SlideShare a Scribd company logo
1
Distributed Security Policies for Service-
Oriented Architectures over Tactical Networks
Roberto Rigolin F. Lopes1 and Stephen D. Wolthusen1,2
1. Norwegian Information Security Laboratory, Gjøvik, Norway
2. School of Mathematics and Information Security, University of London, UK
{roberto.lopes, stephen.wolthusen}@hig.no
22
Introduction
• Using rich semantics to state security policies
– Combining cross-layer and multi-domain security
• Layers: NATO Information Assurance (IA) Layer
• Domains: Protection, Detection, Response, Attack, Diligence
and Planning
• Restrictions: nodes’ specialization and connectivity
C3 Taxonomy
Communication Services
Core Enterprise Services
COI Services
User-Facing Capabilities
IA
TSI
Detection
Protection
Response
Diligence
Security
(x) Planning
WLAN
UHF
VHF
SatCom
HQ
Dismounted
Mobile
Relay
Cross-layers Multi-domain Restrictions
Policy ≡ (cross-layer U multi-domain) ∩ restrictions
33
Introduction
• Example of services
– Tactical Ground Report System
Node C
Node A
Soldier localization
Adversary localization
Vehicle localization
Live camera
Aerial photos
Node B
J. Evans, B. Ewy, M. Swink, S. Pennington, D. Siquieros, and S. Earp, “TIGR: the tactical ground
reporting system,” IEEE Communications Magazine, vol. 51, no. 10, pp. 42–49, October 2013.
Observe
OrientDecide
Act
Observe, Orient,
Decide and Act
Observe and Act
44
Example of Service-Oriented Architecture
Packet Handler
Message Handler
Service Mediator
Controller
1
2
3
4
Policy
management
Security
handling
55
Example of Service-Oriented Architecture
SOA PlatformController
Service Mediator
Message Handler
Packet Handler
Operating System
<Policy
Management>
<Security
Handling>
1
2
Cryptography
Tactical Platform Guard
Tactical Support Guard
Policy Manager
Privilege Management Policy Manager
Policy Enforcement Point
Policy Decision Point
Policy Administration Point
Detection
Diligence
Protection
Planning
Response
QoS
<domains>
TSI Node
PEP
PEP
PEPa
b
c
<a,b,c>
66
Structured Security Policies
• Security Domains
• Planning, Detection, Protection, Diligence, Response and Attack
• NATO Information Assurance
• Communication, Core, Application and Inter-domain
• Rule structure
• Conditions implying in Actions
• OODA-loop
C3 Taxonomy
Communication Services
Core Enterprise Services
COI Services
User-Facing Capabilities
IA
TSIDetection
Protection
Response
Diligence
Security
(x) Planning
Observe
OrientDecide
Act
77
The nodes:
Node A
<Dismounted>
UHF WLAN
Node C
<Mobile>
VHFUHFWLAN SatCom
Node B
<Relay>
SatComVHF
HQ Node D
<Deployed>
SatComVHF UHFWLAN
88
Structured Security Policies
– Nodes (N), Policies (P) and Security Domains (S)
Node A
<Dismounted>
UHF WLAN
Node C
<Mobile>
VHFUHFWLAN SatCom
Node B
<Relay>
SatComVHF
HQ Node D
<Deployed>
SatComVHF UHFWLAN
N1:P1(N1:S1)
N2:P2(N2:S2), N2:P’1(N1:R1)
Ni:Pi(Ni:Si),…, Ni:P’i-1(Ni-1:Ri-1)
Resources and # domains
99
Structured Security Policies
– Nodes (N), Policies (P) and Security Domains (S)
SecurityCore
Planning Detection Diligence Response
is is is is
Protection
is
Node A Node B Node C
1 2 3 4 5
2 3 43 4 2 3 41 5
OWL DL OWL DL
OWL Micro
RDFS
OWL DL
OWL Micro
RDFS
OWL DL
OWL Micro
OWL DL
Using rich semantics…
1010
Rich Semantics for Policies - Web Services
MessageSecBinding
TokenProtection
has
SecurityBinding
is
SecurityToken
SymmetricBinding AsymmetricBinding
is is
SecurityHeaderLayout
TransportBinding
AlgorithmSuite
Timestamp
has
hashas
is
hasSignatureToken
hasEncryptionToken
hasProtectionToken
hasInitiatorToken
hasRecipientSignatureToken
hasRecipientToken
hasInitiatorEncryptionToken
hasInitiatorSignatureToken
has
SignatureProtectionhas
isWeakerThan
isStrongerThan
isEquivalentTo
isWeakerThan
isStrongerThan
isEquivalentTo
isWeakerThan
isStrongerThan
isEquivalentTo
isMoreGeneralThan
isMoreSpecificThan
hasTechDiffWith
hasTechDiffWith
isMoreGeneralThan
isMoreSpecificThan
hasTechDiffWith
isWeakerThan
isStrongerThan
isEuivalentTo
isWeakerThan
isStrongerThan
isEquivalentTo
QoS requirements
Information sensitivity
Conditions:
Network status
1111
Security Policies
• Attribute-based
• Rich semantics
Allow access to resource <Service> with attribute <Sensitivity>
if <Service> match BlueForceTracking
and action is read
MessageSecBinding
TokenProtection
has
SecurityBinding
is
SecurityToken
SymmetricBinding AsymmetricBinding
is is
SecurityHeaderLayout
TransportBinding
AlgorithmSuitehashas
is
hasSignatureToken
hasEncryptionToken
hasProtectionToken
hasInitiatorToken
hasRecipientSignatureToken
