Pub Date : 2023-03-28DOI: 10.30837/rt.2023.1.212.02
Yaroslav Derevianko, I.D. Gorbenko
Although the mathematical problems used in post-quantum cryptography algorithms appear to be mathematically secure, a class of attacks known as side-channel attacks may prove to be a threat to the security of such algorithms. Side-channel attacks affect the hardware on which the cryptographic algorithm runs, they are not attacks on the algorithm itself. The good news is that side-channel analysis on new post-quantum cryptographic algorithms started early, even before the algorithms were standardized, given that older algorithms still face side-channel problems. Kyber is a lattice-based post-quantum algorithm based on the complexity of the M-LWE problem. Kyber offers a secure public key encryption (PKE) scheme against a chosen plaintext attack (CPA) and a secure key encapsulation mechanism against a chosen ciphertext attack (CCA). This paper provides a study of side-channel and fault-injection attacks on lattice-based schemes, with focus on the Kyber (KEM). Considering the wide range of known attacks, the protection of the algorithm requires the implementation of individual countermeasures. The paper presents and tests a number of countermeasures capable of providing/improving protection against existing SCA/FIA for Kyber KEM. The obtained results show that the presented countermeasures incur a reasonable performance cost. Therefore, the use of special countermeasures in real implementations of lattice-based schemes, either alone or as an augmentation of general countermeasures, is necessary.
{"title":"Side-channel attacks on CRYSTALS-KYBER, countermeasures and comparison with SKELYA (DSTU 8961-2019)","authors":"Yaroslav Derevianko, I.D. Gorbenko","doi":"10.30837/rt.2023.1.212.02","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.02","url":null,"abstract":"Although the mathematical problems used in post-quantum cryptography algorithms appear to be mathematically secure, a class of attacks known as side-channel attacks may prove to be a threat to the security of such algorithms. Side-channel attacks affect the hardware on which the cryptographic algorithm runs, they are not attacks on the algorithm itself. \u0000The good news is that side-channel analysis on new post-quantum cryptographic algorithms started early, even before the algorithms were standardized, given that older algorithms still face side-channel problems. \u0000Kyber is a lattice-based post-quantum algorithm based on the complexity of the M-LWE problem. Kyber offers a secure public key encryption (PKE) scheme against a chosen plaintext attack (CPA) and a secure key encapsulation mechanism against a chosen ciphertext attack (CCA). \u0000This paper provides a study of side-channel and fault-injection attacks on lattice-based schemes, with focus on the Kyber (KEM). \u0000Considering the wide range of known attacks, the protection of the algorithm requires the implementation of individual countermeasures. The paper presents and tests a number of countermeasures capable of providing/improving protection against existing SCA/FIA for Kyber KEM. \u0000The obtained results show that the presented countermeasures incur a reasonable performance cost. Therefore, the use of special countermeasures in real implementations of lattice-based schemes, either alone or as an augmentation of general countermeasures, is necessary.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83337009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-28DOI: 10.30837/rt.2023.1.212.05
Y. Gorbenko, M. Yesina, V. Ponomar, I.D. Gorbenko, E.Yu. Kapt'ol
Currently, world civilization is taking significant steps in science and practice related to quantum calculations. Significant steps are being taken to achieve the competitive advantage of countries in the field of quantum information science and the practice of introducing quantum technologies. Scientific and practical research is first aimed at reducing the risks related to quantum computers on cybersecurity, economic and national security. Although the full range of quantum computers is still unknown, it is obvious that further technological and scientific leadership of states will at least partially depend on the country's ability to maintain a competitive advantage in quantum computing and quantum information science. However, along with the potential advantages, quantum calculations are likely to cause significant risks about economic and national security. Specific actions are determined that technologically developed states that begin a long-term process of transferring vulnerable computer systems to quantum-resistant cryptography. An important problem in cryptology is to analyze ways of reducing risks for vulnerable cryptographic systems and the state of their development, adoption and implementation at the international and national levels of post-quantum standards of asymmetric cryptotransformations of electronic signatures (ES), asymmetric ciphers (AC) and key encapsulation protocols (KEP). Therefore, the processes of reducing risks for vulnerable existing standardized cryptographic systems and determining the directions of development of mathematical methods and the study of the prospects for their application in the creation of standardized AC, KEP and ES are significantly significant. They are reduced to justification and definition of mathematical methods and mechanisms that will create promising (post-quantum) standardized AC, KEP and ES. The course of analysis, evaluation and results of comparison of existing and post-quantum asymmetric cryptotransformations of AC, KEP and ES, and standardization at the international and national levels, including for transitional and post-quantum periods, are the main objective of this article.
