Localization of the illegal information acquisition on the basis of the based on the method of least squares

DOI: 10.31673/2412-4338.2019.045770

Authors

  • О. А. Лаптєв, (Laptiev O. А.) State University of Telecommunications, Kyiv
  • В. А. Савченко, (Savchenko V. A.) State University of Telecommunications, Kyiv

Abstract

The article deals with the development of a mathematical model of the accuracy of direction finding of the means of silent retrieval based on the far-field method using the least-squares method and gradient analysis. For this purpose, as a direction finding parameter, pseudo distances to the direction finder antenna are used. To estimate the magnitude of the decrease in the accuracy of determining the means of silent information retrieval relative to the accuracy of determining the geometric parameter, the concept of geometric factor is used. Gradient analysis methods are used to formulate a model for localizing the means of silent retrieval. The least squares method is used to obtain quantitative characteristics.
A simulation of the probability of finding the means of silent retrieval by the method of least squares based on a gradient analysis for a typical home is conducted. The obtained practical results show that localization with three antennas results in poor results. The premises being inspected have areas where the signal of the non-public information cannot be detected.
The minimum number of directional antennas of the system is determined, which allows detecting the means of silent receiving of information (radio waves source) with an accuracy of 0.5 m of the volumetric parameter, which allows qualitatively neutralizing the signal of the means of silent receiving information or beacons. The minimum number of antennas should be four. The placement of antennas is chosen to maximize spherical coverage of the volume of the controlled home.
These conclusions are confirmed by the simulation results.
Based on the results obtained, it is possible to make recommendations on antenna placement, and on the basis of modeling (proposed in the article model of localization of information mute) to make recommendations regarding the selection of premises for handling confidential information.

Keywords: model, direction finding, localization, direction finder antenna, geometric factor.

References
1. Protection of information. Technical protection of information. Terms and definitions (DSTU 3396.2-97). [Valid from 01/01/1998]. (State Standard of Ukraine).
2. Laptiev O.A, Barabash O.V., Savchenko V.V. Savchenko V.A., Sobchuk V.V., (2019) “The method of searching for digital means of illegal reception of information in information systems in the working range of Wi-Fi.”, ISSN: 2350-0328 International Journal of Advanced Research in Science, Engineering and Technology, July 2019, Vol. 6, Issue 7: 10101-10105. Print.
3. Savchenko V.A, Vorobyov O.M, Mykolaychuk R.A, Kurseietov T. (2016) “Model accuracy of local radio navigation system with consideration of instability of functioning of individual elements.” ISSN 1729-3774 Eastern European Journal of Advanced Technologies, Information and Control system Vol.3, 9 (81): 4-10. Print.
4. Hwang S., Yu D. (2013) “Clock Synchronization Algorithm for Pseudolite.” Advanced Science and Technology Letters. Vol. 44: 36-39. Print. doi: 10.14257/astl.2013.44.09
5. Cellmer S., Rapinski J., Rzepeca Z. (2011) “Pseudolites and their Applications.” INGEO 2011, 5th International Conference on Engineering Surveying. Brijuni, Croatia: 269–278. Print.6. Tiwary K. Behera S. K., Sharada G., Singh A. (2010) “Modeling and Simulation of Pseudolite-Based Navigation: A GPS-Independent Radio Navigation System.” Defense Science Journal, Vol. 60, Issue 5: 541-550. Print.
7. ECC Report 168. Regulatory Framework for Indoor GNSS Pseudolites. Electronic Communications Committee (ECC) (2011), Miesbach: 20. Print.
8. Lorraine, KJ, Kumar D., Bhaskar, CV, Sipora K. (2014) “Analysis of Near-Far Effect and Multipath Mitigation Techniques for Pseudolite Based Positioning Applications.” International Journal of Electronics & Communication Technology. Vol. 5, Issue 3: 37-41. Print.
9. Hwang, S., Yu D. (2014) “Clock Synchronization of Pseudolite Using Time Transfer Technique Based on GPS Code Measurement.” International Journal of Software Engineering and Its Applications. Vol. 8, Issue 4: 35-40. Print.
10. Borio, D. Gioia C., Baldini G. (2016) “Asynchronous Pseudolite Navigation Using C . N0 Measurements.” Journal of Navigation, Vol. 69, Issue 03: 639-658. Print. doi: 10.1017/ s037346331500082x
11. Laptev O.A. (2019) “A technique for determining the likelihood of unspoken information being received by a potential intruder.” Science and Education a New Dimension. Natural and Technical Sciences, VII (24), Issue: 200, 2019 July. www.seanewdim.com: 27-31.
12. Laptev A.A., Sachenko V.A, Barabash O.V, Sachenko V.V, Matsko A. (2019) “The method of searching for digital vtfns of illegal information retrieval on the basis of cluster analysis.” No.31 ISSN 1748-7110 Magyar Tudományos Journal (Budapest, Hungary): 33-37. Print.

Published

2020-01-13

Issue

Section

Articles