hasRecipientToken
hasInitiatorEncryptionToken
hasInitiatorSignatureTokenhas
SignatureProtectionhas
isWeakerThan
isStrongerThan
isEquivalentTo
isWeakerThan
isStrongerThan
isEquivalentTo
isWeakerThan
isStrongerThan
isEquivalentTo
isMoreGeneralThan
isMoreSpecificThan
hasTechDiffWith
isMoreGeneralThan
isMoreSpecificThan
hasTechDiffWith
isWeakerThan
isStrongerThan
isEuivalentTo
2
2.1 2.2
1
Allow or Deny
Stronger, Equal or
Weaker
1212
Distributed Security Policies – Security Core
• (1) Multi-Domain, (2) Cross-layer and (3) Rules
SecurityCore
Action
Condition
has
has
TSI Common
Rule
Planning
Diligence
uses
Protection
<inverse property>
<Foundational ontologies><Core reference ontologies>
<Task ontologies>
NewCondition
3 NewAction
NewDomain
Capability
Inter-domainCommunication Core
Domain
NewCapability <NATO’s C3 Taxonomy>
1
2
Application
Attack
Detection
Response
1313
owl:thing
owl:intersectionOF
owl:unionOf
owl:equivalentClass
owl:thing
owl:intersectionOF
owl:unionOf
owl:equivalentClass
owl:equivalentProperty
owl:inverseOf
owl:functionalProperty
owl:inverseFunctionalProperty
owl:symmetricProperty
owl:transitiveProperty
owl:hasValue
owl:disjointWith
owl:sameAs
owl:differentFrom
owl:distinctMembers
owl:someValuesFrom
owl:allValuesFrom
owl:cardinality
owl:minCardinality
owl:maxCardinality
OWL-lite
20 axioms
2
OWL-DL
25 axioms
1
Structured Security Policies - Performance
AllowDeny
Validate
Is valid? YesNo
loop
1414
Distributed Security Policies
Preparation Mission
SecurityCore
<OWL DL>
Node C
Detection
<OWL lite>
Diligence
<OWL lite>
Protection
<OWL lite>
Diligence
<RDFS>
Protection
<RDFS>
Node B
Node A
1 2
Version Alpha
Version Bravo
Version Charlie
• Pre-distribution of policy statements
– The system can keep versions of the policies
1515
Distributed Security Policies
Planning
Detection
Protection
Diligence
Response
Attack
Communication
Core
Application
Inter-domain
ActionCondition
NewCondition
Cross-layer
Multi-domain
• Examples of policies:
1616
Distributed Security Policies
• Multi-domain
• Cross-layer
Packet Handler
Message Handler
Service Mediator
1
2
3
ActionCondition
1717
Distributed Security Policies
• Scenario: three types of nodes moving
Ni-1
Ni
Ni+1
Multi-hop network
T0
T1
...
Pi-1
Pi(P’i-1)
Pi+1(P’i-1, (P’i))
Nodes’ type
Service request
Union of security
domains
HQ Node D
<Deployed>
SatComVHF UHFWLAN
1818
Distributed Security Policies
• Connectivity Graph and Security Domains
UHF, VHF,
SatCom
Observe, Act Orient, Act Decide
1 Detection
2 Protection
3 Attack
4 Diligence
5 Response
6 Planning
Ni-1 Ni Ni+1
Security domains
{1,2,3} {1,2,3,4,5} {1,2,3,4,5,6}
UHF,
WLAN UHF, VHF,
WLAN
SatCom
UHF, WLAN
Observe, Act Orient, Decide, Act -
Observe, Orient, Act Orient, Decide, Act -
L1,n
L2,n
L3,n
<Dismounted> <Mobile> <Deployed>
1919
Distributed Security Policies
• Security domains and the OODA-loop
– This mapping is done during the preparation
Observe
OrientDecide
Act
Detection
Protection
Attack
Diligence
Response
Planning
Attack
Diligence
Planning
Response Response
Preparation
<standard SOA>
Mission
<distributed SOA>
1 2
Dynamic
Pre-load keys and policies
2020
Distributed Security Policies – OODA-loop
Handheld
<Dismounted>
Laptop
<Mobile>
HQ Laptop
<Deployed>
2121
In short
decreases
Specialization
Deductioncapabilities
General Specialized
Low
High
Node B
Node C
Node A
Detection
Diligence
Planning
Protection
Response
Detection
Diligence
Protection
Response
Detection
Diligence
Protection
# policy domains
increase
Server(s)
Battalion
Sensor network(s)
increases
# classes, instances
and axioms
<OWL-DL>
<OWL-Lite>
<RDFS>
2222
Distributed Security Policies
2323
Conclusion
• OWL-DL might be suitable for security policies in
tactical networks;
– Nodes’ type demands careful design and deployment
– But the language is flexible and distributed by design
• Critical points on policy design and deployment:
– Policy structure and distribution over tactical networks
• The policy distribution uses the security domains and
the mission context in an attempt to connect Cyber
and Kinetic domains.
– Security policies can adapt to the mission’s profile
• The nodes rely on the network connectivity to
complement its security capabilities
24
Distributed Security Policies for Service-
Oriented Architectures over Tactical Networks
Roberto Rigolin F. Lopes1 and Stephen D. Wolthusen1,2
1. Norwegian Information Security Laboratory, Gjøvik, Norway
2. School of Mathematics and Information Security, University of London, UK
{roberto.lopes, stephen.wolthusen}@hig.no