{"title":"Scientific and methodological bases of analysis, evaluation and results of comparison of existing and promising (post-quantum) asymmetric cryptographic primitives of electronic signature, protocols of asymmetric encryption and key encapsulation protocols","authors":"Y. Gorbenko, M. Yesina, V. Ponomar, I.D. Gorbenko, E.Yu. Kapt'ol","doi":"10.30837/rt.2023.1.212.05","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.05","url":null,"abstract":"Currently, world civilization is taking significant steps in science and practice related to quantum calculations. Significant steps are being taken to achieve the competitive advantage of countries in the field of quantum information science and the practice of introducing quantum technologies. Scientific and practical research is first aimed at reducing the risks related to quantum computers on cybersecurity, economic and national security. Although the full range of quantum computers is still unknown, it is obvious that further technological and scientific leadership of states will at least partially depend on the country's ability to maintain a competitive advantage in quantum computing and quantum information science. However, along with the potential advantages, quantum calculations are likely to cause significant risks about economic and national security. Specific actions are determined that technologically developed states that begin a long-term process of transferring vulnerable computer systems to quantum-resistant cryptography. An important problem in cryptology is to analyze ways of reducing risks for vulnerable cryptographic systems and the state of their development, adoption and implementation at the international and national levels of post-quantum standards of asymmetric cryptotransformations of electronic signatures (ES), asymmetric ciphers (AC) and key encapsulation protocols (KEP). Therefore, the processes of reducing risks for vulnerable existing standardized cryptographic systems and determining the directions of development of mathematical methods and the study of the prospects for their application in the creation of standardized AC, KEP and ES are significantly significant. They are reduced to justification and definition of mathematical methods and mechanisms that will create promising (post-quantum) standardized AC, KEP and ES. The course of analysis, evaluation and results of comparison of existing and post-quantum asymmetric cryptotransformations of AC, KEP and ES, and standardization at the international and national levels, including for transitional and post-quantum periods, are the main objective of this article.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78456833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-28DOI: 10.30837/rt.2023.1.212.04
M.V. Yesina, V.V. Onoprienko, A.V. Tolok
Cloud services have become popular due to their advantages over traditional computing. The cloud provides remote access to software, hardware, and other services. This has allowed companies to be more productive and enabled remote work. Cloud services have fewer hardware and infrastructure requirements, which reduces the cost of maintaining and supporting information technology. The future success of organizations will depend, not least, on the extent to which they implement cloud computing in their operations. According to forecasts, spending on cloud IT technologies will continue to grow and in 2025 will exceed spending on traditional IT technologies. Security of cloud services is becoming a critical issue as more and more companies complete their digital transformation. Despite the many benefits, cloud services also face their own security threats and challenges. Since cloud services store and process a significant amount of sensitive information, a cloud breach can lead to data leaks that can hinder business development and cause significant damage to a company's reputation. There are risks associated with the unavailability of cloud services in case of technical problems and dependence on external providers. Therefore, companies should carefully assess potential threats and take appropriate measures to protect their data and business in general when using cloud services. There are many methods to help determine how prepared your organization is for the growing number of threats. Threat modeling is one of the methods for predicting and preparing for possible threats. Using modeling frameworks allows you to allocate resources and plan possible actions during an attack. There are many modeling frameworks available, but it is important to remember that these frameworks have their advantages and disadvantages, so the choice depends on the context and needs of a particular system. Analyzing, evaluating, and comparing existing methods for modeling and protecting against threats in cloud services is the main objective of this article.
