Secure Enterprise Mobile Ad-hoc Networks

Threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to build an impenetrable fortress to prevent hostile entities from entering the enterprise domain. However, this defense and its many reinforcements have repeatedly been found...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IAENG international journal of computer science 2019-05, Vol.46 (2), p.243
Hauptverfasser: Simpson, William R, Foltz, Kevin E
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 2
container_start_page 243
container_title IAENG international journal of computer science
container_volume 46
creator Simpson, William R
Foltz, Kevin E
description Threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to build an impenetrable fortress to prevent hostile entities from entering the enterprise domain. However, this defense and its many reinforcements have repeatedly been found inadequate. The current complexity level has made the fortress approach to security, which is implemented throughout the defense, banking, and other hightrust industries unworkable. An alternative security approach, called Enterprise Level Security (ELS), is the result of a concentrated multi-year program of pilots and research. The primary identity credential for ELS is the Public Key Infrastructure (PKI) certificate, issued to the individual who is provided with a Personal Identity Verification (PIV) card with a hardware chip for storing the private key. All sessions are preceded by a PKI mutual authentication (secondary authentication may be employed when necessary) within Transport Layer Security (TLS) 1.2, and a secure communication pipeline is established. This process was deemed to provide a high enough identity assurance to proceed. However, mobile ad-hoc networking allows entities to dynamically connect and reconfigure connections to make use of available networking resources in a changing environment. These networks range from tiny sensors setting up communications based on a random or unknown configuration to aircraft communicating with each other, the ground, and satellites. Scenarios have differing requirements in terms of setup, reconfiguration, power, speed, and range. This paper presents an adaptation of the ELS principles to the mobile adhoc scenario.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2245661380</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2245661380</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-f38396e81bcf9378a8a5e6ac5d797be2fd3d84889d7d68cca1e6890d46a011563</originalsourceid><addsrcrecordid>eNotj71qwzAURkVpoCHNOxi6dBFYvtLV1RhC-gNJOzRDtiBL19RtiFzJpq_fQDN9ZzqH70bMFSknXdPo2yujwcOdWJbSt7XWFogMzMXjB4cpc7U5j5yH3BeudqntT1ytovxMoXrj8Tfl73IvZp0_FV5edyH2T5v9-kVu359f16utHByNsgMCh0yqDZ0DS568YfTBROtsy00XIZImctFGpBC8YiRXR42-VsogLMTDv3bI6WfiMh6_0pTPl-Lx8sUgKqAa_gD6nD3m</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2245661380</pqid></control><display><type>article</type><title>Secure Enterprise Mobile Ad-hoc Networks</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Simpson, William R ; Foltz, Kevin E</creator><creatorcontrib>Simpson, William R ; Foltz, Kevin E</creatorcontrib><description>Threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to build an impenetrable fortress to prevent hostile entities from entering the enterprise domain. However, this defense and its many reinforcements have repeatedly been found inadequate. The current complexity level has made the fortress approach to security, which is implemented throughout the defense, banking, and other hightrust industries unworkable. An alternative security approach, called Enterprise Level Security (ELS), is the result of a concentrated multi-year program of pilots and research. The primary identity credential for ELS is the Public Key Infrastructure (PKI) certificate, issued to the individual who is provided with a Personal Identity Verification (PIV) card with a hardware chip for storing the private key. All sessions are preceded by a PKI mutual authentication (secondary authentication may be employed when necessary) within Transport Layer Security (TLS) 1.2, and a secure communication pipeline is established. This process was deemed to provide a high enough identity assurance to proceed. However, mobile ad-hoc networking allows entities to dynamically connect and reconfigure connections to make use of available networking resources in a changing environment. These networks range from tiny sensors setting up communications based on a random or unknown configuration to aircraft communicating with each other, the ground, and satellites. Scenarios have differing requirements in terms of setup, reconfiguration, power, speed, and range. This paper presents an adaptation of the ELS principles to the mobile adhoc scenario.</description><identifier>ISSN: 1819-656X</identifier><identifier>EISSN: 1819-9224</identifier><language>eng</language><publisher>Hong Kong: International Association of Engineers</publisher><subject>Aircraft communication ; Aircraft configurations ; Changing environments ; Encryption ; Identity ; Mobile ad hoc networks ; Pilots ; Public Key Infrastructure ; Reconfiguration ; Wireless networks</subject><ispartof>IAENG international journal of computer science, 2019-05, Vol.46 (2), p.243</ispartof><rights>Copyright International Association of Engineers May 27, 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Simpson, William R</creatorcontrib><creatorcontrib>Foltz, Kevin E</creatorcontrib><title>Secure Enterprise Mobile Ad-hoc Networks</title><title>IAENG international journal of computer science</title><description>Threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to build an impenetrable fortress to prevent hostile entities from entering the enterprise domain. However, this defense and its many reinforcements have repeatedly been found inadequate. The current complexity level has made the fortress approach to security, which is implemented throughout the defense, banking, and other hightrust industries unworkable. An alternative security