More Related Content

Viewers also liked

What Nature has been teaching us about Information Security?
What Nature has been teaching us about Information Security?What Nature has been teaching us about Information Security?
What Nature has been teaching us about Information Security?
Roberto Rigolin F. Lopes
 
Cyber warfare: an unorthodox view from the battlefield
Cyber warfare: an unorthodox view from the battlefieldCyber warfare: an unorthodox view from the battlefield
Cyber warfare: an unorthodox view from the battlefield
Roberto Rigolin F. Lopes
 
Growing your eBay Sales with Linnworks
Growing your eBay Sales with LinnworksGrowing your eBay Sales with Linnworks
Growing your eBay Sales with Linnworks
Linnworks
 
Temelia cladirii - invatatura apostolilor
Temelia cladirii - invatatura apostolilorTemelia cladirii - invatatura apostolilor
Temelia cladirii - invatatura apostolilor
Biserica VIA
 
Spirituality
SpiritualitySpirituality
Spirituality
Aarti Sahu
 
นิพจน์ ตัวดำเนินการ-และตัวถูกดำเนินการ
นิพจน์ ตัวดำเนินการ-และตัวถูกดำเนินการนิพจน์ ตัวดำเนินการ-และตัวถูกดำเนินการ
นิพจน์ ตัวดำเนินการ-และตัวถูกดำเนินการ
Oraphan4
 
práctica docente iv y residencia
práctica docente iv y residenciapráctica docente iv y residencia
práctica docente iv y residencia
Tomhack
 
Ivii'a language presentation
Ivii'a language presentationIvii'a language presentation
Ivii'a language presentation
GalacticMisjif
 
CV manoj
CV manojCV manoj
CV manoj
Manoj Choudhary
 
Financial_Transaction
Financial_TransactionFinancial_Transaction
Financial_Transaction
JAIDEEP CHATTERJEE
 
презентація
презентаціяпрезентація
презентація
tummenscool1
 
Tracy Nguyen Resume 12.24.15
Tracy Nguyen Resume 12.24.15Tracy Nguyen Resume 12.24.15
Tracy Nguyen Resume 12.24.15
Tracy Nguyen
 
Karen bt copia
Karen bt   copiaKaren bt   copia
Karen bt copia
karen1090
 
Parker Simpson & Kordi - 2016 - Comparison of Critical Power and wprime deriv...
Parker Simpson & Kordi - 2016 - Comparison of Critical Power and wprime deriv...Parker Simpson & Kordi - 2016 - Comparison of Critical Power and wprime deriv...
Parker Simpson & Kordi - 2016 - Comparison of Critical Power and wprime deriv...
Mehdi Kordi
 
MP Newsletter
MP NewsletterMP Newsletter
MP Newsletter
Gretel Tortolani
 
Education
EducationEducation
Android UX Tricks: Nested Scrolling without Nested Scrolling
Android UX Tricks: Nested Scrolling without Nested ScrollingAndroid UX Tricks: Nested Scrolling without Nested Scrolling
Android UX Tricks: Nested Scrolling without Nested Scrolling
Brendan Weinstein
 
Il mercato mondiale dell'acqua imbottigliata high
Il mercato mondiale  dell'acqua imbottigliata highIl mercato mondiale  dell'acqua imbottigliata high
Il mercato mondiale dell'acqua imbottigliata high
GEORGE DIAMANDIS
 

Viewers also liked (18)

What Nature has been teaching us about Information Security?
What Nature has been teaching us about Information Security?What Nature has been teaching us about Information Security?
What Nature has been teaching us about Information Security?
 