{"title":"Models of threats to cloud services","authors":"M.V. Yesina, V.V. Onoprienko, A.V. Tolok","doi":"10.30837/rt.2023.1.212.04","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.04","url":null,"abstract":"Cloud services have become popular due to their advantages over traditional computing. The cloud provides remote access to software, hardware, and other services. This has allowed companies to be more productive and enabled remote work. Cloud services have fewer hardware and infrastructure requirements, which reduces the cost of maintaining and supporting information technology. The future success of organizations will depend, not least, on the extent to which they implement cloud computing in their operations. According to forecasts, spending on cloud IT technologies will continue to grow and in 2025 will exceed spending on traditional IT technologies. Security of cloud services is becoming a critical issue as more and more companies complete their digital transformation. Despite the many benefits, cloud services also face their own security threats and challenges. Since cloud services store and process a significant amount of sensitive information, a cloud breach can lead to data leaks that can hinder business development and cause significant damage to a company's reputation. There are risks associated with the unavailability of cloud services in case of technical problems and dependence on external providers. Therefore, companies should carefully assess potential threats and take appropriate measures to protect their data and business in general when using cloud services. There are many methods to help determine how prepared your organization is for the growing number of threats. Threat modeling is one of the methods for predicting and preparing for possible threats. Using modeling frameworks allows you to allocate resources and plan possible actions during an attack. There are many modeling frameworks available, but it is important to remember that these frameworks have their advantages and disadvantages, so the choice depends on the context and needs of a particular system. Analyzing, evaluating, and comparing existing methods for modeling and protecting against threats in cloud services is the main objective of this article.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88522719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-28DOI: 10.30837/rt.2023.1.212.01
A.O. Gapon, V.M. Fedorchenko, О.V. Sievierinov
The purpose of the article is to explore the methods and tools used to analyze software code in order to identify errors and potential problems. Static and dynamic code analysis are key processes in software development, as they allow you to detect errors in the early stages of development, reduce the risk of problems later and ensure high quality of the software product. The article discusses various methods and means of static and dynamic code analysis. For each method and tool, examples of their use and advantages and disadvantages are described. The article will be useful for software developers who want to improve the quality of their products and reduce the risk of problems. It will provide readers with an in-depth understanding of code analysis techniques and tools and help them choose the most appropriate tool for their needs.
{"title":"Methods and means of static and dynamic code analysis","authors":"A.O. Gapon, V.M. Fedorchenko, О.V. Sievierinov","doi":"10.30837/rt.2023.1.212.01","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.01","url":null,"abstract":"The purpose of the article is to explore the methods and tools used to analyze software code in order to identify errors and potential problems. Static and dynamic code analysis are key processes in software development, as they allow you to detect errors in the early stages of development, reduce the risk of problems later and ensure high quality of the software product. The article discusses various methods and means of static and dynamic code analysis. For each method and tool, examples of their use and advantages and disadvantages are described. \u0000The article will be useful for software developers who want to improve the quality of their products and reduce the risk of problems. It will provide readers with an in-depth understanding of code analysis techniques and tools and help them choose the most appropriate tool for their needs.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79686712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-28DOI: 10.30837/rt.2023.1.212.08
V.A. Tikhonov, V.M. Bezruk
We consider a possibility of the factorization of parametric spectral power density (PSM) estimation of a random process based on autoregressive linear prediction model to increase the spectrum resolution. Factorization refers to the decomposition of the multimode PSM into simpler single-mode components. Factorization makes it possible not only to decompose a complex multimode PSM into simple single-mode components, but also to analyze more accurately the low-, medium- and high-frequency components of the SPM of a random process. The main attention is paid to the study of the problem of increasing the resolving power of SPM estimation by its factorization by the Yule-Walker and Berg method.
