Providing real-time security support for multi-level ad-hoc networks

Digital battlefields have different settings from the existing communication networks like the Internet or cellular networks, which are established on permanent infrastructures and transaction/session-based applications. The constantly changing tactical environment may demand many real-time needs in both data collection and data delivery. We propose a solution that employs: (i) portable mobile real-time data collectors; and (ii) multi-level ad-hoc networks with high-throughput communication channels to gather and deliver multimedia data at real time in digital battlefields, hence providing effective real-time communication and coordination support for all tactical units. This paper studies how to ensure data privacy in such environments. We define the set of metrics to provide quantified security supports to multimedia streams collected and transmitted at real time. Our implementation and measurements on portable mobile devices demonstrate that the metrics are useful in evaluating modern cipher algorithms based on their encryption performance and other throughput requirements.

[1]  Xiaoyan Hong,et al.  Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).

[2]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[3]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[4]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[5]  Dan Boneh,et al.  Experimenting with Electronic Commerce on the PalmPilot , 1999, Financial Cryptography.

[6]  Xiaoyan Hong,et al.  C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[7]  Vincent Park,et al.  Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification , 2001 .

[8]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.

[9]  P. R. Kumar,et al.  Internets in the sky: The capacity of three-dimensional wireless networks , 2001, Commun. Inf. Syst..

[10]  Robert Tappan Morris,et al.  Capacity of Ad Hoc wireless networks , 2001, MobiCom '01.

[11]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[12]  J. Broch,et al.  Dynamic source routing in ad hoc wireless networks , 1998 .

[13]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[14]  V. Gupta,et al.  Securing the wireless internet , 2001, IEEE Commun. Mag..

[15]  T. Dierks,et al.  The TLS protocol , 1999 .

[16]  Xiaoyan Hong,et al.  UAV aided intelligent routing for ad-hoc wireless network in single-area theater , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[17]  Charles E. Perkins,et al.  Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..

[18]  H. Feistel Cryptography and Computer Privacy , 1973 .