Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: http://212.1.86.13:8080/xmlui/handle/123456789/4707
Название: Models and methods of improving the efficiency of wireless access of telecommunication systems and networks
Авторы: Stelyuk, B. B.
Tkhorzhevskyi, D. O.
Khalipova, N. V.
Ключевые слова: authorization
authentication
information and telecommunication systems
wireless information network
безпека
авторизація
автентифікація
інформаційно- телекомунікаційні системи
безпроводова інформаційна мережа
Дата публикации: 1-апр-2022
Библиографическое описание: Stelyuk B. B. Models and methods of improving the efficiency of wireless access of telecommunication systems and networks / B. B. Stelyuk, D. O. Tkhorzhevskyi, N. V. Khalipova // Системи та технології. - 2021. - № 1. - С. 30-43
Серия/номер: Системи та технології;2021. - № 1
Аннотация: The peculiarities of construction of complex information and telecommunication systems of special purpose are researched in the work, the general and special requirements to the applied telecommunication technologies are substantiated on the example of the automated territorially distributed system of the uniform regional operative and dispatching centers. To take into account certain properties of the generated authorization keys, a comprehensive model of authorization and authentication of wireless access is proposed for the security assessment of telecommunication systems and networks. The proposed territorial distribution systems of unified regional operational control centers for special purposes are based on the deployment of wireless telecommunication systems and must meet the basic requirements of users with high mobility. Consider the capabilities of these systems in terms of fulfilling special requirements for ensuring the security of national information resources, personal data, information with limited access and the security of communication protocols, etc. An analysis is carried out in the specification of IEEE 802.16 series standards on the use of various cryptographic protection mechanisms designed to provide various security services and security in wireless telecommunication networks, representing various attacks aimed at disrupting the operation of authentication and authorization protocols. The communication protocols used in the deployment and use of wireless telecommunication systems that provide an increased level of security, especially regarding the issues of unauthorized interception of transmitted data and unauthorized access to various telecommunication resources, and violations associated with false authentication of devices in relation to users of certain elements of telecommunication systems. Basic models of wireless telecommunication systems are proposed, which are deployed in accordance with the IEEE 802.16 specification and can be used to build various information systems for special purposes, including geographically distributed systems of unified regional operational control centers in Ukraine.
URI (Унифицированный идентификатор ресурса): http://biblio.umsf.dp.ua/jspui/handle/123456789/4707
ISSN: 2521-6643
Располагается в коллекциях:2021/1(61)

Файлы этого ресурса:
Файл Описание РазмерФормат 
3 Stelyuk B. B..pdfелектронне видання521,53 kBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.