Theoretical Aspects in Forming Complex Structure Signal
Keywords:
signals of complex structure, structural secrecy of signals, energy secrecy of signals, synthesis of signals of complex structure, signal structuresAbstract
Receiving and transmitting paths of modern radio communication systems are built on the basis of an open structure that provides hierarchical differentiation of access to the provided telecommunication services. However, this approach does not exclude the possibility of access to the transmitted content by unauthorized users. Hiding information by methods of cryptographic protection in such a situation only activates additional interest in transmission, therefore the most pragmatic solution is to use signals of a complex structure, which significantly complicate or even exclude the extraction of information from them by third-party users. The problem of regulating access selection in the development and design radio system elements is rather multifaceted and has a high degree of complexity. One of the directions for solving problems in this subject area is based on the well-known approaches to expanding the signal base, however, algorithms for their practical implementation were obtained without taking into account the limitations on the allocated resource and the very fact of using these algorithms. Based on the theory of systems and the general theory of communication, an approach to the formation of signal structures of a complex structure has been developed, which ensures an increase in the properties of their structural secrecy in relation to unauthorized users. At the same time, the known solutions at the physical level of signal spaces were refined, which made it possible to formalize the procedures for the formation of radio signals with specified properties. The method of formalizing the function of displaying the signal space based on the allocation of stochastic properties of pseudo-random sequences has been substantiated, which made it possible to ensure the uncertainty of their structure in case of unauthorized processing. The approbation of the proposed approach is given on the example of the formation of quadrature modulation signals, taking into account the subsequent analysis of their properties from various positions of legitimate and illegitimate users. The results obtained confirm the uncertainty during illegitimate processing with a slight deterioration in the noise immunity properties of radio communication systems. In general, this allows to conclude the adequacy of theoretical solutions. As an example, constellation diagrams of signals at the output of a quadrature receiver are presented. The set of proposed technical solutions presented in the work determines the novelty of this approach. The scientific problem to be solved belongs to the class of problems of synthesis of signals of complex structures.
References
2. Makarenko S.I. Informacionnoe protivoborstvo i radiojelektronnaja bor'ba v setecentricheskih vojnah nachala XXI veka [Information confrontation and electronic warfare in network-centric wars at the beginning of the XXI century]. Sankt-Peterburg. 2017. (In Russ.).
3. Shtan'ko S.V. [Restriction of unauthorized access in radio engineering systems with broadcasting information]. Informacionno-upravljajushhie sistemy. [Information and control systems]. 2018. no. 5 (96). pp. 57-65. (In Russ.).
4. Moldovyan D.N., Moldovyan N.A., Moldovyan A.A. Commutative encryption method based on Hidden logarithm problem. Bulletin of the South Ural State University. Series: Mathematical Modelling, Programming and Computer Software. 2020. vol. 13. no. 2. pp. 54-68.
5. Moldovyan A.A., Moldovyan N.A., Phieu N.H., Nguyen H.M., Tran C.M. Digital signature algorithms based on Hidden discrete logarithm problem. Advances in Intelligent Systems and Computing. 2020. vol. 1014. pp. 1-12.
6. Kuzmin A.S., Markov V.T., Mikhalev A.A., Mikhalev A.V., Nechaev A.A. Cryptographicalgorithms on groups and algebras. Journal of Mathematical Sciences. 2017. vol. 223. no. 5. pp. 629–641.
7. Kanevskij Z.M., Litvinenko V.P. Teorija skrytnosti [Theory stealth]. Voronezh: Izd-vo Voronezh.gos. un-ta. [Voronezh: Publishing Voronezh State. University]. 1991. P. 142. (In Russ.).
8. Pantenkov D.G., Litvinenko V.P. [Algorithms of formation and processing of radio signals of command and telemetry radio lines and technical proposals for their implementation]. Vestnik Voronezhskogo gosudarstvennogo tehnicheskogo universiteta. [Bulletin of voronezh state technical university]. 2020. vol. 16. no. 2. pp. 90-105. (In Russ.).
9. Gavrishev A.A. [Application of ks-entropy for quantitative analysis of civil defense communication systems]. Sibirskij pozharno-spasatel'nyj vestnik. [Siberian fire and rescue bulletin]. 2020. no. 3 (18). pp. 47-54. (In Russ.).
