Skip to main content
Top

2019 | OriginalPaper | Chapter

Peculiarities of Cryptographic Model of the System of Wireless Remote Control

Authors : Gennady A. Vorobyev, Vladimir A. Kozlov, Viktoria A. Ryndiuk

Published in: Perspectives on the Use of New Information and Communication Technology (ICT) in the Modern Economy

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The purpose of the research is to develop a cryptographic model of protection from unsanctioned influence on the process of remote control of an object through wireless exposed channels of communication. In order to achieve this goal, we developed a hybrid probabilistic model of cryptographic transformations of codes of controls, transferred through exposed channels from one or several control units.
The developed cryptographic models of such distributed systems will ensure solution of the following tasks: firstly, encryption of the same code of control action is changed unpredictably in each following session of communication; secondly, the procedure of authentication of incoming cryptograms is conducted instantaneously – before the stage of decryption of the cryptogram.
The first task is solved by application of a hybrid probabilistic model of cryptographical transformations, second – by means of using a specially developed structure of cryptogram that allows applying direct analysis of several one-bite requisites of cryptogram to obtain correct data on authenticity of the author of cryptogram.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Kozlov, V.A., Ryndiuk, V.A.: The system of remote control over the object via exposed channels on the basis of dialog encryption and probabilistic model of cryptographic transformations. Bull. Essentuki Inst. Manag. Bus. Law. Inter-Univ. Collect. Sci. Works (11), 260–264 (2015). Essentuki Institute of Management, Business and Law Publications, Essentuki Kozlov, V.A., Ryndiuk, V.A.: The system of remote control over the object via exposed channels on the basis of dialog encryption and probabilistic model of cryptographic transformations. Bull. Essentuki Inst. Manag. Bus. Law. Inter-Univ. Collect. Sci. Works (11), 260–264 (2015). Essentuki Institute of Management, Business and Law Publications, Essentuki
go back to reference Kozlov, V.A., Ryndiuk, V.A., Vorobyev, G.A., Avdusina, A.I.: Models and methods of protection from attacks “human in the middle” during online transactions. Bull. Essentuki Inst. Manag. Bus. Law (13), 106–112 (2016a) Kozlov, V.A., Ryndiuk, V.A., Vorobyev, G.A., Avdusina, A.I.: Models and methods of protection from attacks “human in the middle” during online transactions. Bull. Essentuki Inst. Manag. Bus. Law (13), 106–112 (2016a)
go back to reference Kozlov, V.A., Chernyshev, A.B., Kaliberda, I.V., Orshansky, A.Y.: Probabilistic model of the system of asymmetrical cryptographic transformations. Sci. Overv. (7), 261–266 (2015a) Kozlov, V.A., Chernyshev, A.B., Kaliberda, I.V., Orshansky, A.Y.: Probabilistic model of the system of asymmetrical cryptographic transformations. Sci. Overv. (7), 261–266 (2015a)
go back to reference Kozlov, B.A., Chernyshev, A.B., Ryndiuk, V.A., Bondarenko, K.O.: Probabilistic model of electronic digital signature. Sci. Overv. (11), 141–146 (2015b) Kozlov, B.A., Chernyshev, A.B., Ryndiuk, V.A., Bondarenko, K.O.: Probabilistic model of electronic digital signature. Sci. Overv. (11), 141–146 (2015b)
go back to reference Mao, V.: Modern Cryptography: Theory and Practice, p. 763. Williams House, Moscow (2005) Mao, V.: Modern Cryptography: Theory and Practice, p. 763. Williams House, Moscow (2005)
go back to reference Tilborg, H.C.: Fundamentals of Cryptology. Professional Guide and Interactive Study Guide, p. 471. Mir, Moscow (2006) Tilborg, H.C.: Fundamentals of Cryptology. Professional Guide and Interactive Study Guide, p. 471. Mir, Moscow (2006)
go back to reference Ferguson, N., Schnayer, B.: Practical cryptography, 416 p. Williams, Moscow (2005) Ferguson, N., Schnayer, B.: Practical cryptography, 416 p. Williams, Moscow (2005)
go back to reference Schnayer, B.: Applied cryptography. Protocols, Algorithms, and Sources Codes in C Language, 816 p. Triumph, Moscow (2002) Schnayer, B.: Applied cryptography. Protocols, Algorithms, and Sources Codes in C Language, 816 p. Triumph, Moscow (2002)
go back to reference Ryndiuk, V.A., Vorobyev, G.A., Kozlov, V.A., Makarov, A.M.: Probabilistic models of cryptographic systems and their applications. In: IEEE Electronic Publication Agreement Receipt. The Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC 2016), Moscow, Russia, pp. 160–163, 06–08 July 2016 Ryndiuk, V.A., Vorobyev, G.A., Kozlov, V.A., Makarov, A.M.: Probabilistic models of cryptographic systems and their applications. In: IEEE Electronic Publication Agreement Receipt. The Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC 2016), Moscow, Russia, pp. 160–163, 06–08 July 2016
Metadata
Title
Peculiarities of Cryptographic Model of the System of Wireless Remote Control
Authors
Gennady A. Vorobyev
Vladimir A. Kozlov
Viktoria A. Ryndiuk
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-319-90835-9_79

Premium Partner