Supporting Command and Control (C2) of an embarked commander tunneling SIPRNet Data across an UNCLAS Wireless Lan

Download
Author
Marshburn, Erik R.
Date
2011-09Advisor
MacKinnon, Douglas J.
Gibson, John H.
Metadata
Show full item recordAbstract
Command and Control (C2) by today's embarked commanders requires timely and reliable access to classified data systems at the C2 node provided by the ship. Most often, the ship's spaces provided to an embarked staff are inadequate to support the commander's C2 requirements. Often, there are not enough classified computers or classified Local Area Network (LAN) connections. To facilitate improved ability to exercise C2, a ship's company technicians typically place a hub on the network to provide extra connection points. This procedure takes time for the technicians to implement and requires physical connection to the wired network. A potential alternative may be to leverage current IEEE 802.11 technology to provide wireless connectivity for these clients, yet wireless technology alone will not address this problem. Coupling an 802.11 network with Secret Client Tunneling Device (SCTD)- enabled classified laptops can provide the access to classified data that is required by the embarked commander to exercise command and control of his assigned forces. This thesis examines the use of the KOV-26 Talon card and the KIV-54 cryptographic module, both NSA Type I encryptors, as a method of tunneling SIPRNet data across an afloat unclassified wireless Local Area Network (LAN).
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
MULTI-DIMENSIONAL PROFILING OF CYBER THREATS FOR LARGE-SCALE NETWORKS
Calnan, Michael C. (Monterey, CA; Naval Postgraduate School, 2022-09);Current multi-domain command and control computer networks require significant oversight to ensure acceptable levels of security. Firewalls are the proactive security management tool at the network’s edge to determine ... -
Tactical local area networks.
Inghram, Jonathan D. (Monterey, California. Naval Postgraduate School, 1992);During Operation Desert Storm, the senior U.S. Marine Headquarters used a Local Area Network for command and control. Despite some limitations, the network was largely a success. The opportunities for employing the ... -
Wireless network security: design considerations for an enterprise network
Oh, Khoon Wee (Monterey, California. Naval Postgraduate School, 2004-12);Since its introduction in 1999, the Institute of Electrical and Electronics Engineers (IEEE) 802.11 Wireless Local Area Network (WLAN) has become the de-facto standard for wireless networking, providing convenient and low ...