A METHOD OF PROTECTING INFORMATION IN CYBER-PHYSICAL SPACE
Main Article Content
Abstract
The subject of the study is the processes of ensuring the reliability and security of information in cyber-physical space. The objective is to develop recommendations for the implementation of a method of information security in cyber-physical space. The development is based on the technology of ultra-wideband signals circulating in wireless communication channels. The task is to ensure the stable and reliable operation of the airborne wireless mobile communication network, which is the main component of cyberspace and its most vulnerable link to destructive influences. Methods used: methods of analytical modelling and time-position pulse coding. The following results were obtained. It is shown that in order to ensure high quality of wireless network operation, it is necessary to expand its bandwidth, which is limited by the physical resource of the radio frequency spectrum. It is proposed to overcome this contradiction by applying the technology of ultra-wideband signals, the base of which is much larger than one. In this case, the information signal is emitted without a carrier frequency simultaneously in the entire frequency band, provided that the signal level is lower than the noise level. The method of positional-time coding is used, in which each information bit is encoded by hundreds of ultra-short chip pulses arriving in a certain sequence. In such wireless communication systems, the use of autocorrelation reception of modulated ultra-wideband signals is proposed. A comparative analysis has shown that the wireless network with the best reliability and noise immunity is the one where the time separation of the reference and information signals is applied. During the first half of the bit interval, the switch closes the transmitter output directly to the ultra-wideband signal generator, forming a reference signal. In the middle of the bit interval, the switcher switches the output to one of two possible positions depending on the signal "zero" or "one", forming the information part of the signal. Conclusions. Systems with autocorrelation reception and separate transmission of reference and information signals provide a high level of structural
Article Details
References
(2023), Standard ISO/IEC 27032:2023. Cybersecurity. Guidelines for Internet security, Released:28.06.2023, available at: https://www.iso.org/obp/ui/#iso:std:iso-iec:27032:ed-2:v1:en
(2008), ITU-T X.1205:2008. Cybersecurity overview, Geneva: ITU-T, 2008. 162 p., available at: www.itu.int/ITU-T
Kravchenko V.I. and Serkov O.A. (2022), Radioelectronic means of struggle, suppression and force defeat, a monograph, “Madrid”, Kharkiv, 422 p. (in Ukrainian), ISBN 978-617-8254-00-1.
Kovalenko, A. and Kuchuk, H. (2022), “Methods to Manage Data in Self-healing Systems”, Studies in Systems, Decision and Control, Vol. 425, pp. 113–171, doi: https://doi.org/10.1007/978-3-030-96546-4_3
Yevseiev, S., Milevsky, S., Bortnik, L., Voropay, A., Bondarenko, K. and Pogasiy, S. (2022), Socio-Cyber-Physical Systems Security Concept. 4th International Congress on Human-Computer Interaction, Optimisation and Robotic Applications,
-11 June 2022, Ankara, Turkey, doi: https://doi.org/10.1109/HORA55278.2022.9799957
Kovalenko, A., Kuchuk, H., Kuchuk, N. and Kostolny, J. (2021), “Horizontal scaling method for a hyperconverged network”, 2021 International Conference on Information and Digital Technologies (IDT), Zilina, Slovakia, doi: https://doi.org/10.1109/IDT52577.2021.9497534
Yaloveha, V., Hlavcheva, D., Podorozhniak, A. and Kuchuk, H. (2019), “Fire hazard research of forest areas based on the use of convolutional and capsule neural networks”, 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering, UKRCON 2019 – Proceedings, doi: http://dx.doi.org/10.1109/UKRCON.2019.8879867
Kuchuk, G., Nechausov, S. and Kharchenko, V. (2015), “Two-stage optimization of resource allocation for hybrid cloud data store”, International Conference on Information and Digital Technologies, Zilina, pp. 266-271, DOI: http://dx.doi.org/10.1109/DT.2015.7222982
Kuchuk, G.A., Akimova, Yu.A. and Klimenko, L.A. (2000), “Method of optimal allocation of relational tables”, Engineering Simulation, Vol. 17(5), pp. 681–689.
