<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Model of the System for Special Purpose of Critical Infrastructure Objects</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mikolaj Karpinski</string-name>
          <email>mkarpinski@ath.bielsko.pl</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bogdan Tomashevsky</string-name>
          <email>bogdan_tomashevsky@tntu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Natalia Zahorodna</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Yevseiev</string-name>
          <email>Serhii.Yevseiev@hneu.net</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stanislaw Rajba</string-name>
          <email>srajba@ath.bielsko.pl</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Оleksandr Milov</string-name>
          <email>Oleksandr.Milov@hneu.net</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ternopil Ivan Puluj National Technical University, Department of Cyber Security</institution>
          ,
          <addr-line>Ruska str., 56, Ternopil, 46001</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>4</fpage>
      <lpage>13</lpage>
      <abstract>
        <p>The rapid development of computing, mobile and Internet technologies, the digital economy, on the one hand, hybridity and synergy, the development of post-quantum cryptography (the emergence of a full-scale quantum computer), on the other, put forward more stringent requirements for the principles of building special security mechanisms in modern specialpurpose systems. Targeted attacks in cyberspace also require a change not only in the principles of building a special communication system for critical infrastructure objects (SCS CIO), the system for communicating commands / control signals to the CIO elements, as well as the creation of fundamentally new approaches to the formation and transmission of commands for their use not only of the SCS equipment, as well as open modern commercial systems based on Internet technologies. This approach allows, in the context of the economic crisis, to ensure the delivery of the signal within a certain time frame in the conditions of modern hybrid cyber threats to the control system through the use of cyberspace infrastructure (synthesis of modern technologies of computer systems and networks, Internet technologies and technologies of mobile communication). The proposed mathematical component of the assessment of the reliability and probability of delivering the corresponding commands / signals allows the proposed model to be used to simulate various interventions into a special-purpose system, both external and internal.</p>
      </abstract>
      <kwd-group>
        <kwd>1 modified special purpose system</kwd>
        <kwd>critical infrastructure</kwd>
        <kwd>cyberspace</kwd>
        <kwd>quantum period</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The modern development of computer
technology, the rapid development of cyberspace
technologies, the emergence of new hybrid threats
and their modification put forward more stringent
requirements for special-purpose systems. This is
due to the need to bring commands / control
signals with a high degree of reliability, safety and
efficiency to the elements of the CIO
infrastructure in the post-quantum period (the
emergence of a full-scale quantum computer).</p>
      <p>This approach requires not only the formation of
programs for the standardization of the
information infrastructure of the CIO elements
based on international standards and Green Paper
approaches, but also the ability to counter modern
threats with signs of hybridity and synergy.</p>
      <p>1.1. Analysis of recent research and</p>
      <p>
        publications
[
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7 ref8">1-8</xref>
        ] determines the need to create a
specialpurpose system for critical infrastructure
facilities, which makes it possible to form a
control system in the conditions of post-quantum
cryptography, the growing demands of cyber
terrorists, targeted cyberattacks on
communication channels and elements of the
CIO. In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], it is predicted that by 2025, 2.8 billion
subscribers will use the 5G network. By the same
year, the share of fixed wireless access networks
in global traffic will increase to 25%, reaching
160,000,000 connections. According to research
[
        <xref ref-type="bibr" rid="ref12 ref9">9,12</xref>
        ], today more than 5,000,000,000 consumers
interact with data every day − by 2025 this
number will be 6,000,000,000, or 75% of the
world's population. In 2025, every connected
person will have at least one data access every 18
seconds. Many of these interactions are driven by
the billions of IoT devices connected around the
world, which are expected to generate over 90 ZB
(10²¹ bytes) of data in 2025. This indicates the
possibility of considering the use of these systems
as possible channels of a modified
specialpurpose system, subject to additional information
transformation. However, in [
        <xref ref-type="bibr" rid="ref14 ref2 ref3 ref4 ref5">2-5,14</xref>
        ], US experts
note the possibility of breaking symmetric and
asymmetric cryptosystems that provide security in
cyberspace as a combination of Internet
technologies, computer systems and networks, as
well as LTE (Long-Term Evolution − long-term
development) technologies in the context of the
emergence full-scale quantum computer
(postquantum period).
