Method of increasing the security of signalling structure in the airwaves

Cover Page

Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription or Fee Access

Abstract

The possibility of increasing the structural secrecy of communication channels in the air is considered. The method of channel security enhancement for communication systems with application of noise-immune codes is proposed. An assessment of the degree of influence of the proposed method on the efficiency of the communication system, including key characteristics of the security and secrecy of the modified communication channel, as well as an assessment of the complexity of the considered method are performed.

Full Text

Restricted Access

About the authors

V. V. Zyablov

ИППИ РАН им. А. А.Харкевича

Author for correspondence.
Email: zyablov@iitp.ru

д.т.н., главный научный сотрудник 

Russian Federation

S. L. Portnoy

Московский институт электроники и математики им. А.Н. Тихонова НИУ ВШЭ

Email: sportnoy@hse.ru

д.т.н., проф. 

Russian Federation

A. I. Tikhonyuk

Московский институт электроники и математики им. А.Н. Тихонова НИУ ВШЭ

Email: atikhonyuk@hse.ru

доцент 

Russian Federation

References

  1. Berlekamp E. Algebraic Coding Theory. Revised Edition. Singapore: World Scientific Publishing Co, 2015. 501 p.
  2. Rao K.D. Channel Coding Techniques for Wireless Communications. Springer, 2015. 407 p.
  3. Declerq D., Fossorier M., Biglieri E. Channel Coding: Theory, Algorithms, and Applications // Elsevier. 2014. 667 p.
  4. Schneier B. Applied Cryptography. Protocols, Algorithms, and Source Code in C. 2nd Edition. John Wiley & Sons. 1996. 784 p.
  5. Borisenko B.B., Erokhin S.D., Fadeev A.S., Martishin I.D. Intrusion detection using multilayer perceptron and neural networks with long short-term memory // 2021 Systems of Signal Synchronization, Generating and Processing in Telecommunications, SYNCHROINFO 2021– Svetlogorsk: Institute of Electrical and Electronics Engineers Inc. 2021. P. 9488416.
  6. Shannon C.E. Communication theory of secrecy systems // The Bell System Technical Journal. Vol. 28. Iss. 4, 1949. РР. 656–715.
  7. Портной С.Л., Никитин С.Е., Волошин А.Д., Антошкин Г.Д. Обзор современных методов реализации помехоустойчивого кодирования в мобильной связи // ПЕРВАЯ МИЛЯ. 2024. № 1 (117). С. 26–40.
  8. Тихвинский В.О., Портной С.Л., Сивицкий П.А., Тихонюк А.И. Эволюция технологий сети FRMCS в релизах 3GPP: вызовы и перспективы // ПЕРВАЯ МИЛЯ. 2023. № 2 (110). С. 56–64.
  9. Portnoy S., Tikhonyuk A., Nikitin S., Voloshin A. Performance Evaluation of LDPC Codes in 5G NR // 2024 Systems of Signal Synchronization, Generating and Processing in Telecommunications SYNCHROINFO 2024. Vyborg: Institute of Electrical and Electronics Engineers Inc. 2024. РР. 1–9.
  10. Тихонюк А.И. Автоматизация мониторинга радиоизлучений со сложной структурой (Методы идентификации помехоустойчивых кодов) // Новые информационные технологии в автоматизированных системах. 2006. № 9. С. 212–219.
  11. Erokhin S.D., Chadov T.A., Tikhonyuk A.I. One approach on ECC identification problem in a complex telecommunication system // 2017 Systems of Signal Synchronization, Generating and Processing in Telecommunications, SINKHROINFO 2017. Kazan: Institute of Electrical and Electronics Engineers Inc. 2017. P. 7997522.
  12. McEliece R.J. A Public-Key Cryptosystem Based on Algebraic Coding Theory // DSN Progress Report 42–44. Jet Propulsion Lab., California Inst. of Technology, Pasadena, CA. 1978. РP. 114–116.
  13. Rao T.R.N., Nam K.H. Private-Key Algebraic-Code Encryption // IEEE Trans. on Information Theory. Vol. 35. Iss. 4. 1987. РР. 829–833.
  14. Rao T.R.N. Cryptosystems using algebraic codes // Proc. Int. Conf. on Computer Systems and Signal Processing, Bangalore, India, Dec. 1984.
  15. Barbero A.I., Ytrehus O. Modifications of the Rao-Nam Cryptosystem // Proc. Int. Conf. on Coding Theory, Cryptography and Related Areas. РР. 1–13, Guanajuato, Mexico, April 1998.
  16. Wang Z., Karpovsky M. Algebraic manipulation detection codes and their applications for design of secure cryptographic devices // IEEE 17th International On-Line Testing Symposium. Philadelphia: IEEE/ 2011. РР. 234–239.
  17. Зяблов В.В., Иванов Ф.И., Крук Е.А., Сидоренко В.Р. О новых задачах в асимметричной криптографии, основанной на помехоустойчивом кодировании // Проблемы передачи информации. 2022. Т. 58. № 2. С. 92–111.
  18. Mihaljevic M.J., Wang L., Xu S. An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors // Entropy. 2022. 24 (3), 406 р.
  19. Zyablov V.V., Potapov V.G., Sidorenko V.R. Data protection in a network from both channel errors and unauthorized access using one code // Information Processes. 2024. Vol. 24. Iss. 2. PР. 136–139.
  20. Ерохин С.Д., Петухов А.Н. Архитектура асимптотического управления безопасностью критических информационных инфраструктур // DSPA: Вопросы применения цифровой обработки сигналов. 2022. Т. 12. № 1. С. 18–30.
  21. Ерохин С.Д., Борисенко Б.Б., Мартишин И.Д., Фадеев А.С. Анализ существующих методов снижения размерности входных данных // T-Comm: Телекоммуникации и транспор. 2022. Т. 16. № 1. С. 30–37.
  22. Chadov T.A., Erokhin S.D., Tikhonyuk A.I. Machine learning approach on synchronization for FEC enabled channels // 2018 Systems of Signal Synchronization, Generating and Processing in Telecommunications, SYNCHROINFO 2018 Minsk: Institute of Electrical and Electronics Engineers Inc., 2018. P. 8456985.

Supplementary files

Supplementary Files
Action
1. JATS XML
2. Fig.1. The scheme of the communication system

Download (581KB)

Copyright (c) 2025 Zyablov V.V., Portnoy S.L., Tikhonyuk A.I.