Skip to main content

2017 | OriginalPaper | Buchkapitel

Security Requirements for the Deployment of Services Across Tactical SOA

verfasst von : Vasileios Gkioulos, Stephen D. Wolthusen

Erschienen in: Computer Network Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Service Oriented Architectures (SOA) have been identified as a suitable mediator towards the attainment of the requirements imposed by modern warfare. Earlier studies focused primarily on the strategic domain, or the adaptation of such systems to the requirements of the tactical domain. Yet, the underlying constraints are significantly different between the two, with direct impact both on security and quality of service. In this article we approach the security aspect of tactical SOA, focusing on the specifics of the services while operating under the constrains and requirements of modern battlefields. Selected elements of our analysis within the project TACTICS are presented, as they have been utilized for the extraction of operational and technical requirements towards the development of a suitable tactical service infrastructure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gkioulos, V., Wolthusen, S.D.: Securing tactical service oriented architectures. In: 2nd International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC) (2016) Gkioulos, V., Wolthusen, S.D.: Securing tactical service oriented architectures. In: 2nd International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC) (2016)
2.
Zurück zum Zitat Gkioulos, V., Wolthusen, S.D.: Enabling dynamic security policy evaluation for service-oriented architectures in tactical networks. In: Norwegian Information Security Conference (NISK-2015) (2015) Gkioulos, V., Wolthusen, S.D.: Enabling dynamic security policy evaluation for service-oriented architectures in tactical networks. In: Norwegian Information Security Conference (NISK-2015) (2015)
3.
Zurück zum Zitat Gkioulos, V., Wolthusen, S.D.: Constraint analysis for security policy partitioning over tactical service oriented architectures. In: Grzenda, M., Awad, A.I., Furtak, J., Legierski, J. (eds.) Advances in Network Systems. Architectures, Security, and Applications. AISC, vol. 461, pp. 149–166. Springer, Cham (2017). doi:10.1007/978-3-319-44354-6_9 Gkioulos, V., Wolthusen, S.D.: Constraint analysis for security policy partitioning over tactical service oriented architectures. In: Grzenda, M., Awad, A.I., Furtak, J., Legierski, J. (eds.) Advances in Network Systems. Architectures, Security, and Applications. AISC, vol. 461, pp. 149–166. Springer, Cham (2017). doi:10.​1007/​978-3-319-44354-6_​9
4.
Zurück zum Zitat Gkioulos, V., Wolthusen, S.D.: Reconciliation of ontologically defined security policies for tactical service oriented architectures. In: International Conference on Future Network Systems and Security-FNSS (2016) Gkioulos, V., Wolthusen, S.D.: Reconciliation of ontologically defined security policies for tactical service oriented architectures. In: International Conference on Future Network Systems and Security-FNSS (2016)
5.
Zurück zum Zitat Gkioulos, V., Wolthusen, S.D.: A security policy infrastructure for tactical service oriented architectures. In: 2nd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS 2016), in conjunction with ESORICS (2016) Gkioulos, V., Wolthusen, S.D.: A security policy infrastructure for tactical service oriented architectures. In: 2nd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS 2016), in conjunction with ESORICS (2016)
6.
Zurück zum Zitat Gkioulos, V., Wolthusen, S.D., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J.: Interoperability of security and quality of service policies over tactical SOA. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications (IEEE CISDA 2016) - IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2016) (2016) Gkioulos, V., Wolthusen, S.D., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J.: Interoperability of security and quality of service policies over tactical SOA. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications (IEEE CISDA 2016) - IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2016) (2016)
7.
Zurück zum Zitat Aloisio, A., Autili, M., D’Angelo, A., Viidanoja, A., Leguay, J., Ginzler, T., Lampe, T., Spagnolo, L., Wolthusen, S.D., Flizikowski, A., Sliwa, J.: TACTICS: tactical service oriented architecture. CoRR abs/1504.07578 (2015) Aloisio, A., Autili, M., D’Angelo, A., Viidanoja, A., Leguay, J., Ginzler, T., Lampe, T., Spagnolo, L., Wolthusen, S.D., Flizikowski, A., Sliwa, J.: TACTICS: tactical service oriented architecture. CoRR abs/1504.07578 (2015)
8.
