THE METHOD OF OPTIMIZING THE DISTRIBUTION OF RADIO SUPPRESSION MEANS AND DESTRUCTIVE SOFTWARE INFLUENCE ON COMPUTER NETWORKS

Authors

  • S. M. Sholokhov National Technical University of Ukraine “Kyiv Polytechnic Institute named Igor Sikorsky”, Kyiv, Ukraine, Ukraine
  • P. M. Pavlenko National Aviation University, Kyiv, Ukraine, Ukraine
  • B. A. Nikolaienko National Technical University of Ukraine “Kyiv Polytechnic Institute Named Igor Sikorsky”, Kyiv, Ukraine, Ukraine
  • I. I. Samborsky National Technical University of Ukraine “Kyiv Polytechnic Institute named Igor Sikorsky”, Kyiv, Ukraine, Ukraine
  • E. I. Samborsky National Aviation University, Kyiv, Ukraine, Ukraine

DOI:

https://doi.org/10.15588/1607-3274-2023-4-2

Keywords:

information exchange, computer radio network, computer attack, protection of information, radio suppression, optimization of resource allocation, destructive influence

Abstract

Context. Currently, generalized methodical approaches to the development of scenarios of complex radio suppression and electromagnetic influence of typical special telecommunication systems have been developed. However, during the development of possible cases for the complex application of radio suppression and destructive software influence,the problem of optimizing the resource of these means and its distribution according to the goals of radio suppression and objects of destructive computer influence arose, which has not yet been fully resolved.Especially in the literature known to the authors, there is no method for optimizing the resource distribution of radio and computer influence, used for the development and practical implementation of optimal scenarios of destructive influence on computer networks of enemy military groups in military operations.

Therefore, it is necessary to formulate a problem and develop a method of optimizing the distribution of the resource of radio suppression and destructive software influence for the development of possible scenarios of the enemy’s violation of information exchange in a standart telecommunication network.

Objective. The purpose of the research is to develop a method for optimizing the distribution of the resource of radio suppression and destructive software influence for the development of scenarios of information exchange violations by the enemy in the telecommunications network.

Method.To achieve the purpose of the research, the methods of nonlinear optimization of heterogeneous resource distribution, mass service theory, and expert evaluation were comprehensively applied and developed in the field of modeling of information conflict.

To determine the coefficients of protection of objects from radio-electronic and destructive computer influence, expert evaluation methods are used, in particular, the method of frequencies of preferences of the decision-maker using the Thurstone method. This method requires only one expert (a decision-maker), minimal communication time with him, minimal expert information (full ordering of weighting factors) and can be applied with a small number of evaluated weighting factors.

To solve the problem of optimal distribution of a heterogeneous resource of means of destructive influence, to ensure the value of the multiplicative objective function of an arbitrary form is not less than the given one, the method of successive increments is applied.

To determine the efficiency indicator of information exchange violation, the methods of mass service theory are applied, which allows to formalize special telecommunication systems as a set of mass service systems – subsystems of digital communication and computer networks.

Results. The formulated problem and the entered indicators made it possible to solve the problem of determining the minimum resource of means of destructive influence and their optimal distribution according to the purposes of radio suppression on the objects of destructive program influence in order to achieve the required level of disruption of the efficiency of information exchange in special telecommunication systems.

Conclusions.According to the results of the article, a method for optimizing the distribution of the resource of radio suppression and destructive software influence has been developed for the development of possible scenarios of information exchange violations by the enemy in a typical telecommunications network.The verification of the proposed method was carried out by comparing the theoretical results with the results of simulated modeling of scenarios of violation of the information exchange in the telecommunications network by the enemy.

Author Biographies

S. M. Sholokhov, National Technical University of Ukraine “Kyiv Polytechnic Institute named Igor Sikorsky”, Kyiv, Ukraine

PhD, Associate Professor, Associate Professor of the Department Special Telecommunication Systems, Institute of Special Communication and Information Protection

P. M. Pavlenko, National Aviation University, Kyiv, Ukraine

Dr. Sc., Professor, Professor of Department Organization of Air Transportation

B. A. Nikolaienko, National Technical University of Ukraine “Kyiv Polytechnic Institute Named Igor Sikorsky”, Kyiv, Ukraine

PhD, Associate Professor, Associate Professor of the Department Special Telecommunication Systems, Institute of Special Communication and Information Protection

I. I. Samborsky, National Technical University of Ukraine “Kyiv Polytechnic Institute named Igor Sikorsky”, Kyiv, Ukraine

PhD, Senior Research Officer, Associate Professor of the Department Special Telecommunication Systems, Institute of Special Communication and Information Protection

E. I. Samborsky, National Aviation University, Kyiv, Ukraine

Post-graduate student of Department Organization of Air Transportation

References

Bihun N., Shyshatskyi A., Bondar O., Bogrieiev S., Nalapko O., Sova O., Trotsko O. Analysis of the peculiarities of the communication organization in NATO countries, Advanced Information Systems, 2019, Vol. 3 (4), pp. 39–44. DOI: https://doi.org/10.20998/2522-9052.2019.4.05.

