Skip to main content
Top

2017 | OriginalPaper | Chapter

Security Requirements for the Deployment of Services Across Tactical SOA

Authors : Vasileios Gkioulos, Stephen D. Wolthusen

Published in: Computer Network Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Service Oriented Architectures (SOA) have been identified as a suitable mediator towards the attainment of the requirements imposed by modern warfare. Earlier studies focused primarily on the strategic domain, or the adaptation of such systems to the requirements of the tactical domain. Yet, the underlying constraints are significantly different between the two, with direct impact both on security and quality of service. In this article we approach the security aspect of tactical SOA, focusing on the specifics of the services while operating under the constrains and requirements of modern battlefields. Selected elements of our analysis within the project TACTICS are presented, as they have been utilized for the extraction of operational and technical requirements towards the development of a suitable tactical service infrastructure.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gkioulos, V., Wolthusen, S.D.: Securing tactical service oriented architectures. In: 2nd International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC) (2016) Gkioulos, V., Wolthusen, S.D.: Securing tactical service oriented architectures. In: 2nd International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC) (2016)
2.
go back to reference Gkioulos, V., Wolthusen, S.D.: Enabling dynamic security policy evaluation for service-oriented architectures in tactical networks. In: Norwegian Information Security Conference (NISK-2015) (2015) Gkioulos, V., Wolthusen, S.D.: Enabling dynamic security policy evaluation for service-oriented architectures in tactical networks. In: Norwegian Information Security Conference (NISK-2015) (2015)
3.
go back to reference Gkioulos, V., Wolthusen, S.D.: Constraint analysis for security policy partitioning over tactical service oriented architectures. In: Grzenda, M., Awad, A.I., Furtak, J., Legierski, J. (eds.) Advances in Network Systems. Architectures, Security, and Applications. AISC, vol. 461, pp. 149–166. Springer, Cham (2017). doi:10.1007/978-3-319-44354-6_9 Gkioulos, V., Wolthusen, S.D.: Constraint analysis for security policy partitioning over tactical service oriented architectures. In: Grzenda, M., Awad, A.I., Furtak, J., Legierski, J. (eds.) Advances in Network Systems. Architectures, Security, and Applications. AISC, vol. 461, pp. 149–166. Springer, Cham (2017). doi:10.​1007/​978-3-319-44354-6_​9
4.
go back to reference Gkioulos, V., Wolthusen, S.D.: Reconciliation of ontologically defined security policies for tactical service oriented architectures. In: International Conference on Future Network Systems and Security-FNSS (2016) Gkioulos, V., Wolthusen, S.D.: Reconciliation of ontologically defined security policies for tactical service oriented architectures. In: International Conference on Future Network Systems and Security-FNSS (2016)
5.
go back to reference Gkioulos, V., Wolthusen, S.D.: A security policy infrastructure for tactical service oriented architectures. In: 2nd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS 2016), in conjunction with ESORICS (2016) Gkioulos, V., Wolthusen, S.D.: A security policy infrastructure for tactical service oriented architectures. In: 2nd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS 2016), in conjunction with ESORICS (2016)
6.
go back to reference Gkioulos, V., Wolthusen, S.D., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J.: Interoperability of security and quality of service policies over tactical SOA. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications (IEEE CISDA 2016) - IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2016) (2016) Gkioulos, V., Wolthusen, S.D., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J.: Interoperability of security and quality of service policies over tactical SOA. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications (IEEE CISDA 2016) - IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2016) (2016)
7.
