Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2003
…
9 pages
1 file
This paper describes a network demonstration and three month field trial of mobile networking using mobile-IPv4. The network was implemented as part of the US Coast Guard operational network which is a ".mil" network and requires stringent levels of security. The initial demonstrations took place in November 2002 and a three month field trial took place from July through September of 2003. The mobile network utilized encryptors capable of NSA-approved Type 1 algorithms, mobile router from Cisco Systems and 802.11 and satellite wireless links. This paper also describes a conceptual architecture for wide-scale deployment of secure mobile networking in operational environments where both private and public infrastructure is used. Additional issues presented include link costs, placement of encryptors and running routing protocols over layer-3 encryption devices.
1998
In this paper we discuss various security issues concerning MobileHosts using Mobile-IP or other mobility systems (DHCP standalone)and current firewall technology. We first present some recentattacks on the Internet and what they might mean for mobile systemslike Mobile-IP that rely on tunneling technologies. We point outthat tunnels are a security threat and suggest how mobile systems16may be made "less insecure"
2008 International Conference on Complex, Intelligent and Software Intensive Systems, 2008
Sensor networks are very important for military applications and in particular in battlefields. Sensors can collect very detailed information about enemy, its movements, weapons, and so forth. However, it is important that the information gathered by sensors arrives quickly to the destination, which could be moving objects such as tanks, solders, flying devices, and so on. The security of information in such as dynamic environment is paramount. Therefore, we have developed a new security scheme based on key distribution among stationary sensor networks and mobile data collection nodes. Our scheme is based on key predistribution using separate key pool. The scheme allows the mobile nodes to interact with the stationary nodes of different networks. In our solution, a separate key pool is used to connect the mobile nodes to the stationary nodes. We have performed extensive analysis and simulations to validate the scheme and compare its performance.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023
It has been well recorded and is widely recognized worldwide that the usage of mobile devices to perform government business has expanded over the previous 15 years. Threat actors are consequently increasingly focusing on mobile devices and the mobile infrastructure environment in order to look for opportunities for malicious exploitation that could hurt or damage the reputation of government agencies and Enterprise as well. The various protocols, standards, techniques, and systems that are available determine the security measures that are taken. An overview of security procedures, standards, and related technologies is provided. The high-capacity wired and wireless broadband network serves as the foundation for the working environment. The main study areas, current projects, and services on offer are discussed. The future information society is the focus of all endeavors. In order to help organizations create an enterprise-wide mobile security strategy and policy, this paper explains the security features of the mobile security management ecosystem like products, tools, technologies and services. We have talked about how mobile phone services are protected from dangers to information security from the standpoint of developers. Mobile Internet usage has grown, and with it, threats against mobile phones and the services they offer. On the other hand, various rapacious software or attackers are attempting to target these services.
1998
Mobile Internetworking Protocol or Mobile 1P, proposed in the Internet Engineering Task Force (IETF), does not consider the requirements of tactical military networks, which are predominantly radio based and "on the move" with minimal fixed infrastructure. In this paper, we present a tactical Mobile 1P solution for the military architecture, specifically the Radio Access Point (RAP) network, with a focus on providing mobility and fault tolerance. Our approach, in this work, is on improving survivability by moving mobility agents to higher, less mobile and more fault tolerant echelons in the hierarchy. As a baseline approach, we propose a tactical Mobile 1P solution based on the Mobile 1P protocol proposed in the IETF using Class C address assignment. It is observed that an architecture with multiple Class C address assignment supports basic Mobile 1P operation without any modification. We propose the use of Classless Inter-Domain Routing (CIDR) to accommodate a large number of Internet addresses. It is shown that other address assignment schemes can also be applied to the military architecture without any modification to Mobile 1P. Three route optimization schemes are also described to improve the performance of datagram routing to mobile nodes.
