SlideShare a Scribd company logo
1
Distributed Security Policies for Service-
Oriented Architectures over Tactical Networks
Roberto Rigolin F. Lopes1 and Stephen D. Wolthusen1,2
1. Norwegian Information Security Laboratory, Gjøvik, Norway
2. School of Mathematics and Information Security, University of London, UK
{roberto.lopes, stephen.wolthusen}@hig.no
22
Introduction
• Using rich semantics to state security policies
– Combining cross-layer and multi-domain security
• Layers: NATO Information Assurance (IA) Layer
• Domains: Protection, Detection, Response, Attack, Diligence
and Planning
• Restrictions: nodes’ specialization and connectivity
C3 Taxonomy
Communication Services
Core Enterprise Services
COI Services
User-Facing Capabilities
IA
TSI
Detection
Protection
Response
Diligence
Security
(x) Planning
WLAN
UHF
VHF
SatCom
HQ
Dismounted
Mobile
Relay
Cross-layers Multi-domain Restrictions
Policy ≡ (cross-layer U multi-domain) ∩ restrictions
33
Introduction
• Example of services
– Tactical Ground Report System
Node C
Node A
Soldier localization
Adversary localization
Vehicle localization
Live camera
Aerial photos
Node B
J. Evans, B. Ewy, M. Swink, S. Pennington, D. Siquieros, and S. Earp, “TIGR: the tactical ground
reporting system,” IEEE Communications Magazine, vol. 51, no. 10, pp. 42–49, October 2013.
Observe
OrientDecide
Act
Observe, Orient,
Decide and Act
Observe and Act
44
Example of Service-Oriented Architecture
Packet Handler
Message Handler
Service Mediator
Controller
1
2
3
4
Policy
management
Security
handling
55
Example of Service-Oriented Architecture
SOA PlatformController
Service Mediator
Message Handler
Packet Handler
Operating System
<Policy
Management>
<Security
Handling>
1
2
Cryptography
Tactical Platform Guard
Tactical Support Guard
Policy Manager
Privilege Management Policy Manager
Policy Enforcement Point
Policy Decision Point
Policy Administration Point
Detection
Diligence
Protection
Planning
Response
QoS
<domains>
TSI Node
PEP
PEP
PEPa
b
c
<a,b,c>
66
Structured Security Policies
• Security Domains
• Planning, Detection, Protection, Diligence, Response and Attack
• NATO Information Assurance
• Communication, Core, Application and Inter-domain
• Rule structure
• Conditions implying in Actions
• OODA-loop
C3 Taxonomy
Communication Services
Core Enterprise Services
COI Services
User-Facing Capabilities
IA
TSIDetection
Protection
Response
Diligence
Security
(x) Planning
Observe
OrientDecide
Act
77
The nodes:
Node A
<Dismounted>
UHF WLAN
Node C
<Mobile>
VHFUHFWLAN SatCom
Node B
<Relay>
SatComVHF
HQ Node D
<Deployed>
SatComVHF UHFWLAN
88
Structured Security Policies
– Nodes (N), Policies (P) and Security Domains (S)
Node A
<Dismounted>
UHF WLAN
Node C
<Mobile>
VHFUHFWLAN SatCom
Node B
<Relay>
SatComVHF
HQ Node D
<Deployed>
SatComVHF UHFWLAN
N1:P1(N1:S1)
N2:P2(N2:S2), N2:P’1(N1:R1)
Ni:Pi(Ni:Si),…, Ni:P’i-1(Ni-1:Ri-1)
Resources and # domains
99
Structured Security Policies
– Nodes (N), Policies (P) and Security Domains (S)
SecurityCore
