Purpose of research is to create a method for determining the source of messages in the receiver, which allows, based on the analysis of the characteristics of the distribution of the time of receipt of messages, to increase the reliability of determining the source.Methods. Authentication of the message source is based on statistical analysis of metadata values, which in this study are the time intervals between messages. The metadata processing model is based on the well-known model of receiving messages from the target source in LoRaWAN networks. At the same time, the source was determined using coding methods in the block coupling mode, which provide higher identification reliability for short-length messages characteristic of the specified type of networks. With the help of numerical modeling, the patterns of changes in the characteristics of the time of receipt of messages in the event of an identification error were determined. The decision-making rule is also formulated in case of impossibility of authentication based on processing the contents of identification fields. Studies have shown the effectiveness of the application of the source detection model in various ranges of parameters for the formation of message sequences.Results. The result of the conducted research is the development of an authentication method based on the analysis of the time of receipt of messages to the receiver, which differs in that it uses the characteristics of the distribution of moments of high orders for a series of time delays as the analyzed data. Its use in combination with coding methods in the message concatenation mode reduces the probability of a single message replacement error in a sequence by 4-6 times, compared with methods that perform identification only based on the results of processing the identifiers of the messages themselves.Conclusion. The result of experimental studies has shown the possibility of using the developed method to increase the reliability of determining the authenticity of the source of messages, the possibility of reducing the number of reinquiries that occur when errors are detected, the possibility of reducing the size of additional identifier fields in each message. The resulting effect will be expressed in a general increase in the bandwidth of the communication channel between remote components of a distributed system.
Purpose of research is to build a model of a system for effective authentication of mobile users based on public data of the user and his behavioral factors as well as to study algorithms for calculating the threshold value at which the authentication of a mobile device user is considered successful.Methods. When analyzing the behavioral factors of a user who needs to be authenticated when interacting with mobile devices, application of the following methods for calculating the threshold value are proposed: dynamic methods for determining the threshold value of user authentication based on the standard deviation and the calculation of the aggregate mean score; the method based on the standard when the system divides the aggregate flow of estimates into several blocks of the same length, where the first block is used for training, and the calculated threshold is used in the second block (this sequence of actions is repeated continuously, that is, the previous block provides training results for calculating the threshold for the current block); a method for calculating the aggregate mean score, where instead of using a single total score as input, the system uses the mean value of the current block, and the new calculated threshold is used as the threshold for decision making for the next block. A mathematical model that balances the speed and reliability of mobile users authentication is proposed.Results. The result of the research is the development of an effective system for calculating the threshold value of successful authentication of a mobile device user based on behavioural features which adapts to changes of the user's behavioural factors. Experimental studies and comparisons with analogs confirming the completeness and correctness were carried out as well as various variants of the proposed solutions.Conclusion. The proposed method of implicit authentication for mobile access control is easy to implement, easy to use, and adaptive to changes in input data. Options for calculating the threshold value at which implicit authentication is considered successful are also proposed.
Цель исследования заключается в разработке системы многопоточной обработки на основе алгоритма шифрования с использованием клеточных автоматов и исследовании статистических показателей производительности в зависимости от аппаратной составляющей и величины входного блока, а также разработке рекомендаций для повышения криптоскойкости метода. Методы. Рассмотрена математическая модель метода шифрования с использованием плавающего окна на базе клеточных автоматов [3]. Для исследования быстродействия процесса обработки конфиденциальных данных разработан вариант организации структуры программного модуля с расширенным блоком настроечных параметров, определяющих размерность матрицы, строку активации битовой окрестности обрабатываемых элементов, число параллельных вычислений (тредов) и правило расширения граничных элементов матрицы. Предложен метод формирования графической зависимости времени обработки от исходных параметров, область применения которого возможна как для обработки отдельных файлов, так и непрерывных потоков данных абонентов вычислительной сети. Результаты. Разработан криптографический модуль, реализующий метод шифрования на базе клеточных автоматов, особенностью которого является многопоточный режим работы и динамическое управление блоком исходных параметров. Сформулированы рекомендации по установке окрестности активных элементов матрицы и числу потоков с учетом архитектуры центрального процессора. Проведены экспериментальные исследования, подтверждающие полноту и корректность предложенных решений. Показана целесообразность использования высокоскоростных накопителей на жестком диске и сохранение результатов шифрования в асинхронном сегментированном режиме с привязкой результата к рабочему треду. Заключение. Предложенный вариант организации системы обработки конфиденциальной информации в виде программного модуля с учетом особенностей аппаратного обеспечения позволяет оптимизировать скорость обработки, а соблюдение рекомендаций по расширению окрестности при блочном преобразовании позволяет повысить криптостойкость алгоритма шифрования на базе клеточных автоматов с плавающим окном. Ключевые слова: клеточный автомат; шифрование данных; параллельные вычисления; криптография; системный анализ; информационная безопасность. Конфликт интересов: Авторы декларируют отсутствие явных и потенциальных конфликтов интересов, связанных с публикацией настоящей статьи.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.