The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Leveraging the Defense Information Systems Agency's (DISA) experience on the Tactical Services Provider (TSP) Joint Capability Technology Demonstration (JCTD), this paper analyzes the security weaknesses and vulnerabilities of mobile Worldwide Interoperability for Microwave Access (WiMAX) in the TSP architecture and explains DISA's approach to deploying an integrated, multi-layer Information Assurance...
Most large-scale data communication networks are built from multiple autonomous subnetworks, which are managed by different administrative entities. In many practical environments, information about traffic policies is considered proprietary and is not disclosed by network operators. However, some operational scenarios require routers within a network to check if traffic matches a particular policy...
This paper presents a joint network management approach being studied for interfacing network management of different US future force networks. The approach attempts to pass information between the cipher text network managers of the army, the navy and the air force networks such that intelligent decisions can be made as traffic flows between these networks. As the first straw man approach, the paper...
Anonymous MANET routing relies on techniques such as re-encryption on each hop to hide end-to-end communication relations. However, passive signal detectors and traffic analyzers can still retrieve sensitive information from PHY and MAC layers through statistical traffic analysis. In this paper, we propose a statistical traffic pattern discovery (STPD) system. STPD intends to find out the sources...
We consider the problem of clandestine communications, i.e., communications that are meant to be invisible to third-party eavesdroppers, in the context of wireless sensor networks. Although encryption and anonymous routing protocols can hide the content and the routing information, the transmission activities of sensors on the same route can still reveal the information flow. In this work, a perfectly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.