Abstract
The purpose of this paper is to suggest security assured data communications architecture in net-centric defense systems based on DoDAF 2.0. This architecture provides a finite security precision of network communication within the defense network like C4I System. In this proposed network communication architecture where security is being prioritized, we propose three security mechanism levels, the authentication level, the Business Rules Repository level & Security Rules Repository level and available techniques facilitating the functionality of the levels. Security can be coerced at every stage of the data transit. By utilization of various data security measures available, each level will substantiate the security of the data in the communication chain from end to end.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Bayne, J.S.: A Theory of Enterprise Command and Control. In: IEEE MILCOM, paper 10.1109/MILCOM, 302994, pp. 1–8 (2006)
DoD Architecture Framework, Version 2.0 – DoDAF Meta Model, vol. 3, Department of Defense, USA (2009)
Mahbub, H., Raj, J.: High Performance TCP/IP Networking concepts, Issues and Solutions. Prentice Hall of India (2004)
Anurag, D., Brain, H., Jhon, N.: Capacity planning strategies for net-centric applications. In: MILCOM IEEE, vol. 3, pp. 1686–1692 (October 2005)
Rona, S., Caser, D.: Computer Security and Networking protocols: Technical Issues in Military Data Communications Networks. IEEE Transactions on Communications 9, 1472–1477 (1980)
Abdullah, A.S., Tazar, H., Gulfaraz, K.: Enhancing C4I Security using Threat Modeling. In: Proc. IEEE, UKSIM, paper 10.1109 (2010)
Stallings, W. (ed.): Cryptography and Network Security, 4th edn. Prentice-Hall o f India
Wei, Z., Meinel, C.: Team and Task Based RBAC Access Control Model. In: Network Operations and Management Symposium, LANOMS 2007. Latin American, paper 10.1109, pp. 84–94 (2007)
Veselin, T., Dragomir, P.: Information Assurance in C4I Systems. ISN Information and Security 4, 43–59 (2000)
Alghamdi, A.S.: Evaluating Defense Architecture Frameworks for C4I System Using Analytic Hierarchy Process. J. Computer Sci. 5(12), 1078–1084 (2009)
Alghamdi, A., Shamim Hossain, M., Al Qurishi, M.: Selecting the best case tools for DoDAF-based C4I applications, inderscience Int. J. Advanced Media and Communication (2010) (in press)
Ahmad, I., Abdullah, A.B., Alghamdi, A.S.: Evaluating Intrusion Detection Approaches Using Multi-criteria Decision Making Technique. IJISCE 1(2), 60–67 (2010)
Ahmad, I., Abdullah, A.B., Alghamdi, A.S.: Towards the designing of robust IDS through an optimized advancement of neural networks. In: Kim, T.-h., Adeli, H. (eds.) AST/UCMA/ISA/ACN. LNCS, vol. 6059, pp. 597–602. Springer, Heidelberg (2010)
Ahmad, I., Abdullah, A.B., Alghamdi, A.S.: Application of Artificial Neural Network in Detection of DOS Attacks. ACM SIN, 229–234 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Alghamdi, A.S., Quadri, S.A., Ahmad, I., Al-Nafjan, K. (2010). A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems. In: Kim, Th., Fang, Wc., Khan, M.K., Arnett, K.P., Kang, Hj., Ślęzak, D. (eds) Security Technology, Disaster Recovery and Business Continuity. Communications in Computer and Information Science, vol 122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17610-4_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-17610-4_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17609-8
Online ISBN: 978-3-642-17610-4
eBook Packages: Computer ScienceComputer Science (R0)