Abstract

Introduction. A rapid increase in the number of objects that simultaneously take part in combat operations in the air requires improvement of systems for recognizing military objects both in terms of qualitative and quantitative indicators. This requires the development of appropriate algorithms for identifying new-generation "friend-foe" objects. Such algorithms can be based on various methods of information security, in particular symmetric and asymmetric cryptographic algorithms and other methods of cryptography. The purpose of the article is to survey modern systems of state recognition of objects (SSRO), identify their shortcomings and provide recommendations for their elimination. Results. The requirements for SSRO as a system for processing, transmitting, securing information and identifying objects based on cryptography and computer security methods are defined. Common and distinctive features for civil and military identification systems are highlighted. The advantages and disadvantages of the existing SSRO are shown. Recommendations are formulated to address the shortcomings of the existing SSRO. An example of a stand and a hardware and software basis for studying SSRO algorithms with backup channels is given. Conclusions. Eliminating the shortcomings of the SSRO and improving the level of its reliability will require the implementation of the following organizational and technical measures. 1. Replacing the current state recognition system with a more modern one, which will support more modern cryptographic algorithms and a larger number of recognition objects. Adding support for radio tag recognition (RF tags). 2. Support for recognition lines in various directions, including "ground – UAV", "plane – tank", "plane – UAV" and others. Adding support for the NATO standard – STANAG 4579, adopted in 2001, and others. 3. Using of broad-spectrum signals to reduce the probability of detection and interception, as well as a number of signal-code structures and a working frequency grid. Keywords: Friend-or-Foe, object identification, cryptography, backup channels.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call