
Telecommunication systems, networks and devices
Method and Algorithm for Vulnerability Detection in the Protocols of Critical Information Infrastructure Objects
|
D. Vasinev, M. Solovev
|
Read
Abstract: Problem statement. Due to the constant emergence of new threats and vulnerabilities, significant efforts of IS specialists are devoted to the development of methods and algorithms for finding vulnerabilities in telecommunication protocols, software, and information systems. Thus, the actual task is to automate the process of vulnerability search, to develop automatic and automated methods that reduce the routine functions of the IS specialist associated with the search for vulnerabilities. The aim of the work is to increase the efficiency of vulnerability search in TCP/IP stack protocols for critical information infrastructure. Methods used: methods of systems theory, probability theory, stochastic search methods based on Markov chains, genetic algorithms, methods and algorithms of testing and testing technologies, and search for vulnerabilities in software that processes protocol constructs of TCP/IP stack for critical information infrastructure. Novelty: a method, algorithm and software tool for searching for vulnerabilities in protocols, allowing to form test constructs based on stochastic random search for vulnerabilities, have been developed. The proposed solution allows to purposefully form test constructs in a given state space of protocols, obtain test sequences based on Markov chains, and modify them with genetic algorithms. Result: The application of the proposed method and algorithms of vulnerability search allows to investigate a given state space of protocols functioning in CII and allows to reduce the time of formation of test designs in comparison with the method of complete enumeration. Due to the peculiarities of the developed algorithm, the solution for the search for vulnerabilities based on the violation of the structure of the incoming traffic to the processing system, and not only the supply of an unintended type of information, is realized. Theoretical significance: contribution to the theory of information security in the field of improving methods of testing protocol designs based on stochastic random search in the space of protocols and their parameters, as well as modification of test sequences by methods of genetic algorithms, bringing the proposed solutions to implementation algorithms. Practical significance: a universal automated software fuzzer for searching vulnerabilities of TCP/IP stack software in critical information infrastructure has been developed, functioning on the basis of state space parameters of the target object.
Keywords: fuzzing, vulnerability testing, protocol fuzzing, genetic algorithm, dynamic analysis, black box fuzzing, stochastic random search, genetic algorithm testing methodology, testing algorithm.
DOI 10.31854/2307-1303-2024-12-2-01-15
|
Formalization and Automation of Post-NGN Communication Network Testing Processes
|
A. Zimin
|
Read
Abstract: Problem statement. The development and complication of the architecture of communication networks, protocols and scenarios for the interaction of various network elements, as a result, entails the development of means for testing communication networks. The aim of the work is to review the evolution of abstract tools and mathematical models of communication network testing tools as these networks evolve. The method used is the specifications of test scenarios in the language of MSC message sequence diagrams for testing 3G networks and 5G networks (network slices, new network elements. The scientific novelty of the study lies in the author’s approach to the application of MSC and Petri net tools for automating the process of testing NGN networks. Theoretical / Practical relevance: Message Sequence Diagram test case specifications can be used for 5G network testing in commissioning modes, certification testing, QoS verification, validation, and documentation in the OSS / BSS network management system, etc.
Keywords: NGN, 4G, 5G / 6G, network infrastructure testing, message sequence diagrams, artificial intelligence, machine learning, finite behavior automata.
DOI 10.31854/2307-1303-2024-12-2-16-24
|
Positioning of Devices in LTE Networks. Part 1. Evaluating Signal Bandwidth's Impact on Coordinate Accuracy
|
H. C. Hua
|
Read
Abstract: Purpose. The positioning accuracy of device plays an important role in providing navigation and geolocation services, such as emergency calls, traffic management, and in new fields of IoT applications. Despite the high accuracy of global navigation satellite systems (GNSS) like GPS and GLONASS, their application indoors is limited due to the lack of direct line-of-sight. This highlights the need to develop alternative positioning methods based on communication networks. The objective of this study is to analyze the impact of signal bandwidth on the positioning accuracy of the OTDoA PRS method. Methods. The study involves modeling signals transmitted from multiple base stations with different power levels and delays, as well as performing correlation by the UE with PRS (Positioning Reference Signal) to determine delay times and construct hyperbolas of constant delay intervals. The accuracy assessment is performed using the root mean square error (RMSE) calculation, and the analysis is based on a simulation scenario implemented in the LTE System Toolbox in MATLAB. Novelty. The novelty of the research lies in the comprehensive analysis of the influence of signal bandwidth, on the accuracy of the OTDoA PRS method. For the first time, Reference Measurement Channel (RMC) configurations from R.5 to R.9 are used for constructing hyperbolas, allowing for the optimization of signal parameters to improve positioning accuracy. Results. The study demonstrates that increasing the signal bandwidth and optimizing the eNB arrangement minimizes the RMSE. As the distance between the base station and the user equipment increases, the amplitudes of the correlative peaks of PRS signals are reduced, and the positioning accuracy decreases. Practical relevance. The results of the study can be used to optimize the architecture of LTE and 5G networks in conditions where GNSS usage is limited. The proposed approaches can also be applied in the development of algorithms for telecommunications equipment to ensure accurate positioning of UE.
