Title :
Security Aspects of Military Sensor-Based Defence Systems
Author :
Johnstone, Michael N. ; Thompson, Richard
Author_Institution :
Security Res. Inst., Edith Cowan Univ., Perth, WA, Australia
Abstract :
The Australian Defence Force has IMAP and JMAP to perform planning prior to the deployment of forces, but due to the dynamic nature of modern warfare there is a knowledge and security gap for on-ground forces during the execution of an operation. Multi-agent based sensor systems can provide on-ground forces with a significant amount of real-time information that can be used to modify planning due to changed conditions. Future planning will require automated agents planners capable of semi-autonomous generated plans and courses of action. Multi-agent sensor systems will also provide cyber security and management of system performance and human C2 workload. This will become a critical C3 ISTAR capability as multi-agents are faster than humans for path planning and resource allocation in multivariate, dynamic, time-pressured environments. The issue with such sensor systems is the degree to which they are vulnerable to attack by opposing forces. This paper explores the types of attack that could be successful using the IEEE 802.15.4 protocol as an example and proposes defences that could be put in place to circumvent or minimise the effect of an attack.
Keywords :
command and control systems; multi-agent systems; path planning; resource allocation; security of data; Australian Defence Force; IEEE 802.15.4 protocol; IMAP; JMAP; automated agent planners; command and control; command control communications intelligence surveillance and reconnaissance; critical C3 ISTAR capability; cyber security; human C2 workload; individual military appreciation process; military sensor-based defence systems; multiagent based sensor systems; on-ground forces; path planning; resource allocation; security aspects; semiautonomous generated plans; system performance management; time-pressured environments; Communication system security; IEEE 802.15 Standards; Jamming; Robot sensing systems; Security; Wireless communication; Wireless sensor networks; component; Sensor; Network; Vulnerability; Information Systems Security; Multi-agent system;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
DOI :
10.1109/TrustCom.2013.277