<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Basis for Building Integrity Monitoring System of Critical Information in ALS Based on Broadcast Radio Channel</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Boris F. Bezrodnyi</string-name>
          <email>b.bezrodnyi@vniias.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cybersecurity Center NIIAS</institution>
          ,
          <addr-line>JSC Moscow</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>6</fpage>
      <lpage>10</lpage>
      <abstract>
        <p>-The transition to the use of a radio channel for critical information transfer in automatic locomotive signaling (ALS) systems complicates the safety of railway traffic, because in this case it becomes possible to implement computer attacks from the outside of the controlled area that can lead to traffic accidents. Integrity monitoring systems (IMS), ensuring that the received critical information is up-to-date and sent by a legitimate traffic participant, today exist only for ALS systems based on point-to-point data transfer method. That's why the task of constructing IMS for ALS based on broadcast radio channel is actual. The main problems that need to be solved during the building of IMS are considered in this article. The conditions that influence on the choice of security mechanisms in the IMS and the development of updating procedure for security parameters of the integrity monitoring system are determined. It is concluded that the construction of a unified IMS, the use of which would be possible for protection of any ALS based on a broadcast radio channel, seems to be a difficult task. Hence further research in this field should be related to the development of a technique for constructing integrity monitoring systems applicable in ALS based on broadcast radio channel.</p>
      </abstract>
      <kwd-group>
        <kwd>information security</kwd>
        <kwd>transport security</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>safety of railway traffic</kwd>
        <kwd>automatic train signalling</kwd>
        <kwd>automatic locomotive signaling system</kwd>
        <kwd>broadcast radio channel</kwd>
        <kwd>integrity monitoring system</kwd>
        <kwd>critical information</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>
        Automated control systems are widely used in the field of
railway transport to solve problems associated with the control
of the transportation process, including, among others, the tasks
of ensuring the safety of traffic and the exploitation of railway
transport [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. One of the control systems used to ensure traffic
safety at stations and hauls is the automatic locomotive signaling
system (ALS), a system for transmitting information about the
permissible speed and additional conditions for following the
railway rolling stock: permission for movement, speed limit, the
route of movement along the railway station to the on-board
locomotive devices1 [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ].
      </p>
      <p>The information transmitted by the ALS system in the field
of ensuring the safety of the railway transport is attributed to the</p>
      <p>DEFINITION OF TASKS REQUIRING SOLUTIONS</p>
      <p>DURING THE CONSTRUCTION OF IMS</p>
      <p>Let’s consider a railway section equipped with an ALS
system based on a broadcast radio channel (see Figure 1). The
station part of the system for transmission of sensitive
information to the radio channel must first obtain data about the
current train situation and the state of the field devices from the
systems of determining the free path and the location of the train
(SDFPLT), monitoring stations and distances. As a broadcast
transmission method is used, the station part sends a message to
the radio channel, intended for all traffic participants at the
1 GOST R 53431-2009. Railway automation and telemechanics. Terms and
definitions.
2 OST 32.17-92. Railway automation and telemechanics safety. Basic
concepts. Terms and Definitions.
section at once. At the same time, the radio communication
system used in ALS-BR should have a coverage area sufficient
for data transmission to any participant of the traffic, regardless
of its location at the section. The onboard parts of ALS-BR
installed on locomotives process the received messages and use
critical information to ensure the safety of the rolling stock
traffic. If two-way exchange between the station part and
onboard part of ALS-BR is required to ensure traffic safety at
the section, the on-board parts of the system in turn also send
messages with critical information, that are further processed by
the station part, to the radio channel. As the length of section
increases, the coverage of the station part of ALS-BR increases.