Zurück zum Zitat Lampe, T.A., Prasse, C., Diefenbach, A., Ginzler, T., Sliwa, J., McLaughlin, S.: TACTICS TSI architecture. In: International Conference on Military Communications and Information Systems ICMCIS (2016) Lampe, T.A., Prasse, C., Diefenbach, A., Ginzler, T., Sliwa, J., McLaughlin, S.: TACTICS TSI architecture. In: International Conference on Military Communications and Information Systems ICMCIS (2016)
9.
Zurück zum Zitat Lopes, R.R.F., Wolthusen, S.D.: Distributed security policies for service-oriented architectures over tactical networks. In: Military Communications Conference, MILCOM 2015, pp. 1548–1553. IEEE, October 2015 Lopes, R.R.F., Wolthusen, S.D.: Distributed security policies for service-oriented architectures over tactical networks. In: Military Communications Conference, MILCOM 2015, pp. 1548–1553. IEEE, October 2015
10.
Zurück zum Zitat Priya, S.B., Theebendra, C.: A Study on Security Challenges in Mobile Adhoc Networks (2016) Priya, S.B., Theebendra, C.: A Study on Security Challenges in Mobile Adhoc Networks (2016)
11.
Zurück zum Zitat Kauser, S.H., Kumar, P.A.: MANET: Services, Parameters, Applications, Attacks & Challenges (2016) Kauser, S.H., Kumar, P.A.: MANET: Services, Parameters, Applications, Attacks & Challenges (2016)
12.
Zurück zum Zitat Patidar, D., Dubey, J.: A hybrid approach for dynamic intrusion detection, enhancement of performance and security in MANET. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016, pp. 81:1–81:5. ACM, New York (2016) Patidar, D., Dubey, J.: A hybrid approach for dynamic intrusion detection, enhancement of performance and security in MANET. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016, pp. 81:1–81:5. ACM, New York (2016)
13.
Zurück zum Zitat Kannammal, A., Roy, S.S.: Survey on secure routing in mobile ad hoc networks. In: 2016 International Conference on Advances in Human Machine Interaction (HMI), pp. 1–7, March 2016 Kannammal, A., Roy, S.S.: Survey on secure routing in mobile ad hoc networks. In: 2016 International Conference on Advances in Human Machine Interaction (HMI), pp. 1–7, March 2016
14.
Zurück zum Zitat Bass, T., Robichaux, R.: Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations. In: Military Communications Conference, MILCOM 2001, Communications for Network-Centric Operations: Creating the Information Force, vol. 1, pp. 64–70. IEEE (2001) Bass, T., Robichaux, R.: Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations. In: Military Communications Conference, MILCOM 2001, Communications for Network-Centric Operations: Creating the Information Force, vol. 1, pp. 64–70. IEEE (2001)
15.
Zurück zum Zitat Kidston, D., Li, L., Tang, H., Mason, P.: Mitigating security threats in tactical networks. Technical report, DTIC Document (2010) Kidston, D., Li, L., Tang, H., Mason, P.: Mitigating security threats in tactical networks. Technical report, DTIC Document (2010)
16.
Zurück zum Zitat Jacobs, S.: Tactical network security. In: Military Communications Conference Proceedings, MILCOM 1999, vol. 1, pp. 651–655. IEEE (1999) Jacobs, S.: Tactical network security. In: Military Communications Conference Proceedings, MILCOM 1999, vol. 1, pp. 651–655. IEEE (1999)
17.
Zurück zum Zitat Burbank, J.L., Chimento, P.F., Haberman, B.K., Kasch, W.T.: Key challenges of military tactical networking and the elusive promise of manet technology. Comm. Mag. 44(11), 39–45 (2006)CrossRef Burbank, J.L., Chimento, P.F., Haberman, B.K., Kasch, W.T.: Key challenges of military tactical networking and the elusive promise of manet technology. Comm. Mag. 44(11), 39–45 (2006)CrossRef
18.
Zurück zum Zitat Wang, H., Wang, Y., Han, J.: A security architecture for tactical mobile ad hoc networks. In: Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, pp. 312–315, January 2009 Wang, H., Wang, Y., Han, J.: A security architecture for tactical mobile ad hoc networks. In: Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, pp. 312–315, January 2009
19.
