KEYWORDS: Hardware testing, Commercial off the shelf technology, Data communications, Video, Computer architecture, RF communications, Interfaces, Data storage, Satellites, Data transmission
One of the major challenges for lunar exploration missions is how to achieve dynamic and robust routing. To reduce the
development cost, it is desirable to leverage existing technologies, such as routing in mobile ad hoc networks (MANETs)
and delay tolerant networks (DTN). However, these technologies are developed for the Earth environment and hence
need further investigation for the lunar environment. To support robust access and dynamic mission operations, we
propose a DataBus-based Hybrid Routing (DBHR) approach that combines MANET reactive routing protocol (such as
AODV) and DTN-based bundle delivery. Our DBHR approach is designed for a tiered architecture where remote nodes
communicate with upper-tier gateways through data carriers (DataBus) using short-range radio interfaces. Our scheme
explores the (non)availability of the end-to-end path between two peers using MANET routing and provides diverse
route options based upon different parameters. This interaction between hop-by-hop DTN technologies and end-to-end
MANET protocol will result in a reliable and robust routing protocol for orbit access and improve the overall
communication capabilities. To evaluate its performance, we implemented our proposed scheme on commercial-off-theshelf
(COTS) routers with the custom OpenWRT and tailored IBR-DTN bundle protocol distribution. The on-demand
service request and grant mechanisms are also developed in our implementation to allow certain DTN nodes to reserve
the future access opportunities. Finally, we demonstrate the achieved capabilities and performance gains through
experiments on a hardware test bed that consists of several COTS routers with our implementation.
Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from
various cyber threats. When a security incident occurs, network administrators and security analysts need to know what
exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly
mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for
efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace
common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and
represent the statuses, relationships, and interdependencies of various entities and elements within and among different
levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an
integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support
decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the
information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the
developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace
situational awareness and impact mitigation in large-scale computer networks.
Due to the layer-independency design, in current wireless networks, only after a complete failure occurs in one of the
involved layers, is the next higher layer notified, and by then performance degradation may already be observed. Also,
the new connection establishment process has to go through all the layers. It is time-consuming and usually results in an
extra latency and resource unavailability within the transition region, which in turn leads to inefficient bandwidth usage
and a poor user experience. Moreover, the root-cause of the connection termination is typically hidden, and not utilized
for the repair or reestablishment. To mitigate the problem, in this paper, we propose a proactive and adaptive cross-layer
reconfiguration (PACR) scheme for reliable communication in tactical networks. The PACR scheme allows the user
(e.g., network operator) to adaptively reconfigure operating parameters in the corresponding layers through proactive
prediction, root-cause identification, and cross-layer negotiations. The core of the PACR scheme is an integrated crosslayer
information sharing architecture that expedites information exchange and inter-layer interactions between different
network layers in a proactive manner. Through simulation and experiments, it has been shown that our proposed PACR
scheme can significantly improve the network performance, and facilitate the nodes or users to make smart decisions
accordingly in an adaptive manner.
KEYWORDS: Sensors, Sensor networks, Computer security, Network security, Data communications, Data modeling, Data processing, Wireless communications, Databases, Information security
With the increasing popularity of wireless sensor networks (WSNs) for the daily operations in both commercial and
defense sectors, designing an efficient and secure query processing mechanism becomes critical to returning a
reliable data response to the user in a timely manner. While recent research efforts on database based query
processing dramatically improves the efficiency of query processing, another critical component, security, is still in
its early stage of development. The intent of this work is to develop an efficient trust-aware querying mechanism to
identify the trustworthiness of sensor nodes, while simultaneously filtering out bogus data in the querying process.
Our final goal is to return the highest-fidelity data response to the user while monitoring the health of the network by
flagging suspected compromised nodes. It is noted that the proposed trust-aware querying mechanism does not
eliminate the utilization of any conventional cryptographic approaches, and it works as a complementary component
to provide an advanced security solution with the imperfect WSN of today.
KEYWORDS: Switches, Switching, Sensor networks, Network security, Received signal strength, Signal detection, Wireless communications, Standards development, Legal, Simulation of CCA and DLA aggregates
IEEE 802.11 wireless Local Area Network (WLAN) becomes very prevalent nowadays. Either as a simple range
extender for a home wired Ethernet interface, or as a wireless deployment throughout an enterprise, WLAN provides
mobility, convenience, and low cost. However, an IEEE 802.11b/g wireless network uses the frequency of unlicensed 2.4GHz,
which makes the network unsafe and more vulnerable than traditional Ethernet networks. As a result, anyone who is familiar
with wireless network may initiate a Denial of Service (DoS) attack to influence the common communication of the network or
even make it crash. In this paper, we present our studies on the DoS attacks and mitigation strategies for IEEE 802.11b/g
WLANs and describe some initial implementations using IEEE 802.11b/g wireless devices.
KEYWORDS: Network security, Information security, Defense and security, Network architectures, Internet, Cryptography, Local area networks, Defense technologies, Satellites, Computer security
Airborne networks are envisioned to provide interconnectivity for terrestial and space networks by interconnecting
highly mobile airborne platforms. A number of military applications are expected to be used by the operator, and all
these applications require proper routing security support to establish correct route between communicating platforms in
a timely manner. As airborne networks somewhat different from traditional wired and wireless networks (e.g., Internet,
LAN, WLAN, MANET, etc), security aspects valid in these networks are not fully applicable to airborne networks.
Designing an efficient security scheme to protect airborne networks is confronted with new requirements. In this paper,
we first identify a candidate routing architecture, which works as an underlying structure for our proposed security
scheme. And then we investigate the vulnerabilities and attack models against routing protocols in airborne networks.
Based on these studies, we propose an integrated security solution to address routing security issues in airborne
networks.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.