This means that the station part of the system should receive
information about the current train situation at additional
stations and hauls and transmit relevant critical information
throughout the section. If for some reason this is impossible, for
example, there is not enough coverage of the radio
communication system or the principle of system
decentralization is used, then additional station parts should be
installed at the section. Thus, ALS-BR at the section can have
several station parts. In this case, the station parts are unified and
have the same software and hardware. The onboard parts are also
unified.</p>
      <p>
        The violation of traffic safety and the occurrence of traffic
accidents at the considered railway section are possible through
the implementation of the following security threats of the
critical information [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]:



      </p>
      <p>Sending fake critical information to the radio channel;
Substitution of the base and/or subscriber station;
Resending of previously intercepted critical information
in the radio channel.</p>
      <p>In the course of the research protection mechanisms against
these threats were identified. When ALS-BR is used these
mechanisms should be implemented in the IMS for traffic safety.</p>
      <p>
        To protect against the first threat, each message of critical
information should contain verification information that
guarantees the authenticity of the transmitted data, that they
were not unauthorized modified during the transmission. The
digital signature (DS) or authentication codes (AC) can be used
as verification information [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]. To denote the sequence of
bits necessary for calculating and verifying DS and AC, within
the framework of the IMS, the term integrity monitoring
parameter of the critical information is used. At the time of
critical information exchange, the integrity monitoring
parameters must be located at the station and onboard parts of
the ALS-BR and used to calculate and verify the DS or AC. In
this case, confidentiality of the integrity monitoring parameters
necessary for computing the verification information must be
ensured. Thus, if the intruder does not know the integrity
monitoring parameters of critical information necessary to
calculate the DS or AC, then he will not be able to implement
the threat of sending fake information to the radio channel.
      </p>
      <p>To determine the possible mechanisms of protection against
the threat of substitution of radio stations, we’ll consider a
railway section equipped with an ALS-BR system, along which
the locomotive L1 is moving. Further during analyzing this
threat, for abbreviation, we’ll consider under the onboard part of
the ALS-BR system only the appropriate on-board equipment of
the locomotive L1. Let’s suppose that at the moment of time t0
the onboard part of the ALS-BR establishes a connection with
the station part of the system and the exchange of critical
information begins between them. At time t1, the locomotive L1
finishes the traffic on the considered section and the exchange
of the critical information between it and the station equipment
terminates. Then in order to neutralize the threat of sending fake
information at any time t(t0,t1], the integrity monitoring
parameters must be in the station part and onboard part of the
ALS-BR. We introduce the function f(t):[t0,t1]{0,1}, which
shows the presence of integrity monitoring parameters in the
station and onboard parts of ALS-BR as a function of time t.
f(t)=1, if the station and onboard parts of the ALS-BR have all
necessary integrity monitoring parameters to ensure safe
exchange of critical information, otherwise f(t)=0. Then, 
t(t0,t1] f(t)=1, f(t0)=1 or f(t0)=0. If the substitution of the radio
station occurs at time t, such that f(t)=1, then as a protection
mechanism, verification information (DS or AC) can be used to
ensure the integrity of application-level messages, including
critical information, as well as the authenticity of traffic
participants, because only legitimate traffic participants know
the parameters of integrity monitoring. Thus, if the intruder does
not know integrity monitoring parameters of critical
information, then the substitution of radio stations will not allow
him to impersonate a legitimate traffic participant, and as a
result, the implementation of this threat will not violate the
safety of traffic. If the substitution occurs at the time t such that
f(t)=0, which is possible only at the moment of establishing a
connection between the station and the onboard parts (t=t0), then
the authentication procedure of the traffic participants which
allows to determine the authenticity of participants and to
transmit to them authenticity of participants should be used as a
protection mechanism.</p>
      <p>Thus, it is enough to use DS and/or AC to protect against the
threat of radio stations substitution during the exchange of
critical information between parts of ALS-BR. To protect from
the threat of radio station substitution during establishing a
connection between ALS-BR parts, if they lack the integrity
monitoring parameters necessary for the safe exchange of
critical information, it is required to develop an authenticating
procedure for traffic participants, which ensures the safe
delivery of these parameters.</p>
      <p>
        Timestamps or the sequence number of application-level
messages containing critical information may be applied to
block the threat of resending previously intercepted critical
information [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ].
limiting the amount of information that can be transmitted
within the authentication procedure.
