# 1 2025
Control systems
-
Automated control system for unmanned aerial vehicles when they jointly figure out combat missions
Abstract
- Relevance. The Special Military Operation (SMO), which is being conducted by Russia in Ukraine, leads to a change in the tactics of military formations, as well as their organization and weapons used. The massive use of unmanned aerial vehicles (UAVs) as part of military formations of both the Army and the Air Force is one of the main features of the conduct of military operations in the SMO at the present time. UAVs in the SMO are used both for conducting reconnaissance and for delivering precision strikes against enemy manpower and armored vehicles. The purpose of the paper is to formulate proposals on the purpose, tasks and technical appearance of the automated control system (ACS) of UAVs for their massive and group use to solve special tasks based on the analysis of the features of the use of UAVs in SMO and the analysis of ACS by manned aircraft. The results and their novelty. The results presented in the article are suggestions on the purpose, tasks and technical appearance of the UAVs ACS for solving military tasks. Practical significance. The proposals for the creation of an automated UAVs ACS, which are presented in the paper, are aimed at the command staff of the Army and Air Force, military authorities, specialists both in the field of troop organization and in the field of new means and methods of conducting combat operations in the tactical level. Suggestions on the technical appearance of the UAVs ACS are addressed to technical specialists.
Key words
- unmanned aerial vehicle, special military operation, automated control system, aircraft control, combat operations, communications, control
Reference
- Makarenko S. I., Kozlov K. V. Automated control system for unmanned aerial vehicles when they jointly figure out combat missions. Systems of Control, Communication and Security, 2025, no. 1, pp. 131-155. DOI: 10.24412/2410-9916-2025-1-131-155 (in Russian).
Information security
-
Model for masking information flows of departmental data transmission networks under conditions of computer reconnaissance
Abstract
- Problem statement: the ability of computer intelligence systems to interact with information flows of departmental data transmission networks and to exploit undeclared capabilities and vulnerabilities of software, as well as to deliver malicious content to internal local segments, provides the intruder with the necessary information to form models of the composition, connectivity, and operational interaction of network nodes. One of the ways to prevent these threats is to mask the information exchange of network nodes. However, the existing scientific and methodological framework for determining the probabilistic and temporal characteristics of the compromise of information channels in departmental data transmission networks does not take into account the non-stationarity of the characteristics of the random process of information exchange among network nodes under computer intelligence. The purpose of the work is model development and study the functioning of the departmental data transmission networks in the realization of information exchange masking in the conditions of computer intelligence. Methods used: the methods of random processes examination are used. The scientific novelty of the model lies in the application of mathematical apparatus of the non-homogeneous Markov processes theory with discrete states and continuous time to determine the probabilistic and temporal characteristics of the process of departmental data networks functioning in the implementation of information exchange masking in the conditions of computer intelligence. Practical significance of the model is the finding the probabilistic-temporal characteristics of the process of departmental data transmission networks functioning in the conditions of computer intelligence, which are necessary for determining the optimal values of the masking parameters. Result: the model for masking information channels of departmental data transmission networks under conditions of computer reconnaissance has been developed, which is formalized as a Markov random process with discrete states and continuous time. The obtained output probabilistic-temporal characteristics could be used as an objective function in the formulation of the vector optimization problem and optimal values of network connection parameters of nodes of the departmental data transmission network in the implementation of information exchange masking in the conditions of computer intelligence.
Key words
- data transmission network, information exchange masking, compromise, information flow, random process, computer intelligence
Reference
- Sherstobitov R. S. Model for masking information flows of departmental data transmission networks under conditions of computer reconnaissance. Systems of Control, Communication and Security, 2025, no. 1, pp. 79-104. DOI: 10.24412/2410-9916-2025-1-079-104 (in Russian).