Shyshatskiy A. V., Bashkirov O. M., Kostina O. M. Development of integrated systems and data for Armed Forces, Arms and military equipment, 2015. No. 1 (5), pp. 35–40. DOI: http://journals.uran.ua/ index.php/24140651/issue/view/1%285%29%202015.

Zhuk A. V., Shyshatskiy P. V., Zhuk O. G., Zhyvotovskyi R. M. Methodological substances of management of the radio-resource managing systems of military radio communication, Information Processing Systems, 2017. Vol. 5 (151), pp. 16–25. DOI: https://doi.org/10.30748/soi.2017.151.02.

Sholokhov S., Samborsky I., Nikolayenko B., Vasylenko S., Hordiienko Y. Optimization of resources distribution of radio suppression means and destructive program impact on electronics networks, Information Technology and Security, 2022, Vol. 10, Issue 2 (19), pp. 230–240. DOI:https://doi.org/10.20535/24111031.2022.10.2.270464

Romanenko I., Shyshatskyi A. Analysis of modern condition of military radiocommunication system, Advanced Information Systems, 2017, Vol. 1, No. 1, pp. 28–33. DOI:https://doi.org/10.20998/2522-9052.2017.1.05.

Tomisla K. Improving the integrity of military-defence communication systems using network access points with a focus on terrestrial radio-relay links. Strategos. 2022. Vol. 6 (2), pp. 177–206. DOI: https://hrcak.srce.hr/file/421158.

NATO Glossary of Terms and Definitions: AAP-6 (2018), NATO Standardization Agency, 2018, 2019 р.

Luchuk E. V. Model’ radіo- ta programno-komp’yuternogo podavlennya komp’yuternix merezh protivnika v operacіyax, Vіjs’kovo-texnіchnijzbіrnik, 2011. Vol. 5. pp. 104–109. DOI:https://doi.org/10.33577/23124458.5.2011.104-109

Roma O. M., Vasylenko S. V., Peleshok Ye. V., Honenko S. V., Nikolaienko B. A. Analysis of the synchronism entering process robustness in uav’s radio control line with FHSS, Radio Electronics, Computer Science, Control, 2020, No. 2, pp. 15–24. DOI 10.15588/1607-3274-2020-2-2

Fernandez de Gorostiza E., Berzosa J., Mabe J., Cortiñas R. Method for Dynamically Selecting the Best Frequency Hopping Technique in Industrial Wireless Sensor Network Applications, Sensors, 2018, Vol. 18, Issue 2, P. 657. DOI: https://doi.org/10.3390/s18020657

Evaluation Criteria for IT Security. Part 1 : Introduction and general model. ISO/IEC 15408_1: 2005.

Evaluation Criteria for IT Security. Part 2: Security functional requirements. ISO/IEC 15408_2: 2005.

Evaluation Criteria for IT Security. Part 3: Security assurance requirements. ISO/IEC 15408_3: 2005.

Bhat, Srinidi and KVSSSS Sairam. Optimization of resource allocation in optical networks. IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). 2022. Bangalore, India, pp. 1–9.

Srinivasa K. G., Anil Kumar Muppalla. Guide to High Performance Distributed Computing.Case Studies with Hadoop, Scalding and Spark, Computer Communication and Networks, 2015, 321 p. DOI: https://doi.org/10.1007/978-3-31913497-0

Borovkov A. A. Stochastic Processes in Queueing Theory, Stochastic Modelling and Applied Probability (SMAP). 1976, Vol. 4, 280 р. DOI: https://doi.org/10.1007/978-14612-9866-3

Chen L., Cheng J., and Tseng Y., Optimal path planning with spatial-temporal mobility modeling for individualbased emergency guiding, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2015, Vol. 45, No. 12, pp. 1491– 1501. DOI: 10.1109/TSMC.2015.2445875

Srinivasan V. R, Chiasserini C. F., Nuggehalli P. S., and Rao R. R. Optimal rate allocation for energy-efficient multipath routing in wireless ad hoc networks, IEEE Transactions on Wireless Communications, 2004, Vol. 3, No. 3, pp. 891–899. DOI: https://doi.org/10.1109/TWC.2004.826343

Raskin L. G., Kyrychenko I. O. Multi-index tasks of linear programming. Radio and communication, 1982, 240 p.

Bj¨ornson E., Jorswieck E. Optimal Resource Allocation in Coordinated Multi-Cell Systems, Foundations and Trends in Communications and Information Theory, 2013, Vol. 9, No. 2. pp. 113–381. DOI: 10.1561/0100000069

Downloads

Published

2023-12-22

How to Cite

Sholokhov, S. M., Pavlenko, P. M., Nikolaienko, B. A., Samborsky, I. I., & Samborsky, E. I. (2023). THE METHOD OF OPTIMIZING THE DISTRIBUTION OF RADIO SUPPRESSION MEANS AND DESTRUCTIVE SOFTWARE INFLUENCE ON COMPUTER NETWORKS . Radio Electronics, Computer Science, Control, (4), 16. https://doi.org/10.15588/1607-3274-2023-4-2

Issue

Section

Radio electronics and telecommunications