approach, called Enterprise Level Security (ELS), is the result of a concentrated multi-year program of pilots and research. The primary identity credential for ELS is the Public Key Infrastructure (PKI) certificate, issued to the individual who is provided with a Personal Identity Verification (PIV) card with a hardware chip for storing the private key. All sessions are preceded by a PKI mutual authentication (secondary authentication may be employed when necessary) within Transport Layer Security (TLS) 1.2, and a secure communication pipeline is established. This process was deemed to provide a high enough identity assurance to proceed. However, mobile ad-hoc networking allows entities to dynamically connect and reconfigure connections to make use of available networking resources in a changing environment. These networks range from tiny sensors setting up communications based on a random or unknown configuration to aircraft communicating with each other, the ground, and satellites. Scenarios have differing requirements in terms of setup, reconfiguration, power, speed, and range. This paper presents an adaptation of the ELS principles to the mobile adhoc scenario.</description><subject>Aircraft communication</subject><subject>Aircraft configurations</subject><subject>Changing environments</subject><subject>Encryption</subject><subject>Identity</subject><subject>Mobile ad hoc networks</subject><subject>Pilots</subject><subject>Public Key Infrastructure</subject><subject>Reconfiguration</subject><subject>Wireless networks</subject><issn>1819-656X</issn><issn>1819-9224</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNotj71qwzAURkVpoCHNOxi6dBFYvtLV1RhC-gNJOzRDtiBL19RtiFzJpq_fQDN9ZzqH70bMFSknXdPo2yujwcOdWJbSt7XWFogMzMXjB4cpc7U5j5yH3BeudqntT1ytovxMoXrj8Tfl73IvZp0_FV5edyH2T5v9-kVu359f16utHByNsgMCh0yqDZ0DS568YfTBROtsy00XIZImctFGpBC8YiRXR42-VsogLMTDv3bI6WfiMh6_0pTPl-Lx8sUgKqAa_gD6nD3m</recordid><startdate>20190527</startdate><enddate>20190527</enddate><creator>Simpson, William R</creator><creator>Foltz, Kevin E</creator><general>International Association of Engineers</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20190527</creationdate><title>Secure Enterprise Mobile Ad-hoc Networks</title><author>Simpson, William R ; Foltz, Kevin E</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-f38396e81bcf9378a8a5e6ac5d797be2fd3d84889d7d68cca1e6890d46a011563</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Aircraft communication</topic><topic>Aircraft configurations</topic><topic>Changing environments</topic><topic>Encryption</topic><topic>Identity</topic><topic>Mobile ad hoc networks</topic><topic>Pilots</topic><topic>Public Key Infrastructure</topic><topic>Reconfiguration</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Simpson, William R</creatorcontrib><creatorcontrib>Foltz, Kevin E</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IAENG international journal of computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Simpson, William R</au><au>Foltz, Kevin E</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Enterprise Mobile Ad-hoc Networks</atitle><jtitle>IAENG international journal of computer science</jtitle><date>2019-05-27</date><risdate>2019</risdate><volume>46</volume><issue>2</issue><spage>243</spage><pages>243-</pages><issn>1819-656X</issn><eissn>1819-9224</eissn><abstract>Threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to build an impenetrable fortress to prevent hostile entities from entering the enterprise domain. However, this defense and its many reinforcements have repeatedly been found inadequate. The current complexity level has made the fortress approach to security, which is implemented throughout the defense, banking, and other hightrust industries unworkable. An alternative security approach, called Enterprise Level Security (ELS), is the result of a concentrated multi-year program of pilots and research. The primary identity credential for ELS is the Public Key Infrastructure (PKI) certificate, issued to the individual who is provided with a Personal Identity Verification (PIV) card with a hardware chip for storing the private key. All sessions are preceded by a PKI mutual authentication (secondary authentication may be employed when necessary) within Transport Layer Security (TLS) 1.2, and a secure communication pipeline is established. This process was deemed to provide a high enough identity assurance to proceed. However, mobile ad-hoc networking allows entities to dynamically connect and reconfigure connections to make use of available networking resources in a changing environment. These networks range from tiny sensors setting up communications based on a random or unknown configuration to aircraft communicating with each other, the ground, and satellites. Scenarios have differing requirements in terms of setup, reconfiguration, power, speed, and range. This paper presents an adaptation of the ELS principles to the mobile adhoc scenario.</abstract><cop>Hong Kong</cop><pub>International Association of Engineers</pub></addata></record>
fulltext fulltext
identifier ISSN: 1819-656X
ispartof IAENG international journal of computer science, 2019-05, Vol.46 (2), p.243
issn 1819-656X
1819-9224
language eng
recordid cdi_proquest_journals_2245661380
source EZB-FREE-00999 freely available EZB journals
subjects Aircraft communication
Aircraft configurations
Changing environments
Encryption
Identity
Mobile ad hoc networks
Pilots
Public Key Infrastructure
Reconfiguration
Wireless networks
title Secure Enterprise Mobile Ad-hoc Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T09%3A34%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Enterprise%20Mobile%20Ad-hoc%20Networks&rft.jtitle=IAENG%20international%20journal%20of%20computer%20science&rft.au=Simpson,%20William%20R&rft.date=2019-05-27&rft.volume=46&rft.issue=2&rft.spage=243&rft.pages=243-&rft.issn=1819-656X&rft.eissn=1819-9224&rft_id=info:doi/&rft_dat=%3Cproquest%3E2245661380%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2245661380&rft_id=info:pmid/&rfr_iscdi=true