-
Authentication in Cellular Networks: Overview of Mathematical Models
Abstract
- Task Statement: Currently, the urgent task is to protect cellular networks from computer attacks that exploit the vulnerabilities of authentication procedures. Its solution is to improve authentication procedures and create hardware and software tools capable of detecting and neutralizing computer attacks that exploit intractable vulnerabilities. This decision should be based on the modeling results. Objective: Analysis of existing models of authentication procedures in cellular networks for the possibility of reproducing threats caused by known and previously unexplored potential vulnerabilities. Methods used: Systems analysis. Novelty: consideration of the authentication process in cellular networks in the context of the impact of a combination of computer attacks exploiting known and previously unexplored potential vulnerabilities. Result: It has been established that the existing mathematical models of the authentication process in cellular networks are not interconnected and are focused on performance or protection against attacks exploiting vulnerabilities that lead to the opening or modification of data, the opening of subscriber IDs, decryption of information, network desynchronization or repeated requests. The necessity of developing models reproducing the interaction of various cellular communication subsystems during authentication and taking into account the impact of vulnerabilities leading to the analysis of network subscribers' activity, forced termination of authentication, creating delays in the transmission of information and overflowing the memory of network elements has been identified. Practical significance: The results of the study may be useful to specialists responsible for protecting cellular networks from computer attacks.
Key words
- cellular network, authentication, mathematical model, vulnerability, computer attack
Reference
- Boyko A. A., Bykov M. Yu., Kuschev S. S., Peregudov M. A. Authentication in Cellular Networks: Overview of Mathematical Models. Systems of Control, Communication and Security, 2025, no. 1, pp. 187-219. DOI: 10.24412/2410-9916-2025-1-187-219 (in Russian).
Transmission, reception and processing of signals
-
Methodology for obtaining ensembles of discrete orthogonal code sequences with improved autocorrelation functions
Abstract
- Purpose. To increase the structural secrecy of code division information transmission systems, it is necessary to increase the number of ensembles of discrete orthogonal code sequences. It is known that, based on the consideration of the eigenvectors of symmetric matrices, it is possible to obtain ensembles of discrete orthogonal code sequences. However, an increase in their number may lead to the fact that not all of them will satisfy the specified requirements for correlation characteristics. Therefore, it is necessary to develop a method for obtaining an increased number of ensembles of orthogonal code sequences that satisfy the requirements for correlation characteristics. The purpose of the work. To develop a method for obtaining a set of new ensembles of binary orthogonal code sequences of different dimensions (4, 8 and 16) based on the consideration of the eigenvectors of symmetric matrices that satisfy the required correlation characteristics and surpass the known Walsh sequences and Welti codes in terms of the maximum side peak of the autocorrelation function. The novelty. In accordance with the condition of obtaining an orthonormal basis of the n-th order, the values of the diagonal coefficients of the basic symmetric matrix are determined, its eigenvalues are calculated and the matrix of orthogonal eigenvectors is determined, each row of which describes the orthogonal code sequence of the ensemble. On this basis, the number of ensembles of orthogonal code sequences with autocorrelation functions that have the smallest maximum side peaks is established, and the dependence of the values of the maximum side peaks on the possible variants of the coefficients of the basic symmetric matrix is established. The result. New ensembles of binary orthogonal code sequences with autocorrelation functions with a maximum side peak not exceeding the permissible value are obtained. It is established that the smallest values of the maximum side peaks of the autocorrelation function are achieved in the absence of symmetry in the signs between the left and right extreme coefficients of the basic symmetric matrix, regardless of the sign of the central coefficient.
Key words
- symmetric matrices, orthogonal matrices, code sequences, structural secrecy, eigenvectors, autocorrelation function
Reference
- Zhuk A. P., Stogniy K. V., Kopytov V. V., Makarov I. V. Methodology for obtaining ensembles of discrete orthogonal code sequences with improved autocorrelation functions. Systems of Control, Communication and Security, 2025, no. 1, pp. 48-78. DOI: 10.24412/2410-9916-2025-1-048-078 (in Russian).
