Wireless networks are now ubiquitous across the tactical environment. They offer unprecedented communications
and data access capabilities. However, providing information security to wireless transmissions without impacting
performance is a challenge. The information security requirement for each operational scenario presents a large
trade space for functionality versus performance. One aspect of this trade space pertains to where information
security services are integrated into the protocol stack. This paper will present an overview of the various options
that exist and will discuss the advantages and disadvantages of each option.
KEYWORDS: Network security, Local area networks, Computer security, Information security, Signal detection, Defense and security, Network architectures, Telecommunications, Error analysis, Control systems
The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only
possible using modern network communications systems. Securing these Tactical Networks without impacting their
capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their
commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and
motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have
additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and
use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed
infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat
model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the
model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be
scaled and adapted to the needs of specific deployments.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.