Cyber warfare: an unorthodox view from the battlefield
Cyber warfare: an unorthodox view from the battlefieldCyber warfare: an unorthodox view from the battlefield
Cyber warfare: an unorthodox view from the battlefield
 
Growing your eBay Sales with Linnworks
Growing your eBay Sales with LinnworksGrowing your eBay Sales with Linnworks
Growing your eBay Sales with Linnworks
 
Temelia cladirii - invatatura apostolilor
Temelia cladirii - invatatura apostolilorTemelia cladirii - invatatura apostolilor
Temelia cladirii - invatatura apostolilor
 
Spirituality
SpiritualitySpirituality
Spirituality
 
นิพจน์ ตัวดำเนินการ-และตัวถูกดำเนินการ
นิพจน์ ตัวดำเนินการ-และตัวถูกดำเนินการนิพจน์ ตัวดำเนินการ-และตัวถูกดำเนินการ
นิพจน์ ตัวดำเนินการ-และตัวถูกดำเนินการ
 
práctica docente iv y residencia
práctica docente iv y residenciapráctica docente iv y residencia
práctica docente iv y residencia
 
Ivii'a language presentation
Ivii'a language presentationIvii'a language presentation
Ivii'a language presentation
 
CV manoj
CV manojCV manoj
CV manoj
 
Financial_Transaction
Financial_TransactionFinancial_Transaction
Financial_Transaction
 
презентація
презентаціяпрезентація
презентація
 
Tracy Nguyen Resume 12.24.15
Tracy Nguyen Resume 12.24.15Tracy Nguyen Resume 12.24.15
Tracy Nguyen Resume 12.24.15
 
Karen bt copia
Karen bt   copiaKaren bt   copia
Karen bt copia
 
Parker Simpson & Kordi - 2016 - Comparison of Critical Power and wprime deriv...
Parker Simpson & Kordi - 2016 - Comparison of Critical Power and wprime deriv...Parker Simpson & Kordi - 2016 - Comparison of Critical Power and wprime deriv...
Parker Simpson & Kordi - 2016 - Comparison of Critical Power and wprime deriv...
 
MP Newsletter
MP NewsletterMP Newsletter
MP Newsletter
 
Education
EducationEducation
Education
 
Android UX Tricks: Nested Scrolling without Nested Scrolling
Android UX Tricks: Nested Scrolling without Nested ScrollingAndroid UX Tricks: Nested Scrolling without Nested Scrolling
Android UX Tricks: Nested Scrolling without Nested Scrolling
 
Il mercato mondiale dell'acqua imbottigliata high
Il mercato mondiale  dell'acqua imbottigliata highIl mercato mondiale  dell'acqua imbottigliata high
Il mercato mondiale dell'acqua imbottigliata high
 

Similar to Distributed Security Policies for Service-Oriented Architectures over Tactical Networks

[36C3] Sigover + alpha : Signal overshadowing attack on LTE and its applications
[36C3] Sigover + alpha : Signal overshadowing attack on LTE and its applications[36C3] Sigover + alpha : Signal overshadowing attack on LTE and its applications
[36C3] Sigover + alpha : Signal overshadowing attack on LTE and its applications
CheolJun Park
 
SatCom Protection in Mission Critical Oil & Gas - Edited
SatCom Protection in Mission Critical Oil & Gas - EditedSatCom Protection in Mission Critical Oil & Gas - Edited
SatCom Protection in Mission Critical Oil & Gas - Edited
Guido Baraglia
 
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTORIMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IRJET Journal
 
CV_25102016-1
CV_25102016-1CV_25102016-1
CV_25102016-1
Olivier Cavar
 
Agile network agile world, tayo ashiru, huawei
Agile network agile world, tayo ashiru, huaweiAgile network agile world, tayo ashiru, huawei
Agile network agile world, tayo ashiru, huawei
Commonwealth Telecommunications Organisation
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructure
ADVA
 
IoT_standards
IoT_standardsIoT_standards
IoT_standards
João Santos
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
Firas Alsayied
 
