21 May 2015 Information security trades in tactical wireless networks
Author Affiliations +
Wireless networks are now ubiquitous across the tactical environment. They offer unprecedented communications and data access capabilities. However, providing information security to wireless transmissions without impacting performance is a challenge. The information security requirement for each operational scenario presents a large trade space for functionality versus performance. One aspect of this trade space pertains to where information security services are integrated into the protocol stack. This paper will present an overview of the various options that exist and will discuss the advantages and disadvantages of each option.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Michael T. Kurdziel, Michael T. Kurdziel, John A. Alvermann, John A. Alvermann, "Information security trades in tactical wireless networks", Proc. SPIE 9497, Mobile Multimedia/Image Processing, Security, and Applications 2015, 94970D (21 May 2015); doi: 10.1117/12.2176251; https://doi.org/10.1117/12.2176251


Considerations and foundations for Botnet simulation
Proceedings of SPIE (April 13 2009)
Data exfiltration and covert channels
Proceedings of SPIE (May 09 2006)
Bot armies as threats to network security
Proceedings of SPIE (April 08 2007)
End-to-end communications security
Proceedings of SPIE (April 17 2006)

Back to Top