Planning Detection Diligence Response
is is is is
Protection
is
Node A Node B Node C
1 2 3 4 5
2 3 43 4 2 3 41 5
OWL DL OWL DL
OWL Micro
RDFS
OWL DL
OWL Micro
RDFS
OWL DL
OWL Micro
OWL DL
Using rich semantics…
1010
Rich Semantics for Policies - Web Services
MessageSecBinding
TokenProtection
has
SecurityBinding
is
SecurityToken
SymmetricBinding AsymmetricBinding
is is
SecurityHeaderLayout
TransportBinding
AlgorithmSuite
Timestamp
has
hashas
is
hasSignatureToken
hasEncryptionToken
hasProtectionToken
hasInitiatorToken
hasRecipientSignatureToken
hasRecipientToken
hasInitiatorEncryptionToken
hasInitiatorSignatureToken
has
SignatureProtectionhas
isWeakerThan
isStrongerThan
isEquivalentTo
isWeakerThan
isStrongerThan
isEquivalentTo
isWeakerThan
isStrongerThan
isEquivalentTo
isMoreGeneralThan
isMoreSpecificThan
hasTechDiffWith
hasTechDiffWith
isMoreGeneralThan
isMoreSpecificThan
hasTechDiffWith
isWeakerThan
isStrongerThan
isEuivalentTo
isWeakerThan
isStrongerThan
isEquivalentTo
QoS requirements
Information sensitivity
Conditions:
Network status
1111
Security Policies
• Attribute-based
• Rich semantics
Allow access to resource <Service> with attribute <Sensitivity>
if <Service> match BlueForceTracking
and action is read
MessageSecBinding
TokenProtection
has
SecurityBinding
is
SecurityToken
SymmetricBinding AsymmetricBinding
is is
SecurityHeaderLayout
TransportBinding
AlgorithmSuitehashas
is
hasSignatureToken
hasEncryptionToken
hasProtectionToken
hasInitiatorToken
hasRecipientSignatureToken
hasRecipientToken
hasInitiatorEncryptionToken
hasInitiatorSignatureTokenhas
SignatureProtectionhas
isWeakerThan
isStrongerThan
isEquivalentTo
isWeakerThan
isStrongerThan
isEquivalentTo
isWeakerThan
isStrongerThan
isEquivalentTo
isMoreGeneralThan
isMoreSpecificThan
hasTechDiffWith
isMoreGeneralThan
isMoreSpecificThan
hasTechDiffWith
isWeakerThan
isStrongerThan
isEuivalentTo
2
2.1 2.2
1
Allow or Deny
Stronger, Equal or
Weaker
1212
Distributed Security Policies – Security Core
• (1) Multi-Domain, (2) Cross-layer and (3) Rules
SecurityCore
Action
Condition
has
has
TSI Common
Rule
Planning
Diligence
uses
Protection
<inverse property>
<Foundational ontologies><Core reference ontologies>
<Task ontologies>
NewCondition
3 NewAction
NewDomain
Capability
Inter-domainCommunication Core
Domain
NewCapability <NATO’s C3 Taxonomy>
1
2
Application
Attack
Detection
Response
1313
owl:thing
owl:intersectionOF
owl:unionOf
owl:equivalentClass
owl:thing
owl:intersectionOF
owl:unionOf
owl:equivalentClass
owl:equivalentProperty
owl:inverseOf
owl:functionalProperty
owl:inverseFunctionalProperty
owl:symmetricProperty
owl:transitiveProperty
owl:hasValue
owl:disjointWith
owl:sameAs
owl:differentFrom
owl:distinctMembers
owl:someValuesFrom
owl:allValuesFrom
owl:cardinality
owl:minCardinality
owl:maxCardinality
OWL-lite
20 axioms
2
OWL-DL
25 axioms
1
Structured Security Policies - Performance
AllowDeny
Validate
Is valid? YesNo
loop
1414
Distributed Security Policies
Preparation Mission
SecurityCore
<OWL DL>
Node C
