Managing Vulnerabilities of Tactical Wireless RF Network Systems: A Case Study

Organisations and individuals benefit when wireless networks are protected. After assessing the risks associated with wireless technologies, organisations can reduce the risks by applying countermeasures to address specific threats and vulnerabilities. These countermeasures include management, operational and technical controls. While these countermeasures will not prevent all penetrations and adverse events, they can be effective in reducing many of the common risks associated with wireless RF networks. Among engineers dealing with different scaled and interconnected engineering systems, such as tactical wireless RF communication systems, there is a growing need for a means of analysing complex adaptive systems. We propose a methodology based on the systematic resolution of complex issues to manage the vulnerabilities of tactical wireless RF systems. There are is a need to assemble and balance the results of any successful measure, showing how well each solution meets the system's objectives. The uncertain arguments used and other test results are combined using a form of mathematical theory for their analysis. Systems engineering thinking supports design decisions and enables decision-makers to manage and assess the support for each solution. In these circumstances, complexity management arises from the many interacting and conflicting requirements of an increasing range of possible parameters. There may not be a single ‘right’ solution, only a satisfactory set of resolutions which this system helps to facilitate. Smart and innovative performance matrixes are introduced using a mathematical Bayesian network to manage, model, calculate and analyse all the potential vulnerability paths in wireless RF networks.

[1]  Cynthia A. Phillips,et al.  Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[2]  Barry W. Boehm,et al.  Some future trends and implications for systems and software engineering processes , 2006, Syst. Eng..

[3]  Cynthia A. Phillips,et al.  A graph-based system for network-vulnerability analysis , 1998, NSPW '98.

[4]  John S. J. Hsu,et al.  Bayesian Methods: An Analysis for Statisticians and Interdisciplinary Researchers , 1999 .

[5]  Yu Liu,et al.  Network vulnerability assessment using Bayesian networks , 2005, SPIE Defense + Commercial Sensing.

[6]  Jian-Bo Yang,et al.  Environmental impact assessment using the evidential reasoning approach , 2006, Eur. J. Oper. Res..

[7]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[8]  William H. J. Manthorpe The Emerging Joint System of Systems: A Systems Engineering Challenge and Opportunity for APL , 1996 .

[9]  A. T. Bahill What is systems engineering , 1995 .

[10]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[11]  Jian-Bo Yang,et al.  The evidential reasoning approach for multi-attribute decision analysis under interval uncertainty , 2006, Eur. J. Oper. Res..

[12]  Vadim Kotov,et al.  Systems of systems as communicating structures , 1999 .

[13]  Stephen J. Lukasik,et al.  Systems, systems of systems, and the education of engineers , 1998, Artificial Intelligence for Engineering Design, Analysis and Manufacturing.

[14]  H. Raiffa,et al.  Decisions with Multiple Objectives , 1993 .

[15]  Karen A. Scarfone,et al.  A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .

[16]  A. Terry Bahill,et al.  The systems engineering started in the middle process: A consensus of systems engineers and project managers , 2001 .

[17]  Duminda Wijesekera,et al.  Scalable, graph-based network vulnerability analysis , 2002, CCS '02.

[18]  Hong Man,et al.  Applying Systems Engineering in Tactical Wireless Network Analysis with Bayesian Networks , 2010, 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks.

[19]  P. Boehm,et al.  Some Future Trends and Implications for Systems and Software Engineering , 2006 .

[20]  Joseph J. Suter,et al.  Fifteen years of satellite tracking development and application to wildlife research and conservation , 1996 .

[21]  Jian-Bo Yang,et al.  On the evidential reasoning algorithm for multiple attribute decision analysis under uncertainty , 2002, IEEE Trans. Syst. Man Cybern. Part A.

[22]  B. G. Dale,et al.  A New Modeling Framework for Organizational Self-Assessment: Development and Application , 2001 .