首页 > 最新文献

2016 International Conference on Military Communications and Information Systems (ICMCIS)最新文献

英文 中文
Developing a NATO BYOD security policy 制定北约BYOD安全政策
A. Armando, Gabriele Costa, A. Merlo, Luca Verderame, K. Wrona
Mobile devices have an important role to play in the private as well as the professional activities of working people. However, their use can pose a serious threat to the security of the working environment. Many organizations therefore establish a specific bring your own device (BYOD) policy. This paper presents a proposal for how to foster a secure, policy-aware BYOD work environment. Our solution involves enforcement of fine-grained security policies for personal devices while relieving owners of having to make critical decisions and take responsibility for behavior of applications installed on their devices. We report our experience in developing and applying a security policy based on the existing guidelines of the NATO Communications and Information Agency (NCI Agency).
移动设备在工作人员的私人和专业活动中都发挥着重要作用。然而,它们的使用会对工作环境的安全构成严重威胁。因此,许多组织建立了特定的自带设备(BYOD)策略。本文就如何营造一个安全的、具有政策意识的BYOD工作环境提出了建议。我们的解决方案包括对个人设备实施细粒度的安全策略,同时使所有者不必做出关键决策并对安装在其设备上的应用程序的行为负责。我们报告我们根据北约通信和信息局(NCI机构)现有指导方针制定和应用安全政策的经验。
{"title":"Developing a NATO BYOD security policy","authors":"A. Armando, Gabriele Costa, A. Merlo, Luca Verderame, K. Wrona","doi":"10.1109/ICMCIS.2016.7496587","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496587","url":null,"abstract":"Mobile devices have an important role to play in the private as well as the professional activities of working people. However, their use can pose a serious threat to the security of the working environment. Many organizations therefore establish a specific bring your own device (BYOD) policy. This paper presents a proposal for how to foster a secure, policy-aware BYOD work environment. Our solution involves enforcement of fine-grained security policies for personal devices while relieving owners of having to make critical decisions and take responsibility for behavior of applications installed on their devices. We report our experience in developing and applying a security policy based on the existing guidelines of the NATO Communications and Information Agency (NCI Agency).","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Comparing the capacity of cooperative broadcast to spatial reuse TDMA in ad hoc networks 自组织网络中协同广播与空间复用TDMA的容量比较
Arwid Komulainen, Jimmi Grönkvist, J. Nilsson
Cooperative broadcasting is a promising technique for efficient as well as robust broadcast of information in ad hoc networks. The paper compares the capacity of scheduled cooperative broadcasting with the capacity of Spatial Reuse TDMA (STDMA) for broadcast traffic in ad hoc networks. Three different routing methods for STDMA are considered: a tree-based solution; default MPR-flooding; and a robust version of MPR-flooding obtained by increasing the MPR coverage parameter. The results show that scheduled cooperative broadcasting, besides being robust, also has a higher capacity than STDMA unless the networks are dense, i.e., many neighbors and short average hop lengths. In that case STDMA is efficient as a packet can be broadcasted to the whole network with just a few retransmissions.
协作广播是一种很有前途的高效鲁棒的自组织网络信息广播技术。本文比较了自组织网络中调度合作广播的容量与空间复用TDMA (STDMA)的容量。考虑了三种不同的STDMA路由方法:基于树的解决方案;默认MPR-flooding;以及通过增加MPR覆盖参数获得的鲁棒版本的MPR泛洪。结果表明,除非网络密度大,即邻居多且平均跳长短,调度合作广播除了鲁棒性外,还具有比STDMA更高的容量。在这种情况下,STDMA是有效的,因为数据包可以广播到整个网络,只需要几次重传。
{"title":"Comparing the capacity of cooperative broadcast to spatial reuse TDMA in ad hoc networks","authors":"Arwid Komulainen, Jimmi Grönkvist, J. Nilsson","doi":"10.1109/ICMCIS.2016.7496581","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496581","url":null,"abstract":"Cooperative broadcasting is a promising technique for efficient as well as robust broadcast of information in ad hoc networks. The paper compares the capacity of scheduled cooperative broadcasting with the capacity of Spatial Reuse TDMA (STDMA) for broadcast traffic in ad hoc networks. Three different routing methods for STDMA are considered: a tree-based solution; default MPR-flooding; and a robust version of MPR-flooding obtained by increasing the MPR coverage parameter. The results show that scheduled cooperative broadcasting, besides being robust, also has a higher capacity than STDMA unless the networks are dense, i.e., many neighbors and short average hop lengths. In that case STDMA is efficient as a packet can be broadcasted to the whole network with just a few retransmissions.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124439131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Sweep jamming hit rate analysis for frequency agile communications 频率捷变通信扫频干扰命中率分析
H. Saarnisaari
Communication system performance under jamming can be analyzed in most cases if the jamming hit rate (the percentage of jammed bits) is known or could be estimated. Radar electronic warfare (EW) engineers have used the theory of coincidence of pulse trains for similar situations with success. However, the theory does not hold for communications in all scenarios, especially if a fast sweeping (or stepping) jamming signal disturbs a frequency agile signal. Herein, a modification to the theory is proposed. Furthermore, it is shown by simulations that the modified theory is able to predict the hit rate also in scenarios that are difficult to the original theory. The provided simple to use analysis method is usable not just for communications engineers afraid of jamming and detection but also for EW engineers working on the opposite side.
