DocumentCode :
1614767
Title :
Tactical network security
Author :
Jacobs, Stuart
Author_Institution :
GTE Lab. Inc., Waltham, MA, USA
Volume :
1
fYear :
1999
fDate :
6/21/1905 12:00:00 AM
Firstpage :
651
Abstract :
As the US Army evolves its concepts for the tactical battlefield of the 21st century, a comprehensive system architecture is unfolding. Yet our combat forces face many potentially sophisticated adversaries who will seek out and attack any vulnerabilities in our combat systems and communications infrastructure they can identify. This paper examines the types of adversaries, the threats they pose and the vulnerabilities most likely targeted within the Army´s Warfighter Information Network (WIN). An overview is provided of how cryptographic methods may be used to mitigate WIN vulnerabilities. Included is a review of secret key and public key cryptographic methods and their relative advantages and disadvantages. We conclude by identifying a number of security related issues that require further consideration
Keywords :
information networks; military communication; military computing; public key cryptography; telecommunication security; US Army; Warfighter Information Network; adversaries; combat systems; communications infrastructure; public key cryptographic methods; secret key cryptographic methods; system architecture; tactical battlefield; tactical network security; Collaboration; Command and control systems; Communication system security; Context awareness; Information security; Jacobian matrices; Laboratories; National security; Public key cryptography; Storms;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference Proceedings, 1999. MILCOM 1999. IEEE
Conference_Location :
Atlantic City, NJ
Print_ISBN :
0-7803-5538-5
Type :
conf
DOI :
10.1109/MILCOM.1999.822764
Filename :
822764
Link To Document :
بازگشت