1.2. The purpose and objectives of
the study
      </p>
      <p>The aim of the research is to develop a model
of a promising special-purpose system for critical
infrastructure facilities.</p>
      <p>To achieve the goal of the reserch, it is
necessary to solve the following tasks:</p>
      <p>− development of a mathematical model of a
promising special-purpose system CIO;
− mathematical assessment of the probability
of delivering a message using a special-purpose
system CIO;</p>
      <p>− mathematical assessment of the reliability of
the proof of the message using the special-purpose
system CIO.
2. Development of a mathematical
model of a promising
specialpurpose system.</p>
      <p>To ensure the safety, reliability and efficiency
of the transmission of commands and / or control
signals, a national system of confidential
communication is used.</p>
      <p>
        The national confidential communication
system is a set of special dual-use communication
systems (networks) that, using cryptographic and
/ or technical means, ensure the exchange of
confidential information in the interests of state
authorities and local governments, create
appropriate conditions for their interaction in
peacetime and in in the case of the introduction of
a special and martial law [
        <xref ref-type="bibr" rid="ref1 ref13 ref6">1, 6,13</xref>
        ].
      </p>
      <p>A special communication system (network) is
a communication system (network) intended for
the exchange of information under limited access.</p>
      <p>
        A special dual-purpose communication system
(network) is a special communication system
(network) designed to provide communication in
the interests of state authorities and local
authorities, using part of its resource to provide
services to other consumers. The subjects of the
National System of Confidential Communication
are state authorities and local self-government
bodies, legal entities and individuals who take part
in the creation, functioning, development and use
of this system. Management of the National
System of Confidential Communications, its
functioning, development, use and protection of
information are provided by a specially
authorized central executive body in the field of
confidential communications in accordance with
the legislation. Centralized systems of
information protection and operational and
technical management are state-owned and are
not subject to privatization. The owners of other
components of the National System of
Confidential Communications may be subjects of
economic activity, regardless of the form of
ownership. The main feature of such systems is its
hierarchical structure and transmission method
based on forward error correction. This approach
requires the transmission of additional
("unnecessary" − checking) characters, greatly
simplifies the detection-suppression and / or
complete blocking of these communication
channels for the adversary[
        <xref ref-type="bibr" rid="ref15">15,16</xref>
        ].
      </p>
      <p>However, the rapid development of computing
resources for both Internet and mobile
technologies LTE (Long-Term Evolution) allows
the use, given the "steganographic" properties of
these communication channels. The
"steganographic" property is understood as the
possibility of hiding from the attacker the fact,
place, time and content of information transmitted
by breaking the commands and / or control signals
of the OCI into separate blocks (packets). This
approach allows the use of open communication
channels with a commercial method of delivering
information to the recipient − the decisive
feedback. In addition, the use of this approach
does not require significant economic and human
resources. Consider the model of a modified CIO
control system on the example of the Armed
Forces of Ukraine. In the system that is proposed
to be used as a projects of the National
Confidential Communication System: special
communication systems (networks) as well as
systems of open public Internet systems and
mobile communication systems based on “G”
technologies. In this system, the switching nodes
are denoted by: сhiscsGF (special communication
systems of the Ground Forces), i 1, I ,, сhsjcsAF
(special communication systems of the Air
Force), j 1, J , сhlscsNF (special
communication systems of the Naval Forces),
l 1, L , special dual-purpose system сhksdpsD
(special dual-use system), k 1,</p>
      <p>K , open
Internet system сhmoIS
communication system
m1,</p>
      <p>M , open mobile
сhqomcs (open mobile
communication
Communication</p>
      <p>system)
channels
are
q 1, Q .</p>
      <p>denoted
accordingly: lisxcsGF , x 1,</p>
      <p>X , l sjycsAF , y 1, Y ,
l scsNF , z 1, Z , special dual-purpose system
lz
