Wireless security within hastily formed networks

One of the main purposes of a Hastily Formed Network (HFN) is to provide immediate access to networked voice, data, and video services for as many users as possible. Following terrorist attacks like those in September 2001 or devastating natural disasters like the December 2004 Indian Ocean Tsunami...

Full description

Bibliographic Details
Main Author: Bradford, Bryan L.
Other Authors: Oros, Carl
Format: Others
Published: Monterey, California. Naval Postgraduate School 2012
Subjects:
Online Access:http://hdl.handle.net/10945/2678
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-2678
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-26782017-05-24T16:07:54Z Wireless security within hastily formed networks Bradford, Bryan L. Oros, Carl Steckler, Brian Naval Postgraduate School (U.S.). Information Sciences Natural disasters Computer architecture Terrorism One of the main purposes of a Hastily Formed Network (HFN) is to provide immediate access to networked voice, data, and video services for as many users as possible. Following terrorist attacks like those in September 2001 or devastating natural disasters like the December 2004 Indian Ocean Tsunami and Hurricane Katrina in August 2005 users of the HFN will likely include survivors; first responders; local, state, and federal government agencies; non-government organizations; militaries; and others. These varied users will have different purposes for accessing HFN services; some will require their information to remain private while others will not. These needs for privacy and openness appear to present conflicting requirements: provide unrestricted access for many users but ensure â privacyâ or security of at least some information within the network. The purpose of this thesis is three-fold: first, to explore methodologies for securing the HFN; second, to examine commercial off-the-shelf (COTS) products and accepted best practices that provide the necessary security; and third, to provide a limited implementation example and a more robust target architecture that could provide security on the wireless segments while maintaining open access to the HFN and minimizing installation, operation, and maintenance complexity. 2012-03-14T17:35:55Z 2012-03-14T17:35:55Z 2006-09 Thesis http://hdl.handle.net/10945/2678 72683434 Approved for public release, distribution unlimited xxii, 89 p. : col. ill., col maps ; application/pdf Monterey, California. Naval Postgraduate School
collection NDLTD
format Others
sources NDLTD
topic Natural disasters
Computer architecture
Terrorism
spellingShingle Natural disasters
Computer architecture
Terrorism
Bradford, Bryan L.
Wireless security within hastily formed networks
description One of the main purposes of a Hastily Formed Network (HFN) is to provide immediate access to networked voice, data, and video services for as many users as possible. Following terrorist attacks like those in September 2001 or devastating natural disasters like the December 2004 Indian Ocean Tsunami and Hurricane Katrina in August 2005 users of the HFN will likely include survivors; first responders; local, state, and federal government agencies; non-government organizations; militaries; and others. These varied users will have different purposes for accessing HFN services; some will require their information to remain private while others will not. These needs for privacy and openness appear to present conflicting requirements: provide unrestricted access for many users but ensure â privacyâ or security of at least some information within the network. The purpose of this thesis is three-fold: first, to explore methodologies for securing the HFN; second, to examine commercial off-the-shelf (COTS) products and accepted best practices that provide the necessary security; and third, to provide a limited implementation example and a more robust target architecture that could provide security on the wireless segments while maintaining open access to the HFN and minimizing installation, operation, and maintenance complexity.
author2 Oros, Carl
author_facet Oros, Carl
Bradford, Bryan L.
author Bradford, Bryan L.
author_sort Bradford, Bryan L.
title Wireless security within hastily formed networks
title_short Wireless security within hastily formed networks
title_full Wireless security within hastily formed networks
title_fullStr Wireless security within hastily formed networks
title_full_unstemmed Wireless security within hastily formed networks
title_sort wireless security within hastily formed networks
publisher Monterey, California. Naval Postgraduate School
publishDate 2012
url http://hdl.handle.net/10945/2678
work_keys_str_mv AT bradfordbryanl wirelesssecuritywithinhastilyformednetworks
_version_ 1718453612251709440