Skip to main content

A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 122))

Abstract

The purpose of this paper is to suggest security assured data communications architecture in net-centric defense systems based on DoDAF 2.0. This architecture provides a finite security precision of network communication within the defense network like C4I System. In this proposed network communication architecture where security is being prioritized, we propose three security mechanism levels, the authentication level, the Business Rules Repository level & Security Rules Repository level and available techniques facilitating the functionality of the levels. Security can be coerced at every stage of the data transit. By utilization of various data security measures available, each level will substantiate the security of the data in the communication chain from end to end.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bayne, J.S.: A Theory of Enterprise Command and Control. In: IEEE MILCOM, paper 10.1109/MILCOM, 302994, pp. 1–8 (2006)

    Google Scholar 

  2. DoD Architecture Framework, Version 2.0 – DoDAF Meta Model, vol. 3, Department of Defense, USA (2009)

    Google Scholar 

  3. Mahbub, H., Raj, J.: High Performance TCP/IP Networking concepts, Issues and Solutions. Prentice Hall of India (2004)

    Google Scholar 

  4. Anurag, D., Brain, H., Jhon, N.: Capacity planning strategies for net-centric applications. In: MILCOM IEEE, vol. 3, pp. 1686–1692 (October 2005)

    Google Scholar 

  5. Rona, S., Caser, D.: Computer Security and Networking protocols: Technical Issues in Military Data Communications Networks. IEEE Transactions on Communications 9, 1472–1477 (1980)

    Google Scholar 

  6. Abdullah, A.S., Tazar, H., Gulfaraz, K.: Enhancing C4I Security using Threat Modeling. In: Proc. IEEE, UKSIM, paper 10.1109 (2010)

    Google Scholar 

  7. Stallings, W. (ed.): Cryptography and Network Security, 4th edn. Prentice-Hall o f India

    Google Scholar 

  8. Wei, Z., Meinel, C.: Team and Task Based RBAC Access Control Model. In: Network Operations and Management Symposium, LANOMS 2007. Latin American, paper 10.1109, pp. 84–94 (2007)

    Google Scholar 

  9. Veselin, T., Dragomir, P.: Information Assurance in C4I Systems. ISN Information and Security 4, 43–59 (2000)

    Google Scholar 

  10. Alghamdi, A.S.: Evaluating Defense Architecture Frameworks for C4I System Using Analytic Hierarchy Process. J. Computer Sci. 5(12), 1078–1084 (2009)

    Google Scholar 

  11. Alghamdi, A., Shamim Hossain, M., Al Qurishi, M.: Selecting the best case tools for DoDAF-based C4I applications, inderscience Int. J. Advanced Media and Communication (2010) (in press)

    Google Scholar 

  12. Ahmad, I., Abdullah, A.B., Alghamdi, A.S.: Evaluating Intrusion Detection Approaches Using Multi-criteria Decision Making Technique. IJISCE 1(2), 60–67 (2010)

    Google Scholar 

  13. Ahmad, I., Abdullah, A.B., Alghamdi, A.S.: Towards the designing of robust IDS through an optimized advancement of neural networks. In: Kim, T.-h., Adeli, H. (eds.) AST/UCMA/ISA/ACN. LNCS, vol. 6059, pp. 597–602. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  14. Ahmad, I., Abdullah, A.B., Alghamdi, A.S.: Application of Artificial Neural Network in Detection of DOS Attacks. ACM SIN, 229–234 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Alghamdi, A.S., Quadri, S.A., Ahmad, I., Al-Nafjan, K. (2010). A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems. In: Kim, Th., Fang, Wc., Khan, M.K., Arnett, K.P., Kang, Hj., Ślęzak, D. (eds) Security Technology, Disaster Recovery and Business Continuity. Communications in Computer and Information Science, vol 122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17610-4_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17610-4_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17609-8

  • Online ISBN: 978-3-642-17610-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics