Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
cетевое издание
issn 2310-6018


idGavrishev A.A.

UDC 004.94
DOI: 10.26102/2310-6018/2019.27.4.022

  • Abstract
  • List of references
  • About authors

To control large areas, radio security systems are currently being used that provide information collection from radio-distributed sensors distributed throughout the facility. When a person or a foreign object enters the sensor’s coverage area, the sensor detects the occurrence of an emergency and sends an alarm signal via radio channel to the system control panel. At the same time, it is known from the literature that radio security systems themselves are subject to destructive influences aimed at disrupting their performance. In this work, the author, based on the previously proposed mathematical model and generalization of the known literature, developed a mathematical model of the process of providing hidden information exchange in radio security systems, taking into account the destabilizing effects (for example, imposing false data or suppressing interference) on the transmitted signals in the communication channel. A computational method has also been developed for assessing the stealth of information exchange in radio security systems based on fuzzy logic, the use of which under conditions of poorly structured and difficult formalizability of the source data and also in the conditions of a complex of destructive influences, can potentially help to more adequately assess the stealth of radio security systems. The results can be used to study the stealth of known and promising radio security systems. It is also possible to use the results obtained to increase the stealth of known and promising radio security systems.

1. Kuzmina N.A. Fixing systems and recognition of unauthorized penetration in the protected zone as an element of effective safety of the transport infrastructure object. T-Comm. 2018;12(5): 7-52. DOI: 10.24411/2072-8735-2018-10086 (In Russ.).

2. Chlenov A.N., Ryabtsev N.A., Fedin A.N. Analysis of methods of neutralizing alarm protection systems categorized objects. Technology of technosphere safety. 2017;(3):271- 279 (In Russ.).

3. Gavrishev A.A. Mathematical model for secure information exchange for wireless security systems. Modeling, Optimization and Information Technology. 2018;6(4):434-443. DOI: 10.26102/2310-6018/2018.23.4.032 (In Russ.).

4. Barichev S.G., Goncharov V.V., Serov R.E. Osnovy sovremennoj kriptografii [Foundations of modern cryptography]. Moscow. Goryachaya liniya-Telekom Publ. 2011. 175 p. (In Russ.).

5. Grabchak V., Pasko I., Lahtin S., Korolyev R. The analysis of mathematical model and the block diagram of system of data transmission. Systemi obrobki informacii. 2007;(4): 30-34 (In Russ.).

6. Leonov K.N., Potapov A.A., Ushakov P.A. Mathematical modeling of data transition system on the base of chaotic signals with fractional dimension. Fizika volnovykh protsessov i radiotekhnicheskie sistemy – Physics of Wave Processes and Radio Systems. 2010;13(3):47–53. (In Russ.).

7. Litvinenko V.P. Energeticheskaya skrytnost' signalov i zashchishchennost' radiolinij [Energy secrecy of signals and protection of radio lines]. Voronezh: Voronezhskij gos. tekhnicheskij un-t Publ., 2009. 166 p. (In Russ.).

8. Gavrishev A.A., Zhuk A.P. Precision’s calculation of the security assessment of wireless alarm. IT Security. 2018;25(3):26-37. DOI: 10.26583/bit.2018.3.03 (In Russ.).

9. Gavrishev A.A., Burmistrov V.A., Osipov D.L. Assessment the security of wireless alarm from unauthorized access based on the concepts of fuzzy logic. Prikladnaya informatika – Journal of Applied Informatics. 2015;10(4):62–69 (in Russ.).

10. Fayzullin R.R., Vasiliev V.I. Method for assessing the security of a data transmission network in information security monitoring and event management system at based on fuzzy logic. USATU Bulletin. 2013; 17 (2): 150-156.

Gavrishev Aleksey Andreevich

Email: alexxx.2008@inbox.ru


, FSAEI HE "North-Caucasus Federal University", Institute of Information Technologies and Telecommunications

Stavropol, Russian Federation

Keywords: mathematical model, computational method, stealth, radio channel, radio security systems

For citation: Gavrishev A.A. DEVELOPMENT OF A MATHEMATICAL MODEL OF THE PROCESS OF PROVIDING HIDDEN INFORMATION EXCHANGE IN RADIO SECURITY SYSTEMS AND A COMPUTATIONAL METHOD FOR ASSESSING THE STEALTH FOR THEM. Modeling, Optimization and Information Technology. 2019;7(4). Available from: https://moit.vivt.ru/wp-content/uploads/2019/11/Gavrishev_4_19_1.pdf DOI: 10.26102/2310-6018/2019.27.4.022 (In Russ).


Full text in PDF