Abstract
Currently light infantry soldiers do not have access to many of their cyber resources the moment they depart the forward operating base (FOB). Commanders with recent combat experience have reported on the dearth of computing abilities once a mission is underway [14]. To address this, our group seeks to develop a tactical, mobile cloud implemented on a swarm of semi-autonomous robots. We provide two contributions with this work. First, provide a formal definition of the problem followed by a description of our approach to vulnerable state identification based on pattern recognition techniques. Second, we present an awareness definition as it pertains to our domain.
Keywords
- Vulnerability Assessment
- Communication Range
- Mobile Cloud
- Network Vulnerability
- Robot Network
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
Buying options
Preview
Unable to display preview. Download preview PDF.
References
Al Mannay, W.I., Lewis, T.G.: Minimizing network risk with application to critical structure protection. Journal of Information Warfare 6(2), 52–68 (2007)
Brown, G.G., Carlyle, W.M., Salmeron, J., Wood, K.: Analyzing the vulnerability of critical infrastructure to attack and planning defenses. Tutorial in Operations Research, Informs, 102–123 (2005)
Csárdi, G., Nepusz, T.: The igraph software package for complex network research. InterJournal Complex Systems 1695 (2006)
Dobson, I.: Distance to Bifurcation in Multidimensional Parameter Space: Margin Sensitivity and Closest Bifurcations. In: Chen, D.J., Hill, X., Yu, X. (eds.) Bifurcation Control. LNCS, vol. 293, pp. 49–66. Springer, Heidelberg (2003)
Garcia, M.L.: Vulnerability assessment of physical protection systems. Butterworth-Heinemann (2006)
Godsile, C., Royle, G.: Algebraic Graph Theory. Springer, New York (2001)
Haimes, Y.Y.: On the definition of vulnerabilities in measuring risk to infrastructure. Risk Analysis 26(2), 293–296 (2006)
Halpern, J., Moses, Y., Vardi, M.Y.: Algorithmic knowledge. In: Proc. of the 5th Conference on Theoretical Aspects of Reasoning about Knowledge (TARK 1994), pp. 255–266. Morgan Kaufmann (1994)
Jousselme, A.-L., Maupin, P., Garion, G., Cholvy, L., Saurel, C.: Situation awareness and ability in coalitions. In: 10th International Conference on Information Fusion, Quebec city, Canada, July 9-12 (2007)
Klibi, W., Martel, A., Guitouni, A.: The design of robust value-creating supply-chain network: a review. European Journal of Operational Research 203(2), 283–293 (2010)
Larsen, H.L., Yager, R.R.: A Framework for Fuzzy Recognition Technology. IEEE Trans. on Systems, Man, and Cybernetics - Part C: Applications and Reviews 30(1), 65–76 (2000)
Léchevin, N., Rabbath, C.A., Maupin, P.: Toward a stability monitoring system of an asset-communications network exposed to malicious attacks. In: American Control Conf., San Francisco (2011)
Léchevin, N., Jousselme, A.-L., Maupin, P.: Pattern Recognition Framework for the Prediction of Network Vulnerabilities. In: IEEE Network Science Workshop, West Point, NY (June 2011)
Levine, C.: Analysers, and Users of Situational Information. In: Workshop on Information Sharing at the Front Line, Indian Wells, CA (April 2010)
Maupin, P., Jousselme, A.-L., Wehn, H., Mitrovic-Minic, S., Happe, J.: A Situation Analysis Toolbox: Application to Coastal and Offshore Surveillance. In: Int. Conf. on Information Fusion, Edinburgh, UK (2010)
McGill, W.L., Ayyub, B.M.: The meaning of vulnerability in the context of critical infrastructure protection. In: Critical Infrastructure Protection: Element of Risk, Critical Infrastructure Protection Program, George Mason University School of Law (2007)
Nagurnay, A., Quiang, Q.: A network efficiency measure with application to critical infrastructure networks. Journal of Global Optimization 40, 261–275 (2008)
Pradhan, Hansen, A., Hemmer, P.C.: Crossover behavior in burst avalanches: signature of imminent failure. Physical Review Letters 95(12), 125501-1(4) (2005)
Ramos, O., Altshuler, E., Maloy, K.J.: Avalanche prediction in a self-organized pile of beads. Physical Review Letter 102(7), 078701(1-4) (2009)
Shmueli, G., Fienberg, S.E.: Current and potential statistical methods for monitoring multiple data streams for bio-surveillance. In: Statistical Methods in Counter-Terrorism, pp. 109–140. Springer (2006)
Sprague, K.B., Dobias, P.: Behavior in Simulated Combat – Adaptation and Response to Complex Systems Factors, DRDC CORA TM 2008-044 (2008)
Stamatelatos, M., Vesely, W., Dugan, J., Fragola, J., Minarick, J., Railsback, J.: Fault tree handbook with aerospace applications. In: NASA Office of Safety and Mission Assurance, Washington, DC (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Jousselme, AL., Huggins, K., Léchevin, N., Maupin, P., Larkin, D. (2013). Vulnerability-Aware Architecture for a Tactical, Mobile Cloud. In: Menezes, R., Evsukoff, A., González, M. (eds) Complex Networks. Studies in Computational Intelligence, vol 424. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30287-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-30287-9_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30286-2
Online ISBN: 978-3-642-30287-9
eBook Packages: EngineeringEngineering (R0)