Mozhaev, O., Kuchuk, H., Kuchuk, N., Mykhailo, M. and Lohvynenko, M. (2017), “Multiservice network security metric”, 2nd International Conference on Advanced Information and Communication Technologies, AICT 2017 – Proceedings, pp. 133–136, doi: https://doi.org/10.1109/AIACT.2017.8020083
Lee E., A. (2015), “The past, present and future of cyber-physical systems: a focus on models”, Sensors, Basel, Switzerland, Vol. 15(3), pp. 4837–4869, doi: https://doi.org/10.3390/s150304837
Kuchuk, N., Mozhaiev, O., Mozhaiev, M. and Kuchuk, H. (2017), “Method for calculating of R-learning traffic peakedness”, 2017 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T 2017 – Proceedings, pp. 359–362, doi: https://doi.org/10.1109/INFOCOMMST.2017.8246416
Ayass, T., Coqueiro, T., Carvalho, T., Jailton, J., Araújo, J. and Francês R. (2022), “Unmanned aerial vehicle with handover management fuzzy system for 5G networks: challenges and perspectives”, Intell Robot, Vol. 2(1), pp. 20–36, doi: https://dx.doi.org/10.20517/ir.2021.07
Datsenko, S. and Kuchuk, H. (2023), “Biometric authentication utilizing convolutional neural networks”, Advanced Information Systems, Vol. 7, no. 2, pp. 87–91, doi: https://doi.org/10.20998/2522-9052.2023.2.12
Dun, B., Zakovorotnyi, O. and Kuchuk, N. (2023), “Generating currency exchange rate data based on Quant-Gan model”, Advanced Information Systems, Vol. 7, no. 2, pp. 68–74, doi: https://doi.org/10.20998/2522-9052.2023.2.10
Mammadov, F. K. (2023), “New approach to book cipher: web pages as a cryptographic key”, Advanced Information Systems, Vol. 7, no. 1, pp. 59–65, doi: https://doi.org/10.20998/2522-9052.2023.1.10
Petrovska, I. and Kuchuk, H. (2023), “Adaptive resource allocation method for data processing and security in cloud environment”, Advanced Information Systems, Vol. 7, No. 3, pp. 67–73, doi: https://doi.org/10.20998/2522-9052.2023.3.10
Zuo, Z., Liu, C., Han, Q.-L. and Song, J. (2022), “Unmanned Aerial Vehicles: Control Methods and Future Challenges”, IEEE/CAA Journal of Automatica Sinica, Vol. 9, No. 4, pp. 601–614, doi: https://dx.doi.org/10.1109/JAS.2022.105410
Massey J.L. (1974), “Coding and Modulation in Digital Communications”, Proc. Int. Zurich Seminar on Dig Comm., Zurich, Switzerland, pp. E2(1)–E2(4), available at: https://www.isiweb.ee.ethz.ch/archive/massey_pub/pdf/BI511.pdf
Klen, K. S. (2022), Electronic systems. Lecture notes, Igor Sikorsky Kyiv Polytechnic Institute, Kyiv, 240 p., available at: https://ela.kpi.ua/bitstream/123456789/52115/1/Electronic_Systems_lecture_notes.pdf
Slepian, D. (1952), “Some comment on the Detection of Gaussian Signals in Gaussian Noise”, JRE Transactions on Information Theory, No. 2, pр.65-68. doi: https://dx.doi.org/10.1109/TIT.1958.1057443
Serkov A., Kravets V., Yakovenko I., Churyumov G., Tokariev V. and Namnan W. (2019), “Ultra-Wideband Signals in Control Systems of Unmanned Aerial Vehicles”, (DESSERT'2019), pp. 25–28, Leeds, United Kingdom, June 5-7, doi: https://dx.doi.org/10.1109/DESSERT.2019.8770039
Aleksandrov, Y., Aleksandrova, T., Kostianyk, І., and Morgun, Y. (2023), Selection of the set of allowable values of the variable parameters of the stabilizer of a complex dynamic object”, Advanced Information Systems, Vol. 7, No. 3, pp. 5–12, doi: https://doi.org/10.20998/2522-9052.2023.3.01
Serkov, A., Breslavets, V., Breslavets, J. and Yakovenko, I. (2023), “The influence of a potential barrier on the mechanisms of excitation of own fluctuations in radio products in conditions of exposure to electromagnetic radiation”, Advanced Information Systems, Vol. 7, no. 1, pp. 36–40, doi: https://doi.org/10.20998/2522-9052.2023.1.06
Serkov, A.A., Lazurenko, B.A., Trubchaninova, K.A. and Horiushkina A.E. (2020), “Security Improvement Techniques for mobile applications of Industrial Internet of Things”, IJCSNS International Journal of Computer Science and Network Security, Vol. 20, No. 5, pp. 145–149, available at: http://paper.ijcsns.org/07_book/202005/20200519.pdf
Jammine, A., Serkov A., Lazurenko, B. and Nait-Abdesselam, F. (2023), “The Order of Formation of Information Signals in IIoT”, IJCSNS International Journal of Computer Science and Network Security, Vol. 23, No. 3, pp. 139–143, available at: http://paper.ijcsns.org/07_book/202303/20230314.pdf
Mukhin, V., Kuchuk, N., Kosenko, N., Kuchuk, H. and Kosenko, V. (2020),”Decomposition Method for Synthesizing the Computer System Architecture”, Advances in Intelligent Systems and Computing, AISC, vol. 938, pp 289–300, doi: https://doi.org/10.1007/978-3-030-16621-2_27
Serkov, O.A., Lazurenko, B.O., Pevnev, V.Y., Tkachenko, V.A. and Kharchenko, V.S. (2021), Method of information transmission by ultra-wideband pulse signals, Ukrainian Patent for Invention No. 123519 U IPC H04B 1/69, H04B 7/00, Published on 14.04.2021, Bulletin No. 15.
Panchenko, S.V., Lazurenko, B.O., Serkov, O.A., Trubchaninova, K.A. and Goryushkina, A.E. (2020), Method of receiving digital binary signals in noise conditions, Patent of Ukraine for utility model No. 145319 U IPC H04B 1/06, published on 25.11.20, Bulletin No. 22.
Panchenko, S.V., Serkov, O.A., Trubchaninova, K.A., Kurtzev, M.S. and Lazurenko, B.O.(2019), Ultra-wideband antenna with flickering polarisation and a method of its excitation, Patent of Ukraine for invention No. 126475 U IPC H01Q 21/06, H01Q 13/08, Published on 13.10.22, Bulletin No. 41, application No. a 2019 08720 dated 19.07.2019.