Zurück zum Zitat Kidston, D., Li, L.: Management through cross-layer design in mobile tactical networks. In: 2010 IEEE Network Operations and Management Symposium - NOMS 2010, pp. 890–893, April 2010 Kidston, D., Li, L.: Management through cross-layer design in mobile tactical networks. In: 2010 IEEE Network Operations and Management Symposium - NOMS 2010, pp. 890–893, April 2010
20.
Zurück zum Zitat Lund, K., Eggen, A., Hadzic, D., Hafsoe, T., Johnsen, F.T.: Using web services to realize service oriented architecture in military communication networks. IEEE Commun. Mag. 45(10), 47–53 (2007)CrossRef Lund, K., Eggen, A., Hadzic, D., Hafsoe, T., Johnsen, F.T.: Using web services to realize service oriented architecture in military communication networks. IEEE Commun. Mag. 45(10), 47–53 (2007)CrossRef
21.
Zurück zum Zitat Birman, K., Hillman, R., Pleisch, S.: Building Net-centric Military Applications over Service Oriented Architectures (2005) Birman, K., Hillman, R., Pleisch, S.: Building Net-centric Military Applications over Service Oriented Architectures (2005)
22.
Zurück zum Zitat Suri, N.: Dynamic service-oriented architectures for tactical edge networks. In: Proceedings of the 4th Workshop on Emerging Web Services Technology, WEWST 2009, pp. 3–10. ACM, New York (2009) Suri, N.: Dynamic service-oriented architectures for tactical edge networks. In: Proceedings of the 4th Workshop on Emerging Web Services Technology, WEWST 2009, pp. 3–10. ACM, New York (2009)
23.
Zurück zum Zitat Russell, D., Xu, J.: Service oriented architectures in the delivery of capability. In: Proceedings of Systems Engineering for Future Capability (2007) Russell, D., Xu, J.: Service oriented architectures in the delivery of capability. In: Proceedings of Systems Engineering for Future Capability (2007)
24.
Zurück zum Zitat Croom, Jr., C.E.: Service-oriented architectures in net-centric operations. Technical report, DTIC Document (2006) Croom, Jr., C.E.: Service-oriented architectures in net-centric operations. Technical report, DTIC Document (2006)
25.
Zurück zum Zitat Johnsen, F.T., Flathagen, J., Hafsøe, T.: Pervasive service discovery across heterogeneous tactical networks. In: MILCOM 2009 - Military Communications Conference, pp. 1–8. IEEE, October 2009 Johnsen, F.T., Flathagen, J., Hafsøe, T.: Pervasive service discovery across heterogeneous tactical networks. In: MILCOM 2009 - Military Communications Conference, pp. 1–8. IEEE, October 2009
26.
Zurück zum Zitat Russell, D., Xu, J.: Service oriented architectures in the provision of military capability. In: UK e-Science All Hands Meeting, Citeseer (2007) Russell, D., Xu, J.: Service oriented architectures in the provision of military capability. In: UK e-Science All Hands Meeting, Citeseer (2007)
27.
Zurück zum Zitat Russell, D., Looker, N., Liu, L., Xu, J.: Service-oriented integration of systems for military capability. In: 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), pp. 33–41. IEEE (2008) Russell, D., Looker, N., Liu, L., Xu, J.: Service-oriented integration of systems for military capability. In: 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), pp. 33–41. IEEE (2008)
28.
Zurück zum Zitat Candolin, C.: A security framework for service oriented architectures. In: MILCOM 2007 - IEEE Military Communications Conference, pp. 1–6, October 2007 Candolin, C.: A security framework for service oriented architectures. In: MILCOM 2007 - IEEE Military Communications Conference, pp. 1–6, October 2007
29.
Zurück zum Zitat Marinos, L., ENISA: ENISA Threat Taxonomy A tool for structuring threat information Initial Version 1.0. Technical report, January 2016 Marinos, L., ENISA: ENISA Threat Taxonomy A tool for structuring threat information Initial Version 1.0. Technical report, January 2016
Metadaten
Titel
Security Requirements for the Deployment of Services Across Tactical SOA
verfasst von
Vasileios Gkioulos
Stephen D. Wolthusen
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-65127-9_10