Skip to main content
Log in

Improvement of Information Security of Monitoring Channels in Meteor-Burst Communication Networks of the Russian Arctic

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

A procedure of quantitative assessment of monitoring security of the effectiveness of facilities in the vessel traffic management system along the Northern Sea Route is described using meteor-burst communication networks of the Russian Arctic.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.

Similar content being viewed by others

REFERENCES

  1. Doroshenko, V.I. and Ksenofontov, Yu.G., Application of meteor communication in the security systems of the Northern sea route infrastructure objects, Vopr. Oboronnoi Tekh. Ser. 16: Tekh. Sredstva Protivodeistiviya Terrorizmu, 2019, nos. 1–2, pp. 3–11.

  2. Zegzhda, D.P., Pavlenko, E.Yu., Lavrova, D.S., and Shtyrkina, A.A., Development of a sustainable functioning criterion of cyber-physical systems, Probl. Inf. Bezop. Komp’yut. Sist., 2019, no. 2, pp. 156–163.

  3. Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, 2018, IEEE, 2018, pp. 830–834.  https://doi.org/10.1109/ICPHYS.2018.8390814

  4. Lavrova, D.S. and Pechenkin, A.I., Security incidents detection in the Internet of Things, Probl. Inf. Bezop. Komp’yut. Sist., 2015, no. 2, pp. 69–79.

  5. Kapralov, D.D. and Kirik, D.I., Stochastic model of meteor-burst radio channel, Tr. Uch. Zaved. Svyazi, 2018, vol. 4, no. 3, pp. 54–64.  https://doi.org/10.31854/1813-324X-2018-4-3-54-64

    Article  Google Scholar 

  6. Odoevskii, S.M., Salyuk, D.V., and Stepanenko, V.V., Tekh. Sredstv Svyazi: Nauch.-Tekh. Sb., 2017, no. 6, pp. 159–163.

  7. Titkov, S.B., Technical proposals on using meteor-burst communication, Zashchita Inf. Insaid, 2006, no. 3, pp. 74–80.

  8. Ryabov, I.V., Tolmachev, S.V., and Lebedeva, A.A., Principles of software-based radiosystems and its application within the framework of meteor-burst communication investigation, Sovrem. Naukoemkie Tekhnol., 2016, no. 7-1, pp. 59–66.

  9. Karpov, A.V., Sidorov, V.V., and Sulimov, A.I., Meteor-burst generation of secret keys for protecting open communication channels, Inf. Tekhnol. Vychislit. Sist., 2008, no. 3, pp. 45–54.

  10. Gileva, Yu. and Ryumin, A., “Lomonosov” has fitted in the landscape, Strana Rosatom, 2019, no. 35. https://strana-rosatom.ru/2019/09/23/lomonosov-vpisalsya-v-landshaft/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu. G. Ksenofontov.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by A. Muravev

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Doroshenko, V.I., Pivovarov, A.N. & Ksenofontov, Y.G. Improvement of Information Security of Monitoring Channels in Meteor-Burst Communication Networks of the Russian Arctic. Aut. Control Comp. Sci. 55, 1142–1148 (2021). https://doi.org/10.3103/S014641162108037X

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S014641162108037X

Keywords:

Navigation