-
Model and conditions of occurrence of anomalies in demodulated traffic of VSAT subscriber terminals
Abstract
- Problem statement. A significant technological breakthrough in data transmission via satellite communications was the transition to a new generation of DVB-S2X digital television protocols, which allowed not only to increase the bandwidth of satellite communications networks, but also significantly reduce the requirements for channel noise levels. In practice, the application of the DVB-S2X standard made it possible to organize the stable operation of VSAT technology equipment with a signal-to-noise ratio (SNR) in the channel at -10 dB with a bit error probability of about 10-5. However, the implementation of new technical solutions based on alternating coding and modulation procedures, as well as time segmentation modes, in conditions of violation of electromagnetic compatibility (EMC) requirements, can lead to the effect of covert destructive effects (SDV), leading to distortion of information content, without an obvious disruption of the satellite communication line. The aim of the work is to increase the noise immunity of satellite radio communication lines organized using VSAT equipment by timely detecting the fact of a shift as a result of a violation of EMC conditions based on the results of detecting anomalies in demodulated information traffic. It is proposed to take into account the coding features of multilevel signal structures based on 16APSK and 32APSK modulation used in the DVB-S2X standard. Methods used: when solving the problem of detecting the fact of shift, an analytical apparatus is used to assess the noise immunity of reception based on the indicator of a given probability of a bit error in the channel. When predicting the current SNR ratio at the input of the receiving paths, methods for calculating the energy potential of satellite communication lines were used. Elements of the theory of electronic suppression were used to assess the permissible level of interference leading to disruption of the radio link. Novelty: the novelty elements are new analytical expressions that make it possible to estimate the dependence of the probability of a bit error in a channel on the ratio of interference power to signal power at a given SNR level; identification of anomalies in demodulated traffic from the perspective of evaluating the encoding features of multilevel signal-code structures; identification of conditions under which an effect occurs in VSAT-based satellite communication lines ADD in case of violation of the EMC conditions. Result: the traffic structure of the demodulated data stream has been identified, which makes it possible to detect the fact of a shift in a timely manner. The energy ratios of the signal, noise and interference are substantiated and calculated, which result in a violation (distortion) of the structure of the transmitted information, without obvious signs of a shift, i.e. while maintaining the functional operability of the satellite communication line using VSAT equipment that implements transmissions based on 16APSK and 32APSK of the DVB-S2X standard. Practical significance: The conditions of violation of EMC requirements leading to distortion of the received information content without obvious signs of disruption of the satellite communication line, similar to the effect occurring with VLF, are substantiated. The presented scientific and technical solutions are proposed to be implemented in the form of software and hardware modules in VSAT subscriber terminals. Identification of signs of the specified effect will improve the timeliness of taking measures aimed at increasing the coefficient of proper operation of satellite communication lines.
Key words
- VSAT equipment, DVB-S2X standard technologies, demodulated traffic anomalies, energy potential of the satellite communication line
Reference
- Zhdanova I.M., Dvornikov S. S., Dvornikov S. V Model and conditions of occurrence of anomalies in demodulated traffic of VSAT subscriber terminals. Systems of Control, Communication and Security, 2025, no. 1, pp. 105-130. DOI: 10.24412/2410-9916-2025-1-105-130 (in Russian).
-
Procedure for prediction of satellite communication channel capacity in case of small-scale ionosphere disturbances, frequency-selective fading and intersymbol interference
Abstract
- Problem statement: general (non-selective) signal fading is known to result in a 20% reduction in link capacity. A technique has been developed to estimate the throughput of a satellite communication channel during ionosphere disturbances, which are accompanied by the formation of small-scale inhomogeneities that cause general fading of received signals. However, under certain conditions, the received signals may be subject to frequency selective fading and intersymbol interference. The purpose of the work: development of a method for predicting the throughput capacity of a satellite communication channel with small-scale disturbances of the ionosphere and the occurrence of frequency-selective surges and intersymbol interference. Methods used: model approach to forecasting is applied, at which functional dependence of predicted indicator (throughput) on factors affecting it (parameters of small-scale disturbances of ionosphere and transmitted signals) is found. Novelty: in contrast to known studies, the effect of small-scale inhomogeneities of the ionosphere with its disturbances on reducing the coherence band of a satellite communication channel, the occurrence of frequency-selective fading of received signals and intersymbol interference is additionally taken into account. The result: obtained are expressions for estimating dependence of throughput of a satellite communication channel on signal-to-noise ratio at the input of a receiver, root-mean-square deviation of chalk-scale fluctuations of total electronic content of the ionosphere, carrier frequency and frequency spectrum band of a signal at a given angle of inclination of propagation of radio waves. The prediction results show that with artificial disturbances of the ionosphere, accompanied by an increase in the standard deviation of small-scale fluctuations of the total electronic content by 4 orders, frequency-selective jamming of received signals and intersymbol interference occur, which leads to a decrease in relative throughput by 65% when implementing a signal-to-noise ratio at the input of the 15 dB receiver. Increasing the carrier frequency of the satellite communication system from 390 MHz to 2.2 GHz reduces the relative throughput of the satellite communication channel by only 21%. Practical significance: recommendations for selection of frequency-time parameters of signals of satellite communication systems based on the results of monitoring fluctuations in the total electronic content of the ionosphere during its disturbances to eliminate frequency-selective fading and intersymbol interference in order to increase the throughput of the satellite communication channel.
