=Paper= {{Paper |id=Vol-3826/paper4 |storemode=property |title=Algorithms for reliable permutation transmission protocols in noisy communication channels |pdfUrl=https://ceur-ws.org/Vol-3826/paper4.pdf |volume=Vol-3826 |authors=Emil Faure,Alimzhan Baikenov,Artem Skutskyi,Denys Faure,Olga Abramkina |dblpUrl=https://dblp.org/rec/conf/cpits/FaureBSFA24 }} ==Algorithms for reliable permutation transmission protocols in noisy communication channels== https://ceur-ws.org/Vol-3826/paper4.pdf
                                Algorithms for reliable permutation transmission
                                protocols in noisy communication channels⋆
                                Emil Faure1,2,*,†, Alimzhan Baikenov3,†, Artem Skutskyi1,†, Denys Faure4,†
                                and Olga Abramkina5,†
                                1
                                  Cherkasy State Technological University, 460 Shevchenko ave., 18006 Cherkasy, Ukraine
                                2
                                  State Scientific and Research Institute of Cybersecurity Technologies and Information Protection, 3 M. Zaliznyaka str., 03142
                                Kyiv, Ukraine
                                3
                                  Almaty University of Power Engineering and Telecommunications named after Gumarbek Daukeyev, 126 Baitursynov str.,
                                050013 Almaty, Kazakhstan
                                4 Odesа Polytechnic National University, 1 Shevchenko ave., 65044 Odesa, Ukraine
                                5 International University of Information Technology, 34A Manasa, 050040 Almaty, Kazakhstan



                                                   Abstract
                                                   The existing approaches to frame synchronization of non-separable factorial code, as well as the reliable
                                                   transmission of its codewords, form the basis for creating a protocol for reliable permutation transmission
                                                   in conditions of intense channel noise and, accordingly, of a high probability of bit error. This study
                                                   considers a simplex data transmission system. For such a system, algorithms for frame synchronization of
                                                   permutations, as well as reliable transmission of permutations have been developed, providing processing
                                                   of fragments of bit sequences with a permutation length of M. A key feature of the proposed approaches is
                                                   that they are designed for situations where the initial moment of the transmitter’s syncword transmission
                                                   is unknown. It has been shown that to ensure the required level of false synchronization, the number of K
                                                   blocks, each consisting of l fragments, needs to be increased. An assessment of the probabilistic indicators
                                                   of the process of transmission and reception of information has been performed. Computer simulation
                                                   modeling has been carried out, confirming the theoretical results.

                                                   Keywords
                                                   permutation, synchronization, error correction, security, reliability, factorial coding, protocol, data
                                                   processing algorithm 1



                         1. Introduction                                                             conditions for the code frame synchronization using the
                                                                                                     operating signal.
                         The theory of non-separable factorial data coding [1, 2]                        At the same time, modern conditions dictate the need [3,
                         allows using permutations as a transport mechanism in                       11–14] to achieve high-reliability indicators in difficult
                         communication systems with short packets [3–5], and also                    signal propagation conditions [15–18]. Three-pass
                         to implement joint protection of transmitted data from                      cryptographic protocols [19–22], in particular, based on
                         communication channel errors and unauthorized access [6].                   permutations [23], deserve special attention in this context.
                             Paper [1] shows that the codewords of a non-separable                       Previously conducted studies on the possibility of using
                         factorial code belong to a subset of the set of permutations                non-separable factorial coding in conditions of a high
                           of length M . The permutation elements are encoded                     probability of bit error in a communication channel made it
                         by a fixed-length binary code with a codeword length                        possible to develop:
                         lr   log 2 M  . Then the syncword length is equal to
                                                                                                              Methods of frame synchronization for non-
                           n  lr  M .                                                                        separable factorial codes [24–27].
                             Due to the redundancy of the information carriers,                               Method for reliable permutation transmission in
                         permutations, used, and non-separable factorial codes allow                           short-packet communication systems [28].
                         detecting and correcting communication channel errors [7–
                         10]. In addition, the permutation structure creates                         The developed approaches and methods are effective. At the
                                                                                                     same time, the frame synchronization methods are based on
                                                                                                     knowledge of the initial moment of the syncword bits


