Optimization of resources distribution of radio suppression means and destructive program impact on electronics networks

Authors

  • Serhii Sholokhov Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0003-2222-8842
  • Ivan Samborsky Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0001-5579-8740
  • Bohdan Nikolaienko Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0002-6888-5947
  • Serhii Vasylenko Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0001-6779-8246
  • Yurii Hordiienko Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0002-2817-8543

DOI:

https://doi.org/10.20535/2411-1031.2022.10.2.270464

Keywords:

efficiency of information exchange, computer radio network, radio suppression, optimization of resource allocation

Abstract

Methodological approaches to the development of scenarios for complex radio suppression and electromagnetic effects of typical electronics systems have been developed. However, in the development of possible scenarios for the integrated usage of radio suppression and destructive program action, the problem of resource optimizing the of these means and their distribution among radio suppression targets and objects of destructive computer action has not been developed in full. Therefore, it is necessary to formulate the problem and develop a methodology for optimizing the resource allocation of radio suppression means and destructive program action in the development of possible scenarios for disruption of information exchange by an adversary in a typical electronics network. The aim of the research is to improve the methodology for optimizing the resource allocation of radio suppression means and destructive program action for the development of scenarios for violation of information exchange by an adversary in an electronics network. To achieve the goal of the research, methods of nonlinear optimization of the distribution of a heterogeneous resource were applied. To determine the security factors of objects of radio-electronic influence and destructive computer influence, the method of frequencies of preferences of the person making a decision was applied using the Thurstone method. To solve the problem of optimal distribution of a heterogeneous resource of means of destructive influence to ensure the value of a multiplicative objective function of an arbitrary type not less than a given one, the method of successive increments was applied. At the same time, the methods of the queuing theory are used to determine the efficiency indicator of the violation of information exchange. It allows formalizing electronics systems as a set of queuing systems – digital communication subsystems and computer networks. The problem formulation was carried out. The introduced indicators made it possible to solve the problem of determining the minimum resource of means of destructive influence and their optimal distribution according to the goals of radio suppression and objects of destructive program influence to achieve the required level of disruption of the efficiency of information exchange in electronics systems. Based on the results of the article, a method has been developed for optimizing the distribution of the resource of radio suppression means and destructive program action for the development of possible scenarios for violation of information exchange by enemy in a typical electronics network. The verification of the proposed methodology was carried out by comparing the theoretical results with the results of simulation modeling of scenarios for violation of information exchange by an adversary in an electronics network.

Author Biographies

Serhii Sholokhov, Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

candidate of technical sciences, associate professor, professor of the special telecommunication systems academic department

Ivan Samborsky, Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

candidate of technical sciences, senior research officer, associate professor of the special telecommunication systems academic department

Bohdan Nikolaienko, Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

candidate of technical sciences, associate professor of the special telecommunication systems academic department

Serhii Vasylenko, Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

candidate of technical sciences, head of the research laboratory of the research center

Yurii Hordiienko, Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

postgraduate student

References

O. Shumigay, and O. Ermolenko, “The current state of multifunctional means and complexes of electronic warfare. Trends and perspective directions of their development”, Collection of scientific works of the State Research Institute of Testing and Certification of Arms and Military Equipment, iss. 3 (5), pp. 119-125, 2020, doi: https://doi.org/10.37701/dndivsovt.5.2020.14.

S. Choi, O.-J. Kwon, H. Oh, and D. Shin, “Method for effectiveness assessment of electronic warfare systems in cyberspace”, Symmetry, vol. 12, iss. 12, 2107, 2020, doi: https://doi.org/10.3390/sym12122107.

R. Gintautas “A modern warfare paradigm: reconsideration of combat power concept”, Journal of security and sustainability issues, vol. 8, iss. 3, 2019. doi: https://doi.org/10.9770/jssi.2019.8.3(12).

E. Potenziani II, “Current and future trends in military electronic warfare systems and the role of thin films and related materials”, Ferroelectrics, vol. 571, iss. 1, 2021, doi: https://doi.org/10.1080/00150190600946302.

G. Tikhonov, S. Sholokhov, and Yu. Gordienko, “Methods for developing scenarios of electronic and electromagnetic suppression of the national telecommunications network and complex signal-interference situation for the synthesis of adaptive noise protection algorithms”, Modern information technologies in the sphere of security and defense, no. 3 (39), pp. 11-22, 2020.

O. Roma, S. Vasylenko, Ye. Peleshok, S. Honenko, and B. Nikolayenko, “Analysis of the synchronism entering process robustness in UAV’s radio control line with FHSS”, Radio Electronics, Computer Science, Control, no. 2. (53), pp. 15-24, 2020, doi: https://doi.org/10.15588/1607-3274-2020-2-2.

L. Kleinrock, “Analytic and simulation methods in computer network design”, in Proc. International Workshop Managing Requirements Knowledge, Atlantic City, 1970, pp. 569-579, doi: https://doi.org/10.1145/1476936.1477022.

P. Kubat, “Estimation of reliability for communication/computer networks simulation”, IEEE Transactions on Communications, vol. 37, iss. 9, pp. 927-933, 1989, doi: https://doi.org/10.1109/26.35372.

D. Anagnostopoulos, and M. Nikolaidou “An object-oriented modelling approach for dynamic computer network simulation”, International Journal of Modelling and Simulation, vol. 21, iss. 4, pp. 249-256, 2001, doi: https://doi.org/10.1080/02286203.2001.11442209.

B. Grabovetsky, Methods of expert assessments: theory, methodology, areas of use. Vinnytsia, Ukraine: VNTU, 2010.

E. Berzin, Optimal resource allocation and system synthesis elements. Moscow, SU: Sov. radio, 1974.

Downloads

Published

2022-12-29

How to Cite

Sholokhov, S., Samborsky, I., Nikolaienko, B., Vasylenko, S., & Hordiienko, Y. (2022). Optimization of resources distribution of radio suppression means and destructive program impact on electronics networks. Collection "Information Technology and Security", 10(2), 230–240. https://doi.org/10.20535/2411-1031.2022.10.2.270464

Issue

Section

ELECTRONIC COMMUNICATION SYSTEMS AND NETWORKS