Restoring the Order of Information Packets Based on Hash Sequence Analysis
https://doi.org/10.21869/2223-1560-2020-24-1-175-188
Abstract
Purpose of research. Currently, various technologies and methods are used to control the integrity and authenticity of data transmitted through open communication channels. One of them is the technology for transmitting sequences of information packets connected to each other in chains using certain cryptographic algorithms. Similar approaches are used in the well-known blockchain technology and are focused on large volumes of transmitted and protected information and large sizes of additional service information fields. The purpose of this article is to study the characteristics of systems, transmission of small information packets in comparison with traditional size frames of TCP/IP stack, in which the broken packet sequence order is restored using the chain method, by analyzing hash sequences available in each of such packets.
Methods. In this article, simulation modeling, system analysis method, method of systematization and ranking of the obtained results are used.
Results. It is shown that increasing the size of the additional field with the hash of the previous message from 4 to 6 bits has a significant effect on reducing the probability of erroneous restore of the order of information packets. Further increasing the length of the hash field reduces the probability of error by only 2 to 5 % for each additional bit of the hash field for any length of the chain being restored. It is shown that the coefficient of the usage of the communication channel (the ratio of useful chain of packets to the volume of information transmitted through the communication channel) is maximum when the length of the hash field is 6 in the whole range of sizes of the field information part of the data packet.
Conclusion. The paper shows that the chain method is applicable for restoring the original sequence of information packets transmitted from the source to the receiver in systems where the preservation of the sequence of packets is not guaranteed. The obtained values of the transmission system parameters allow us to ensure acceptable reliability of data transmission with a minimum amount of additional service information, and achieve information redundancy less than that in similar ones by 10-15.
About the Author
M. O. TanyginRussian Federation
Maxim O. Tanygin, Cand. of Sci. (Engineering), Head of the Information Security Department
50 Let Oktyabrya str. 94, Kursk 305040
References
1. Kanter W., Kinzel E., Kanter Secure exchange of information by synchronization of neural networks. Europhysics Letters, 2002, vol. 57, is. 1, pp. 141-147.
2. Glazkov A. S., Tipikin A. P. Metod i funkcional'naya organizaciya kontrolya obrashchenij i zakrytiya dostupa k sektoram fajlov pri hishchenii nakopitelya informacii [Method and functional organization of access control and closing access to file sectors in case of theft of the information storage device]. Informacionnye tekhnologii= Information technology, 2010, no. 5, pp. 25–30 (In Russ.).
3. Tipikin A.P., Glazkov A.S., Muratov S.A. Opganizaciya pol'zovatel'skoj sistemy zashchity infopmacii, hpanyashchejsya na zhestkom magnitnom diske [Organization of user system for protecting information stored on a hard magnetic disk]. Telekommunikacii = Telecommunications, 2009, no.10, pp.33 – 37 (In Russ.).
4. Tanygin M. O., Tipikin A. P. Aphitektupa sistemy apparatnogo ogranicheniya dostupa k informacii na zhestkom diske [Architecture of the system of hardware restriction of access to information on the hard disk of a computer]. Telekommunikacii = Telecommunications, 2006, no.3, pp.44 – 46 (In Russ.).
5. PCI Special Interest Group. PCI Express® Base Specification Revision 3.0. Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.694.7081&rep=rep1&type=pdf (accessed 15.10.2019).
6. Dobrica V.P., Nepochatyh E.V., Slobodin R.S., Taldykin E.V., Tanygin M. O., Tipikin A. P. Sposob obmena dannymi mezhdu kontrollerami zashchity informacii po protokolu PCI– Express [Method of data exchange between controllers of information protection on proto-Cola PCI-Express]. Telekommunikacii = Telecommunications, 2019, no.8, pp.21 26 (In Russ.).
