+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Authors

Gavrishev A.

Degree
Senior Lecturer, North-Caucasus Federal University
E-mail
rammsteinstav@yandex.ru
Location
Stavropol
Articles

Assessment the security of wireless alarm from unauthorized access based on the concepts of fuzzy logic

Nowadays, the world has witnessed a significant increase in the number of stolen vehicles. One of the main reasons for the high number of thefts is the use of wireless alarm systems. One of the vulnerabilities of wireless signaling is between the mobile radio remotes control and alarm stationary control unit that carries control commands that may be intercepted, viewed or tampered with. Currently, there are many ways of ensuring information security of the radio channel. However, there are no methods for assessing signaling radio bearer security from unauthorized access. The purpose of this paper is to provide a method of quantitative and qualitative evaluation of security radio signals from unauthorized access. The analysis showed that at present there are no perfect valuation techniques protected from unauthorized access. In addition to the drawbacks of each method individually, many of them have a common negative feature is the fact, not security assessment is comprehensive and focused on one or more threats to information security. The authors proposed a method of quantitative and qualitative evaluation of security against unauthorized wireless access, including automotive, signaling, based on the concepts of fuzzy logic. To substantiate the results obtained evaluated radio alarm security against unauthorized access three different wireless car alarms that have different methods of protection against threats such as browsing, interception and substitution. The proposed method of quantitative and qualitative evaluation of security radio signal from unauthorized access different: a comprehensive assessment of security wireless alarm radio from unauthorized access, simple math, simple software implementation and adequate representation of the probability of different types of wireless alarm counter threats to information security in the radio channel.
Read more...

Simulation of apparatus for protection against imitation of controlled objects with high structural security of carrier signals

In this paper, the authors, on the basis of a software package ScicosLab, carried out simulation of apparatus for protection against imitation of controlled objects with high structural security of carrier signals, aimed at the substantiation of its practical use for secure information exchange between the sensors and the control unit in the radio fire alarm systems. In the result of a simulation when changes in the parameters of a chaotic signal on the basis of quality indicators in the form of graphs found that the simulated apparatus for protection against imitation of controlled objects with high structural security of carrier signals in general copes with the task of encryption (the output signal has a noise-like appearance) and recovery of the information signal (source information signal and the recovered information signal have almost identical appearance). The distinctive feature of this apparatus for protection against imitation of controlled objects with high structural security of carrier signals is the possibility of using different chaotic signals that are recorded in rewritable drives chaotic sequences. This fact allows to significantly increase the security of the radio link from unauthorized access by third parties.
Read more...

Simulation of apparatus for protection against imitation of controlled objects with new set of chaotic signals

In this paper, the authors, on the basis of a software package ScicosLab, carried out a simulation of the apparatus for protection against imitation of controlled objects with high structural security of carrier signals with new set of chaotic signals. In the result of a simulation, when changes in the parameters of a chaotic signal, based on qualitative indicators representing time and spectral diagrams found that the simulated apparatus for protection against imitation of controlled objects with high structural security of carrier signals in general copes with the task of encryption (the output signal has a noise-like appearance) and recovery of the information signal (source information signal and the recovered information signal have almost identical appearance). The distinctive feature of this apparatus for protection against imitation of controlled objects with high structural security of carrier signals is the possibility of using different chaotic signals that are recorded in rewritable drives chaotic sequences. This fact allows to significantly increase the security of the radio link from unauthorized access by third parties and opens the way for application of this technology not only in wireless fire alarm, but in other areas as wireless security systems. In the authors’ opinion, further research in this area should be conducted in the field of studying the applicability of other classes of chaotic signals for the transfer of a protected communication and use of various pseudo-random sequences limited by the range [ –1; 1] as an information signal.
Read more...

