Skip to main content

Reliability, Fault Tolerance and Other Critical Components for Survivability in Information Warfare

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 990))

Abstract

The information revolution has caused many aspects of human activity to critically depend on a wide variety of physically existing or virtual technological achievements such as electronic devices, computer systems, algorithms, cloud resources, artificial intelligence hardware and software entities etc. Many of these systems are used in highly sensitive contexts, such as military applications. This implies the existence of an increasing number of unintentional disturbances or malicious attacks. Successful operation requires qualities such as robustness, fault tolerance, reliability, availability and security. All these may be summarized by the title of survivability. Survivability of critical systems working for sensitive applications involves the ability to provide uninterrupted operation under severe disturbances, gracefully degrade when limiting conditions are reached and maintain the ability to resume normal service once the disturbances have been removed. Survivability is an important, even - though non – functional, lifecycle property of many engineering systems. Further desirable elements of survivability include the ability of systems to recognize and resist attacks or accidents, adapt in order to avoid them and modify their behavior in order to diminish the effects of similar future occurrences. This chapter presents a quantitative approach to assessing survivability and an account of survivability in military systems. A scheme for survivability via replica diversity in the implementation of the AES algorithm is then presented. Following that, an algorithm for adaptive attack aversion in user authentication systems is presented that is based on Boolean transformations. An approach for increased survivability in Internet of Things (IoT) systems is then presented. Finally, an algorithm for secure data storage in cloud resources is presented that allows attack detection and avoidance.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Stavroulakis, P.: Reliability, Survivability and Quality of Large Scale Telecommunication Systems. Wiley, London (2003)

    Google Scholar 

  2. Ellison, R.J., et al.: Survivable network system: an emerging discipline. Technical report, CMU/SEI-97- TR-013. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, November 1997

    Google Scholar 

  3. Dou, B.-L., Wang, X.-G., Zhang, S.-Y.: Research on survivability of networked information system. In: 2009 International Conference on Signal Processing Systems (2009)

    Google Scholar 

  4. Liu, Y., Trivedi, K.S.: Survivability quantification: the analytical modeling approach. Int. J. Performability Eng. 2(1), 29–44 (2006)

    Google Scholar 

  5. Heegaard, P.E., Trivedi, K.S.: Survivability quantification of communication services. In: International Conference on Dependable Systems & Networks: Anchorage, Alaska (2008)

    Google Scholar 

  6. Knight, J.C., Strunk, E.A., Sullivan, K.J.: Towards a rigorous definition of information system survivability. In: 2003 Proceedings DARPA Information Survivability, Conference and Exposition (2003)

    Google Scholar 

  7. Bardis, N.G., Doukas, N., Markovskyi, O.P.: Organization of the polymorphic implementation of Rijndael on microcontrollers and smart cards. In: MILCOM 2010 Military Communications Conference. IEEE (2010)

    Google Scholar 

  8. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25

    Chapter  Google Scholar 

  9. Akkar, M.-L., Giraud, C.: An implementation of DES and AES, secure against some attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309–318. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44709-1_26

    Chapter  Google Scholar 

  10. Stavroulakis, P., Markovskyi, O.P., Bardis, N.G., Doukas, N.: Efficient zero—knowledge identification based on one way Boolean transformations. In: 2011 IEEE GLOBECOM Workshops, pp. 275–280. IEEE (2011)

    Google Scholar 

  11. Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source codes in C, 758 p. Wiley, New York (1995)

    Google Scholar 

  12. Kurosawa, K., Yoshida, T.: Strongly universal hashing and identification codes via channels. IEEE Trans. Inf. Theory 45(6), 2091–2095 (1999)

    Article  MathSciNet  Google Scholar 

  13. Seberry, J., et al.: Nonlinearity and propagation characteristics of balanced Boolean functions. Inf. Comput. 119(1), 1–13 (1995)

    Article  MathSciNet  Google Scholar 

  14. Feige, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. J. Cryptol. 1(2), 77–94 (1987)

    Article  MathSciNet  Google Scholar 

  15. Βardis, N.G., Polymenopoulos, A., Bardis, E.G., Markovskyy, A.P.: Methods for increasing the efficiency of the remote user authentication in integrated systems. Trends Comput. Sci. 12(1), 99–107 (2003). ISBN 1-59454-065-9

    Google Scholar 

  16. Braz, C., Robert, J.M.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th International Conference of the Association Francophone d’Interaction Homme-Machine, pp. 199–203 (2006)

    Google Scholar 

  17. Wang, H., Sheng, B, Tan, C., Qun, L.: Comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access control. In: Proceedings of the 28th International Conference on Distributed Computing Systems, pp. 11–18 (2008)

    Google Scholar 

  18. Tsai, J.-L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3–4), 115–121 (2008)

    Article  Google Scholar 

  19. Bardis, N.G., Doukas, N., Markovskyi, O.: Two level efficient user authentication scheme. In: Proceedings of the 4th IEEE International Conference on Digital Ecosystems and Technology, 12–15 April 2010, Knowledge Village, Dubai, UAE (2010)