Key words
- satellite communication channel, satellite link, error probability, noise immunity, throughput, capacity, bandwidth, coherence band, fading, frequency selective fading, intersymbol interference, ionosphere, total electronic content, small-scale heterogeneities
Reference
- Pashintsev V. P., Diptan P. A., Belokon D. A. Procedure for prediction of satellite communication channel capacity in case of small-scale ionosphere disturbances, frequency-selective fading and intersymbol interference. Systems of Control, Communication and Security, 2025, no. 1, pp. 156-186. DOI: 10.24412/2410-9916-2025-1-156-186 (in Russian).
-
Antenna diversity combining for ZigBee over correlated fading
Abstract
- Purpose. The active development of IoT requires the improvement of methods and controls for wireless networks, in particular ZigBee networks. Radio monitoring services solve the problem of detecting and identifying subscribers of such networks. When solving this problem, an antenna array can be used, which allows not only to determine the direction to the source, but also to significantly increase the noise immunity of receiving by using signals on the elements of the antenna array. The aim of the work is to investigate the possibility of increasing the noise immunity of detecting and receiving signals of the IEEE 802.15.4 (ZigBee) in the Rayleigh channel by means of distributed receiving with arbitrary correlation of signals on the antenna array elements. Methods. The paper uses statistical computer modeling methods that take into account fading due to multipath propagation channel and signal correlation on antenna array elements caused by their close location. Novelty. The development and analysis of algorithms for the distributed receiving of IEEE 802.15.4 signals in a Rayleigh channel with arbitrary signal correlation on antenna elements has been performed for the first time. The novelty elements are algorithms for combining the results of detection, time-frequency synchronization and demodulation obtained for various antenna elements. Results. The results of the study showed that the gain in noise immunity due to the different reception of the ZigBee signal in the Rayleigh channel, compared with single-antenna receiving, reaches 7.5 dB with two receiving elements and 15 dB with four receiving elements. This gain decreases with an increase in the level of packet error and signal correlation on the antenna elements. Even with a strong correlation (up to 0.7-0.8), the noise immunity of reception is only slightly inferior to the case of the absence of correlation. Practical relevance. The proposed algorithms of diversity receiving are designed for implementation in digital radio monitoring devices and can significantly increase the noise immunity of detecting and receiving the ZigBee signal. In particular, they are used in Russian short-range wireless network monitoring complexes based on ARK-D11 and ARK-D19R. The high efficiency of the algorithms, even with strong correlation on the antenna elements, makes it possible to successfully use an antenna array with closely spaced elements for radio monitoring purposes.
Key words
- diversity receiving, ZigBee, antenna array
Reference
- Faustov I. S., Manelis V. B. Antenna diversity combining for ZigBee over correlated fading. Systems of Control, Communication and Security, 2025, no. 1, pp. 220-231. DOI: 10.24412/2410-9916-2025-1-220-231 (in Russian).
