IP services design and implementation in a prototype device for transient tactical access to sensitive information

Download
Author
Yoong, Ho Liang.
Date
2010-12Advisor
Irvine, Cynthia E.
Second Reader
Shifflettt, David J.
Metadata
Show full item recordAbstract
In network-centric warfare, access to critical information can result in a strategic advantage. During critical situations, a soldier using tactical devices may need transient access to information beyond their normal clearances. The Least Privilege Separation Kernel (LPSK) being developed at the Naval Postgraduate School, can be the basis of an extended multilevel security (MLS) system that can support and control such access. A Trusted Services Layer (TSL), which depends on the LPSK, provides support for various multilevel security services. Currently, the LPSK lacks a software network stack for networking communications. Without networking functionality, tactical devices cannot share vital situational updates and information superiority is unattainable. An Internet Protocol (IP) stack was proposed for the LPSK-based system. The IP stack is to be implemented in the context of the LPSK architecture, which uses modularity and layering to organize its software. Open source implementations of the IP stack were evaluated to leverage the common functionality required by all IP stacks. Lightweight Internet Protocol (LWIP) was selected as a starting point for use with the LPSK. LWIP required modifications for use with the LPSK. The IP stack and a proof of concept networking demonstration were successfully implemented in this project.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
shifflet (ACM/IEEE, Springer-Verlag, 2009-04-01);During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the names and addresses of non-ambulatory residents. ... -
Trusted emergency management
Levin, Timothy; Irvine, Cynthia; Benzel, Terry; Nguyen, Thuy; Clark, Paul; Bhaskara, Ganesha (Monterey, California. Naval Postgraduate School, 2009-03); NPS-CS-09-001The ability for emergency first responders to access sensitive information for which they have not been pre-vetted can save lives and property. We describe a trusted emergency management solution for ensuring that sensitive ... -
Chapter 2: The consumption and production of fisheries information in the digital age
Webster, Janet G.; Uhlinger, Eleanor (2009);Fisheries scientists persistently create, communicate, and use information. In fact, if they did not, there would be no fisheries science. To exist, science must be part of a continuum where shared information, from ...