Description: In this article we explored important question – how to provide secure aviation radio traffic of Ukrainian Air Forces. We analyzed functioning of existing radio traffic confidentiality supporting facility and formed main problems, so we proposed to support coverage of voice message semantic part with account of existing facility functioning. We are developing method which supports radio traffic confidentiality on base of inverse – increment coding of voice message spectral representation components in case of key information availability. Driven by software simulation we evaluated proposed method on the side of incoming and modified voice message distortion for authorized user and for enemy. We found out that typical communication system (TCS-2) does not correspond voice message security directives in battle situation condition. Main problem is that there is no distinct syn-chronization between airplane and ground command facility. Also was found out that we need to use memory storage, what causes extra channel traffic load, which has limited carrying capacity. In this article we form requirements to the method. Ac-complishment of these requirements could guarantee closing of semantic component of voice message. Proposed method takes into account all system red lines of facility, which is established on the board of an airplane, and also has synchronization with other airplane, which has a key, or with ground command facility. Due to data value appraisal of modified voice message peak signal-to-noise ratio fractionally to outcome signal we made a conclusion that the data value of peak signal-to-noise ratio for different conditions of created method functioning takes a value lower then audibility cutoff and due to that provides voice mes-sage semantic content confidentiality. The use of this method on the board of an airplane in the battle allows pilot to send and receive secret information and successfully perform assigned for him mission.
Keywords: radio traffic confidentiality, delta-coding, voice message spectrum, key rule.
1.Loginov, V.V., Yashhenok, V.Zh., Kav'yuk, V.V., Berezanskyj, V.G. and Fenenko, O.O. (2016), “Dosvid ta osobly-vosti zastosuvannia aviatsii Povitrianykh Syl Zbroinykh Syl Ukrainy pry provedenni Antyterorystychnoi operatsii” [Information about experience of the use of military units and units of the Armed Forces of Ukraine involved in the anti-terrorist operation in the eastern regions of Ukraine], KNAFU, Kharkiv, 34 p.
2.Alimpiiev, A.M. and Pievtsov, H.V. (2017), “Osoblyvosti hibrydnoi viiny RF proty Ukrainy. Dosvid, shcho otrymanyiPovitrianymy Sylamy Zbroinykh Syl Ukrainy” [Features of the hybrid war of the Russian Federation against Ukraine. The experience gained by the Air Force of the Armed Forces of Ukraine], Scientific Works of Kharkiv National Air Force University, No. 2, pp. 19-25. https://doi.org/10.30748/nitps.2017.27.03.
3.Buriachok, V.L., Hulak, H.M. and Khoroshko, V.O. (2011), “Zavdannia, formy ta sposoby vedennia voien ukibernetychnomu prostori” [Tasks, forms and methods of conducting wars in cybernetic space], Journal of Science and Defense, No. 3, pp. 35-42.
4.The Order of the Ministry of Defense of Ukraine (2016), “Pro zatverdzhennya Pravyl inzhenerno-aviatsiynohozabezpechennya derzhavnoyi aviatsiyi Ukrayiny No. 91 vid 05.07.2016” [On Approval of the Rules of Engineering Aviation Support of State Aviation of Ukraine No. 91 dated 05.07.2016], available at: www.zakon.rada.gov.ua/laws/show/z1101-16/. (accessed 08 August 2016).
5.Sedyshev, J.M. (2010), “Radіoelektronnі sistemi” [Radio electronic systems], Kharkiv, KAFU, 73 p.
6.Melnyk, A.O. and Shevchuk, R.P. (2004), “Porivnialnyi analiz alhorytmiv stysnennia movnykh syhnaliv” [Comparativeanalysis of speech signal compression algorithms], Herald, No. 524, pp.109-116.
7.Stasiuk, O.I. (2011), “Suchasni stehanohrafichni metody zakhystu informatsii” [Modern steganographic methods of information protection], Journal of Information Protection, No. 1(50), pp. 151-153.
8.Yudin, O.K. (2011), “Informatsiina bezpeka. Normatyvno-pravove zabezpechennia” [Informational security. Regulatorylegal framework], NAU, Kyiv, 640 p.
9.Iesin, V.I., Kuznetsov, O.O. and Soroka, L.S. (2013), “Bezpeka informatsiinykh system i tekhnolohii” [Security ofInformation Systems and Technologies], KNU, Kharkiv,436 p.
10.Bekirov, A.E. (2015), ”Metod zashitu informacii na osnove steganografichnih sistem” [Method of protection informations on the basis of steganographic systems], Journal of Science and Military Technics, No. 1, pp. 53-67.
11. Tarnavskyi, Yu.A. (2018), “Tekhnolohii zakhystu informatsii” [Information security technologies], KPI, Kyiv, pp. 67-71.
12. Obod, A.A. and Strelnytskyi, A.A. (2016), “Zakhyst informatsii v merezhi system sposterezhennia povitrianohoprostoru” [Data protection in the network of observation airspace], Information Processing Systems, No. 2(139), pp. 47-49.