METHOD FOR DETECTING DANGEROUS DIGITAL RADIO SIGNALS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.31.1058

Keywords:

сovert signal detection, quadratic filtering, noise immunity, digital radio signal, low-pass filtering, coherent summation, signal-to-noise ratio (SNR), covert communication, likelihood density estimation.

Abstract

Detection and recognition of digital radio signals remains a critical challenge, particularly in electromagnetically contested environments. This study examines low-pass filtering approaches characterized by either linear or quadratic dependence of the output on the input signal amplitude. These filters operate by coherently summing deterministic signal components while incoherently accumulating random noise contributions resulting in constructive reinforcement of the signal energy and sublinear growth of noise power, which substantially enhances the signal-to-noise ratio (SNR). A rectangular pulse, serving as a representative model of modern digital communication waveforms, was applied to both linear and quadratic filter architectures. A comprehensive statistical characterization including mathematical expectation, variance, root mean square deviation, correlation coefficient, and SNR was performed in both time and frequency domains for input and output signals. To enable objective evaluation of filtering performance, a novel efficacy metric referred to as the payoff coefficient was introduced to quantify improvements in detection reliability. Further simulations analyzed the envelope voltage at the output of an ideal bandpass filter when excited by rectangular pulses of varying durations, emulating signals typical of low-probability-of-intercept (LPI) communication systems. Transient responses and spectral leakage were examined under diverse signal-noise correlation conditions. The findings confirm that covert signals can be reliably extracted using two-dimensional likelihood density estimation, which effectively discriminates interfering components from the composite received waveform. At the system level, incorporating narrowband low-frequency filtering into the signal processing pipeline improved the noise immunity of airborne digital radio signal detection and recognition by 23%. This enhancement significantly strengthens operational resilience in hostile electromagnetic environments, with direct relevance to secure communications, electronic warfare, and signals intelligence applications.

Downloads

Download data is not yet available.

References

Africa, A. D. M., Abello, A. J. A., Gacuya, Z. G., Naco, I. K. A., & Valdes, V. A. R. (2019). Face recognition using MATLAB. International Journal of Advanced Trends in Computer Science and Engineering, 8(4), 1110–1116.

Abello, A. J. A., Francesca, Y. G., Domingo, M., Joven, M. J. T., & Malubay, S. A. S. (2019). Power measurement model optimization using MATLAB. International Journal of Advanced Trends in Computer Science and Engineering, 8(3), 538–542.

Savchenko, V., Syrotenko, A., Shchypanskyi, P., Matsko, O., & Laptiev, O., (2020). The Model of Localization Precision for Detection of Hidden Transmitters. International Journal of Innovative Technology and Exploring Engineering, 9(4), 2114–2119. https://doi.org/10.35940/ijitee.d1533.029420

Bezruk, V. M., Chebotareva, D. V., & Skorik, Y. V. (2017). Multicriteria analysis and selection of telecommunications facilities. Kharkiv, Ukraine: SMIT.

Barabash, O., Sobchuk, V., Sobchuk, A., Musienko, A., & Laptiev, O. (2025). Algorithms for synthesis of functionally stable wireless sensor networks. Advanced Information Systems, 9(1), 70–79. https://doi.org/10.20998/2522-9052.2025.1.08

Petrivskyi, V., Shevchenko, V., Yevseiev, S., Milov, O., Laptiev, O., Bychkov, O., Fedoriienko, V., Tkachenko, M., Kurchenko, O., & Opirsky, I. (2022). Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors. Eastern-European Journal of Enterprise Technologies, 1(9(115)), 15–23. https://doi.org/10.15587/1729-4061.2022.252988

Lukova-Chuiko, N., Herasymenko, O., Toliupa, S., Laptieva, T., & Laptiev, O. (2021). The method of detection of radio signals by estimating the parameters of eversible Gaussian propagation. In 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT) (pp. 67–70). IEEE.

Laptiev, O., Tkachev, V., Maystrov, O., Krasikov, O., Openko, P., Khoroshko, V., & Parkhuts, L. (2021). The method of spectral analysis for determining random digital signals. International Journal of Communication Networks and Information Security, 13(2), 271–277. https://doi.org/10.54039/ijcnis.v13i2.5008

Kyrychok, R., Laptiev, O., Lisnevskyi, R., Kozlovskyi, V., & Klobukov, V. (2022). Development of a method for checking vulnerabilities of a corporate network using Bernstein transformations. Eastern-European Journal of Enterprise Technologies, 1(9(115)), 93–101. https://doi.org/10.15587/1729-4061.2022.253530

Laptiev, O., Musienko, A., Nakonechnyi, V., Sobchuk, A., Gakhov, S., & Kopytko, S. (2023). Algorithm for recognition of network traffic anomalies based on artificial intelligence. In 5th International Congress on Human–Computer Interaction, Optimization and Robotic Applications (HORA). IEEE. https://doi.org/10.1109/HORA58378.2023.10156702

Hu, Z., Mukhin, V., Kornaga, Y., Barabash, O., & Herasymenko, O. (2016). Analytical assessment of security level of distributed and scalable computer systems. International Journal of Intelligent Systems and Applications, 8(12), 57–64. https://doi.org/10.5815/ijisa.2016.12.07

Datsenko, S., & Kuchuk, H. (2023). Biometric authentication utilizing convolutional neural networks. Advanced Information Systems, 7(2), 87–91. https://doi.org/10.20998/2522-9052.2023.2.12

Salnikov, D., Karaman, D., & Krylova, V. (2023). Highly reconfigurable soft-CPU-based peripheral modules design. Advanced Information Systems, 7(2), 92–97. https://doi.org/10.20998/2522-9052.2023.2.13

Petrovska, I., & Kuchuk, H. (2023). Adaptive resource allocation method for data processing and security in cloud environments. Advanced Information Systems, 7(3), 67–73. https://doi.org/10.20998/2522-9052.2023.3.10

Gavrylenko, S., Poltoratskyi, V., & Nechyporenko, A. (2024). Intrusion detection model based on an improved transform

Downloads


Abstract views: 3

Published

2025-12-16

How to Cite

Laptіev O., Khokhlachоva Y., Laptievа T., Stetsenko, V., & Laptiev, S. (2025). METHOD FOR DETECTING DANGEROUS DIGITAL RADIO SIGNALS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(31), 620–634. https://doi.org/10.28925/2663-4023.2025.31.1058