Degree
|
Postgraduate, FSAEI HPE North-Caucasus Federal University |
---|---|
E-mail
|
rossthebossstav@mail.ru |
Location
|
Stavropol |
Articles
|
Assessment the security of wireless alarm from unauthorized access based on the concepts of fuzzy logic
Nowadays, the world has witnessed a significant increase in the number of stolen vehicles. One
of the main reasons for the high number of thefts is the use of wireless alarm systems. One of the
vulnerabilities of wireless signaling is between the mobile radio remotes control and alarm stationary
control unit that carries control commands that may be intercepted, viewed or tampered with. Currently,
there are many ways of ensuring information security of the radio channel. However, there are
no methods for assessing signaling radio bearer security from unauthorized access. The purpose of
this paper is to provide a method of quantitative and qualitative evaluation of security radio signals
from unauthorized access. The analysis showed that at present there are no perfect valuation techniques
protected from unauthorized access. In addition to the drawbacks of each method individually,
many of them have a common negative feature is the fact, not security assessment is comprehensive
and focused on one or more threats to information security. The authors proposed a method
of quantitative and qualitative evaluation of security against unauthorized wireless access, including
automotive, signaling, based on the concepts of fuzzy logic. To substantiate the results obtained
evaluated radio alarm security against unauthorized access three different wireless car alarms that
have different methods of protection against threats such as browsing, interception and substitution.
The proposed method of quantitative and qualitative evaluation of security radio signal from unauthorized
access different: a comprehensive assessment of security wireless alarm radio from unauthorized
access, simple math, simple software implementation and adequate representation of the probability
of different types of wireless alarm counter threats to information security in the radio channel.
Read more...
Assessing the crypto resistance to the destructive effect of "viewing transmitted data" in the case of quantum computersIn this paper, we evaluate the crypto resistance of known cryptographic methods and methods based on the use of noise-like signals, similar in properties to "limited" white noise and used to spread spectrum of transmitted messages, to the destructive effect of "viewing transmitted data" (decipher), based on the search of code structures (brute force), in the case of quantum computers. It’s established that the required value of the number of code structures (key space), taking into account the constantly improving and developing computing power of quantum computers, for the next few years should be considered a value of 1032 of the number of code structures (key space) and higher, providing crypto resistance for a minimum of 3 years. It’s shown that the Grover algorithm is similar to the destructive effect of "viewing transmitted data" (decipher), based on a complete search of all code structures (brute force) using modern super- computers. It’s established that well-known symmetric cryptographic methods can potentially be used in the post-quantum era and methods based on noise-like signals potentially, provided they are detected and aware of the methods underlying them (without knowledge of the key), cannot be applied in the post-quantum era. According to the authors, a promising approach in the post-quantum era for information security issues is the use of chaotic signals. Read more... |