                                CPITS-II 2024: Workshop on Cybersecurity Providing in Information          0000-0002-2046-481X (E. Faure);
                                and Telecommunication Systems II, October 26, 2024, Kyiv, Ukraine        0000-0002-6490-3159 (A. Baikenov);
                                ∗
                                  Corresponding author.                                                  0000-0002-8632-1176 (A. Skutskyi);
                                †
                                  These authors contributed equally.                                     0009-0002-9741-6282 (D. Faure);
                                   e.faure@chdtu.edu.ua (E. Faure);                                      0000-0003-0137-1252 (O. Abramkina)
                                a.baikenov@aues.kz (A. Baikenov);                                                     © 2024 Copyright for this paper by its authors. Use permitted under
                                                                                                                      Creative Commons License Attribution 4.0 International (CC BY 4.0).
                                a.skutskyi@ chdtu.edu.ua (A. Skutskyi);
                                highdensityarts@gmail.com (D. Faure);
                                o.manankova@iitu.edu.kz (O. Abramkina)
CEUR
Workshop
                  ceur-ws.org
              ISSN 1613-0073
                                                                                                    40
Proceedings
reception, which is not always possible. In addition, the joint        The frame synchronization method proposed in [25, 26]
use of synchronization and reliable transmission procedures            involves the sequential transmission of a syncword into the
in one protocol has not been studied.                                  communication channel. For example, for M  8 , such a
    The purpose of this study is to develop algorithms for a           syncword             is          the            permutation
protocol of reliable transmission of permutations for                      000,001,111,011,010,101,100,110  , up to its circular
simplex data transmission systems with non-separable
factorial coding under conditions of high noise intensity in           shift by a number of bits that is a multiple of lr  3 , bit
the communication channel.                                             inversion, and the reverse order of their sequence.
                                                                           Let us assume that high noise intensity results in the
2. Sliding window algorithm for a                                      receiver being unable to determine the initial moment of the
                                                                       transmitter’s syncword. In this case, the algorithm for
    frame synchronization system                                       identifying the boundaries of the syncword is modified
The first step of the protocol involves establishing frame             slightly.
synchronization for the transmitted permutations. For this                 Recall that according to [26], the sufficient number of
purpose, a frame synchronization method [25, 26] will be               accumulated fragments to ensure the minimum value of the
used. This method employs as a syncword a permutation with             probability of correct synchronization Ptrue _ min is chosen as
the maximum value of the minimum Hamming distance from
                                                                       the minimum value of l , at which the probability of correct
its binary representation to all its circular shifts.
     The receiver accumulates K blocks of l fragments of               synchronization for K  1 is not less than the specified
 M symbols from the communication channel, followed by                  Ptrue _ min . Paper [26] denotes this value as lmax 1 . In this
majority [29, 30] and correlation processing [31–33] of the            paper, we will denote it as lmax .
accumulated fragments. The values of K and l change                         Based on the above and the fact that the initial moment
according to the methodology defined in [26]. A pre-                   of syncword transmission is unknown, the receiver will use
established minimum threshold for the probability of                   a sliding window with a width of lmax fragments to search
correct synchronization Ptrue determines the sufficient
                                                                       for synchronization (Figure 1).
number of accumulated fragments.




Figure 1: Diagram of the use of a sliding window consisting of lmax fragments

Thus, the receiver, shifting the sliding window 1 bit to the           processing of lmax received fragments. However, the
right, continuously analyses lmax fragments received from              receiver’s lack of knowledge about the initial moment of
the communication channel, attempting to establish frame               syncword transmission leads to the following.
synchronization. It is evident that, in this case, the dynamic             Since the receiver has to constantly “listen” to the
adjustment of K and l values is meaningless.                           channel, in the absence of a signal from the transmitter, only
    The mathematical model of the syncword reception                   noise is present in the sliding window. Accordingly, the
process will also differ from that presented in [26].                  probability of bit error is equal to 0.5
                                                                           After the transmitter begins to transmit service signals
2.1. Probabilistic metrics of the frame                                for the clock (not considered in this study) and frame
     synchronization system                                            synchronization into the communication channel,
                                                                       fragments with syncwords begin to appear in the sliding
The probabilities of correct and false synchronization                 window of the receiver synchronization system (Figure 2).
depend on the probability of bit error p0* after majority




Figure 2: Diagram of the stage of filling the sliding window with data from the source

Let there be L bits of the source syncword in the sliding              shaded areas contain only noise bits (error probability is
window (Figure 2). To provide a clearer view of the majority           0.5), while the unshaded areas contain bits of the source
reception process of the accumulated bits, we represent the            syncword (with an error probability of p0 ).
fragments in the sliding window as shown in Figure 3. The

                                                                  41
Figure 3: Diagram of majority reception of accumulated bits

From the accumulated fragments, a refined sequence R is                                          Cli  l  0.5 lmax  l1                  
computed by the majority, in which some errors (if any) are                                      max 1
                                                                                             lmax  l1                                       
                                                                                       p0   
                                                                                        *                  l1
                                                                                                                                      l1  j 
                                                                                                                                               ,   (2)
                                                                                                 j  l 
corrected.                                                                                  i0                     Cl1 p0 1  p0  
                                                                                                                        j   j
                                                                                                                                             
