The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Communications and processing for Net-Centric Airborne Networks may become more vulnerable as additional nodes and entities are added to the networks. Accordingly, Information Assurance must provide greater protections in the face of these wider vulnerabilities. The capabilities of legacy systems still provide a basis for IA, but new operating modes mean that new capabilities are needed to mitigate...
In crypto-partitioned networks classified clear text enclaves (i.e., red enclaves) are interconnected over an enciphered unclassified transit network (i.e., black network) via IPSEC tunnels. Thus, packets are encrypted before they are allowed to cross from red networks to a shared black network. Currently, there is no solution that can provide efficient end-to-end IntServ QoS signaling across crypto-partitioned...
Bluetooth is one of the most widely available wireless technologies with over 2 billion Bluetooth-enabled devices shipped. Used by cell phones, laptops, gaming consoles and many other devices, it is the predominant wireless personal area networking technology. Over the last couple of years, US Government Departments including the Department of Defense (DoD) have begun to embrace Bluetooth due to its...
One of the major QoS goals for future battlefield networks (FBN) is to ensure multi-level precedence and preemption (MLPP). Ensuring MLPP is difficult, partly due to the networking architecture for FBN which consists of wired ??red?? network connected by encrypted wireless ??black?? network. The security requirements for FBN do not allow passing information from black to red networks. So when congestion...
A high assurance multiplexer can be used to combine all channels of a MSLS system into a single stream that accommodates all of the channels to be transported at each end of the multiplexed link. The multiplexer/demultiplexer is termed ??high assurance?? because it guarantees the integrity of the channel separation process such that, even under multiple failure conditions, the design assures that...
In this paper the experimental validation of a novel, modified double scroll chaotic attractor circuit, employed as a true random binary generator (TRBG) for cryptographic applications is presented. The double scroll attractor is modeled on Chua's circuit for nonlinear operation leading to chaotic behavior. The output from the chaotic circuit which is a partially correlated binary sequence is scrambled...
We describe a framework for capturing data provenance information to support Information assurance attributes like availability, authentication, confidentiality, integrity and non-repudiation. Our approach is applicable to multi-level secure systems where it is not always possible to directly provide data source and data transformation information. We achieve this by combining the subjective and objective...
A number of large-scale applications require 10 Gbps data transport rates between high-performance computing, storage and file systems, which are connected over wide-area networks. Achieving such capability requires end-to-end optimization of all required hardware and software components including: (i) long haul SONET or 10 GigE connections; (ii) transport protocols such as TCP and UDT, (iii) encryption...
In our previous work, we have shown that hybrid ARQ (HARQ) can be used to achieve secret communication over a fast fading channel. This is a physical-layer technique that can be used in conjunction with conventional cryptography to provide further protection from an eavesdropper. The key to our previous work was to use reliability-based HARQ to improve the decoder performance at the desired user much...
In cryptographically-partitioned networks, data within a packet can be used by routers in the plain-text enclaves to make quality of service (QoS) and precedence and preemption (P&P) decisions in regards to forwarding the packet and allocating resources for flows. However, while in a cipher-text shared transit network, the packet is encrypted and is opaque to routers in the transit network and...
This paper addresses the use of Resource ReSerVation Protocol-Aggregate (RSVP-AGG) at the tactical edge of the Air Force's Airborne Network (AN). Since the AN tactical edge can have different types of stub-networks accessing the AN (i.e., non-IP based legacy networks like Link 16, DiffServ based networks and IntServ based net-works), RSVP-AGG offers a common access approach regardless of the differences...
Faced with intense competition, network service providers, supported by their respective network operations centers (NOCs), must ensure the best possible quality of service (QoS) and corresponding quality of experience (QoE) for end-users or face the loss of business. QoE represents the perception of quality experienced by end-users of a real-time system, such as VoIP. The QoE challenge becomes significant...
Robustness, security, anonymity, and scalability are valued features for mobile ad hoc network routing protocols. Unfortunately, the existing ad hoc routing protocols have limitations in each area. In this paper, we first analyze several existing mobile ad hoc routing protocols for robustness, security, anonymity, and scalability. Based on the analysis, we propose a new robust anonymous ad hoc on-demand...
Recent advances in distributed in-network data storage and access control have led to active research in efficient and robust data management in wireless sensor networks (WSNs). Although numerous schemes have been proposed this far, most of them do not provide enough attention towards exploiting user hierarchy and sensor heterogeneity, which is quite a practical issue especially when deploying WSNs...
FPGAs have become a ubiquitous part of today's processing technology. Their use has grown from traditional glue logic interfaces of the past to the most advanced information processing systems used by core Internet routers and high-performance computing systems. What remains common throughout this evolution is the desire to integrate more functionality in less space while using less power and at a...
The Transmission Control Protocol (TCP) is ubiquitous, sophisticated, and effective. It also prevents the innovation needed to improve delivery of Internet services to the wireless tactical edge of DOD operations. We argue in this paper that TCP should be used as a short-range local access protocol for COTS compatibility rather than as the primary end-to-end transport protocol for the tactical GIG...
Hierarchical key management schemes would serve well for military applications where the organization of the network is already hierarchical in nature. Most of the existing key management schemes concentrate only on network structures and key allocation algorithms, ignoring attributes of the nodes themselves. Due to the distributed and dynamic nature of MANETs, it is possible to show that there is...
Leveraging the Defense Information Systems Agency's (DISA) experience on the Tactical Services Provider (TSP) Joint Capability Technology Demonstration (JCTD), this paper analyzes the security weaknesses and vulnerabilities of mobile Worldwide Interoperability for Microwave Access (WiMAX) in the TSP architecture and explains DISA's approach to deploying an integrated, multi-layer Information Assurance...
Most large-scale data communication networks are built from multiple autonomous subnetworks, which are managed by different administrative entities. In many practical environments, information about traffic policies is considered proprietary and is not disclosed by network operators. However, some operational scenarios require routers within a network to check if traffic matches a particular policy...
This work addresses the development of an ECN-based MBAC algorithm for use over HAIPE. The proposed MBAC resides at the red enclaves, but leverages the ECN, which is defined in RFC 3168 and can be activated at the existing black routers. With these MBAC capabilities, ad-mission control policies are generated at the red enclaves to react to the black core congestion without the need to pass information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.