Development of functionality principles for the automated data transmission system through wireless communication channels to ensure information protection

Authors

DOI:

https://doi.org/10.15587/1729-4061.2024.310547

Keywords:

data transmission system, radio signal emitter, magnetic field, radio monitoring, socio-cyberphysical system

Abstract

The development of data transmission systems based on wireless radio communication channels allowed the construction of fundamentally new networks – mesh networks, which are used not only in smart technologies, but are the basis for the construction of cyber-physical and socio-cyber-physical systems (objects of critical infrastructure). The object is the process of ensuring reliable and secure data transmission based on the use of wireless radio communication channels. A mathematical model of information resources protection system functioning is proposed to ensure the signs of immunity and security of the automated data transmission system. To identify threats, a unified classifier and flow state estimation technique are used, which take into account the hybridity and synergy of targeted (mixed) attacks on communication channels. The critical points of the infrastructure elements, as well as the information that circulates and/or is stored, are determined. The assessment of compliance with the regulators’ requirements, both international and state regulatory acts, and the presence and ability of the security system elements to ensure the required level of infrastructure elements protection is taken into account. The proposed approach allows to determine: coefficients of information and internal availability of a wireless radio communication channel, the vector potential of the lagging magnetic field as a result of data transmission work. When evaluating the coefficient of a wireless radio communication channel internal availability, it is proposed to take into account coherent reception of the signal. At the same time, the immunity factor of the wireless radio communication channel is much higher than 1, which provides sufficient protection of information. A technical solution is proposed that will allow the level of confidentiality, integrity, authenticity and reliability of a wireless radio communication channel to approach 100 %The development of data transmission systems based on wireless radio communication channels allowed the construction of fundamentally new networks – mesh networks, which are used not only in smart technologies, but are the basis for the construction of cyber-physical and socio-cyber-physical systems (objects of critical infrastructure). The object is the process of ensuring reliable and secure data transmission based on the use of wireless radio communication channels. A mathematical model of information resources protection system functioning is proposed to ensure the signs of immunity and security of the automated data transmission system. To identify threats, a unified classifier and flow state estimation technique are used, which take into account the hybridity and synergy of targeted (mixed) attacks on communication channels. The critical points of the infrastructure elements, as well as the information that circulates and/or is stored, are determined. The assessment of compliance with the regulators’ requirements, both international and state regulatory acts, and the presence and ability of the security system elements to ensure the required level of infrastructure elements protection is taken into account. The proposed approach allows to determine: coefficients of information and internal availability of a wireless radio communication channel, the vector potential of the lagging magnetic field as a result of data transmission work. When evaluating the coefficient of a wireless radio communication channel internal availability, it is proposed to take into account coherent reception of the signal. At the same time, the immunity factor of the wireless radio communication channel is much higher than 1, which provides sufficient protection of information. A technical solution is proposed that will allow the level of confidentiality, integrity, authenticity and reliability of a wireless radio communication channel to approach 100 %

Author Biographies

Serhii Yevseiev, National Technical University “Kharkiv Polytechnic Institute”

Doctor of Technical Sciences, Professor

Department of Cybersecurity

Stanislav Milevskyi, National Technical University “Kharkiv Polytechnic Institute”

PhD, Associate Professor

Department of Cybersecurity

Vladyslav Sokol, National Technical University “Kharkiv Polytechnic Institute”

PhD

Department of Cybersecurity

Vladyslav Yemanov, National Academy of the National Guard of Ukraine

Doctor of Sciences in Public Administration, Senior Researcher

Anatolii Volobuiev, The Central Research Institute of the Armed Forces of Ukraine

Doctor of Technical Sciences, Senior Researcher

Chef of Research Department

Larysa Dakova, State University of Information and Communication Technologies

PhD, Associate Professor

Department of Mobile and Video Information Technologies

Mykola Brailovskyi, Taras Shevchenko National University of Kyiv

PhD, Associate Professor

Department of Cyber Security and Information Protection

Irada Rahimova, Azerbaijan Technical University

PhD in Technology, Assistant Professor

Department of Computer Technologies

Vladyslav Kravchenko, State University of Information and Communication Technologies