    It should be noted that the number of bits of the source                                           max 1 2  i                        
syncword present in the sliding window of the receiver’s
                                                                                             L
synchronization system may not be a multiple of the                              where l1    is the number of complete fragments
                                                                                             n
codeword length lr   log 2 M  , as demonstrated in Figure
                                                                                 containing only bits of the source syncword (which may be
3. Therefore, the probability of bit error in the refined                        affected by errors).
sequence after majority processing of lmax received                                  Estimates (1) and (2) are formed by replacing the
fragments can be estimated as follows:                                           fragment that contains noise bits and bits of the syncword
               l 3                                                              with a fragment that contains only noise bits, as well as
    for L  n  max  :                                                           taking into account that p0  0.5 .
                   2
               Cli p0i 1  p0 l1  i                                           Paper [34] defines that for M  8 and p0  0.4 , the
               1
               l1                                                
      p  
        *                                                                        value of lmax  75 . For parameters M  8 and p0  0.4 , the
                                                       lmax  l1     (1)
                      lmax  l1

               j  l 
                                    Clmax  l1  0.5 
        0
          i0  
                                      j
                                                                               graph showing the dependence of the estimated probability
                     max 1 2  i                               
                                                                                 of bit error in the refined sequence R on the value of
                   l 3
    and for L  n  max  :                                                       L   0;75  24 is presented in Figure 4.
                       2




Figure 4: The estimated probability of bit error in the refined sequence on the number of syncword bits in the sliding
window for M  8 and p0  0.4




                                                                            42
The graph has a stepped nature due to the simplifying upper                                Proof.
estimates (1) and (2). At the same time, at L  0 , the value                              We will use Figure 3. Since the number of bits of the
is p0*  0.5 , and at L  1800 , the value is p0*  0.0396 .                            source syncword L in the sliding window is generally not
    To calculate the exact value of the obtained probability                                                                                  L
                                                                                        a multiple of the fragment length lr  M , in L     n
of bit error in the refined sequence, the following statement                                                                                 n
can be used.                                                                            cases out of n в the formation of a bit based on the majority
    Theorem 1. The probability of bit error in the refined                                                 L
sequence R after receiving L bits of the source syncword                                principle involves    1 bits of the source syncword and
                                                                                                           n
is equal to:
                                                                                               L                                            L
                                                                                        lmax     1 bits of noise. Accordingly, in n  L     n
                             l 1                                                               n
                                                                                                                                            n
    1.            for L  n  max :
                                2                                                       cases out of n the formation of a bit based on the majority
                                                                                                           L
                               L                                                      principle involves   bits of the source syncword and
         p  1  l1   
           *
           0                                                                                               n
                               n
                                                                                                L
                C p 1  p0 l1  i 
                   i    i                                                               lmax    bits of noise. Consider that a bit error occurs
            l1  l1 0                                                                          n
                    lmax  l1
                                                       lmax  l1 
                                                                                       when the number of errors in the corresponding bits of the
                j  l 
          i 0                     Clmax  l1  0.5
                                       j
                                                                 
                      max 1 2  i                                                                                                       l 1
                                                                      ,      (3)        accumulated fragments is not less than the value of max
           L                                                                                                                                 2
            l1                                                                     . Then we can obtain the necessary expressions (3) and (4)
           n        
                                                                                                                                       l 1
              Cli 1 p0i 1  p0 l1 1 i                                           for the bit error probability for L  n  max           and
              1
           l1 1                                                                                                                        2
                 l     l  1
                                                         lmax  l1 1 
                                                                        ;
                                                                                                 l 1
                     max    1


              j  l 
        i 0                      Clmax  l1 1  0.5
                                      j
                                                                                       L  n  max      respectively. ■
                     max 1 2  i                                                                2
                                lmax  1                                                     The graph showing the dependence of the probability of
    2.     for L  n                       :
                                    2                                                   bit error in the refined sequence R on the value of
                                                                                         L   0,75  24 at M  8 and p0  0.4 is presented in
            L          
   p0*    l1                                                                       Fig. 5.
            n          
                 C               0.5 max 1                      
                    i                    l  l 1
    lmax  l1 1  lmax  l1 1                                     
                       l1  1
                                                           l1 1 j 
                                                                       
                  j  l 
       i 0                          Cl1 1 p0 1  p0 
                                          j     j
                                                                    
                        max 1 2  i                                      (4)
                                                                         ,
                  L
    1  l1   
                  n
          Cli  l  0.5 lmax  l1                
          max 1
      lmax  l1                                     
                  l1
                                             l1  j 
                                                     .
    i 0         
          j   l 1 2  i
                             Cl1 p0 1  p0  
                               j j
                                                    
                 max                               




Figure 5: The probability of bit error in the refined sequence on the number of syncword bits in the sliding window for
M  8 and p0  0.4




