Secure Enterprise Mobile Ad-hoc Networks
Threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to build an impenetrable fortress to prevent hostile entities from entering the enterprise domain. However, this defense and its many reinforcements have repeatedly been found...
Gespeichert in:
Veröffentlicht in: | IAENG international journal of computer science 2019-05, Vol.46 (2), p.243 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 2 |
container_start_page | 243 |
container_title | IAENG international journal of computer science |
container_volume | 46 |
creator | Simpson, William R Foltz, Kevin E |
description | Threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to build an impenetrable fortress to prevent hostile entities from entering the enterprise domain. However, this defense and its many reinforcements have repeatedly been found inadequate. The current complexity level has made the fortress approach to security, which is implemented throughout the defense, banking, and other hightrust industries unworkable. An alternative security approach, called Enterprise Level Security (ELS), is the result of a concentrated multi-year program of pilots and research. The primary identity credential for ELS is the Public Key Infrastructure (PKI) certificate, issued to the individual who is provided with a Personal Identity Verification (PIV) card with a hardware chip for storing the private key. All sessions are preceded by a PKI mutual authentication (secondary authentication may be employed when necessary) within Transport Layer Security (TLS) 1.2, and a secure communication pipeline is established. This process was deemed to provide a high enough identity assurance to proceed. However, mobile ad-hoc networking allows entities to dynamically connect and reconfigure connections to make use of available networking resources in a changing environment. These networks range from tiny sensors setting up communications based on a random or unknown configuration to aircraft communicating with each other, the ground, and satellites. Scenarios have differing requirements in terms of setup, reconfiguration, power, speed, and range. This paper presents an adaptation of the ELS principles to the mobile adhoc scenario. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2245661380</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2245661380</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-f38396e81bcf9378a8a5e6ac5d797be2fd3d84889d7d68cca1e6890d46a011563</originalsourceid><addsrcrecordid>eNotj71qwzAURkVpoCHNOxi6dBFYvtLV1RhC-gNJOzRDtiBL19RtiFzJpq_fQDN9ZzqH70bMFSknXdPo2yujwcOdWJbSt7XWFogMzMXjB4cpc7U5j5yH3BeudqntT1ytovxMoXrj8Tfl73IvZp0_FV5edyH2T5v9-kVu359f16utHByNsgMCh0yqDZ0DS568YfTBROtsy00XIZImctFGpBC8YiRXR42-VsogLMTDv3bI6WfiMh6_0pTPl-Lx8sUgKqAa_gD6nD3m</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2245661380</pqid></control><display><type>article</type><title>Secure Enterprise Mobile Ad-hoc Networks</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Simpson, William R ; Foltz, Kevin E</creator><creatorcontrib>Simpson, William R ; Foltz, Kevin E</creatorcontrib><description>Threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to build an impenetrable fortress to prevent hostile entities from entering the enterprise domain. However, this defense and its many reinforcements have repeatedly been found inadequate. The current complexity level has made the fortress approach to security, which is implemented throughout the defense, banking, and other hightrust industries unworkable. An alternative security approach, called Enterprise Level Security (ELS), is the result of a concentrated multi-year program of pilots and research. The primary identity credential for ELS is the Public Key Infrastructure (PKI) certificate, issued to the individual who is provided with a Personal Identity Verification (PIV) card with a hardware chip for storing the private key. All sessions are preceded by a PKI mutual authentication (secondary authentication may be employed when necessary) within Transport Layer Security (TLS) 1.2, and a secure communication pipeline is established. This process was deemed to provide a high enough identity assurance to proceed. However, mobile ad-hoc networking allows entities to dynamically connect and reconfigure connections to make use of available networking resources in a changing environment. These networks range from tiny sensors setting up communications based on a random or unknown configuration to aircraft communicating with each other, the ground, and satellites. Scenarios have differing requirements in terms of setup, reconfiguration, power, speed, and range. This paper presents an adaptation of the ELS principles to the mobile adhoc scenario.</description><identifier>ISSN: 1819-656X</identifier><identifier>EISSN: 1819-9224</identifier><language>eng</language><publisher>Hong Kong: International Association of Engineers</publisher><subject>Aircraft communication ; Aircraft configurations ; Changing environments ; Encryption ; Identity ; Mobile ad hoc networks ; Pilots ; Public Key Infrastructure ; Reconfiguration ; Wireless networks</subject><ispartof>IAENG international journal of computer science, 2019-05, Vol.46 (2), p.243</ispartof><rights>Copyright International Association of Engineers May 27, 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Simpson, William R</creatorcontrib><creatorcontrib>Foltz, Kevin E</creatorcontrib><title>Secure Enterprise Mobile Ad-hoc Networks</title><title>IAENG international journal of computer science</title><description>Threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to build an impenetrable fortress to prevent hostile entities from entering the enterprise domain. However, this defense and its many reinforcements have repeatedly been found inadequate. The current complexity level has made the fortress approach to security, which is implemented throughout the defense, banking, and other hightrust industries unworkable. An alternative security approach, called Enterprise Level