Secure Communications on the Battlefield?

نویسنده

  • Gary Krahn
چکیده

For two days in June 1942, the fate of the U.S. Fleet (rebuilt since Pearl Harbor) hung on the meaning of two letters AF. Between December 1941 and June 1942, the Japanese Navy under the command of Admiral Yamamoto had swept from one victory to another. Yamamoto knew it was essential to achieve victories in rapid succession. Given time, America could starve Japan of fuel. At Midway he would deal the U.S. Fleet a crushing defeat that would put it permanently out of action.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling Protocols for Secure Group Communication in Ad Hoc Networks

Since its introduction as a communications medium, wireless technology found broad application on the battlefield. Accompanying dramatic advances in wireless technology and the capabilities associated with small computing devices, the demand for advanced mechanisms to employ wireless technology in the battlefield continues to grow. We propose a model for deriving and reasoning about security pr...

متن کامل

Modeling Protocols for Secure Group Communication in Ad Hoc Networks

Since its introduction as a communications medium, wireless technology found broad application on the battlefield. Accompanying dramatic advances in wireless technology and the capabilities associated with small computing devices, the demand for advanced mechanisms to employ wireless technology in the battlefield continues to grow. We propose a model for deriving and reasoning about security pr...

متن کامل

An Innovative Approach to Minimizing Bandwidth Usage for Mobile Military Database Synchronization

The soldier on the modern battlefield needs to retrieve critical information in a timely manner while operating in a highly mobile environment. The information, above all, has to be timely and accurate for his needs. The soldier also cannot rely on a commercial communications infrastructure, so data networking features must be developed around existing military communications networks. There ar...

متن کامل

Symmetric Encryption Algorithm in Speech Coding for Defence Communications

In battlefield, messages must be encrypted to provide protection from enemy interception. Several speech coding algorithms have been developed to provide secure communications. FS1015 LPC in 1984, FS1016 CELP in 1991and FS MELP in 1997 became official federal standards. In 2002, the US DoD adopted enhanced MELP (MELPe). Later on in 2007, US Naval Research Laboratories have designed Variable Dat...

متن کامل

Design and Analysis of QoS-Aware Key Management and Intrusion Detection Protocols for Secure Mobile Group Communications in Wireless Networks

Many mobile applications in wireless networks such as military battlefield, emergency response, mobile commerce, online gaming, and collaborative work are based on the notion of group communications. Designing security protocols for secure group communications in wireless networks faces many technical challenges due to unique characteristics of wireless networks including resource-constrained e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999