      </p>
      <p>
        Building IMS with the use of integrity monitoring
parameters leads to the need of solution of the problem of
managing these parameters [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. One of the key management
issues is the development of a procedure for updating parameters
[
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], within which it is necessary to determine the order of
performed actions, to select communication channels for data
transmission, and to ensure the security of delivery.
      </p>
      <p>Thus, as a result of the research, it was found that during
building a IMS, it is necessary to define a mechanism for
protection against the threat of sending fake information (DS or
AC), to develop an authentication procedure, to choose a
mechanism to protect against the threat of retransmission of
information, and to develop a procedure for updating integrity
monitoring parameters.</p>
      <p>III.</p>
      <p>CONDITIONS AFFECTING THE SELECTION OF
PROTECTION MECHANISMS IN THE IMS</p>
      <p>As a result of the analysis of sending false information threat
and possible protection mechanisms against it, the conditions
influencing the choice of DS and AC for the protection of station
and onboard messages, presented in Tables 1 and 2 respectively,
were determined. The parameter TrustedL{0,1} determines the
power of attorney of onboard parts of the ALS-BR; ISsec1/ILsec1 is
the maximum amount of information that can be contained in
the DS and/or AC to protect station/onboard messages; LDS is the
size of the DS for the selected cryptographic algorithm;
TSmsg/TLmsg is permissible time of calculation and verification of
DS and/or AC for protection of station/onboard messages; TDS is
the time of calculation and verification of the DS for the selected
cryptographic algorithm; UAL{0,1} is the urgency of
unauthorized access (UA) threat to the onboard side of the
ALSBR and the compromise of the integrity monitoring parameters
stored in it.</p>
      <p>The analysis of substitution of the base and/or subscriber
station threat allowed to formulate the task that should be solved
within the framework of the authentication procedure for the
traffic participants: it is necessary to ensure the safe delivery of
the integrity monitoring parameters to traffic participants while</p>
      <p>The task of safe delivery is to solve two subtasks:
 delivery of verification parameter for the station
messages PSIM from the station part of ALS-BR to the
onboard part;
 delivery of verification parameter for the onboard
messages PLIM to the station part of the ALS-BR or the
parameter for calculating the DS/AC PLIM to the onboard
part.</p>
      <p>The solution of the first subtask can become possible in two
ways. The first, the parameter PSIM (Figure 2a) is transmitted via
the radio channel. The second, information that will allow us to
calculate or determine PSIM at the onboard part of ALS-BR (see
Figure 2b) is transmitted via the radio channel. In Figure 2a,
[PSIM]PA means safe transfer of parameter PSIM to the onboard
part of the ALS-BR using authentication parameter PA.</p>
      <p>As a result of the analysis of possible solutions, the
conditions influencing their choice, presented in Table 3, were
determined. The parameter pSAC/pLAC{0,1} determines the
choice of the protection mechanism against the threat of sending
fake information for station/onboard messages; ISsec2/ILsec2 is the
maximum amount of information that can be transmitted within
the authentication from the station/onboard part of ALS-BR;
LSP/LLP/LLP is the size of the parameter PSIM/PLIM /PLIM;
Sync_upd{0,1} is the possibility of manual synchronous
updating of the IMS parameters at the station and onboard parts
of ALS-BR; Ext_chL{0,1} is the presence of a communication
channel with the onboard part of the ALSR, which allows to
perform the procedure of IMS parameters remote updating.
conditions that affect the choice of solution, presented in
resending threats, an inequality (1) that specifies the minimum
amount of information ITS/SEQ that must be contained in the
timestamp or in the message sequence number to protect against
the specified threat, and inequality (2) defining the minimum
allowed frequency time tag calculations fTS were obtained:

 /
≥ log2 (


≥</p>
      <p>,
∗  
) ,
(1)
(2)
where Kmsg is the number of messages transmitted via the
radiochannel during the exchange period Texc; TIM is the duration
of integrity monitoring parameter used to protect Kmsg messages.