                                                                                   43
To estimate the probabilities of correct and false                                            The graphs of functions (5) and (6) as a function of L at
synchronization, we will use the expressions defined in [26]:                                 M  8 and p0  0.4 are presented in Error! Reference
                                        dlim
       Ptrue  n, d lim , p0 , L    Cnv  p0*  1  p0* 
                                                         v              nv
                                                                                              source not found. and Figure 7.
                                        v 0                                     (5)              Figure 6 and Figure 7 show that the probability of
 ,                                                                                            correct synchronization increases from 0.0033 for L  0 to
       Pfalse  n, d lim , p0 , L                                                           0.9997 for L  1800 , while the probability of false
               dij                v  dij  dlim C w  p* v  w                         synchronization decreases from 0.076 for L  0 to
          n 1
                               v 
                                                    n  dij
                                                                           
           Cdij  
                                                              0
                                                                                  (6)         1.198  106 for L  1800 .
                                                                n  w v  
         j 1  v  dij  d lim    w  0  1  p0        *
                                                                                                 For experimental confirmation of the dependencies
                                                                         
                                                                                              Ptrue  24,5,0.4, L  and Pfalse  24,5,0.4, L  , a computer
 .
     For the syncword    000,001,111,011,010,101,100,110                                  simulation modeling of the frame synchronization system
                                                                                              operation process was performed and the relative
expression                     (5)             takes                  the        form:
                           5
                                                                                              frequencies Wtrue  24,5, 0.4, L  and W false  24,5,0.4, L  of
Ptrue  24,5, p0 , L    C     v
                                 24    p  1  p 
                                        * v
                                        0
                                                     * 24  v
                                                     0
                                                                ,                 and
                                                                                              both correct and false synchronization were determined. For
                          v 0

Error! Reference source not found. transforms to                                              each value, 1000 tests were performed. The graphs of the
                                                                                              studied dependencies are presented in Figure 8 and Figure
                                    v  7 C w  p* v  w  
                               12                                                             9.
Pfalse  24,5, p0 , L   19 C12v                                  
                                              12       0

                             v7
                                   
                                    w  0  1  p0    * 24  v  w 
                                                                      
                                                                     
    14
             v 9
                                                      
2 C14v   C10w  p0*  1  p0* 
                            v  w         24  v  w
                                                      
   v 9      w 0                                    
     16
             v 11
                                                      
2  C16v   C8w  p0*  1  p0* 
                             v  w         24  v  w
                                                      .
   v 11     w 0                                    




Figure 6: Estimated probability of correct synchronization on the number of syncword bits in the sliding window for M  8
and p0  0.4




Figure 7: Estimated probability of false synchronization on the number of syncword bits in the sliding window for M  8
and p0  0.4




                                                                                         44
Figure 8: Dependencies Ptrue  24,5,0.4, L  and Wtrue  24,5, 0.4, L 




Figure 9: Dependencies Pfalse  24,5,0.4, L  and W false  24,5,0.4, L 

A comparative visual assessment of Ptrue  24,5,0.4, L  and                                                                       P
                                                                                                      The probability true _ final of false synchronization
Wtrue  24,5,0.4, L  , as well as                Pfalse  24,5,0.4, L         and                    after receiving L bits of the syncword is estimated
W false  24,5,0.4, L  , indicates the correctness of expressions                                     from above by the sum of the probabilities of false
                                                                                                       synchronization for all values of the accumulated
(5) and (6), as well as the adequacy of the developed model.
     By analogy with [26]:                                                                             syncword bits less than L :
                                                                                                        Ptrue _ final  n, dlim , p0 , L   Ptrue  n, d lim , p0 , L    (8)
                                                                                                                                                                         .
                                              Ptrue _ final
         The         probability                                    of        correct            Thus, the probability of false synchronization turns out
          synchronization after receiving L bits of the                                       to be unacceptably high. Figure 10 presents the results of an
          syncword is estimated below by the probability:                                     experimental study of the relative frequency of true Wtrue
           Ptrue _ final  n, d lim , p0 , L   Ptrue  n, d lim , p0 , L       (7)         and false W false synchronization for M  8 and p0  0.4 .
                                                                             ;




Figure 10: Relative frequency of correct and false synchronization on the number of syncword bits in the sliding window
for M  8 and p0  0.4



                                                                                         45
2.2. Parameters of the algorithm for                                                                             L  1     
                                                                                                          p0*       l1  
     reducing the probability of false                                                                          K  n      
     synchronization                                                                                              Cli l 1  0.5l  l1 1                    
                                                                                                                  1
                                                                                                            l  l1 1                                            
One way to reduce the probability of false synchronization                                                             l1 1
                                                                                                                                                        l1 1 j 
                                                                                                                                                                    
