Abstract
The information revolution has caused many aspects of human activity to critically depend on a wide variety of physically existing or virtual technological achievements such as electronic devices, computer systems, algorithms, cloud resources, artificial intelligence hardware and software entities etc. Many of these systems are used in highly sensitive contexts, such as military applications. This implies the existence of an increasing number of unintentional disturbances or malicious attacks. Successful operation requires qualities such as robustness, fault tolerance, reliability, availability and security. All these may be summarized by the title of survivability. Survivability of critical systems working for sensitive applications involves the ability to provide uninterrupted operation under severe disturbances, gracefully degrade when limiting conditions are reached and maintain the ability to resume normal service once the disturbances have been removed. Survivability is an important, even - though non – functional, lifecycle property of many engineering systems. Further desirable elements of survivability include the ability of systems to recognize and resist attacks or accidents, adapt in order to avoid them and modify their behavior in order to diminish the effects of similar future occurrences. This chapter presents a quantitative approach to assessing survivability and an account of survivability in military systems. A scheme for survivability via replica diversity in the implementation of the AES algorithm is then presented. Following that, an algorithm for adaptive attack aversion in user authentication systems is presented that is based on Boolean transformations. An approach for increased survivability in Internet of Things (IoT) systems is then presented. Finally, an algorithm for secure data storage in cloud resources is presented that allows attack detection and avoidance.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Stavroulakis, P.: Reliability, Survivability and Quality of Large Scale Telecommunication Systems. Wiley, London (2003)
Ellison, R.J., et al.: Survivable network system: an emerging discipline. Technical report, CMU/SEI-97- TR-013. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, November 1997
Dou, B.-L., Wang, X.-G., Zhang, S.-Y.: Research on survivability of networked information system. In: 2009 International Conference on Signal Processing Systems (2009)
Liu, Y., Trivedi, K.S.: Survivability quantification: the analytical modeling approach. Int. J. Performability Eng. 2(1), 29–44 (2006)
Heegaard, P.E., Trivedi, K.S.: Survivability quantification of communication services. In: International Conference on Dependable Systems & Networks: Anchorage, Alaska (2008)
Knight, J.C., Strunk, E.A., Sullivan, K.J.: Towards a rigorous definition of information system survivability. In: 2003 Proceedings DARPA Information Survivability, Conference and Exposition (2003)
Bardis, N.G., Doukas, N., Markovskyi, O.P.: Organization of the polymorphic implementation of Rijndael on microcontrollers and smart cards. In: MILCOM 2010 Military Communications Conference. IEEE (2010)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25
Akkar, M.-L., Giraud, C.: An implementation of DES and AES, secure against some attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309–318. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44709-1_26
Stavroulakis, P., Markovskyi, O.P., Bardis, N.G., Doukas, N.: Efficient zero—knowledge identification based on one way Boolean transformations. In: 2011 IEEE GLOBECOM Workshops, pp. 275–280. IEEE (2011)
Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source codes in C, 758 p. Wiley, New York (1995)
Kurosawa, K., Yoshida, T.: Strongly universal hashing and identification codes via channels. IEEE Trans. Inf. Theory 45(6), 2091–2095 (1999)
Seberry, J., et al.: Nonlinearity and propagation characteristics of balanced Boolean functions. Inf. Comput. 119(1), 1–13 (1995)
Feige, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. J. Cryptol. 1(2), 77–94 (1987)
Βardis, N.G., Polymenopoulos, A., Bardis, E.G., Markovskyy, A.P.: Methods for increasing the efficiency of the remote user authentication in integrated systems. Trends Comput. Sci. 12(1), 99–107 (2003). ISBN 1-59454-065-9
Braz, C., Robert, J.M.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th International Conference of the Association Francophone d’Interaction Homme-Machine, pp. 199–203 (2006)
