Contemporary IT Security for Military Online Collaboration Platforms

Persistent armed conflicts with volatile intensities around Europe and resultant incidents directly on the old continent prompt the European governments and their general staffs to hold militiamen as reserve forces ready for emergency cases. These semi-professional soldiers need to regularly exercise their military skills. It is common practice that the leaderships of militia organizations connect via the Internet to military online collaboration platforms to prepare their field exercises there. Despite the involvement of the Internet in the transmission of sensitive military data, the IT security objectives authenticity, integrity, nonrepudiation, privacy, and resilience must be achieved at all costs. In the absence of an apposite IT security concept for such platforms in the literature, this publication amalgamates topical techniques to propose an access model that fulfills all five IT security targets. Beside the development stages threat model, security policy, and security mechanism, the disquisition proves the feasibility of the approach by manifesting airtight performance and security analyses.

[1]  B. Gladman,et al.  Security Engineering: a Guide to Building Dependable Distributed Systems Physical Tamper Resistance 14.1 Introduction , 2022 .

[2]  Douglas Stebila,et al.  Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer , 2009, RFC.

[3]  H V PIPBERGER,et al.  Automatic Recognition of Electrocardiographic Waves by Digital Computer , 1961, Circulation research.

[4]  Ana L. N. Fred,et al.  Unveiling the Biometric Potential of Finger-Based ECG Signals , 2011, Comput. Intell. Neurosci..

[5]  L. Biel,et al.  ECG analysis: a new approach in human identification , 1999, IMTC/99. Proceedings of the 16th IEEE Instrumentation and Measurement Technology Conference (Cat. No.99CH36309).

[6]  Mohammad Derawi,et al.  Fusion of gait and ECG for biometric user authentication , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[7]  Paul Lukowicz,et al.  AMON: a wearable multiparameter medical monitoring and alert system , 2004, IEEE Transactions on Information Technology in Biomedicine.

[8]  Jeffrey M. Hausdorff,et al.  Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .

[9]  Paul Lukowicz,et al.  AMON: a wearable medical computer for high risk patients , 2002, Proceedings. Sixth International Symposium on Wearable Computers,.

[10]  Willis J. Tompkins,et al.  Implementation of a one-lead ECG human identification system on a normal population , 2010 .

[11]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[12]  Fethi Bereksi-Reguig,et al.  A novel biometric authentication approach using ECG and EMG signals , 2015, Journal of medical engineering & technology.

[13]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[14]  Ana L. N. Fred,et al.  ECG-based Continuous Authentication System using Adaptive String Matching , 2011, BIOSIGNALS.

[15]  Guido Bertoni,et al.  The Making of KECCAK , 2014, Cryptologia.

[16]  Stephen Smalley,et al.  Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.

[17]  Eric Rescorla,et al.  Diffie-Hellman Key Agreement Method , 1999, RFC.

[18]  Jiankun Hu,et al.  ECG-Based Authentication , 2010, Handbook of Information and Communication Security.

[19]  Ana L. N. Fred,et al.  Finger ECG signal for user authentication: Usability and performance , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[20]  Dimitrios Hatzinakos,et al.  Analysis of Human Electrocardiogram for Biometric Recognition , 2008, EURASIP J. Adv. Signal Process..

[21]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[22]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[23]  Friedrich L. Bauer,et al.  Decrypted secrets - methods and maxims of cryptology , 1997 .

[24]  D. Hatzinakos,et al.  ECG Biometric Recognition Without Fiducial Detection , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[25]  Karim Faez,et al.  Human Identification Based on Electrocardiogram and Palmprint , 2012 .

[26]  Joseph A. O'Sullivan,et al.  ECG Biometric Recognition: A Comparative Analysis , 2012, IEEE Transactions on Information Forensics and Security.

[27]  Ola Pettersson,et al.  ECG analysis: a new approach in human identification , 2001, IEEE Trans. Instrum. Meas..

[28]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[29]  Yu Hen Hu,et al.  One-lead ECG for identity verification , 2002, Proceedings of the Second Joint 24th Annual Conference and the Annual Fall Meeting of the Biomedical Engineering Society] [Engineering in Medicine and Biology.

[30]  Tanzeem Choudhury,et al.  Activity-aware ECG-based patient authentication for remote health monitoring , 2009, ICMI-MLMI '09.

[31]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[32]  Mohammed Abo-Zahhad,et al.  Biometric authentication based on PCG and ECG signals: present status and future directions , 2013, Signal, Image and Video Processing.

[33]  John J Soraghan,et al.  Pulse Active Bit (PAB) feature extractor for ECG biometric authentication , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.

[34]  Michiel van der Veen,et al.  Morphological synthesis of ECG signals for person authentication , 2007, 2007 15th European Signal Processing Conference.

[35]  Hugo Silva,et al.  Study and evaluation of a single differential sensor design based on electro-textile electrodes for ECG biometrics applications , 2011, 2011 IEEE SENSORS Proceedings.

[36]  John J. Soraghan,et al.  Pulse Active Ratio (PAR): A new feature extraction technique for ECG biometric authentication , 2011, 2011 IEEE International Conference on Signal and Image Processing Applications (ICSIPA).

[37]  Adrian D. C. Chan,et al.  Wavelet Distance Measure for Person Identification Using Electrocardiograms , 2008, IEEE Transactions on Instrumentation and Measurement.

[38]  Ana L. N. Fred,et al.  Towards a Finger based ECG Biometric System , 2011, BIOSIGNALS.

[39]  A. N. Zincir-Heywood,et al.  Intrusion Detection Systems , 2008 .

[40]  Steve Mansfield-Devine Biometrics at war: the US military's need for identification and authentication , 2012 .

[41]  Brenda K. Wiederhold,et al.  ECG to identify individuals , 2005, Pattern Recognit..

[42]  Roberto Sassi,et al.  ECG biometric recognition: Permanence analysis of QRS signals for 24 hours continuous authentication , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[43]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[44]  Lalit M. Patnaik,et al.  Multimodal Biometric Authentication using ECG and Fingerprint , 2015 .