                                                                                                                  j  l
                                                                                                            i0                    Cl1 1 p0 1  p0 
                                                                                                                                       j      j
                                                                                                                                                                 
is to increase the number of K blocks of l fragments.                                                                     1 2  i                              
                                                                                                                                                                                  (12)
     The approach to increasing the K value [26] involves                                                              L 1
receiving K blocks consisting of l fragments of n bits.                                                     1  l1      
                                                                                                                       K  n 
For each block, the refined sequences Rk , k  1, K  are                                                       Cli l  0.5l  l1                    
                                                                                                                 1
                                                                                                            l  l1                                        
independently calculated. If all sequences Rk , k  1, K                                                             l1
                                                                                                                                                   l1  j 
                                                                                                                                                           ,
                                                                                                                 j  l
                                                                                                           i 0                  Cl1 p0 1  p0  
                                                                                                                                     j j

correspond to the same syncword shift, the decision device                                                                                                
                                                                                                                        1 2  i                        
of the frame synchronization system decides to establish
                                                                                                          L 
synchronization.                                                                              where l1      .
    According to [26, 34], the probability of false                                                      K n
                                                                                                 To ensure that the probability of false synchronization
synchronization for K blocks of l fragments
                                                                                              does not exceed its threshold value Pfalse _ max , that the
         Pfalse  n, d lim , p0 , L, l , K  
                                                                           K
                                                                                              probability of correct synchronization is at least its
                                                n  dij  p0 
             dij
            n 1                v  dij  dlim C w          * vw 
                                                                        (9)                  threshold value Ptrue _ min , and that correct synchronization
            
        Cdij              v                                        
                                                            n v  w 
       j 1  v  dij  d lim
            
                                    w0  1  p
                                                 0    *                                   occurs as quickly as possible, it is necessary to determine a
                                                                                              pair    of     K      and      l      values,    for   which
monotonically decreases with the increase in both K and
                                                                                              Pfalse _ final  n, d lim , p0 , L, l , K   Pfalse _ max ,
l values. On the other hand, the probability of correct
synchronization                                                                               Ptrue _ final  n, d lim , p0 , L, l , K   Ptrue _ min , and K  l takes its
         Ptrue  n, d lim , p0 , L, l , K                                                   minimum value. In this case, Pfalse _ final  n, d lim , p0 , L, l , K 
          Ptrue
             K
                  n, d lim , p0 , L                                                        and Ptrue _ final  n, d lim , p0 , L, l , K  are estimated as follows:
                                                       K
                                                                                  (10)
                                    nv                                                               Pfalse _ final  n, dlim , p0 , L, l , K  
              dlim
            Cnv  p0*  1  p0*  
                          v


            v  0                                                                                         L                                                                        (13)
                                                                                                          Pfalse  n, dlim , p0 , j, l , K ;
also monotonically decreases with the increase in K , but                                                  j 0
increases with the increase in l . At the same time,
                                                                                                        Ptrue _ final  n, d lim , p0 , L, l , K  
L   0; lr  M  l  K  , and the probability of bit error in the                                                                                                                   (14)
                                                                                                         Ptrue  n, d lim , p0 , L, l , K  .
refined sequences Rk after receiving L syncword bits from
                                                                                                   Let ltrue _ min  K  be the minimum number of fragments
the source can be estimated by modifying expressions (3)
and (4) as follows:                                                                           in        each              of       the          K         blocks,          at        which
                                                                                              Ptrue _ final  n, d lim , p0 , Lmax  K  , ltrue _ min  K  , K   Ptrue _ min ,
                  L       l 1
    3.        for    n       :                                                            Lmax  K   lr  M  ltrue _ min  K   K .               Then          the     task        of
                  K         2
                                                                                              determining the pair of                         K ; l  values consists of the
                             L 1                                                          following:
              p0*  1  l1      
                             K  n
                                                                                                   5.         n , dlim , p0 values are specified, and K  1 is
                     Cli p0i 1  p0 l1  i               
                     1
                     l1                                                                                      accepted;
                         l  l
                                                      l  l1 
                                                               
                                                                                                              ltrue _ min  K  value is calculated to satisfy
                                 1


                     j  l
               i 0                  Cl  l1  0.5  
                                          j                                                        6.
                                                             
                                                                                                              Ptrue _ final  n, d lim , p0 , Lmax  K  , ltrue _ min  K  , K  
                             1 2  i
                                                                               (11)
                 L  1     
                    l1                                                                                   Ptrue _ min , where Lmax  K   lr  M  ltrue _ min  K   K
                K  n      
                                                                                                              ;
                     Cli 1 p0i 1  p0 l1 1 i                  
                     1
                   l1 1                                                                          7.         if        Pfalse _ final  n, dlim , p0 , Lmax  K  , ltrue _ min  K  , K  
                        l  l  1
                                                           l  l1 1 
                                                                       ;
                                                                                                                 Pfalse _ max is satisfied, the pair of  K ; ltrue _ min  K  
                                1


                     j  l
               i 0                   Cl  l1 1  0.5 
                                           j
                                                                     
                             1 2  i                               
                                                                                                              values can be used as necessary parameters for the
                  L       l 1                                                                              synchronization procedure;
    4.        for    n       :
                  K         2                                                                    8.         if Pfalse _ final  n, dlim , p0 , Lmax  K  , ltrue _ min  K  , K  
                                                                                                                 Pfalse _ max , an algorithm for determining  K ; l 
                                                                                                              transits to step 2, incrementing the value of K by
                                                                                                              one.


