Preventions of information leaking in the wireless networks
DOI:
https://doi.org/10.18372/2225-5036.20.6568Keywords:
wireless networks, covering zone, model of propagation of radiowaves, basic station, terminal, availability of information, integrity of information, interception of information, leaking of informationAbstract
In this paper the methodology of prognostication of covering zones for wireless networks was offered, that will be realized in two stages: calculation of middle radius of covering zone and his further clarification by geometrical methods on the separate directions on that are the substantial areas of locality. Underestimation of this factor can be an occasion of absence of receiving signal which to lead to interruption of integrity of information, or can be an occasion of propagation of radiowaves beyond of destination area what create a precondition of leaking or physical interception of information. Obtained results will allow to promote the level of informative integrity, availability and safety of wireless networks due to a removal of propagation of radiowaves out of setting. It will promote reduction of probability of leaking and physical interception of information as well as provision of necessary level of availability and integrity of information.References
Gabrousenko Ye., Zadorozhny R., Stashenko I., Bilous N. Determine the distance stable connection for unmanned aerial vehicle under the influence of city conditions / Electronics and control systems. — Kyiv: NAU, 2013 —№ 1 (35). — P. 122-126.
Габрусенко Є., Павлов В., Захаров Д., Меньша А. Мінімізація розбіжності зон досяжності у напрямах база-термінал та термінал-база систем стільникового зв’язку. Защита информации: сб. науч. тр. — К.: НАУ, 2008. — С. 25-31.
Рекомендації Міжнародного союзу електрозв’язку ITU-R 452-14 (10/2009). — Женева: Сектор радіозв’язку МСЕ, 2009. — С. 4-15.
Рекомендації Міжнародного союзу електрозв’язку ITU — R 368-9 (02/2007). — Женева: Сектор радіозв’язку МСЕ, 2007. — С. 3-54.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.