Skip to main content

2019 | OriginalPaper | Buchkapitel

Reliability, Fault Tolerance and Other Critical Components for Survivability in Information Warfare

verfasst von : Peter Stavroulakis, Maryna Kolisnyk, Vyacheslav Kharchenko, Nikolaos Doukas, Oleksandr P. Markovskyi, Nikolaos G. Bardis

Erschienen in: E-Business and Telecommunications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The information revolution has caused many aspects of human activity to critically depend on a wide variety of physically existing or virtual technological achievements such as electronic devices, computer systems, algorithms, cloud resources, artificial intelligence hardware and software entities etc. Many of these systems are used in highly sensitive contexts, such as military applications. This implies the existence of an increasing number of unintentional disturbances or malicious attacks. Successful operation requires qualities such as robustness, fault tolerance, reliability, availability and security. All these may be summarized by the title of survivability. Survivability of critical systems working for sensitive applications involves the ability to provide uninterrupted operation under severe disturbances, gracefully degrade when limiting conditions are reached and maintain the ability to resume normal service once the disturbances have been removed. Survivability is an important, even - though non – functional, lifecycle property of many engineering systems. Further desirable elements of survivability include the ability of systems to recognize and resist attacks or accidents, adapt in order to avoid them and modify their behavior in order to diminish the effects of similar future occurrences. This chapter presents a quantitative approach to assessing survivability and an account of survivability in military systems. A scheme for survivability via replica diversity in the implementation of the AES algorithm is then presented. Following that, an algorithm for adaptive attack aversion in user authentication systems is presented that is based on Boolean transformations. An approach for increased survivability in Internet of Things (IoT) systems is then presented. Finally, an algorithm for secure data storage in cloud resources is presented that allows attack detection and avoidance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Stavroulakis, P.: Reliability, Survivability and Quality of Large Scale Telecommunication Systems. Wiley, London (2003) Stavroulakis, P.: Reliability, Survivability and Quality of Large Scale Telecommunication Systems. Wiley, London (2003)
2.
Zurück zum Zitat Ellison, R.J., et al.: Survivable network system: an emerging discipline. Technical report, CMU/SEI-97- TR-013. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, November 1997 Ellison, R.J., et al.: Survivable network system: an emerging discipline. Technical report, CMU/SEI-97- TR-013. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, November 1997
3.
Zurück zum Zitat Dou, B.-L., Wang, X.-G., Zhang, S.-Y.: Research on survivability of networked information system. In: 2009 International Conference on Signal Processing Systems (2009) Dou, B.-L., Wang, X.-G., Zhang, S.-Y.: Research on survivability of networked information system. In: 2009 International Conference on Signal Processing Systems (2009)
4.
Zurück zum Zitat Liu, Y., Trivedi, K.S.: Survivability quantification: the analytical modeling approach. Int. J. Performability Eng. 2(1), 29–44 (2006) Liu, Y., Trivedi, K.S.: Survivability quantification: the analytical modeling approach. Int. J. Performability Eng. 2(1), 29–44 (2006)
5.
Zurück zum Zitat Heegaard, P.E., Trivedi, K.S.: Survivability quantification of communication services. In: International Conference on Dependable Systems & Networks: Anchorage, Alaska (2008) Heegaard, P.E., Trivedi, K.S.: Survivability quantification of communication services. In: International Conference on Dependable Systems & Networks: Anchorage, Alaska (2008)
6.
Zurück zum Zitat Knight, J.C., Strunk, E.A., Sullivan, K.J.: Towards a rigorous definition of information system survivability. In: 2003 Proceedings DARPA Information Survivability, Conference and Exposition (2003) Knight, J.C., Strunk, E.A., Sullivan, K.J.: Towards a rigorous definition of information system survivability. In: 2003 Proceedings DARPA Information Survivability, Conference and Exposition (2003)
7.
Zurück zum Zitat Bardis, N.G., Doukas, N., Markovskyi, O.P.: Organization of the polymorphic implementation of Rijndael on microcontrollers and smart cards. In: MILCOM 2010 Military Communications Conference. IEEE (2010) Bardis, N.G., Doukas, N., Markovskyi, O.P.: Organization of the polymorphic implementation of Rijndael on microcontrollers and smart cards. In: MILCOM 2010 Military Communications Conference. IEEE (2010)
10.
Zurück zum Zitat Stavroulakis, P., Markovskyi, O.P., Bardis, N.G., Doukas, N.: Efficient zero—knowledge identification based on one way Boolean transformations. In: 2011 IEEE GLOBECOM Workshops, pp. 275–280. IEEE (2011) Stavroulakis, P., Markovskyi, O.P., Bardis, N.G., Doukas, N.: Efficient zero—knowledge identification based on one way Boolean transformations. In: 2011 IEEE GLOBECOM Workshops, pp. 275–280. IEEE (2011)
11.
Zurück zum Zitat Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source codes in C, 758 p. Wiley, New York (1995) Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source codes in C, 758 p. Wiley, New York (1995)
12.
Zurück zum Zitat Kurosawa, K., Yoshida, T.: Strongly universal hashing and identification codes via channels. IEEE Trans. Inf. Theory 45(6), 2091–2095 (1999)MathSciNetCrossRef Kurosawa, K., Yoshida, T.: Strongly universal hashing and identification codes via channels. IEEE Trans. Inf. Theory 45(6), 2091–2095 (1999)MathSciNetCrossRef