                                                                                         46
We will compute the ltrue _ min  K  values for K  1, 2,3,...                             Table 1. In this case, we will assume Ptrue _ min  0.9997 ,
for the specified parameters and summarize the results in                                   Pfalse _ max  0.0003 .
Table 1
Characteristics of the algorithm for reducing the probability of false synchronization
                                            Characteristics                                                              Value
                                                  K                                                  1        2           3                  4
                                             ltrue _ min  K                                        75      81           83                 85

                     Pfalse _ final  n, dlim , p0 , Lmax  K  , ltrue _ min  K  , K             1      0.182      7.4 ·10-4          2.9·10-6


                         Pfalse _ final  n, dlim , p0 , L, ltrue _ min  K  , K          indicate the behaviour of the estimate (13) and demonstrate
Graphs of dependencies                                                                      the numerical values of the estimate (13) given in Table 9.
Pfalse _ final
               on L for various K , presented in Fig. 11,




Figure 11: Estimation of the probability of false synchronization on the number of syncword bits in the sliding window for
M  8 and p0  0.4 for different K values

Based on the values presented in Table 1, for the considered                                    2.        Analogous to the procedure of frame
example with M  8 , p0  0.4 , Ptrue _ min  0.9997 , and                                                synchronization, for each letter, the transmitter
                                                                                                          sends and the receiver receives, accumulates, and
Pfalse _ max  0.0003 , it is sufficient to choose the K  4 value.
                                                                                                          analyses l fragments of n-bit each.
    Another potential method for reducing the probability                                       3.        For each letter, the refined sequence Rj, j ∊ [1,N], is
of false synchronization could be to decrease the maximum                                                 computed using the majority processing of the
distance dlim to the syncword shifts used in identifying the                                              received bits.
refined sequence R. However, reducing dlim leads to a                                           4.        For each refined sequence Rj, the Hamming
decrease in the probability of correct synchronization,                                                   distances to the letters used by the source are
which necessitates increasing the accumulation coefficient                                                calculated. If the distance does not exceed dlim, the
l. This approach may be effective; however, it is not                                                     jth symbol of the word W is associated with the
considered in this paper.                                                                                 corresponding alphabet letter.
                                                                                                5.        If the received word is a permutation of the letters
3. Algorithm for reliable                                                                                 of the alphabet used by the source, and this
   transmission of permutations                                                                           permutation is used by the source, the word is
                                                                                                          accepted, and the process of recognizing the next
Frame synchronization establishment initiates the next                                                    word begins.
stage of the protocol, the reliable transmission of
permutations.                                                                                    It        should            be       noted   that     the    function
    The algorithm for reliable transmission of permutations                                 Ptrue _ final  n, d lim , p0 , L, l , K  monotonically increases with an
based on method [28] consists of the following:
                                                                                            increase in L and, for example, at L  4432 the value is
     1.     The transmitter sends into the communication                                    Ptrue  24,5,0.4, L,85,4   0.5 , while at L  5640 the value is
            channel a permutation-word W consisting of N
                                                                                            Ptrue  24,5,0.4, L,85,4   0.9 .          Considering             that
            symbols-letters Lj, 1 ≤ j ≤ N. Each letter is a
            circular bit shift of permutation π of length M,                                Pfalse _ final  24,5,0.4, L,85, 4   2.9  10 , this leads to the
                                                                                                                                        6


            which has the maximum value of the minimum                                      conclusion that there will be a 90% probability of correct
            Hamming distance from its n-bit binary                                          synchronization being established after receiving 5640
            representation to all its circular shifts.


