![CTA Communications and Networks Consortium](../images/consortium.gif)
![Survivable Wireless Mobile Networks](../images/ta01.gif)
![Signal Processing for Communications-on-the-Move](../images/ta02.gif)
![Secure Jam-Resistant Communications](../images/ta03.gif)
![Tactical Information Protection](../images/ta04.gif)
|
Technical Area 4:
Tactical Information Protection
Research is needed in real-time intrusion detection and vulnerability
assessment tools and techniques for tactical mobile wireless networks
that are automated, scaleable, efficient, adaptive, and secure. These
techniques must accurately detect intrusions, intrusion attempts, suspicious
network activities, anomalies, and potential susceptibilities on wireless,
highly mobile, self-configuring, heterogeneous networks. Research is needed
in highly efficient security services (e.g. authentication, integrity,
confidentiality, non-repudiation, and access control) and security infrastructure
(e.g. shared key management/generation, adaptive data authentication)
that accommodates high bit error rates, limited bandwidth/energy availability,
and self-configuring networks.
|