Skip to main content

Vulnerability-Aware Architecture for a Tactical, Mobile Cloud

  • Chapter
  • 2144 Accesses

Part of the Studies in Computational Intelligence book series (SCI,volume 424)

Abstract

Currently light infantry soldiers do not have access to many of their cyber resources the moment they depart the forward operating base (FOB). Commanders with recent combat experience have reported on the dearth of computing abilities once a mission is underway [14]. To address this, our group seeks to develop a tactical, mobile cloud implemented on a swarm of semi-autonomous robots. We provide two contributions with this work. First, provide a formal definition of the problem followed by a description of our approach to vulnerable state identification based on pattern recognition techniques. Second, we present an awareness definition as it pertains to our domain.

Keywords

  • Vulnerability Assessment
  • Communication Range
  • Mobile Cloud
  • Network Vulnerability
  • Robot Network

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-642-30287-9_7
  • Chapter length: 9 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   109.00
Price excludes VAT (USA)
  • ISBN: 978-3-642-30287-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   139.99
Price excludes VAT (USA)
Hardcover Book
USD   169.99
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al Mannay, W.I., Lewis, T.G.: Minimizing network risk with application to critical structure protection. Journal of Information Warfare 6(2), 52–68 (2007)

    Google Scholar 

  2. Brown, G.G., Carlyle, W.M., Salmeron, J., Wood, K.: Analyzing the vulnerability of critical infrastructure to attack and planning defenses. Tutorial in Operations Research, Informs, 102–123 (2005)

    Google Scholar 

  3. Csárdi, G., Nepusz, T.: The igraph software package for complex network research. InterJournal Complex Systems 1695 (2006)

    Google Scholar 

  4. Dobson, I.: Distance to Bifurcation in Multidimensional Parameter Space: Margin Sensitivity and Closest Bifurcations. In: Chen, D.J., Hill, X., Yu, X. (eds.) Bifurcation Control. LNCS, vol. 293, pp. 49–66. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  5. Garcia, M.L.: Vulnerability assessment of physical protection systems. Butterworth-Heinemann (2006)

    Google Scholar 

  6. Godsile, C., Royle, G.: Algebraic Graph Theory. Springer, New York (2001)

    CrossRef  Google Scholar 

  7. Haimes, Y.Y.: On the definition of vulnerabilities in measuring risk to infrastructure. Risk Analysis 26(2), 293–296 (2006)

    CrossRef  Google Scholar 

  8. Halpern, J., Moses, Y., Vardi, M.Y.: Algorithmic knowledge. In: Proc. of the 5th Conference on Theoretical Aspects of Reasoning about Knowledge (TARK 1994), pp. 255–266. Morgan Kaufmann (1994)

    Google Scholar 

  9. Jousselme, A.-L., Maupin, P., Garion, G., Cholvy, L., Saurel, C.: Situation awareness and ability in coalitions. In: 10th International Conference on Information Fusion, Quebec city, Canada, July 9-12 (2007)

    Google Scholar 

  10. Klibi, W., Martel, A., Guitouni, A.: The design of robust value-creating supply-chain network: a review. European Journal of Operational Research 203(2), 283–293 (2010)

    CrossRef  MATH  Google Scholar 

  11. Larsen, H.L., Yager, R.R.: A Framework for Fuzzy Recognition Technology. IEEE Trans. on Systems, Man, and Cybernetics - Part C: Applications and Reviews 30(1), 65–76 (2000)

    CrossRef  Google Scholar 

  12. Léchevin, N., Rabbath, C.A., Maupin, P.: Toward a stability monitoring system of an asset-communications network exposed to malicious attacks. In: American Control Conf., San Francisco (2011)

    Google Scholar 

  13. Léchevin, N., Jousselme, A.-L., Maupin, P.: Pattern Recognition Framework for the Prediction of Network Vulnerabilities. In: IEEE Network Science Workshop, West Point, NY (June 2011)

    Google Scholar 

  14. Levine, C.: Analysers, and Users of Situational Information. In: Workshop on Information Sharing at the Front Line, Indian Wells, CA (April 2010)

    Google Scholar 

  15. Maupin, P., Jousselme, A.-L., Wehn, H., Mitrovic-Minic, S., Happe, J.: A Situation Analysis Toolbox: Application to Coastal and Offshore Surveillance. In: Int. Conf. on Information Fusion, Edinburgh, UK (2010)

    Google Scholar 

  16. McGill, W.L., Ayyub, B.M.: The meaning of vulnerability in the context of critical infrastructure protection. In: Critical Infrastructure Protection: Element of Risk, Critical Infrastructure Protection Program, George Mason University School of Law (2007)

    Google Scholar 

  17. Nagurnay, A., Quiang, Q.: A network efficiency measure with application to critical infrastructure networks. Journal of Global Optimization 40, 261–275 (2008)

    CrossRef  Google Scholar 

  18. Pradhan, Hansen, A., Hemmer, P.C.: Crossover behavior in burst avalanches: signature of imminent failure. Physical Review Letters 95(12), 125501-1(4) (2005)

    CrossRef  Google Scholar 

  19. Ramos, O., Altshuler, E., Maloy, K.J.: Avalanche prediction in a self-organized pile of beads. Physical Review Letter 102(7), 078701(1-4) (2009)

    CrossRef  Google Scholar 

  20. Shmueli, G., Fienberg, S.E.: Current and potential statistical methods for monitoring multiple data streams for bio-surveillance. In: Statistical Methods in Counter-Terrorism, pp. 109–140. Springer (2006)

    Google Scholar 

  21. Sprague, K.B., Dobias, P.: Behavior in Simulated Combat – Adaptation and Response to Complex Systems Factors, DRDC CORA TM 2008-044 (2008)

    Google Scholar 

  22. Stamatelatos, M., Vesely, W., Dugan, J., Fragola, J., Minarick, J., Railsback, J.: Fault tree handbook with aerospace applications. In: NASA Office of Safety and Mission Assurance, Washington, DC (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anne-Laure Jousselme .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Jousselme, AL., Huggins, K., Léchevin, N., Maupin, P., Larkin, D. (2013). Vulnerability-Aware Architecture for a Tactical, Mobile Cloud. In: Menezes, R., Evsukoff, A., González, M. (eds) Complex Networks. Studies in Computational Intelligence, vol 424. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30287-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30287-9_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30286-2

  • Online ISBN: 978-3-642-30287-9

  • eBook Packages: EngineeringEngineering (R0)