THE MAIN THREATS TO INFORMATION DURING RADIO TRANSMISSION AND METHODS OF ITS PROTECTION
DOI: 10.31673/2409-7292.2025.015925
DOI:
https://doi.org/10.31673/2409-7292.2025.015925Abstract
Due to the rapid development and spread of remote-control systems that use a radio channel to transmit commands, the
issue of ensuring reliable protection of transmitted data is becoming more urgent. Such systems are actively used in many
industries, in particular, in automated access control systems, home automation, industry, medicine and in the concept of the
Internet of Things. The popularity of radio channel systems is explained by the low cost of implementation, ease of
configuration, and the absence of the need to lay cable lines, which significantly simplifies their operation and reduces the initial
costs of installing equipment. However, the use of an open radio channel creates serious risks to information security due to the
availability of the air for interception and interference by third parties. The most relevant are threats to information
confidentiality (listening and interception of transmitted commands), threats to authenticity (replay attacks that allow you to
imitate commands from legitimate transmitters) and threats to data integrity (intentional or accidental distortion of messages in
the transmission channel). The implementation of protection is complicated by the limited technical characteristics of remotecontrol devices with small computing resources and energy constraints. The paper analyzes the above threats and proposes a set
of effective methods for protecting information. It is recommended to use hybrid cryptographic schemes that combine symmetric
and asymmetric crypto algorithms with the formation of unique session keys to ensure the confidentiality of data transmission.
To protect authenticity, it is proposed to use time stamps and one-time pseudo-random identifiers, which significantly reduces
the likelihood of successful implementation of replay attacks. To ensure the integrity of information, it is recommended to use
noise-resistant coding, in particular, the Reed-Solomon code, which allows not only to detect, but also to effectively correct
errors that arise as a result of external influences or intentional interference in the operation of the radio channel.
Keywords: remote control, radio channel, encryption, authentication, replay, noise-resistant coding.
References
1. Investigating Radio Frequency Vulnerabilities in the Internet of Things (IoT) / E. Anthi et al. IoT. 2024. Vol.
5, no. 2. P. 356—380. URL: https://doi.org/10.3390/iot5020018 (date of access: 08.11.2024).
2. Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel / A. Stefankiv
et al. Cybersecurity Providing in Information and Telecommunication Systems 2024. 2024. Vol. 3654, no. 1. P. 98–110.
3. Pichamuthu R., Sathishkumar A., Khadirkumar N. An Enhanced Deep Learning Approach for Preventing
Replay Attacks in Wireless Sensor Network. Solid State Technology. 2020. Vol. 63, no. 4. P. 8010—8023
4. RFC 8017. PKCS #1: RSA Cryptography Specifications Version 2.2. Replaces RFC 3447 ; effective from
2016-11-01. Official edition. Fremont, CA : IETF, 2016. 78 p. URL: https://datatracker.ietf.org/doc/html/rfc8017.
5. Pointcheval D. How to encrypt properly with RSA. RSA Laboratories CryptoBytes. 2002. Vol. 5, no. 1. P. 9—
19.
6. Elgamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions
on Information Theory. 1985. Vol. 31, no. 4. P. 469—472. URL: https://doi.org/10.1109/tit.1985.1057074 (date of access:
08.11.2024).
7. Rivest R. L., Shamir A., Adleman L. A method for obtaining digital signatures and public-key cryptosystems.
Communications of the ACM. 1978. Vol. 21, no. 2. P. 120—126. URL: https://doi.org/10.1145/359340.359342 (date of
access: 08.11.2024).
8. FIPS 197. Advanced Encryption Standard (AES). Replaces FIPS 197 (11/26/2001) ; effective from 2023-05-
09. Official edition. Gaithersburg, MA : NIST, 2023. 46 p. URL: https://doi.org/10.6028/NIST.FIPS.197-upd1.
9. FIPS 46-3. Data Encryption Standard (DES). Replaces FIPS 46-2 ; effective from 1999-10-25. Official edition.
Gathiersburg, MA : NIST, 1999. 27 p.
10. Schneier B. The Blowfish Encryption Algorithm. Dr. Dobb’s Journal. 1994. Vol. 19, no. 4. P. 38—40.
11. Twofish: A 128-Bit Block Cipher / B. Schneier et al. Schneier on Security. URL:
https://www.schneier.com/wp-content/uploads/2016/02/paper-twofish-paper.pdf (date of access: 08.11.2024).
12. Massey J. L., Lai X. A Proposal for a New Block Encryption Standard. Advances in Cryptology —
EUROCRYPT '90. Lecture Notes in Computer Science. 1991. Vol. 473, no. 1. P. 389—404.
13. GnuPG. GnuPG. Version 2.5.1. 2024. URL: https://gnupg.org/index.html (date of access: 08.11.2024).
14. dm-crypt — The Linux Kernel documentation. The Linux Kernel documentation — The Linux Kernel
documentation. URL: https://docs.kernel.org/admin-guide/device-mapper/dm-crypt.html (date of access: 08.11.2024).
15. BitLocker overview. Microsoft Learn: Build skills that open doors in your career. URL:
https://learn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/ (date of access:
08.11.2024).
16. IDRIX. VeraCrypt. Version 1.26.15. Paris: IDRIX, 2024. URL: https://veracrypt.fr (date of access:
08.11.2024).
17. Гарасимчук О. І., Максимович В. М. Генератори псевдовипадкових чисел, їх застосування,
класифікація, основні методи побудови і оцінка якості. Ukrainian Information Security Research Journal. 2003. Т. 5,
№ 3(16). URL: https://doi.org/10.18372/2410-7840.5.4270 (дата звернення: 08.11.2024).
18. Хомік М., Гарасимчук О. АНАЛІЗ ЗАГРОЗ ДЛЯ ГЕНЕРАТОРІВ ПСЕВДОВИПАДКОВИХ ЧИСЕЛ І
ПСЕВДОВИПАДКОВИХ ПОСЛІДОВНОСТЕЙ ТА ЗАХОДИ ЗАХИСТУ. Ukrainian Information Security Research
Journal. 2023. Т. 25, № 4. С. 172—184. URL: https://doi.org/10.18372/2410-7840.25.18222 (дата звернення:
08.11.2024).
19. Івашко А. В. Теорія інформації та кодування в прикладах і задачах : навч. посібник / А. В. Івашко, В.
А. Крилова ; Нац. техн. ун-т "Харків. політехн. ін-т". – Харків : НТУ "ХПІ", 2022. – 317 с.
20. Kuila B. Design and Implementation of RS (255, 223) Detecting Code in FPGA. International Journal of
Computer Applications. 2015. Vol. 123, no. 9. P. 33-39. URL: https://discovery.researcher.life/
download/article/ecde86c509123e8ba804da34f30903f0/full-text (date of access: 08.11.2024).
21. Czynszak S. Decoding algorithms of Reed-Solomon code: магістерська робота. Karlskrona, 2011. 125 p.
URL: https://www.diva-portal.org/smash/get/diva2:833161/FULLTEXT01.pdf (date of access: 08.11.2024).
22. Chien R. Cyclic decoding procedures for Bose- Chaudhuri-Hocquenghem codes. IEEE Transactions on
Information Theory. 1964. Vol. 10, no. 4. P. 357–363. URL: https://doi.org/10.1109/tit.1964.1053699 (date of access:
08.11.2024).
23. Forney G. On decoding BCH codes. IEEE Transactions on Information Theory. 1965. Vol. 11, no. 4. P. 549–
557. URL: https://doi.org/10.1109/tit.1965.1053825 (date of access: 08.11.2024).