Scientific electronic reviewed journal
Systems of Control, Communication and Security
ISSN 2410-9916

№3 2015

Analysis of new technologies and ways of development for systems of control, communication and security
  • Iuditskii S. A.
    Memories of Veteran Engineering: Pneumatics, Logical Control of Discrete Processes, Modeling Complex Discrete Systems
  • Abstract
    • Some issues of control are described in article. Pneumatics as a means of automation of production processes; logical control of discrete processes at the basis of the graph operations and standard positional patterns; modeling of complex systems using the formal apparatus of the indicator logic and triadic networks is considered on the example of a scientific biography of the author, covering more than half a century. Modeling of stream processing systems of mobile objects and triadic modeling of discrete systems are discussed in detail. Applied problem that can be successfully solved with the use of this scientific-methodical machines is shown by the author in the paper.
  • Key words
    • Pneumatics, logic management, Petri nets, graph operations, positional structure, the in-line system with mobile objects, display logic, triad network, multi-agent system, process road map
  • Reference
    • Iuditskii S. A. Memories of Veteran Engineering: Pneumatics, Logical Control of Discrete Processes, Modeling Complex Discrete Systems. Systems of Control, Communication and Security, 2015, no. 3, pp. 1-15. Available at: http://journals.intelgr.com/sccs/archive/2015-03/01-Iuditskii.pdf (accessed ) (In Russian).
Control systems
  • Iuditskii S. A.
    “Road Map” with Decision-Making by Hybrid Indicated Net
  • Abstract
    • Problem statement: Currently the “road map” has been widely disseminated for decision-making for achieving the global objectives of development of organizational and technical systems. However, the descriptive text style prevails in the majority of works. The consequences of this presentation are: the ambiguity models; constraints in the transformation of the formal component of the roadmap. These drawbacks can be overcome through the use of road network maps based on the graph of the logic description is an organic combination of graph theory and mathematical logic (Boolean algebra).Purpose: the development of a formal net graph-logic model roadmap of organizational-technical system that displays the dynamics of indicators (parameters) of the system at a given time interval. Methods: creation of new graph-logical models of organizational and technical systems, which we will call hybrid flat network. Novelty. Hybrid indicated net distinguish from Petri nets by mechanism of triggering of transitions, by introducing additional conditions for their operation, as defined entered in the model indicator logical functions. Results “road map” of organizational-technical system is built based on the hybrid indicated net more expressive and varied (compared to standard Petri nets). In a hybrid indicated net configuration of graph is changed by applying a logical indicator function, determining the conditions for triggering or blocking of transitions in the net. The author cites the example of construction and application of hybrid indicated net to analyze the behavior of organizational and technical systems.
  • Key words
    • road map, organizational-technical system, Petri nets, position and transition, Hybrid indicated net, graph-logic description, Boolean algebra, indicator-logical function
  • Reference
    • Iuditskii S. A. “Road Map” with Decision-Making by Hybrid Indicated Net. Systems of Control, Communication and Security, 2015, no. 3, pp. 43-51. Available at: http://journals.intelgr.com/sccs/archive/2015-03/03-Iuditskii.pdf (accessed ) (In Russian).
Information processes and technologies. Acquisition, storage and processing of information
  • J. F. Voronin, V. A. Kamayev
    Training Apparatus, as Means of Increase of a Learning Efficiency of Students of High Schools and Technologists of Foundry Specialties
  • Abstract
    • Statement of the problem. Students casting professions should be able to quickly identify and eliminate the defects of castings. However, training tools do not contain visualization of the distinctive features of defects and their causes. The purpose of work is to develop automated training tools "simulator" which is designed to teach the definition of defects castings. "Simulator" is based on the visualization of the stages of formation and the causes of defects. The methods used. The logical schemata and animated videos use for visualize the stages of formation of defects. Novelty. The training tool "simulator" uses the new visual logical system for finding defects and determines they types. "Simulator" allows to reasonably choosing the method of elimination of arising defects. Practical relevance. Students who use "simulator", can determine the type of defect, stage of the formation of defects and to choose a method of removal of defects. This is the training tool being used to teach students of casting professions can improve student performance by about 25-30%.