l sdpsD ,, f 1, F , open Internet system lmoIvS ,,
kf
v 1, V , open mobile communication system
lomcs ,, n 1,
qn</p>
      <p>N .</p>
      <p>Thus, the overall system of the proposed
special purpose control system CIO will be a set
of individual components of the intermediate
switching nodes and channels, and the total
probability of receiving a command and / or signal
is determined by the formula:</p>
      <p> I X
PQACCS =   pscsGF сhiscsGF   pscsGF l scsGF 
cr  i=1 i ix=1 ix ix 
 J Y
  psjcsAF сhsjcsAF   psjycsAF l sjycsAF 
 j=1 jy=1 
 L L
 l=1 plscsNF сhlscsNF  lz=1 plszcsNF llszcsNF 
 K F
  psdpsDсhksdpsD   psdpsDl sdpsD </p>
      <p>k kf kf
 k=1 kf =1 
 M V
  pmoIS сhmoIS   pmoIvSlmoIvS 
 m=1 mv=1 </p>
      <p>Q N
 pomcsсhqomcs   pqonmcslqonmcs .</p>
      <p>q
q=1 qn=1
where:</p>
      <p>piscsGF − the probability of correct reception /
transmission of the i-th switching node сhiscsGF ;</p>
      <p>pisxcsGF − the probability of
transmission from the i-th switching node сhiscsGF</p>
      <p>correct
through the x-th channel lisxcsGF ;</p>
      <p>psjcsAF − the probability of correct reception /
transmission of the j-th switching node сhsjcsAF ;
pscsAF
jy
−
the
probability
of</p>
      <p>correct
transmission from the j-th switching node сhsjcsAF
through the y-th channel l sjycsAF ;</p>
      <p>plscsNF - the probability of correct reception /
transmission of the l-th switching node сhlscsNF ;
pscsNF - the probability of correct transmission</p>
      <p>lz
from the l-th switching node сhlscsNF through the
z-th channel llszcsNF ;
psdpsD − the probability of correct reception /</p>
      <p>k
transmission of the k-th switching node chksdpsD ;
psdpsD
kf
−
the
probability
of</p>
      <p>correct
transmission from the k-th switching node chksdpsD
through the f-th channel lksfdpsD ;</p>
      <p>pmoIS - the probability of correct reception /
transmission of the m-th switching node сhmoIS ;</p>
      <p>pmoIvS - the probability of correct transmission
from the m-th switching node сhmoIS through the
vth channel lmoIvS ;
pomcs - the probability of correct reception /</p>
      <p>q
transmission of the q-th switching node сhqomcs ;</p>
      <p>pqonmcs - the probability of correct transmission
from the q-th switching node сhqomcs through the
nth channel lqonmcs .
3. Mathematical assessment of the
probability of delivering a message
using a special-purpose control
system for the OQI</p>
      <p>Taking into account the possibility of modern
cyber threats, the computing capabilities of cyber
terrorists in the special-purpose control system of
the CIO, it is proposed to transmit commands and
/ or control signals by separate independent units
through all channels, both a special confidential
communication system and over open networks.</p>
      <p>Commands are transmitted in parallel. Each of the
networks can be subject to attacks of a different
nature, which lead to the failure of the
corresponding network. We calculate the
probability of delivery of a message that is
transmitted (hereinafter, a packet), with the
parallel operation of three networks (a special
communication system (network) of the aircraft,
an open Internet network, an open mobile
network), provided that there is a majority body
on the receiving side that makes decisions and the
correctness of information transmission in the
case of identity of at least two packets.</p>
      <p>Let the probability of command transmission
without distortion and failure for a special system
(network) of communication − PcQrSCS , second
network − PQoIS , third network − PcQromcs , ie packet</p>
      <p>cr
transmission without failures and losses, which
can be caused by attacks of different classes. If
there was no majority body on the host side, the
probability of receiving a package on at least one
of the networks could be calculated as follows:</p>
      <p>QoIS + PcQromcs =
PQACCS = PcQroIS + Pcr
cr QSCS )  (1 – Perr Qomcs ) ,
= (1 – Perr QoIS )  (1 – Perr
where</p>
      <p>QSCS - the probability of erroneous reception</p>
      <p>Perr
of the command in a special system (network) of</p>
      <p>PeQrroIS − the probability of
communication;
erroneous reception of the command on the
Internet; PeQrromcs − the probability of erroneous
reception of the command in the mobile network.</p>
      <p>This expression can be interpreted as the value
of the probability that all three networks will not
fail simultaneously.</p>
      <p>If there is a majority body on the receiving
party to the calculation of the probability of
receipt and confirmation of the correctness of the
received package must be approached in a slightly
different way.</p>
      <p>Consider all possible states of the three listed
networks. All sets of states are summarized in
table. 1.
