The development of basic components of the neural network protection system, data transmission coding based on an integrated approach, which includes an improved method of neural network encryption (decryption) and the method of adaptive barker-like coding (decoding) of data, which focuses on modern element base. The principles of specialization and adaptation of hardware and software to the structure of algorithms for neuro-like encryption (decryption) of data, neural network architecture, and barker-like code are used to develop the system. The architecture of the system is proposed, which takes into account the variable composition of the equipment and modularity. The method of neural network encryption (decryption) of data has been improved. The time of neural network encryption and decryption of data depends on the size of the tables of macroparticle products. The size of the tables of pre-calculated macroparticle products is based on the provision of encryption and decryption of data in real-time. A method of adaptive barker-like encoding (decoding) has been developed, which, due to the signal-to-noise ratio, provides high noise immunity and reduces data transmission time. The hardware of the system, which was created using the developed basic components of neural network protection and barker-like data encoding, is described. When creating hardware, ready-made components and modules of industrial production are used as much as possible, and the availability of appropriate means of software code development is taken into account. Means of neural network cryptographic encryption (decryption) of data of the mobile part of the system are implemented using a microcomputer-based on SoC. Not the most powerful microcomputer of the NanoPi Duo type from FriendlyElec has been especially used to test the means of neural network cryptographic encryption (decryption) of data. Using the created system, it is determined that the performance of neural network cryptographic encryption (decryption) of data blocks based on a microcomputer is carried out in close to real-time. The time of formation and training of the neural network is about 200 ms, and the implementation of encryption and decryption procedures is about 35 ms and 30 ms, respectively, and does not depend significantly on the chosen configuration of the neural network.
 Arvandi, M., Wu, S., Sadeghian, A., Melek, W. W., & Woungang, I. (2006). Symmetric cipher design using recurrent neural networks. Proceedings of the IEEE International Joint Conference on Neural Networks, 2039–2046.
 Chang, A. X. M., Martini, B., & Culurciello, E. (2015). Recurrent neural networks hardware implementation on FPGA: arXiv preprint arXiv:1511.05552.
 Chi, Zhang, Wei, Zou, Liping, Ma, & Zhiqing, Wang. (2020). Biologically inspired jumping robots: A comprehensive review, Robotics and Autonomous Systems, vol. 124.
 Corona-Bermúdez, E., Chimal-Eguía, J. C., & Téllez-Castillo, G. (2022). Cryptographic Services Based on Elementary and Chaotic Cellular Automata. Electronics, 11(4), 613.
 Diamantaras, K. I., & Kung, S. Y. (1996). Principal Component Neural Networks. Theory and Applications (Wiley, 1996), 270 p.
 Haikin, S. (2016). Neural networks: full course ( 2nd ed . add. and revised). (Trans. from English). Moscow: Williams.
 Khan, S., Han, L., Lu, H., Butt, K., Bachira, G., & Khan, N. (2019). A New Hybrid Image Encryption Algorithm Based on 2D-CA, FSM-DNA Rule Generator, and FSBI. IEEE Access 2019, 7, 81333–81350.
 Korchenko, O., Tereykovsky, I., & Biloshchytsky, A. (2016). Methodology of development of neural network means of information security of Internet-oriented information systems. "Nash Format".
 Ostapov, S. (2013). Information security technologies. Kharkiv: KhNEU.
 Riznik, O. Ia., Tkachenko, R. O., & Kinash, Iu. Ye. (2019). Neiromerezheva tekhnologiia zakhistu ta peredachi danikh u realnomu chasi z vikoristanniam shumopodibnikh kodiv. Innovatciini tekhnologii u rozvitku suchasnogo suspilstva: zbirnik tez dopovidei mizhnarodnoi naukovo-praktichnoi konferentcii (Lviv, 18–19 kvitnia 2019 r.), 19–23. [In Ukrainian].
 Rudenko, O., & Bodyansky, E. (2006). Artificial neural networks. Kharkiv: SMIT Company Ltd.
