scholarly journals Three Emerging Innovative Technologies Required for Cyber Operations to Execute Commander’s Intent at Machine Speed

2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Andrew Stewart

Decision advantage for the DoD and Combined Cyber Operations results from the secure, seamless, and rapid maneuver of data and information. In the DoD’s 2018 Artificial Intelligence Strategy, the DoD recognized that it must, “put in place key building blocks and platforms to scale and democratize access to AI. This includes creating a common foundation of shared data, reusable tools, frameworks and standards, and cloud and edge services.” More than ever, integrated, adaptive cyber operations provide the means of maneuver for data to enable DoD’s decision advantage-based goals. To support this vision, the integrated implementation three innovative cyber technologies must be rapidly realized across DoD Networks in order to execute cyber operations according to Commander’s Intent—at machine speed. Getting Information to the “edge” is what makes DoD competitive and provides advantage. The word “edge” in this context reflects the distributed individual platforms, sensors, and people who comprise the scale and scope of today’s globally networked DoD operations. That edge is creating the demand to access data and consume information as never before, and a greater need for more innovation to support DoD cyber operations on the DoD Information Network (DODIN). At the heart of the need for innovation is an increased demand for data and information, as well as the size and scale of networks and networking exploding without a proportionate growth in the IT resources to support today’s cyber operational demand. If the network continues to grow exponentially and must function as the medium of maneuver for the data that provides DoD decision advantage to the edge, then the DoD must deploy revolutionary innovations to reinvent the network as an integrated platform for cyber operations—across the enterprise and to the edge and implemented natively as hybrid multicloud-ready. Three innovative, next-generation networking technologies, integrated tightly together, offer the opportunity for DoD to provide revolutionary cyber operations capabilities across the DODIN and produce improved, data-enabled mission results. The scalable and seamless integration of: (1) advanced identity management, (2) software-defined networking, and (3) hybrid multicloud capabilities provides a Commander’s Intent-driven Cyber Platform implemented in a zero trust architecture that operates at machine speed and ensures decision advantage for the DoD.

Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 945 ◽  
Author(s):  
Rafael Torres Moreno ◽  
Jorge Bernal Bernabe ◽  
Jesús García Rodríguez ◽  
Tore Kasper Frederiksen ◽  
Michael Stausholm ◽  
...  

Privacy enhancing technologies (PETs) allow to achieve user’s transactions unlinkability across different online Service Providers. However, current PETs fail to guarantee unlinkability against the Identity Provider (IdP), which becomes a single point of failure in terms of privacy and security, and therefore, might impersonate its users. To address this issue, OLYMPUS EU project establishes an interoperable framework of technologies for a distributed privacy-preserving identity management based on cryptographic techniques that can be applied both to online and offline scenarios. Namely, distributed cryptographic techniques based on threshold cryptography are used to split up the role of the Identity Provider (IdP) into several authorities so that a single entity is not able to impersonate or track its users. The architecture leverages PET technologies, such as distributed threshold-based signatures and privacy attribute-based credentials (p-ABC), so that the signed tokens and the ABC credentials are managed in a distributed way by several IdPs. This paper describes the Olympus architecture, including its associated requirements, the main building blocks and processes, as well as the associated use cases. In addition, the paper shows how the Olympus oblivious architecture can be used to achieve privacy-preserving M2M offline transactions between IoT devices.


2013 ◽  
Vol 2013 (1) ◽  
pp. 000217-000222 ◽  
Author(s):  
Woon-Seong Kwon ◽  
Myongseob Kim ◽  
Jonathan Chang ◽  
Suresh Ramalingam ◽  
Liam Madden ◽  
...  

Technology challenges and solutions in the development and manufacturing of Stacked Silicon Interconnect (SSI) Technology have been investigated with the established foundry and OSAT ecosystem. Key enabling technologies, such as TSV processing, interposer backside manufacturing yield enhancement, new stacking technology, interposer warpage control, micro-bump (μ-bump) processes and joining, that comprise the building blocks for SSI technology were developed. Xilinx 28nm FPGA with stacked silicon interconnect technology (SSIT) platform is used to develop and optimize the seamless integration of the processes, structures, parameter, as well as to evaluate the yield, reliability and device performance of them.


Author(s):  
Ahmed Demirpolat ◽  
Doğanalp Ergenç ◽  
Esref Ozturk ◽  
Yusuf Ayar ◽  
Ertan Onur

The future networks are expected to lead a hyper-connected society with the promise of high social and economic value. The goal is to solve today's network problems and provide satisfactory security. Thus, the future networks require a flexible infrastructure that is secure against cyberattacks. Software defined networking (SDN) can be considered as one of the building blocks of upcoming networking technologies. In this chapter, first, the limitations of today's networks are presented. Then, solutions to secure the networks with SDN components are given. This concept is referred to as “SDN for Security.” While SDN facilitates securing networks in general, it introduces additional challenges, mainly, the vulnerabilities of the SDN components such as the controller have to be addressed. Security for SDN aims at securing SDN assets and is discussed in the sequel. After reading this chapter, readers will obtain a comprehensive overview of the limitations of traditional networks, such as how SDN overcomes those limitations and the security issues thereof.