Keywords: positioning, LTE, OTDoA, TDOA, PRS, signal bandwidth, resource block, accuracy assessment, RMSE.
DOI 10.31854/2307-1303-2024-12-2-25-39
|
Resource Allocation in Air Base Station-Enabled Wireless Network: Survey
|
T. D. Tran
|
Read
Abstract: Problem statement. Due to their mobility, flexibility, ease of deployment, and low cost, Autonomous Aerial Vehicle (AAV) play an important role in future wireless networks. However, their pratical implementation faces challenges, including energy constraints, dynamic channel variations, interference management, and the need for efficient resource allocation to ensure seamless connectivity for ground users. Traditional optimization methods often fail to adapt to these complexities in real-time, limiting the effectiveness of AAV-assisted wireless networks. The aim of the work provides a comprehensive review of resource allocation in AAV-assisted wireless networks, focusing on power and bandwidth optimization strategies, as well as the key challenges in ensuring efficient and reliable communication. Methods: used in this study include a systematic review of existing literature, analyzing optimization approaches such as Game Theory, Artificial Intelligence for efficient resource allocation in AAV-assisted wireless networks. Novelty: this study analyzes resource allocation challenges in AAV-assisted network, focusing on the interdependence of power and bandwidth allocation. It explores optimization techniques like Game Theory, and Artificial Intelligence. Results. The analysis in this paper demonstrates that Game Theory and Artificial Intelligence based approaches significantly improve resource allocation efficiency. Additionally, the study identifies key challenges, including heterogeneous density network, security concerns, and complex channel modeling, providing insights for future research. Practical / Theoretical Relevance: This study advences the theoretical understanding of resource allocation in AAV-assisted wireless networks by integrating optimization strategies from Game Theory and Artificial Intelligence. Pratically, it provides insight into enhancing network efficiency, adaptability and security, making AAV-based communication more viable for real-world applications, such as disaster recovery, remote areas coverage, and IoT data collection.
Keywords: AAV, Power Allocation, Bandwidth Allocation, Game Theory, Artificial Intelligence.
DOI 10.31854/2307-1303-2024-12-2-40-47
|
Analysis of Parameters of Metal Film Resistors Used in Instrument Engineering
|
S. S. Ogluzdin, V. A. Kim, A. A. Pogorelov
|
Read
Abstract: Purpose search and selection of metal film resistors of large commercial companies; determination of parameters of resistors significant for instrument engineering; study of existing literature data on methods of evaluation of such parameters; calculation of attractiveness indicators of metal film resistors of each manufacturer for each selected parameter, calculation of a complex indicator of attractiveness, analysis of the obtained results. The aim of the work is to provide the results of a comparative analysis of resistors of three commercial companies by the following parameters: cost, resistance rating, dimensional error, voltage coefficient and temperature coefficient of resistance. Methods used: comparison of resistors by summing up the ranked indicators. Novelty: an element of novelty of the presented study is the analysis of dimensional parameters and voltage coefficient. Result: YUANQI ELECTRONIC resistors have the highest general attractiveness index. They are the most optimal choice for instrumentation of all the selected models, and also have the best resistance rating error, dimensional error, and temperature coefficient of resistance. FXI Electronics Corporation resistors have a lower general attractiveness index, but have an advantage in the voltage coefficient. These resistors should be used in power electronics devices. The power of which can vary widely, and thus have a different effect on the resistivity of metal films. WEIDILY resistors have an advantage in cost. Theoretical / Practical significance: The presented comparison is proposed to be used when choosing a manufacturer of metal film resistors for instrumentation. Also, the calculated general attractiveness indices will allow you to make decisions about purchasing the resistors selected for the study, comparing with other resistor manufacturers, conducting your own research, improving the quality of metal film resistors and identifying weaknesses.
Keywords: values of resistor parameters, measurement of resistor nominal, general parameter, metallic film resistors, voltage coefficient.
DOI 10.31854/2307-1303-2024-12-2-48-61
|
|
|