Control Systems and Computers, N4, 2021, Article 1

https://doi.org/10.15407/csc.2021.04.003

Control Systems and Computers, 2021, Issue 4 (294), pp. 3-12.

UDC 004.056

V.Yu. Korolyov, Ph.D. Eng. Sciences, Senior Research Associate,
V.M. Glushkov Institute of Cybernetics of the NAS of Ukraine,
03187, Kyiv, Glushkov Avenue, 40, Ukraine,
koro1oyv@i.ua

М.І. Ogurtsov, Researcher Associate, V.M. Glushkov Institute of Cybernetics of
the NAS of Ukraine, 03187, Kyiv, Glushkov Avenue, 40, Ukraine,
maksymogurtsov@gmail.com

А.І. Kochubinsky, Ph.D. (Physics and Math.), Senior Research Associate,
V.M. Glushkov Institute of Cybernetics of the NAS of Ukraine,
03187, Kyiv, Glushkov Avenue, 40, Ukraine,
ks0610@ukr.net

IDENTIFICATION OF TECHNICAL OBJECTS IN THE SPECIAL NETWORKS ACCORDING TO THE PRINCIPLE OF “FRIEND OR FOE”

Introduction. In recent years, military conflicts are moving to a fundamentally new level of development, which is associated with the widespread use of geographically distributed large groups of remotely controlled robotic systems, the rapid growth of information volumes, a significant increase in the speed of its processing, instant messaging to increase situational awareness, management, rapid response, etc.

Purpose. The article is devoted to solving an urgent scientific problem — the development of an algorithm for state identification of military objects and personnel. The problems of using modern cryptographic algorithms for state identification, which use data obtained by other stations of the air defense system and radio intelligence, combined in a special network, are considered.

Results. A new encryption key exchange protocol and a rationale for choosing a cryptographic algorithm that can be used in real-time systems with low computational performance are proposed. To ensure the stability of the use of electronic warfare tools, it is proposed to use software-defined radio stations based on programmable logic matrices as a hardware basis, since they allow changing the type of signal-code structures, which also applies frequency ranges without replacing radio engineering blocks.

Conclusions. With the increase in the number of remotely controlled military equipment objects on the battlefield, the problem of positioning military personnel and equipping them with network communication means requires a review of the methods and algorithms used for state recognition. The paper proposes a new algorithm for state identification of objects and identification of military personnel using symmetric cryptographic algorithms and the use of a secure Protocol for exchanging information received from the network of the Armed Forces of Ukraine. This approach can potentially increase the performance and quality of the identification system.

Download full text! (In Ukrainian)

Keywords: remote identification of objects, special networks, identification “friend or foe”, cryptography.

