Applying Systems Engineering in Tactical Wireless Network Analysis with Bayesian Networks

被引:3
作者
Chan, Philip [1 ]
Mansuri, Mo [1 ]
Man, Hong [2 ]
机构
[1] Stevens Inst Technol, Dept Syst Engn, Hoboken, NJ 07030 USA
[2] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ 07030 USA
来源
2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN) | 2010年
关键词
Wireless Network Analysis; Vulnerability Assessment; Bayesian Networks; Systems Engineering; OPTIMIZATION;
D O I
10.1109/CICSyN.2010.45
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Systems engineering approaches are employed to measure and to analyze vulnerabilities of military tactical RF wireless networks. The goal is to develop smart and innovative performance matrixes through electronic warfare (EW) modeling and simulation scenarios. Systematic systems engineering approaches with radio frequency (RF) electronic warfare modeling and simulation scenarios are built to support research in vulnerability analysis. RF electronic warfare models are used to provide a practical yet simple process for assessing and investigate the vulnerability of tactical RF systems. The focus is on military or tactical wireless network within a system of systems (SoS) context research area. Wireless RF communication network vulnerabilities critically studied within Department of Defense (DoD) organizations to provide a comprehensive network vulnerability assessment approach. Researchers have proposed a variety of methods to build network trees with chains of exploits, and then perform normal post-graph vulnerability analysis. This paper presents an approach to use Bayesian network to model, calculate and analyze all potential vulnerability paths in wireless RF networks.
引用
收藏
页码:208 / 215
页数:8
相关论文
共 15 条
[1]  
Adamy DL, 2009, ARTECH HSE RADAR LIB, P1
[2]  
[Anonymous], 2001, Systems engineering fundamentals
[3]  
[Anonymous], 2002, P 9 ACM C COMP COMM, DOI DOI 10.1145/586110.586140
[4]  
Boyd, 2004, Convex Optimization
[5]   Layering as optimization decomposition: A mathematical theory of network architectures [J].
Chiang, Mung ;
Low, Steven H. ;
Calderbank, A. Robert ;
Doyle, John C. .
PROCEEDINGS OF THE IEEE, 2007, 95 (01) :255-312
[6]  
Dijkstra Edsger., DIJKSTRAS ALGORITHM
[7]  
JCSS, JOINT NET CENTR MOD, P681
[8]  
Leonard T., 1997, BAYESIAN METHODS ANA
[9]   Network vulnerability assessment using Bayesian networks [J].
Liu, Y ;
Man, H .
DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 :61-71
[10]   Applications of convex optimization in signal processing and digital communication [J].
Luo, ZQ .
MATHEMATICAL PROGRAMMING, 2003, 97 (1-2) :177-207