+</p>
      <p>PQACCS = PcQrSCS  PcQroIS  Pcr
cr</p>
      <p>Qomcs
PQACCS = PcQrSCS  PcQroIS  (1 − PcQrSCS )
cr
PcQrACCS = PcQrSCS  (1− PcQroIS )  PcQromcs
PcQrACCS = (1− PcQrSCS )  PcQroIS  Pcr</p>
      <p>Qomcs
PQACCS = PcQrSCS  (1 − PcQroIS )  (1 − PcQromcs )
cr
PQACCS = (1 − PcQrSCS )  PcQroIS  (1 − PcQromcs )
cr
PQACCS = (1 − PcQrSCS )  (1 − PcQroIS )  PcQromcs
cr</p>
      <p>The “+” sign indicates that the packet was
transmitted successfully, and the “-” sign
indicates that due to various reasons (attacks,
physical damage, technical failures, etc.), the
packets were not delivered, or the packet came
with distortions. The first four situations
correspond to cases where the majority body can
confirm that 2 of the 3 packets are identical, and
can be interpreted as a correctly transmitted
command. In other cases, the majority body
cannot confirm the identity of the received
packets on at least 2 networks. The probabilities
of realization of the corresponding situations are
given in the last column of table. 1.</p>
      <p>Then the probability of receiving identical
packages on at least 2 networks, which allows the
majority body to work, will be equal to the sum of
the probabilities of the first four situations:</p>
      <p>PcQrACCS = PcQrSCS  PcQroIS  PcQromcs +
+PcQrSCS  PcQroIS  (1 − PcQromcs ) +
+PcQrSCS  PcQromcs  (1 − PcQroIS ) +
+PcQroIS  PcQromcs  (1 − PcQrSCS )</p>
      <p>However, when using a special network, it is
possible to detect and correct any number of errors
based on decoding algorithms. The payment for
reliability and efficiency is the additional
transmission of redundant (check) characters,
which greatly simplifies the execution of a DOS0
attack by a cyber attacker.
4. Mathematical assessment of the
control signal reliability using a
special-purpose system.</p>
      <p>
        A detailed study of the statistical properties of
error sequences in real communication channels
[
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ] showed that errors are dependent and tend
to group (package), ie there is a certain
relationship between them − correlation. Most of
the time the information passes through
communication channels without distortion, and
at certain points in time there are condensations of
errors, so-called packets (packs, groups) of errors,
within which the error probability is much higher
than the average error probability calculated for a
significant transmission time. In such conditions,
the protection methods that are optimal for the
hypothesis of independent errors are ineffective
when used in real communication channels. HF
radio channels and wired data transmission
channels used for the organization of control and
communication in a special system (network) of
communication of the Armed Forces, prone to a
significant grouping of errors with a slight mean
asymmetry. Then, with the group nature of the
error distribution, one parameter (error
probability) does not fully characterize the
channel, additional parameters are needed that
reflect the degree of error grouping in different
data transmission channels.