Detection
<OWL lite>
Diligence
<OWL lite>
Protection
<OWL lite>
Diligence
<RDFS>
Protection
<RDFS>
Node B
Node A
1 2
Version Alpha
Version Bravo
Version Charlie
• Pre-distribution of policy statements
– The system can keep versions of the policies
1515
Distributed Security Policies
Planning
Detection
Protection
Diligence
Response
Attack
Communication
Core
Application
Inter-domain
ActionCondition
NewCondition
Cross-layer
Multi-domain
• Examples of policies:
1616
Distributed Security Policies
• Multi-domain
• Cross-layer
Packet Handler
Message Handler
Service Mediator
1
2
3
ActionCondition
1717
Distributed Security Policies
• Scenario: three types of nodes moving
Ni-1
Ni
Ni+1
Multi-hop network
T0
T1
...
Pi-1
Pi(P’i-1)
Pi+1(P’i-1, (P’i))
Nodes’ type
Service request
Union of security
domains
HQ Node D
<Deployed>
SatComVHF UHFWLAN
1818
Distributed Security Policies
• Connectivity Graph and Security Domains
UHF, VHF,
SatCom
Observe, Act Orient, Act Decide
1 Detection
2 Protection
3 Attack
4 Diligence
5 Response
6 Planning
Ni-1 Ni Ni+1
Security domains
{1,2,3} {1,2,3,4,5} {1,2,3,4,5,6}
UHF,
WLAN UHF, VHF,
WLAN
SatCom
UHF, WLAN
Observe, Act Orient, Decide, Act -
Observe, Orient, Act Orient, Decide, Act -
L1,n
L2,n
L3,n
<Dismounted> <Mobile> <Deployed>
1919
Distributed Security Policies
• Security domains and the OODA-loop
– This mapping is done during the preparation
Observe
OrientDecide
Act
Detection
Protection
Attack
Diligence
Response
Planning
Attack
Diligence
Planning
Response Response
Preparation
<standard SOA>
Mission
<distributed SOA>
1 2
Dynamic
Pre-load keys and policies
2020
Distributed Security Policies – OODA-loop
Handheld
<Dismounted>
Laptop
<Mobile>
HQ Laptop
<Deployed>
2121
In short
decreases
Specialization
Deductioncapabilities
General Specialized
Low
High
Node B
Node C
Node A
Detection
Diligence
Planning
Protection
Response
Detection
Diligence
Protection
Response
Detection
Diligence
Protection
# policy domains
increase
Server(s)
Battalion
Sensor network(s)
increases
# classes, instances
and axioms
<OWL-DL>
<OWL-Lite>
<RDFS>
2222
Distributed Security Policies
2323
Conclusion
• OWL-DL might be suitable for security policies in
tactical networks;
– Nodes’ type demands careful design and deployment
– But the language is flexible and distributed by design
• Critical points on policy design and deployment:
– Policy structure and distribution over tactical networks
• The policy distribution uses the security domains and
the mission context in an attempt to connect Cyber
and Kinetic domains.
– Security policies can adapt to the mission’s profile
• The nodes rely on the network connectivity to
complement its security capabilities
24
Distributed Security Policies for Service-
Oriented Architectures over Tactical Networks
Roberto Rigolin F. Lopes1 and Stephen D. Wolthusen1,2
1. Norwegian Information Security Laboratory, Gjøvik, Norway
2. School of Mathematics and Information Security, University of London, UK
{roberto.lopes, stephen.wolthusen}@hig.no

