Preventions of information leaking in the wireless networks
DOI:
https://doi.org/10.18372/2225-5036.20.6568Keywords:
wireless networks, covering zone, model of propagation of radiowaves, basic station, terminal, availability of information, integrity of information, interception of information, leaking of informationAbstract
In this paper the methodology of prognostication of covering zones for wireless networks was offered, that will be realized in two stages: calculation of middle radius of covering zone and his further clarification by geometrical methods on the separate directions on that are the substantial areas of locality. Underestimation of this factor can be an occasion of absence of receiving signal which to lead to interruption of integrity of information, or can be an occasion of propagation of radiowaves beyond of destination area what create a precondition of leaking or physical interception of information. Obtained results will allow to promote the level of informative integrity, availability and safety of wireless networks due to a removal of propagation of radiowaves out of setting. It will promote reduction of probability of leaking and physical interception of information as well as provision of necessary level of availability and integrity of information.References
Gabrousenko Ye., Zadorozhny R., Stashenko I., Bilous N. Determine the distance stable connection for unmanned aerial vehicle under the influence of city conditions / Electronics and control systems. — Kyiv: NAU, 2013 —№ 1 (35). — P. 122-126.
Габрусенко Є., Павлов В., Захаров Д., Меньша А. Мінімізація розбіжності зон досяжності у напрямах база-термінал та термінал-база систем стільникового зв’язку. Защита информации: сб. науч. тр. — К.: НАУ, 2008. — С. 25-31.
Рекомендації Міжнародного союзу електрозв’язку ITU-R 452-14 (10/2009). — Женева: Сектор радіозв’язку МСЕ, 2009. — С. 4-15.
Рекомендації Міжнародного союзу електрозв’язку ITU — R 368-9 (02/2007). — Женева: Сектор радіозв’язку МСЕ, 2007. — С. 3-54.
Downloads
Published
2014-04-02
Issue
Section
Network & Internet Security