LAYERED DEFENSE IN COMMUNICATION SYSTEMS: JOINT USE OF VPN PROTOCOLS AND LINEAR BLOCK CODES

Authors

DOI:

https://doi.org/10.20998/2079-0023.2025.01.17

Keywords:

cascade transmission model, VPN encryption, Hamming codes, forward error correction, data integrity, communication security, parity bit, noise resilience, network attacks, information reliability

Abstract

With the rapid increase in the volume of transmitted information and the proliferation of distributed network infrastructures, the requirements for the security and reliability of communication channels are steadily intensifying. Traditional protection methods, such as virtual private networks (VPNs), are primarily aimed at ensuring confidentiality and authenticity through cryptographic algorithms, while typically lacking resilience to transmission-level errors arising from noise, interference, or hardware failures. In contrast, error correction codes—such as Hamming codes—are well-established tools for detecting and correcting random errors in physical channels, but they do not address intentional threats like interception, modification, or traffic analysis. This paper presents a hybrid cascading model for secure and reliable data transmission that integrates cryptographic encapsulation via VPN technologies with structural redundancy provided by error correction coding. A specific focus is placed on the use of Hamming codes extended by an additional parity bit applied at the post-encryption stage, enabling the protection of VPN packet integrity even under noisy channel conditions. The architecture of the proposed model is examined in detail, including its modular components, processing flow, and the various possible configurations of encoding and encryption blocks. Particular attention is given to analysing the threat surfaces present at each phase of transmission—prior to tunneling, during transport, and at the decryption stage—and assessing the system’s robustness through probabilistic reliability metrics and redundancy coefficients. Simulation-based modelling supports the theoretical framework and confirms that the combined use of encryption and redundancy coding significantly enhances overall communication resilience. The results underscore the importance of a comprehensive approach to secure data transmission that jointly addresses logical security threats and physical-level vulnerabilities.

Author Biographies

Vladyslav Sharov, National Technical University "Kharkiv Polytechnic Institute"

Postgraduate of Department Information Systems and Technologies National Technical University "Kharkiv Polytechnic Institute", Kharkiv, Ukraine

Olena Nikulina, National Technical University "Kharkiv Polytechnic Institute"

Doctor of Technical Sciences, Professor, Head of Department Information Systems and Technologies National Technical University "Kharkiv Polytechnic Institute", Kharkiv, Ukraine

References

Sharov V. O., Nikulina O. M. Study of compatibility of methods and technologies of high-level protocols and error-correcting codes. Bulletin of the National TechnicalUniversity "KhPI". Series: System analysis, management and information technologies. Kharkiv, NTU "KhPI", 2024, no. 2 (12), pp. 92–97.

Shannon C. E. A Mathematical Theory of Communication. Bell System Technical Journal. 1948, vol. 27, no. 3, pp. 379-423.

Stallings W. Cryptography and Network Security: Principles and Practice. Pearson, 2020. 760 p.

Lin Shu, Daniel J Costello. Error Control Coding: Fundamentals and Applications. Pearson, 2004. 720 p.

Tanenbaum A. S., Wetherall D. J. Computer Networks, 5th ed. Pearson, 2011. 808 p.

Hamming R. W. Error Detecting and Error Correcting Codes. Bell System Technical Journal. 1950. 147 p.

MacWilliams F. J., Sloane N. J. A. The Theory of Error-Correcting Codes. North-Holland, 1977. 594 p.

Donenfeld J. WireGuard: Next Generation Kernel Network Tunnel. Available at: https://www.wireguard.com (accessed 05.05.2025).

Dierks T., Rescorla E. The Transport Layer Security (TLS) Protocol. RFC 5246. 2008. 80 p.

IEEE Std 802.11-2020. IEEE Standard for Information Technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Area Networks. 357 p.

Moon T. K. Error Correction Coding: Mathematical Methods and Algorithms. Wiley, 2005. 464 p.

Anderson R. J. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2020. 1024 p.

Conti M., Dehghantanha A., Franke K., Watson S. Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems. 2018, vol. 78, part 2, pp. 544–546.

Gutmann P. Engineering Security. Available at: http://www.cs.auckland.ac.nz/~pgut001/pubs/book.pdf (accessed 05.05.2025).

Oppliger R. SSL and TLS: Theory and Practice. Artech House, 2009. 480 p.

Rescorla E. HTTP Over TLS. RFC 2818, 2000. 18 p. Available at: https://www.rfc-editor.org/rfc/rfc2818 (accessed 05.05.2025).

Downloads

Published

2025-07-11

How to Cite

Sharov, V., & Nikulina, O. (2025). LAYERED DEFENSE IN COMMUNICATION SYSTEMS: JOINT USE OF VPN PROTOCOLS AND LINEAR BLOCK CODES. Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, (1 (13), 112–116. https://doi.org/10.20998/2079-0023.2025.01.17

Issue

Section

INFORMATION TECHNOLOGY