7. NIST Block Cipher Modes of Operation for Confidentiality. Cryptologia, 2010, no. 34(2), pp. 163 – 175.
8. M. Bellare, R. Canetti, H. Krawczyk Keying hash functions for message authentication. Advances in Cryptology, 1996, vol. 1109 of Lecture Notes in Computer Science, pp. 1 – 15.
9. Karri R., Rajendran J., Rosenfeld K. Trustworthy hardware: Identifying and classifying hardware Trojans. Moscow, Tehranipoor – Computer (Long. Beach. Calif), 2016, no.10, pp. 39 – 46.
10. Black J., Rogaway P. CBC MACs for arbitrary-length messages: The three-key constructions. J. Cryptol, 2015, vol. 18, no. 2, pp. 111–131.
11. Kruti S., Gambhava B. New Approach of Data Encryption Standard Algorithm. Int. J. Soft Comput. Eng, 2015, no.1, 369 p.
12. Bellare M., Kilian J., Rogaway P. The security of the cipher block chaining message authentication code. JCSS, 1994, vol. 3, no. 3, pp. 341–358.
13. Lodneva O.N., Romasevich E.P. Analiz trafika ustrojstv interneta veshchej [Analysis of traffic devices in the Internet of things]. Sovremennye informacionnye tekhnologii i IT-obrazovanie = Modern information technologies and it education, 2018, vol. 14, no. 1, pp. 149 – 169 (In Russ.).
14. Zajcev V., Sokolov N. Osobennosti mul'tiservisnogo trafika s uchetom soobshchenij, sozdavaemyh ustrojstvami IoT [Features of multiservice traffic taking into account the messages generated by IoT devices]. Pervaya milya = First mile, 2017, no. 4, pp. 44 – 47 (In Russ.).
15. Tanygin M.O., Alshaia H.YA., Altuhova V.A., Maruhlenko A.L. Ustanovlenie doveritel'nogo kanala obmena dannymi mezhdu istochnikom i priyomnikom informacii s pomoshch'yu modificirovannogo metoda odnorazovyh parolej [Establishing a trusted data exchange channel between the source and receiver of information using a modified method of disposable pairs]. Izvestiya Yugo-Zapadnogo gosudarstvennogo universiteta. Seriya: Upravlenie, vychislitel'naya tekhnika, informatika. Meditsinskoe priborostroenie = Proceedings of the Southwest State University. Series: Control, Computing Engineering, Information Science. Medical Instruments Engineering, 2018, vol. 8, no. 4 (29), pp. 63-71 (In Russ.).
16. Katalevskij D. Yu. Osnovy imitacionnogo modelirovaniya i sistemnogo analiza v upravlenii [Fundamentals of simulation modeling and system analysis in management]. Mocow, 2015, pp. 62-98 (In Russ.).
17. Hellerman H. Digital Computer System Principles. McGraw-Hill, 1967, pp.134-142
18. Tkalich V.L., Labkovskaya R.Ya. Obrabotka rezul'tatov tekhnicheskih izmerenij [Processing of technical measurement results]. Saint Petersburg, 2011, 72 p. (In Russ.).
19. Olifer V. G. Olifer N. A. Pervye global'nye seti [First global networks]. Komp'yuternye seti. Principy, tekhnologii, protokoly [Computer networks. Principles, technologies, protocols]. Saint Petersburg, Piter Publ., 2016 (In Russ.).
20. Panagiotis Papadimitratos, Zygmunt J. Haas Secure message transmission in mobile ad hoc networks. Ad Hoc Networks, 2003, no. 1, pp. 193–209.
21. Ben Othman, S., Alzaid, H., Trad, A., & Youssef, H. An efficient secure data aggregation scheme for wireless sensor networks. IISA, 2013, doi:10.1109/iisa.2013.6623701
Review
For citations:
Tanygin M.O. Restoring the Order of Information Packets Based on Hash Sequence Analysis. Proceedings of the Southwest State University. 2020;24(1):175-188. (In Russ.) https://doi.org/10.21869/2223-1560-2020-24-1-175-188