在大多数情况下,如果干扰命中率(被干扰比特的百分比)是已知的或可以估计的,就可以分析通信系统在干扰下的性能。雷达电子战(EW)工程师已经成功地将脉冲序列重合理论应用于类似的情况。然而,该理论并不适用于所有情况下的通信,特别是当快速扫频(或步进)干扰信号干扰频率捷变信号时。在此,对理论进行了修正。此外,仿真结果表明,改进后的理论能够在原理论难以预测的情况下预测命中率。所提供的简单易用的分析方法不仅适用于害怕干扰和检测的通信工程师,也适用于在对面工作的电子战工程师。
{"title":"Sweep jamming hit rate analysis for frequency agile communications","authors":"H. Saarnisaari","doi":"10.1109/ICMCIS.2016.7496578","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496578","url":null,"abstract":"Communication system performance under jamming can be analyzed in most cases if the jamming hit rate (the percentage of jammed bits) is known or could be estimated. Radar electronic warfare (EW) engineers have used the theory of coincidence of pulse trains for similar situations with success. However, the theory does not hold for communications in all scenarios, especially if a fast sweeping (or stepping) jamming signal disturbs a frequency agile signal. Herein, a modification to the theory is proposed. Furthermore, it is shown by simulations that the modified theory is able to predict the hit rate also in scenarios that are difficult to the original theory. The provided simple to use analysis method is usable not just for communications engineers afraid of jamming and detection but also for EW engineers working on the opposite side.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132017038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Rotational motion estimaiton of high-resoluiton ISAR imaigng for manuvering targets 机动目标高分辨率ISAR成像的旋转运动估计
Gang Xu, Lei Yang, Song Zhou, G. Bi
In this paper, a novel algorithm of rotational parameter estimation is proposed for high-resolution inverse synthetic aperture (ISAR) imaging of maneuvering targets. For a non-uniform rotation target, the signal model is formulated. Then, an entropy minimization approach is used to estimate the rotational parameters, which is solved by using a coordinate descent algorithm based on quasi-Newton method. The estimated parameters are used to rescale the reconstructed ISAR image to extract the target geometry. Finally, experimental analysis is performed to confirm the effectiveness of the proposed algorithm.
针对机动目标的高分辨率反合成孔径成像,提出了一种新的旋转参数估计算法。对于非均匀旋转目标,建立了信号模型。然后,采用熵最小化方法估计旋转参数,并采用基于准牛顿法的坐标下降算法求解。利用估计的参数对重建的ISAR图像进行缩放,提取目标几何形状。最后进行了实验分析,验证了算法的有效性。
{"title":"Rotational motion estimaiton of high-resoluiton ISAR imaigng for manuvering targets","authors":"Gang Xu, Lei Yang, Song Zhou, G. Bi","doi":"10.1109/ICMCIS.2016.7496569","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496569","url":null,"abstract":"In this paper, a novel algorithm of rotational parameter estimation is proposed for high-resolution inverse synthetic aperture (ISAR) imaging of maneuvering targets. For a non-uniform rotation target, the signal model is formulated. Then, an entropy minimization approach is used to estimate the rotational parameters, which is solved by using a coordinate descent algorithm based on quasi-Newton method. The estimated parameters are used to rescale the reconstructed ISAR image to extract the target geometry. Finally, experimental analysis is performed to confirm the effectiveness of the proposed algorithm.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131543003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust spectrum sensing algorithms under noise uncertainty 噪声不确定性下的鲁棒频谱感知算法
Xavier Leturc, C. L. Le Martret, P. Ciblat
In this paper, two spectrum sensing procedures are studied. The first one is based on a modification of the Energy Detector (ED) and the second one is based on a two-sample Goodness-of-Fit (GoF) test. The two procedures require a vector of noise samples, and are robust against noise uncertainty. Exact probability of detection are given for deterministic and Gaussian signal over additive white Gaussian noise (AWGN) and Rayleigh flat fading channel for the modified ED. Simulations show that the two procedures outperform previous schemes.
