Trudy SPIIRAN
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Trudy SPIIRAN, 2019, Issue 18, volume 4, Pages 887–911
DOI: https://doi.org/10.15622/sp.2019.18.4.887-911
(Mi trspy1067)
 

This article is cited in 2 scientific papers (total in 2 papers)

Information Security

Evaluation of efficiency of random multiple access to aloha type environment with voice connections, transfer of service commands, text messages and multimedia files in destructive impact conditions

M. A. Peregudov, I. A. Semchenko

Military Education-Science Center of Military Aviation Forces "Military Aviation Academy Named for Prof. N.E. Zhukovsky and J.A. Gagarin"
Abstract: Assessing the security of digital radio networks in destructive impact conditions is an important task. However, such an assessment for random multiple access to the ALOHA-type environment in digital radio networks was not carried out. The paper presents an analytical model of random multiple access for the environment of digital radio networks of the ALOHA type in destructive impact conditions. In this model, acomplex measure, including the probability of a successful voice connection, the transfer of a service command, a text message or a multimedia file, the degree of filling and the degree of overflow of digital radio network data packets, serves as the resultant indicator for evaluating the effectiveness of random multiple media access. The new complex indicator of the probability of a successful voice connection, the transfer of a service command, a text message or a multimedia file takes into account the known probabilities of successful delivery of data packets, creation of a collision and a free channel, as well as new average transmission times for a sequence of data packets and a collision formed during such transmission. New indicators are the degree of filling and the degree of overflow of digital radio communications network data packets. They determine in saturated and supersaturated data networks of such a network how close (far) to maximum is the probability value of a successful voice connection, transmission of a service command, test message or multimedia file. The model takes into account the potential destructive effects of the attacker by refining the analytical expressions for the known probabilistic and new temporal characteristics. First, a quantitative relationship between the probability of a successful voice connection, the transfer of a service command, a text message or a multimedia file and the average duration of a data channel collisions is established./ Secondly, for guaranteed disabling a digital radio network with random multiple access to the medium ALOHA type attacker must constantly carry out a destructive impact. The results are applied in design of digital radio communications networks operating under destructive impacts, as well as in development of automatic systems for optimizing the operation of digital radio communications networks and protecting them from such impacts.
Keywords: digital radio communication network, destructive impact, analytical model, random multiple access procedure to the environment, ALOHA, probability of transmission, efficiency of functioning.
Received: 28.12.2018
Bibliographic databases:
Document Type: Article
UDC: 004.728.3
Language: Russian
Citation: M. A. Peregudov, I. A. Semchenko, “Evaluation of efficiency of random multiple access to aloha type environment with voice connections, transfer of service commands, text messages and multimedia files in destructive impact conditions”, Tr. SPIIRAN, 18:4 (2019), 887–911
Citation in format AMSBIB
\Bibitem{PerSem19}
\by M.~A.~Peregudov, I.~A.~Semchenko
\paper Evaluation of efficiency of random multiple access to aloha type environment with voice connections, transfer of service commands, text messages and multimedia files in destructive impact conditions
\jour Tr. SPIIRAN
\yr 2019
\vol 18
\issue 4
\pages 887--911
\mathnet{http://mi.mathnet.ru/trspy1067}
\crossref{https://doi.org/10.15622/sp.2019.18.4.887-911}
\elib{https://elibrary.ru/item.asp?id=39143090}
Linking options:
  • https://www.mathnet.ru/eng/trspy1067
  • https://www.mathnet.ru/eng/trspy/v18/i4/p887
  • This publication is cited in the following 2 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
    Statistics & downloads:
    Abstract page:165
    Full-text PDF :56
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024