{"title":"Applying factorization to increase the resolving ability of the parametric estimation of the power spectral density","authors":"V.A. Tikhonov, V.M. Bezruk","doi":"10.30837/rt.2023.1.212.08","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.08","url":null,"abstract":"We consider a possibility of the factorization of parametric spectral power density (PSM) estimation of a random process based on autoregressive linear prediction model to increase the spectrum resolution. Factorization refers to the decomposition of the multimode PSM into simpler single-mode components. Factorization makes it possible not only to decompose a complex multimode PSM into simple single-mode components, but also to analyze more accurately the low-, medium- and high-frequency components of the SPM of a random process. The main attention is paid to the study of the problem of increasing the resolving power of SPM estimation by its factorization by the Yule-Walker and Berg method.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79106766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-28DOI: 10.30837/rt.2023.1.212.18
L.O. Tokar, O.A. Koltakov, V.Y. Tsyliuryk
The article deals with the issues of increasing throughput in call centers. The current solution is to cluster call servers and evaluate their characteristics to ensure efficient operation and the necessary fault tolerance. It is shown that one of the main aspects of the quality functioning of the call center is load balancing of servers in the cluster. The features of the call-center modeling process are considered. The organization scheme of the call center of the company and the network model of the call center have been created. Virtualization technology was used to create a network model of a call center. The VMWare ESXI 6.7 hypervisor and the vCenter client were used as a network configuration platform. An analysis of load balancing was carried out using different algorithms and strategies. Asterisk PBX was configured and a server cluster was created. A test bench was developed and configured using the Zabbix open source product to explore a cluster of call servers. A bandwidth characteristic for the Asterisk _1 server and a network map were obtained, which actually represents a simulated structure of the call center network. The process of load testing on three Asterisk servers and the implementation of Zabbix load balancing capabilities are shown. A custom SIPp session script has been created for accepting calls and load testing. The number of calls that the call center is able to handle is calculated. It has been determined that a single Asterisk server with its current settings can handle a maximum of 915 concurrent calls. The process of load balancing on a cluster of SIP servers has been launched. A cluster of Asterisk servers has been found to be capable of handling 2550 simultaneous calls.
{"title":"Creating a call center test bench for load balancing Asterisk servers in a cluster","authors":"L.O. Tokar, O.A. Koltakov, V.Y. Tsyliuryk","doi":"10.30837/rt.2023.1.212.18","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.18","url":null,"abstract":"The article deals with the issues of increasing throughput in call centers. The current solution is to cluster call servers and evaluate their characteristics to ensure efficient operation and the necessary fault tolerance. It is shown that one of the main aspects of the quality functioning of the call center is load balancing of servers in the cluster. \u0000The features of the call-center modeling process are considered. The organization scheme of the call center of the company and the network model of the call center have been created. Virtualization technology was used to create a network model of a call center. The VMWare ESXI 6.7 hypervisor and the vCenter client were used as a network configuration platform. \u0000An analysis of load balancing was carried out using different algorithms and strategies. \u0000Asterisk PBX was configured and a server cluster was created. A test bench was developed and configured using the Zabbix open source product to explore a cluster of call servers. A bandwidth characteristic for the Asterisk _1 server and a network map were obtained, which actually represents a simulated structure of the call center network. \u0000The process of load testing on three Asterisk servers and the implementation of Zabbix load balancing capabilities are shown. A custom SIPp session script has been created for accepting calls and load testing. The number of calls that the call center is able to handle is calculated. It has been determined that a single Asterisk server with its current settings can handle a maximum of 915 concurrent calls. The process of load balancing on a cluster of SIP servers has been launched. A cluster of Asterisk servers has been found to be capable of handling 2550 simultaneous calls.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74534041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-28DOI: 10.30837/rt.2023.1.212.15
I.V. Svyd, S.V. Starokozhev
The work is dedicated to the analysis of the quality of combining assessments of the radar signals and airborne objects detections in the implementation of distributed processing of radar information of airspace surveillance systems. The main sources of radar information about the air situation in the airspace control system are primary surveillance radars, secondary radar systems and identification systems on the basis of "friend or foe". It should be noted that the analysis of the information security of single-position radars shows their vulnerability in a wide range of unintentional and intentional interference, as well as determining their location. This is due to the ease of detection of the emitting transmitter of the probing signal in single-position radars. It led to the main disadvantage of single-position radars – low noise immunity and low survivability. The transition to a network of radar systems can significantly reduce the impact of deliberately directed interference. It also allows the use of methods for distributed processing of radar information in airspace surveillance systems. Analysis of the effectiveness of information support algorithms based on distributed processing of radar information of airspace surveillance systems, taking into account the final result, makes it possible to detect airborne objects using a packet of binary-quantized signals, taking into account two algorithms for combining detection results: channel accumulation and combining results; association of channel solutions and accumulation. It shows following: – the quality of consumer information support based on the proposed structure is much higher compared to the used radar information processing structure; the quality of information support for consumers has the best performance when using the signal processing method based on the accumulation of signals with the subsequent combination of detection results; the availability factor of the aircraft transponder significantly affects the quality of information support, already at P0<0.9 the use of integer logic for combining detection information is undesirable.