                                                                                      47
fragments containing bits of the source’s synchronization                     Conference on Acoustics, Speech and Signal
word. Since 8160 – 5640 = 2520, n = 24, in 90% of cases, the                  Processing (ICASSP) (2018) 6608–6612. doi:
reliable reception procedure for the permutation, which                       10.1109/ICASSP.2018.8461650.
follows the synchronization procedure and is initiated by              [4]    C. Feng,         H. Wang,       Secure       Short-Packet
the fact of establishing synchronization, will utilize the                    Communications at the Physical Layer for 5G and
shifted boundaries of the data block used for transmitting a                  Beyond (2021). doi: 10.48550/arXiv.2107.05966.
single permutation (synchronization was completed earlier,             [5]    C. Feng, H.-M. Wang, H. V. Poor, Reliable and Secure
the recognition of the permutation began sooner, while the                    Short-Packet Communications, IEEE Trans. Wireless
synchronization words are still being transmitted in the                      Commun.           21(3)    (2022)     1913–1926.     doi:
channel).                                                                     10.1109/TWC.2021.3108042.
     Such desynchronization leads to a decrease in the                 [6]    R. Aleksieieva, et al., Software Tool for Ensuring Data
efficiency of the permutation recognition procedure, which                    Integrity and Confidentiality Through the Use of
needs to be compensated for with additional procedures.                       Cryptographic Mechanisms, in: 5th International
The development of such procedures requires separate                          Workshop          on    Modern      Machine     Learning
research and is beyond the scope of this study.                               Technologies and Data Science, vol. 3426 (2023) 259–
                                                                              273.
4. Conclusions                                                         [7]    E. V. Faure, Factorial Coding with Error Correction,
                                                                              Radio Electronics, Computer Science, Control, 3 (2017)
The completed study has led to the development of                             130–138. doi: 10.15588/1607-3274-2017-3-15.
algorithms for the protocol of reliable permutation                    [8]    O. A. Borysenko, et al., Noise-Immune Transfer of
transmission for simplex data transmission systems with                       Decimal Data with Protection Based on Permutations,
non-separable factorial coding under conditions of high                       in: IEEE 13th International Conference on Electronics
noise intensity in the communication channel. To achieve                      and Information Technologies (ELIT) (2023) 248–251.
this, it was considered the problem of joint application of                   doi: 10.1109/ELIT61488.2023.10310685.
the frame synchronization algorithm, which uses as a                   [9]    O. Borysenko, Protection of Numerical Information
syncword a permutation with the maximum value of the                          Based on Permutations, in: 3rd International Scientific
minimum Hamming distance from its binary representation                       and Practical Conference “Information Security and
to all its circular shifts, as well as the reliable permutation               Information Technologies”, vol. 3200 (2021) 62–67.
transmission algorithm. The adaptation of the frame                    [10]   O. Borysenko et al., Factorial Numbers and Their
synchronization algorithm for simplex communication                           Practical Applications, Appl. Sci. 14(19) (2024) 8588.
systems with an unknown moment of the start of receiving                      doi: 10.3390/app14198588.
syncwords from the transmitter has necessitated the use of             [11]   B. Lee, et al., Packet Structure and Receiver Design for
a sliding window.                                                             Low Latency Wireless Communications with Ultra-
     An example of the reliable permutation transmission                      Short Packets, IEEE Trans. Commun. 66(2) (2018) 796–
protocol algorithms has been considered for a                                 807. doi: 10.1109/TCOMM.2017.2755012.
communication channel error probability p0 = 0.4. The                  [12]   H. Lee, Y.-C. Ko, Physical Layer Enhancements for
defined parameters of the proposed algorithms made it                         Ultra-Reliable Low-Latency Communications in 5G
possible to conduct a simulation of the frame                                 New Radio Systems, IEEE Comm. Stand. Mag. 5(4)
synchronization process. The obtained simulation results                      (2021) 112–122. doi: 10.1109/MCOMSTD.0001.2100002.
confirmed the theoretical estimates.                                   [13]   J. Park, et al., Extreme Ultra-Reliable and Low-Latency
     The identified problem areas related to the detection of                 Communication, Nat Electron, 5(3) (2022) 133–141.
syncword and data word boundaries have allowed for the                        doi: 10.1038/s41928-022-00728-8.
formulation of pathways for further research.                          [14]   Y. Li, et al., Unmanned Aerial Vehicle‐Aided Edge
                                                                              Networks         with     Ultra‐Reliable     Low‐Latency
Acknowledgments                                                               Communications: A digital twin approach, IET Signal
This research was funded by the Science Committee of the                      Processing,        16(8)     (2022)      897–908.    doi:
Ministry of Science and Higher Education of the Republic of                   10.1049/sil2.12128.
Kazakhstan (Grant No. AP23489168).                                     [15]   A. Traßl, et al., Outage prediction for ultra-reliable
                                                                              low-latency communications in fast fading channels,
References                                                                    J. Wireless Com. Netw. 2021(92) (2021). doi:
                                                                              10.1186/s13638-021-01964-w.
[1]   E. V. Faure, Factorial Coding with Data Recovery,                [16]   K. Wang, et al., Packet Error Probability and Effective
      Bulletin of Cherkasy State Technological University, 2                  Throughput for Ultra-Reliable and Low-Latency UAV
      (2016) 33–39.                                                           Communications, IEEE Trans. Commun. 69(1) (2021).
[2]   J. S. Al-Azzeh, et al.,, Telecommunication Systems                      doi: 10.1109/TCOMM.2020.3025578.
      with Multiple Access Based on Data Factorial Coding,             [17]   R. Odarchenko, Evaluation and Improvement of QoE
      International Journal on Communications Antenna                         and QoS Parameters in Commercial 5G Networks: 5G-
      and Propagation (IRECAP), 10(2) (2020) 102–113. doi:                    TOURS Approach, IJC (2023) 462–474. doi:
      10.15866/irecap.v10i2.17216.                                            10.47839/ijc.22.4.3353.
[3]   A.-S. Bana, et al., Short Packet Structure for Ultra-            [18]   X. Li, et al., Blocklength Allocation and Power Control
      Reliable Machine-Type Communication: Tradeoff                           in UAV-Assisted URLLC System via Multi-agent Deep
      between Detection and Decoding, IEEE International

