Identification of Technical Objects in the Special Networks According to the Principle of "Friend or Foe"

Vyacheslav Yu Korolyov,V M Glushkov Institute of Cybernetics of NAS of Ukraine,Maksim I Ogurtsov,Anatoliy I Kochubinskyi,Vyacheslav Yu. Korolyov,,Maksim I. Ogurtsov,Anatoliy I. Kochubinskyi,,
DOI: https://doi.org/10.15407/csc.2021.04.003
2021-11-01
Control Systems and Computers
Abstract:Introduction. In recent years, military conflicts are moving to a fundamentally new level of development, which is associated with the widespread use of geographically distributed large groups of remotely controlled robotic systems, the rapid growth of information volumes, a significant increase in the speed of its processing, instant messaging to increase situational awareness, management, rapid response, etc. Purpose. The article is devoted to solving an urgent scientific problem — the development of an algorithm for state identification of military objects and personnel. The problems of using modern cryptographic algorithms for state identification, which use data obtained by other stations of the air defense system and radio intelligence, combined in a special network, are considered. Results. A new encryption key exchange protocol and a rationale for choosing a cryptographic algorithm that can be used in real-time systems with low computational performance are proposed. To ensure the stability of the use of electronic warfare tools, it is proposed to use software-defined radio stations based on programmable logic matrices as a hardware basis, since they allow changing the type of signal-code structures, which also applies frequency ranges without replacing radio engineering blocks. Conclusions. With the increase in the number of remotely controlled military equipment objects on the battlefield, the problem of positioning military personnel and equipping them with network communication means requires a review of the methods and algorithms used for state recognition. The paper proposes a new algorithm for state identification of objects and identification of military personnel using symmetric cryptographic algorithms and the use of a secure Protocol for exchanging information received from the network of the Armed Forces of Ukraine. This approach can potentially increase the performance and quality of the identification system.
What problem does this paper attempt to address?