+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Authors

Zhuk A.

Degree
PhD in Technique, Professor, North-Caucasus Federal University
E-mail
alekszhuk@mail.ru
Location
Stavropol
Articles

Simulation of apparatus for protection against imitation of controlled objects with high structural security of carrier signals

In this paper, the authors, on the basis of a software package ScicosLab, carried out simulation of apparatus for protection against imitation of controlled objects with high structural security of carrier signals, aimed at the substantiation of its practical use for secure information exchange between the sensors and the control unit in the radio fire alarm systems. In the result of a simulation when changes in the parameters of a chaotic signal on the basis of quality indicators in the form of graphs found that the simulated apparatus for protection against imitation of controlled objects with high structural security of carrier signals in general copes with the task of encryption (the output signal has a noise-like appearance) and recovery of the information signal (source information signal and the recovered information signal have almost identical appearance). The distinctive feature of this apparatus for protection against imitation of controlled objects with high structural security of carrier signals is the possibility of using different chaotic signals that are recorded in rewritable drives chaotic sequences. This fact allows to significantly increase the security of the radio link from unauthorized access by third parties.
Read more...

Simulation of apparatus for protection against imitation of controlled objects with new set of chaotic signals

In this paper, the authors, on the basis of a software package ScicosLab, carried out a simulation of the apparatus for protection against imitation of controlled objects with high structural security of carrier signals with new set of chaotic signals. In the result of a simulation, when changes in the parameters of a chaotic signal, based on qualitative indicators representing time and spectral diagrams found that the simulated apparatus for protection against imitation of controlled objects with high structural security of carrier signals in general copes with the task of encryption (the output signal has a noise-like appearance) and recovery of the information signal (source information signal and the recovered information signal have almost identical appearance). The distinctive feature of this apparatus for protection against imitation of controlled objects with high structural security of carrier signals is the possibility of using different chaotic signals that are recorded in rewritable drives chaotic sequences. This fact allows to significantly increase the security of the radio link from unauthorized access by third parties and opens the way for application of this technology not only in wireless fire alarm, but in other areas as wireless security systems. In the authors’ opinion, further research in this area should be conducted in the field of studying the applicability of other classes of chaotic signals for the transfer of a protected communication and use of various pseudo-random sequences limited by the range [ –1; 1] as an information signal.
Read more...

Comparative analysis of methods of assessing the protection of wireless fire alarm systems

A comparative analysis of methods for assessing the security of wireless fire alarm systems based on the analysis of numerical samples representing the assessment of security, using the apparatus of mathematical statistics. Using a variety of nonparametric tests (criterion of signs, the Wilcoxon test) in the program Statistica the average and confidence intervals of sample means (graphic diagram «box and whiskers») that are close enough to each other. The average and confidence intervals that show the security assessment based on fuzzy logic, is slightly higher than the average and confidence intervals that show the security assessment based on the matrix of fuzzy rules. This is interpreted as a higher quantitative evaluation of security based on fuzzy logic in comparison with a quantitative evaluation of security based on the matrix of fuzzy rules and, consequently, more accurate identification protection. Also the proposed approach the comparative analysis of quantitative indicators potentially can be extended to a wider class of problems of information security, such as comparative analysis of various «related» methods of assessment.
Read more...

Application of the method of recurrence plots for qualitative analysis of secure communication systems

In this paper, the authors continue the experimental analysis of secure communication systems from [5] using other known methods of nonlinear dynamics, namely, using recurrence plots. The time diagrams of the signals transmitted in the communication channel [5] and the corresponding recurrence plots are given. Their similarity to «white noise» is noted (except for the case of a communication system based on chaotic masking, which uses the Rossler attractor as a generator). The obtained data are consistent with the data obtained in [5]. Also, the simulation of communication systems with simple signals on the example of a sine wave was carried out. The analysis shows that the communication systems with simple signals have obvious structure and are potentially detected by recurrence plots. Thus, qualitative analysis based on recurrence plots allows to determine the communication system with simple signals and communication systems based on noise-like signals, as well as to detect the structure for some communication systems based on noise-like signals. However, it does not sufficiently distinguish between classical communication systems based on noise-like signals and communication systems based on chaotic signals. It can be concluded that recurrence plots should be used in combination with other known methods of nonlinear dynamics (time and spectral diagrams, phase portraits, Hurst exponent, maximal Lyapunov exponent, BDS-statistics) and their joint use will allow more adequate analysis of secure communication systems [4, 5]. Read more...

The application of the algorithm Berlekamp-Massey for the quantitative analysis of secure communication systems

In this paper, using the Berlekamp-Massey algorithm, the linear complexity of the signals generated by communication systems was estimated, the modeling of which was carried out in [5]. In addition, the linear complexity of the communication system with simple signals represented by a sine wave was evaluated [13]. As a result of the calculations, it was found that of the considered communication systems, the most linear complexity is possessed by communication systems with chaotic signals (with the exception of a communication system based on chaotic masking, in which the Rossler attractor is used as a generator of chaotic signals). Among the considered systems of communication with chaotic signals the most linear complexity has a communication system based on chaotic modulation. The least linear complexity has a communication system based on simple signals. Communication systems based on "classical" noise-like signals have a linear complexity much greater than the communication system with simple signals, but less than the communication system with chaotic signals. It is established that communication systems with chaotic signals in general are more preferable for secure communication systems than communication systems based on "classical" noise-like signals. In general, it should be noted that in order to increase the security of transmitted information using communication systems based on noise-like signals, it is necessary either to complicate the structure of the transmitted signal, making it looks like white noise, or to use a potentially infinite number of sets of different classes of expanding sequences and their periodic change, subject to certain requirements for expanding sequences.
Read more...