PhD, Associate Professor

Deputy Director

Educational-Scientific Institute оf Telecommunications

Oleg Cherniavskiy, National Technical University “Kharkiv Polytechnic Institute”

PhD Student

Department of Tactical and Special Disciplines

References

  1. Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M., Hrytsyk, V., Milov, O. et al.; Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M. (Eds.) (2022). Modeling of security systems for critical infrastructure facilities. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 196. https://doi.org/10.15587/978-617-7319-57-2
  2. Yevseiev, S., Kuznietsov, O., Herasimov, S., Horielyshev, S., Karlov, A., Kovalov, I. et al. (2021). Development of an optimization method for measuring the Doppler frequency of a packet taking into account the fluctuations of the initial phases of its radio pulses. Eastern-European Journal of Enterprise Technologies, 2 (9 (110)), 6–15. https://doi.org/10.15587/1729-4061.2021.229221
  3. Sokolov, A. Y. (1999). Algebraic approach on fuzzy control. IFAC Proceedings Volumes, 32 (2), 5386–5391. https://doi.org/10.1016/s1474-6670(17)56917-7
  4. Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. https://doi.org/10.15587/978-617-7319-31-2
  5. Shao, R., Ding, C., Liu, L., He, Q., Qu, Y., Yang, J. (2024). High-fidelity multi-channel optical information transmission through scattering media. Optics Express, 32 (2), 2846. https://doi.org/10.1364/oe.514668
  6. Dao, V. A., Thanh Thuy, T. T., Quoc Bao, V. N., Dung, T. C., Quyen, N. X. (2024). Design of A Chaos-based Digital Radio over Fiber Transmission Link using ASK Modulation for Wireless Communication Systems. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 11 (1). https://doi.org/10.4108/eetinis.v11i1.4530
  7. M, S., Kandasamy, R., Kumar, S. S. (2022). A Novel Approach on Cognitive Radio Sensor Networks for Efficient Data Transmission. https://doi.org/10.21203/rs.3.rs-1735166/v1
  8. Lacey, K. (2024). Communication in the Radio Century. The Oxford Handbook of Radio and Podcasting, 733–748. https://doi.org/10.1093/oxfordhb/9780197551127.013.34
  9. Ren, Y., Wu, Y., Tu, Z. (2024). A Multi-Channel Chromatic Dispersion Compensation for 15-km Front-Haul Transmission. Optical Fiber Communication Conference (OFC) 2024. https://doi.org/10.1364/ofc.2024.w2b.11
  10. Park, J., Choi, D. (2023). Improvement and Utilization of Auxiliary Radio Communication System. Journal of the Korean Society of Hazard Mitigation, 23 (3), 83–93. https://doi.org/10.9798/kosham.2023.23.3.83
  11. Soliman, N. F., Fadl-Allah, F. E., El-Shafai, W., Aly, M. I., Alabdulhafith, M., El-Samie, F. E. A. (2024). A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models. Computers, Materials & Continua, 79 (1), 201–241. https://doi.org/10.32604/cmc.2024.046757
  12. Youvan, D. (2024). Silent Waves: The Role of Ham Radio in a Fictional Communication Blackout Scenario. https://doi.org/10.13140/RG.2.2.23193.19044
  13. Kolawole, W. (2024). Enhancing Data Security through Chaotic Encryption for Secure Transmission. Available at: https://www.researchgate.net/publication/380179574_Enhancing_Data_Security_through_Chaotic_Encryption_for_Secure_Transmission
  14. Renteria, L., Jínez, J., Torres, K., Ramos, J. (2023). Data transmission system through FM radio applying Data over Sound techniques. Novasinergia, 6 (2), 129–139. https://doi.org/10.37135/ns.01.12.08
  15. Soni, V. (2024). ED-SS based Cognitive Radio (CR) over Various Fading Channels for Modern Wireless Communications. Journal of Electrical Systems, 20 (7s), 1406–1423. https://doi.org/10.52783/jes.3713
  16. Mak, B., Arya, S., Wang, Y., Ashdown, J. (2023). Characterization of Low-Latency Next-Generation eVTOL Communications: From Channel Modeling to Performance Evaluation. Electronics, 12 (13), 2838. https://doi.org/10.3390/electronics12132838
