The method of forming the signaling constructions based on a set of mutually orthogonal chaotic signals

Authors

  • Володимир Вікторович Корчинський Odessa National Academy of Telecommunications Kovalska str., 1, Odessa, Ukraine, 65029, Ukraine

DOI:

https://doi.org/10.15587/1729-4061.2013.12439

Keywords:

Chaotic signal, orthogonality, confidential, signature

Abstract

Most modern methods of information protection from unauthorized access are implemented mainly at the upper levels of the OSI reference model. The cryptographic methods of information security are used for this purpose. They are aimed to increase the information secrecy of confidential data, which serve for the storage or transmission by the communication channel.

Another important task is the protection of transferable information from unauthorized access at the first level of the OSI model. This problem is particularly urgent when ensuring the security of a wireless network security (for example, standard RadioEthernet), as on a physical level it is the most vulnerable to interception of messages transmitted to means of unauthorized access.

The introduction of the dynamical chaos into the area of information and communication technologies has opened new perspectives for the creation of the effective systems of encryption, as well as has increased the possibility of the synthesis of signal constructions which could provide potentially high structural secrecy of transmission at the level of physical channel. We have created various methods of formation of signal constructions based on a given set of mutually orthogonal chaotic signals. However, researches in this area have shown a new perspective on improvement of the method for the problem of increase of structural secrecy of transferable signal constructions. The purpose of the article is to develop a method of formation of the signal constructions based on a set of variable combinations of mutually orthogonal chaotic sequences

Author Biography

Володимир Вікторович Корчинський, Odessa National Academy of Telecommunications Kovalska str., 1, Odessa, Ukraine, 65029

PhD, Associate Professor

Department of Information Security and Data

References

  1. Шаньгин, А.И. Информационная безопасность компьютерных систем и сетей [Текст] / А.И. Шаньгин. – М.: ИД «Форум»: ИФРА-М, 2008. – 416 с.
  2. Куприянов, А.И. Теоретические основы радиоэлектронной борьбы [Текст] / А. И. Куприянов, А. В. Сахаров. – М.: Вузовская книга, 2007. – 356 с.
  3. Гуляев, Ю.В. Информационные технологии на основе динамического хаоса для передачи, обработки, хранения и защиты информации / [Ю.В. Гуляев, Р.В. Беляев, Г.М. Воронцов и др.] // Радиотехника и электроника. – 2003. – Т. 48. – № 10. – С. 1157–1185.
  4. Корчинский, В.В. Повышение структурной скрытности передачи систем с хаотическими сигналами [Текст] / В.В. Корчинский // Восточно-Европейский журнал передовых технологий //научный журнал. – Харьков: Технологический центр, 2013. – № 1/9 (61). – С.53.
  5. D. Richard Kuhn, Thomas J. Walsh, Steffen Fries. «Security Considerations for Voice Over IP Systems». Recommendations of the National Institute of Standards and Technology. – NIST SP 800-58, January 2005. – S. 93.
  6. Recomendation CCITT X.200. Reference Model of open systems interconnection for CCITT applications. Geneva, 1991; Стандарт ISO 7498-1:1984. Базова модель ВВС. – С. 31.
  7. Carvalho, M. Using Mobile Agents as Roaming Security Guards to Test and Improve Security of Hosts and Networks [Текст] / Carvalho M., Cowin T., Suri N., Breedy M., Ford K. // Proceedings of the 2004 ACM Symposium on Applied Computing (SAC'04). – ACM. – 2004.
  8. Pedireddy, T. A Prototype Multi Agent Network Security System [Текст] / Pedireddy T., Vidal J. // Proceedings of the AAMAS'03. – ACM. – 2003.
  9. Menezes, R. Self-Organization and Computer Security [Текст] / Menezes R. // Proceedings of the 2005 ACM Symposium on Applied Computing (SAC'05). – ACM. – 2005.
  10. Valeyev S.S. Multiagent Technology and Information System Security [Текст] / S.S.Valeyev, T.K. Bakirov, D.N. Pogorelov, I.V. Starodumov // Proceedings of the 7th International Workshop on Computer Science and Information Technologies CSIT’2005. – Vol.1, Ufa, Russia, 2005. – P. 195-200.
  11. Shangin AI Information securitatem computer ratio quod networks / AI Shangin. - Moscua: Publishing Domus "Forum": Ifrane-M, MMVIII. - CDXVI.
  12. A. Kupriyanov Speculatiuis fundamentum allo canénte, / A. Kupriyanov, AV Sakharov. - Moscua: Vuzovskaya librum, MMVII. - CCCLVI p.
  13. Yu.V. Gulyaev Information technology substructio in dynamic chaos pro transmissio, processus, repono et tutela of notitia / [yv Gulyaev, RV Belyaev, GM Vorontsov, etc] / / Radio Engineering et Books. - MMIII. - T. XLVIII. - № X. - P. 1157-1185.
  14. Korchinsky V.V. (2005) Augenda structural furtim transmissio ratio per tenebrarum significationibus / VV Korchinsky / / East European Acta proficiebat technology / / scientific Diario. - Kharkov: Technology Center, MMXIII. - № I / IX (LXI). - P.53.5. D. Richard Kuhn, Thomas J. Walsh, Steffen Fries. «Security Considerations for Voice Over IP Systems». Recommendations of the National Institute of Standards and Technology. – NIST SP 800-58, S. 93.
  15. D. Richard Kuhn, Thomas J. (2005) Walsh, Steffen Fries. «Security Considerations for Voice Over IP Systems». Recommendations of the National Institute of Standards and Technology. – NIST SP 800-58, S. 93.
  16. Recomendation CCITT X.200. (1991) Reference Model of open systems interconnection for CCITT applications. Geneva, Стандарт ISO 7498-1:1984. Базова модель ВВС. – С. 31.
  17. Carvalho M., Cowin T., Suri N., Breedy M., Ford K. (2004) Using Mobile Agents as Roaming Security Guards to Test and Improve Security of Hosts and Networks. // Proceedings of the 2004 ACM Symposium on Applied Computing (SAC'04). – ACM.
  18. Pedireddy T., Vidal J. (2003) A Prototype Multi Agent Network Security System. // Proceedings of the AAMAS'03. – ACM.
  19. Menezes R. (2005) Self-Organization and Computer Security. // Proceedings of the 2005 ACM Symposium on Applied Computing (SAC'05). – ACM.
  20. Valeyev S.S. (2004) Multiagent Technology and Information System Security / S.S. Valeyev, T.K. Bakirov, D.N. Pogorelov, I.V. Starodumov // Proceedings of the 7th International Workshop on Computer Science and Information Technologies CSIT’2005. – Vol.1, Ufa, P. 195-200.

Published

2013-04-25

How to Cite

Корчинський, В. В. (2013). The method of forming the signaling constructions based on a set of mutually orthogonal chaotic signals. Eastern-European Journal of Enterprise Technologies, 2(9(62), 21–24. https://doi.org/10.15587/1729-4061.2013.12439

Issue

Section

Information and controlling system