Optimization of resources distribution of radio suppression means and destructive program impact on electronics networks
DOI:
https://doi.org/10.20535/2411-1031.2022.10.2.270464Keywords:
efficiency of information exchange, computer radio network, radio suppression, optimization of resource allocationAbstract
Methodological approaches to the development of scenarios for complex radio suppression and electromagnetic effects of typical electronics systems have been developed. However, in the development of possible scenarios for the integrated usage of radio suppression and destructive program action, the problem of resource optimizing the of these means and their distribution among radio suppression targets and objects of destructive computer action has not been developed in full. Therefore, it is necessary to formulate the problem and develop a methodology for optimizing the resource allocation of radio suppression means and destructive program action in the development of possible scenarios for disruption of information exchange by an adversary in a typical electronics network. The aim of the research is to improve the methodology for optimizing the resource allocation of radio suppression means and destructive program action for the development of scenarios for violation of information exchange by an adversary in an electronics network. To achieve the goal of the research, methods of nonlinear optimization of the distribution of a heterogeneous resource were applied. To determine the security factors of objects of radio-electronic influence and destructive computer influence, the method of frequencies of preferences of the person making a decision was applied using the Thurstone method. To solve the problem of optimal distribution of a heterogeneous resource of means of destructive influence to ensure the value of a multiplicative objective function of an arbitrary type not less than a given one, the method of successive increments was applied. At the same time, the methods of the queuing theory are used to determine the efficiency indicator of the violation of information exchange. It allows formalizing electronics systems as a set of queuing systems – digital communication subsystems and computer networks. The problem formulation was carried out. The introduced indicators made it possible to solve the problem of determining the minimum resource of means of destructive influence and their optimal distribution according to the goals of radio suppression and objects of destructive program influence to achieve the required level of disruption of the efficiency of information exchange in electronics systems. Based on the results of the article, a method has been developed for optimizing the distribution of the resource of radio suppression means and destructive program action for the development of possible scenarios for violation of information exchange by enemy in a typical electronics network. The verification of the proposed methodology was carried out by comparing the theoretical results with the results of simulation modeling of scenarios for violation of information exchange by an adversary in an electronics network.
References
O. Shumigay, and O. Ermolenko, “The current state of multifunctional means and complexes of electronic warfare. Trends and perspective directions of their development”, Collection of scientific works of the State Research Institute of Testing and Certification of Arms and Military Equipment, iss. 3 (5), pp. 119-125, 2020, doi: https://doi.org/10.37701/dndivsovt.5.2020.14.
S. Choi, O.-J. Kwon, H. Oh, and D. Shin, “Method for effectiveness assessment of electronic warfare systems in cyberspace”, Symmetry, vol. 12, iss. 12, 2107, 2020, doi: https://doi.org/10.3390/sym12122107.
R. Gintautas “A modern warfare paradigm: reconsideration of combat power concept”, Journal of security and sustainability issues, vol. 8, iss. 3, 2019. doi: https://doi.org/10.9770/jssi.2019.8.3(12).
E. Potenziani II, “Current and future trends in military electronic warfare systems and the role of thin films and related materials”, Ferroelectrics, vol. 571, iss. 1, 2021, doi: https://doi.org/10.1080/00150190600946302.
G. Tikhonov, S. Sholokhov, and Yu. Gordienko, “Methods for developing scenarios of electronic and electromagnetic suppression of the national telecommunications network and complex signal-interference situation for the synthesis of adaptive noise protection algorithms”, Modern information technologies in the sphere of security and defense, no. 3 (39), pp. 11-22, 2020.
O. Roma, S. Vasylenko, Ye. Peleshok, S. Honenko, and B. Nikolayenko, “Analysis of the synchronism entering process robustness in UAV’s radio control line with FHSS”, Radio Electronics, Computer Science, Control, no. 2. (53), pp. 15-24, 2020, doi: https://doi.org/10.15588/1607-3274-2020-2-2.
L. Kleinrock, “Analytic and simulation methods in computer network design”, in Proc. International Workshop Managing Requirements Knowledge, Atlantic City, 1970, pp. 569-579, doi: https://doi.org/10.1145/1476936.1477022.
P. Kubat, “Estimation of reliability for communication/computer networks simulation”, IEEE Transactions on Communications, vol. 37, iss. 9, pp. 927-933, 1989, doi: https://doi.org/10.1109/26.35372.
D. Anagnostopoulos, and M. Nikolaidou “An object-oriented modelling approach for dynamic computer network simulation”, International Journal of Modelling and Simulation, vol. 21, iss. 4, pp. 249-256, 2001, doi: https://doi.org/10.1080/02286203.2001.11442209.
B. Grabovetsky, Methods of expert assessments: theory, methodology, areas of use. Vinnytsia, Ukraine: VNTU, 2010.
E. Berzin, Optimal resource allocation and system synthesis elements. Moscow, SU: Sov. radio, 1974.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Collection "Information Technology and Security"
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).