Defense Advanced Research Projects AgencyTagged Content List

Network Technology

Relating to nodes in a connected architecture

Showing 2 results for Networking + Countermeasures RSS
In areas lacking trustworthy communications infrastructure, deployed servicemembers rely on wireless devices to perform double duty: they not only provide access to the network; they are the network. Protocols for these networks require nodes to coordinate among themselves to manage resources, such as spectrum and power, and determine the best configurations to enable sharing of information. A problem with these protocols is that they implicitly trust all information shared about the security and operational state of each node, and the network as a whole. Consequently, inaccurate control or security information can quickly render the network unusable. This shortcoming could put productivity and mission success at risk as use of military wireless systems increases.
The majority of work to develop and mature military wireless networks to date has focused on efficiency and stability in benign conditions. Insufficient attention has been paid to identifying and mitigating vulnerabilities arising from the new features being added to make these networks more efficient. Unfortunately, because of the focus on efficiency, the protocols that have been developed implicitly trust all information shared about the state of the nodes and the larger network. Consequently, when the information that is shared among these nodes is bad, the network quickly becomes unusable.