      </p>
      <p>
        To calculate the reliability of command
transmission in a special system (network) of
communication of the Armed Forces, we use a
simplified mathematical model of
BennettFreulich, which does not impose restrictions on
the type of law of distribution of error packet
lengths [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]. The advantages of the simplified
Bennett – Freulich model include relatively low
computational complexity, a small number of
parameters, high accuracy compared to the
Gilbert model, and the possibility of arbitrary
choice of the nature of the distribution of error
packet lengths. To set a simplified Bennett –
Freulich model, it suffices to set the probability
Рп − the probability that from this position will
begin a continuous package of errors of any length
and distribution, Р(l) − the probability of a
continuous package of length l . Then Рп (l) − the
probability that from this position will start a
continuous packet of errors of length l is equal to:
      </p>
      <p>Рп (l ) = Рп  P (l ) .</p>
      <p>Consider a simplified Bennet-Freulich model
with disparate bundles of errors and their possible
adjacency. In this case, no more than n characters
can occur on a block length</p>
      <p> n 
 ' =  l 
blocks of length errors l.</p>
      <p>Then the probability of correct receiving of
commands and / or signals in a special
communication system (network) of the Armed
Forces is determined by the formula:
PcQrSCS = 1 − (1 − PeQrrSCS )n − Cn  Perr  (1 − Perr )
 ' QSCS n−
 =1
= 1 − ' Cn  Perr  (1 − PeQrrSCS )n− .</p>
      <p> =0
where  − number of packet combinations, n −
packet length.</p>
      <p>
        To calculate the probability of correct
reception of commands on the Internet, we also
use a simplified Bennet-Freulich model. One of
the modifications of the Bennett-Freulich model,
which provides a polygeometric distribution of
the lengths of error packets considered in[
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ].
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] it was shown that the lengths of error
packets in most real channels are distributed
according to the normal law. Thus, instead of the
packet length distribution function F (ln), it is
sufficient to specify the mathematical expectation
mln and the standard deviation σln. The length of
the interval between the beginnings of
neighboring error packets Λ is a discrete random
variable (DRV). We construct a series of DRV
distributions and find the DVV distribution
function Λ. The range of distribution of DRV Λ is
shown in table. 2.
      </p>
      <p>The probability of correct transmission of an
= n-bit data block can be defined as the probability
of a random event, random variable A takes on a
value greater than or equal to n, that is</p>
      <p>Pcor = PA  n = 1 − PA  n = 1 − FA (n),
where FA(n) is the distribution function of the
random variable A from the argument n.</p>
      <p>A random event B, which is that random value
A will take a value less than n, can be represented
as the sum of incompatible events:</p>
      <p>B0 − a random event, which is that Λ &lt;n and
0≤Ln &lt;1;</p>
      <p>B1 − a random event, which is that Λ &lt;n + 1
and 1≤ Ln &lt;2;</p>
      <p>B2 − a random event, which is that Λ &lt;n + 2
and 2≤ Ln &lt;3;
…</p>
      <p>Vi − a random event, which is that Λ &lt;n + i and
i≤Ln &lt;i + 1.</p>
      <p>The random variables Λ and Ln are
independent. Then the probabilities of these
events are equal</p>
      <p>P(B0 ) = P{(  n) (0  Ln  1)} =
= P{  n} P{0  Ln  1};
P(B1) = P{(  n + 1) (1  Ln  2)} =
= P{  n + 1} P{1  Ln  2};
P(B2 ) = P{(  n + 2) (2  Ln  3)} =
= P{  n + 2} P{2  Ln  3};</p>
      <p>…
P(Bi ) = P{(  n + i) (i  Ln  i + 1)} =
= P{  n + i} P{i  Ln  i + 1};</p>
      <p>…</p>
      <p>Since the events B0, В1, В2,…, Вi,…
incompatible, then</p>
      <p>
PA  n = P(B) =  P(Bi ) =</p>
      <p>i=0

= P{  n + i} P{i  Ln  i + 1}.</p>
      <p>i=0</p>
      <p>The probability P{Λ &lt;n + i} is nothing but the
distribution function random variables Λ from the
argument n + i</p>
      <p>P  n + i = F (n + i) = 1− (1− Pп )n+i .</p>
      <p>In order to find the probability that the value of
random variables Ln, distributed by the normal
law with the parameters mLn and σLn, falls in the
interval [i, i + 1), we use the known formula
 i +1− mln  −  </p>
      <p> i − mln ,
P{i  Lп  i +1} =    ln    ln 
where Φ(x) is the Laplace function of the
argument x.</p>
      <p>Substituting (2), (3) into (1), we obtain the
distribution function BB BB
FA (n) = PA  n =</p>
      <p>    i +1 − mln  −   i − mln .
= i=0 1 − (1 − Pп )n+i      ln    ln </p>
      <p>Then the formula for calculating the
probability of correct transmission of a data block
of length n bits takes the form
Pcor = 1 − FA (n) = 1 −</p>
      <p>    i +1 − mln  −   i − mln .
