1,758 research outputs found

    VISUAL MODELING AND SIMULATION OF CRYPTOGRAPHIC PROTOCOLS UNDER CONTESTED ENVIRONMENTS

    Get PDF
    With an ever-evolving battlefield in cyberspace, it is essential to stay abreast of current and developing security protocols that will maintain a state of authenticity, confidentiality, and integrity between communicating entities in information-contested environments. The Department of Defense is interested in transitioning its mission objective goals to establishing and maintaining a reliable security posture between communicating command-and-control platforms. However, the current security protocol visualizations need to cater more to military users and decision-makers to help decide which security protocols would best accommodate various operational environments. This research designed and developed a two-dimensional protocol visualization tool (ProVis) that simulates various security protocol interactions in non-contested and contested operational study environments that assist with understanding how security protocols work in the context of military-related usage. A user study was conducted to examine users’ understanding, accuracy, and overall benefit of ProVis concerning the visualization of the Transport Layer Security, Message Layer Security, and Pre-Shared Key protocols. The findings are highly satisfactory: the user subjects were able to easily interface with ProVis and complete the tasks given. The user subjects found ProVis to be a helpful tool in understanding security protocols quickly. This research provides an alternative to current visualization tools.NPS Naval Research ProgramThis project was funded in part by the NPS Naval Research Program.Outstanding ThesisLieutenant Commander, United States NavyApproved for public release. Distribution is unlimited

    THaW publications

    Get PDF
    In 2013, the National Science Foundation\u27s Secure and Trustworthy Cyberspace program awarded a Frontier grant to a consortium of four institutions, led by Dartmouth College, to enable trustworthy cybersystems for health and wellness. As of this writing, the Trustworthy Health and Wellness (THaW) project\u27s bibliography includes more than 130 significant publications produced with support from the THaW grant; these publications document the progress made on many fronts by the THaW research team. The collection includes dissertations, theses, journal papers, conference papers, workshop contributions and more. The bibliography is organized as a Zotero library, which provides ready access to citation materials and abstracts and associates each work with a URL where it may be found, cluster (category), several content tags, and a brief annotation summarizing the work\u27s contribution. For more information about THaW, visit thaw.org

    Integration of the Multi-Functional Information Distribution System F-15 Fighter Data Link into the F-15C Eagle

    Get PDF
    The Multi-Functional Information Distribution System (MIDS) provides improved information distribution, position location, and identification capability for the forces of the U.S. Air Force, U.S. Army, U.S. Navy, U.S. Marine Corps, United Kingdom, France, and the North Atlantic treaty Organization (NATO). The system is currently implemented through the use of a variety of terminals and tailored interface configurations designed to meet the needs of specific users. This paper describes the MIDS Fighter Data Link as it is implemented in the F-15 fighter aircraft. It describes system architecture, F-15 aircraft integration, and system testing. The paper explains the effectiveness of the system by presenting the information management challenge involved in accomplishing the F-15\u27s mission of gaining and maintaining air superiority, and outlining the awesome capability of the Fighter Data Link to meet this challenge. Finally, the paper proposes an application of the MIDS Fighter Data Link System to the challenges of commercial aircraft separation and control in a congested environment. The paper is written from the author\u27s perspective as a user and tester of the Fighter Data Link System. The author was first introduced to the system in 1994 when he performed an assessment of the system\u27s utility as an operational F-15C fighter pilot participating in a special project at Mountain Home Air Force Base. Since that time, the author completed test pilot training and is currently involved in both developmental and operational test of the production version of the system. Recent testing has included both ground and flight test of system integration, as well as assessment of technical performance and operational effectiveness
    • …
    corecore