  • Key words
    • casting, quality, moulding marriage, the system approach, training, quality, a training apparatus, visually-logic definition, the stage-by-stage analysis, marriage liquidation
  • Reference
    • Voronin J. F., Kamayev V. A. Training Apparatus, as Means of Increase of a Learning Efficiency of Students of High Schools and Technologists of Foundry Specialties. Systems of Control, Communication and Security, 2015, no. 3, pp. 210-220. Available at: http://journals.intelgr.com/sccs/archive/2015-03/09-Voronin.pdf (accessed ) (In Russian).
Information security
  • Alekseev A. P.
    Vulnerabilities Algorithm for Computing the Secret Key in the RSA Cryptosystem
  • Abstract
    • Purpose. In many publications indicates that the wrong choice of parameters RSA encryption may reduce the reliability of his. However, no mention of the fact that the public key and private key, in some cases, can completely match the subscriber and then publish the private key. The aim is to prove the possibility of forming twin keys where public and private keys are the same. Methods. The possibility of forming the twin keys theoretically justified with eight lemmas. Novelty. It is shown that for values of Euler's function, a multiple of ten, there is a possibility of publication of the private key, if the public key numbers ending in 1 or 9. Results. By calculation confirmed the possibility of the formation of the twin keys. Practical relevance. The results will improve RSA cryptographic cipher by checking for a match generated public and private keys.
  • Key words
    • asymmetric cryptosystem RSA, vulnerability, private key, public key, Euler function, Lemma, a prime number, an even number, odd number, the number of Farms
  • Reference
    • Alekseev A. P. Vulnerabilities Algorithm for Computing the Secret Key in the RSA Cryptosystem. Systems of Control, Communication and Security, 2015, no. 3, pp. 83-91. Available at: http://journals.intelgr.com/sccs/archive/2015-03/05-Alekseev.pdf (accessed ) (In Russian).

  • Alekseev A. P., Dikareva K. N., Makarov M. I.
    Analysis of the Performance of Algorithms for Calculating the Secret Key in Asymmetric Cryptosystem RSA
  • Abstract
    • Purpose. In many publications indicates that the wrong choice of parameters RSA encryption may reduce the reliability of his. However, no mention of the fact that the public key and private key, in some cases, can completely match the subscriber and then publish the private key. The aim is to prove the possibility of forming twin keys where public and private keys are the same. Methods. The possibility of forming the twin keys theoretically justified with eight lemmas. Novelty. It is shown that for values of Euler's function, a multiple of ten, there is a possibility of publication of the private key, if the public key numbers ending in 1 or 9. Results. By calculation confirmed the possibility of the formation of the twin keys. Practical relevance. The results will improve RSA cryptographic cipher by checking for a match generated public and private keys. Purpose. When calculating the secret key used in the RSA cryptosystem generalized Euclidean algorithm. The article compares the performance of the generalized Euclidean algorithm with algorithms ALGO 1 and ALGO 2, developed by the authors. The aim is to conduct a comparative analysis of the performance of three algorithms for computing the secret exponent in the cryptosystem RSA. Software implementation of the algorithms implemented using three systems programming: Mathcad, Pascal and C #, allowing you to reduce the influence of the programming on the results. Methods. Comparative analysis of the performance of three algorithms performed by experimental method of measuring time account for different input data. Output of calculated relations for the development of algorithm ALGO 1 is made analytically. Justification algorithm ALGO 2 done by the evidence of five lemmas. Novelty. Developed two new algorithm for computing the secret exponents. Results. By calculation shows that the descending speed of the algorithms are located as follows: generalized Euclidean algorithm, ALGO 1, ALGO 2. The causes of the differences in the speed considered algorithms. Practical relevance. The results obtained clearly demonstrate the efficiency of solving the same problem depends on the method of solving it. The three programs discussed algorithm illustrated in programming languages Mathcad, Pascal and C #, as well as examples of manual calculations. This allows you to use the results, not only for scientific purposes, but also in the educational process.