− i=0 1 − (1 − Pn )n+i      ln    ln </p>
      <p>Thus, for an open Internet with crucial
feedback and a positive receipt, the probability of
receiving the correct commands is determined by
the formula:
    i + 1 − mln  −   i − mln  
PcQroIS = 1 − i=0 1 − (1 − Pп )n+i      ln    ln 
</p>
      <p>    i + 1 − mln  −   i − mln   1 − 1  1  r + 1 − mln 
1 − i=0 1 − (1 − Pп )n+i      ln    ln   2r   2 −    ln  ,
    i + 1 − mln  −   i − mln   1 − 1  1  r + 1 − mln 
1 − i=0 1 − (1 − Pп )n+i      ln    ln   2r   2 −    ln 
subscriber station, which is at a distance R from
the transmitter,is equal to</p>
      <p>N
where n – length of i-th frame, Pn − probability of
burst errors; mLn − mathematical expectation of
packet length in errors; σLn -standard deviation of
length packet of errors, N is the maximum number
of repetitions determined by the formula, which is
determined by by the formula:
  Рnec  (1 − РI ae )  
 ln 1 −
N    РI ct   ,
 ln РI ae 
 
 
where</p>
      <p>Pnec − necessary probability delivery
packagein;</p>
      <p>РIae − the probability of an error in the
package;</p>
      <p>РIct − probability right packet transmission
with one attempts;</p>
      <p> х − the nearest integer greater than or equal
to x.</p>
      <p>In cellular networks for determination of
signal strength and interference at the input of the
receiver of the subscriber terminal for prediction
of losses when signal propagation is used model
Okamura-Cottage. In accordance with this model,
the signal power at the input of the receiver Pave</p>
      <p>PcQromcs (R) = Prad ()  L ( R),
where Prad(Θ) − which emits the power of the
transmitter depending on the direction to the
subscriber station; at this is expectedthat the
antenna of the subscriber station has a pie chart;
L(R) − losses (size, reverse attenuation) signal at
distribution in urban areas,, depends from altitude,
antennas which transmit and accept, distance
between them,, carrier frequencies, empirical
coefficient.</p>
      <p>Power signal on during receiver back
proportional distance to transmitter:</p>
      <p>PcQromcs (R) = PBrad(Rx) ,
where B − coefficient, calculated empirically and
depends from altitude, transmitting and reception
antennas -hBS, carrier frequencies; x -indicator
degree at R:</p>
      <p>x = 4.49-0.655lg (hBS).</p>
      <p>Power interference obstacles,, created six
interfering transmitters the first hexagon,, is equal
to</p>
      <p>Pп1 = 6 Prad () </p>
      <p>B  ( R3 )x</p>
      <p>1</p>
      <p>Pп1 = 6 BPrad((R3))x  (1018)x</p>
      <p>At work in cellular network appear
interference from transmitters base stationsthat
work on matching frequencies (in adjacent
channels), and in results on during receiver
necessary consider relation signal/ (noise +
interference obstacle):</p>
      <sec id="sec-1-1">
        <title>Pnoise + Рobs</title>
        <p>The probability of non-compliance with the
requirements for permissible relation
signal/obstacle (S/OBS) in point reception P(C)
depends from dimensionality cluster. Probability
P(C) decreases with growth dimensionality
cluster. At this simultaneously falls frequency
efficiency network. Evaluated different options
clusters and absorbs optimal. Results evaluation
different options clusters for standard GSM-900
bent in table. 2.</p>
        <p>Parameters
Р(C), %
Р(C), %
Р(C), %
1</p>
        <p>Sectorality M</p>
        <p>3</p>
        <p>Thus, for a mobile network based on LTE
technologies, the probability of correct command
reception is determined by the formula:
PcQromcs = 1− h
 =</p>
        <p>P</p>
        <p>s</p>
      </sec>
      <sec id="sec-1-2">
        <title>Pnoise + Рobs</title>
        <p>.</p>
        <p>Then the probability of correct reception in the
proposed modified special-purpose system is
equal to:
PcQr.ACCS = PcQrSCS + PcQromcs + PcQroIS = 1 − =0 Cn  Pпом  (1 − PoQbsSCS )n−   1 − h =
  '
Ps  </p>
        <p>
Pnoise + Рobs 
5. Conclusions</p>
        <p>1. The analysis of the existing special-purpose
model in the control systems of critical
infrastructure facilities does not allow the
transmission of control signals / commands to the
elements of the AQI infrastructure with the
1 − i=0 1 − (1 − Pп )n+i     i + 1 −ln mln  −   i − mlnln   N 
     i + 1 − mln  −   i − mln   1 − 1  1  r + 1 − mln  .