10. Sizov A.S., Cyplakov Ju.V. [Analysis of composite signals in radiolocation and secured radio communication]. Telekommunikacii [Telecommunications]. 2020. no. 5. pp. 33-40. (In Russ.).
11. Zhilyakov E.G., Belov S.P., Ursol D.V. About signals allowing to provide sustainability to impacts of short-term and or focused on spectrum interference. International Journal of Engineering and Technology (UAE). 2018. vol. 7. no. 2. pp. 16-20.
12. Kichenko A.N., Savel'ev A.V., Shishakov K.V. [Analysis of signal-code structures in the tasks of increasing the energy stealth of radios]. Intellektual'nye sistemy v proizvodstve. [Intelligent systems in production]. 2020. vol. 18. no. 4. pp. 11-20. (In Russ.).
13. Kirillov S.N., Lisnichuk A.A., Lukasin I.V., Pokrovskij P.S. Methods to form both anti-interference and hiding radio signals for prospective communication systems. International Siberian Conference on Control and Communications. (SIBCON’2019) Proceedings. 2019. P. 8729649.
14. Dvornikov S.V., Manaenko S.S., Dvornikov S.S. [Parametric mimicry signals modulated oscillations formed in various functional basis]. Informacionnye tehnologii. [Information technology]. 2015. vol. 21. no. 4. pp. 259-263. (In Russ.).
15. Kirillov S.N., Lisnichuk A.A., Lukashin I.V., Pokrovskij P.S. Algorithms to form and process signals for multilevel defense of transmitted data based on the principles of cognitive and software-defined radio. Moscow Workshop on Electronic and Networking Technologies. (MWENT’2018) Proceedings. 2018. pp. 1-6.
16. Fink L.M. Teorija peredachi diskretnyh soobshhenij [Discrete message transmission theory]. M.: Sov. Radio. 1970. P. 718. (In Russ.).
17. Middleton D. An introduction to statistical communication theory. Volume 1. 1960. Russ. ed.: Middlton D. Vvedenie v statisticheskuju teoriju svjazi. Tom 1. M.: Sov. Radio. 1961. P. 782.
18. Feher K. Wireless digital communications. Modulation and spread spectrum applications. Prentice Hall PTR. 1995. Russ. ed.: Feer K. Besprovodnaja cifrovaja svjaz'. Metody moduljacii i rasshirenija spectra. M.: Radio i svjaz'. 2000. P. 520.
19. Varakin L.E. Teorija slozhnyh signalov. [Complex signal theory]. M.: Svjaz'. 1970. P. 317. (In Russ.).
20. Pickholtz R.L., Schilling D.L., Milstein L.B. Theory of Spread-Spectrum Communications – A Tutorial. IEEE Trans. Commun. 1982. vol. 30 (5). pp. 855–884.
21. Anderson J.B. Called Modulation Systems. N.Y.: Kluwer Academic Publishers. 2003. P. 544.
22. Dvornikov S.V., Pshenichnikov A.V., Manaenko S.S. [Model of phase-shift keying broadband signal with program operating frequency tuning]. Telekommunikacii. [Telecommunications]. 2017. no. 9. pp. 8-12. (In Russ.).
23. Borisov V.I., Zinchuk V.M., Limarev A.E. Pomehozashhishhennost' sistem radiosvjazi rasshireniem spektra signalov metodom psevdosluchajnoj perestrojki rabochej chastoty. [Interference immunity of radio communication systems by spreading the spectrum of signals by the method of pseudo-random tuning of the operating frequency]. M.: RadioSoft. 2008. P. 512. (In Russ.).
24. Bekkiev A.Ju., Borisov V.I. [Estimation of the anti-interference ability of radio communication channels under electronic warfare conditions]. Radiotehnika i jelektronika. [Journal of Communications Technology and Electronics]. 2019. vol. 64. no. 9. pp. 891-901. (In Russ.).
25. Dvornikov S.V., Pshenichnikov A.V., Rusin A.A. [Generalized functional model of a radio link control its frequency resource]. Voprosy radiojelektroniki. Serija: Tehnika televidenija. [Questions of radio electronics. Series: television technology]. 2016. no. 3. pp. 49-56. (In Russ.).
