Communication Technologies Security

Major: Information Security Systems and Automation of Information Processing
Code of subject: 7.125.02.O.001
Credits: 4.00
Department: Information Security
Lecturer: D.Sc., prof., Prof. Department of Information Protection Mykytyn Halyna Vasylivna
Semester: 1 семестр
Mode of study: денна
Learning outcomes: As a result of studying the discipline, the student must be able to demonstrate the following learning outcomes: 1. Know: the structure of the digital transmitting / receiving path of communication; basic mathematical models of communication channels; 2. Be able to explain the practical application of procedures for sampling and quantization of signals in their analog-to-digital conversion; 3. Know the content: encoding and encryption of signals; elements of pulse and continuous modulation; multiple access methods; 4. Have the content of conceptual approaches to the protection of speech information in the channels of fixed, satellite, cellular communication; 5. Be able to disclose the security methodology of wireless technologies: GSM, CDMA, WiMAX, LTE; 6. Know information security technologies in wireless touch technologies Wi-Fi, Bluetooth, ZigBee; 7. Know the content: frequency, time, frequency-time scrambling; encryption, masking; be able to explain the process of inversion of the spectrum of the speech signal and the process of conversion with fixed permutations of the spectral components of the speech signal during transmission and into the channel and recovery on the receiving side.
Required prior and related subjects: Previous disciplines: Information theory and coding; Digital signal processing. Related disciplines: Design of complex information security systems; Methods of digital signal and image processing.
Summary of the subject: Abstract of the discipline The discipline considers the elements of the transmitting / receiving path of the communication system. Aspects of analog signal conversion at the level of: sampling, quantization, source coding, encryption, channel coding, analog / pulse modulation, compression (multiple access) are analyzed. Conceptual approaches to ensuring the security of fixed, cellular and satellite technologies are considered. The methodology of speech information protection in wireless communication technologies is considered: GSM, CDMA, WiMAX, LTE. Aspects of security of wireless sensor technologies are presented: Wi-Fi, Bluetooth, ZigBee. The principles of modern technologies of information protection in the transmitting / receiving path of communication technologies are analyzed.
Assessment methods and criteria: Current control in the classroom is carried out in order to clarify the circumstances of the educational process, to determine its results in the following forms: • preliminary identification of students' level of knowledge before classes; • current verification in the process of mastering each topic studied; • assessment of student activity in the course of lectures; • assessment of student activity in the process of practical work; • checking the performance of practical work; • checking the performance of control work; • oral examination of the acquisition of knowledge acquired in the process of practical work. The final (examination) control is carried out based on the results of answers to the examination ticket and oral examination.
Recommended books: Recommended Books Basic 1. The doctrine of information security of Ukraine. Decree of the President of Ukraine of 08.07.2009 № 514/2009 // Official Gazette of Ukraine. - 2009. - № 52. - P. 7. - [Electronic resource]. - Access mode: http://zakon1.rada.gov.ua/cgi-bin/laws/main.cgi?nreg=514%2F2009 2. Draft Concept of Information Security of Ukraine. - [ Electronic resource]. - Access mode: http://mip.gov.ua/done_img/d/30-project_08_06_15.pdf. 3. Prokis J. Digital communication. Per. with English / Ed. DD Klovsky. - M .: Radio and communication, 2000. - 800 p. 4. Sklar Bernard. Digital communication. Theoretical foundations and practical application. - M .: Izd. William House. - 2003. - 1104 p. 5. Dudykevych VB, Conceptual models of information protection for technologies of stationary, cellular, satellite communication / VB Dudykevych, Yu. R. Garasym, GV Mykytyn // Bulletin of the National University "Lviv Polytechnic", Automation, measurement and control. - 2010. - 65665. - P. 18–26. 6. Information model of communication technology security. [V.B. Дудикевич, В.О. Хорошко, Г.В. Mykytyn, R.I. Banach, AI Rebets] // Informatics and mathematical methods in modeling. - 2014. - №2. - P. 137 - 149. 7. Mobile communication systems. Textbook / OO Semenova, AO Semenov, VS Belov. - Vinnytsia: VNTU, 2017. - 185 p. 8. Sokolov, V. Yu. Security of wireless and mobile networks: Textbook / V. Yu. Sokolov, VL Buryachok, MM Tajdini / ed. translation O. P. Reiter. - 2 ed., Ext. - К.: КУБГ, 2019. - 130 с. 9. Dudykevych VB Wireless sensor networks ZigBee, Wi-Fi and Bluetooth in cyberphysical systems: the concept of "object - threat - protection" based on the OSI model / VB Dudykevych, GV Mykytyn, A. I. Rebets, MV Melnyk // Information processing systems. - 2019. - issue 2 (157). - P. 114 - 120. 10. Bobalo Yu. Ya. Strategic security of the system “object - information technology”: [monograph] / [Bobalo Yu. Ya., Dudykevych VB, Mykytyn GV] .– Lviv: Lviv National University Publishing House Polytechnic University ”, 2020. - 260 p. Auxiliary: 1. Evaluation of the quality of speech recovery in secure wireless communication channels / [Kokhanovich GF, Bezhenar Yu. V., Golubnychy OG, Odarenko RS] // Scientific and practical journal "Information Security". - 2012. - № 1. - P. 37–41. 2. Modern telecommunications: networks, technologies, security, economy, regulation [Text]: monograph / SO Dovgy, PP Vorobienko, KD Gulyaev; for general ed. S. O. Long. - 2nd ed., Add. - К.: Азимут-Україна, 2013. - 60 3. Information security in the environment of wireless sensor networks: monograph / MB Alexander, SM Balaban, MP Karpinsky, SA Raiba, VM Chizh. - Ternopil: Ivan Pulyuy TNTU Publishing House, 2016. - 160 p. 4. Mikitin GV Communication environment of cyberphysical system "Wi-Fi - Bluetooth - Cloud computing - IoT": information security, information security management models. Dudykevych VB, Mykytyn GV, Rebets AI // Information processing systems. - 2016. - issue № 4 (141). - P. 83 - 85 5. Mikitin GV Complex security system of cyberphysical system "iPhone - Wi-Fi, Bluetooth - sensors" / VB Dudykevych, GV Mykytyn, AI Rebets // Information processing systems. - 2017. - № 2 (148). - P. 84–87.