Electronic, radio and electrical systems
-
Enhancing the Electromagnetic Immunity of the Unmanned Aerial Vehicle under High-Intensity Electromagnetic Radiation: A Comprehensive Approach
Abstract
- Problem formulation: unmanned aerial vehicles (UAVs) are widely used in various fields, which imposes stringent requirements on their reliability, particularly regarding the electromagnetic compatibility (EMC) of their onboard radio-electronic equipment (REE). Along with the development of UAV REE, the EMI-based functional destruction means are also advancing, potentially causing system failures or rendering onboard systems inoperable. Moreover, deploying «friendly» EMI-based functional destruction means against adversarial UAVs may compromise the functionality of one’s own REE, including receiving and transmitting devices, signal generators, control and stabilization units, command generation modules, and various computing systems. This challenge arises due to the high power of generated EMI and the difficulty of ensuring its selective impact on targeted REE. Hence, improving the electromagnetic immunity of UAV REE against EMI-based functional destruction means remains a relevant issue. Purpose: to demonstrate the effectiveness of the proposed approaches to ensuring EMC of UAV REE, including the use of modal filtration and shielding constructions, while maintaining the integrity of useful signals. Methods: the approaches to ensuring EMC employed in this study include: the theory of inventive problem-solving within the diversion approach; modal filtration; parametric optimization using heuristic search; evaluation of the useful signals of key REE in UAVs; and the application of shielding structures in UAVs, including those containing magnetodielectric materials. The proposed approaches were validated through computational experiments involving quasi-static and electrodynamic analyses. Novelty: for the first time, the proposed approaches to ensuring EMC of REE were successfully validated on a real UAV, Darwin 129. These approaches are characterized by the use of modal filters (MF) based on strip and cable structures, preserving the integrity of useful signals, as well as shielding constructions made of multilayer materials in three design variants. Results: the effectiveness of the proposed approaches was demonstrated using the Darwin 129 UAV. Depending on the type and placement of the MF, suppression of ultra-wideband pulses ranged from 44 to 90 times. After passing through the MF, residual voltage levels did not exceed acceptable limits for the components of printed circuit boards (PCBs) within the UAV. The integrity of useful signals in the input/output interfaces of Darwin 129 was assessed during MF implementation. Parametric optimization of one of the MFs was performed to reduce distortion effects. The distribution of the electric field intensity over the body and PCBs of Darwin 129 was evaluated. In the worst-case scenario, the modulus of its maximum value on the UAV body reached 25 V/m (when a plane electromagnetic wave was positioned to the right at a 90° angle and on both sides at a 75° angle), and on the PCBs, it ranged from 2.5 to 8 V/m, depending on the PCB. To reduce the modulus of maximum field strength value, three design variants of shielding constructions made of multilayer materials (GN-Ni-GN) were proposed. Among these, Variant 2 (a common enclosure with internal partitions between PCBs) was found to be the most effective, reducing the modulus of maximum field strength value on three PCBs by 229, 125, and 150 times, respectively. Practical relevance: the proposed approaches, validated on the Darwin 129 UAV, can be adapted and effectively applied to other UAV models and types operating in environments with intense electromagnetic interference, including that created by EMI-based functional destruction means, due to their universality. Furthermore, the results of this study can be valuable during both the design and modernization stages of UAVs to enhance their electromagnetic immunity in the presence of external destabilizing factors.
Key words
- unmanned aerial vehicle, electromagnetic compatibility, modal filtration, shielding, intentional interference, optimization, ultra-wideband pulses, functional destruction
Reference
- Belousov A. O., Nosov A. V. Enhancing the Electromagnetic Immunity of the Unmanned Aerial Vehicle under High-Intensity Electromagnetic Radiation: A Comprehensive Approach. Systems of Control, Communication and Security, 2025, no. 1, pp. 10-47. DOI: 10.24412/2410-9916-2025-1-010-047 (in Russian).
Scientific contribution
-
On the 10th anniversary of the journal "Systems of Control, Communication and Security"
Abstract
- March 2025 marks the 10th anniversary of the publication of the first issue of the journal "Systems of Control, Communication and Security". The article presents a retrospective of the formation and development of the journal, and expresses gratitude to the specialists who made their fundamental contribution to its development. The analysis of the most published and cited authors, articles and thematic areas is carried out.
Key words
- journal, anniversary
Reference
- Makarenko S. I., Korovin V. M. On the 10th anniversary of the journal "Systems of Control, Communication and Security". Systems of Control, Communication and Security, 2025, no. 1, pp. 1-9. DOI: 10.24412/2410-9916-2025-1-001-009 (in Russian).