At the same time, the value of parameter Kmsg depends on the
presence of mechanisms for determining the direction of
message transmission and the identification of the sender in the
ALS-BR. It was concluded that if the mechanism of time stamps
or message sequence numbers has already been implemented at
the application level of ALS-BR, then if inequalities (1) and (2)
are fulfilled for it, it can be used to protect critical information
within the IMS.</p>
      <p>In case of ready mechanism absence, the choice between time
stamps and message sequence numbers will be determined in
accordance with the conditions presented in Tables 5 and 6. The
parameter time_equip{0,1} determines the availability of
SEQ
TS
SEQ</p>
    </sec>
    <sec id="sec-2">
      <title>ISsec3≥</title>
    </sec>
    <sec id="sec-3">
      <title>ITSmin</title>
      <p>TS/ SEQ
SEQ</p>
      <p>ILзec3≥</p>
    </sec>
    <sec id="sec-4">
      <title>ITSmin</title>
      <p>
        TS/ SEQ
SEQ
additional equipment at the station and onboard parts of
ALSBR to determine the exact time; Isync is the amount of information
that
must
be transmitted
via
radio
channel
within
the
authentication procedure to synchronize the values of the
sequence numbers between the station and onboard parts of the
ALS-BR; ITSmin/ISEQmin is the minimum amount of information
that should be contained in the timestamp/message sequence
number within the IMS; ISsec3/ILsec3 is the maximum amount of
information that can be contained in the timestamp/sequence
number to protect station/onboard
messages; Tconn is the
admissible
time
for
connection
establishment
and the
transmission to the critical information transfer.
conditions of the system, the radio communication system used,
the software and hardware and the current normative base [
        <xref ref-type="bibr" rid="ref17 ref18">17,
18</xref>
        ]. A large number of conditions that affect the process of
constructing the IMS makes it possible to conclude that the
construction of a unified IMS, the use of which would be
possible to protect any ALS-BR, is a difficult task. In general, to
ensure traffic safety when ALS-BR is being used, a IMS which
considers its parameters and features should be built. Thereby
the purpose of further research on this topic should be the
development of methodology for constructing the IMS that are
applicable in ALS-BR, which would consider the properties and
features of ALS systems of this class.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Flammini</surname>
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Railway</surname>
            <given-names>Safety</given-names>
          </string-name>
          ,
          <source>Reliability and Security: Technologies and Systems Engineering. IGI Global</source>
          ,
          <year>2012</year>
          , 487 p.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Liudvinavičius</surname>
            <given-names>l.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sładkowski</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>New possibilities of railway traffic control systems</article-title>
          .
          <source>Transport Problems</source>
          ,
          <year>2016</year>
          , Vol.
          <volume>11</volume>
          ,
          <string-name>
            <surname>Iss</surname>
          </string-name>
          . 2, pp.
          <fpage>133</fpage>
          -
          <lpage>142</lpage>
          . DOI:
          <volume>10</volume>
          .20858/tp.
          <year>2016</year>
          .
          <volume>11</volume>
          .2.13.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Flammini</surname>
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Automatic</surname>
          </string-name>
          <article-title>Train Protection Systems</article-title>
          .
          <source>Ind Eng Manage</source>
          ,
          <year>2013</year>
          , Vol.
          <volume>2</volume>
          ,
          <issue>Iss</issue>
          . 5. DOI:
          <volume>10</volume>
          .4172/
          <fpage>2169</fpage>
          -
          <lpage>0316</lpage>
          .
          <fpage>1000120</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Theeg</surname>
            <given-names>G. Railway</given-names>
          </string-name>
          <string-name>
            <surname>Signalling</surname>
          </string-name>
          &amp; Interlocking: International Compendium. Eurailpress,
          <year>2009</year>
          . 448 p.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Tilk</surname>
            <given-names>I.G.</given-names>
          </string-name>
          <article-title>ALS s ispol'zovaniem radiokanala [ALS using radio channel]</article-title>
          .