1 − i=0 1 − (1 − Pп )n+i      ln    ln   2r   2 −    ln  
     i + 1 − mln  −   i − mln   1 − 1  1  r + 1 − mln  
 1 − i=0 1 − (1 − Pп )n+i      ln    ln   2r   2 −    ln  
required level of reliability in the context of
modern targeted cyber threats requires new
approaches and the use of all possible channels for
communicating combat orders.</p>
        <p>2. The proposed model of a promising
specialpurpose system for managing objects of OKI uses
both a system of special communication
equipment and open commercial systems of
cyberspace. When transmitting, it is proposed that
each message is split into separate components,
which are transmitted over all channels. In open
channels, it is proposed to use digital
steganography and / or unprofitable cryptography
methods. Interception in each channel of
individual components will not allow the enemy
to get the original text. The final recipient (an
element of the OCI infrastructure), on the basis of
majority choice from all channels in all parts of
the message, receives a command / control signal.</p>
        <p>This approach allows, in the context of the
economic crisis, to ensure the fulfillment of the
assigned tasks on time,</p>
        <p>3. The mathematical component of assessing
the reliability and probability of delivering the
corresponding commands / signals allows
modeling the proposed model taking into account
various interventions into the special-purpose
system of critical infrastructure objects, both
external and internal. A promising area of further
research is the formation of mechanisms for
breaking into parts and concealment during
transmission over open channels.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>6. References</title>
      <p>dynavic TF-IDF. International Journal of
Emerging Trends in Engineering Research
(IJETER), Volume 8. No. 9, September
2020.pp 5713-5718.</p>
      <p>OI:10.30534/ijeter/2020/130892020.
[16] Fink L.M. The theory of transmission of
discrete messages. Moscow, Publishing
house "Soviet Radio", 1970. 728pp.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Hrishchuk</surname>
            <given-names>R. V.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>and Danyk</given-names>
            <surname>Yu</surname>
          </string-name>
          . G.
          <article-title>Fundamentals of cyber security: Monograph (ed</article-title>
          . Dannik Yu. G.).
          <source>Zhytomyr: ZhNAEU</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Lily</given-names>
            <surname>Chen</surname>
          </string-name>
          et.
          <source>al. Report on Post-Quantum Cryptography. National Institute of Standards and Technology Internal Report 8105. National Institute of Standards and Technology</source>
          , Gaithersburg, Maryland,
          <year>April 2016</year>
          , 15pp. http://nvlpubs.nist.gov/nistpubs/ir/2016/NIS T.IR.
          <volume>8105</volume>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Ankur</given-names>
            <surname>Lohachab</surname>
          </string-name>
          , Anu Lohachab,
          <string-name>
            <given-names>Ajay</given-names>
            <surname>Jangra</surname>
          </string-name>
          .
          <article-title>A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks</article-title>
          .
          <source>Internet of Things</source>
          , Vol.
          <volume>9</volume>
          ,
          <year>March 2020</year>
          ,
          <volume>100174</volume>
          . https://doi.org/10.1016/j.iot.
          <year>2020</year>
          .
          <volume>100174</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Kyrylo</given-names>
            <surname>Petrenko</surname>
          </string-name>
          , Atefeh Mashatan,
          <string-name>
            <given-names>Farid</given-names>
            <surname>Shirazi</surname>
          </string-name>
          .
          <article-title>Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization</article-title>
          .
          <source>Journal of Information Security and Applications</source>
          , Volume
          <volume>46</volume>
          ,
          <year>2019</year>
          , Pages
          <fpage>151</fpage>
          -
          <lpage>163</lpage>
          . https://doi.org/10.1016/j.jisa.
