An algorithm for searching for matches in parallel generated list structures for tasks of determining the source of messages of limited length


Аuthors

Tanygin M. O.1*, Poskanny M. V.1**, Trokoz D. A.2***, Titov V. S.1****

1. South-Western State University, Kursk, Kursk, Russian Federation
2. JSC "R7", Nizhny Novgorod, Russian Federation

*e-mail: tanygin@yandex.ru
**e-mail: mposkannyy@bk.ru
***e-mail: dmitriy.trokoz@gmail.com
****e-mail: tas_06@mail.ru

Abstract

The objective of the study is to develop a mathematical model for placing data in the memory of a receiver that determines the source of incoming data packets based on group coding or coding in block chaining mode. This allows designing an algorithm for searching for data elements in dynamically generated structures of intermediate results that searches for the required element taking into account the probability of placement in the receiver's memory elements. The purpose of this search is to increase the probability of correctly determining the source and is required when performing the procedure for transferring each data packet for which its source has been determined. After this, the pointer to this data packet must be removed by the receiver from all structures of intermediate results generated for other sources, as a pointer to a deliberately extraneous data packet. The process of receiving data packets and writing them to the internal memory was presented as a set of two independent random Markov processes of receiving an authentic packet and receiving packets generated by extraneous sources. Based on the created model, numerical values of the probabilities of placing authentic and extraneous packets in the register matrix of intermediate results were obtained. This made it possible to formulate the conditions for the applicability of the developed element search algorithm depending on the length of the authentication code and the number of information sources generating data for the receiver, and also serves as the basis for designing adaptive element search algorithms depending on the intensity of packets arriving at the receiver from various sources.

Keywords:

