., Radzimovsky, B.K. (2011). Efficens timer signum structurae in communicationes, codice-divisio multiple access. Naukovі pratsі DonNTU. № 20(182), 145–151.
  18. N.V. Zakharchenko V.V. Korchinsky, B.K. Radzimovsky (2011). Multi-user access in a transmission system with chaotic signals. Eastern-European Journal Of Enterprise Technologies, 5(9(53)), 26-29.
  19. Richard, K., Walsh , T., Fries, W. (2005) Security Considerations for Voice Over IP Systems Recommendations of the National Institute of Standards and Technology. – NIST SP 800-58, P. 93.
  20. Базова модель ВВС. – Geneva. (1991) Recomendation CCITT X.200. Reference Model of open systems interconnection for CCITT applications Стандарт ISO 7498-1:1984. Р. 31.
  21. Carvalho, M., Cowin, T., Suri, N., Breedy, M., Ford, K. (2004) Using Mobile Agents as Roaming Security Guards to Test and Improve Security of Hosts and Networks Proceedings of the 2004 ACM Symposium on Applied Computing (SAC'04). – ACM.
  22. Pedireddy, T., Vidal, J.,(2003) Prototype Multi Agent Network Security System. Proceedings of the AAMAS'03. – ACM.
  23. Menezes, R., (2005) Self-Organization and Computer Security Proceedings of the 2005 ACM Symposium on Applied Computing (SAC'05). – ACM.
  24. Valeyev, S., Bakirov, T., Pogorelov, D., Starodumov, I.(2005) Multiagent Technology and Information System Security Proceedings of the 7th International Workshop on Computer Science and Information Technologies CSIT’2005. – Vol.1, Ufa, Russia, P. 195–200.

Published

2013-02-27

How to Cite

Корчинский, В. В. (2013). Method of formation of a group signal based on pseudorandom permutation of chaotic signals implementations. Technology Audit and Production Reserves, 1(1(9), 22–24. https://doi.org/10.15587/2312-8372.2013.12106