Reliability, Fault Tolerance and Other Critical Components for Survivability in Information Warfare

The information revolution has caused many aspects of human activity to critically depend on a wide variety of physically existing or virtual technological achievements such as electronic devices, computer systems, algorithms, cloud resources, artificial intelligence hardware and software entities etc. Many of these systems are used in highly sensitive contexts, such as military applications. This implies the existence of an increasing number of unintentional disturbances or malicious attacks. Successful operation requires qualities such as robustness, fault tolerance, reliability, availability and security. All these may be summarized by the title of survivability. Survivability of critical systems working for sensitive applications involves the ability to provide uninterrupted operation under severe disturbances, gracefully degrade when limiting conditions are reached and maintain the ability to resume normal service once the disturbances have been removed. Survivability is an important, even - though non – functional, lifecycle property of many engineering systems. Further desirable elements of survivability include the ability of systems to recognize and resist attacks or accidents, adapt in order to avoid them and modify their behavior in order to diminish the effects of similar future occurrences. This chapter presents a quantitative approach to assessing survivability and an account of survivability in military systems. A scheme for survivability via replica diversity in the implementation of the AES algorithm is then presented. Following that, an algorithm for adaptive attack aversion in user authentication systems is presented that is based on Boolean transformations. An approach for increased survivability in Internet of Things (IoT) systems is then presented. Finally, an algorithm for secure data storage in cloud resources is presented that allows attack detection and avoidance.

[1]  Christophe Giraud,et al.  An Implementation of DES and AES, Secure against Some Attacks , 2001, CHES.

[2]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[3]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[4]  Jennifer Seberry,et al.  Nonlinearity and Propagation Characteristics of Balanced Boolean Functions , 1995, Inf. Comput..

[5]  Nikolaos Doukas,et al.  Efficient zero — Knowledge identification based on one way Boolean transformations , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[6]  Khaled A. S. Abdel-Ghaffar,et al.  Parity-Check Matrices Separating Erasures From Errors , 2013, IEEE Transactions on Information Theory.

[7]  Dou Bing-Lin,et al.  Research on Survivability of Networked Information System , 2009, 2009 International Conference on Signal Processing Systems.

[8]  Nikolaos Doukas,et al.  Fast subscriber identification based on the zero knowledge principle for multimedia content distribution , 2010, Int. J. Multim. Intell. Secur..

[9]  Bo Sheng,et al.  Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[10]  Jia-Lun Tsai,et al.  Efficient multi-server authentication scheme based on one-way hash function without verification table , 2008, Comput. Secur..

[11]  Vyacheslav Kharchenko,et al.  Reliability and Security Issues for IoT-based Smart Business Center: Architecture and Markov Model , 2016, 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI).

[12]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[13]  Yun Liu and Kishore S. Trivedi,et al.  Survivability Quantification: The Analytical Modeling Approach , 2006 .

[14]  Athanasios Drigas,et al.  Two level efficient user authentication scheme , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.

[15]  N. G. Bardis,et al.  Organization of the polymorphic implementation of Rijndael on microcontrollers and smart cards , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[16]  Kaoru Kurosawa,et al.  Strongly universal hashing and identification codes via channels , 1999, IEEE Trans. Inf. Theory.

[17]  Kishor S. Trivedi,et al.  Survivability quantification of communication services , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[18]  Vinod M. Prabhakaran,et al.  Decentralized erasure codes for distributed networked storage , 2006, IEEE Transactions on Information Theory.

[19]  Nikolaos Doukas,et al.  Effective method to restore data in distributed data storage systems , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[20]  Mario Blaum,et al.  Partial-MDS Codes and Their Application to RAID Type of Architectures , 2012, IEEE Transactions on Information Theory.

[21]  Peter Stavroulakis Reliability, survivability and quality of large scale telecommunication systems : case study: Olympic Games , 2002 .

[22]  James L. Massey,et al.  Review of 'Error-Correcting Codes, 2nd edn.' (Peterson, W. W., and Weldon, E. J., Jr.; 1972) , 1973, IEEE Trans. Inf. Theory.

[23]  Jean-Marc Robert,et al.  Security and usability: the case of the user authentication methods , 2006, IHM '06.

[24]  Kevin J. Sullivan,et al.  Towards a rigorous definition of information system survivability , 2003, Proceedings DARPA Information Survivability Conference and Exposition.