The study of the effectiveness of the checksum for detecting distortions in the transmitted message is an urgent task solved within the framework of various possible models of the operating conditions of information transmission channels. In this article, distortions were modeled by superimposing a noise component with a low signal-to-noise ratio \(\delta \), which is of the greatest practical interest. The considered class of checksums refers to the message integrity control implemented, in particular, in the TCP protocol. The functional dependence of the error probability of checksums on the value \(\delta \) with a small value of the latter was obtained.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Vainshtein, L.A. and Zubakov, V.D., Vydelenie signalov na fone sluchainykh pomekh (Signal Detection in Background Noise), Moscow: Sov. Radio, 1960.
Baranov, A.P. and Baranov, P.A., Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions, Autom. Control Comput. Sci., 2017, vol. 51, 959–964.
Baranov, A.P. and Baranov, P.A., Estimating the probability of a checksum error in a message, Autom. Control Comput. Sci., 2019, vol. 53, pp. 874–878.
GOST R IEC 870-1–95: Telemechanics Devices and Systems. Part 5. Transfer Protocols. Section 1. Formats of Transmitted Frames, 1995.
Rao, S.R., Lineinye statisticheskie metody i ikh primenenie (Linear Statistical Methods and Their Application), Moscow: Nauka, 1968.
Vasiliev, Y.S., Zegzhda, P.D., and Kuvshinov, V.I., Modern problems of cybersecurity, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2014, vol. 17, no. 3, pp. 210–214.
Aleksandrova, E.B., Shkorkina, E.N., and Kalinin, M.O., Organization of the quantum cryptographic keys distribution system for transportation infrastructure users, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 969–971.
Aleksandrova, E.B., Yarmak, A.V., and Kalinin, M.O., Analysis of approaches to group authentication in large-scale industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 879–882.
Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, ACM International Conference Proceeding Series, 2017, pp. 295–298. https://doi.org/10.1145/3136825.3136857
Krundyshev, V. and Kalinin, M., Prevention of false data injections in smart infrastructures, 2019 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2019, 2019. https://doi.org/10.1109/BlackSeaCom.2019.8812786
Lavrova, D., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, Proceedings of 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018, 2018, pp. 818–823. https://doi.org/10.1109/ICPHYS.2018.8390812
Konoplev, A.S. and Kalinin, M.O., Tasks of providing information security in distributed computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 669–672.
The authors declare that they have no conflicts of interest.
Translated by S. Avodkova
About this article
Cite this article
Baranov, A.P., Baranov, P.A. Probability of a Checksum Error in a Message with Possible Distortion. Aut. Control Comp. Sci. 54, 779–785 (2020). https://doi.org/10.3103/S0146411620080064
- information security
- error probability
- distortion model