DocumentCode :
2562866
Title :
Modeling Network Security Services in Tactical Networks
Author :
Wolthusen, Stephen D.
Author_Institution :
Norwegian Inf. Security Lab., Gjovik Univ. Coll., Gjovik
fYear :
2007
fDate :
15-19 Dec. 2007
Abstract :
Summary form only given. Tactical networks frequently need to be set up without adequate infrastructure in place or where infrastructure elements can be destroyed easily and, moreover, must themselves be mobile and extensible. It is therefore desirable to provide mechanisms based on mobile ad hoc networks, which have been studied intensely in recent years. However, the specific requirements for tactical networks differ from civilian networks in that robustness in the face of direct attacks and compromised nodes leading to Byzantine behavior must be maintained and that above and beyond the need for energy efficiency it is necessary to limit radio frequency emanations both in terms of output power and in the area covered by the signals. In this paper we therefore describe several techniques for modeling the specific requirements underlying tactical networks and provide selected models for efficient distributed computation using the example of trust authority services, which form part of the core infrastructure in an ad hoc network as these services are required to establish trust relations and key exchanges efficiently where pre-shared keying is not desirable or appropriate.
Keywords :
ad hoc networks; military communication; mobile radio; telecommunication security; Byzantine behavior; mobile ad hoc networks; network security services; tactical networks; trust authority services; Educational institutions; Energy efficiency; Information security; Mathematical model; Mathematics; Mobile ad hoc networks; Power generation; RF signals; Radio frequency; Robustness;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security, 2007 International Conference on
Conference_Location :
Harbin
Print_ISBN :
0-7695-3072-9
Electronic_ISBN :
978-0-7695-3072-7
Type :
conf
DOI :
10.1109/CIS.2007.238
Filename :
4415288
Link To Document :
بازگشت