 Sagar, V., & Kumar, K. (2014). A Symmetric Key Cryptographic Algorithm Using Counter Propagation Network (CPN). Proceedings of the 2014 ACM International Conference on Information and Communication Technology for Competitive Strategies. https://doi.org/10.1145/2677855.2677906
 Shihab, K. A. (2006). Backpropagation neural network for computer network security. Journal of Computer Science, vol. 2, no. 9, 710–715.
 Śledź, S., Ewertowski, M. W., & Piekarczyk, J. (2021). Applications of unmanned aerial vehicle (UAV) surveys and Structure from Motion photogrammetry in glacial and periglacial geomorphology. Geomorphology 2021, 378 p.
 Tcimbal, Iu. V. (2018). Neiromerezhevii metod simetrichnogo shifruvannia danikh. Visnik Natcionalnogo universitetu "Lvivska politekhnika". Seriia: Informatciini sistemi ta merezhi, 901, 118–122. [In Ukrainian].
 Tereykovsky, I. (2007). Neural networks in the means of protection of computer information. Polygraph Consulting.
 Tkachenko, R., Tkachenko, P., Izonin, I., & Tsymbal, Y. (2018). Learning-based image scaling using neural-like structure of geometric transformation paradigm. Advances in Soft Computing and Machine Learning in Image Processing, Springer, 537–565. https://doi.org/10.1007/978-3-319-63754-9_25
 Tsmots, I. G., Rabik, V. G., & Lukashhuk, Iu. A. (2021). Rozroblennia mobilnikh zasobiv neiropodibnogo kriptografichnogo shifruvannia ta deshifruvannia danikh u realnomu chasi. Visnik Natcionalnogo universitetu "Lvivska politekhnika". Seriia: Informatciini sistemi ta merezhi, 9, 84–95. [In Ukrainian].
 Tsmots, I., Rabyk, V., Riznyk, O., & Kynash, Y. (2019). Method of Synthesis and Practical Realization of Quasi-Barker Codes. 2019 IEEE 14th International Conference on Computer Sciences and Information Technologies (CSIT), Lviv, Ukraine, 76–79. https://doi.org/10.1109/STC-CSIT.2019.8929882
 Tsmots, I., Teslyuk, V., Teslyuk, T., Lukashchuk, Y. (2021). The method and simulation model of element base selection for protection system synthesis and data transmission. International Journal of Sensors, Wireless Communications and Control, 11(5), 518–530. https://doi.org/10.2174/2210327910999201022194630
 Tsmots, I., Tsymbal, Y., Khavalko, V., Skorokhoda, O., & Tesluyk, T. (2018). Neural-Like Means for Data Streams Encryption and Decryption in Real Time. Processing of the 2018 IEEE 2nd International Conference on Data Stream Mining and Processing, DSMP 2018, 438–443.
 Tsmots, I., Tsymbal, Yu., Skorokhoda, O., & Tkachenko, R. (2019). Neural-like Methods and Hardware Structures for Real-time Data Encryption and Decryption. Proceedings of 14th International Scientific and Technical Conference (CSIT), Lviv, Ukraine, 3. 248–253.
 Tsymbal, Yu. (2018). Neural network method of symmetric data encryption. Bulletin of the Lviv Polytechnic National University. Information systems and networks, 901, 118–122.
 Verma, A., & Ranga, V. (2020). Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review. IEEE Sens. J., 20, 5666–5690.
 Volna, E., Kotyrba, M., Kocian, V., & Janosek, M. (2012). Cryptography Based On Neural Network. Proceedings of the 26th European Conference on Modeling and Simulation, 386–391.
 Wang, M., Cong, S., & Zhang, S. (2018). Pseudo Chirp-Barker-Golay coded excitation in ultrasound imaging, 2018 Chinese Control And Decision Conference (CCDC), Shenyang, 4035–4039.
 Wang, S., & He, P. (2018). Research on Low Intercepting Radar Waveform Based on LFM and Barker Code Composite Modulation, 2018 International Conference on Sensor Networks and Signal Processing (SNSP), Xian, China, 297–301. https://doi.org/10.1109/SNSP.2018.00064
 Zhou, K., Kang, Y., Huang, Y., & Feng, E. (2007). Encrypting Algorithm Based on RBF Neural Network. Proceedings of the IEEE Third International Conference on Natural Computation, 1, 765–768.