FIELD: radio engineering.
SUBSTANCE: invention relates to radio engineering, and in particular to a method for protecting mobile communication devices included in wireless data transmission networks from information and technical influences. To achieve the effect, the signs of information and technical impacts, the emergence of new access points are monitored and the indicated facts are compared. The procedure for authentication in wireless data transmission networks is changed when the signal-to-noise ratio and the number of errors change, as well as blocking data transmission by a mobile device if authentication procedures are violated.
EFFECT: increasing the security of confidential data processed in mobile devices of wireless data transmission networks by controlling changes in parameters characterizing information and technical impacts in the area of operation of the specified network, and making it difficult for an attacker to gain access to mobile devices when these mobile devices are connected to access points created an intruder, when blocking access to legitimate access points.
1 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
CONFIDENTIALITY INDICATORS FOR MANAGING AUTHENTICATION REQUESTS | 2018 |
|
RU2737348C1 |
METHODS FOR PREPARING AND PROVIDING INFORMATION CONFIDENTIALITY IN DESIGNATED AREA | 2020 |
|
RU2748333C1 |
METHOD OF USING OPTIONS OF COUNTERMEASURE OF NETWORK AND STREAM COMPUTER INTELLIGENCE AND NETWORK ATTACKS AND SYSTEM THEREFOR | 2018 |
|
RU2682108C1 |
METHOD FOR MONITORING AND MANAGING INFORMATION SECURITY OF MOBILE COMMUNICATION NETWORK | 2020 |
|
RU2747368C1 |
SYSTEM AND METHOD FOR PROVIDING PRIVACY OF INFORMATION USED DURING AUTHENTICATION AND AUTHORISATION OPERATIONS USING TRUSTED DEVICE | 2013 |
|
RU2583710C2 |
METHOD FOR EVALUATING THE ABILITY OF A COMPUTER NETWORK NODE TO OPERATE UNDER CONDITIONS OF INFORMATION AND TECHNICAL IMPACT | 2016 |
|
RU2648508C1 |
SECONDARY AUTHENTICATION OF USER DEVICE | 2017 |
|
RU2755258C2 |
METHOD FOR MONITORING OF COMMUNICATION NETWORKS IN CONDITIONS OF CONDUCTING NETWORK RECONNAISSANCE AND INFORMATION AND TECHNICAL ACTIONS | 2015 |
|
RU2612275C1 |
TRUSTED REMOTE ATTESTATION AGENT (TRAA) | 2010 |
|
RU2537795C2 |
ARCHITECTURE OF NETWORK WITH OPEN ACCESS | 2003 |
|
RU2325771C2 |
Authors
Dates
2021-10-11—Published
2021-03-10—Filed