          <source>Avtomatika Svyaz' Informatika [Automatics Communication Informatics]</source>
          ,
          <year>2010</year>
          , N 7, pp.
          <fpage>7</fpage>
          -
          <lpage>9</lpage>
          . (In Rus).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Bakurkin</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bezrodnyi</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korotin</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Protivodeystviye komp'yuternym atakam v sfere zheleznodorozhnogo transporta [Counteraction to computer attacks in the field of railway transport]</article-title>
          .
          <source>Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          ,
          <year>2016</year>
          , N
          <volume>4</volume>
          (
          <issue>17</issue>
          ). pp.
          <fpage>29</fpage>
          -
          <lpage>35</lpage>
          . DOI:
          <volume>10</volume>
          .21681/
          <fpage>2311</fpage>
          -3456-2016-4-
          <fpage>29</fpage>
          -35.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Konyavskiy</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Epishkina</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korotin</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>The design of integrity monitoring and reliability verification system for critical information, transmitted in automatic train signaling system, based on DMR-RUS radio channel</article-title>
          .
          <source>Procedia Computer Science</source>
          ,
          <year>2016</year>
          , Volume 88C, pp.
          <fpage>318</fpage>
          -
          <lpage>323</lpage>
          . DOI:
          <volume>10</volume>
          .1016/j.procs.
          <year>2016</year>
          .
          <volume>07</volume>
          .442.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Kostogryzov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Atakishchev</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stepanov</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nistratov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grigoriev</surname>
            <given-names>L</given-names>
          </string-name>
          .
          <article-title>Probabilistic modelling processes of mutual monitoring operators actions for transport systems</article-title>
          .
          <source>In: 2017 4th International Conference on Transportation Information and Safety (ICTIS)</source>
          .
          <volume>8</volume>
          -
          <issue>10</issue>
          <year>Aug</year>
          .
          <year>2017</year>
          . IEEE,
          <year>2017</year>
          . pp
          <fpage>865</fpage>
          -
          <lpage>871</lpage>
          DOI: 10.1109/ICTIS.
          <year>2017</year>
          .
          <volume>8047869</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Vorobiev</surname>
            <given-names>E.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petrenko</surname>
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovaleva</surname>
            <given-names>I.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abrosimov</surname>
            <given-names>I.K.</given-names>
          </string-name>
          <article-title>Organization of the entrusted calculations in crucial objects of informatization under uncertainty</article-title>
          .
          <source>In Proceedings of the 20th IEEE International Conference on Soft Computing and Measurements (24-26 May</source>
          <year>2017</year>
          , St. Petersburg, Russia).
          <source>SCM</source>
          <year>2017</year>
          ,
          <year>2017</year>
          , pp.
          <fpage>299</fpage>
          -
          <lpage>300</lpage>
          . DOI:
          <volume>10</volume>
          .1109/SCM.
          <year>2017</year>
          .
          <volume>7970566</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Konyavskiy</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Epishkina</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korotin</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>The design of integrity monitoring and reliability verification system for critical information, transmitted in automatic train signaling system, based on DMR-RUS radio channel</article-title>
          .
          <source>Procedia Computer Science</source>
          ,
          <year>2016</year>
          , Volume 88C, pp.
          <fpage>318</fpage>
          -
          <lpage>323</lpage>
          . DOI:
          <volume>10</volume>
          .1016/j.procs.
          <year>2016</year>
          .
          <volume>07</volume>
          .442.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Korotin</surname>
            <given-names>A.</given-names>
          </string-name>
          <article-title>Analiz ugroz bezopasnosti otvetstvennoy informatsii, peredavayemoy sistemoy ALS na baze radiokanala [Analysis of security threats of critical information transmitted by the ALS system based on radio channel]</article-title>
          .
          <source>Bezopasnost' informatsionnykh tekhnologiy [Security of information technology]</source>
          ,
          <year>2017</year>
          , N2, pp.
          <fpage>42</fpage>
          -
          <lpage>49</lpage>
          . DOI:
          <volume>10</volume>
          .26583/bit.