  1. Kamaltinov G. G., Kukobko S. V., Malyarenko O. S., Kisel P. I., 2016. “Identification of objects on the battlefi eld. International experience analysis”, Weapons and military equipment, 4, pp. 22-26. DOI: 10.34169/2414-0651.2016.4(12).22-26. (In Ukrainian).
    https://doi.org/10.34169/2414-0651.2016.4(12).22-26
  2. DSTU 4550: 2006. System of state recognition of objects. Radar recognition. Terms and definitions. [Effective from 2007-08-01]. Kind. of its. Derzhspozhyvstandart Ukraine, Kyiv, 2007, pp. 21. (In Ukrainian).
  3. Kanashchenkov A. I., Merkulov V. I., 2006. Radar systems of multifunctional air-craft, Radio engineering, Moscow, 656 p. [online] Available at: <https://libeldoc.bsuir.by/bitstream/123456789/13383/2/Ermak_2017.pdf>. (In Russian).
  4. Ermak S. N., Kasanin S. N., Khozhevets O. A., 2017. Device and operation of ground means of the system of state identification, textbook, BGUIR, Minsk, 230 p. [online] Available at: <https://libeldoc.bsuir.by/bitstream/123456789/13383/2/Ermak_2017.pdf>. (In Russian).
  5. STANAG 4193. Technical Characteristics Of The IFF Mk XIIA System. NATO, 2016, pp. 45.
  6. Korolyov V. Yu., 2019. “Routing for a swam cruise rockets of multiple use”, Control Systems and Computers, 2, pp. 16-24. DOI: 10.15407/usim.2019.02.016. (In Ukrainian).
    https://doi.org/10.15407/usim.2019.02.016
  7. Korolyov V. Yu., Ogurtsov M. I., 2017. “Transport and communication problem for groups of drones”, Mathematical machines and systems, 1, pp. 82–89. [online] Available at: <http://dspace.nbuv.gov.ua/bitstream/handle/123456789/117508/07-Korolev.pdf?sequence=1>. (In Ukrainian).
  8. Korolyov V. Yu., Polinovsky V. V., Ogurtsov M. I., 2017. “Modeling of communication networks of mobile remotely controlled systems based on HLA”, Herald of Khmelnytskyi National University, 1 (245), pp. 160–165. [online] Available at: <https://icyb180.org.ua/wp-content/uploads/2017/07/modelyuvannya-merezh-zvyazku-ruhomih-distantsiyno-kerovanih-sistem-na-bazi-hla.pdf>. (In Ukrainian).
  9. Korolyov V. Yu., Khodzinsky O. M., 2018. “Topological-combinatorial model of network construction for vehicles”, Computer mathematics, 1, pp. 61–67. [online] Available at: <http://dspace.nbuv.gov.ua/bitstream/handle/123456789/161850/08-Korolev.pdf?sequence=1>. (In Ukrainian).
  10. RRudinskas D., Goraj Z., Stankunas J., 2009. “Security Analysis of UAV Radio Communication System”, Aviation, 13 (4), pp. 116-121. [online] Available at: <https://www.tandfonline.com/doi/pdf/10.3846/1648-7788.2009.13.116-121>.
    https://doi.org/10.3846/1648-7788.2009.13.116-121
  11. Gupta R., Kumari A., Tanwar S., Kumar N., 2021. “Blockchain-Envisioned Soft-warized Multi-Swarming UAVs to Tackle COVID-I9 Situations”, IEEE Network, 35 (2), pp. 160-167.
    https://doi.org/10.1109/MNET.011.2000439
  12. Ogurtsov M. I., 2019. “Development of a protocol for secure data exchange for special networks”, Mathematical and computer modeling, Series “Technical Sciences”, Proceed-ings, Kamyanets-Podilsky National University named after Ivan Ogienko, 19, pp. 108-113. (In Ukrainian).
    https://doi.org/10.32626/2308-5916.2019-19.108-113
  13. Alia M. A., Tamimi A. A., Al-Allaf O. N., 2014. “Cryptography-based authentication methods”, Proceedings of the World Congress on Engineering and Computer Science, 3 January 2014.
  14. Ogurtsov M. I., Korolyov V. Yu., 2020. “Cryptographic algorithm of state recognition of objects”, Creation and modernization of armaments and military equipment in modern conditions, Proceedings of the XX scientific and technical conf., 3–4 Sept. 2020, DNDI VS OVT, Chernihiv, pp. 186–187. (In Ukrainian).
  15. Zabolotsky V. “Digital measurement of the Armed Forces. Under what conditions is this possible?”, Defense Industrial Courier. [online] Available at: <http://opk.com.ua/digital-dimension-of-the-support-of-the-conditions-this-possible/> (Last accessed: 13.10.2020). (In Ukrainian).
  16. Korolyov V. Yu., Ogurtsov M. I., Khodzinsky O. M., 2020. “Multilevel Identifi-cation Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptograph-ic Algorithms for Information Security”, Cybernetics and computer technologies, 3, pp. 74-84. (In Ukrainian).
    https://doi.org/10.34229/2707-451X.20.3.7
  17. Copyright and related rights. State Intellectual Property Service. Official Bulletin № 36. 2015. pp. 35–36. [online] Available at: <https://me.gov.ua/Files/GetFile?lang=uk-UA&fileId=792a0cdf-d138-4256-911e-7e3dec55f78d>. (Last accessed: 06.01.2021). (In Ukrainian).

Received 18.05.2021