{"title":"Distributed processing of radar information in airspace surveillance systems","authors":"I.V. Svyd, S.V. Starokozhev","doi":"10.30837/rt.2023.1.212.15","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.15","url":null,"abstract":"The work is dedicated to the analysis of the quality of combining assessments of the radar signals and airborne objects detections in the implementation of distributed processing of radar information of airspace surveillance systems. The main sources of radar information about the air situation in the airspace control system are primary surveillance radars, secondary radar systems and identification systems on the basis of \"friend or foe\". It should be noted that the analysis of the information security of single-position radars shows their vulnerability in a wide range of unintentional and intentional interference, as well as determining their location. This is due to the ease of detection of the emitting transmitter of the probing signal in single-position radars. It led to the main disadvantage of single-position radars – low noise immunity and low survivability. The transition to a network of radar systems can significantly reduce the impact of deliberately directed interference. It also allows the use of methods for distributed processing of radar information in airspace surveillance systems. \u0000Analysis of the effectiveness of information support algorithms based on distributed processing of radar information of airspace surveillance systems, taking into account the final result, makes it possible to detect airborne objects using a packet of binary-quantized signals, taking into account two algorithms for combining detection results: channel accumulation and combining results; association of channel solutions and accumulation. It shows following: – the quality of consumer information support based on the proposed structure is much higher compared to the used radar information processing structure; the quality of information support for consumers has the best performance when using the signal processing method based on the accumulation of signals with the subsequent combination of detection results; the availability factor of the aircraft transponder significantly affects the quality of information support, already at P0<0.9 the use of integer logic for combining detection information is undesirable.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84271029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-28DOI: 10.30837/rt.2023.1.212.03
M.V. Yesina, A.A. Kravchenko, S.O. Kravchenko
Cloud computing has become an integral part of our lives, and today it is used almost everywhere. In general, cloud computing is a concept of providing IT resources in the form of services. There are two cloud computing models: deployment models, which differ in the type of cloud management and access to the cloud and the level of security, and service models, which differ in the level of service provision, which affects, among other things, the level of responsibility of the service provider and the consumer. Cloud services began to gain popularity in 2009, and the demand for them has grown exponentially every year. They became especially popular during the pandemic in 2019, when people had to stay at home without interrupting their work processes, and now, in post-covid times, they also remain popular due to their convenience, high availability, easy scalability and cost savings. Due to the widespread use of cloud computing services, a high level of security is required. Unfortunately, the popularity of cloud computing has its drawbacks – in addition to the fact that it is more difficult to monitor the security of a remote environment than the security of a local computer, there are many other threats. In today's reality, people use cloud computing technologies in large volumes, for example, at work, for personal purposes, etc., as they have great trust in these technologies. This is the reason why it is necessary to maintain a high level of security and constantly improve it. Cloud computing security threats are usually divided into confidentiality, integrity, and availability threats. To prevent the loss of confidential information, service providers must ensure its integrity. Users want to be sure that their data will not fall into the hands of an intruder or third-party services. Therefore, this article discusses the most common threats to data security and integrity in cloud computing and the existing methods that prevent these vulnerabilities and possible problems at different levels and with the help of different tools.