          <year>2017</year>
          .
          <volume>2</volume>
          .05.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Canetti</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Garay</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Itkis</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Micciancio</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naor</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pinkas</surname>
            <given-names>B</given-names>
          </string-name>
          .
          <article-title>Multicast security: a taxonomy and some efficient constructions</article-title>
          .
          <source>In Proc. 18th Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM '99)</source>
          , IEEE,
          <year>1999</year>
          . Vol.
          <volume>2</volume>
          , pp.
          <fpage>708</fpage>
          -
          <lpage>716</lpage>
          . DOI:
          <volume>10</volume>
          .1109/INFCOM.
          <year>1999</year>
          .
          <volume>751457</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Salem M.B. Towards Effective Masquerade Attack Detection</surname>
          </string-name>
          . Columbia University,
          <year>2012</year>
          , 187 p.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Aura</surname>
            <given-names>T.</given-names>
          </string-name>
          <article-title>Strategies against replay attacks</article-title>
          .
          <source>In Proceedings of the 10th IEEE Computer Society Foundations Workshop</source>
          . IEEE,
          <year>1997</year>
          , pp.
          <fpage>59</fpage>
          -
          <lpage>68</lpage>
          . DOI:
          <volume>10</volume>
          .1109/CSFW.
          <year>1997</year>
          .
          <volume>596787</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Syverson</surname>
            <given-names>P.</given-names>
          </string-name>
          <article-title>A taxonomy of replay attacks</article-title>
          .
          <source>In Proceedings of the Computer Security Foundations Workshop (CSFW97)</source>
          . IEEE,
          <year>1994</year>
          , pp.
          <fpage>187</fpage>
          -
          <lpage>191</lpage>
          . DOI:
          <volume>10</volume>
          .1109/CSFW.
          <year>1994</year>
          .
          <volume>315935</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Shubinsky</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamyshlyaev</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Risk Management System on the Railway Transport</article-title>
          .
          <source>In Proc. of the 2016 Second International Symposium on Stochastic Models in Reliability Engineering, Life Science and Operations Management</source>
          (
          <volume>15</volume>
          -
          <fpage>18</fpage>
          Feb.
          <year>2016</year>
          ), IEEE,
          <string-name>
            <surname>SMRLO</surname>
          </string-name>
          , Beer-Sheva, Israel,
          <year>2016</year>
          , pp.
          <fpage>481</fpage>
          -
          <lpage>486</lpage>
          . DOI:
          <volume>10</volume>
          .1109/SMRLO.
          <year>2016</year>
          .
          <volume>84</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Schneier</surname>
            <given-names>B. Applied Cryptography</given-names>
          </string-name>
          , Protocols, Algorithms, and Source Code in C. John Wiley &amp; Sons, Inc.,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Barabanov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markov</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Modern Trends in The Regulatory Framework of the Information Security Compliance Assessment in Russia Based on Common Criteria</article-title>
          .
          <source>In Proceedings of the 8th International Conference on Security of Information and Networks (Sochi, Russian Federation, September 08-10</source>
          ,
          <year>2015</year>
          ).
          <source>SIN '15</source>
          . ACM New York, NY, USA,
          <year>2015</year>
          , pp.
          <fpage>30</fpage>
          -
          <lpage>33</lpage>
          . DOI:
          <volume>10</volume>
          .1145/2799979.2799980.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Markov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Luchin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rautkin</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Evolution of a Radio Telecommunication Hardware-Software Certification Paradigm in Accordance with Information Security Requirements</article-title>
          .
          <source>In Proceedings of the 11th International Siberian Conference on Control and Communications (Omsk</source>
          , Russia, May
          <volume>21</volume>
          -23,
          <year>2015</year>
          ).
          <article-title>SIBCON-2015</article-title>
          . IEEE, 1-
          <fpage>4</fpage>
          . DOI:
          <volume>10</volume>
          .1109/SIBCON.
          <year>2015</year>
          .
          <volume>7147139</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>