The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Military force structures are becoming increasingly complex and net-centric as new technologies are developed and deployed. As such, there is an ever increasing need to provide system-of-systems (SoS) analysis tools to assist in evaluating a military combat team's survivability, lethality, sustainment and logistics. Evaluation of networked communications as part of this analysis is often overlooked...
In previous work, we proposed a ??Bootstrap?? protocol for establishing neighbor relationships, between two mobile nodes in a mission critical deny-by-default Mobile Ad-hoc Network. In this paper, we formally characterize the security properties of this Bootstrap protocol, striving to answer the following questions: 1) To what extent can an adversary undermine the correctness and performance of the...
Communications and processing for Net-Centric Airborne Networks may become more vulnerable as additional nodes and entities are added to the networks. Accordingly, Information Assurance must provide greater protections in the face of these wider vulnerabilities. The capabilities of legacy systems still provide a basis for IA, but new operating modes mean that new capabilities are needed to mitigate...
The desirable features of future optical high-capacity networks include higher stability, reconfigurability and security. In order to enable robust and self-managed automated operation, the network itself should be able to monitor the physical state of the network, automatically diagnose and repair the network, dynamically allocate resources, and redirect traffic. Optical performance monitoring can...
In wireless networks, communication links may be subject to random fatal attacks: for example, sensor networks under sudden power losses or cognitive radio networks with unpredictable primary user spectrum occupancy. Under such circumstances, it is critical to quantify how fast and reliably information can be collected over attacked links. In our previous work, we studied such channels by considering...
We investigate the risk associated with multihop wireless communications due to eavesdropping. When the same message traverses cross a multihop wireless network, potential security leaks may occur because of intelligent and collaborative eavesdroppers even if all individual links from source to destination have signal leakage below a security threshold. We termed this phenomenon ??cumulative security...
Disruption-tolerant networks (DTNs) provide a promising low-cost solution to transfer data in network environment where the connectivity is sporadic and unpredictable. Many existing methods for opportunistic data forwarding depend on the hypothesis that every node forwards messages regardless of the identities of the senders or receivers, however, the networks based on such methods are fragile under...
In this paper, a technique for detection of wormhole attacks based on distance verification is proposed for mobile ad hoc network (MANETs) applications. A node estimates its distances to a sender node based on the received signal strength (RSS) of received packets, and uses them to verify against the distances computed from the location information in the packets. The verification is formulated as...
Robustness, security, anonymity, and scalability are valued features for mobile ad hoc network routing protocols. Unfortunately, the existing ad hoc routing protocols have limitations in each area. In this paper, we first analyze several existing mobile ad hoc routing protocols for robustness, security, anonymity, and scalability. Based on the analysis, we propose a new robust anonymous ad hoc on-demand...
In this paper, we propose two modified proportional fair scheduling algorithms for multiuser multicarrier systems. Compared to the existing proportional fair scheduling algorithms, our proposed algorithms are devised to support the delay constraint for the real-time applications as well as to guarantee a certain level of fairness. The simulation results show that the proposed scheduling algorithms...
In this paper, we consider the reliable data fusion problem in a tactical environment in the presence of adversary. First, we characterize malicious behavior of compromised sensors assuming probabilistic models. Performance of the fusion process, in the presence of malicious sensors, is then quantified. The performance analysis shows that malicious sensors incur significant degradation on the fusion...
In crypto-partitioned networks classified clear text enclaves (i.e., red enclaves) are interconnected over an enciphered unclassified transit network (i.e., black network) via IPSEC tunnels. Thus, packets are encrypted before they are allowed to cross from red networks to a shared black network. Currently, there is no solution that can provide efficient end-to-end IntServ QoS signaling across crypto-partitioned...
Bluetooth is one of the most widely available wireless technologies with over 2 billion Bluetooth-enabled devices shipped. Used by cell phones, laptops, gaming consoles and many other devices, it is the predominant wireless personal area networking technology. Over the last couple of years, US Government Departments including the Department of Defense (DoD) have begun to embrace Bluetooth due to its...
We consider a physical layer security based on the wiretap channel for wireless communication systems in which there are one transmitter and multiple receivers/users who report their channel state information (CSI) to the transmitter. This scenario is practically useful since it models the forward link of cellular systems where the systems can take advantage of the multiuser diversity. We are curious...
Limited capabilities and mission requirements imply that nodes in tactical mobile ad-hoc networks (MANETs) carry a significant risk of being compromised physically or logically. In addition nodes or groups of nodes may defect, which is a particular concern in coalition environments where networks may spread beyond organizational boundaries. To identify defecting or compromised nodes including Byzantine...
A key enabling functionality in implementing Cognitive Radio is to reliably detect the licensed users. In recent literature, cooperation among spectrum sensing terminals is suggested to offer reliable sensing performance. We consider the problem that the presence of malfunctioning or malicious sensing terminals will severely degrade the performance of cooperative spectrum sensing. In this paper, we...
In network communication, Byzantine attacks, i.e., attacks in consequence of the packet dropping and cheating (modified packets), are usually difficult to guard against. Several multi-path packet routing schemes have been recently proposed to recover lost packets on account of the packet dropping (caused by path failures or attacks), but no effective solutions have been proposed to counter cheating...
In this paper we demonstrate an attack scenario in which Bluetooth enabled computers are remotely controlled by an attacker without any security software detecting the connection. We describe in detail the methods to deliver malware, evade detection, elevate permissions, and transport critical information out of the network via Bluetooth connections. A prototype system using state-of-the-art operating...
Leveraging the Defense Information Systems Agency's (DISA) experience on the Tactical Services Provider (TSP) Joint Capability Technology Demonstration (JCTD), this paper analyzes the security weaknesses and vulnerabilities of mobile Worldwide Interoperability for Microwave Access (WiMAX) in the TSP architecture and explains DISA's approach to deploying an integrated, multi-layer Information Assurance...
Privacy, authentication, confidentiality and non repudiation are the most desired security attributes for all vehicular ad hoc network (VANET) applications. A lot of solutions have been presented to address these issues. However, they are mostly dependent on centralized certificate architecture and some sort of hardware-based security. These solutions are expensive to carry out and lack the incentive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.