• DocumentCode
    652207
  • Title

    Security Aspects of Military Sensor-Based Defence Systems

  • Author

    Johnstone, Michael N. ; Thompson, Richard

  • Author_Institution
    Security Res. Inst., Edith Cowan Univ., Perth, WA, Australia
  • fYear
    2013
  • fDate
    16-18 July 2013
  • Firstpage
    302
  • Lastpage
    309
  • Abstract
    The Australian Defence Force has IMAP and JMAP to perform planning prior to the deployment of forces, but due to the dynamic nature of modern warfare there is a knowledge and security gap for on-ground forces during the execution of an operation. Multi-agent based sensor systems can provide on-ground forces with a significant amount of real-time information that can be used to modify planning due to changed conditions. Future planning will require automated agents planners capable of semi-autonomous generated plans and courses of action. Multi-agent sensor systems will also provide cyber security and management of system performance and human C2 workload. This will become a critical C3 ISTAR capability as multi-agents are faster than humans for path planning and resource allocation in multivariate, dynamic, time-pressured environments. The issue with such sensor systems is the degree to which they are vulnerable to attack by opposing forces. This paper explores the types of attack that could be successful using the IEEE 802.15.4 protocol as an example and proposes defences that could be put in place to circumvent or minimise the effect of an attack.
  • Keywords
    command and control systems; multi-agent systems; path planning; resource allocation; security of data; Australian Defence Force; IEEE 802.15.4 protocol; IMAP; JMAP; automated agent planners; command and control; command control communications intelligence surveillance and reconnaissance; critical C3 ISTAR capability; cyber security; human C2 workload; individual military appreciation process; military sensor-based defence systems; multiagent based sensor systems; on-ground forces; path planning; resource allocation; security aspects; semiautonomous generated plans; system performance management; time-pressured environments; Communication system security; IEEE 802.15 Standards; Jamming; Robot sensing systems; Security; Wireless communication; Wireless sensor networks; component; Sensor; Network; Vulnerability; Information Systems Security; Multi-agent system;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
  • Conference_Location
    Melbourne, VIC
  • Type

    conf

  • DOI
    10.1109/TrustCom.2013.277
  • Filename
    6680855