                                                                  48
       Reinforcement Learning, Int. J. Comput. Intell. Syst.           [34] E. V. Faure, B. A. Stupka, Evaluation of Frame
       17(138) (2024). doi: 10.1007/s44196-024-00530-8.                     Synchronization Efficiency for Non-Separable
[19]   B. Schneier, Applied Cryptography: Protocols,                        Factorial Codes Depending on Synchronization
       Algorithms, and Source Code in C, 2nd ed. New York:                  Parameters, Èlektron. Model. 44(6) (2022) 21–35. doi:
       Wiley (1996).                                                        10.15407/emodel.44.06.021.
[20]   D. M. Nguyen, S. Kim, A Quantum Three Pass
       Protocol with Phase Estimation for Many Bits
       Transfer, International Conference on Advanced
       Technologies for Communications (ATC) (2019) 129–
       132. doi: 10.1109/ATC.2019.8924514.
[21]   A. Badawi, M. Zarlis, S. Suherman, Impact Three Pass
       Protocol Modifications to key Transmission
       Performance, J. Phys.: Conf. Ser. 1235 (2018). doi:
       10.1088/1742-6596/1235/1/012050.
[22]   A. Moldovyan, D. Moldovyan, N. Moldovyan, Post-
       Quantum Commutative Encryption Algorithm,
       Comput. Sci. J. Moldova, 81(3) (2019) 299–317.
[23]   A. Shcherba, E. Faure, O. Lavdanska, Three-Pass
       Cryptographic Protocol Based on Permutations, IEEE
       2nd International Conference on Advanced Trends in
       Information Theory (ATIT) (2020) 281–284. doi:
       10.1109/ATIT50783.2020.9349343.
[24]   E. Faure, et al., Method of Cyclic Synchronization
       Based on Permutations, Bulletin of Cherkasy State
       Technological University, 4 (2020) 67–76. doi:
       10.24025/2306-4412.4.2020.222439.
[25]   E. Faure, A. Shcherba, B. Stupka, Permutation-Based
       Frame Synchronisation Method for Short Packet
       Communication Systems, in: 11th IEEE International
       Conference on Intelligent Data Acquisition and
       Advanced Computing Systems: Technology and
       Applications (IDAACS) (2021) 1073–1077. doi:
       10.1109/IDAACS53288.2021.9660996.
[26]   J. Al-Azzeh, et al., Permutation-based Frame
       Synchronization Method for Data Transmission
       Systems with Short Packets, Egyptian Informatics J.
       23(3) (2022) 529–545. doi: 10.1016/j.eij.2022.05.005.
[27]   J. Al-Aazzeh, et al., Efficiency Assessment of the
       Permutation-based Frame Synchronization Method,
       Int. J. Commun. Antenna Propagation, 13(4) (2023).
       doi: 10.15866/irecap.v13i4.23567.
[28]   E. Faure, et al., A Method for Reliable Permutation
       Transmission in Short-Packet Communication
       Systems, Information Technology for Education,
       Science, and Technics, 178 (2023) 177–195. doi:
       10.1007/978-3-031-35467-0_12.
[29]   D. E. Knuth, The Art of Computer Programming:
       Introduction to Combinatorial Algorithms and
       Boolean Functions, vol. 4A. Upper Saddle River, NJ:
       Addison-Wesley (2008).
[30]   I. Yoshinori, Majority Circuit, JPH01296825A (1989).
[31]   T. J. Terrell, L.-K. Shark, Digital Signal Processing.
       London: Macmillan Education UK (1996). doi:
       10.1007/978-1-349-13735-0.
[32]   L. Tan,     J. Jiang,   Digital   Signal     Processing,
       Fundamentals and Applications, 3rd ed. Elsevier (2019).
       doi: 10.1016/C2017-0-02319-4.
[33]   G. Galati, G. Pavan, C. Wasserzier, Signal Design and
       Processing for Noise Radar, EURASIP J. Adv. Signal
       Process. 52 (2022). doi: 10.1186/s13634-022-00884-1.




                                                                  49