Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/20.500.12258/18182
Title: Application of information security technologies for improving the imitation resistance of low-orbital satellite communication systems
Authors: Chistousov, N. K.
Чистоусов, Н. К.
Kalmykov, I. A.
Калмыков, И. А.
Lapina, M. A.
Лапина, М. А.
Kalmykov, M. I.
Калмыков, М. И.
Keywords: Algorithm of double key usage check;Authentication protocols with zero knowledge disclosure;Information security technologies;Satellite authentication technology
Issue Date: 2021
Publisher: Springer Science and Business Media Deutschland GmbH
Citation: Chistousov, N. K.; Kalmykov I. A.; Lapina, M. A.; Kalmykov, M. I. Application of information security technologies for improving the imitation resistance of low-orbital satellite communication systems // Lecture Notes in Networks and Systems. - 2021. - Том 228. - Стр.: 54 - 63. - DOI 10.1007/978-3-030-77448-6_6
Series/Report no.: Lecture Notes in Networks and Systems
Abstract: Modern information technology (IT) is constantly expanding its scope. The main purpose of information technology is to increase the efficiency of information systems based on the use of modern advances in computer technology. Currently among the widely used information technologies are ones associated with data processing, management, work of the automated office, decision support and expert systems. A special place among IT is occupied by information technology security, which represent the methods and resources necessary to prevent unauthorized access, usage, disclosure, distortion, modification or destruction of information. These information technologies have found application in electronic payment systems (EPS), which process electronic network-based money. Thanks to the use of authentication protocols with zero knowledge disclosure, EPS provide a high protection degree of information transmitted via open Internet channels, anonymity of money owners and security of transactions. The paper proposes a new IT security application field that uses a low-orbit satellite communications network. Such network is used in remote monitoring, control and management systems of unattended environmentally hazardous technological objects. Due to the large length of communication channels used for data exchange between the control center and the object of monitoring and control, a low-orbit satellite communication system (LOSCS) has a number of vulnerabilities. Applying information security technologies that use the spacecraft authentication protocol will eliminate these vulnerabilities by increasing the imitation resistance of the LOSCS. At the same time, the developed authentication protocol should provide a simple software implementation using universal processors of the x86/x64 architecture. Therefore, the development of information technologies for satellite authentication, which can improve the simulated resistance of a low-orbit satellite communication system, is an important task.
URI: http://hdl.handle.net/20.500.12258/18182
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 1883 .pdf
  Restricted Access
64.44 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.