Method of improvement of structural security of transmission of information in multi-user access communication system

Authors

  • Владимир Викторович Корчинский Odessa National Academy of Telecommunications named after O.S. Popov, Ukraine

DOI:

https://doi.org/10.15587/2312-8372.2013.14894

Keywords:

Timer, signal, level, confidential, signature, unauthorized access, security, channel protection

Abstract

Currently, the design of confidential communications multi-user access systems encourages a particular interest of transmission methods, which provide not only an increase of channel capacity, but also improve the security of transmitted signals. Transmission security is one of the important indicators of noise immunity and it determines the ability of a system to resist the actions aimed at detection of a signal and scanning of its parameters.

The article proposes a method of forming a group signal based on a plurality of multi-level timer signal designs with their division according to the level. To improve the structural security of information signals of individual channels, the system uses multi-level timer signals, which are then combined into a group signal. In order to reduce the effectiveness of unauthorized access means for the procedure of decoding of an intercepted signal the method of division of timer signal constructions according to the level is used.

The purpose of the article is to develop a method of forming a group signal based on a plurality of multi-level timer signal designs with their division according to the level.

The proposed method of forming signal designs can be recommended for the construction of confidential multi-user access systems, in which additional measures are taken to protect the information on the first level of the reference model OSI

Author Biography

Владимир Викторович Корчинский, Odessa National Academy of Telecommunications named after O.S. Popov

Ph.D., associate professor
Department of information security and data

References

  1. Куприянов, А.И. Теоретические основы радиоэлектронной борьбы [Текст] / А. И. Куприянов, А. В. Сахаров. – М.: Вузовская книга, 2007. – 356 с.
  2. Шаньгин, А.И. Информационная безопасность компьютерных систем и сетей [Текст] / А.И. Шаньгин. – М.: ИД «Форум»: ИФРА-М, 2008. – 416 с.
  3. Гуляев, Ю.В. Информационные технологии на основе динамического хаоса для передачи, обработки, хранения и защиты информации [Текст] / Ю.В. Гуляев, Р.В. Беляев, Г.М. Воронцов и др. // Радиотехника и электроника. – 2003. – Т. 48. – № 10. – С. 1157–1185.
  4. Корчинский, В.В. Повышение структурной скрытности передачи систем с хаотическими сигналами [Текст] / В.В. Корчинский // Восточно-Европейский журнал передовых технологий. – 2013. – T. 1, N 9(61). – С. 53-57. – Режим доступу : URL : http://journals.uran.ua/eejet/article/view/9514.
  5. Захарченко, Н. В. Эффективность использования таймерных сигнальных конструкций в системах передачи с кодовым разделением каналов [Текст] / Н. В. Захарченко, В. В. Корчинский, Б. К. Радзимовский // Наукові праці ДонНТУ. – 2011. – Випуск № 20(182). – С. 145–151.
  6. Темников, Ф. Е. Теоретические основы информационной техники [Текст] / Ф. Е. Темников, В. А. Афонин, В. И. Дмитриев – М.: Энергия, 1979. –512 с.
  7. Richard, K. Recommendations of the National Institute of Standards and Technology [Text] / K. Richard, T. Walsh, W. Fries. – NIST SP 800-58. –2005. – P. 93.
  8. Базова модель ВВС. – Geneva [Text] / Recomendation CCITT X.200. Reference Model of open systems interconnection for CCITT applications // Стандарт ISO 7498-1:1984. – 1991. – Р. 31.
  9. Carvalho, M. Using Mobile Agents as Roaming Security Guards to Test and Improve Security of Hosts and Networks Proceedings of the 2004 ACM Symposium on Applied Computing (SAC'04) [Text] / M. Carvalho, T. Cowin, N. Suri, M. Breedy, K. Ford. – 2004. – ACM.
  10. Pedireddy, T. Prototype Multi Agent Network Security System. Proceedings of the AAMAS'03 [Text] / T. Pedireddy, J. Vidal. – 2003. – ACM.
  11. Menezes, R. Self-Organization and Computer Security Proceedings of the 2005 ACM Symposium on Applied Computing (SAC'05) [Text] / R. Menezes. – 2005. – ACM.
  12. Valeyev, S. Multiagent Technology and Information System Security Proceedings of the 7th International Workshop on Computer Science and Information Technologies CSIT’2005 [Text] / S. Valeyev, T. Bakirov, D. Pogorelov, I. Starodumov. – Vol.1. – Ufa, Russia. – 2005. – pp. 195–200.
  13. Kupriyanov, A. I. Saharov, A. V. (2007). Teoreticheskie osnovy radiojelektronnoj bor'by. M.: Vuzovskaja kniga. 356p.
  14. Shan'gin, A.I. (2008). Informacionnaja bezopasnost' komp'juternyh sistem i setej. M.: ID «Forum»: IFRA-M. 416p.
  15. Gulyaev, Yu.V., Belyaev, R.V., Voroncov, G.M. and others. (2003). Informacionnye tehnologii na osnove dinamicheskogo haosa dlja peredachi, obrabotki, hranenija i zashhity informacii. Radiotehnika i jelektronika, T. 48, № 10, 1157–1185.
  16. Korchinskyy, V.V. (2013). Increase of the structural stealthiness of transmission of systems with chaotic signals. Eastern-European Journal Of Enterprise Technologies, 1(9(61)), 53-57.
  17. Zaharchenko, N. V., Korchinskyy, V. V., Radzimovskyy, B. K. (2011). Jeffektivnost' ispol'zovanija tajmernyh signal'nyh konstrukcij v sistemah peredachi s kodovym razdeleniem kanalov . Naukovі pracі DonNTU, Vipusk № 20(182), 145–151.
  18. Temnikov, F. E., Afonin V. A., Dmitriev, V. I. (1979). Teoreticheskie osnovy informacionnoj tehniki. M.: Jenergija. 512p.
  19. Richard, K., Walsh, T., Fries, W. (2005). Recommendations of the National Institute of Standards and Technology. – NIST SP 800-58, P. 93.
  20. Bazova model' VVS. – Geneva. (1991). Recomendation CCITT X.200. Reference Model of open systems interconnection for CCITT applications. Standart ISO 7498-1:1984. P. 31.
  21. Carvalho, M., Cowin, T., Suri, N., Breedy, M., Ford, K. (2004). Using Mobile Agents as Roaming Security Guards to Test and Improve Security of Hosts and Networks Proceedings of the 2004 ACM Symposium on Applied Computing (SAC'04). – ACM.
  22. Pedireddy, T., Vidal, J. (2003). Prototype Multi Agent Network Security System. Proceedings of the AAMAS'03. – ACM.
  23. Menezes, R. (2005). Self-Organization and Computer Security Proceedings of the 2005 ACM Symposium on Applied Computing (SAC'05). – ACM.
  24. Valeyev, S., Bakirov, T., Pogorelov, D., Starodumov, I. (2005). Multiagent Technology and Information System Security Proceedings of the 7th International Workshop on Computer Science and Information Technologies CSIT’2005, Vol.1, Ufa, Russia, pp. 195–200.

Published

2013-06-20

How to Cite

Корчинский, В. В. (2013). Method of improvement of structural security of transmission of information in multi-user access communication system. Technology Audit and Production Reserves, 3(1(11), 20–23. https://doi.org/10.15587/2312-8372.2013.14894