MODERN APPROACHES TO PROVIDING CYBER SECURITY IN RADIO RELAY COMMUNICATION LINES

Authors

DOI:

https://doi.org/10.28925/2663-4023.2022.17.5764

Keywords:

cyber attacks, cyber security, cyber threats, radio relay communication

Abstract

This article examines the impact of the AcidRain malware, which was used against Ukraine during the Russian invasion. Therefore, after the disruption of the Viasat satellite Internet service, a large share of data transmission fell on other types of communication, one of which is radio relay communication. Today, radio relay communication remains one of the priority types of communication. The main conditions that determine the development of radio relay communication and the preservation of its rather high specific weight in the market for the provision of telecommunication services can be conventionally divided into organizational, technical and technological ones. In order to ensure the development of radio relay communication and to preserve its rather high specific weight in the market for the provision of telecommunication services, it is necessary to pay attention to cyber security during the construction of radio relay communication lines. To do this, each official at the appropriate level must pay attention to these points of control to ensure reliable cyber protection in radio relay communication lines, namely, have the appropriate theoretical knowledge of administrators and users in information and communication systems, communication networks, as well as properly act in practice under time to ensure cyber security when deploying radio relay communication lines. Russia's cyberattacks before the invasion of Ukraine proved that cyberattacks today play an important and strategic role in the modern world and are being waged, regardless of whether the electorate knows about it. This threat to us was and is constant and it does not stand still, but only develops. Cyberattacks cause devastating problems to our information and communication systems, communication networks and infrastructure with paradoxical, sometimes deplorable consequences. The reliable operation of radio relay communication lines depends on ensuring cyber security. You should focus on this, and at the same time make maximum efforts. Every day, technological progress will only grow more and more, paradoxically, war is the "engine of progress", and behind the growth of technical progress will be the growth of dependence in cyberspace.

 

Downloads

Download data is not yet available.

References

Zhenzhera, S. and others. (2015). The history of the development of telecommunications. Unknown pages. Information Processing Systems, 5(130), 6–10.

Nechet T. Russia's war against Ukraine began with a cyberattack on satellites. An hour before the invasion, "tens of thousands" of Viasat terminals were destroyed. ITC.ua. https://itc.ua/ua/novini/vijna-rosiyi-proti-ukrayini-pochalasya-z-kibernapadu-na-suputniki-za-godinu-do-vtorgnennya-buli-znishheni-desyatki-tisyach-terminaliv-viasat/ (date of application: 01.09.2022).

Maltseva, I., Chernysh, Yu., Shtonda, R. (2022). Analysis of some cyber threats in the conditions of war. : Electronic specialized scientific publication Cybersecurity: education, science, technology, 4(16), 37-44. https://csecurity.kubg.edu.ua/index.php/journal/article/view/362

Yakymchuk, Yu. (2022). Design problems of digital radio relay lines. Collection of theses: modern information and communication technologies. https://dut.edu.ua/uploads/n_10254_58714921.pdf.

Modern radio relay communication. (2017). https://lantorg.com/article/sovremennaya-radiorelejnaya-svyaz

Kushnir, O., Vasyuta, K., Ozerov, S., Lytvyn, A., Severilov, A. (2017). The main trends and prospects for the development of military radio relay communication. Collection of scientific works of Kharkiv Air Force University, 4, 7–11. http://irbis-nbuv.gov.ua

Musavian, L., Aissa, S., Lambotharan, S. (2010). Effective capacity for interference and delay constrained cognitive radio relay channels. IEEE transactions on wireless communications, 9(5), 1698–1707. https://doi.org/10.1109/tcomm.2010.05.090600

Sakarellos, V.K., Skraparlis, D., Panagopoulos, A.D., Kanellopoulos, J.D. (2010). Outage Performance Analysis of a Dual-Hop Radio Relay System Operating at Frequencies above 10GHz. IEEE Transactions on Communications, 58(11), 3104–3109. https://doi.org/10.1109/tcomm.2010.091310.0900692

Very Verified: an online course on media literacy. Action. Digital Education. (2021). https://osvita.diia.gov.ua/courses/very-verified.

Be careful! Cyber fraudsters. Action. Digital Education. (2021). https://osvita.diia.gov.ua/courses/attention-cyber-fraudsters.

Basics of cyber hygiene. Action. Digital Education. (2021). https://osvita.diia.gov.ua/courses/cyber-hygiene

The Committee on Digital Transformation informs enterprises and institutions how to strengthen cyber protection. The official portal of the Verkhovna Rada of Ukraine. https://www.rada.gov.ua/news/razom/221800.html

Downloads


Abstract views: 293

Published

2022-09-29

How to Cite

Oleksenko , V. ., Shtonda, R., Chernish, Y. ., & Maltseva, I. (2022). MODERN APPROACHES TO PROVIDING CYBER SECURITY IN RADIO RELAY COMMUNICATION LINES. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(17), 57–64. https://doi.org/10.28925/2663-4023.2022.17.5764

Most read articles by the same author(s)