本文研究了两种频谱感知方法。第一个是基于能量检测器(ED)的改进,第二个是基于两个样本的拟合优度(GoF)测试。这两个过程需要一个噪声样本向量,并且对噪声不确定性具有鲁棒性。对确定性和高斯信号在加性高斯白噪声(AWGN)和瑞利平坦衰落信道上的检测概率进行了改进。仿真结果表明,这两种改进方法都优于先前的方法。
{"title":"Robust spectrum sensing algorithms under noise uncertainty","authors":"Xavier Leturc, C. L. Le Martret, P. Ciblat","doi":"10.1109/ICMCIS.2016.7496541","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496541","url":null,"abstract":"In this paper, two spectrum sensing procedures are studied. The first one is based on a modification of the Energy Detector (ED) and the second one is based on a two-sample Goodness-of-Fit (GoF) test. The two procedures require a vector of noise samples, and are robust against noise uncertainty. Exact probability of detection are given for deterministic and Gaussian signal over additive white Gaussian noise (AWGN) and Rayleigh flat fading channel for the modified ED. Simulations show that the two procedures outperform previous schemes.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125189917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software-defined wireless communications and positioning device for IoT development 用于物联网开发的软件定义无线通信和定位设备
Muhammad Hafeez Chaudhary, B. Scheers
The rapid progress in electronics, sensing, actuation, signal processing, and communication networking has spurred emergence of new technologies like Internet of Things (IoT). In this paper, we report our work on a multi-function IoT (MioT) platform. The MioT supports multiple wireless waveforms that can be used for long as well as short range and beyond-line-of-sight environments and an IEEE 802.15.4 ultra-wide band (UWB) waveform for accurate and precise RF-positioning system in harsh wireless environments, e.g., indoor and industrial environments. With the MioT a library of software APIs are provided to configure different parameters of the device through the USB interface. Besides, USB can also be used to transfer data from host to the MioT and vice-versa. Using the MioT we develop a flexible implementation of the DMR access technology. This implementation is used to provide a robust long-range link for robotic command and control and for cognitive management of WiFi mesh-networks in a project for robotic-assisted search and rescue operations in disaster areas. We also report our preliminary results on RF-ranging based on the UWB waveform.
