KEYWORDS: Prototyping, Java, Analytical research, Information operations, Systems modeling, Space operations, Document management, Performance modeling, Telecommunications, Control systems
Net-centric information spaces have become a necessary concept to support information exchange for tactical warfighting
missions using a publish-subscribe-query paradigm. To support dynamic, mission-critical and time-critical operations,
information spaces require quality of service (QoS)-enabled dissemination (QED) of information. This paper describes
the results of research we are conducting to provide QED information exchange in tactical environments. We
have developed a prototype QoS-enabled publish-subscribe-query information broker that provides timely delivery of
information needed by tactical warfighters in mobile scenarios with time-critical emergent targets. This broker enables
tailoring and prioritizing of information based on mission needs and responds rapidly to priority shifts and unfolding
situations. This paper describes the QED architecture, prototype implementation, testing infrastructure, and empirical
evaluations we have conducted based on our prototype.
Net-Centric Information Management (IM) and sharing in tactical environments promises to revolutionize forward
command and control capabilities by providing ubiquitous shared situational awareness to the warfighter. This vision
can be realized by leveraging the tactical and Mobile Ad hoc Networks (MANET) which provide the underlying communications
infrastructure, but, significant technical challenges remain. Enabling information management in these highly
dynamic environments will require multiple support services and protocols which are affected by, and highly dependent
on, the underlying capabilities and dynamics of the tactical network infrastructure.
In this paper we investigate, discuss, and evaluate the effects of realistic tactical and mobile communications network
environments on mission-critical information management systems. We motivate our discussion by introducing the Advanced
Information Management System (AIMS) which is targeted for deployment in tactical sensor systems. We
present some operational requirements for AIMS and highlight how critical IM support services such as discovery,
transport, federation, and Quality of Service (QoS) management are necessary to meet these requirements.
Our goal is to provide a qualitative analysis of the impact of underlying assumptions of availability and performance of
some of the critical services supporting tactical information management. We will also propose and describe a number
of technologies and capabilities that have been developed to address these challenges, providing alternative approaches
for transport, service discovery, and federation services for tactical networks.
KEYWORDS: Computing systems, Network security, Computer security, Defense and security, RGB color model, Information security, Mobile communications, Artificial intelligence, Information operations, Computer intrusion detection
Mobile Ad-Hoc Networks enable communication in various dynamic environments, including military combat
operations. Their open and shared communication medium enables new forms of attack that are not applicable for
traditional wired networks. Traditional security mechanisms and defense techniques are not prepared to cope with the
new attacks and the lack of central authorities make identity verifications difficult. This work extends our previous work
in the Biologically Inspired Tactical Security Infrastructure to provide a reputation-based weighing mechanism for linkstate
routing protocols to protect the network from attackers that are corrupting legitimate network traffic. Our results
indicate that the approach is successful in routing network traffic around compromised computers.
In this paper we introduce a cross-layer mechanism to enhance the effectiveness of link-state routing protocols
by providing a localized estimate of the validity of a given route. Accurate predictions of route staleness result
in less packet loss by selecting alternative paths before primary path failures. We present a proof of concept
implementation that utilizes shared location and velocity information provided from each node through a common
cross-layer substrate. Simulations using random-walk mobility models are presented for the OLSR protocol. The
results show that predictive route adaptation can significantly reduce the average packet loss, average delay and
jitter.
MANET (Mobile Ad hoc Network) environments are becoming increasingly important as potential users recognize
the benefits of being able to create a functional network using little or no fixed infrastructure. Unfortunately,
the very properties that provide such flexibility also cause significant complications in terms of security. The
collaborative nature of the system combined with its continual state of flux requires solutions that are highly
dynamic, and that can adapt to massive changes in system resources, traffic patterns and network topology.
In this paper, we outline a new approach to MANET security called BITSI (the Biologically-Inspired Tactical
Security Infrastructure). BITSI is based upon the concepts of Artificial Immune Systems and Danger Theory.
After introducing the motivations for BITSI we provide a brief description of its underlying theories and proposed
architecture. Two experiments conducted within our MANET simulator are described, and we demonstrate that
BITSI can detect and respond to certain classes of Denial of Service attacks. Finally, we describe our future
plans for BITSI, and how its approach can be combined with other, more traditional, security solutions.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.