Government and Defense Fixed Communications
Government and Defense Fixed CommunicationsGovernment and Defense Fixed Communications
Government and Defense Fixed Communications
ST Engineering iDirect
 
Rfid based localization
Rfid based localizationRfid based localization
Rfid based localization
Mehjabin Sultana
 
Analysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queriesAnalysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queries
kavidhapr
 
resumeTDang
resumeTDangresumeTDang
resumeTDang
Tuan Dang
 
Sintel Satellite Services Brochure
Sintel Satellite Services BrochureSintel Satellite Services Brochure
Sintel Satellite Services Brochure
sintelsat
 
RINA Distributed Mobility Management over WiFi
RINA Distributed Mobility Management over WiFiRINA Distributed Mobility Management over WiFi
RINA Distributed Mobility Management over WiFi
ARCFIRE ICT
 
Unit 2-basic wireless sensor
Unit 2-basic wireless sensorUnit 2-basic wireless sensor
Sigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico CitySigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico City
Nicolas Lesconnec
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
Editor IJCTER
 
Future tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based serviceFuture tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based service
Yi-Hsueh Tsai
 
Signal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioSignal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive Radio
IRJET Journal
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
AFCEA International
 

Similar to Distributed Security Policies for Service-Oriented Architectures over Tactical Networks (20)

[36C3] Sigover + alpha : Signal overshadowing attack on LTE and its applications
[36C3] Sigover + alpha : Signal overshadowing attack on LTE and its applications[36C3] Sigover + alpha : Signal overshadowing attack on LTE and its applications
[36C3] Sigover + alpha : Signal overshadowing attack on LTE and its applications
 
SatCom Protection in Mission Critical Oil & Gas - Edited
SatCom Protection in Mission Critical Oil & Gas - EditedSatCom Protection in Mission Critical Oil & Gas - Edited
SatCom Protection in Mission Critical Oil & Gas - Edited
 
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTORIMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
 
CV_25102016-1
CV_25102016-1CV_25102016-1
CV_25102016-1
 
Agile network agile world, tayo ashiru, huawei
Agile network agile world, tayo ashiru, huaweiAgile network agile world, tayo ashiru, huawei
Agile network agile world, tayo ashiru, huawei
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructure
 
IoT_standards
IoT_standardsIoT_standards
IoT_standards
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
Government and Defense Fixed Communications
Government and Defense Fixed CommunicationsGovernment and Defense Fixed Communications
Government and Defense Fixed Communications
 
Rfid based localization
Rfid based localizationRfid based localization
Rfid based localization
 
Analysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queriesAnalysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queries
 
resumeTDang
resumeTDangresumeTDang
resumeTDang
 
Sintel Satellite Services Brochure
Sintel Satellite Services BrochureSintel Satellite Services Brochure
Sintel Satellite Services Brochure
 
RINA Distributed Mobility Management over WiFi
RINA Distributed Mobility Management over WiFiRINA Distributed Mobility Management over WiFi
RINA Distributed Mobility Management over WiFi
 
Unit 2-basic wireless sensor
Unit 2-basic wireless sensorUnit 2-basic wireless sensor
Unit 2-basic wireless sensor
 
Sigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico CitySigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico City
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Future tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based serviceFuture tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based service
 
Signal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioSignal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive Radio
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
 

Recently uploaded

在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
vluwdy49
 
Pests of Storage_Identification_Dr.UPR.pdf
Pests of Storage_Identification_Dr.UPR.pdfPests of Storage_Identification_Dr.UPR.pdf
Pests of Storage_Identification_Dr.UPR.pdf
PirithiRaju
 
molar-distalization in orthodontics-seminar.pptx
molar-distalization in orthodontics-seminar.pptxmolar-distalization in orthodontics-seminar.pptx
molar-distalization in orthodontics-seminar.pptx
Anagha Prasad
 
Compexometric titration/Chelatorphy titration/chelating titration
Compexometric titration/Chelatorphy titration/chelating titrationCompexometric titration/Chelatorphy titration/chelating titration
Compexometric titration/Chelatorphy titration/chelating titration
Vandana Devesh Sharma
 
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdfMending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Selcen Ozturkcan
 
Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)
Sciences of Europe
 
8.Isolation of pure cultures and preservation of cultures.pdf
8.Isolation of pure cultures and preservation of cultures.pdf8.Isolation of pure cultures and preservation of cultures.pdf
8.Isolation of pure cultures and preservation of cultures.pdf
by6843629
 
The debris of the ‘last major merger’ is dynamically young
The debris of the ‘last major merger’ is dynamically youngThe debris of the ‘last major merger’ is dynamically young
The debris of the ‘last major merger’ is dynamically young
Sérgio Sacani
 
