PRINCIPLES OF CONSTRUCTION OF SECURE CHANNELS FOR TRANSMISSION OF CONFIDENTIAL INFORMATION IN A DYNAMIC ENVIRONMENT

DOI: 10.31673/2409-7292.2025.031342

Authors

  • І. І. Пархоменко, (Parkhomenko I.I.) Taras Shevchenko National University of Kyiv

DOI:

https://doi.org/10.31673/2409-7292.2025.031342

Abstract

Modern systems for transmitting confidential information in the conditions of an increasing number of cyberattacks and
failures in the functioning of the infrastructure require new principles for building secure channels. The need for dynamic, stable
and adaptive management of data transmissions is especially relevant in the context of the development of critical information
infrastructure, distributed networks and mobile communications. This article proposes a concept for building secure channels,
adapted with an emphasis on adaptability, optimality, stability and distribution of control systems. To formalize the principles
of building secure channels, systems analysis and the analytical-synthetic method were used. The approaches were transformed
with subsequent modeling of adaptive channel management processes operating in a changing environment. Functional
components include network status monitoring, adaptive resource management, automatic response to threats, and a hierarchical
decision-making structure.
Keywords: information protection, cybersecurity, threats, decision-making, confidentiality, integrity.

References
1. Goodin D. The sorry state of TLS security: Most servers are vulnerable [Електронний ресурс] // Ars Technica,
2017. Режим доступу: https://arstechnica.com/information-technology/2017/10/the-sorry-state-of-tls-security-mostservers-are-vulnerable/
2. Krawczyk H., Eronen P. HMAC-based Extract-and-Expand Key Derivation Function (HKDF) [Електронний
ресурс] // RFC 5869. 2010. Режим доступу: https://datatracker.ietf.org/doc/html/rfc5869.
3. Akyildiz I. F., Su W., Sankarasubramaniam Y., Cayirci E. Wireless sensor networks: a survey // Computer
Networks. 2002. Vol. 38, no. 4. P. 393-422. DOI: https://doi.org/10.1016/S1389-1286(01)00302-4.
4. Hu Y.-C., Perrig A., Johnson D. B. Ariadne: A secure on-demand routing protocol for ad hoc networks //
Wireless Networks. 2005. Vol. 11. P. 21-38. DOI: https://doi.org/10.1007/s11276-004-0636-4.
5. Wang Y., Zhang Q., Li M., Sun Y. Survey on Security in Emerging Wireless Sensor Networks // Frontiers of
Computer Science. 2019. Vol. 13, no. 3. P. 419-438. DOI: https://doi.org/10.1007/s11704-017-6242-z.
6. Kreutz D., Ramos F. M. V., Verissimo P. E., Rothenberg C. E., Azodolmolky S., Uhlig S. Software-defined
networking: A comprehensive survey // Proceedings of the IEEE. 2015. Vol. 103, no. 1. P. 14-76. DOI:
https://doi.org/10.1109/JPROC.2014.2371999.
7. Mijumbi R., Serrat J., Gorricho J. L., Bouten N., De Turck F., Boutaba R. Network Function Virtualization:
State-of-the-art and research challenges // IEEE Communications Surveys & Tutorials. 2016. Vol. 18, no. 1. P. 236-262.
DOI: https://doi.org/10.1109/COMST.2015.2477041
8. Yazici A., Aydin M. A., Akinci M. A survey on security and privacy issues in SDN-based networks // Computer
Networks. 2020. Vol. 166. 106980. DOI: https://doi.org/10.1016/j.comnet.2019.106980.
9. Alshamrani A., Myneni S., Chowdhary A., Huang D. A survey on advanced persistent threats: Techniques,
solutions, challenges, and research opportunities // IEEE Communications Surveys & Tutorials. 2020. Vol. 21, no. 2. P.
1851-1877. DOI: https://doi.org/10.1109/COMST.2019.2957221.
10.Vinayakumar R., Soman K. P., Poornachandran P. Applying deep learning approaches for network traffic
classification and intrusion detection // Procedia Computer Science. 2019. Vol. 132. P. 20-27. DOI:
https://doi.org/10.1016/j.procs.2018.05.135.
11.Лаптев О.А., Собчук В.В., Саланди И.П., Сачук Ю.В. Математична модель структури інформаційної
сеті на основі нестационарної іерархічної та стаціонарної гиперсети. Збірник наукових праць Військового
інституту Київського національного університету імені Тараса Шевченка. К.: ВІКНУ, Вип. 64, 2019. С. 124-132.
12.Lubov Berkman, Oleg Barabash, Olga Tkachenko , Andri Musienko, Oleksand Laptiev, Ivanna Salanda. The
Intelligent Control System for infocommunication networks. International Journal of Emerging Trends in Engineering
Research (IJETER) Volume 8. No. 5, May 2020. Scopus Indexed - ISSN 2347 – 3983. P.1920-1925.
13.Звіт ETSI Security Aspects of Channel Coding in 6G Systems (TR 103 756 V1.1.1). 2024.
14.Serhii Yevseiev, Khazail Rzayev, Oleksandr Laptiev, Ruslan Hasanov, Oleksandr Milov, Bahar Asgarova, Jale
Camalova, Serhii Pohasii. Development of a hardware cryptosystem based on a random number generator with two types
of entropy sources. Eastern-European journal of enterprise technologies. Vol.5 №9 (119). 2022 Р. 6-16. ISSN (print) 1729-
3774. ISSN (on-line) 1729-4061. DOI: https://doi.org/10.15587/1729-4061.2022.265774.

Published

2025-10-26

Issue

Section

Articles