          <year>2019</year>
          .
          <volume>03</volume>
          .007.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Jeffrey</given-names>
            <surname>Cichonski</surname>
          </string-name>
          ,
          <string-name>
            <surname>Joshua M. Franklin</surname>
            ,
            <given-names>Michael</given-names>
          </string-name>
          <string-name>
            <surname>Bartock</surname>
          </string-name>
          .
          <article-title>Guide to LTE Security</article-title>
          .
          <source>NIST Special Publication</source>
          <volume>800</volume>
          -
          <fpage>187</fpage>
          . National Institute of Standards and Technology,
          <year>December 2017</year>
          . 49pp. https://doi.org/10.6028/NIST.SP.
          <volume>800</volume>
          -
          <fpage>187</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G. P.</given-names>
            <surname>Leonenko</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Yu</surname>
          </string-name>
          . Yudin, “
          <article-title>Problems of ensuring information security of systems of critical information infrastructure of Ukraine”, Information Technology</article-title>
          and Security, №
          <volume>1</volume>
          (
          <issue>3</issue>
          ), s.
          <fpage>44</fpage>
          −
          <lpage>48</lpage>
          .
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Ericsson</given-names>
            <surname>Mobility</surname>
          </string-name>
          <article-title>Report: 5G is growing faster than forecasted</article-title>
          . https://softline.ua/ua/news/ericssonmobility-report
          <string-name>
            <surname>-</surname>
          </string-name>
          5g
          <article-title>-zrostaie-shvydshe-zaprohnozy</article-title>
          .html
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>[8] Experts predict "the onset of smart attachments"</article-title>
          . https://www.ukrinform.ua/rubrictechnology/2444363-eksperti-prognozuutnastup-smartpristroiv.html
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>[9] IDC "The Digitization of the World − From Edge to Core"</article-title>
          . https://www.seagate.com/gb/en/ourstory/data-age-2025/
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Sklar</given-names>
            <surname>Bernard</surname>
          </string-name>
          .
          <article-title>Digital communication</article-title>
          .
          <source>Fundamentals and Applications</source>
          . Prentice Hall,
          <year>2012</year>
          . 954pp.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Korchenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Breslavskyi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseiev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sievierinov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tkachuk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <article-title>Development of a Method for Constructing Linguistic Standards for Multi-Criteria Assessment of Honeypot Efficiency</article-title>
          .
          <source>EasternEuropean Journal of Enterprise Technologiesthis link is disabled</source>
          ,
          <year>2021</year>
          ,
          <volume>1</volume>
          (
          <issue>2</issue>
          (
          <issue>109</issue>
          )), pp.
          <fpage>14</fpage>
          -
          <lpage>23</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Androshchuk</surname>
            ,
            <given-names>А.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseiev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Melenchuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lemeshko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lemeshko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <article-title>Improvement of project risk assessment methods of implementation of automated information components of non-commercial organizational and technical systems</article-title>
          . EUREKA, Physics and Engineeringthis link is disabled,
          <year>2020</year>
          ,
          <year>2020</year>
          (1), pp.
          <fpage>48</fpage>
          -
          <lpage>55</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Oleksandr</surname>
            <given-names>Laptiev</given-names>
          </string-name>
          , Savchenko Vitalii, Serhii Yevseiev, Halyna Haidur, Sergii Gakhov,
          <string-name>
            <given-names>Spartak</given-names>
            <surname>Hohoniants</surname>
          </string-name>
          .
          <article-title>The new method for detecting signals of means of covert obtaining information</article-title>
          .
          <source>2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020) Conference Proceedings Kyiv, Ukraine, November 25-27</source>
          . pp.
          <fpage>176</fpage>
          -
          <lpage>181</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Oleg</surname>
            <given-names>Barabash</given-names>
          </string-name>
          , Oleksandr Laptiev, Oksana Kovtun, Olga Leshchenko, Kseniia Dukhnovska,
          <string-name>
            <given-names>Anatoliy</given-names>
            <surname>Biehun</surname>
          </string-name>
          . The Method
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>