  • Key words
    • asymmetric cryptosystem RSA, Euclidean algorithm, performance, private key, public key exponent, Euler function, Lemma, programming languages
  • Reference
    • Alekseev A. P., Dikareva K. N., Makarov M. I. Analysis of the Performance of Algorithms for Calculating the Secret Key in Asymmetric Cryptosystem RSA. Systems of Control, Communication and Security, 2015, no. 3, pp. 186-209. Available at: http://journals.intelgr.com/sccs/archive/2015-03/08-Alekseev.pdf (accessed ) (In Russian).
Communication systems and telecommunication network
  • Aganesov A. V.
    Quality of Service of Aerospace Network Based on Hierarchical and Decentralized Routing Protocols
  • Abstract
    • Statement of the problem. The creation of the united aerospace networks makes it relevant tasks of routing and relaying of messages in it. Given the quality of service of traffic you need to ensure. Two variants of the structure of the aerospace network considered in earlier works by the author. The first variant is a hierarchical structure where all traffic air networks is routing through the satellite network. The second variant is the decentralized structure with the use of the Mesh technology for join of air networks and the routing of traffic by through the adjacent air networks. The purpose of this work is the analysis and comparison of bandwidth in these variants of structure of the aerospace network. Used methods. The aerospace network model based on the model of hierarchical routing and decentralized routing model of traffic are presented in the earlier papers of the author. The air network model based on the CSMA/CA protocol model. The satellite network model based on the S-Aloha model. Novelty. Comparative evaluation of the bandwidth of the aerospace network with hierarchical and decentralized routing and the original model are the novelty of the paper. Practical relevance: the bandwidth estimation are presented in this work will be used to inform protocols relay traffic in the global aerospace networks. These results will be used for software routers of aerospace communication networks, built by Mesh technology.
  • Key words
    • satellite network, relay traffic, routing, satellite network, radio networks, S-Aloha, CSMA
  • Reference
    • Aganesov A. V. Quality of Service of Aerospace Network Based on Hierarchical and Decentralized Routing Protocols. Systems of Control, Communication and Security, 2015, no. 3, pp. 92-121. Available at: http://journals.intelgr.com/sccs/archive/2015-03/06-Aganesov.pdf (accessed ) (In Russian).

  • Makarenko S. I.
    Dynamic Model of Communication System in Conditions the Functional Multilevel Information Conflict of Monitoring and Suppression
  • Abstract
    • Statement of the problem: the means of information attacks on communication systems are actively developing now do actual development of scientific methods for modeling the effects of such attacks. We propose to use the concept of "information conflict" to describe the functioning of the communication system in terms of information attacks. We conducted an analysis which showed that the creation of new means of information attacks is done by the integration means of electronic warfare, information impacts, means of radio monitoring and computer reconnaissance. Multilevel dynamic model of information conflict takes into account the impact of these funds at different levels of the OSI model (Open System Interconnection Reference Model). Purpose. The aim of this work is to develop a dynamic model of information conflict communication system with the information attack system. We consider a communication system as complex multilevel hierarchical system. Information conflict of the  communications system is considered as a set of local conflict situations for each level of the OSI model. Used methods. We analyzed models of conflict on the basis of the theory of games, theory of Markov processes, theory of Petri nets, theory of active management and substantiated the theory of dynamical systems as a basis for modeling the information conflict. Novelty. The functional relationships between elements of a communication system which exist at the same level or at different levels of the OSI, and representation of  communication system in the form of a complex hierarchical structure in the model information of the conflict are the novelty of this model. Proved the principal possibility of developing new classes of attacks that focus on the creation and development of internal contradictions between different protocols, communications systems, and development of new multi-level attacks, which are implemented at various levels of the OSI model. The results and their significance. The model of information conflict in the communication system can be used to develop new strategies to manage communication in terms of information attacks. Additionally, this model can be used to justify new types of attacks, wich implementing a hidden functional suppression of the communications system through the establishment and development of the internal contradictions between its separate protocols.
  • Key words
    • dynamic model, communication system, hierarchical system, complex system, information attack, information conflict, electronic warfare, information struggle, OSI model
  • Reference
    • Makarenko S. I. Dynamic Model of Communication System in Conditions the Functional Multilevel Information Conflict of Monitoring and Suppression. Systems of Control, Communication and Security, 2015, no. 3, pp. 122-185. Available at: http://journals.intelgr.com/sccs/archive/2015-03/07-Makarenko.pdf (accessed ) (In Russian).
