Preview

Proceedings of the Southwest State University. Series: IT Management, Computer Science, Computer Engineering. Medical Equipment Engineering

Advanced search

Increasing the Reliability of Determining the Source of Fragmented Messages by Using Methods for Analyzing the Time of Receipt of Individual Fragments

https://doi.org/10.21869/2223-1536-2021-11-4-46-60

Abstract

Purpose of research. The article discusses a method for increasing the reliability of authentication of data sources in distributed information systems using communication channels with low bandwidth. Such systems are characterized by a small size of authentication codes contained in individual messages, which leads to a significant frequency of authentication errors.

Methods. The article presents an algorithm for correcting authentication errors performed for chains of information blocks. Due to the analysis of the time of receipt of blocks to the receiver, a numerical metric is formed for each message chain, which is recognized by the receiver as a chain formed by the target source. The chain is selected based on the minimum value of the calculated metric.

Results. Based on the real time characteristics of network packet delivery, a simulation model was created for the formation and verification of metrics generated for message chains. It is shown that, depending on the value of the simulated parameters of network packet transmission, the use of the proposed universal metric allows with a probability of up to 80% to choose from two chains identified by the receiver as a chain of blocks of the target source the one that is actually formed by it.

Conclusion. The paper shows that the use of an algorithm for analyzing meta-information - the time of receiving a data packet - can be used as a means of increasing the reliability of the authentication procedure performed for a remote subject of information exchange in conditions when the use of conventional cryptographic algorithms does not provide the required reliability. The proposed algorithm has low computational complexity, is easily implemented in hardware and reduces the number of errors when processing information data packets.

About the Authors

M. O. Tanygin
Southwest State University
Russian Federation

Maxim O. Tanygin, Cand. of Sci. (Engineering), Head of the Department of Information Security

50 Let Oktyabrya str. 94, Kursk 305040



D. Hemrayev
Southwest State University
Russian Federation

Dessan Hemrayev, Student of the Department of Information Security

50 Let Oktyabrya str. 94, Kursk 305040

 



O. V. Kazakova
Southwest State University
Russian Federation

Olga V. Kazakova, Student of the Department of Information Security

50 Let Oktyabrya str. 94, Kursk 305040

 



References

1. Lichtzinder B. Ya., Kirichek R. Va., Fedotov E. D., Golubnichaya E. Yu., Kochurov A. A. Besprovodnye sensornye seti: uchebnoe posobie [Wireless sensor networks. Textbook for universities]. Moscow, Hotline-Telecom Publ., 2020. 236 p.

2. Perry L. Arkhitektura interneta veshchei [Architecture of the Internet of Things]. Moscow, DMK Press Publ., 2018. 454 p.

3. Bitner V. I., Mikhailova Ts. Ts. Seti novogo pokoleniya - NGN [Networks of a new generation]. Moscow, Hotline-Telecom Publ., 2011. 226 p.

4. 802.15.4-2015. IEEE Standard for Low-Rate Wireless Personal Area Networks. IEEE Computer Society. https://doi.org/10.1109/ieeestd.2016.7460875.

5. Tanygin M. O., Alshaeaa H. Y., Kuleshova E. A. A method of the transmitted blocks information integrity control. Radio Electronics, Computer Science, Control, 2020, no. 1, pp. 181-189.

6. Tanygin M. O. [Detection of commands issued by extraneous programs during software control of the device operation]. Optiko-elektronnye pribory i ustroistva v sistemakh raspoznavaniya obrazov, obrabotki izobrazhenii i simvol'noi informatsii. Raspoznavanie - 2003. Sbornik materialov VI Mezhdunarodnoi konferentsii [Optoelectronic devices and devices in image recognition systems, image processing and symbolic information. Recognition - 2003. Collection of materials of the 6th International Conference]. Kursk, Kursk State Technical University Publ., 2003, pp. 178-179. (In Russ.).

7. Tanygin M. O. Method of Control of Data Transmitted Between Softwareand Hardware. Computer Science and Engineering. Materials of the IV International Conference of Young Scientists CSE-2010. Lviv, Vidavnitstvo Lvivskoi politekhniki Publ., 2010, pp. 344345.

8. Box J., Jenkins G. Analiz vremennykh ryadov. Prognoz i upravlenie [Time series analysis. Forecast and management]. Moscow, Mir Publ., 1974. 197 p.

9. Bolshakov A. A., Karimov R. N. Metody obrabotki mnogomernykh dannykh i vremennykh ryadov [Methods of processing multidimensional data and time series]. Moscow, Hotline-Telecom Publ., 2007. 520 p.

