The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is our great pleasure to welcome you to MILCOM 2016 - the premier international conference on military communications. This 35th annual forum gathers thought leaders from government, military, industry and academia to discuss innovative research and cutting-edge technologies that their expertise brings to military communications. This year's theme and special focus is “Secure Communications at...
Cyber defense today relies heavily on teams of Subject Matter Experts (SMEs), e.g., Cyber Protection Teams (CPTs). Although simple tasks can be automated or scripted, complex decision processes-increasingly needed to counter cyber threats-require SME insight and manual execution. As a result, cyber-defense operations tend to emphasize collection and archiving of data over real-time decision making...
Achieving mission objectives in complex and increasingly adversarial networks is difficult even under the best of circumstances. Currently, there are few tools for reasoning about how to react to rapid changes in a given network's environmental state; that is, we do not know how to cope with adversarial actions in hostile environments. In this paper, we consider a preliminary operational model that...
In 2011, the United States (U.S.) Department of Defense (DOD) named cyberspace a new operational domain. As cyberspace is significantly different from the physical domain in the dimensions of time and space, it presents a much more dynamic and complex operational environment for the U.S. military. Yet, the DOD is currently applying command and control (C2) concepts developed for operations in physical...
In this paper we introduce SAWD, a semi-automated approach for wrapping dynamic and moving target cyber defenses for cyber command and control operations. SAWD provides an interactive user interface that enables the intuitive description (either explicitly or by example) of the requirements, pre-conditions, and steps for defense installation, configuration, and operation in multiple operational environments...
Dagger is a modeling and visualization framework that addresses the challenge of representing knowledge and information for decision-makers, enabling them to better comprehend the operational context of network security data. It allows users to answer critical questions such as “Given that I care about mission X, is there any reason I should be worried about what is going on in cyberspace?” or “If...
Mission success and effectiveness depends on timely, secured delivery of information to authorized personnel or systems. Unfortunately, the current security paradigm of building a fortress to protect systems in the network is not sufficient in cyberspace. Further access control measures, such as role-based permissions, to prevent intrusions/disruptions are also insufficient. We present an alternative...
In computerized systems, documents with sensitive information are generated, stored and accessed every day in large volumes. These documents are classified and disseminated only to appropriate personnel. Unintentional disclosure of sensitive information should be ultimately avoided. How to effectively provide access control of document disclosure is a key for secure business, government and military...
With the development of mobile communication technology, space information network plays an essential role in meeting the increasing demands of mobile communications. As a basic and powerful security mechanism, authentication protocol provides primary protection. In 2012, Zheng et al. proposed an efficient four-phase authentication scheme for space information network. But we observed that it is vulnerable...
Machine learning models are frequently used to solve complex security problems, as well as to make decisions in sensitive situations like guiding autonomous vehicles or predicting financial market behaviors. Previous efforts have shown that numerous machine learning models are vulnerable to adversarial manipulations of their inputs taking the form of adversarial samples. Such inputs are crafted by...
For performance, maintainability and usability, military communications systems must properly integrate and coordinate cryptographic primitives and use adequate key management schemes. In this paper, we present a SHAMROCK (Synthesizable High Assurance Management/Reservation/Operation of Cryptography and Keys) coprocessor. Being self-contained and synthesizable, SHAMROCK empowers designers to readily...
The Internet of Things (IoT) is emerging as a force to be reckoned with on the internet and in the economy overall. The IoT is being incorporated into home, hospital and smart grid infrastructures. However, the IoT brings with it a host of potential new security breaches and attacks. This paper proposes IoTGuard as a multi-dimensional security framework to protect against such IoT attacks. It is made...
In mobile ad hoc networks (MANETs) where there is no centralized control, distributed channel-access transmission scheduling protocols are of interest. Many scheduling-based MAC protocols have been proposed that provide contention free transmissions and can guarantee certain levels of performance. One of the major drawbacks of these protocols is that once slots are assigned to a particular node, if...
We tackle the challenging problem of link scheduling and channel assignment in multi-channel, multi-hop wireless networks, aiming to achieve high network throughput. We adopt the signed graph spectral clustering algorithm to solve this problem heuristically, by jointly considering channel gain and mutual interference. The basic idea is to cluster links with smaller mutual interference and allocate...
We study a random access scheme for satellite packet communication with intentional interference. A modified Slotted ALOHA protocol is used with interferer power sensing to achieve maximum user throughput. For a malicious interferer who ignores the control parameters broadcast by the satellite (such as the back-off parameter), we show that the degradation of channel throughput is inversely proportional...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.