Advanced research
  • Abazina E. S.
    Method of code consolidation of the hidden channel by transfer into video data
  • Abstract
    • Work urgency: increasing quantity of information directions of communication simultaneously functioning into hidden (steganographic) channel in structure of one multimedia container make questions of maintenance of applicability of methods digital steganography for wider class of problems more urgency. Known steganographic ways do not allow to organize hidden exchange more than one information direction of communication in a multimedia stream. The work purpose is to increase the number of information directions of communication in the hidden channel by transfer of the video data with restrictions on reliability of reception of the hidden data transferred in each information direction, and reserve of embedding. Used methods: it is offered to apply code consolidation of the data as the technology, allowing to reach the compromise in the contradiction between reserve of embedding, throughput of the hidden channel and reliability of reception of the hidden data. Problem statement: to develop a method of code consolidation of the hidden channels in structure of the video data. Novelty: novelty aspects of the presented decision are: carrying out of additional stages steganographic processings of the container and the built in data of each of the information directions of communication consisting as in realisation of code consolidation before compression of the video data with application two-dimensional noise-type of alarm designs, and carrying out of double orthogonal transformation of the video data with simultaneous embedding of the two-dimensional modulated alarm designs co-ordinated with it. Also it is necessary to carry a way of division of information directions of communication to a novelty aspect in the hidden channel, definition of the key data and an order of placing of the hidden data in an image-container shot. Result: Using developed method of code consolidation of the hidden channels in structure of the video data allows to increase number of information directions of communication in the hidden channel a minimum three times (at the hidden throughput of each information direction of communication of the hidden channel not less than 1.2 kbit/with and probabilities of erroneous reception of the hidden data are not worse 10-3) and depends on a degree of quality of the video data. The maximum of the hidden throughput of the condensed hidden channel does not exceed 20 % from throughput of the channel of transfer of the video data. The practical importance: consists in finishing of the developed scientifically-methodical device and realised algorithms which allow to use results of researches by working out of the coder of the video data.
  • Key words
    • video data, standards of compression JPEG, MPEG-2, стеганография, two-dimensional noise-type signal constructions, code consolidation (division) of the data
  • Reference
    • Abazina E. S. Method of code consolidation of the hidden channel by transfer into video data. Systems of Control, Communication and Security, 2015, no. 3, pp. 16-42. Available at: http://journals.intelgr.com/sccs/archive/2015-03/02-Abazina.pdf (accessed ) (In Russian).

  • Mikhailov R. L.
    Routing models and algorithms of transport terrestrial-cosmic military network
  • Abstract
    • Problem statement: Application of modern technologies of packet transmission in transport terrestrial-cosmic military network updates the issues of sustainability of their operation, which vital influence the timeliness of personnel and weapon` control system. It is shown, that known routing protocols are not able to support the requisite level of sustainability of communication in purposeful destabilizing factors ‘effect environment, and, therefore, the necessity of their enhancement is needed. The aim of this research is to increase the sustainability of communication networks by researching the routing models and algorithms of data flow in purposeful destabilizing factors ‘effect environment. The method used: The methods of probability theory, theory of reliability, theory of Markov random process and graph theory were used. Novelty of this issue is the introduction of the sustainability of communication` coefficient, which discounts correlation between the effect of destabilizing factors ‘effect environment in the fault of communication channel and the characteristic of net level of Open Systems Interconnection, also the criterion of signaling timers` decision for the enhancement of that coefficient was presented. Result: the model-based analysis displayed, that the application of developed algorithms allows to support the requisite level of sustainability of transport terrestrial-cosmic military network with the effectiveness amount to 80% regarding of extracted coefficient. The practical significance of the work encloses the evolution of developed models and algorithm up to program modification of PNNI routing protocol for mathematical support of packet switch.
  • Key words
    • satellite communication system, transport communication network, sustainability of communication, routing, АТМ, PNNI
  • Reference
    • Mikhailov R. L. Routing models and algorithms of transport terrestrial-cosmic military network. Systems of Control, Communication and Security, 2015, no. 3, pp. 52-82. Available at: http://journals.intelgr.com/sccs/archive/2015-03/04-Mikhailov.pdf (accessed ) (In Russian).