10. Aliyev T. I., Muravyeva-Vitkovskaya L. A. Prioritetnye strategii upravleniya traf- ikom v mul'tiservisnykh komp'yuternykh setyakh [Priority strategies for traffic management in multiservice computer networks]. Izvestiya vuzov. Priborostroenie = Proceedings of Universities. Instrumentation, 2011, vol. 54, no. 6, pp. 44-49.

11. Afanasyev V. N., Yuzbashev M. M. Time series analysis and forecasting: Textbook. Moscow, Finance and Statistics Publ., 2001. 228 p.

12. Balakrishnan N. Handbook of the Logistic Distribution. New York, Marcel Dekker, 1992.

13. Muravyeva-Vitkovskaya L. A. Otsenka strukturnykh parametrov marshrutizatora pri prioritetnom upravlenii neodnorodnym trafikom s proizvol'nym raspredeleniem dlin paketov [Evaluation of the structural parameters of a router with priority management of heterogeneous traffic with an arbitrary distribution of packet lengths]. Izvestiya vuzov. Priborostroenie = Proceedings of Universities. Instrumentation, 2017, vol. 60, no. 10, pp. 951-956.

14. Makarenko S. I., Afanasyev O. V., Baranov I. A., Samofalov D. V. Eksperimental'nye issledovaniya reaktsii seti svyazi i effektov peremarshrutizatsii informatsionnykh potokov v usloviyakh dinamicheskogo izmeneniya signal'no-pomekhovoi obstanovki [Experimental studies of the reaction of the communication network and the effects of re-routing of information flows in the conditions of dynamic changes in the signal-interference situation]. Zhurnal radioelektroniki = Journal of Radio Electronics, 2016, no. 4, p. 2.

15. Farashiani M. A., Muravyeva-Vitkovskaya L. A. Analiz sootvetstviya generi-rue- mogo pri modelirovanii potoka zayavok real'nomu trafiku v komp'yuternykh setyakh [Analysis of the correspondence generated by modeling the flow of applications to real traffic in computer networks]. Izvestiya vuzov. Priborostroenie = Proceedings of Universities. Instrumentation, 2017, vol. 60, no. 1. pp. 10-13.

16. Zaitsev V., Sokolov N. Osobennosti mul'tiservisnogo trafika s uchetom soobshchenii, sozdavaemykh ustroistvami IoT [Features of multiservice traffic taking into account messages generated by IoT devices]. Pervaya milya = First Mile, 2017, no. 4, p. 44-47.

17. Ledneva O. N., Romasevich E. P. Analiz trafika ustroistv interneta veshchei [Traffic analysis of Internet of Things devices]. Sovremennye informatsionnye tekhnologii i IT-obrazovanie = Modern Information Technologies and IT Education, 2018, vol. 14, no. 1, pp. 149-169.

18. Tanygin M. O. Teoreticheskie osnovy identifikatsii istochnikov informatsii, peredavaemoi blokami ogranichennogo razmera: monografiya [Theoretical foundations of identification of sources of information transmitted by blocks of limited size]. Kursk, Universitetskaya kniga Publ., 2020. 198 p.

19. Mikheeva T. V. Obzor sushchestvuyushchikh programmnykh sredstv imitatsionnogo modelirovaniya pri issledovanii mekhanizmov funktsionirovaniya i upravleniya proizvodstvennymi sistemami [Review of existing simulation software tools in the study of mechanisms of functioning and management of production systems]. Izvestiya Altaiskogo gosudarstvennogo universiteta. Seriya: Upravlenie, vychislitel'naya tekhnika i informatika = Proceedings of the Altai State University. Series: Management, Computer Engineering and Computer Science, 2009, no. 1(61), pp. 87-90.

20. Zviran M. Identification and Authentication: Technology and Implementation Issues. Communications of the Association for Information Systems, 2006, no. 17. https://doi.org/10.17705/1CAIS.01704.

21. Andress J. Identification and Authentication. The Basics of Information Security. 2014. https://doi.org/10.1016/B978-0-12-800744-0.00002-6.

22. Golmieh A., Ahuja B., Chaponnier E., Montojo H., Landby S. A., Chande V. Sposob i ustroistvo dlya peredachi paketnykh dannykh s nebol'shim ob"emom sluzhebnoi informatsii i upravleniya rezhimom priema [Method and device for transmitting packet data with a small amount of service information and control of the reception mode]. Patent RF, 2436247, 2007.


Review

For citations:


Tanygin M.O., Hemrayev D., Kazakova O.V. Increasing the Reliability of Determining the Source of Fragmented Messages by Using Methods for Analyzing the Time of Receipt of Individual Fragments. Proceedings of the Southwest State University. Series: IT Management, Computer Science, Computer Engineering. Medical Equipment Engineering. 2021;11(4):46-60. (In Russ.) https://doi.org/10.21869/2223-1536-2021-11-4-46-60

Views: 170


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2223-1536 (Print)