Authoring a personal GPT for your research and practice: How we created the Q...
Authoring a personal GPT for your research and practice: How we created the Q...Authoring a personal GPT for your research and practice: How we created the Q...
Authoring a personal GPT for your research and practice: How we created the Q...
Leonel Morgado
 
Basics of crystallography, crystal systems, classes and different forms
Basics of crystallography, crystal systems, classes and different formsBasics of crystallography, crystal systems, classes and different forms
Basics of crystallography, crystal systems, classes and different forms
MaheshaNanjegowda
 
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
hozt8xgk
 
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...
PsychoTech Services
 
Applied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdfApplied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdf
University of Hertfordshire
 
Modelo de slide quimica para powerpoint
Modelo  de slide quimica para powerpointModelo  de slide quimica para powerpoint
Modelo de slide quimica para powerpoint
Karen593256
 
waterlessdyeingtechnolgyusing carbon dioxide chemicalspdf
waterlessdyeingtechnolgyusing carbon dioxide chemicalspdfwaterlessdyeingtechnolgyusing carbon dioxide chemicalspdf
waterlessdyeingtechnolgyusing carbon dioxide chemicalspdf
LengamoLAppostilic
 
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...
Travis Hills MN
 
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...
Sérgio Sacani
 
The binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defectsThe binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defects
Sérgio Sacani
 
23PH301 - Optics - Optical Lenses.pptx
23PH301 - Optics  -  Optical Lenses.pptx23PH301 - Optics  -  Optical Lenses.pptx
23PH301 - Optics - Optical Lenses.pptx
RDhivya6
 
The cost of acquiring information by natural selection
The cost of acquiring information by natural selectionThe cost of acquiring information by natural selection
The cost of acquiring information by natural selection
Carl Bergstrom
 

Recently uploaded (20)

在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
 
Pests of Storage_Identification_Dr.UPR.pdf
Pests of Storage_Identification_Dr.UPR.pdfPests of Storage_Identification_Dr.UPR.pdf
Pests of Storage_Identification_Dr.UPR.pdf
 
molar-distalization in orthodontics-seminar.pptx
molar-distalization in orthodontics-seminar.pptxmolar-distalization in orthodontics-seminar.pptx
molar-distalization in orthodontics-seminar.pptx
 
Compexometric titration/Chelatorphy titration/chelating titration
Compexometric titration/Chelatorphy titration/chelating titrationCompexometric titration/Chelatorphy titration/chelating titration
Compexometric titration/Chelatorphy titration/chelating titration
 
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdfMending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
 
Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)
 
8.Isolation of pure cultures and preservation of cultures.pdf
8.Isolation of pure cultures and preservation of cultures.pdf8.Isolation of pure cultures and preservation of cultures.pdf
8.Isolation of pure cultures and preservation of cultures.pdf
 
The debris of the ‘last major merger’ is dynamically young
The debris of the ‘last major merger’ is dynamically youngThe debris of the ‘last major merger’ is dynamically young
The debris of the ‘last major merger’ is dynamically young
 
Authoring a personal GPT for your research and practice: How we created the Q...
Authoring a personal GPT for your research and practice: How we created the Q...Authoring a personal GPT for your research and practice: How we created the Q...
Authoring a personal GPT for your research and practice: How we created the Q...
 
Basics of crystallography, crystal systems, classes and different forms
Basics of crystallography, crystal systems, classes and different formsBasics of crystallography, crystal systems, classes and different forms
Basics of crystallography, crystal systems, classes and different forms
 
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
 
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...
 
Applied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdfApplied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdf
 
Modelo de slide quimica para powerpoint
Modelo  de slide quimica para powerpointModelo  de slide quimica para powerpoint
Modelo de slide quimica para powerpoint
 
waterlessdyeingtechnolgyusing carbon dioxide chemicalspdf
waterlessdyeingtechnolgyusing carbon dioxide chemicalspdfwaterlessdyeingtechnolgyusing carbon dioxide chemicalspdf
waterlessdyeingtechnolgyusing carbon dioxide chemicalspdf
 
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...
 
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...
 
The binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defectsThe binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defects
 
23PH301 - Optics - Optical Lenses.pptx
23PH301 - Optics  -  Optical Lenses.pptx23PH301 - Optics  -  Optical Lenses.pptx
23PH301 - Optics - Optical Lenses.pptx
 
The cost of acquiring information by natural selection
The cost of acquiring information by natural selectionThe cost of acquiring information by natural selection
The cost of acquiring information by natural selection
 

Distributed Security Policies for Service-Oriented Architectures over Tactical Networks

  • 1. 1 Distributed Security Policies for Service- Oriented Architectures over Tactical Networks Roberto Rigolin F. Lopes1 and Stephen D. Wolthusen1,2 1. Norwegian Information Security Laboratory, Gjøvik, Norway 2. School of Mathematics and Information Security, University of London, UK {roberto.lopes, stephen.wolthusen}@hig.no
  • 2. 22 Introduction • Using rich semantics to state security policies – Combining cross-layer and multi-domain security • Layers: NATO Information Assurance (IA) Layer • Domains: Protection, Detection, Response, Attack, Diligence and Planning • Restrictions: nodes’ specialization and connectivity C3 Taxonomy Communication Services Core Enterprise Services COI Services User-Facing Capabilities IA TSI Detection Protection Response Diligence Security (x) Planning WLAN UHF VHF SatCom HQ Dismounted Mobile Relay Cross-layers Multi-domain Restrictions Policy ≡ (cross-layer U multi-domain) ∩ restrictions
  • 3. 33 Introduction • Example of services – Tactical Ground Report System Node C Node A Soldier localization Adversary localization Vehicle localization Live camera Aerial photos Node B J. Evans, B. Ewy, M. Swink, S. Pennington, D. Siquieros, and S. Earp, “TIGR: the tactical ground reporting system,” IEEE Communications Magazine, vol. 51, no. 10, pp. 42–49, October 2013. Observe OrientDecide Act Observe, Orient, Decide and Act Observe and Act
  • 4. 44 Example of Service-Oriented Architecture Packet Handler Message Handler Service Mediator Controller 1 2 3 4 Policy management Security handling
  • 5. 55 Example of Service-Oriented Architecture SOA PlatformController Service Mediator Message Handler Packet Handler Operating System <Policy Management> <Security Handling> 1 2 Cryptography Tactical Platform Guard Tactical Support Guard Policy Manager Privilege Management Policy Manager Policy Enforcement Point Policy Decision Point Policy Administration Point Detection Diligence Protection Planning Response QoS <domains> TSI Node PEP PEP PEPa b c <a,b,c>
  • 6. 66 Structured Security Policies • Security Domains • Planning, Detection, Protection, Diligence, Response and Attack • NATO Information Assurance • Communication, Core, Application and Inter-domain • Rule structure • Conditions implying in Actions • OODA-loop C3 Taxonomy Communication Services Core Enterprise Services COI Services User-Facing Capabilities IA TSIDetection Protection Response Diligence Security (x) Planning Observe OrientDecide Act
  • 7. 77 The nodes: Node A <Dismounted> UHF WLAN Node C <Mobile> VHFUHFWLAN SatCom Node B <Relay> SatComVHF HQ Node D <Deployed> SatComVHF UHFWLAN
  • 8. 88 Structured Security Policies – Nodes (N), Policies (P) and Security Domains (S) Node A <Dismounted> UHF WLAN Node C <Mobile> VHFUHFWLAN SatCom Node B <Relay> SatComVHF HQ Node D <Deployed> SatComVHF UHFWLAN N1:P1(N1:S1) N2:P2(N2:S2), N2:P’1(N1:R1) Ni:Pi(Ni:Si),…, Ni:P’i-1(Ni-1:Ri-1) Resources and # domains
  • 9. 99 Structured Security Policies – Nodes (N), Policies (P) and Security Domains (S) SecurityCore Planning Detection Diligence Response is is is is Protection is Node A Node B Node C 1 2 3 4 5 2 3 43 4 2 3 41 5 OWL DL OWL DL OWL Micro RDFS OWL DL OWL Micro RDFS OWL DL OWL Micro OWL DL Using rich semantics…
  • 10. 1010 Rich Semantics for Policies - Web Services MessageSecBinding TokenProtection has SecurityBinding is SecurityToken SymmetricBinding AsymmetricBinding is is SecurityHeaderLayout TransportBinding AlgorithmSuite Timestamp has hashas is hasSignatureToken hasEncryptionToken hasProtectionToken hasInitiatorToken hasRecipientSignatureToken hasRecipientToken hasInitiatorEncryptionToken hasInitiatorSignatureToken has SignatureProtectionhas isWeakerThan isStrongerThan isEquivalentTo isWeakerThan isStrongerThan isEquivalentTo isWeakerThan isStrongerThan isEquivalentTo isMoreGeneralThan isMoreSpecificThan hasTechDiffWith hasTechDiffWith isMoreGeneralThan isMoreSpecificThan hasTechDiffWith isWeakerThan isStrongerThan isEuivalentTo isWeakerThan isStrongerThan isEquivalentTo QoS requirements Information sensitivity Conditions: Network status
