Skip to main content

Vulnerability-Aware Architecture for a Tactical, Mobile Cloud

  • Chapter
Complex Networks

Part of the book series: Studies in Computational Intelligence ((SCI,volume 424))

  • 2248 Accesses

Abstract

Currently light infantry soldiers do not have access to many of their cyber resources the moment they depart the forward operating base (FOB). Commanders with recent combat experience have reported on the dearth of computing abilities once a mission is underway [14]. To address this, our group seeks to develop a tactical, mobile cloud implemented on a swarm of semi-autonomous robots. We provide two contributions with this work. First, provide a formal definition of the problem followed by a description of our approach to vulnerable state identification based on pattern recognition techniques. Second, we present an awareness definition as it pertains to our domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Al Mannay, W.I., Lewis, T.G.: Minimizing network risk with application to critical structure protection. Journal of Information Warfare 6(2), 52–68 (2007)

    Google Scholar 

  2. Brown, G.G., Carlyle, W.M., Salmeron, J., Wood, K.: Analyzing the vulnerability of critical infrastructure to attack and planning defenses. Tutorial in Operations Research, Informs, 102–123 (2005)

    Google Scholar 

  3. Csárdi, G., Nepusz, T.: The igraph software package for complex network research. InterJournal Complex Systems 1695 (2006)

    Google Scholar 

  4. Dobson, I.: Distance to Bifurcation in Multidimensional Parameter Space: Margin Sensitivity and Closest Bifurcations. In: Chen, D.J., Hill, X., Yu, X. (eds.) Bifurcation Control. LNCS, vol. 293, pp. 49–66. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Garcia, M.L.: Vulnerability assessment of physical protection systems. Butterworth-Heinemann (2006)

    Google Scholar 

  6. Godsile, C., Royle, G.: Algebraic Graph Theory. Springer, New York (2001)

    Book  Google Scholar 

  7. Haimes, Y.Y.: On the definition of vulnerabilities in measuring risk to infrastructure. Risk Analysis 26(2), 293–296 (2006)

    Article  Google Scholar 

  8. Halpern, J., Moses, Y., Vardi, M.Y.: Algorithmic knowledge. In: Proc. of the 5th Conference on Theoretical Aspects of Reasoning about Knowledge (TARK 1994), pp. 255–266. Morgan Kaufmann (1994)

    Google Scholar 

  9. Jousselme, A.-L., Maupin, P., Garion, G., Cholvy, L., Saurel, C.: Situation awareness and ability in coalitions. In: 10th International Conference on Information Fusion, Quebec city, Canada, July 9-12 (2007)

    Google Scholar 

  10. Klibi, W., Martel, A., Guitouni, A.: The design of robust value-creating supply-chain network: a review. European Journal of Operational Research 203(2), 283–293 (2010)

    Article  MATH  Google Scholar 

  11. Larsen, H.L., Yager, R.R.: A Framework for Fuzzy Recognition Technology. IEEE Trans. on Systems, Man, and Cybernetics - Part C: Applications and Reviews 30(1), 65–76 (2000)

    Article  Google Scholar 

  12. Léchevin, N., Rabbath, C.A., Maupin, P.: Toward a stability monitoring system of an asset-communications network exposed to malicious attacks. In: American Control Conf., San Francisco (2011)

    Google Scholar 

  13. Léchevin, N., Jousselme, A.-L., Maupin, P.: Pattern Recognition Framework for the Prediction of Network Vulnerabilities. In: IEEE Network Science Workshop, West Point, NY (June 2011)

    Google Scholar 

  14. Levine, C.: Analysers, and Users of Situational Information. In: Workshop on Information Sharing at the Front Line, Indian Wells, CA (April 2010)

    Google Scholar 

  15. Maupin, P., Jousselme, A.-L., Wehn, H., Mitrovic-Minic, S., Happe, J.: A Situation Analysis Toolbox: Application to Coastal and Offshore Surveillance. In: Int. Conf. on Information Fusion, Edinburgh, UK (2010)

    Google Scholar 

  16. McGill, W.L., Ayyub, B.M.: The meaning of vulnerability in the context of critical infrastructure protection. In: Critical Infrastructure Protection: Element of Risk, Critical Infrastructure Protection Program, George Mason University School of Law (2007)

    Google Scholar 

  17. Nagurnay, A., Quiang, Q.: A network efficiency measure with application to critical infrastructure networks. Journal of Global Optimization 40, 261–275 (2008)

    Article  Google Scholar 

  18. Pradhan, Hansen, A., Hemmer, P.C.: Crossover behavior in burst avalanches: signature of imminent failure. Physical Review Letters 95(12), 125501-1(4) (2005)

    Article  Google Scholar 

  19. Ramos, O., Altshuler, E., Maloy, K.J.: Avalanche prediction in a self-organized pile of beads. Physical Review Letter 102(7), 078701(1-4) (2009)

    Article  Google Scholar 

  20. Shmueli, G., Fienberg, S.E.: Current and potential statistical methods for monitoring multiple data streams for bio-surveillance. In: Statistical Methods in Counter-Terrorism, pp. 109–140. Springer (2006)

    Google Scholar 

  21. Sprague, K.B., Dobias, P.: Behavior in Simulated Combat – Adaptation and Response to Complex Systems Factors, DRDC CORA TM 2008-044 (2008)

    Google Scholar 

  22. Stamatelatos, M., Vesely, W., Dugan, J., Fragola, J., Minarick, J., Railsback, J.: Fault tree handbook with aerospace applications. In: NASA Office of Safety and Mission Assurance, Washington, DC (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anne-Laure Jousselme .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Jousselme, AL., Huggins, K., Léchevin, N., Maupin, P., Larkin, D. (2013). Vulnerability-Aware Architecture for a Tactical, Mobile Cloud. In: Menezes, R., Evsukoff, A., González, M. (eds) Complex Networks. Studies in Computational Intelligence, vol 424. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30287-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30287-9_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30286-2

  • Online ISBN: 978-3-642-30287-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics