Preview

Proceedings of the Southwest State University

Advanced search

Method of Determining the Source of Messages Based on Processing the Time of Their Receipt

https://doi.org/10.21869/2223-1560-2022-26-3-81-97

Abstract

Purpose of research is to create a method for determining the source of messages in the receiver, which allows, based on the analysis of the characteristics of the distribution of the time of receipt of messages, to increase the reliability of determining the source.

Methods. Authentication of the message source is based on statistical analysis of metadata values, which in this study are the time intervals between messages. The metadata processing model is based on the well-known model of receiving messages from the target source in LoRaWAN networks. At the same time, the source was determined using coding methods in the block coupling mode, which provide higher identification reliability for short-length messages characteristic of the specified type of networks. With the help of numerical modeling, the patterns of changes in the characteristics of the time of receipt of messages in the event of an identification error were determined. The decision-making rule is also formulated in case of impossibility of authentication based on processing the contents of identification fields. Studies have shown the effectiveness of the application of the source detection model in various ranges of parameters for the formation of message sequences.

Results. The result of the conducted research is the development of an authentication method based on the analysis of the time of receipt of messages to the receiver, which differs in that it uses the characteristics of the distribution of moments of high orders for a series of time delays as the analyzed data. Its use in combination with coding methods in the message concatenation mode reduces the probability of a single message replacement error in a sequence by 4-6 times, compared with methods that perform identification only based on the results of processing the identifiers of the messages themselves.

Conclusion. The result of experimental studies has shown the possibility of using the developed method to increase the reliability of determining the authenticity of the source of messages, the possibility of reducing the number of reinquiries that occur when errors are detected, the possibility of reducing the size of additional identifier fields in each message. The resulting effect will be expressed in a general increase in the bandwidth of the communication channel between remote components of a distributed system.

About the Authors

M. О. Tanygin
Southwest State University
Russian Federation

Maxim О. Tanygin, Cand. of Sci. (Engineering), Associate Professor of Fundamental and Applied Computer Science Department

50 Let Oktyabrya str. 94, Kursk 305040



A. V. Plugatarev
Southwest State University
Russian Federation

Aleksey V. Plugatarev, Post-Graduate Student of Fundamental and Applied Computer Science Department

50 Let Oktyabrya str. 94, Kursk 305040



S. I. Egorov
Southwest State University
Russian Federation

Sergey I. Egorov, Dr. of Sci. (Engineering), Associate Professor, Professor of Computer Engineering Department

50 Let Oktyabrya str. 94, Kursk 305040



A. P. Loktionov
Southwest State University
Russian Federation

Askold P. Loktionov, Dr. of Sci. (Engineering), Professor of the Department of Power Supply

50 Let Oktyabrya str. 94, Kursk 305040

Researcher ID: P-5434-2015



References

1. Babash A. V., Baranova E. K., Larin D., Grishina N.V. Informatsionnaya bezopasnost' predpriyatiya [Information security of the enterprise]. Moscow, Forum Publ., 2018. 118 p.

2. Burenin A.N., Legkov K.E. Osnovnye problemy bezopasnosti podsistem obespecheniya edinym vremenem elementov sistem upravleniya slozhnymi organizatsionnotekhnicheskimi ob"ektami [The main problems of security of subsystems for ensuring the elements of control systems for complex organizational and technical objects with a single time]. T-comm: telekommunikatsii i transport = T-comm: Telecommunications and Transport, 2019, 48 p.

3. 6. Gligor V.D., Donescu P. Fast encryption and authentication: XCBC encryption and XECB authentication modes. Manuscript, August 2002, pp. 92–108.

4. Tanygin M.O., Alshaia Kh.Ya., Altukhova V.A., Marukhlenko A.L. Ustanovlenie doveritel'nogo kanala obmena dannymi mezhdu istochnikom i priemnikom informatsii s pomoshch'yu modifitsirovannogo metoda odnorazovykh parolei [Establishment of a trusted data exchange channel between the source and receiver of information using a modified method of one-time passwords]. Izvestiya Yugo-Zapadnogo gosudarstvennogo universiteta. Seriya: Upravlenie, vychislitel'naya tekhnika, informatika. Meditsinskoe priborostroenie = Proceedings of the Southwest State University. Series: Control, Computing Engineering, Information Science. Medical Instruments Engineering, 2018, no. 4 (29), pp. 63-71.

5. Kolegov D.N. Obshchii metod autentifikatsii HTTP-soobshchenii v vebprilozheniyakh na osnove khesh-funktsii [A general method for authenticating HTTP messages in web applications based on hash functions]. Prikladnaya diskretnaya matematika. Prilozhenie = Applied Discrete Mathematics, Appendix, 2014, no. 7, pp. 85-89.

6. Marukhlenko A.L., Plugatarev A.V., Tanygin M.O., Marukhlenko L.O., Shashkov M.Yu. Variant razgranicheniya dostupa k informatsionnym resursam na osnove neyavnoi autentifikatsii [Option to restrict access to information resources based on implicit authentication]. Izvestiya Yugo-Zapadnogo gosudarstvennogo universiteta = Proceedings of the Southwest State University. 2020;24(2):108-121. https://doi.org/10.21869/2223-1560-202024-2-108-121.

7. Panagiotis Papadimitratos, Zygmunt J. Haas Secure message transmission in mobile ad hoc networks. Ad Hoc Networks, 2003, no. 1, pp. 193–209.

8. Shi X., D. Xiao A reversible watermarking authentication scheme for wireless sensor networks. Information Sciences, 2013, vol. 240, pp. 173-183. DOI:10.1016/j.ins.2013.03.031

9. Tanygin M. O., Brusov M.S., Efremova E.O., Sukhorukova Yu.V. [Analysis of the system for monitoring the integrity of chains of information blocks based on hashes]. Infokommunikatsii i kosmicheskie tekhnologii: sostoyanie, problemy i puti reshe-niya: Materialy III Vserossiiskoi nauchno-prakticheskoi konferentsii [Infocommunications and space technologies: status, problems and solutions. Proceedings of the III All-Russian Scientific and Practical Conference]. Kursk, 2019, pp. 373 - 378 (In Russ.).

10. Guzeev A.V. Formirovanie raspredeleniya veroyatnostei poyavleniya otdel'nykh soobshchenii istochnika pri statisticheskom kodirovanii [Formation of the probability distribution of the occurrence of individual source messages during statistical coding]. T-Comm: Telecommunications and transport, 2010, vol. 4,no. 6, pp. 12-16.

11. Mytsko E.A., Malchukov A.N., Ivanov S.D. Research of algorithms for calculating the CRC8 checksum in microprocessor systems with a shortage of resources. Devices and systems. Management, control, diagnostics, 2018, no. 6, pp. 22-29.

12. Bankov Dmitry, Khorov Evgeny, Lyakhov Andrey. On the Limits of LoRaWAN Channel Access. Engineering and Telecommunication (EnT). 2016 International Conference on IEEE, 2016, pp. 10–14.

13. lantado Ferran, Vilajosana Xavier, Tuset Pere et al. Understanding the Limits of LoRaWAN. IEEE Communications Magazine. 2017.

14. Tanygin M.O., Efremov M.A., Tanygina E.A. The Computational Complexity of the Algorithm for Identifying the Source of Data Transmitted by Limited Length Blocks. Proceedings - 2021 International Russian Automation Conference, RusAutoCon 2021, 2021, pp. 298–302.

15. Zhukova G.N. Karta koeffitsientov asimmetrii i ekstsessa v prepodavanii teorii veroyatnostei i matematicheskoi statistiki [Map of skewness and kurtosis coefficients in teaching probability theory and mathematical statistics]. Nauchno-metodicheskii elektronnyi zhurnal "Kontsept" = Scientific and methodological electronic journal Concept, 2015, no. 8, pp. 56-60.

16. Zhukova G.N. Identifikatsiya raspredeleniya po koeffitsientam asimmetrii i ekstsessa [Identification of the distribution by the coefficients of skewness and kurtosis]. Avtomatizatsiya. Sovremennye tekhnologii = Automation. Modern technologies. 2016, no.5, pp. 26-33.

17. Vangelista Lorenzo. Frequency Shift Chirp Modulation: The LoRa Modulation. IEEE Signal Processing Letters, 2017, vol. 24, no. 12, pp. 1818–1821.

18. Urazbakhtin A.I., Urazbakhtin I.G. Algorithm for checking the homogeneity of the sample and its representativeness to the random process under study. Infocommunication technologies, 2006, vol. 4, no. 3, pp. 10-14.

19. Tatyana I. Lapina, Ildus G. Urazbahtin Time series forecasting based on data normalization methods. Proceedings Volume 6277, Optical Technologies for Telecommunications, 2005; 62770C (2006).

20. Jorke Pascal, Bocker Stefan, Liedmann Florian, Wietfeld Christian. Urban channel models for smart city IoT-networks based on empirical measurements of LoRa-links at 433 and 868 MHz // 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) / IEEE. 2017. Pp. 1–6.

21. Tanygin M. O., Hemrayev D., Kazakova O. V. Povyshenie dostovernosti opredeleniya istochnika fragmentirovannykh soobshchenii za schet ispol'zovaniya metodov analiza vremeni postupleniya otdel'nykh fragmentov [Increasing the Reliability of Determining the Source of Fragmented Messages by Using Methods for Analyzing the time of Receipt of Individual Fragments]. Izvestiya Yugo-Zapadnogo gosudarstvennogo universiteta. Seriya: Upravlenie, vychislitel'naya tekhnika, informatika. Meditsinskoe priborostroenie = Proceedings of the Southwest State University. Series: Control, Computing Engineering, Information Science. Medical Instruments Engineering. 2021; 11(4): 46–60.


Review

For citations:


Tanygin M.О., Plugatarev A.V., Egorov S.I., Loktionov A.P. Method of Determining the Source of Messages Based on Processing the Time of Their Receipt. Proceedings of the Southwest State University. 2022;26(3):81-97. (In Russ.) https://doi.org/10.21869/2223-1560-2022-26-3-81-97

Views: 270


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2223-1560 (Print)
ISSN 2686-6757 (Online)