Degree
|
PhD in Technique, Professor, North-Caucasus Federal University |
---|---|
E-mail
|
alekszhuk@mail.ru |
Location
|
Stavropol |
Articles
|
Simulation of apparatus for protection against imitation of controlled objects with high structural security of carrier signalsIn this paper, the authors, on the basis of a software package ScicosLab, carried out simulation of
apparatus for protection against imitation of controlled objects with high structural security of carrier
signals, aimed at the substantiation of its practical use for secure information exchange between
the sensors and the control unit in the radio fire alarm systems. In the result of a simulation when
changes in the parameters of a chaotic signal on the basis of quality indicators in the form of graphs
found that the simulated apparatus for protection against imitation of controlled objects with high
structural security of carrier signals in general copes with the task of encryption (the output signal
has a noise-like appearance) and recovery of the information signal (source information signal and
the recovered information signal have almost identical appearance). The distinctive feature of this
apparatus for protection against imitation of controlled objects with high structural security of carrier
signals is the possibility of using different chaotic signals that are recorded in rewritable drives
chaotic sequences. This fact allows to significantly increase the security of the radio link from unauthorized
access by third parties.
Read more...
Simulation of apparatus for protection against imitation of controlled objects with new set of chaotic signals
In this paper, the authors, on the basis of a software package ScicosLab, carried out a simulation
of the apparatus for protection against imitation of controlled objects with high structural security of
carrier signals with new set of chaotic signals. In the result of a simulation, when changes in the parameters
of a chaotic signal, based on qualitative indicators representing time and spectral diagrams
found that the simulated apparatus for protection against imitation of controlled objects with high
structural security of carrier signals in general copes with the task of encryption (the output signal has
a noise-like appearance) and recovery of the information signal (source information signal and the
recovered information signal have almost identical appearance). The distinctive feature of this apparatus
for protection against imitation of controlled objects with high structural security of carrier signals
is the possibility of using different chaotic signals that are recorded in rewritable drives chaotic
sequences. This fact allows to significantly increase the security of the radio link from unauthorized
access by third parties and opens the way for application of this technology not only in wireless fire
alarm, but in other areas as wireless security systems. In the authors’ opinion, further research in this
area should be conducted in the field of studying the applicability of other classes of chaotic signals
for the transfer of a protected communication and use of various pseudo-random sequences limited
by the range [ –1; 1] as an information signal.
Read more...
Comparative analysis of methods of assessing the protection of wireless fire alarm systems
A comparative analysis of methods for assessing the security of wireless fire alarm systems based
on the analysis of numerical samples representing the assessment of security, using the apparatus of
mathematical statistics. Using a variety of nonparametric tests (criterion of signs, the Wilcoxon test)
in the program Statistica the average and confidence intervals of sample means (graphic diagram
«box and whiskers») that are close enough to each other. The average and confidence intervals that
show the security assessment based on fuzzy logic, is slightly higher than the average and confidence
intervals that show the security assessment based on the matrix of fuzzy rules. This is interpreted as
a higher quantitative evaluation of security based on fuzzy logic in comparison with a quantitative
evaluation of security based on the matrix of fuzzy rules and, consequently, more accurate identification
protection. Also the proposed approach the comparative analysis of quantitative indicators potentially
can be extended to a wider class of problems of information security, such as comparative
analysis of various «related» methods of assessment.
Read more...
Application of the method of recurrence plots for qualitative analysis of secure communication systemsIn this paper, the authors continue the experimental analysis of secure communication systems from [5] using other known methods of nonlinear dynamics, namely, using recurrence plots. The time diagrams of the signals transmitted in the communication channel [5] and the corresponding recurrence plots are given. Their similarity to «white noise» is noted (except for the case of a communication system based on chaotic masking, which uses the Rossler attractor as a generator). The obtained data are consistent with the data obtained in [5]. Also, the simulation of communication systems with simple signals on the example of a sine wave was carried out. The analysis shows that the communication systems with simple signals have obvious structure and are potentially detected by recurrence plots. Thus, qualitative analysis based on recurrence plots allows to determine the communication system with simple signals and communication systems based on noise-like signals, as well as to detect the structure for some communication systems based on noise-like signals. However, it does not sufficiently distinguish between classical communication systems based on noise-like signals and communication systems based on chaotic signals. It can be concluded that recurrence plots should be used in combination with other known methods of nonlinear dynamics (time and spectral diagrams, phase portraits, Hurst exponent, maximal Lyapunov exponent, BDS-statistics) and their joint use will allow more adequate analysis of secure communication systems [4, 5]. Read more... The application of the algorithm Berlekamp-Massey for the quantitative analysis of secure communication systemsIn this paper, using the Berlekamp-Massey algorithm, the linear complexity of the signals generated
by communication systems was estimated, the modeling of which was carried out in [5]. In addition,
the linear complexity of the communication system with simple signals represented by a sine wave
was evaluated [13]. As a result of the calculations, it was found that of the considered communication
systems, the most linear complexity is possessed by communication systems with chaotic signals (with
the exception of a communication system based on chaotic masking, in which the Rossler attractor is
used as a generator of chaotic signals). Among the considered systems of communication with chaotic
signals the most linear complexity has a communication system based on chaotic modulation. The least
linear complexity has a communication system based on simple signals. Communication systems based
on "classical" noise-like signals have a linear complexity much greater than the communication system
with simple signals, but less than the communication system with chaotic signals. It is established that
communication systems with chaotic signals in general are more preferable for secure communication
systems than communication systems based on "classical" noise-like signals. In general, it should be
noted that in order to increase the security of transmitted information using communication systems
based on noise-like signals, it is necessary either to complicate the structure of the transmitted signal,
making it looks like white noise, or to use a potentially infinite number of sets of different classes
of expanding sequences and their periodic change, subject to certain requirements for expanding
sequences.
Read more...
|