电子、传感、驱动、信号处理和通信网络的快速发展刺激了物联网(IoT)等新技术的出现。在本文中,我们报告了我们在多功能物联网(MioT)平台上的工作。MioT支持多种无线波形,可用于远距离、短距离和超视距环境,并支持IEEE 802.15.4超宽带(UWB)波形,可在室内和工业环境等恶劣无线环境中实现精确的rf定位系统。MioT提供了一个软件api库,可以通过USB接口配置设备的不同参数。此外,USB还可以用于将数据从主机传输到物联网,反之亦然。利用工业物联网,我们开发了一种灵活的DMR接入技术。在灾区机器人辅助搜索和救援行动项目中,该实现用于为机器人指挥和控制以及WiFi网状网络的认知管理提供强大的远程链接。我们还报告了基于UWB波形的射频测距的初步结果。
{"title":"Software-defined wireless communications and positioning device for IoT development","authors":"Muhammad Hafeez Chaudhary, B. Scheers","doi":"10.1109/ICMCIS.2016.7496555","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496555","url":null,"abstract":"The rapid progress in electronics, sensing, actuation, signal processing, and communication networking has spurred emergence of new technologies like Internet of Things (IoT). In this paper, we report our work on a multi-function IoT (MioT) platform. The MioT supports multiple wireless waveforms that can be used for long as well as short range and beyond-line-of-sight environments and an IEEE 802.15.4 ultra-wide band (UWB) waveform for accurate and precise RF-positioning system in harsh wireless environments, e.g., indoor and industrial environments. With the MioT a library of software APIs are provided to configure different parameters of the device through the USB interface. Besides, USB can also be used to transfer data from host to the MioT and vice-versa. Using the MioT we develop a flexible implementation of the DMR access technology. This implementation is used to provide a robust long-range link for robotic command and control and for cognitive management of WiFi mesh-networks in a project for robotic-assisted search and rescue operations in disaster areas. We also report our preliminary results on RF-ranging based on the UWB waveform.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132815591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Assessing NATO policy alignment through text analysis: An initial study 通过文本分析评估北约政策一致性:初步研究
P. Eles, B. Pennell, M. Richter
This paper summarises the results of an initial study examining the alignment of NATO Policy documents through text analysis. The paper describes a simple approach to abstracting content from policy and implementation documents through subject matter expert (SME)-guided dictionary creation, and we describe the implementation of novel methods to measure and visualize the alignment between pairs of documents. We describe how the process was implemented to measure the vertical and horizontal alignment of NATO policy and implementation documents to provide real-time support for the drafting of NATO documents. We discuss challenges faced in the implementation, and propose potential future solutions.
本文总结了通过文本分析检查北约政策文件一致性的初步研究结果。本文描述了一种通过主题专家(SME)引导的字典创建从政策和实施文档中抽象内容的简单方法,并描述了实现度量和可视化文档对之间对齐的新方法。我们描述了该过程是如何实施的,以衡量北约政策和实施文件的纵向和横向一致性,为北约文件的起草提供实时支持。我们讨论了在实施过程中面临的挑战,并提出了未来可能的解决方案。
{"title":"Assessing NATO policy alignment through text analysis: An initial study","authors":"P. Eles, B. Pennell, M. Richter","doi":"10.1109/ICMCIS.2016.7496577","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496577","url":null,"abstract":"This paper summarises the results of an initial study examining the alignment of NATO Policy documents through text analysis. The paper describes a simple approach to abstracting content from policy and implementation documents through subject matter expert (SME)-guided dictionary creation, and we describe the implementation of novel methods to measure and visualize the alignment between pairs of documents. We describe how the process was implemented to measure the vertical and horizontal alignment of NATO policy and implementation documents to provide real-time support for the drafting of NATO documents. We discuss challenges faced in the implementation, and propose potential future solutions.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of cooperative relaying in an urban scenario 城市场景下的协同中继分析
G. Eriksson, S. Linder
For tactical military communication independence of a fixed infrastructure, base stations or central node is an advantage. Multihop routing in ad hoc networks have these benefits, it is, however, highly dependent on accurate link status in the network to find routes which can be problematic in mobile scenarios. A relatively new concept of cooperative relaying, in which several relay nodes simultaneously retransmits identical copies of the message on the same channel, is promising as it eliminates the need of routing. In this paper, we analyze the performance of an OFDM based cooperative simultaneous relaying scheme in a city scenario with relay nodes located at the same street. The performance is evaluated on measured channels for the individual links and compared with the performance of a traditional single relay technique. The results show that in the investigated scenario, cooperative relaying can increase the median path gain several dB compared to a single relay. However, even if the median path gain is higher there are occurrences of lower path gain with cooperation than with a single relay. The number of occurrences are decreased with more cooperating nodes and can be further decreased by specific cooperative relay techniques, such as phase dithering or delay diversity.