2015 ◽  
Vol 12 (2) ◽  
pp. 67-71
Author(s):  
Woon-Seong Kwon ◽  
Myongseob Kim ◽  
Jonathan Chang ◽  
Suresh Ramalingam ◽  
Liam Madden ◽  
...  

Technology challenges and solutions in the development and manufacturing of stacked silicon interconnect (SSI) technology have been investigated with the established foundry and outsourced semiconductor assembly and test ecosystem. Key enabling technologies, such as through-silicon-via processing, interposer backside manufacturing yield enhancement, new stacking technology, interposer warpage control, and microbump processes and joining, which are the building blocks for SSI technology, were developed. Xilinx's 28-nm field programmable gate array with an SSI technology platform was used to develop and optimize the seamless integration of the processes, structures, and parameters, as well as to evaluate their yield, reliability, and device performance.


2014 ◽  
Vol 10 (1) ◽  
pp. 3-17 ◽  
Author(s):  
Antonio J. Jara ◽  
Socrates Varakliotis ◽  
Antonio F. Skarmeta ◽  
Peter Kirstein

Emerging Internet of Things (IoT)/Machine-to-Machine (M2M) systems require a transparent access to information and services through a seamless integration into the Future Internet. This integration exploits infrastructure and services found on the Internet by the IoT. On the one hand, the so-called Web of Things aims for direct Web connectivity by pushing its technology down to devices and smart things. On the other hand, the current and Future Internet offer stable, scalable, extensive, and tested protocols for node and service discovery, mobility, security, and auto-configuration, which are also required for the IoT. In order to integrate the IoT into the Internet, this work adapts, extends, and bridges using IPv6 the existing IoT building blocks (such as solutions from IEEE 802.15.4, BT-LE, RFID) while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation. Specifically, this work presents an extended Internet stack with a set of adaptation layers from non-IP towards the IPv6-based network layer in order to enable homogeneous access for applications and services.


Author(s):  
Martin Turner ◽  
Michael Jones ◽  
Meik Poschen ◽  
Rob Procter ◽  
Andrew Rowley ◽  
...  

Research and higher education are facing an on-going transformation of practice resulting in the need for effective collaboration and sharing of resources within and across disciplinary and geographical boundaries. Portal technologies and portal-based virtual research and learning environments (VREs and VLEs) already have become standard infrastructures within a large number of research communities and institutions. From 2004, a series of research and development projects began to ask the question whether an open source videoconferencing and collaboration system could be used as a complete, or as a part of, VRE. This study presents the evolution of these projects and at the same time, describes the definition of a VRE and their future possible integration. The OneVRE portlet integration project attempted to create missing components, including adding secure and universal identity management. This moves the idea of shared data to a different level by creating a new administrative domain that is outside the control of a single local institution portal and resolves certain administrative virtual organizations problems. We explain some of the hurdles that still need to be overcome to make this venture truly successful, when a complete toolkit can be designed for the researcher of the future.


2021 ◽  
Vol 11 (4) ◽  
pp. 4750-4763
Author(s):  
Madhura Apte ◽  
Supriya Kelkar ◽  
Aishwarya Dorge ◽  
Shilpa Deshpande ◽  
Pooja Bomble ◽  
...  

Internet of Things (IoT) a growing phenomenon, refers to the seamless integration of things into the information network. The security in IoT is tampered because of the various attacks which happen due to resource constrained nature of the devices in the network. Thus, although IoT is evolving as an attractive next generation networking paradigm, it can be adopted only when the security issues are resolved. This implies that, in a dynamic and collaborative IoT environment, the devices need to be trustworthy. This paper proposes a gateway based trust management system and an algorithm for computation of trust for the devices. The system focuses on making the computations on the devices lightweight and the network robust. The proposed system is tested against various IoT attacks and results demonstrate that it can clearly identify the malicious device if any, in the IoT network.


2020 ◽  
Vol 1 (5) ◽  
Author(s):  
Newton Masinde ◽  
Kalman Graffi

Abstract The use of online social networks, such as Facebook and Twitter, has grown at a phenomenal rate. These platforms offer services that support interactions via messaging, chatting or audio/video conferencing, and also sharing of content. Most, if not all, of these platforms use centralized computing systems; therefore, the control and management of the systems lies entirely in the hands of one provider, who must be trusted to treat the data and communication traces securely. As a zero-trust alternative, peer-to-peer (P2P) technologies promise to support end-to-end communication, uncompromising access control, anonymity and resilience against censorship and massive data leaks through misused trust. The goals of this survey are threefold. First, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms. Second, it gives an exposition of the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage, secure communication, access control and general-purpose extensibility, which are not properly addressed in other P2P surveys. As a third point, it gives a comprehensive analysis of proposed P2P-based online social network applications, frameworks and architectures by exploring the technical details, inter-dependencies and maturity of these solutions.


Sign in / Sign up

Export Citation Format

Share Document