Wang, H., Sheng, B, Tan, C., Qun, L.: Comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access control. In: Proceedings of the 28th International Conference on Distributed Computing Systems, pp. 11–18 (2008)
Tsai, J.-L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3–4), 115–121 (2008)
Bardis, N.G., Doukas, N., Markovskyi, O.: Two level efficient user authentication scheme. In: Proceedings of the 4th IEEE International Conference on Digital Ecosystems and Technology, 12–15 April 2010, Knowledge Village, Dubai, UAE (2010)
Bardis, N., Doukas, N., Markovskyi, O.: Fast subscriber identification based on the zero knowledge principle for multimedia content distribution. Int. J. Multimed. Intell. Secur. (2010)
Kharchenko, V., Kolisnyk, M., Piskachova, I., Bardis, N.: Reliability and security issues for IoT-based smart business center: architecture and Markov model. In: 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), pp. 313–318. IEEE (2016)
Vermesan, O., et al.: Internet of Things – from research and innovation to market deployment. river publishers series in communication, 141 p. (2014). http://www.internet-of-things-research.eu/pdf/IERC_Cluster_Book_2014_Ch.3_SRIA_WEB.pdf. Accessed 3 Aug 2016
Internet of Things and its future. http://www.huawei.com/ilink/en/about-huawei/newsroom/pressrelease/HW_080993?dInID=23407&relatedID=19881&relatedName=HW_076569&dInDocName=HW_076557. Accessed 3 Aug 2016
NB-IOT – Enabling new business opportunities. Building a better connection. Huawei Tech. Co., Ltd. http://www.huawei.com/minisite/4-5g/img/NB-IOT.pdf
Matat, D.: Internet rechey I tehnotrendi yak oznaki evolyutsIYi suspIlstva. Osvita Ukrayini. http://pedpresa.ua/136666-internet-rechej-i-tehnotrendy-yak-oznaky-evolyutsiyi-suspilstva.html
Cisco IoT System Brochure Cisco IoT System Deploy. Accelerate. Innovate, 52 p. (2015). http://www.cisco.com/c/dam/en/us/products/collateral/se/internet-of-things/brochure-c02-734481.pdf
Cisco IoT System Security: Mitigate Risk, Simplify Compliance, and Build Trust White Paper, 4 p. (2015). http://www.cisco.com/c/dam/en/us/products/collateral/se/internet-of-things/iot-system-security-wp.pdf
No stars for Internet of Things security. http://www.zdnet.com/article/no-stars-for-internet-of-things-security/
IoTSF Guest Blog. https://iotsecurityfoundation.org/survey-less-than-10-of-iot-devices-keep-data-secure/
PRESS RELEASE. ioactive. http://www.ioactive.com/news-events/iot-products-have-inadequate-security-according-to-practitioner-survey.html Internet of Things security is dreadful. http://www.zdnet.com/article/internet-of-things-security-it-dreadful-heres-what-to-do-to-protect-yourself. Accessed 3 Aug 2016
Kaspersky security bulletin 2015, 85 p. (2015). https://securelist.com/files/2015/12/Kaspersky-Security-Bulletin-2015_FINAL_EN.pdf. Accessed 3 Aug 2016
Internet of Things. Hewlett Packard Enterprise. http://www.arubanetworks.com/solutions/internet-of-things/. Accessed 3 Aug 2016
Al-Fuqaha, M.G., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015). http://www.comsoc.org/files/Publications/Tech%20Focus/2016/iot/3.pdf
Bardis, N., Doukas, N., Markovskyi, O.P.: Effective method to restore data in distributed data storage systems. In: 2015 IEEE Military Communications Conference, MILCOM 2015. IEEE (2015)
Blaum, M., Hafner, J.I., Hetzler, S.: Partial MDS codes and their application to RAID type of architectures. IEEE Trans. Inf. Theory 59(7), 4510–4519 (2013)
Peterson, W.W., Weldon Jr., E.J.: Error-Correcting Codes. MIT Press, Cambridge (1984)
Abdel-Ghaffar, K.A.S., Weber, J.H.: Parity-check matrices separating erasures from errors. IEEE Trans. Inf. Theory. 59(6), 3332–3346 (2013)
Dimakis, A.G., Prabhakaran, V., Ramchandran, K.: Decentralized Erasure Codes for Distributed Networked Storage, p. 176. University of California, Berkeley (2006)
Corbett, P., et al.: Row-diagonal parity for double disk failure. In: Proceedings of the Third USENIX Conference on File and Storage Technologies, pp. 1–14 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Stavroulakis, P., Kolisnyk, M., Kharchenko, V., Doukas, N., Markovskyi, O.P., Bardis, N.G. (2019). Reliability, Fault Tolerance and Other Critical Components for Survivability in Information Warfare. In: Obaidat, M., Cabello, E. (eds) E-Business and Telecommunications. ICETE 2017. Communications in Computer and Information Science, vol 990. Springer, Cham. https://doi.org/10.1007/978-3-030-11039-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-11039-0_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-11038-3
Online ISBN: 978-3-030-11039-0
eBook Packages: Computer ScienceComputer Science (R0)