  • 11. 1111 Security Policies • Attribute-based • Rich semantics Allow access to resource <Service> with attribute <Sensitivity> if <Service> match BlueForceTracking and action is read MessageSecBinding TokenProtection has SecurityBinding is SecurityToken SymmetricBinding AsymmetricBinding is is SecurityHeaderLayout TransportBinding AlgorithmSuitehashas is hasSignatureToken hasEncryptionToken hasProtectionToken hasInitiatorToken hasRecipientSignatureToken hasRecipientToken hasInitiatorEncryptionToken hasInitiatorSignatureTokenhas SignatureProtectionhas isWeakerThan isStrongerThan isEquivalentTo isWeakerThan isStrongerThan isEquivalentTo isWeakerThan isStrongerThan isEquivalentTo isMoreGeneralThan isMoreSpecificThan hasTechDiffWith isMoreGeneralThan isMoreSpecificThan hasTechDiffWith isWeakerThan isStrongerThan isEuivalentTo 2 2.1 2.2 1 Allow or Deny Stronger, Equal or Weaker
  • 12. 1212 Distributed Security Policies – Security Core • (1) Multi-Domain, (2) Cross-layer and (3) Rules SecurityCore Action Condition has has TSI Common Rule Planning Diligence uses Protection <inverse property> <Foundational ontologies><Core reference ontologies> <Task ontologies> NewCondition 3 NewAction NewDomain Capability Inter-domainCommunication Core Domain NewCapability <NATO’s C3 Taxonomy> 1 2 Application Attack Detection Response
  • 14. 1414 Distributed Security Policies Preparation Mission SecurityCore <OWL DL> Node C Detection <OWL lite> Diligence <OWL lite> Protection <OWL lite> Diligence <RDFS> Protection <RDFS> Node B Node A 1 2 Version Alpha Version Bravo Version Charlie • Pre-distribution of policy statements – The system can keep versions of the policies
  • 16. 1616 Distributed Security Policies • Multi-domain • Cross-layer Packet Handler Message Handler Service Mediator 1 2 3 ActionCondition
  • 17. 1717 Distributed Security Policies • Scenario: three types of nodes moving Ni-1 Ni Ni+1 Multi-hop network T0 T1 ... Pi-1 Pi(P’i-1) Pi+1(P’i-1, (P’i)) Nodes’ type Service request Union of security domains HQ Node D <Deployed> SatComVHF UHFWLAN
  • 18. 1818 Distributed Security Policies • Connectivity Graph and Security Domains UHF, VHF, SatCom Observe, Act Orient, Act Decide 1 Detection 2 Protection 3 Attack 4 Diligence 5 Response 6 Planning Ni-1 Ni Ni+1 Security domains {1,2,3} {1,2,3,4,5} {1,2,3,4,5,6} UHF, WLAN UHF, VHF, WLAN SatCom UHF, WLAN Observe, Act Orient, Decide, Act - Observe, Orient, Act Orient, Decide, Act - L1,n L2,n L3,n <Dismounted> <Mobile> <Deployed>
  • 19. 1919 Distributed Security Policies • Security domains and the OODA-loop – This mapping is done during the preparation Observe OrientDecide Act Detection Protection Attack Diligence Response Planning Attack Diligence Planning Response Response Preparation <standard SOA> Mission <distributed SOA> 1 2 Dynamic Pre-load keys and policies
  • 20. 2020 Distributed Security Policies – OODA-loop Handheld <Dismounted> Laptop <Mobile> HQ Laptop <Deployed>
  • 21. 2121 In short decreases Specialization Deductioncapabilities General Specialized Low High Node B Node C Node A Detection Diligence Planning Protection Response Detection Diligence Protection Response Detection Diligence Protection # policy domains increase Server(s) Battalion Sensor network(s) increases # classes, instances and axioms <OWL-DL> <OWL-Lite> <RDFS>
  • 23. 2323 Conclusion • OWL-DL might be suitable for security policies in tactical networks; – Nodes’ type demands careful design and deployment – But the language is flexible and distributed by design • Critical points on policy design and deployment: – Policy structure and distribution over tactical networks • The policy distribution uses the security domains and the mission context in an attempt to connect Cyber and Kinetic domains. – Security policies can adapt to the mission’s profile • The nodes rely on the network connectivity to complement its security capabilities
  • 24. 24 Distributed Security Policies for Service- Oriented Architectures over Tactical Networks Roberto Rigolin F. Lopes1 and Stephen D. Wolthusen1,2 1. Norwegian Information Security Laboratory, Gjøvik, Norway 2. School of Mathematics and Information Security, University of London, UK {roberto.lopes, stephen.wolthusen}@hig.no