Ensuring the security of professional radio communication systems in critical information structures

Annotation. Some existing and expected in the near future scenarios of unauthorized impacts on communication systems in critical information structures are considered. It is demonstrated that the area of increased risk of unauthorized impacts is focused on the interfaces between the peripheral devices and the SoC chip. Several examples of organizing multiple subscriber terminals into groups operating under a single program of unauthorized influence, in which the level of penetration can increase many times, are given. It is noted that such opportunities are real in the transition to 5G generation systems, which assume the M2M mode of operation.

Download in .pdf

Request call

I agree to the privacy policy that I have read

* Necessarily

Your message has been sent successfully