13.
Zurück zum Zitat Seberry, J., et al.: Nonlinearity and propagation characteristics of balanced Boolean functions. Inf. Comput. 119(1), 1–13 (1995)MathSciNetCrossRef Seberry, J., et al.: Nonlinearity and propagation characteristics of balanced Boolean functions. Inf. Comput. 119(1), 1–13 (1995)MathSciNetCrossRef
14.
15.
Zurück zum Zitat Βardis, N.G., Polymenopoulos, A., Bardis, E.G., Markovskyy, A.P.: Methods for increasing the efficiency of the remote user authentication in integrated systems. Trends Comput. Sci. 12(1), 99–107 (2003). ISBN 1-59454-065-9 Βardis, N.G., Polymenopoulos, A., Bardis, E.G., Markovskyy, A.P.: Methods for increasing the efficiency of the remote user authentication in integrated systems. Trends Comput. Sci. 12(1), 99–107 (2003). ISBN 1-59454-065-9
16.
Zurück zum Zitat Braz, C., Robert, J.M.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th International Conference of the Association Francophone d’Interaction Homme-Machine, pp. 199–203 (2006) Braz, C., Robert, J.M.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th International Conference of the Association Francophone d’Interaction Homme-Machine, pp. 199–203 (2006)
17.
Zurück zum Zitat Wang, H., Sheng, B, Tan, C., Qun, L.: Comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access control. In: Proceedings of the 28th International Conference on Distributed Computing Systems, pp. 11–18 (2008) Wang, H., Sheng, B, Tan, C., Qun, L.: Comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access control. In: Proceedings of the 28th International Conference on Distributed Computing Systems, pp. 11–18 (2008)
18.
Zurück zum Zitat Tsai, J.-L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3–4), 115–121 (2008)CrossRef Tsai, J.-L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3–4), 115–121 (2008)CrossRef
19.
Zurück zum Zitat Bardis, N.G., Doukas, N., Markovskyi, O.: Two level efficient user authentication scheme. In: Proceedings of the 4th IEEE International Conference on Digital Ecosystems and Technology, 12–15 April 2010, Knowledge Village, Dubai, UAE (2010) Bardis, N.G., Doukas, N., Markovskyi, O.: Two level efficient user authentication scheme. In: Proceedings of the 4th IEEE International Conference on Digital Ecosystems and Technology, 12–15 April 2010, Knowledge Village, Dubai, UAE (2010)
20.
Zurück zum Zitat Bardis, N., Doukas, N., Markovskyi, O.: Fast subscriber identification based on the zero knowledge principle for multimedia content distribution. Int. J. Multimed. Intell. Secur. (2010) Bardis, N., Doukas, N., Markovskyi, O.: Fast subscriber identification based on the zero knowledge principle for multimedia content distribution. Int. J. Multimed. Intell. Secur. (2010)
21.
Zurück zum Zitat Kharchenko, V., Kolisnyk, M., Piskachova, I., Bardis, N.: Reliability and security issues for IoT-based smart business center: architecture and Markov model. In: 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), pp. 313–318. IEEE (2016) Kharchenko, V., Kolisnyk, M., Piskachova, I., Bardis, N.: Reliability and security issues for IoT-based smart business center: architecture and Markov model. In: 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), pp. 313–318. IEEE (2016)
34.
Zurück zum Zitat Bardis, N., Doukas, N., Markovskyi, O.P.: Effective method to restore data in distributed data storage systems. In: 2015 IEEE Military Communications Conference, MILCOM 2015. IEEE (2015) Bardis, N., Doukas, N., Markovskyi, O.P.: Effective method to restore data in distributed data storage systems. In: 2015 IEEE Military Communications Conference, MILCOM 2015. IEEE (2015)
35.
Zurück zum Zitat Blaum, M., Hafner, J.I., Hetzler, S.: Partial MDS codes and their application to RAID type of architectures. IEEE Trans. Inf. Theory 59(7), 4510–4519 (2013)MathSciNetCrossRef Blaum, M., Hafner, J.I., Hetzler, S.: Partial MDS codes and their application to RAID type of architectures. IEEE Trans. Inf. Theory 59(7), 4510–4519 (2013)MathSciNetCrossRef
36.
Zurück zum Zitat Peterson, W.W., Weldon Jr., E.J.: Error-Correcting Codes. MIT Press, Cambridge (1984)MATH Peterson, W.W., Weldon Jr., E.J.: Error-Correcting Codes. MIT Press, Cambridge (1984)MATH
37.
Zurück zum Zitat Abdel-Ghaffar, K.A.S., Weber, J.H.: Parity-check matrices separating erasures from errors. IEEE Trans. Inf. Theory. 59(6), 3332–3346 (2013)MathSciNetCrossRef Abdel-Ghaffar, K.A.S., Weber, J.H.: Parity-check matrices separating erasures from errors. IEEE Trans. Inf. Theory. 59(6), 3332–3346 (2013)MathSciNetCrossRef
38.
Zurück zum Zitat Dimakis, A.G., Prabhakaran, V., Ramchandran, K.: Decentralized Erasure Codes for Distributed Networked Storage, p. 176. University of California, Berkeley (2006)MathSciNetCrossRef Dimakis, A.G., Prabhakaran, V., Ramchandran, K.: Decentralized Erasure Codes for Distributed Networked Storage, p. 176. University of California, Berkeley (2006)MathSciNetCrossRef
39.
Zurück zum Zitat Corbett, P., et al.: Row-diagonal parity for double disk failure. In: Proceedings of the Third USENIX Conference on File and Storage Technologies, pp. 1–14 (2004) Corbett, P., et al.: Row-diagonal parity for double disk failure. In: Proceedings of the Third USENIX Conference on File and Storage Technologies, pp. 1–14 (2004)
Metadaten
Titel
Reliability, Fault Tolerance and Other Critical Components for Survivability in Information Warfare
verfasst von
Peter Stavroulakis
Maryna Kolisnyk
Vyacheslav Kharchenko
Nikolaos Doukas
Oleksandr P. Markovskyi
Nikolaos G. Bardis
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-11039-0_17