Secrecy of Communications in Data Transmission by Impulses with Unknown Moments of Appearance and Disappearance

Document Type : Original Article


1 International Laboratory of Statistics of Stochastic Processes and Quantitative Finance, National Research Tomsk State University, Tomsk, Russia

2 Department of Higher Mathematics and System Analysis, Faculty of Electrical Engineering, Maikop State Technological University, Maikop, Russia

3 Department of Electronics and Nanoelectronics, Faculty of Electrical Engineering, National Research University “MPEI”, Moscow, Russia

4 Department of Structural Mechanics and Applied Mathematics, Faculty of Civil Engineering, University of Zilina, Slovak Republic

5 Department of Radio Physics, Faculty of Physics, Voronezh State University, Voronezh, Russia


We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized access by the outsider takes place in the situation when the signal parameters are completely or partially unknown. We then define the degree of the transmitted data secrecy by the secrecy ratio determining how highly the threshold signal-to-noise ratio increases when there is the unauthorized access instead of the authorized one.


1. Asadi Saeed Abad, F., and Hamidi, H., “ An archit ect ure for
securit y and protection of big dat a”, International Journal of
Engineering, Transactions A: Basics, Vol. 30, No. 10, (2017),
2. Mohammadi, A., and Hamidi, H., “ Analysis and evaluat ion of
privacy protection behavior and information disclosure concerns
in online social networks”, International Journal of
Engineering, Transactions B: Applications, Vol. 31, No. 8,
(2018), 1234-1239.
3. Mohammadi, A., and Hamidi, H., “ Analyzing t ools and
algorithms for privacy protect ion and data security in social
networks”, International Journal of Engineering, Transactions
B: Applications, Vol. 31, No. 8, (2018), 1267-1273.
4. Middlet on, D., “An Introduction to St at ist ical Communicat ion
T heory”, New Jersey, Wiley-IEEE Press, (1996).
5. Kay, S. M., “ Fundament als of St at ist ical Signal P rocessing,
Volume II: Det ect ion T heory”, New Jersey, P rent ice Ha ll,
6. Van T rees, H. L., Bell, K. L., and T ian, Z., “ Det ect ion,
Est imat ion, and Modulat ion Theory, Part I, Detect ion,
Est imat ion, and Filtering T heory”, New York, Wiley, (2013).
7. Bart on, D. K., “ Radar Syst em Analysis and Modeling”,
Norwood, Artech House, (2005).
8. Heyde, C. C. “ Quasi-Likelihood And Its Application: A General
Approach to Optimal Parameter Estimat ion (Springer Series in
St at ist ics)”, New York, Springer-Verlag, (1997).
9. Korchagin, Y. E., Chernoyarov, O. V., Salnikova A. V., and
Shakht arin, B. I., “Algorithms for t he detection of a signal wit h
unknown amplit ude and durat ion against whit e noise”, 2015
International Conference on Modeling, Simulation and
Applied Mathematics (MSAM2015), Phuket, Thailand, (2015),
10. Trifonov, A. P., and Korchagin, Y. E., “Optimal recept ion of a
rectangular pulse with unknown appearance and disappearance
t imes”, Radiophysics and Quantum Electronics, Vol. 43, No. 4,
(2000), 245-255.
11. Chernoyarov, O. V., Salnikova, A. V., Rozanov, A. E., and
Marcokova, M., “St atistical characteristics of the magnitude and
locat ion of the greatest maximum of Markov random process
wit h piecewise const ant drift and diffusion coefficient s”,
Applied Mathematical Sciences, Vol. 8, No. 147, (2014), 7341-