Determination of signal level for protection of information in case of its interception by technical means of intelligence

Authors

DOI:

https://doi.org/10.15587/2706-5448.2023.286193

Keywords:

telecommunication, radio engineering, technical protection of information, signal reduction, signal interception, radio intelligence

Abstract

The object of the current paper is the protection of information in the conditions of its interception by technical means of intelligence. According to this goal, considered the existing mathematical model of signal interception using radio-technical intelligence. In course of investigation, for getting final results based existing mathematical model analyzed the optimal scheme of signal detection with the help of intelligence receiver. As a result of this activity occurs four potential cases of signal detection which compared with established threshold H and accompanied by one of two error types: incorrect decision about the signal absence or incorrect indication of its presence. On the basis of the given cases suggested one of the possible variant for protecting of signal that goes beyond the controlled zone.

Using such dependencies as: an expression of the power flux density of radio electronic device antenna on its distance to the receiver in the direction of maximum radiation, the formula of signal power at the input of the receiving antenna, the ratio of the antennas coefficient of amplification and its effective scattering area was obtained: the dependence for calculating the power of output signal sufficient for reception within the controlled zone, but insufficient for its interception by technical means beyond its borders. Also, obtained graphical dependencies of minimal coefficient of amplification of transmitter antenna from maximal coefficient of amplification of transmitter antenna, from wavelength of radiation and from distance between transmitter and receiver.

Based on research results formed the conclusion regarding proposed method of information protection based on the mathematical model of the information leakage channel applying for radio intelligence.

Author Biography

Yevhen Pavlenko, National Technical University of Ukraine «Igor Sikorsky Kyiv Polytechnic Institute»

Postgraduate Student

Department of Applied Radioelectronics

References

  1. Korjik, V., Yakovlev, V., Babkov, I. (1997). The wire-tap channel concept against eavesdropping of indoor radio telephone. Proceedings of 8th International Symposium on Personal, Indoor and Mobile Radio Communications – PIMRC '97. Helsinki, 2, 477–479. doi: https://doi.org/10.1109/pimrc.1997.631047
  2. Zhao, J., Han, Z., Zhang, H., Liu, R. (2014). The design and implementation of invisible eavesdropping protection application. 2014 12th International Conference on Signal Processing (ICSP). Hangzhou, 2394–2397. doi: https://doi.org/10.1109/icosp.2014.7015423
  3. Jiang, J., Li, Y., Ma, X., Zhang, P., Fan, Y., Hao, Q. (2017). Research on noise quality in anti-eavesdropping system based on acoustic masking. 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). Chennai, 823–827. doi: https://doi.org/10.1109/wispnet.2017.8299876
  4. Lopez-Risueno, G., Grajal, J., Yeste-Jeda, O. A., Sanz-Osorio, A., Moreno, J. A. (2003). Two digital receivers based on time-frequency analysis for signal interception. 2003 Proceedings of the International Conference on Radar (IEEE Cat. No.03EX695). Adelaide, 394–399. doi: https://doi.org/10.1109/radar.2003.1278774
  5. Yavorskyy, B. (2004). Detection of low probability of interception signals in bases of almost periodical functions. Proceedings of the International Conference Modern Problems of Radio Engineering, Telecommunications and Computer Science. Lviv-Slavsko, 487–490.
  6. Xu, X., Jing, T. (2019). Design of Strong Signal Masking Covert Communication Transmission Scheme Based on OFDM System. 2019 IEEE 19th International Conference on Communication Technology (ICCT). Xi'an, 169–173. doi: https://doi.org/10.1109/icct46805.2019.8947096
  7. Yoon, S., Jeong, J., Jeong, H., Won, Y. (2008). Lawful Interception Scheme for Secure VoIP Communications Using TTP. International Symposium on Computer Science and its Applications. Hobart: TAS, 149–152. doi: https://doi.org/10.1109/CSA.2008.31
  8. Serkov, A., Tkachenko, V., Kharchenko, V., Pevnev, V., Trubchaninova, K. (2020). A Method to Enhance the Bandwidth and Noise Immunity of IIoT When Exposed to Natural and Intentional Electromagnetic Interference. 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T). Kharkiv, 527–532. doi: https://doi.org/10.1109/picst51311.2020.9467929
  9. Siahaeva, O. O. (2012). Doslidzhennia ta rozrobka matematychnoi modeli dzherela nebezpechnoho syhnalu vtraty informatsii v bankivskykh systemakh. Kharkiv, 24.
  10. Stepanov, M., Boiko, J., Pavlenko, Y. (2023). Determining the required signal level and masking noise to protect information in the conditions of its interception by technical means. Measuring and computing devices in technological processes, 2, 21–27. doi: https://doi.org/10.31891/2219-9365-2023-74-3
Determination of signal level for protection of information in case of its interception by technical means of intelligence

Downloads

Published

2023-08-24

How to Cite

Pavlenko, Y. (2023). Determination of signal level for protection of information in case of its interception by technical means of intelligence. Technology Audit and Production Reserves, 4(1(72), 25–28. https://doi.org/10.15587/2706-5448.2023.286193

Issue

Section

Electrical Engineering and Industrial Electronics