Peculiarities of Cryptographic Model of the System of Wireless Remote Control

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The purpose of the research is to develop a cryptographic model of protection from unsanctioned influence on the process of remote control of an object through wireless exposed channels of communication. In order to achieve this goal, we developed a hybrid probabilistic model of cryptographic transformations of codes of controls, transferred through exposed channels from one or several control units. The developed cryptographic models of such distributed systems will ensure solution of the following tasks: firstly, encryption of the same code of control action is changed unpredictably in each following session of communication; secondly, the procedure of authentication of incoming cryptograms is conducted instantaneously – before the stage of decryption of the cryptogram. The first task is solved by application of a hybrid probabilistic model of cryptographical transformations, second – by means of using a specially developed structure of cryptogram that allows applying direct analysis of several one-bite requisites of cryptogram to obtain correct data on authenticity of the author of cryptogram.

Cite

CITATION STYLE

APA

Vorobyev, G. A., Kozlov, V. A., & Ryndiuk, V. A. (2019). Peculiarities of Cryptographic Model of the System of Wireless Remote Control. In Advances in Intelligent Systems and Computing (Vol. 726, pp. 684–692). Springer Verlag. https://doi.org/10.1007/978-3-319-90835-9_79

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free