ISSN 0021-3454 (print version)
ISSN 2500-0381 (online version)

vol 63 / September, 2020

DOI 10.17586/0021-3454-2020-63-8-702-710

UDC 004.056.4


M. O. Tanygin
South-West State University, Department of In-formation Security; Head of the Department;

Abstract. The problem of reducing information redundancy when exchanging data in networks with a long range and low power consumption is analyzed. The approach under consideration is based on reduction of the size of additional service fields that determines the information packet source and its number in the single message. To increase the entropy of these additional service fields, it is proposed to write in them a hash formed from data from other information packets of the source and the source unique identifier. A formalized algorithm for analyzing incoming information packets by the receiver which allows deter-mining the source of the information packet is described. The problem of an error in determining the se-quence number of a fragment in a single message is formulated. Based on the mathematical apparatus of the probability theory, numerical characteristics of such type of error are derived, and its influence on the information redundancy is estimated. Dependencies between the additional hash field length and number of the transmitted message fragments are presented, and the range of the values providing the minimum information redundancy is determined.
Keywords: messages source determination, probability theory, hash, packet order violation, algorithm parameters, information redundancy

  1. (in Russ.)
  2. (in Russ.)
  3. 802.15.4-2015 – IEEE Standard for Low-Rate Wireless Personal Area Networks, IEEE Computer So-ciety. DOI:10.1109/ieeestd.2016.7460875.
  4. Lodneva O.N., Romasevich E.P. Modern Information Technologies and IT-education, 2018, no. 1(14), pp. 149–169. (in Russ.)
  5. Zaytsev V., Sokolov N. Pervaya milya, 2017, no. 4, pp. 44–47. (in Russ.)
  6. Papadimitratos P., Haas Z.J. Ad Hoc Networks, 2003, no. 1, pp. 193–209.
  7.  Ben Othman S., Alzaid H., Trad A., Youssef H. IISA, 2013. DOI:10.1109/iisa.2013.6623701.
  8. Hayouni H., Hamdi M., Kim T. Wireless Communications and Mobile Computing Conference (IWCMC), 2015, рр. 1193–1198.
  9. Wang W., Wang D., Jiang Y. Ad Hoc Networks, 2016. DOI: 10.1016/j.adhoc.2016.10.003.
  10. Stallings W. Cryptologia, 2010, no. 34, pp. 225–235.
  11. Black J., Rogaway P. Cryptologia, 2015, no. 2(18), pp. 111–131.
  12. Tanygin M.O., Alshaia Kh.Ya., Altukhova V.A. Telekommunikatsii (Telecommunications), 2019, no. 3, pp. 12–21. (in Russ.)
  13. Arsen'yev V.N., Silant'yev S.B., Yadrenkin А.А. Journal of Instrument Engineering, 2017, no. 5(60), pp. 391–397.
  14. Tanygin M.O., Tipikin A.P. Telecommunications and Radio Engineering, 2007, no. 5(66), pp. 453–463.
  15. Korn G.A., Korn T.M. Mathematical handbook: For scientists and engineers, NY, McGraw-Hill, 1968.