Computer Communications, 2004
In the last few years, we have witnessed an explosion in demand for security measures motivated by the proliferation of mobile/wireless networks, the fixed-mobile network convergence, and the emergence of new services, such as e-commerce. 3G-systems play a key role in this network evolution, and, thus, all stakeholders are interested in the security level supported in the new emerging mobile environment. This paper elaborates on the security framework in 3G mobile networks. The security requirements imposed by the different types of traffic, and by the different players involved (mobile users, serving network and service providers) are investigated. The security architecture, which comprises all the security mechanisms that are projected for the Universal Mobile Telecommunication System (UMTS) network, is analyzed. The employment of traditional security technologies, originally designed for fixed networking, such as firewalls, and static Virtual Private Network (VPN), in order to safeguard the UMTS core network from external attacks, as well as to protect user data when conveyed over the network are examined. Critical points in the 3G-security architecture that may cause network and service vulnerability are identified and discussed. Furthermore, proposals for the enhancement of the 3G-security architecture, and the provision of advanced security services to end-user data traffic within and outside the UMTS core network are discussed. The proposed enhancements can be easily integrated in the existing network infrastructure, and operate transparently to the UMTS network functionality. q IPsec IP security KAC key administration center MAC message authentication code MAP mobile application part MAPsec MAP security MS mobile station MT mobile terminal MSC mobile switching centre NE network entities NDS network domain security PS packet switched Rel-4 release 4 Rel-5 release 5 R99 release '99 RAND random challenge RES user response to challenge RNC radio network controller
2016
Mobile nodes in military situations, for example, a war zone or an unfriendly region are probably going to experience the ill effects of discontinuous system availability and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that permit wireless devices carried by soldiers to communicate with each other and get to the private data or charge dependably by abusing outside storage nodes. Probably the hardest issues in this situation are the requirement of approval strategies and the arrangements upgrade for secure information recovery. Ciphertext-approach characteristic based encryption (CP-ABE) is a promising cryptographic solution to the access control problem. However, the problem of applying CP-ABE in decentralized DTNs presents a few security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and proficiently deal with the classified information conveyed in the disturbance tolerant military system.
2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277), 2001
Cisco Systems and NASA Glenn Research Center under a NASA Space Act Agreement have been performing joint networking research to apply Internet technologies and protocols to space-based communications. During this time, Cisco Systems developed the mobile-router which NASA and Cisco jointly tested. The early field trials of this technology have been successfully completed. The mobile-router is software code that resides in a network router. A Mobile-Router allows entire networks to roam while maintaining connectivity to the Internet. This router code is pertinent to a myriad of applications for both the government and commercial sectors. This technology will be applied to the wireless battlefield. NASA and the DoD will utilize this technology for nearplanetary observation and sensing spacecraft. It is the enabling technology for communication via the Internet or Intranets to aircraft. Information such as weather, air traffic control, voice and video can be easily and inexpensively transmitted to the aircraft using Internet protocols. The mobile router can be incorporated into emergency vehicles particularly ambulances and lifeflight aircraft to provide real-time connectivity back to the hospital and healthcare experts. Commercial applications include entertainment services, IP telephone, and Internet connectivity for cruise ships, commercial shipping, tour busses, aircraft, and eventually cars.
MILCOM 2008 - 2008 IEEE Military Communications Conference, 2008
The US Department of Defense (DoD) is developing a Network Centric Warfighting (NCW) capability. Key to the deployment of NCW capabilities is the development of scalable networks supporting end user mobility. Initial network deployments operate either At-The-Halt (ATH) or On-the-Move (OTM) with preplanned movements. This is consistent with current networking capabilities with respect to large scale mobile network capabilities and protocols. However, future architectures and capabilities should allow for more flexible mobility models allowing for more flexible and robust NCW capabilities. We investigate hierarchical network models which are comprised of a high bandwidth, planned mobile core network interconnecting subtending more mobile end user networks. Standard IP routing and name and location services are assumed within the core network. The subtending and mobile end user networks rely upon highly scalable (from a mobility perspective) Beacon-Based routing architecture. The interface between the core and subtending mobile networks relies upon network concepts being developed within the Internet Engineering Task Force (IETF), specifically from IPv6 mobility and the Host Identity Protocol (HIP) rendezvous service for mobile networks. We discuss the advantageous of this architecture in terms is mobility, scalability, current DoD network plans and commercial protocol development. * Robert Cole is supported by the following grant NSF-XXX-XXXXXXX. † Baruch Awerbuch is supported by the following grant NSF-XXX-XXXXXXX.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Mission-Oriented Sensor Networks and Systems: Art and Science, 2019
Wireless and Mobile Network Security, 2009
ACM SIGMOBILE Mobile Computing and Communications Review, 2005
Modern Applied Science, 2008
Telecommunication Systems, 2007
International Academy of Science, Technology, Engineering and Management, 2018
Lecture Notes in Computer Science, 2021
2007 29th International Conference on Information Technology Interfaces, 2007
Annales Des Télécommunications, 2000
Proceedings of IEEE Singapore International Conference on Networks/International Conference on Information Engineering '93, 2000
CBU International Conference Proceedings, 2019
Journal of Southwest Jiaotong University, 2020
Information Security for South Africa (ISSA …
Systems Engineering, 2017
Wireless Communications and Mobile Computing, 2010
IFIP Advances in Information and Communication Technology, 2002