Mitigating Security Threats in Tactical Networks

نویسندگان

  • David Kidston
  • Li Li
  • Helen Tang
  • Peter Mason
چکیده

The future of tactical networks encompasses multi-hop digitised voice and data communications using VHF/UHF-band radios. While this radio band has excellent propagation properties, their relatively low bandwidth, high error rates and node mobility makes tactical radios less than ideal as a robust networking platform. Since networking is new to tactical communications, the security implications are not fully understood. Significant related research has been done for the network threats and vulnerabilities of commercial mobile ad-hoc networks (MANETs), however the threats in the literature are not always directly analogous because of the different communications characteristics. This paper takes a novel approach by reviewing known MANET security threats and then evaluating their potential impact on tactical networks. Though this analysis does not cover all possible security threats, it does leverage previous work and identify the most critical areas for further research. Based on this analysis, we propose the use of a cross-layer service framework to integrate security functions across all communication layers. A description of the framework and its application to several security areas are included.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigating External Threats in Wireless Local Area Networks

As computer networks become more critical to enterprises, it is inevitable that efficient security policies are designed, case in point: wireless networks, in order to effectively ensure the confidentiality, availability, and integrity of the data traversing these networks. The primary objective of this paper is to appropriately simulate an enterprise network, and evaluate the threats, and poss...

متن کامل

Security in Wireless Sensor Networks

Wireless sensor networks (WSNs) have attracted a lot of interest over the last decade in wireless and mobile computing research community. Applications of WSNs are numerous and growing, which range from indoor deployment scenarios in the home and office to outdoor deployment in adversary’s territory in a tactical battleground. However, due to distributed nature and their deployment in remote ar...

متن کامل

Handling Security Threats to the RFID System of EPC Networks

1 Abstract: The use of radio frequency identification (RFID) technologies in all kinds of wireless network-based applications is becoming truly pervasive. Indeed, applications based on mobile wireless ad hoc networks (MANETs), wireless sensor networks (WSNs), and vehicular ad hoc networks (VANETs), among others, can highly benefit from the adoption of battery-less RFID solutions, such as electr...

متن کامل

Securing Edge Networks with Securebox

The number of mobile and IoT devices connected to home and enterprise networks is growing fast. These devices offer new services and experiences for the users; however, they also present new classes of security threats pertaining to data and device safety and user privacy. In this article, we first analyze the potential threats presented by these devices connected to edge networks. We then prop...

متن کامل

Security Threats in Mobile Ad Hoc Networks

Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. They are an attractive technology for many applications, such as rescue and tactical operations, due to the flexibility provided by their dynamic infrastructure. However, this flexibility comes at a price and introduces new security threats. Furthermore, many conventional security solutions used for wired networks...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013