go back to reference Aloisio, A., Autili, M., D’Angelo, A., Viidanoja, A., Leguay, J., Ginzler, T., Lampe, T., Spagnolo, L., Wolthusen, S.D., Flizikowski, A., Sliwa, J.: TACTICS: tactical service oriented architecture. CoRR abs/1504.07578 (2015) Aloisio, A., Autili, M., D’Angelo, A., Viidanoja, A., Leguay, J., Ginzler, T., Lampe, T., Spagnolo, L., Wolthusen, S.D., Flizikowski, A., Sliwa, J.: TACTICS: tactical service oriented architecture. CoRR abs/1504.07578 (2015)
8.
go back to reference Lampe, T.A., Prasse, C., Diefenbach, A., Ginzler, T., Sliwa, J., McLaughlin, S.: TACTICS TSI architecture. In: International Conference on Military Communications and Information Systems ICMCIS (2016) Lampe, T.A., Prasse, C., Diefenbach, A., Ginzler, T., Sliwa, J., McLaughlin, S.: TACTICS TSI architecture. In: International Conference on Military Communications and Information Systems ICMCIS (2016)
9.
go back to reference Lopes, R.R.F., Wolthusen, S.D.: Distributed security policies for service-oriented architectures over tactical networks. In: Military Communications Conference, MILCOM 2015, pp. 1548–1553. IEEE, October 2015 Lopes, R.R.F., Wolthusen, S.D.: Distributed security policies for service-oriented architectures over tactical networks. In: Military Communications Conference, MILCOM 2015, pp. 1548–1553. IEEE, October 2015
10.
go back to reference Priya, S.B., Theebendra, C.: A Study on Security Challenges in Mobile Adhoc Networks (2016) Priya, S.B., Theebendra, C.: A Study on Security Challenges in Mobile Adhoc Networks (2016)
11.
go back to reference Kauser, S.H., Kumar, P.A.: MANET: Services, Parameters, Applications, Attacks & Challenges (2016) Kauser, S.H., Kumar, P.A.: MANET: Services, Parameters, Applications, Attacks & Challenges (2016)
12.
go back to reference Patidar, D., Dubey, J.: A hybrid approach for dynamic intrusion detection, enhancement of performance and security in MANET. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016, pp. 81:1–81:5. ACM, New York (2016) Patidar, D., Dubey, J.: A hybrid approach for dynamic intrusion detection, enhancement of performance and security in MANET. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016, pp. 81:1–81:5. ACM, New York (2016)
13.
go back to reference Kannammal, A., Roy, S.S.: Survey on secure routing in mobile ad hoc networks. In: 2016 International Conference on Advances in Human Machine Interaction (HMI), pp. 1–7, March 2016 Kannammal, A., Roy, S.S.: Survey on secure routing in mobile ad hoc networks. In: 2016 International Conference on Advances in Human Machine Interaction (HMI), pp. 1–7, March 2016
14.
go back to reference Bass, T., Robichaux, R.: Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations. In: Military Communications Conference, MILCOM 2001, Communications for Network-Centric Operations: Creating the Information Force, vol. 1, pp. 64–70. IEEE (2001) Bass, T., Robichaux, R.: Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations. In: Military Communications Conference, MILCOM 2001, Communications for Network-Centric Operations: Creating the Information Force, vol. 1, pp. 64–70. IEEE (2001)
15.
go back to reference Kidston, D., Li, L., Tang, H., Mason, P.: Mitigating security threats in tactical networks. Technical report, DTIC Document (2010) Kidston, D., Li, L., Tang, H., Mason, P.: Mitigating security threats in tactical networks. Technical report, DTIC Document (2010)
16.
go back to reference Jacobs, S.: Tactical network security. In: Military Communications Conference Proceedings, MILCOM 1999, vol. 1, pp. 651–655. IEEE (1999) Jacobs, S.: Tactical network security. In: Military Communications Conference Proceedings, MILCOM 1999, vol. 1, pp. 651–655. IEEE (1999)
17.
go back to reference Burbank, J.L., Chimento, P.F., Haberman, B.K., Kasch, W.T.: Key challenges of military tactical networking and the elusive promise of manet technology. Comm. Mag. 44(11), 39–45 (2006)CrossRef Burbank, J.L., Chimento, P.F., Haberman, B.K., Kasch, W.T.: Key challenges of military tactical networking and the elusive promise of manet technology. Comm. Mag. 44(11), 39–45 (2006)CrossRef
18.
