Browsing by Author "Manner, Jukka, Prof., Aalto University, Department of Communications and Networking, Finland"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Developing cyber security architecture for military networks using cognitive networking(Aalto University, 2015) Kärkkäinen, Anssi; Manner, Jukka, Prof., Aalto University, Department of Communications and Networking, Finland; Tietoliikenne- ja tietoverkkotekniikan laitos; Department of Communications and Networking; Sähkötekniikan korkeakoulu; School of Electrical Engineering; Manner, Jukka, Prof., Aalto University, Department of Communications and Networking, FinlandIn recent years, the importance of cyber security has increased. Cyber security has not become a critical issue only for governmental or business actors, but also for armed forces that nowadays rely on national or even global networks in their daily activities. The Network Centric Warfare (NCW) paradigm has increased the significance of networking during last decades as it enables information superiority in which military combat power increased by networking the battlefield actors from perspective of processes, operations and information sharing. At tactical level, the ability to share information sets high requirements for data transport, and its security because the circumstances and needs of the operational activities are very challenging. The development of military communication capabilities requires long term planning to ensure interoperability and maintain a life cycle support for even decades. Different network system architectures, including also cyber security, are an important tool to manage this long term development. This thesis is focused on architectural cyber security aspects of military networks, and considers how security is improved by developing network cyber security architectures in line with military networking capability development. In the long term capability development, Cognitive Networks (CN) are seen as a promising solution for intelligent, self-learning and reliable networking. The phases of the NATO Network Enabled Capability (NEC) development require different types of architectural approaches for cyber security. In the short and mid-term, the development is based on the common security solutions and multilevel security. For the long term goal, the coherent networking requires a novel network cyber security architectural approach as networking will be based on the cognitive networks. For the short and mid-term, the architectures for privacy protection, delay-tolerant networking, and multilevel security provide partial solutions for developing network cyber security. For the long term development, the thesis presents a novel cognitive network-based cyber security architecture that provides an overall design to build automated, self-configurable security management and control for future tactical military communications. The capabilities of the architecture ensure improved cyber threat management, and situational awareness. Cognitive behavior enables dynamic service configuration to protect services against cyber attacks. The implementation of the architectures requires more research. The evaluation of architectures is a challenging task requiring simulations and practical implementations to measure the features designed in the architecture.Item No Link Left Behind(Aalto University, 2016) Sonntag, Sebastian; Manner, Jukka, Prof., Aalto University, Department of Communications and Networking, Finland; Tietoliikenne- ja tietoverkkotekniikan laitos; Department of Communications and Networking; Sähkötekniikan korkeakoulu; School of Electrical Engineering; Manner, Jukka, Prof., Aalto University, Department of Communications and Networking, FinlandMobile Internet access has become a critical part of our society. Practically every person in Western countries has a smart phone. These devices are used from browsing the Internet to business transactions, various streaming services, and even emergency information. As a consequence, mobile data traffic is quickly catching up with wired traffic. People, especially in rural areas, are replacing their wired connections with mobile broadband. One of the most recent evolutions are multisim devices that allow simultaneous access to multiple mobile networks and thereby enhance the quality of the mobile connection. However, there is no established protocol for utilizing this type of multipath access. Multipath transport is a transport-level solution that makes it possible for end hosts to use multiple access networks simultaneously. This dissertation analyzes the feasibility of using multipath transport in mobile networks. Prior studies suggest that a protocol for multipath transport requires user need, that the protocol is superior to existing solutions, and that the network has capacity. This dissertation shows use cases and demand, analyzes achievable performance, and verifies that mobile networks have the capacity and diversity for multipath communication. Finally, the dissertation quantifies the benefits of using multipath transport. There are two categories of mobile devices that allow access to multiple networks: active and passive multisim devices. Multipath transport can aggregate very efficiently all capacity available to active multisim device. In contrast, passive multisim devices make use of a host multihoming protocol for sequential access to mobile networks. The results show that mobile networks are diverse enough to improve availability, throughput and failure tolerance. Thus, multipath transport enables mobile devices to maintain an acceptable level of service in both time and space.