Репозиторий Dspace

Models and methods of improving the efficiency of wireless access of telecommunication systems and networks

Показать сокращенную информацию

dc.contributor.author Stelyuk, B. B.
dc.contributor.author Tkhorzhevskyi, D. O.
dc.contributor.author Khalipova, N. V.
dc.date.accessioned 2022-04-01T08:29:21Z
dc.date.available 2022-04-01T08:29:21Z
dc.date.issued 2022-04-01
dc.identifier.citation Stelyuk B. B. Models and methods of improving the efficiency of wireless access of telecommunication systems and networks / B. B. Stelyuk, D. O. Tkhorzhevskyi, N. V. Khalipova // Системи та технології. - 2021. - № 1. - С. 30-43 uk_UA
dc.identifier.issn 2521-6643
dc.identifier.uri http://biblio.umsf.dp.ua/jspui/handle/123456789/4707
dc.description.abstract The peculiarities of construction of complex information and telecommunication systems of special purpose are researched in the work, the general and special requirements to the applied telecommunication technologies are substantiated on the example of the automated territorially distributed system of the uniform regional operative and dispatching centers. To take into account certain properties of the generated authorization keys, a comprehensive model of authorization and authentication of wireless access is proposed for the security assessment of telecommunication systems and networks. The proposed territorial distribution systems of unified regional operational control centers for special purposes are based on the deployment of wireless telecommunication systems and must meet the basic requirements of users with high mobility. Consider the capabilities of these systems in terms of fulfilling special requirements for ensuring the security of national information resources, personal data, information with limited access and the security of communication protocols, etc. An analysis is carried out in the specification of IEEE 802.16 series standards on the use of various cryptographic protection mechanisms designed to provide various security services and security in wireless telecommunication networks, representing various attacks aimed at disrupting the operation of authentication and authorization protocols. The communication protocols used in the deployment and use of wireless telecommunication systems that provide an increased level of security, especially regarding the issues of unauthorized interception of transmitted data and unauthorized access to various telecommunication resources, and violations associated with false authentication of devices in relation to users of certain elements of telecommunication systems. Basic models of wireless telecommunication systems are proposed, which are deployed in accordance with the IEEE 802.16 specification and can be used to build various information systems for special purposes, including geographically distributed systems of unified regional operational control centers in Ukraine. uk_UA
dc.language.iso en uk_UA
dc.relation.ispartofseries Системи та технології;2021. - № 1
dc.subject authorization uk_UA
dc.subject authentication uk_UA
dc.subject information and telecommunication systems uk_UA
dc.subject wireless information network uk_UA
dc.subject безпека uk_UA
dc.subject авторизація uk_UA
dc.subject автентифікація uk_UA
dc.subject інформаційно- телекомунікаційні системи uk_UA
dc.subject безпроводова інформаційна мережа uk_UA
dc.title Models and methods of improving the efficiency of wireless access of telecommunication systems and networks uk_UA
dc.type Article uk_UA


Файлы в этом документе

Данный элемент включен в следующие коллекции

  • 2021/1(61)
    правонаступник наукового збірника "Вісник Академії митної служби України. Серія: "Технічні науки"

Показать сокращенную информацию

Поиск в DSpace


Расширенный поиск

Просмотр

Моя учетная запись