Effective modes of operation of radio-bombing devices for covert information gathering in the field of noise interference
Keywords:passive radio embedded devices, masking radio noise, nonlinear noise spectrum transformation, information protection
The information security of modern society is in constant counteraction and constant improvement of technical means used for unauthorized information pickup, and technical means that prevent it. The paper analyzes examples of methods of applying noise interference to counteract the unauthorized pickup. The possibility of unauthorized pickup by passive radio devices using noise interferences is shown and analyzed using noise interferences, which are used to suppress the eavesdropping devices. The transfer of picked up information is possible both by radio wave and low-frequency channels using metal structures or water pipes. As a model of noise interference, a random narrow-band signal with a Gaussian distribution was used. The electrical model of the device was simulated by a transmission line with a high-frequency diode at its end. The idealized exponential dependence of the diode current on the voltage was used. The reflected wave spectra are obtained for different ratios of the transmission line resistance, the differential resistance of diode, and the external offset voltage at the diode. The modes and features of analog and digital information transmission by the radio tab device using energy of radio noises are analyzed. In the radio tab device, the information is transmitted by reflected wave, the spectrum of which is distorted at a nonlinear element placed at the end of transmission line. An analysis of the device operation was carried out along the full possible frequency range associated with the spectrum of the incident noise interference. The optimal elements parameters for the passive electrical circuit are calculated: the resistance of the transmission line, the differential resistance of the diode, the offset voltage, and the modulation mode, depending on the frequency range in which the leak is possible.
Энциклопедия промышленного шпионажа ; под общ. ред. Е.В. Куренкова. С.-Петербург : ООО «Изд-во Полигон», 1999. 515с.
Kalamkar S. S. and Banerjee A. Secure Communication via a Wireless Energy Harvesting Untrusted Relay // IEEE Transactions on Vehicular Technology. March 2017. Vol. 66, no. 3. P. 2199-2213,
Cao et K. al. Energy Harvesting Jammer Enabled Secure Communication for Cooperative NOMA Systems // 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020. P. 801-806
United States Patent 8665607 Bouza, et al. Anti-eavesdropping device. H05K 7/14; H05K 7/18, March 4, 2014
Емельянов С. и др. Проблемные аспекты реализации пространственного и линейного зашумления в системах активной защиты информации // Правове, нормативне та метрологічне забезпечення системи захисту інформації в Україні. Харків, 2001. Вип. 2. С. 62-67.
Петров А.А. Оценка эффективности систем активной защиты в сетях общего пользования // Системы обробки інформації. Харьков, 2011. №4(94). С.174-178.
Патент РФ № 2732486 Способ радиоподавления систем когнитивных систем радиосвязи. Бюл. № 26 17.09.20.
Крижановський В.Г., Сергієнко С.П., Чернов Д.В., Крижановський В.В. Підслуховування NFC-зв’язку на частотах вищих гармонік // Радіотехніка. 2021. Вып. 204. С. 99-104.
Serhiienko S., Krizhanovski V. Modeling of the potential threat of unauthorized removal of information by a passive radio tab in the rooms protected by noise field // The Fourth International Conference on Information and Telecommunication Technologies and Radio Electronic (UkrMiCo’2019) 09–13 September 2019 Odessa, Ukraine.
Нейман Р.Л., Демирчан К.С. Теоретические основы радиотехники. Т.1. Ленинград : Энергоиздат, 1981. 536с.
Баскаков С.И. Радиотехнические цепи и сигналы. Москва : Высш. шк., 1983. 536с.
How to Cite
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).