Mobile security enclaves

Download
Author
LaFrenier, Kevin J.
Date
2011-09Advisor
Singh, Gurminder
Gibson, John H.
Metadata
Show full item recordAbstract
There are currently no access control methods to permit personnel, such as military members, government agencies, or first-responders, access to restricted resources and applications that are only available when certain conditions are satisfied. Such conditions include user authentication, authorized geographic locations, and connections to specific base transceiver stations or base station controllers. This work defines mobile security enclaves, which are designed to provide this access control, are adaptable and compatible with mobile cellular infrastructures, and can operate without being connected to a dedicated back-end network. The goal of this proposed architecture is to permit users who satisfy specific pre-conditions access to resources and applications to which they otherwise normally would not be granted access. An example where this research is beneficial is during crisis response. Disasters require first responders the need to have immediate access to resources available in a specific location. Another example is agencies requiring mobile communication device use on classified networks or to access classified resources. These mobile security enclaves not only provide strict security by authenticating the user and device location, they also prevent access to networks or resources outside of authorized areas and restrict unauthorized users.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Oil as a weapon of the 21st century: energy security and the U.S. pivot to Asia-Pacific
English, Jay C. (Monterey, California: Naval Postgraduate School, 2016-03);This thesis examines the U.S. pivot to Asia to determine whether energy security issues are likely to complicate relations and/or lead to friction between the United States and China in the twenty-first century. Drawing ... -
Feasibility study of network operations center collaboration to improve application layer performance
Meyer, Kent A. (Monterey, California: Naval Postgraduate School, 2009-03);Network Centric Warfare seeks to improve the link between the shooter and sensor networks, enabling direct access to pertinent information and a shorter decision loop with improved operational capabilities. The sensor-shooter ... -
The Geo-Politics of Energy Security: China, India, & Indonesia [video]
Beach, Fred (Naval Postgraduate School, Monterey, California, 2019-02-08);Since the beginning of the “Industrial Age” access to energy resources have become ever more critical to the social and economic viability of nation states. Just as access to food, clean water, and shelter are essential ...