{"title":"An overview of threats to data security and integrity in cloud computing","authors":"M.V. Yesina, A.A. Kravchenko, S.O. Kravchenko","doi":"10.30837/rt.2023.1.212.03","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.03","url":null,"abstract":"Cloud computing has become an integral part of our lives, and today it is used almost everywhere. In general, cloud computing is a concept of providing IT resources in the form of services. There are two cloud computing models: deployment models, which differ in the type of cloud management and access to the cloud and the level of security, and service models, which differ in the level of service provision, which affects, among other things, the level of responsibility of the service provider and the consumer. Cloud services began to gain popularity in 2009, and the demand for them has grown exponentially every year. They became especially popular during the pandemic in 2019, when people had to stay at home without interrupting their work processes, and now, in post-covid times, they also remain popular due to their convenience, high availability, easy scalability and cost savings. Due to the widespread use of cloud computing services, a high level of security is required. Unfortunately, the popularity of cloud computing has its drawbacks – in addition to the fact that it is more difficult to monitor the security of a remote environment than the security of a local computer, there are many other threats. In today's reality, people use cloud computing technologies in large volumes, for example, at work, for personal purposes, etc., as they have great trust in these technologies. This is the reason why it is necessary to maintain a high level of security and constantly improve it. Cloud computing security threats are usually divided into confidentiality, integrity, and availability threats. To prevent the loss of confidential information, service providers must ensure its integrity. Users want to be sure that their data will not fall into the hands of an intruder or third-party services. Therefore, this article discusses the most common threats to data security and integrity in cloud computing and the existing methods that prevent these vulnerabilities and possible problems at different levels and with the help of different tools.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83277121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-28DOI: 10.30837/rt.2023.1.212.07
A. Oleynikov, V.A. Pulavskyi, O.H. Bilotserkivets
The features of using ultrasonic, electromagnetic and acoustic methods to counteract unauthorized recording of speech on sound recording devices are considered. The advantages and unused possibilities of the methods are noted. Ways to increase the effectiveness of the ultrasonic method of counteraction consist in using the two-frequency ultrasonic method, in positioning the device for emitting ultrasonic vibrations no more than two meters from the target, in using high-intensity ultrasonic vibrations, in using the ultrasonic method together with the acoustic method, and others. Ways to increase the effectiveness of the electromagnetic method consist in using amplitude-pulse modulation of the interference signal, narrowly directed antennas, a device with a maximum allowable power, and others; Ways to increase the effectiveness of the acoustic method consist in creating speech-like interference from the speech of the interlocutor (synchronized with speech pauses), reducing the distance between the source of interference radiation and the source of speech in relation to the distance between the interlocutors due to organizational protection measures. (adapted acoustic method). The most promising is the adapted acoustic method having the greatest potential for guaranteed countermeasures, subject to the requirements for its optimal use. Analyzing the results of the experiment, we conclude that the adapted acoustic method is the most effective. The effectiveness of the method confirms the suppression range from 1.8 m to 3.5 m depending on the device, for comparison, in the ultrasonic experiment, one of the indicators was 0.9 m, and in the electromagnetic experiment, even 0 m. The formation of interference through the acoustic channel is higher the described method ensures the universality of the proposed method to the type of device for suppressing unauthorized speech recording, regardless of the underlying method – electromagnetic, ultrasonic or acoustic.