    Google Scholar 

  20. Bardis, N., Doukas, N., Markovskyi, O.: Fast subscriber identification based on the zero knowledge principle for multimedia content distribution. Int. J. Multimed. Intell. Secur. (2010)

    Google Scholar 

  21. Kharchenko, V., Kolisnyk, M., Piskachova, I., Bardis, N.: Reliability and security issues for IoT-based smart business center: architecture and Markov model. In: 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), pp. 313–318. IEEE (2016)

    Google Scholar 

  22. Vermesan, O., et al.: Internet of Things – from research and innovation to market deployment. river publishers series in communication, 141 p. (2014). http://www.internet-of-things-research.eu/pdf/IERC_Cluster_Book_2014_Ch.3_SRIA_WEB.pdf. Accessed 3 Aug 2016

  23. Internet of Things and its future. http://www.huawei.com/ilink/en/about-huawei/newsroom/pressrelease/HW_080993?dInID=23407&relatedID=19881&relatedName=HW_076569&dInDocName=HW_076557. Accessed 3 Aug 2016

  24. NB-IOT – Enabling new business opportunities. Building a better connection. Huawei Tech. Co., Ltd. http://www.huawei.com/minisite/4-5g/img/NB-IOT.pdf

  25. Matat, D.: Internet rechey I tehnotrendi yak oznaki evolyutsIYi suspIlstva. Osvita Ukrayini. http://pedpresa.ua/136666-internet-rechej-i-tehnotrendy-yak-oznaky-evolyutsiyi-suspilstva.html

  26. Cisco IoT System Brochure Cisco IoT System Deploy. Accelerate. Innovate, 52 p. (2015). http://www.cisco.com/c/dam/en/us/products/collateral/se/internet-of-things/brochure-c02-734481.pdf

  27. Cisco IoT System Security: Mitigate Risk, Simplify Compliance, and Build Trust White Paper, 4 p. (2015). http://www.cisco.com/c/dam/en/us/products/collateral/se/internet-of-things/iot-system-security-wp.pdf

  28. No stars for Internet of Things security. http://www.zdnet.com/article/no-stars-for-internet-of-things-security/

  29. IoTSF Guest Blog. https://iotsecurityfoundation.org/survey-less-than-10-of-iot-devices-keep-data-secure/

  30. PRESS RELEASE. ioactive. http://www.ioactive.com/news-events/iot-products-have-inadequate-security-according-to-practitioner-survey.html Internet of Things security is dreadful. http://www.zdnet.com/article/internet-of-things-security-it-dreadful-heres-what-to-do-to-protect-yourself. Accessed 3 Aug 2016

  31. Kaspersky security bulletin 2015, 85 p. (2015). https://securelist.com/files/2015/12/Kaspersky-Security-Bulletin-2015_FINAL_EN.pdf. Accessed 3 Aug 2016

  32. Internet of Things. Hewlett Packard Enterprise. http://www.arubanetworks.com/solutions/internet-of-things/. Accessed 3 Aug 2016

  33. Al-Fuqaha, M.G., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015). http://www.comsoc.org/files/Publications/Tech%20Focus/2016/iot/3.pdf

    Article  Google Scholar 

  34. Bardis, N., Doukas, N., Markovskyi, O.P.: Effective method to restore data in distributed data storage systems. In: 2015 IEEE Military Communications Conference, MILCOM 2015. IEEE (2015)

    Google Scholar 

  35. Blaum, M., Hafner, J.I., Hetzler, S.: Partial MDS codes and their application to RAID type of architectures. IEEE Trans. Inf. Theory 59(7), 4510–4519 (2013)

    Article  MathSciNet  Google Scholar 

  36. Peterson, W.W., Weldon Jr., E.J.: Error-Correcting Codes. MIT Press, Cambridge (1984)

    MATH  Google Scholar 

  37. Abdel-Ghaffar, K.A.S., Weber, J.H.: Parity-check matrices separating erasures from errors. IEEE Trans. Inf. Theory. 59(6), 3332–3346 (2013)

    Article  MathSciNet  Google Scholar 

  38. Dimakis, A.G., Prabhakaran, V., Ramchandran, K.: Decentralized Erasure Codes for Distributed Networked Storage, p. 176. University of California, Berkeley (2006)

    Article  MathSciNet  Google Scholar 

  39. Corbett, P., et al.: Row-diagonal parity for double disk failure. In: Proceedings of the Third USENIX Conference on File and Storage Technologies, pp. 1–14 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peter Stavroulakis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Stavroulakis, P., Kolisnyk, M., Kharchenko, V., Doukas, N., Markovskyi, O.P., Bardis, N.G. (2019). Reliability, Fault Tolerance and Other Critical Components for Survivability in Information Warfare. In: Obaidat, M., Cabello, E. (eds) E-Business and Telecommunications. ICETE 2017. Communications in Computer and Information Science, vol 990. Springer, Cham. https://doi.org/10.1007/978-3-030-11039-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-11039-0_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-11038-3

  • Online ISBN: 978-3-030-11039-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics