METHODS FOR ASSESSING INFORMATION SECURITY IN COMMUNICATION NETWORKS
DOI:
https://doi.org/10.28925/2663-4023.2025.28.812Keywords:
radio emission source, signal detection, electromagnetic accessibility, detection probability, ultrashort transmissions, radio control, interference immunityAbstract
The article considers methods for evaluating the parameters of detecting signals of means of covert information acquisition, in particular sources of radio radiation. Calculation expressions are given for determining the average time of detection of a source of radio radiation and the probability of its disclosure during the permissible observation time. Special attention is paid to assessing the efficiency of detecting ultrashort transmissions, which are characterized by small time intervals of radiation. For this purpose, a sequence of calculations is proposed, which includes the analysis of electromagnetic accessibility, determination of the signal power at the receiver input, taking into account interference and noise, as well as calculating the probability of frequency-time contact of the detection complex with the radiation source. The main factors affecting the detection efficiency are considered: radiation duration, frequency range, technical characteristics of the receiving equipment, radio wave propagation conditions and interference conditions. An approach is proposed to determine the required sensitivity of radio control means to ensure a given probability of detection. Recommendations are also given for optimizing the parameters of the detection system in case of failure to meet the conditions of electromagnetic accessibility. The methodology can be used in the design of radio control complexes, as well as for the analysis of their effectiveness in real operating conditions. The results obtained allow to increase the accuracy of the assessment of the capabilities of systems for detecting radio radiation sources and to ensure effective counteraction to technical channels of information leakage.
Downloads
References
Laptev, O.A., Kuzavkov, V.V., & Khoroshko, V.O. (2023). Textbook “Search systems for covert acoustic information acquisition”. Kyiv: Millennium.
Ilyin, V.P. (2012). Technical means of radio control. Kharkiv: KHVU.
Shynkarenko, Y.S. (2014). Electromagnetic compatibility and availability. Odesa: Nauka.
Borisov, V. I. (2011). Statistical methods of signal analysis. Kyiv: Naukova Dumka.
Kulyk, V.G. (2009). Methods for evaluating the effectiveness of radio control. Kyiv: Publishing house “Politehnika”.
Semenov, O.I. (2015). Formalized models of radio interference. Kharkiv: KNURE.
Laptev, O.A., & Khoroshko, V.O. (2024). Detection, localization and processing of signals of covert information gathering equipment. Kyiv: Millennium.
Barabash, O.V., Laptev, A.A., Svynchuk, O.V., Solovyov, E.V., & Bushkov, V.G. (2020). Estimation of the noise immunity of the radio signal detection path. Modern Information Protection, 1, 18–24.
Laptev, O.A., Sobchuk, V.V., & Savchenko, V.A. (2019). A method for increasing the noise immunity of the system for detecting, recognizing and localizing digital signals in information systems. Collection of scientific papers of the Military Institute of Taras Shevchenko National University of Kyiv. VІKNYK, 66, 124–132.
Yevseiev, S., Khokhlachova, Yu., Ostapov, S., Laptiev, O., Korol, O., & Milevskyi, S. et. al. (2023). Models of socio-cyber-physical systems security:Monographs. PC TECHNOLOGY CENTER. http://doi.org/10.15587/978-617-7319-72-5
Laptiev, O., Sobchuk, V., Ryzhov, A., Sobchuk, A., Kopytko, S. & Shuklin, G. (2024). Harmonic Operators in Mathematical Models of Sources of Detection of Unauthorized Access to Information. 6 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA 2024), 1–6. https://doi.org/10.1109/HORA61326.2024.10550552
Laptev, O., Sobchuk, V., Barabash, O., & Musienko, A. (2022). A method for determining the parameters of radio-embedded devices using differential transforms. V International scientific and practical conference. “Problems of cybersecurity of information and telecommunication systems” (PCSIТS), 63–65.
Laptev, O.A., & Marchenko, V.V. (2025). Application of interference to protect information from leakage by radio channel. Modern information protection, 1, 89–97. https://doi.org/10.31673/2409-7292.2025.013057
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Тетяна Лаптєва, Олександр Лаптєв, Микола Браіловський

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.