Wireless security within hastily formed networks
Bradford, Bryan L.
MetadataShow full item record
One of the main purposes of a Hastily Formed Network (HFN) is to provide immediate access to networked voice, data, and video services for as many users as possible. Following terrorist attacks like those in September 2001 or devastating natural disasters like the December 2004 Indian Ocean Tsunami and Hurricane Katrina in August 2005 users of the HFN will likely include survivors; first responders; local, state, and federal government agencies; non-government organizations; militaries; and others. These varied users will have different purposes for accessing HFN services; some will require their information to remain private while others will not. These needs for privacy and openness appear to present conflicting requirements: provide unrestricted access for many users but ensure â privacyâ or security of at least some information within the network. The purpose of this thesis is three-fold: first, to explore methodologies for securing the HFN; second, to examine commercial off-the-shelf (COTS) products and accepted best practices that provide the necessary security; and third, to provide a limited implementation example and a more robust target architecture that could provide security on the wireless segments while maintaining open access to the HFN and minimizing installation, operation, and maintenance complexity.
Showing items related by title, author, creator and subject.
LaFrenier, Kevin J. (Monterey, California. Naval Postgraduate School, 2011-09);There are currently no access control methods to permit personnel, such as military members, government agencies, or first-responders, access to restricted resources and applications that are only available when certain ...
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2007-09);September 2007. Six years after the attacks of 9/11, the practice and discipline of homeland defense and security have evolved and matured, moving into an era of self-evaluation. The essays and articles in Volume III, Issue ...
Chiang, Ken; Nguyen, Thuy D.; Irvine, Cynthia E. (A Linux Implementation of Temporal Access Controls, 2007-06-01);Control of access to information based upon temporal attributes can add another dimension to access control. To demonstrate the feasibility of operating system level support for temporal access controls, the Time Interval ...