INCREASING THE SECRECY OF TRANSMISSION INFORMATION BASED ON COMBINED RANDOM CODING
Keywords:Information protection, secrecy, coding, timer signal, noise immunity
AbstractContext. The task of increasing the secrecy of information transmission based on combined random coding is considered. The
object of research is the integration processes of stochastic, block and timer coding.
Objective. The aim of the article is to develop a method of increasing the secrecy transmission based on combined random coding.
Method. The method of increasing the secrecy of information transmission based on combined random coding with three steps
of code converters: internal, intermediate and external is proposed. The internal converter is implemented based on stochastic coding with various numbers of random code combinations. The number of random combinations depends on the probability of the character of the symbol in the message text. The information secrecy of the transmission is ensured by equalizing the probabilities of the occurrence of code combinations from the output of the statistical coder. Intermediate coding is implemented using a noise immunity block code. Information secrecy and noise immunity leads to the increasing the length of the code block at each stage of coding, which reduces the code rate. To solve this problem, an external converter based on timer coding is used. At this stage, binary combinations are converted into timer signal structures, which allows for the implementation of a structural transmission secrecy, increase the code rate and improve noise immunity. When the stochastic encoding and a timer used codebooks.
Results. The developed method of combined random coding allows to increase the main indicators of noise immunity: interference
protection, information and structural secrecy.
Conclusions. The proposed method of combined random coding allows to eliminate the main disadvantages of stochastic coding,
in which the choice of the number of random code combinations does not take into account the entropy of the discrete source of information. For solving this problem, it was proposed to use different number of random combinations, in view of the probability of an alphabet symbol appearing in the text. From the theoretical point of view, this will allow the output of the statistical coder to form a stream of combinations with equal probabilities of occurrence. Due to the usage of timer signal constructions, the problem of redundancy compensation is solved, which appears during stochastic and noise-immune coding.
Sha’ameri A. Z. Robust multiple channel scanning and detection of low probability of intercept (LPI) communication signals / A. Z. Sha’ameri, A. Kanaa // Defense S&T technical bulletin. − 2016. − Vol. 9, Issue 1. − P. 1−17.
MacKay D. Fountain codes. / D. MacKay // IEEЕ Proceedings Communications. − 2005. − Vol. 152, № 6. − P. 1062−1068.
Zakharchenko M. Integrated methods of information security in telecommunication systems / M. Zakharchenko, V. Korchynskii, V. Kildishev // 2017 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo’2017), IEEE Xplore Digital Library, Odessa, 11–15 September 2017 : proceeding. – Odessa: IEEE, 2017. – P. 78–81.
Information technology. Security techniques. Code of practice for information security controls. : ISO/IEC 27002:2013. [Effective from 2013-09-25]. – Geneva, ISO, 2013. – 80 p.
Glisic, S. Adaptive WCDMA: Theory and Practice / S. Glisic. – John Wiley & Sons, 2003. – 357 p.
Zakharchenko N. Information security of Time-Controlled Signals in Confidential Communication Systems / N. Zakharchenko,
V. Korchinsky, B. Radzimovsky // Modern problems of radio engineering, telecommunications and computer science: ΧΙ International Conference TCSET 2012, Lviv-Slavske, 21–24 February 2012. – Lviv : Publishing House of Lviv Polyteshnic, 2012. – P. 317.
Development of the procedure for forming non-stationary signal structures based on multicomponent lfm signals / [V.Korchinskyi, М. Hadzhіyev, V. Kildishev et al.] // Eastern-European Journal of Enterprise Technologies. – 2018. – № 6/9 (96). – P. 29–37.
Assessing the Impact of the Noise on the Throughput Communication Channel with Timing Signals / [ N. Zakharchenko, V. Korchinskiy, B. Radzimovsky et al. ] // Eastern European Scientific Journal: AURIS Communications- und Verlagsgesellschaft mbH. – 2015. – № 4. – P. 209–214.
Maltsev G. N. Immunity and secrecy of transmitting information over radio channels based on combined random coding / G. N. Maltsev // Information control systems. − 2016. − Vol. 19, Issue 2. − P. 126−139.
Lu Yu. Stochastic Tools for Network Security: Anonymity Protocol Analysis and Network Intrusion Detection : thesis … doctor of philosophy / Lu Yu. – Clemson : Clemson University, 2012. – 101 p.
Zhu Y. Anonymity v.s. Information Leakage in Anonymity Systems / Y. Zhu, R. Bettati // Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus, June, 2005 : proceedings : – Texas: IEEE, 2005. – P. 86−97.
Banket V. Efficiency of Forvard Error Correcting Methods for Optical Telekommunications / V. Banket, F. Toporkov // Proceedings of SPIE «Integrated Optics: Theory and Applications, Warsaw, September, 2005 : proceedings : – Warsaw:SPIE 2005. – P. 12.2–12.4.
Freeman R. Radio System Design for Telecommunications / R. Freeman. – New York : John Wiley & Sons, 1997. – 880 p.
How to Cite
Copyright (c) 2019 V. V. Korchynskyi, V. I. Kildishev, D. V. Holev, O. M. Berdnikov
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Creative Commons Licensing Notifications in the Copyright Notices
The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions.
The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles.
The journal allows to reuse and remixing of its content, in accordance with a Creative Commons license СС BY -SA.
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License CC BY-SA that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.