dynamic structure, target source, graph, receiver

References

  1. Liberg Olof, Sundberg Marten, Wang Eric et al. Cellular Internet of Things: Technologies, Standards, and Performance. Academic Press, 2017
  2. Shi, X. A reversible watermarking authentication scheme for wireless sensor networks / X. Shi, D. Xiao // Information Sciences. – 2013 – Vol. 240 – P. 173-183. – DOI:10.1016/j.ins.2013.03.031
  3. Letfullin I.R. Standards and technologies of short-range wireless communication networks // Proceedings of MAY 2022. No. 124 Trudy MAI, 2022, No. 124, https://cyberleninka.ru/article/n/standarty-i-tehnologii-besprovodnyh-setey-svyazi-blizhnego-radiusa... , DOI: 10.34759/S-2022-124-14
  4. Verevkin S.A. Trofimova N.A. An approach to developing a model for testing network characteristics of an organization's telecommunications infrastructure // Izvestiya TuzGu, Technical Sciences 2024, Issue 9, https://cyberleninka.ru/article/n/podhod-k-razrabotke-modeli-dlya-testirovaniya-setevyh-harakteristi... , DOI: 10.24412/2071-6168-2024-9-340-341
  5. Leading the world in avionics interface solutions // Arinc 429 protocol tutorial) 2004, https://web.archive.org/web/20101214063528/http:/www.acalmicrosystems.co.uk/whitepapers/sbs7.pdf
  6. Digital Time Division Command/Response Multiplex Data Bus, MCCR 1996, https://web.archive.org/web/20090206112915/http:/assist.daps.dla.mil/quicksearch/basic_profile.cfm?i...
  7. V.V. Pochinok, R.S. Sherstobitov, A.P. Telenga, T.V. Lebedkina, V.V. A model of the process of monitoring the correctness of packet fragmentation in a departmental data transmission network // Kuchurov Krasndar Higher Military School named after Army General S.M. Shtemenko, Engineering Bulletin of the Don No. 5 2020, https://cyberleninka.ru/article/n/model-protsessa-monitoringa-korrektnosti-fragmentatsii-paketov-v-v...
  8. Vasiliev V.A. Fedyunin P.A. Danilin M.A. Vasiliev A.V. Problematic issues of the organization of information support for the management of strike aviation complexes // Proceedings of MAI. Issue No. 105, 2019, UDC 623.465.5
  9. A.V. Borisov1, S. I. Gurov2, K. V. Semenikhin3, R. L. Smelyansky 4, E. P. Stepanov5 On the issue of packet recovery at the transport level // VESTN. Moscow TIME. UN-TA. SER. 15. COMPUTING MATH. And CYBER. 2025. No. 1. pp. 18-30 Lomonosov Computational Mathematics and Cybernetics Journal, UDC 004.057.4
  10. Mukesh Soni , Dileep Kumar Singh Blockchain-based group authentication scheme for 6G communication network // Physical Communication Volume 57, April 2023, 102005, https://doi.org/10.1016/j.phycom.2023.102005
  11. M.O. Tanygin, A.A. Chesnokova, A.A.A. Akhmad, Increasing the speed of determining the source of messages by limiting the set of processed data blocks // Proceedings of MAI, 2022, No. 125, https://cyberleninka.ru/article/n/povyshenie-skorosti-opredeleniya-istochnika-soobscheniy-za-schet-o... DOI: 10.34759/trd-2022-125-20
  12. Lei-lei Shi, Lu Liu, Yan Wu, Liang Jiang & Ayodeji Ayorinde, Event Detection and Multi-source Propagation for Online Social Network Management // Journal of Network and Systems Management Volume 28, pages 1–20, (2020), https://link.springer.com/article/10.1007/s10922-019-09493-0
  13. Muhammad Tanveer; Ahmed Alkhayyat; Abd Ullah Khan; Neeraj Kumar; Abdullah G. Alharbi, REAP-IIoT: Resource-Efficient Authentication Protocol for the Industrial Internet of Things // Published in: IEEE Internet of Things Journal ( Volume: 9, Issue: 23, 01 December 2022), Page(s): 24453 – 24465, DOI: 10.1109/JIOT.2022.3188711
  14. P.N. Romanov Analysis of list-based decoding methods in modern information exchange systems // Bulletin of NGIEI 2017, UDC 621.391.037.3, https://cyberleninka.ru/article/n/analiz-metodov-dekodirovaniya-po-spiskam-v-sovremennyh-sistemah-ob...
  15. M.O. Tanygin A.A.A. Akhmad A.A. Chesnokova Reduction of resource costs for processing message authentication codes by limiting the number of messages processed // Caspian Journal: Management and High Technologies, No. 4 (60), 2022, UDC 004.052
  16. Julio Cesar Sampaio do Prado Leite1 Edson Andrade de Moraes1 Carlos Eduardo Portela Serra de Castro A Strategy for Information Source Identification // PUC-RIO – Pontifícia Universidade Católida do Rio de Janeiro, https://www.inf.puc-rio.br/wer/WERpapers/artigos/artigos_WER07/Ewer07-leite02.pdf
  17. G.Sh. Tsitsiashvili, M.A. Osipova Investigation of the assembly process of Poisson flows // Bulletin of Tomsk State University 2019 Management, Computer Engineering and Informatics No. 48, UDC 519.218.72, B01: 10.17223/19988605/48/6
  18. A.V. Plugatarev A model for determining the source of messages based on statistical analysis of metadata in an open communication channel // Caspian Journal: Management and High Technologies 2022, DOI 10.54398/20741707_2022_4_30 UDC 004.056.53 https://cyberleninka.ru/article/n/model-opredeleniya-istochnika-soobscheniy-na-osnove-statistichesko...
  19. Nguyen H., Tran N., Nguyen T. "Traffic Modeling in Software-Defined Networks 2020 // A Poisson-Based Approach" IEEE Communications Letters, 23(4), DOI:10.1109/ICACCE49060.2020.9154982, 
  20. M.O. Tanygin, A model for processing messages from multiple sources encoded in the block coupling mode / M. O. Tanygin, M. V. Poskanny // Proceedings of the Southwestern State University. Series: Management, computer engineering, computer science. Medical instrumentation. – 2025. – Vol. 15, No. 1. – pp. 144-156. – DOI 10.21869/2223-1536-2025-15-1-144-156.


Download

mai.ru — informational site MAI

Copyright © 2000-2025 by MAI

Вход