Abstract

Wireless networks are used to transmit data in cyberphysical systems. This creates an opportunity for attackers to intercept information and then decrypt it and use it for malicious purposes. Consequently, the need to increase the protection of transmitted data in cyberphysical systems increases. This is made possible by new approaches to ensuring the cryptographic stability of the wireless security system. The purpose of ensuring the protection of data transmission in a cyberphysical system is to create a method of encryption that even when intercepting data by decryption was not possible. After sending the test sequence, the attacker hopes to obtain the key sequence that was used during the encryption as a result of decrypting this sequence (reverse operation the sum of module 2 to the encrypted sequence). Having a code sequence and intercepting the following blocks of information, their decryption will not be difficult. Using the coding method for cyberphysical system data before encryption allows you to change the statistical characteristics of the input sequence of elements (message length, data volume, entropy, probability of occurrence of characters). These are the statistical characteristics that an attacker needs to decrypt data. Using encryption before encryption does not allow you to select the input test sequence and obtain the key. The statistical characteristics of the input data and the data obtained as a result of encoding (compression) before encryption were determined; it is established that the use of the proposed method allows to obtain data that are statistically independent of each other in the input and coded sequence; it is shown that the method of protection of data transmission in the cyberphysical system is working and allows to protect data of different volumes.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.