对于战术军事通信独立的固定基础设施,基站或中心节点是一个优势。自组织网络中的多跳路由具有这些优点,然而,它高度依赖于网络中准确的链路状态来查找路由,这在移动场景中可能会出现问题。协作中继是一个相对较新的概念,其中几个中继节点同时在同一通道上重传消息的相同副本,它很有希望,因为它消除了路由的需要。本文分析了一种基于OFDM的协同同步中继方案在中继节点位于同一条街道上的城市场景下的性能。对单个链路的测量信道性能进行了评估,并与传统的单中继技术性能进行了比较。结果表明,在研究的场景中,与单个中继相比,协同中继可以使中位路径增益提高几个dB。然而,即使中位路径增益较高,但与单一继电器相比,合作也会出现较低的路径增益。随着合作节点的增加,出现的次数会减少,并且可以通过特定的合作中继技术(如相位抖动或延迟分集)进一步减少。
{"title":"Analysis of cooperative relaying in an urban scenario","authors":"G. Eriksson, S. Linder","doi":"10.1109/ICMCIS.2016.7496579","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496579","url":null,"abstract":"For tactical military communication independence of a fixed infrastructure, base stations or central node is an advantage. Multihop routing in ad hoc networks have these benefits, it is, however, highly dependent on accurate link status in the network to find routes which can be problematic in mobile scenarios. A relatively new concept of cooperative relaying, in which several relay nodes simultaneously retransmits identical copies of the message on the same channel, is promising as it eliminates the need of routing. In this paper, we analyze the performance of an OFDM based cooperative simultaneous relaying scheme in a city scenario with relay nodes located at the same street. The performance is evaluated on measured channels for the individual links and compared with the performance of a traditional single relay technique. The results show that in the investigated scenario, cooperative relaying can increase the median path gain several dB compared to a single relay. However, even if the median path gain is higher there are occurrences of lower path gain with cooperation than with a single relay. The number of occurrences are decreased with more cooperating nodes and can be further decreased by specific cooperative relay techniques, such as phase dithering or delay diversity.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116285285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack-tolerant networked control system in presence of the controller hijacking attack 网络控制系统在存在控制器劫持攻击时的容错攻击
A. A. Yaseen, M. Bayart
In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. The advantage of this proposed approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.
介绍了网络控制系统(NCS)中容错攻击机制的一种改进方案。目标是能够应对像震网病毒这样的攻击,在这种情况下,控制器被重新编程并被劫持。该方法的优点是不需要先验的控制器数学模型。为了实现所提出的方案,设计了针对控制器劫持攻击的专用检测器。通过将检测器与NCS连接,采用数据加密标准(DES)、消息摘要(MD5)和时间戳等基本安全元素,对该方案的性能进行了评价。测试结果表明,该方法可以有效地检测和恢复被劫持的控制器。
{"title":"Attack-tolerant networked control system in presence of the controller hijacking attack","authors":"A. A. Yaseen, M. Bayart","doi":"10.1109/ICMCIS.2016.7496582","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496582","url":null,"abstract":"In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. The advantage of this proposed approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117346292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Labelling for integrity and availability 标签的完整性和可用性
John Melrose, K. Wrona, Thomas Guenther, Raymond Haakseth, N. Nordbotten, Lars Westerdahl
While information assurance recognizes confidentiality, integrity and availability as properties of information that need to be protected, the use of security metadata has historically been well understood only for protecting confidentiality. In the case of integrity and availability, while the need for their protection is recognized, little attention has been paid to how metadata could be used to describe the required degrees of protection. The research problem addressed by this paper is how to understand the characteristics of integrity and availability in an information security context and identify the necessary metadata elements of each.
虽然信息保障将机密性、完整性和可用性视为需要保护的信息属性,但历史上对安全元数据的使用一直只被理解为保护机密性。在完整性和可用性的情况下,虽然认识到需要保护它们,但很少注意如何使用元数据来描述所需的保护程度。本文研究的问题是如何理解信息安全环境中完整性和可用性的特征,并确定它们的必要元数据元素。
{"title":"Labelling for integrity and availability","authors":"John Melrose, K. Wrona, Thomas Guenther, Raymond Haakseth, N. Nordbotten, Lars Westerdahl","doi":"10.1109/ICMCIS.2016.7496583","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496583","url":null,"abstract":"While information assurance recognizes confidentiality, integrity and availability as properties of information that need to be protected, the use of security metadata has historically been well understood only for protecting confidentiality. In the case of integrity and availability, while the need for their protection is recognized, little attention has been paid to how metadata could be used to describe the required degrees of protection. The research problem addressed by this paper is how to understand the characteristics of integrity and availability in an information security context and identify the necessary metadata elements of each.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127875441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 International Conference on Military Communications and Information Systems (ICMCIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1