Optimizing C4ISR networks in the presence of enemy jamming

Loading...
Thumbnail Image
Authors
Andrews, Sean M.
Subjects
Advisors
Carlyle, W. Matthew
Date of Issue
2010-03
Date
Publisher
Monterey, California. Naval Postgraduate School
Language
Abstract
U.S. Navy forces are becoming increasingly dependent upon the Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) networks that support them. This network is critical to the task of quickly putting effective weapons on important targets. Today, the delivery of weapons by U.S. Navy air and surface forces is increasingly dependent upon critical targeting information that is often provided by a network of third-party sensor and communication systems. Along with this increasing dependence is a growing threat to this network by enemy forces. Thus, an understanding of network capabilities and vulnerabilities is critical to the ability of our naval forces to successfully engage an adversary. The focus of this research is to develop a bi-level (attackerdefender) optimization model that enables us to map any current or planned C4ISR network requirements needed to execute a successful kill chain, and to uncover any vulnerabilities within the network.
Type
Thesis
Description
Series/Report No
Department
Operations Research
Organization
Naval Postgraduate School (U.S.)
Identifiers
NPS Report Number
Sponsors
Funder
Format
xx, 47 p. : ill. ;
Citation
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Collections