  17. Guan, K., Kürner, T., Rupp, M., Nekovee, M. (2024). Guest Editorial: Channel Modeling and Signal Processing for Terahertz Communications. IEEE Communications Magazine, 62 (2), 14–15. https://doi.org/10.1109/mcom.2024.10439199
  18. Yakovlev, M., Volobuev, A., Pribyliev, Yu. (2024). Mathematical modeling of the processes of functioning of automated military radio communication systems in terms of their protection against radio reconnaissance. The Collection of Scientific Works of the National Academy of the National Guard of Ukraine, 1 (43), 130–144. https://doi.org/10.33405/2409-7470/2024/1/43/307934
  19. Makhmudov, F., Privalov, A., Privalov, A., Kazakevich, E., Bekbaev, G., Boldinov, A. et al. (2024). Mathematical Model of the Process of Data Transmission over the Radio Channel of Cyber-Physical Systems. Mathematics, 12 (10), 1452. https://doi.org/10.3390/math12101452
  20. Luat, P. N., Taparugssanagorn, A., Kaemarungsi, K., Phoojaroenchanachai, C. (2024). Spatial Simultaneous Functioning-Based Joint Design of Communication and Sensing Systems in Wireless Channels. Applied Sciences, 14 (12), 5319. https://doi.org/10.3390/app14125319
  21. Kumar, P., Saxena, V. (2024). Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange. Journal of Computer and Communications, 12 (02), 201–210. https://doi.org/10.4236/jcc.2024.122012
  22. Mikoni, S. V. (2023). Approach to assessing the level of intelligence of an information system. Ontology of Designing, 13 (1), 29–43. https://doi.org/10.18287/2223-9537-2023-13-1-29-43
  23. Ramsden, J. (2023). The Transmission of Information. Bioinformatics, 75–91. https://doi.org/10.1007/978-3-030-45607-8_7
  24. Laue, F., Jamali, V., Schober, R. (2023). RIS-Assisted Device Activity Detection With Statistical Channel State Information. IEEE Transactions on Wireless Communications, 22 (12), 9473–9487. https://doi.org/10.1109/twc.2023.3271365
  25. Vähä-Savo, L., Veggi, L., Vitucci, E. M., Icheln, C., Degli-Esposti, V., Haneda, K. (2023). Analytical Characterization of a Transmission Loss of an Antenna-Embedded Wall. https://doi.org/10.36227/techrxiv.170244520.01558910/v1
  26. Elzinga, R., Janssen, M. J., Wesseling, J., Negro, S. O., Hekkert, M. P. (2023). Assessing mission-specific innovation systems: Towards an analytical framework. Environmental Innovation and Societal Transitions, 48, 100745. https://doi.org/10.1016/j.eist.2023.100745
  27. Kramer, G. (2023). Information Rates for Channels with Fading, Side Information and Adaptive Codewords. Entropy, 25 (5), 728. https://doi.org/10.3390/e25050728
  28. dos Santos, A., Barros, M. T. C. de, Correia, P. F. (2015). Transmission line protection systems with aided communication channels – Part II: Comparative performance analysis. Electric Power Systems Research, 127, 339–346. https://doi.org/10.1016/j.epsr.2015.05.010
  29. Enquist, M., Ghirlanda, S., Lind, J. (2023). Acquisition and Transmission of Sequential Information. The Human Evolutionary Transition, 167–176. https://doi.org/10.23943/princeton/9780691240770.003.0012
  30. Menezes, T. S., Barra, P. H. A., Dizioli, F. A. S., Lacerda, V. A., Fernandes, R. A. S., Coury, D. V. (2023). A Survey on the Application of Phasor Measurement Units to the Protection of Transmission and Smart Distribution Systems. Electric Power Components and Systems, 52 (8), 1379–1396. https://doi.org/10.1080/15325008.2023.2240320
  31. Ribeiro, E. P. A., Lopes, F. V., Silva, K. M., Martins-Britto, A. G. (2023). Assessment of communication channel effects on time-domain protection functions tripping times. Electric Power Systems Research, 223, 109589. https://doi.org/10.1016/j.epsr.2023.109589
