Restriction of unauthorized access in radio systems with broadcast data transmission
Abstract
Introduction: The usage of broadcast radio systems is associated with the possibility of organizing continuous radio access zones with a limited number of transmission points and a considerable number of subscribers (information consumers). However, radio broadcasting systems have specific features of unauthorized access restriction related to the spatial electromagnetic accessibility of radio channels and the absence of a reverse information channel. Purpose: Developing principles for key information distribution and for the control over selective access of subscribers to the data transmitted in broadcast radio systems of various purposes, taking into account the restrictions imposed by the broadcasting mode of transmission. Method: Modification of the unauthorized access restriction methods used in radio broadcast systems, based on a combination of symmetric and asymmetric crypto algorithms. Results: The analysis of the existing approaches to unauthorized access restriction in broadcast radio systems has shown that the restrictions imposed by the peculiarities of these systems often make it difficult or impossible to apply various network protocols of protected data exchange commonly used in computer networks. We substantiate the principles (presence of two or more levels of key information; possibility to replace all the key information; ways to control the access to the system) and a way to restrict unauthorized access to the radio channels of broadcast systems, based on the combined use of symmetric and asymmetric crypto algorithms. As the symmetric part, you can use block or stream ciphers. As algorithms for the asymmetric part, elliptic curves are recommended, as they have the best cryptographic and speed characteristics as compared to other types of asymmetric cryptographic algorithms. Practical relevance: The proposed unauthorized access restriction method can be used to organize secure data exchange and selective control over the access to data transmitted in broadcast radio systems of various purposes.Published
2018-10-19
How to Cite
Shtanko, S. (2018). Restriction of unauthorized access in radio systems with broadcast data transmission. Information and Control Systems, (5), 57-65. https://doi.org/10.31799/1684-8853-2018-5-57-65
Issue
Section
Information security