Ensuring cyber security and high data transmission speed in wireless networks
DOI:
https://doi.org/10.18372/2225-5036.30.20357Keywords:
protection, efficiency, adaptive modulation, buffering, video stream, wireless data transmission, single-stream video content, wireless networks, Bluetooth, security, performance, optimization, productivity, interrelationAbstract
The paper investigates the problem of ensuring a balance between information security and data transmission performance in wireless communications, in particular in the context of Bluetooth technology. The relevance of the topic is due to the growing demands on the speed and reliability of video stream transmission, which is becoming critically important in the context of the
development of modern information and communication systems. The article analyzes the technical features of Bluetooth, in particular the IEEE 802.15.1 standard, which provides energy-efficient data transmission over short distances. The relevance of the
topic is due to the growing demands on the speed and reliability of video streaming, which is becoming critical in the development of modern information and communication systems. The article analyzes the technical features of Bluetooth, in particular the IEEE
802.15.1 standard, which provides energy-efficient data transmission over short distances. The main characteristics of Bluetooth are
considered, including the star network topology, frequency range, modulation methods and signal power that affect data transmission performance. Particular attention is paid to adaptive modulation and buffering methods that improve transmission quality in conditions of radio frequency interference and obstacles. Data protection mechanisms that can be integrated into wireless networks are also analyzed to prevent security threats such as unauthorized access and data interception. The proposed solutions take into account the features of Bluetooth Low Energy (BLE), which makes them particularly effective for IoT applications. The conclusions of the paper emphasize the importance of an integrated approach to resource management in wireless communications, which allows for stable, secure, and productive operation of information systems, in particular in an ever-changing threat environment.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.