Breakthrough Web Design - 515-897-1144 - Web sites for businesses
News & Entertainment for Mason City, Clear Lake & the Entire North Iowa Region

Founded October 1, 2010


Military wants more secure networks


This news story was published on March 20, 2013.
Advertise on NIT Subscribe to NIT

Crew member, GSE3 Joshua Locklear of Maxton, North Carolina monitors the systems computer while on board the USS San Jacinto at Port Everglades in Ft. Lauderdale, Florida.  (UPI Photo/Joe Marino-Bill Cantrell)

Crew member, GSE3 Joshua Locklear of Maxton, North Carolina monitors the systems computer while on board the USS San Jacinto at Port Everglades in Ft. Lauderdale, Florida. (UPI Photo/Joe Marino-Bill Cantrell)

WASHINGTON, March 19 (UPI) — The U.S. military is seeking new technologies for more secure and resilient wireless communications networks.

To meet the need, the U.S. Defense Advanced Research Projects Agency has started a program called the Wireless Network Defense program to develop new protocols that enable military wireless networks to remain operational despite inadvertent misconfigurations or malicious compromise of individual nodes.

“Current security efforts focus on individual radios or nodes, rather than the network, so a single misconfigured or compromised radio could debilitate an entire network,” said Wayne Phoel, DARPA program manager.

“We need to change how we control wireless networks by developing a network-based solution for current and future systems that acknowledges there will be bad nodes and enables the network to operate around them.”

DARPA said that deployed troops rely on wireless devices to access a network — and in some cases comprise the network — in areas lacking a secure communications infrastructure. Protocols for these networks require nodes to coordinate among themselves to manage resources, but these protocols implicitly trust all information shared about the security and operational state of each node and the network.

As a result, inaccurate control or security information can quickly render the network unusable.

Copyright 2013 United Press International, Inc. (UPI).

Leave a Reply

Your email address will not be published.

 characters available