Comparative analysis of methods of assessing the protection of wireless fire alarm systems

A comparative analysis of methods for assessing the security of wireless fire alarm systems based on the analysis of numerical samples representing the assessment of security, using the apparatus of mathematical statistics. Using a variety of nonparametric tests (criterion of signs, the Wilcoxon test) in the program Statistica the average and confidence intervals of sample means (graphic diagram «box and whiskers») that are close enough to each other. The average and confidence intervals that show the security assessment based on fuzzy logic, is slightly higher than the average and confidence intervals that show the security assessment based on the matrix of fuzzy rules. This is interpreted as a higher quantitative evaluation of security based on fuzzy logic in comparison with a quantitative evaluation of security based on the matrix of fuzzy rules and, consequently, more accurate identification protection. Also the proposed approach the comparative analysis of quantitative indicators potentially can be extended to a wider class of problems of information security, such as comparative analysis of various «related» methods of assessment.
Read more...

Modeling and quantitative and qualitative analysis of common secure communication systems

In this paper, the author uses the software package ScicosLab to conduct experimental modeling of common secure communication systems and their experimental analysis using known methods of nonlinear dynamics (time and spectral diagrams, phase portraits, Hurst exponent, maximal Lyapunov exponent, BDS-statistics). As a common secure communication systems was chosen as the communication system based on direct spread spectrum communications, system on the basis of the noise signals, the proposed Shagarova A. A., communication system based on chaotic masking and communication system based on chaotic modulation, represented by apparatus for protection against imitation of controlled objects with high structural security of carrier signals. As a result of researches it was established that: BDS-statistics explicitly identifies communication systems on the basis of classical approaches of formation of noise-like signals and their derivatives; communication systems on the basis of classical approaches of formation of noise-like signals and their derivatives possess positive maximal Lyapunov exponent and thus possess chaotic properties; the obtained quantitative values of BDS-statistics, maximal Lyapunov exponent, the Hurst exponent indicate that communication systems based on chaotic signals in general are more preferable for secure communication systems than communication systems based on classical approaches to the formation of noise-like signals and their derivatives; of the considered communication systems based on chaotic signals, the system based on chaotic modulation is more preferable for secure communication systems, since it has the highest maximal Lyapunov exponent, which is an indicator of greater protection against unauthorized access than the considered analogues, as it is indicated by the obtained values of BDS-statistics.
Read more...

Application of the method of recurrence plots for qualitative analysis of secure communication systems

In this paper, the authors continue the experimental analysis of secure communication systems from [5] using other known methods of nonlinear dynamics, namely, using recurrence plots. The time diagrams of the signals transmitted in the communication channel [5] and the corresponding recurrence plots are given. Their similarity to «white noise» is noted (except for the case of a communication system based on chaotic masking, which uses the Rossler attractor as a generator). The obtained data are consistent with the data obtained in [5]. Also, the simulation of communication systems with simple signals on the example of a sine wave was carried out. The analysis shows that the communication systems with simple signals have obvious structure and are potentially detected by recurrence plots. Thus, qualitative analysis based on recurrence plots allows to determine the communication system with simple signals and communication systems based on noise-like signals, as well as to detect the structure for some communication systems based on noise-like signals. However, it does not sufficiently distinguish between classical communication systems based on noise-like signals and communication systems based on chaotic signals. It can be concluded that recurrence plots should be used in combination with other known methods of nonlinear dynamics (time and spectral diagrams, phase portraits, Hurst exponent, maximal Lyapunov exponent, BDS-statistics) and their joint use will allow more adequate analysis of secure communication systems [4, 5]. Read more...

The application of the algorithm Berlekamp-Massey for the quantitative analysis of secure communication systems

In this paper, using the Berlekamp-Massey algorithm, the linear complexity of the signals generated by communication systems was estimated, the modeling of which was carried out in [5]. In addition, the linear complexity of the communication system with simple signals represented by a sine wave was evaluated [13]. As a result of the calculations, it was found that of the considered communication systems, the most linear complexity is possessed by communication systems with chaotic signals (with the exception of a communication system based on chaotic masking, in which the Rossler attractor is used as a generator of chaotic signals). Among the considered systems of communication with chaotic signals the most linear complexity has a communication system based on chaotic modulation. The least linear complexity has a communication system based on simple signals. Communication systems based on "classical" noise-like signals have a linear complexity much greater than the communication system with simple signals, but less than the communication system with chaotic signals. It is established that communication systems with chaotic signals in general are more preferable for secure communication systems than communication systems based on "classical" noise-like signals. In general, it should be noted that in order to increase the security of transmitted information using communication systems based on noise-like signals, it is necessary either to complicate the structure of the transmitted signal, making it looks like white noise, or to use a potentially infinite number of sets of different classes of expanding sequences and their periodic change, subject to certain requirements for expanding sequences.
Read more...

