Milcom 2018 Track 3 - Cyber Security and Trusted Computing
TABLE I Complexity Analysis.
Overhead
Computation (Pairing)
Setup
1
KeyGen-RA
0
KeyGen-U
0
Encrypt
1
Decrypt
2|I|(ru + 1)
2|RI| + 2|U| + 2 2|UID | + 5 2|UID | + 3 x((|Inr| + 2)rul + ru + 2) x(|I|ru) + y|I|
a
u
Computation(Exponent)
+
y((|Inr| + 1)l + 2)
x(|I|ru) + y|I|
2|RI| + 2|U| + 3 2|UID | + 5 2|UID | + 3
x(2ru + lru|Inr| + 2lru)
0
a
u
Communication
Storage
+
y(rg + l|Inr|) + 2
2|RI| + 2|U| + 7 2|UID | + 5 2|UID | + 3
0
0
a
u
800
700
600
500
400
300
200
100
0
[5] W. Mitchell, “Project kitae part i battlespace agility in helmand: Network
vs. hierarchy c2,” 2011.
[6] S. H. Lee, S. Lee, H. Song, and H. S. Lee, “Wireless sensor network de-
sign for tactical military applications: Remote large-scale environments,”
in Military communications conference, 2009. MILCOM 2009. IEEE.
IEEE, 2009, pp. 1–7.
[7] M. P. DJurisˇic´, Z. Tafa, G. Dimic´, and V. Milutinovic´, “A survey
of military applications of wireless sensor networks,” in Embedded
Computing (MECO), 2012 Mediterranean Conference on. IEEE, 2012,
pp. 196–199.
[8] D. Singh, G. Tripathi, A. M. Alberti, and A. Jara, “Semantic edge
computing and iot architecture for military health services in battlefield,”
in Consumer Communications & Networking Conference (CCNC), 2017
14th IEEE Annual. IEEE, 2017, pp. 185–190.
1
5
10
15
20
KeyGen-U
25
30
35
Decrypt
40
45
Setup
KeyGen-RA
Encrypt
Fig. 5 Relationship between the number of attributes and
the computation time for each operation in milliseconds
[9] A. Raglin, S. Metu, S. Russell, and P. Budulas, “Implementing internet
of things in a military command and control environment,” in Next-
Generation Analyst V, vol. 10207. International Society for Optics
and Photonics, 2017, p. 1020708.
[10] L. Young and M. Ishii, “One force tactical communications system:
Connecting the tactical edge at aewe spiral g,” in MILITARY COMMU-
NICATIONS CONFERENCE, 2012-MILCOM 2012. IEEE, 2012, pp.
1–4.
[11] A. Blair, T. Brown, K. M. Chugg, and M. Johnson, “Tactical mobile
mesh network system design,” in Military Communications Conference,
2007. MILCOM 2007. IEEE. IEEE, 2007, pp. 1–7.
[12] G. Henderson, W. Pase et al., “Emerging radio and manet technology
study: Research support for a survey of state-of-the-art commercial and
military hardware/software for mobile ad hoc networks,” Bell Canada
Ottawa, Ontario Canada, Tech. Rep., 2014.
[13] Y. Sun and K. R. Liu, “Hierarchical group access control for secure
multicast communications,” IEEE/ACM Transactions on Networking,
vol. 15, no. 6, pp. 1514–1526, 2007.
[14] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryp-
tion for fine-grained access control of encrypted data,” in Proceedings
of the 13th ACM conference on Computer and communications security.
Acm, 2006, pp. 89–98.
[15] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-
based encryption,” in Security and Privacy, 2007. SP’07. IEEE Sympo-
sium on. IEEE, 2007, pp. 321–334.
[16] A. Fongen and M. Salmanian, “Communities of trust in tactical coalition
networks,” in Military Communications Conference (MILCOM), 2014
IEEE. IEEE, 2014, pp. 67–73.
[17] M. Salmanian, J. D. Brown, S. Watson, R. Song, H. Tang, and D. Sim-
melink, “An architecture for secure interoperability between coalition
tactical manets,” in Military Communications Conference, MILCOM
2015-2015 IEEE. IEEE, 2015, pp. 37–42.
expressiveness, and enable new modes of operation. Another
challenge is in establishing the access control policy model.
Existing and new access control policies has to be translated
into ABE access trees. Integration with the application and
network layer is another challenge. We envision ABE to
provide security at the application layer to provide fine-grained
security, and interoperate with a pre-shared key scheme at the
network layer providing coarse-grained security.Performance
and computational complexity is a basic short-coming of ABE.
We are able to achieve somewhat acceptable performance
with the current implementation. We intend to develop a high
performance implementation and protocols for caching and
pre-computation that can further alleviate the computation load.
We have demonstrated the feasibility of our enhanced ABE
algorithm in sending data. The next step is to apply it to a
real-world application and network.
REFERENCES
[1] B. A. Weiss, L. Fronczek, E. Morse, Z. Kootbally, and C. Schlenoff, “Per-
formance assessments of android-powered military applications operating
on tactical handheld devices,” in Mobile Multimedia/Image Processing,
Security, and Applications 2013, vol. 8755. International Society for
Optics and Photonics, 2013, p. 875504.
[2] B. J. Ewy, M. T. Swink, S. G. Pennington, J. B. Evans, J. M. Kim,
C. Ling, S. L. Earp, and M. Maeda, “Tigr in iraq and afghanistan:
Network-adaptive distribution of media rich tactical data,” in Military
Communications Conference, 2009. MILCOM 2009. IEEE. IEEE, 2009,
pp. 1–7.
[18] A. Armando, M. Grasso, S. Oudkerk, S. Ranise, and K. Wrona, “Content-
based information protection and release in nato operations,” in Pro-
ceedings of the 18th ACM symposium on Access control models and
technologies. ACM, 2013, pp. 261–264.
[19] B. Lynn et al., “Pbc: The pairing-based cryptography library,” h
ttp://crypto. stanford. edu/pbc, 2011.
[3] J. B. Evans, B. J. Ewy, M. T. Swink, S. G. Pennington, D. J. Siquieros,
and S. L. Earp, “Tigr: the tactical ground reporting system,” IEEE
Communications Magazine, vol. 51, no. 10, pp. 42–49, 2013.
[4] M. R. Brannsten, T. H. Bloebaum, F. T. Johnsen, and B. K. Reitan,
“Kings eye: Platform independent situational awareness,” in Military
Communications and Information Systems (ICMCIS), 2017 International
Conference on. IEEE, 2017, pp. 1–5.
965