Secure Communications on the Battlefield?
نویسنده
چکیده
For two days in June 1942, the fate of the U.S. Fleet (rebuilt since Pearl Harbor) hung on the meaning of two letters AF. Between December 1941 and June 1942, the Japanese Navy under the command of Admiral Yamamoto had swept from one victory to another. Yamamoto knew it was essential to achieve victories in rapid succession. Given time, America could starve Japan of fuel. At Midway he would deal the U.S. Fleet a crushing defeat that would put it permanently out of action.
منابع مشابه
Modeling Protocols for Secure Group Communication in Ad Hoc Networks
Since its introduction as a communications medium, wireless technology found broad application on the battlefield. Accompanying dramatic advances in wireless technology and the capabilities associated with small computing devices, the demand for advanced mechanisms to employ wireless technology in the battlefield continues to grow. We propose a model for deriving and reasoning about security pr...
متن کاملModeling Protocols for Secure Group Communication in Ad Hoc Networks
Since its introduction as a communications medium, wireless technology found broad application on the battlefield. Accompanying dramatic advances in wireless technology and the capabilities associated with small computing devices, the demand for advanced mechanisms to employ wireless technology in the battlefield continues to grow. We propose a model for deriving and reasoning about security pr...
متن کاملAn Innovative Approach to Minimizing Bandwidth Usage for Mobile Military Database Synchronization
The soldier on the modern battlefield needs to retrieve critical information in a timely manner while operating in a highly mobile environment. The information, above all, has to be timely and accurate for his needs. The soldier also cannot rely on a commercial communications infrastructure, so data networking features must be developed around existing military communications networks. There ar...
متن کاملSymmetric Encryption Algorithm in Speech Coding for Defence Communications
In battlefield, messages must be encrypted to provide protection from enemy interception. Several speech coding algorithms have been developed to provide secure communications. FS1015 LPC in 1984, FS1016 CELP in 1991and FS MELP in 1997 became official federal standards. In 2002, the US DoD adopted enhanced MELP (MELPe). Later on in 2007, US Naval Research Laboratories have designed Variable Dat...
متن کاملDesign and Analysis of QoS-Aware Key Management and Intrusion Detection Protocols for Secure Mobile Group Communications in Wireless Networks
Many mobile applications in wireless networks such as military battlefield, emergency response, mobile commerce, online gaming, and collaborative work are based on the notion of group communications. Designing security protocols for secure group communications in wireless networks faces many technical challenges due to unique characteristics of wireless networks including resource-constrained e...
متن کامل