26. Dvornikov S.V., Dvornikov S.S., Pshenichnikov A.V. [Analysis of frequency resource for fhss mode]. Informacionno-upravljajushhie sistemy. [Information and Control Systems]. 2019. no. 4 (101). pp. 62-68. (In Russ.).
27. Pshenichnikov A.V. [Estimation of statistical parameters of operating frequencies for radio model in conflict situations]. T-Comm: Telekommunikacii i transport. [T-Comm: Telecommunications and transport]. 2017. vol. 11. no. 1. pp. 4-9. (In Russ.).
28. Tuzov G.I. Statisticheskaja teorija priema slozhnyh signalov [Statistical theory of complex signal reception]. M.: Sov. Radio. 1977. P. 116. (In Russ.).
29. Dvornikov S.V., Pshenichnikov A.V. [Design of spectral-efficient signal construction in radio data transmission control and measuring complexes]. Izvestija vysshih uchebnyh zavedenij. Priborostroenie. [Journal of Instrument Engineering]. 2017. vol. 60. no. 3. pp. 221-228. (In Russ.).
30. Proakis J.G. Digital communication. Mc Graw-Hill. 1995. Russ. ed.: Prokis Dzh. Cifrovaja svjaz'. M.: Radio i svjaz'. 2000. P. 800.
31. Klovskij D.D. Peredacha diskretnyh soobshhenij po radiokanalam. [Transmission of discrete messages over radio channels]. M.: Radio i svjaz'. 1982. P. 304.(In Russ.).
32. Dvornikov S.V., Pshenichnikov A.V. [Noise immunity radio link model in dynamic intentional exposure]. Izvestija vysshih uchebnyh zavedenij Rossii. Radiojelektronika. [Izvestia of the Higher Educational Institutions of Russia. Radioelectronics]. 2017. no. 2. pp. 16-22. (In Russ.).
33. Mesarovich M., Takahara Ja. Obshhaja teorija sistem. Matematicheskie os-novy.[General systems theory. Mathematical foundations]. M.: Izdatel'stvo «Shir'». 1978. P. 315. (In Russ.).
34. Skljar B. Cifrovaja svjaz': teoreticheskie osnovy i prakticheskoe primenenie. [Digital Communications: Fundamentals and Applications]. M.: Vil'yams. 2016. P. 1099. (In Russ.).
35. Helstrom K. Statisticheskaja teorija obnaruzhenija signalov. [Statistical signal detection theory]. M.: Izdatel'stvo inostrannoj literatury. 1963. P. 432. (In Russ.).
36. Wilson S.G. Digital Modulation and Coding. Prentice Hall. 1996. P. 667.
37. Franks L.E. Signal theory. Prentice Hall Inc Englewood Cliffs. N.J. 1969. Russ. ed.: Frenks L. Teorija signalov. M.: Sov. Radio. 1974. P. 344.
38. Dvornikov S.V., Pshenichnikov A.V., Manaenko S.S., Dvornikov S.S. [A method of forming multiposition jamproof signal constructions]. Informacionnye tehnologii. [Information technology]. 2017. vol. 23. no. 9. pp. 669-676. (In Russ.).
39. Mehrota A. Analog and Digital Systems.Artech House. London. 1996. P. 205.
40. Ungerboeck G. Trellis-coded modulation with redundant signal sets Part II: State of the art. Communications Magazine. IEEE. 1987. Vol. 25. Is. 2. pp. 5-11.
41. Torrieri D.J. Principles of secure communication systems. Dedham. MA.: Artech House Inc. 1985. P. 286.
42. Pshenichnikov A.V. [Model of multi-position noise-proof signal structure based on QPSK modulation]. Informacija i kosmos. [Information and Space]. 2017. no. 2. pp. 48-52. (In Russ.).
43. Cahn C.R. Combined Digital Phaseand Amplitude Modulation Communication Systems. IRE Transactionson Communications Systems. Vol. CS-8. 1960. pp. 150–154.
44. Korn I. DigitalCommunications. N. Y.: Van Nostrand Reinhold Co. 1985. P. 676.
45. Buga N.N. Informacija i jelektricheskie signaly [Informations and electrical signals]. L.: LKVVIA. 1960. P. 71. (In Russ.).
Published
How to Cite
Section
Copyright (c) Unknown, Unknown, Unknown
![Creative Commons License](http://i.creativecommons.org/l/by/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms: Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).