MODELS AND METHODS OF IMPROVING THE EFFICIENCY OF WIRELESS ACCESS OF TELECOMMUNICATION SYSTEMS AND NETWORKS

  • B. B. Stelyuk Graduate degree and rank: Associate Professor, PhD. tehn. Sciences Job: University of Customs and Finance, Dnipro Position: Professor of the Department of Cybersecurity and Information Technologies Country: Ukraine City: Dnipro Adress: 2/4 V. Vernadsky str., Dnipro, Ukraine, 49000 https://orcid.org/0000-0002-2692-088X
  • D. O. Tkhorzhevskyi Job: University of Customs and Finance, Dnipro Position: Teacher of Computer Science & Software Engineering Department Country: Ukraine City: Dnipro Adress: 2/4 V. Vernadsky str., Dnipro, Ukraine, 49000
  • N. V. Khalipova Graduate degree and rank: Associate Professor, PhD. tehn. Sciences, Job: University of Customs and Finance, Ukraine, Dnepropetrovsk, Position: Associate Professor of the Department of Transport Technologies and International Logistics Country: Ukraine City: Dnepropetrovsk, Adress: 2/4 Vernadskogo str., Dnipropetrovsk, Ukraine, 49000. https://orcid.org/0000-0001-5605-6781
Keywords: security; authorization; authentication; information and telecommunication systems; wireless information network.

Abstract

The peculiarities of construction of complex information and telecommunication systems of special purpose are researched in the work, the general and special requirements to the applied telecommunication technologies are substantiated on the example of the automated territorially distributed system of the uniform regional operative and dispatching centers. To take into account certain properties of the generated authorization keys, a comprehensive model of authorization and authentication of wireless access is proposed for the security assessment of telecommunication systems and networks. The proposed territorial distribution systems of unified regional operational control centers for special purposes are based on the deployment of wireless telecommunication systems and must meet the basic requirements of users with high mobility.

Consider the capabilities of these systems in terms of fulfilling special requirements for ensuring the security of national information resources, personal data, information with limited access and the security of communication protocols, etc. An analysis is carried out in the specification of IEEE 802.16 series standards on the use of various cryptographic protection mechanisms designed to provide various security services and security in wireless telecommunication networks, representing various attacks aimed at disrupting the operation of authentication and authorization protocols.

The communication protocols used in the deployment and use of wireless telecommunication systems that provide an increased level of security, especially regarding the issues of unauthorized interception of transmitted data and unauthorized access to various telecommunication resources, and violations associated with false authentication of devices in relation to users of certain elements of telecommunication systems.

Basic models of wireless telecommunication systems are proposed, which are deployed in accordance with the IEEE 802.16 specification and can be used to build various information systems for special purposes, including geographically distributed systems of unified regional operational control centers in Ukraine.

References

Law of Ukraine “On Telecommunications” of November 18, 2003. № 1280-IV.

The concept of telecommunications development in Ukraine, approved by the order of the Cabinet of Ministers of Ukraine of June 7, 2006. № 316-p.

Prokopovich-Tkachenko D. I. Research of protocols of authentication and authorization of access in wireless telecommunication systems and networks // Systems of armament and military equipment, 2013, № 1 (33). Р. 119–122.

Prokopovich-Tkachenko D. I. Mathematical model of authorization and authentication of wireless access in telecommunication systems and networks // Information processing systems. – Kharkiv: Kharkiv National University of the Air Force, 2013. – Edition 5 (112). – Р. 111–118.

Rashich A. V. WiMAX wireless access networks: textbook. St. Petersburg: Publishing House of Polytechnic University, 2011. – Р. 179.

Standard of wireless networks of city scale. – IEEE Std 802.16 ™. – 2009.

Adibi S., Agnew G. B., Tofigh T. End-to-End (E2E) Security Approach in WiMAX: Security Technical Overview for Corporate Multimedia Applications. Р. 747–758, Handbook of Research on Wireless Security (2 Volumes) Edited By: Yan Zhang, Jun Zheng, Miao Ma, 2008.

Adibi S., Lin B., Ho P.-H., Agnew G. B., Erfani S. Authentication Author-ization and Accounting (AAA) Schemes in WiMAX, University of Waterloo, Broadband Communication Research Centre (BBCR), appears in: Electro-information Technology, 2006 IEEE International Conference on 7–10. Р. 210–215, May 2006.

Airspan, “Mobile WiMAX security”, Airspan Networks Inc. 2007. [Online]. URL: http://www.airspan.com

Taeshik Shon and Wook Choi. An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions: Lecture Notes in Computer Science. Vol. 4658. Р. 88–97, Aug. 2007.

Standard for local and metropolitan area networks. IEEE Std 802.16m-2011.

Published
2021-11-09
How to Cite
Stelyuk, B. B., Tkhorzhevskyi, D. O., & Khalipova, N. V. (2021). MODELS AND METHODS OF IMPROVING THE EFFICIENCY OF WIRELESS ACCESS OF TELECOMMUNICATION SYSTEMS AND NETWORKS. Systems and Technologies, 61(1), 30-43. https://doi.org/10.32836/2521-6643-2021-1-61.3