Title :
Cryptographic solutions for COTS smart phones
Author :
Buibish, Anne-Marie ; Johnson, Noel E. ; Emery, David ; Prudlow, Michael
Author_Institution :
Raytheon Network Centric Syst., Fort Wayne, IN, USA
Abstract :
The ability of Commercial Off-The-Shelf (COTS) smart phones to securely process classified voice and data greatly depends on several factors - operational context, highest classification level of security processing required, and application of the relevant Information Assurance (IA) standards. This paper will describe the unique challenges associated with use of COTS smart phones in military operations. Three loss scenarios are described along with corresponding loss mitigation strategies. In addition, the paper will offer ideas that can turn the loss scenario into an opportunity to collect intelligence on the enemy. In conclusion, we propose the next steps required to provide Cryptographic Solutions for COTS Smart Phones.
Keywords :
cryptography; smart phones; telecommunication security; COTS smart phones; commercial off-the-shelf; cryptographic solutions; information assurance standards; Authentication; Encryption; Kernel; Smart phones; COTS; Cryptographic; Security; Smart Phone;
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011
Conference_Location :
Baltimore, MD
Print_ISBN :
978-1-4673-0079-7
DOI :
10.1109/MILCOM.2011.6127508