Abstract
Coalition tactical environments are composed of different networks of two or more organizations coming together to perform a short-term tactical operation with a well-defined mission. Cybersecurity is an important consideration in coalition operation. It is a complex challenge due to the need for operational effectiveness coupled with limited trust relationships that exist among different coalition partners. New emerging paradigms in networking, such as software-defined networking (SDN), provide a mechanism to deal more effectively with the security challenges in a coalition environment. In this chapter, we provide an overview of tactical coalition environments and discuss how to utilize the principles of SDN to improve security and cyber situational awareness in them. The chapter also provides an approach for cybersecurity awareness using the observe, orient, decide, and act (OODA) paradigm and explores how OODA-based security can be augmented by means of SDN. As part of this discussion, we also discuss how SDN approaches can help in improving the security and operations of non-coalition tactical networks.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
McKeown N et al (2008) OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Rev 38(2):69–74
Willig A, Kubisch M, Hoene C, Wolisz A (2002) Measurements of a wireless link in an industrial environment using an IEEE 802.11-compliant physical layer. IEEE Trans Ind Electron 49(6):1265–1282
Brehmer B (2005) The dynamic OODA loop: amalgamating boyd’s OODA loop and the cybernetic approach to command and control. In: Proceedings of the 10th international command and control research technology symposium
Ye F et al (2012) MECA: Mobile Edge Capture and Analysis middleware for social sensing applications. In: Proceedings of the 21st International Conference on World Wide Web. ACM
Verma D (2010) (ed) Network science for military coalition operations: Information Exchange and Interaction. IGI Global
Castro A et al (2016) Brokered orchestration for end-to-end service provisioning across heterogeneous multi-operator (multi-AS) optical networks. J Lightwave Technol 34(23)
Calo S et al (2009) Technologies for federation and interoperation of coalition networks. Information Fusion, 2009. FUSION’09. 12th international conference on. IEEE
Sørensen E (2014) SDN used for policy enforcement in a federated military network
Mishra V, Verma D, Williams C Marcus K (May 15–16, 2017) Comparing software defined architectures for coalition operations. In: Proceedings of the international conference on military communications and information systems, Oulu, Finland
Tsai C, Hsu Y, Lin C, Lin W (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994–12000
Verma DC (2009) Principles of computer systems and network management. Springer, Heidelberg, Chapter 6, pp 143–155
Cachin C (2016) Architecture of the Hyperledger blockchain fabric. In: Proceedings of the workshop on distributed cryptocurrencies and consensus ledgers
Verma D, Desai N, Preece A, Taylor I A block chain based architecture for asset management in coalition operations. In: Proceedings of SPIE Defense + Commercial Sensing Symposium, Anaheim, CA, April 2017
Acknowledgments
This research was partially sponsored by the US Army Research Laboratory and the UK Ministry of Defence under Agreement Number W911NF-16-3-0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the US Army Research Laboratory, the US Government, the UK Ministry of Defence, or the UK Government. The US and UK Governments are authorized to reproduce and distribute reprints for government purposes notwithstanding any copyright notation hereon.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Mishra, V.K., Verma, D.C., Williams, C. (2017). Improving Security in Coalition Tactical Environments Using an SDN Approach. In: Zhu, S., Scott-Hayward, S., Jacquin, L., Hill, R. (eds) Guide to Security in SDN and NFV. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-64653-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-64653-4_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64652-7
Online ISBN: 978-3-319-64653-4
eBook Packages: Computer ScienceComputer Science (R0)