go back to reference Wang, H., Wang, Y., Han, J.: A security architecture for tactical mobile ad hoc networks. In: Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, pp. 312–315, January 2009 Wang, H., Wang, Y., Han, J.: A security architecture for tactical mobile ad hoc networks. In: Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, pp. 312–315, January 2009
19.
go back to reference Kidston, D., Li, L.: Management through cross-layer design in mobile tactical networks. In: 2010 IEEE Network Operations and Management Symposium - NOMS 2010, pp. 890–893, April 2010 Kidston, D., Li, L.: Management through cross-layer design in mobile tactical networks. In: 2010 IEEE Network Operations and Management Symposium - NOMS 2010, pp. 890–893, April 2010
20.
go back to reference Lund, K., Eggen, A., Hadzic, D., Hafsoe, T., Johnsen, F.T.: Using web services to realize service oriented architecture in military communication networks. IEEE Commun. Mag. 45(10), 47–53 (2007)CrossRef Lund, K., Eggen, A., Hadzic, D., Hafsoe, T., Johnsen, F.T.: Using web services to realize service oriented architecture in military communication networks. IEEE Commun. Mag. 45(10), 47–53 (2007)CrossRef
21.
go back to reference Birman, K., Hillman, R., Pleisch, S.: Building Net-centric Military Applications over Service Oriented Architectures (2005) Birman, K., Hillman, R., Pleisch, S.: Building Net-centric Military Applications over Service Oriented Architectures (2005)
22.
go back to reference Suri, N.: Dynamic service-oriented architectures for tactical edge networks. In: Proceedings of the 4th Workshop on Emerging Web Services Technology, WEWST 2009, pp. 3–10. ACM, New York (2009) Suri, N.: Dynamic service-oriented architectures for tactical edge networks. In: Proceedings of the 4th Workshop on Emerging Web Services Technology, WEWST 2009, pp. 3–10. ACM, New York (2009)
23.
go back to reference Russell, D., Xu, J.: Service oriented architectures in the delivery of capability. In: Proceedings of Systems Engineering for Future Capability (2007) Russell, D., Xu, J.: Service oriented architectures in the delivery of capability. In: Proceedings of Systems Engineering for Future Capability (2007)
24.
go back to reference Croom, Jr., C.E.: Service-oriented architectures in net-centric operations. Technical report, DTIC Document (2006) Croom, Jr., C.E.: Service-oriented architectures in net-centric operations. Technical report, DTIC Document (2006)
25.
go back to reference Johnsen, F.T., Flathagen, J., Hafsøe, T.: Pervasive service discovery across heterogeneous tactical networks. In: MILCOM 2009 - Military Communications Conference, pp. 1–8. IEEE, October 2009 Johnsen, F.T., Flathagen, J., Hafsøe, T.: Pervasive service discovery across heterogeneous tactical networks. In: MILCOM 2009 - Military Communications Conference, pp. 1–8. IEEE, October 2009
26.
go back to reference Russell, D., Xu, J.: Service oriented architectures in the provision of military capability. In: UK e-Science All Hands Meeting, Citeseer (2007) Russell, D., Xu, J.: Service oriented architectures in the provision of military capability. In: UK e-Science All Hands Meeting, Citeseer (2007)
27.
go back to reference Russell, D., Looker, N., Liu, L., Xu, J.: Service-oriented integration of systems for military capability. In: 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), pp. 33–41. IEEE (2008) Russell, D., Looker, N., Liu, L., Xu, J.: Service-oriented integration of systems for military capability. In: 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), pp. 33–41. IEEE (2008)
28.
go back to reference Candolin, C.: A security framework for service oriented architectures. In: MILCOM 2007 - IEEE Military Communications Conference, pp. 1–6, October 2007 Candolin, C.: A security framework for service oriented architectures. In: MILCOM 2007 - IEEE Military Communications Conference, pp. 1–6, October 2007
29.
go back to reference Marinos, L., ENISA: ENISA Threat Taxonomy A tool for structuring threat information Initial Version 1.0. Technical report, January 2016 Marinos, L., ENISA: ENISA Threat Taxonomy A tool for structuring threat information Initial Version 1.0. Technical report, January 2016
Metadata
Title
Security Requirements for the Deployment of Services Across Tactical SOA
Authors
Vasileios Gkioulos
Stephen D. Wolthusen
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-65127-9_10

Premium Partner