  32. Shmatko, O., Herasymov, S., Lysetskyi, Y., Yevseiev, S., Sievierinov, О., Voitko, T. et al. (2023). Development of the automated decision-making system synthesis method in the management of information security channels. Eastern-European Journal of Enterprise Technologies, 6 (9 (126)), 39–49. https://doi.org/10.15587/1729-4061.2023.293511
  33. Herasymov, S., Tkachov, A., Bazarnyi, S. (2024). Complex method of determining the location of social network agents in the interests of information operations. Advanced Information Systems, 8 (1), 31–36. https://doi.org/10.20998/2522-9052.2024.1.04
  34. Kozhushko, Ya., Karlov, D., Klimishen, O., Bortsova, M., Herasymov, S., Hrichanuk, O., Bykov, V. N. (2018). Comparison of the Efficiency of Some Images Superposition Algorithms Used in Aircraft Map-Matching Navigation Systems. 2018 IEEE 17th International Conference on Mathematical Methods in Electromagnetic Theory (MMET). https://doi.org/10.1109/mmet.2018.8460319
  35. Fedushko, S., Molodetska, K., Syerov, Y. (2023). Analytical method to improve the decision-making criteria approach in managing digital social channels. Heliyon, 9 (6), e16828. https://doi.org/10.1016/j.heliyon.2023.e16828
  36. Mookerjee, R., Samuel, J. (2023). Managing the security of information systems with partially observable vulnerability. Production and Operations Management, 32 (9), 2902–2920. https://doi.org/10.1111/poms.14015
  37. Marabissi, D., Abrardo, A., Mucchi, L. (2023). A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning. Mobile Networks and Applications, 28 (4), 1473–1481. https://doi.org/10.1007/s11036-023-02149-z
  38. Yevseiev, S., Khokhlachova, Yu., Ostapov, S., Laptiev, O., Korol, O., Milevskyi, S. et al.; Yevseiev, S., Khokhlachova, Yu., Ostapov, S., Laptiev, O. (Eds.) (2023). Models of socio-cyber-physical systems security. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 184. https://doi.org/10.15587/978-617-7319-72-5
  39. Framework for assessing the current state of protection. Available at: http://skl.khpi.edu.ua/
  40. Shmatko, O., Balakireva, S., Vlasov, A., Zagorodna, N., Korol, O., Milov, O. et al. (2020). Development of methodological foundations for designing a classifier of threats to cyberphysical systems. Eastern-European Journal of Enterprise Technologies, 3 (9 (105)), 6–19. https://doi.org/10.15587/1729-4061.2020.205702
  41. Aragon, N., Barreto, P. S. L. M., Bettaieb, S., Bidoux, L., Blazy, O., Deneuville, J.-C. et al. (2020). BIKE: Bit Flipping Key Encapsulation. Available at: https://bikesuite.org/files/v4.1/BIKE_Spec.2020.10.22.1.pdf
  42. Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J. M. et al. (2018). CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM. 2018 IEEE European Symposium on Security and Privacy (EuroS&P). https://doi.org/10.1109/eurosp.2018.00032
  43. Supersingular Isogeny Key Encapsulation (2022). Available at: https://sike.org/files/SIDH-spec.pdf
  44. HQC: Hamming Quasi-Cyclic An IND-CCA2 Code-based Public Key Encryption Scheme. NIST 4 th PQC Standardization Conference. Available at: https://csrc.nist.gov/csrc/media/Presentations/2022/hqc-update/images-media/session-4-gaborit-hqc-pqc2022.pdf
Development of functionality principles for the automated data transmission system through wireless communication channels to ensure information protection

Downloads

Published

2024-08-30

How to Cite

Yevseiev, S., Milevskyi, S., Sokol, V., Yemanov, V., Volobuiev, A., Dakova, L., Brailovskyi, M., Rahimova, I., Kravchenko, V., & Cherniavskiy, O. (2024). Development of functionality principles for the automated data transmission system through wireless communication channels to ensure information protection . Eastern-European Journal of Enterprise Technologies, 4(9 (130), 18–33. https://doi.org/10.15587/1729-4061.2024.310547

Issue

Section

Information and controlling system