Impact of security properties on the quality of information in tactical military networks

Greg Cirincione, Srikanth Krishnamurthy, Thomas F. La Porta, Ramesh Govindan, Prasant Mohapatra

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

The goal of a tactical military network is to provide information superiority over an opposing force. This information superiority increases mission tempo if the information can be used to make correct decisions within time constraints. To achieve this goal, a sufficient amount of information must be received with a required quality. The information quality implicitly accounts for the level of security provided. In this paper we examine the dependencies between security and other factors that affect the information quality. We incorporate the notion of the amount of information of sufficient quality received over time as the operational information content capacity. We discuss the complex tradeoffs that arise while providing security properties: the decision maker may require certain security properties to use information, but the provision of such properties may degrade the ability of the network to deliver the required amount of information in time, thus lowering the operational information content capacity of the network.

Original languageEnglish (US)
Title of host publication2010 IEEE Military Communications Conference, MILCOM 2010
Pages1-6
Number of pages6
DOIs
StatePublished - 2010
Event2010 IEEE Military Communications Conference, MILCOM 2010 - San Jose, CA, United States
Duration: Oct 31 2010Nov 3 2010

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Other

Other2010 IEEE Military Communications Conference, MILCOM 2010
Country/TerritoryUnited States
CitySan Jose, CA
Period10/31/1011/3/10

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Impact of security properties on the quality of information in tactical military networks'. Together they form a unique fingerprint.

Cite this