Security (ELS), is the result of a concentrated multi-year program of pilots and research. The primary identity credential for ELS is the Public Key Infrastructure (PKI) certificate, issued to the individual who is provided with a Personal Identity Verification (PIV) card with a hardware chip for storing the private key. All sessions are preceded by a PKI mutual authentication (secondary authentication may be employed when necessary) within Transport Layer Security (TLS) 1.2, and a secure communication pipeline is established. This process was deemed to provide a high enough identity assurance to proceed. However, mobile ad-hoc networking allows entities to dynamically connect and reconfigure connections to make use of available networking resources in a changing environment. These networks range from tiny sensors setting up communications based on a random or unknown configuration to aircraft communicating with each other, the ground, and satellites. Scenarios have differing requirements in terms of setup, reconfiguration, power, speed, and range. This paper presents an adaptation of the ELS principles to the mobile adhoc scenario.</description><subject>Aircraft communication</subject><subject>Aircraft configurations</subject><subject>Changing environments</subject><subject>Encryption</subject><subject>Identity</subject><subject>Mobile ad hoc networks</subject><subject>Pilots</subject><subject>Public Key Infrastructure</subject><subject>Reconfiguration</subject><subject>Wireless networks</subject><issn>1819-656X</issn><issn>1819-9224</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNotj71qwzAURkVpoCHNOxi6dBFYvtLV1RhC-gNJOzRDtiBL19RtiFzJpq_fQDN9ZzqH70bMFSknXdPo2yujwcOdWJbSt7XWFogMzMXjB4cpc7U5j5yH3BeudqntT1ytovxMoXrj8Tfl73IvZp0_FV5edyH2T5v9-kVu359f16utHByNsgMCh0yqDZ0DS568YfTBROtsy00XIZImctFGpBC8YiRXR42-VsogLMTDv3bI6WfiMh6_0pTPl-Lx8sUgKqAa_gD6nD3m</recordid><startdate>20190527</startdate><enddate>20190527</enddate><creator>Simpson, William R</creator><creator>Foltz, Kevin E</creator><general>International Association of Engineers</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20190527</creationdate><title>Secure Enterprise Mobile Ad-hoc Networks</title><author>Simpson, William R ; Foltz, Kevin E</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-f38396e81bcf9378a8a5e6ac5d797be2fd3d84889d7d68cca1e6890d46a011563</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Aircraft communication</topic><topic>Aircraft configurations</topic><topic>Changing environments</topic><topic>Encryption</topic><topic>Identity</topic><topic>Mobile ad hoc networks</topic><topic>Pilots</topic><topic>Public Key Infrastructure</topic><topic>Reconfiguration</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Simpson, William R</creatorcontrib><creatorcontrib>Foltz, Kevin E</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IAENG international journal of computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Simpson, William R</au><au>Foltz, Kevin E</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Enterprise Mobile Ad-hoc Networks</atitle><jtitle>IAENG international journal of computer science</jtitle><date>2019-05-27</date><risdate>2019</risdate><volume>46</volume><issue>2</issue><spage>243</spage><pages>243-</pages><issn>1819-656X</issn><eissn>1819-9224</eissn><abstract>Threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to build an impenetrable fortress to prevent hostile entities from entering the enterprise domain. However, this defense and its many reinforcements have repeatedly been found inadequate. The current complexity level has made the fortress approach to security, which is implemented throughout the defense, banking, and other hightrust industries unworkable. An alternative security approach, called Enterprise Level Security (ELS), is the result of a concentrated multi-year program of pilots and research. The primary identity credential for ELS is the Public Key Infrastructure (PKI) certificate, issued to the individual who is provided with a Personal Identity Verification (PIV) card with a hardware chip for storing the private key. All sessions are preceded by a PKI mutual authentication (secondary authentication may be employed when necessary) within Transport Layer Security (TLS) 1.2, and a secure communication pipeline is established. This process was deemed to provide a high enough identity assurance to proceed. However, mobile ad-hoc networking allows entities to dynamically connect and reconfigure connections to make use of available networking resources in a changing environment. These networks range from tiny sensors setting up communications based on a random or unknown configuration to aircraft communicating with each other, the ground, and satellites. Scenarios have differing requirements in terms of setup, reconfiguration, power, speed, and range. This paper presents an adaptation of the ELS principles to the mobile adhoc scenario.</abstract><cop>Hong Kong</cop><pub>International Association of Engineers</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1819-656X |
ispartof | IAENG international journal of computer science, 2019-05, Vol.46 (2), p.243 |
issn | 1819-656X 1819-9224 |
language | eng |
recordid | cdi_proquest_journals_2245661380 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Aircraft communication Aircraft configurations Changing environments Encryption Identity Mobile ad hoc networks Pilots Public Key Infrastructure Reconfiguration Wireless networks |
title | Secure Enterprise Mobile Ad-hoc Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T09%3A34%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Enterprise%20Mobile%20Ad-hoc%20Networks&rft.jtitle=IAENG%20international%20journal%20of%20computer%20science&rft.au=Simpson,%20William%20R&rft.date=2019-05-27&rft.volume=46&rft.issue=2&rft.spage=243&rft.pages=243-&rft.issn=1819-656X&rft.eissn=1819-9224&rft_id=info:doi/&rft_dat=%3Cproquest%3E2245661380%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2245661380&rft_id=info:pmid/&rfr_iscdi=true |