Securing military decision making in a network-centric environment

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.authorCandolin, Catharina
dc.contributor.departmentDepartment of Computer Science and Engineeringen
dc.contributor.departmentTietotekniikan osastofi
dc.contributor.labLaboratory for Theoretical Computer Scienceen
dc.contributor.labTietojenkäsittelyteorian laboratoriofi
dc.date.accessioned2012-02-17T07:25:36Z
dc.date.available2012-02-17T07:25:36Z
dc.date.issued2005-12-20
dc.description.abstractThe development of the society and warfare goes hand in hand. With the proliferation of modern information technology, in particular communication technology, concepts such as information warfare and network-centric warfare have emerged. Information has become one of the core elements in military decision making, where the purpose is to gain information superiority with respect to the enemy while denying the enemy from doing the same. Network-centricity comes from the fact that communication networks are used to enable information warfare in the theatre of operations. Thus, the role of the communication network is to support decision making. In this thesis, military decision making in a network-centric environment is analyzed from the perspective of information warfare. Based on the analysis, a set of security requirements are identified. The thesis also proposes a set of solutions and concepts to the vulnerabilities found and analyzes the solutions with respect to the requirements and a set of use scenarios. The main solutions are Packet Level Authentication, which secures the military infrastructure, and Self-healing Networks, which enable the network to restructure itself after a large-scale or dedicated attack. The restructuring process relies on a Context Aware Management architecture, which has originally been developed to allow network nodes to rapidly react to a changing environment. Furthermore, the thesis presents a trust management model based on incomplete trust to cope with compromised nodes. Also privacy issues are discussed; several different privacy classes are identified and the problems with each of them are addressed.en
dc.description.versionrevieweden
dc.format.extent141
dc.format.mimetypeapplication/pdf
dc.identifier.isbn951-22-7981-9
dc.identifier.issn1795-4584
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/2646
dc.identifier.urnurn:nbn:fi:tkk-006061
dc.language.isoenen
dc.publisherHelsinki University of Technologyen
dc.publisherTeknillinen korkeakoulufi
dc.relation.ispartofseriesTKK dissertationsen
dc.relation.ispartofseries20en
dc.subject.keywordsecurityen
dc.subject.keywordcommunication networken
dc.subject.keywordinformation warfareen
dc.subject.keywordnetwork-centric warfareen
dc.subject.keyworddecision makingen
dc.subject.otherComputer scienceen
dc.subject.otherElectrical engineeringen
dc.titleSecuring military decision making in a network-centric environmenten
dc.typeG4 Monografiaväitöskirjafi
dc.type.dcmitypetexten
dc.type.ontasotVäitöskirja (monografia)fi
dc.type.ontasotDoctoral dissertation (monograph)en
local.aalto.digiauthask
local.aalto.digifolderAalto_67348
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
isbn9512279819.pdf
Size:
1005.71 KB
Format:
Adobe Portable Document Format