Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал: http://biblio.umsf.dp.ua/jspui/handle/123456789/4707
Повний запис метаданих
Поле DCЗначенняМова
dc.contributor.authorStelyuk, B. B.-
dc.contributor.authorTkhorzhevskyi, D. O.-
dc.contributor.authorKhalipova, N. V.-
dc.date.accessioned2022-04-01T08:29:21Z-
dc.date.available2022-04-01T08:29:21Z-
dc.date.issued2022-04-01-
dc.identifier.citationStelyuk B. B. Models and methods of improving the efficiency of wireless access of telecommunication systems and networks / B. B. Stelyuk, D. O. Tkhorzhevskyi, N. V. Khalipova // Системи та технології. - 2021. - № 1. - С. 30-43uk_UA
dc.identifier.issn2521-6643-
dc.identifier.urihttp://biblio.umsf.dp.ua/jspui/handle/123456789/4707-
dc.description.abstractThe peculiarities of construction of complex information and telecommunication systems of special purpose are researched in the work, the general and special requirements to the applied telecommunication technologies are substantiated on the example of the automated territorially distributed system of the uniform regional operative and dispatching centers. To take into account certain properties of the generated authorization keys, a comprehensive model of authorization and authentication of wireless access is proposed for the security assessment of telecommunication systems and networks. The proposed territorial distribution systems of unified regional operational control centers for special purposes are based on the deployment of wireless telecommunication systems and must meet the basic requirements of users with high mobility. Consider the capabilities of these systems in terms of fulfilling special requirements for ensuring the security of national information resources, personal data, information with limited access and the security of communication protocols, etc. An analysis is carried out in the specification of IEEE 802.16 series standards on the use of various cryptographic protection mechanisms designed to provide various security services and security in wireless telecommunication networks, representing various attacks aimed at disrupting the operation of authentication and authorization protocols. The communication protocols used in the deployment and use of wireless telecommunication systems that provide an increased level of security, especially regarding the issues of unauthorized interception of transmitted data and unauthorized access to various telecommunication resources, and violations associated with false authentication of devices in relation to users of certain elements of telecommunication systems. Basic models of wireless telecommunication systems are proposed, which are deployed in accordance with the IEEE 802.16 specification and can be used to build various information systems for special purposes, including geographically distributed systems of unified regional operational control centers in Ukraine.uk_UA
dc.language.isoenuk_UA
dc.relation.ispartofseriesСистеми та технології;2021. - № 1-
dc.subjectauthorizationuk_UA
dc.subjectauthenticationuk_UA
dc.subjectinformation and telecommunication systemsuk_UA
dc.subjectwireless information networkuk_UA
dc.subjectбезпекаuk_UA
dc.subjectавторизаціяuk_UA
dc.subjectавтентифікаціяuk_UA
dc.subjectінформаційно- телекомунікаційні системиuk_UA
dc.subjectбезпроводова інформаційна мережаuk_UA
dc.titleModels and methods of improving the efficiency of wireless access of telecommunication systems and networksuk_UA
dc.typeArticleuk_UA
Розташовується у зібраннях:2021/1(61)

Файли цього матеріалу:
Файл Опис РозмірФормат 
3 Stelyuk B. B..pdfелектронне видання521,53 kBAdobe PDFПереглянути/Відкрити


Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.