On the question of the relationship of security assessments (for example, wireless fire alarm systems)

Currently, the fourth industrial revolution (Industrie 4.0) is taking place. Its distinctive features are permanent information revolution, industrial computerization, integration of Internet technologies with automated control systems for production, energy, transport, medicine, banking, home devices and security systems, etc. An important issue is the assessment of the security of cyber-physical objects, in particular the channels of data transmission systems, especially wireless ones, which can either jamming or transmit false data over them or intercept the transmitted data for further analysis. The goal of this article is to establish the relationship between the assessment of security of fire alarm systems based on fuzzy logic given in [6] and the values of the maximal Lyapunov exponent of transmitted signals of wireless fire alarm systems obtained as a result of modeling in [3]. The purpose of this article is to plot the relationship between the security estimates based on fuzzy logic given in [6] and the average values of the maximal Lyapunov exponent of transmitted signals of wireless fire alarm systems obtained as a result of modeling in [3]. As a result of the conducted research, it was found that the value of the maximal Lyapunov exponent increases with the increase in the security assessment based on fuzzy logic.
Read more...

Application of nonlinear dynamics methods for quantitative and qualitative evaluation of properties of 2D models of S-chaos

The relevance of the topic considered in the article is to solve the problems of designing management decision support systems for enterprises based on business analytics technology. The research purpose is to analyze the applied methodologies during the design stage of the enterprise information system, to develop principles for using management decision support systems based on business intelligence. The problem statement is to analyze the technologies available on the market, which deal with business analyst systems, their potential use for decision support systems, and to identify the main stages of business analyst for enterprises. Business intelligence (BI) is information that can be obtained from data contained in the operational systems of a firm, enterprise, corporation, or from external sources. The BI can help the management of a company make the best decision in the chosen sphere of human activity faster, and, consequently, win the competition in the market for goods and services. A decision support system (DSS) which uses business intelligence, is an automated structure designed to assist professionals in making decisions in a complex environment and to objectively analyze a subject area. The decision support system is the result of the integration of management information systems and database management systems (DBMS). The internal development of BI is more cost-effective. The methods used are Structured Analysis and Design Technique and Object-oriented methods. The results of the research: the analysis of the possibilities was conducted and recommendations relating to the use of BI within DSS were given. Competition between BI software in business analysts reduces the cost of products created making them accessible to end-users – producers, traders and corporations. Read more...

Assessing the crypto resistance to the destructive effect of "viewing transmitted data" in the case of quantum computers

In this paper, we evaluate the crypto resistance of known cryptographic methods and methods based on the use of noise-like signals, similar in properties to "limited" white noise and used to spread spectrum of transmitted messages, to the destructive effect of "viewing transmitted data" (decipher), based on the search of code structures (brute force), in the case of quantum computers. It’s established that the required value of the number of code structures (key space), taking into account the constantly improving and developing computing power of quantum computers, for the next few years should be considered a value of 1032 of the number of code structures (key space) and higher, providing crypto resistance for a minimum of 3 years. It’s shown that the Grover algorithm is similar to the destructive effect of "viewing transmitted data" (decipher), based on a complete search of all code structures (brute force) using modern super- computers. It’s established that well-known symmetric cryptographic methods can potentially be used in the post-quantum era and methods based on noise-like signals potentially, provided they are detected and aware of the methods underlying them (without knowledge of the key), cannot be applied in the post-quantum era. According to the authors, a promising approach in the post-quantum era for information security issues is the use of chaotic signals. Read more...