{"title":"Ways to improve the efficiency of methods and means of counteracting unauthorized speech recording and their comparative analysis","authors":"A. Oleynikov, V.A. Pulavskyi, O.H. Bilotserkivets","doi":"10.30837/rt.2023.1.212.07","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.07","url":null,"abstract":"The features of using ultrasonic, electromagnetic and acoustic methods to counteract unauthorized recording of speech on sound recording devices are considered. The advantages and unused possibilities of the methods are noted. Ways to increase the effectiveness of the ultrasonic method of counteraction consist in using the two-frequency ultrasonic method, in positioning the device for emitting ultrasonic vibrations no more than two meters from the target, in using high-intensity ultrasonic vibrations, in using the ultrasonic method together with the acoustic method, and others. Ways to increase the effectiveness of the electromagnetic method consist in using amplitude-pulse modulation of the interference signal, narrowly directed antennas, a device with a maximum allowable power, and others; Ways to increase the effectiveness of the acoustic method consist in creating speech-like interference from the speech of the interlocutor (synchronized with speech pauses), reducing the distance between the source of interference radiation and the source of speech in relation to the distance between the interlocutors due to organizational protection measures. (adapted acoustic method). \u0000The most promising is the adapted acoustic method having the greatest potential for guaranteed countermeasures, subject to the requirements for its optimal use. \u0000Analyzing the results of the experiment, we conclude that the adapted acoustic method is the most effective. The effectiveness of the method confirms the suppression range from 1.8 m to 3.5 m depending on the device, for comparison, in the ultrasonic experiment, one of the indicators was 0.9 m, and in the electromagnetic experiment, even 0 m. The formation of interference through the acoustic channel is higher the described method ensures the universality of the proposed method to the type of device for suppressing unauthorized speech recording, regardless of the underlying method – electromagnetic, ultrasonic or acoustic.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86856084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-28DOI: 10.30837/rt.2023.1.212.09
G. Komarova
This work presents the analysis of the integral equation of macroscopic electrodynamics, the solution of the problem of diffraction of a plane polarized electromagnetic wave on a system consisting of two ferrite cylinders of radii corresponding to spatial resonance (R ≤ 0.1∙ λo, λо is the wavelength in free space ). The electromagnetic fields inside the first (second) cylinder are presented as the sum of the fields of the solitary first (second) cylinder, a plane-parallel wave falls on it and is scattered by the second (first) solitary cylinder. The expressions for the fields satisfy Maxwell's equations, boundary conditions for two cylinders, and integral equations. The influence of the distance between the centers of the cylinders on the strength of the electromagnetic field in the middle of the ferrite cylinders has been studied. It has been established that in a system consisting of two cylinders, a group resonance arises due to their mutual arrangement in space. The transformation of microwave energy on a system consisting of two ferrite cylinders depending on the value of their resonant radii at ferrimagnetic resonance has been studied. An inhomogeneous electromagnetic wave created by propagating in free space with a power flux density of 622 kW/m2 and a length of 3.2 cm reflected from a metal screen acts on a system of ferrite cylinders, the total length of which is 1.28 m, and the resonant radius is 3.863 mm with a force equal to 4 N. The results of studying the phenomenon of diffraction on a system consisting of two ferrite cylinders show that the total force with which the inhomogeneity of a standing electromagnetic wave acts on two cylinders is 2.8 times greater than the force acting on a solitary cylinder.
{"title":"Influence of ferrimagnetic resonance on conversion of electromagnetic energy by a system consisting of two cylinders into a mechanical one","authors":"G. Komarova","doi":"10.30837/rt.2023.1.212.09","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.09","url":null,"abstract":"This work presents the analysis of the integral equation of macroscopic electrodynamics, the solution of the problem of diffraction of a plane polarized electromagnetic wave on a system consisting of two ferrite cylinders of radii corresponding to spatial resonance (R ≤ 0.1∙ λo, λо is the wavelength in free space ). The electromagnetic fields inside the first (second) cylinder are presented as the sum of the fields of the solitary first (second) cylinder, a plane-parallel wave falls on it and is scattered by the second (first) solitary cylinder. The expressions for the fields satisfy Maxwell's equations, boundary conditions for two cylinders, and integral equations. The influence of the distance between the centers of the cylinders on the strength of the electromagnetic field in the middle of the ferrite cylinders has been studied. It has been established that in a system consisting of two cylinders, a group resonance arises due to their mutual arrangement in space. The transformation of microwave energy on a system consisting of two ferrite cylinders depending on the value of their resonant radii at ferrimagnetic resonance has been studied. An inhomogeneous electromagnetic wave created by propagating in free space with a power flux density of 622 kW/m2 and a length of 3.2 cm reflected from a metal screen acts on a system of ferrite cylinders, the total length of which is 1.28 m, and the resonant radius is 3.863 mm with a force equal to 4 N. The results of studying the phenomenon of diffraction on a system consisting of two ferrite cylinders show that the total force with which the inhomogeneity of a standing electromagnetic wave acts on two cylinders is 2.8 times greater than the force acting on a solitary cylinder.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79939040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}