信息安全与通信保密
信息安全與通信保密
신식안전여통신보밀
CHINA INFORMATION SECURITY
2012年
4期
51-55
,共5页
曾梦岐%蒲文彬%穆阳%陈爱华
曾夢岐%蒲文彬%穆暘%陳愛華
증몽기%포문빈%목양%진애화
安全框架%自组网%战术
安全框架%自組網%戰術
안전광가%자조망%전술
security framework%Ad hoc%tactical
未来战术通信网络将使用VHF/UHF无线电进行语音和数据通信,战术通信网络相对固网而言,具有低带宽、高误码率和节点移动性的特点。由于组网对战术通信而言相对较新,其安全性尚未得到完备的考虑,尽管移动Adhoc网络(MANETs)的安全威胁已经被广泛研究,但是不同通信手段具有不同的特点,其安全威胁不一定类似。文中通过分析已有的MANET安全威胁提出了一种新的方法,以评估其对战术网络的潜在影响。尽管这些分析并不覆盖所有可能的威胁,但它具有优势并且能定位主要问题。基于这个分析,提出一个分层的服务框架并集成各层的安全功能。
未來戰術通信網絡將使用VHF/UHF無線電進行語音和數據通信,戰術通信網絡相對固網而言,具有低帶寬、高誤碼率和節點移動性的特點。由于組網對戰術通信而言相對較新,其安全性尚未得到完備的攷慮,儘管移動Adhoc網絡(MANETs)的安全威脅已經被廣汎研究,但是不同通信手段具有不同的特點,其安全威脅不一定類似。文中通過分析已有的MANET安全威脅提齣瞭一種新的方法,以評估其對戰術網絡的潛在影響。儘管這些分析併不覆蓋所有可能的威脅,但它具有優勢併且能定位主要問題。基于這箇分析,提齣一箇分層的服務框架併集成各層的安全功能。
미래전술통신망락장사용VHF/UHF무선전진행어음화수거통신,전술통신망락상대고망이언,구유저대관、고오마솔화절점이동성적특점。유우조망대전술통신이언상대교신,기안전성상미득도완비적고필,진관이동Adhoc망락(MANETs)적안전위협이경피엄범연구,단시불동통신수단구유불동적특점,기안전위협불일정유사。문중통과분석이유적MANET안전위협제출료일충신적방법,이평고기대전술망락적잠재영향。진관저사분석병불복개소유가능적위협,단타구유우세병차능정위주요문제。기우저개분석,제출일개분층적복무광가병집성각층적안전공능。
The future tactical network would, with VHF/UHF-band radios, implement multi-hop digitized voice and data communications. And this radio band, with excellent propagation property and node mobility, is relatively low in bandwidth and high in error rate, thus making the tactical radio less than ideal as a robust networking platform. Since networking is fairly new to tactical communications, the security implications are not fully understood. Although significant research is done on the threats and vulnerabilities of commercial mobile Ad-hoc networks(MANETs), the threats described in the literature are not always identical due to different communications characteristics. This paper, by reviewing the known MANET security threats, proposes a novel approach to evaluating their potential impact on tactical networks. This analysis, although could not cover all possible security threats, is of certain superiority in identifying the most critical areas for further research. Based on this analysis, a cross-layer service framework is proposed to integrate security functions across all communication layers. This framework, including its application in several security areas, is also described in this paper.