More Related Content

PDF
VoIP@RCTS presented at CESNET IP Telephony workshop
DOCX
NEETU CV .
PDF
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
PDF
EENA 2018 - Emergency calls handling systems around the world
PDF
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
PDF
Simplifying AI for Communications, Radar, and Wireless Systems
PDF
Assaulting diameter IPX network
PPT
Wireless communication netwrks.unit 5...3gpp architecture evolution
VoIP@RCTS presented at CESNET IP Telephony workshop
NEETU CV .
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
EENA 2018 - Emergency calls handling systems around the world
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Simplifying AI for Communications, Radar, and Wireless Systems
Assaulting diameter IPX network
Wireless communication netwrks.unit 5...3gpp architecture evolution

Viewers also liked (18)

PPTX
What Nature has been teaching us about Information Security?
PPTX
Cyber warfare: an unorthodox view from the battlefield
PPTX
Growing your eBay Sales with Linnworks
PPTX
Temelia cladirii - invatatura apostolilor
ODP
Spirituality
PPTX
นิพจน์ ตัวดำเนินการ-และตัวถูกดำเนินการ
PPSX
práctica docente iv y residencia
PPTX
Ivii'a language presentation
DOCX
CV manoj
DOCX
Financial_Transaction
PPTX
презентація
DOC
Tracy Nguyen Resume 12.24.15
PPTX
Karen bt copia
PDF
Parker Simpson & Kordi - 2016 - Comparison of Critical Power and wprime deriv...
PDF
MP Newsletter
DOCX
PDF
Android UX Tricks: Nested Scrolling without Nested Scrolling
PPTX
Il mercato mondiale dell'acqua imbottigliata high
What Nature has been teaching us about Information Security?
Cyber warfare: an unorthodox view from the battlefield
Growing your eBay Sales with Linnworks
Temelia cladirii - invatatura apostolilor
Spirituality
นิพจน์ ตัวดำเนินการ-และตัวถูกดำเนินการ
práctica docente iv y residencia
Ivii'a language presentation
CV manoj
Financial_Transaction
презентація
Tracy Nguyen Resume 12.24.15
Karen bt copia
Parker Simpson & Kordi - 2016 - Comparison of Critical Power and wprime deriv...
MP Newsletter
Android UX Tricks: Nested Scrolling without Nested Scrolling
Il mercato mondiale dell'acqua imbottigliata high
Ad

Similar to Distributed Security Policies for Service-Oriented Architectures over Tactical Networks (20)

PPTX
Reactive/Proactive Connectivity Management in a Tactical Service-Oriented Inf...
PDF
Final Master's Defense Presentation : Policy-driven Security Management in Ga...
PDF
Cyber Security and Resiliency Policy Framework 1st Edition A. Vaseashta
PPTX
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
PDF
Achieving Real-Time Target Tracking Using Wireless Sensor Networks1
PPTX
New Threats, New Approaches in Modern Data Centers
PPT
Open Science Grid security-atlas-t2 Bob Cowles
PDF
Trends in IIoT and OT Security
PDF
Homeland of Things Framework BSides Augusta 2017
PDF
Cisco Connect 2018 Thailand - Telco service provider network analytics
PDF
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
PDF
Sfa community of practice a natural way of building
PDF
IRJET- Collaborative Network Security in Data Center for Cloud Computing
PDF
Jaringan Adhoc
PDF
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
PDF
Semantic technologies for attribute based access: measurable security for the...
PDF
wireless sensor network security
PDF
Self-Learning Systems for Cyber Security
PDF
Cyber-Physical_Systems_yber Physical system (CPS) is a new generation of digi...
PPTX
Wireless sensor network security
Reactive/Proactive Connectivity Management in a Tactical Service-Oriented Inf...
Final Master's Defense Presentation : Policy-driven Security Management in Ga...
Cyber Security and Resiliency Policy Framework 1st Edition A. Vaseashta
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Achieving Real-Time Target Tracking Using Wireless Sensor Networks1
New Threats, New Approaches in Modern Data Centers
Open Science Grid security-atlas-t2 Bob Cowles
Trends in IIoT and OT Security
Homeland of Things Framework BSides Augusta 2017
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Sfa community of practice a natural way of building
IRJET- Collaborative Network Security in Data Center for Cloud Computing
Jaringan Adhoc
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
Semantic technologies for attribute based access: measurable security for the...
wireless sensor network security
Self-Learning Systems for Cyber Security
Cyber-Physical_Systems_yber Physical system (CPS) is a new generation of digi...
Wireless sensor network security
Ad

Recently uploaded (20)

PDF
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
PDF
Biophysics 2.pdffffffffffffffffffffffffff
PPTX
The KM-GBF monitoring framework – status & key messages.pptx
PPT
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
PPTX
famous lake in india and its disturibution and importance
PPTX
2Systematics of Living Organisms t-.pptx
PPTX
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
PPTX
BIOMOLECULES PPT........................
PPTX
Microbiology with diagram medical studies .pptx
PDF
Placing the Near-Earth Object Impact Probability in Context
PPTX
cpcsea ppt.pptxssssssssssssssjjdjdndndddd
PPTX
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS
PPTX
2. Earth - The Living Planet Module 2ELS
PDF
AlphaEarth Foundations and the Satellite Embedding dataset
PPTX
Introduction to Fisheries Biotechnology_Lesson 1.pptx
PPTX
TOTAL hIP ARTHROPLASTY Presentation.pptx
DOCX
Viruses (History, structure and composition, classification, Bacteriophage Re...
PPTX
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.
PDF
Sciences of Europe No 170 (2025)
PDF
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
Biophysics 2.pdffffffffffffffffffffffffff
The KM-GBF monitoring framework – status & key messages.pptx
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
famous lake in india and its disturibution and importance
2Systematics of Living Organisms t-.pptx
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
BIOMOLECULES PPT........................
Microbiology with diagram medical studies .pptx
Placing the Near-Earth Object Impact Probability in Context
cpcsea ppt.pptxssssssssssssssjjdjdndndddd
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS
2. Earth - The Living Planet Module 2ELS
AlphaEarth Foundations and the Satellite Embedding dataset
Introduction to Fisheries Biotechnology_Lesson 1.pptx
TOTAL hIP ARTHROPLASTY Presentation.pptx
Viruses (History, structure and composition, classification, Bacteriophage Re...
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.
Sciences of Europe No 170 (2025)
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf

Distributed Security Policies for Service-Oriented Architectures over Tactical Networks

  • 1. 1 Distributed Security Policies for Service- Oriented Architectures over Tactical Networks Roberto Rigolin F. Lopes1 and Stephen D. Wolthusen1,2 1. Norwegian Information Security Laboratory, Gjøvik, Norway 2. School of Mathematics and Information Security, University of London, UK {roberto.lopes, stephen.wolthusen}@hig.no
  • 2. 22 Introduction • Using rich semantics to state security policies – Combining cross-layer and multi-domain security • Layers: NATO Information Assurance (IA) Layer • Domains: Protection, Detection, Response, Attack, Diligence and Planning • Restrictions: nodes’ specialization and connectivity C3 Taxonomy Communication Services Core Enterprise Services COI Services User-Facing Capabilities IA TSI Detection Protection Response Diligence Security (x) Planning WLAN UHF VHF SatCom HQ Dismounted Mobile Relay Cross-layers Multi-domain Restrictions Policy ≡ (cross-layer U multi-domain) ∩ restrictions
  • 3. 33 Introduction • Example of services – Tactical Ground Report System Node C Node A Soldier localization Adversary localization Vehicle localization Live camera Aerial photos Node B J. Evans, B. Ewy, M. Swink, S. Pennington, D. Siquieros, and S. Earp, “TIGR: the tactical ground reporting system,” IEEE Communications Magazine, vol. 51, no. 10, pp. 42–49, October 2013. Observe OrientDecide Act Observe, Orient, Decide and Act Observe and Act
  • 4. 44 Example of Service-Oriented Architecture Packet Handler Message Handler Service Mediator Controller 1 2 3 4 Policy management Security handling
  • 5. 55 Example of Service-Oriented Architecture SOA PlatformController Service Mediator Message Handler Packet Handler Operating System <Policy Management> <Security Handling> 1 2 Cryptography Tactical Platform Guard Tactical Support Guard Policy Manager Privilege Management Policy Manager Policy Enforcement Point Policy Decision Point Policy Administration Point Detection Diligence Protection Planning Response QoS <domains> TSI Node PEP PEP PEPa b c <a,b,c>
  • 6. 66 Structured Security Policies • Security Domains • Planning, Detection, Protection, Diligence, Response and Attack • NATO Information Assurance • Communication, Core, Application and Inter-domain • Rule structure • Conditions implying in Actions • OODA-loop C3 Taxonomy Communication Services Core Enterprise Services COI Services User-Facing Capabilities IA TSIDetection Protection Response Diligence Security (x) Planning Observe OrientDecide Act
  • 7. 77 The nodes: Node A <Dismounted> UHF WLAN Node C <Mobile> VHFUHFWLAN SatCom Node B <Relay> SatComVHF HQ Node D <Deployed> SatComVHF UHFWLAN
  • 8. 88 Structured Security Policies – Nodes (N), Policies (P) and Security Domains (S) Node A <Dismounted> UHF WLAN Node C <Mobile> VHFUHFWLAN SatCom Node B <Relay> SatComVHF HQ Node D <Deployed> SatComVHF UHFWLAN N1:P1(N1:S1) N2:P2(N2:S2), N2:P’1(N1:R1) Ni:Pi(Ni:Si),…, Ni:P’i-1(Ni-1:Ri-1) Resources and # domains
  • 9. 99 Structured Security Policies – Nodes (N), Policies (P) and Security Domains (S) SecurityCore Planning Detection Diligence Response is is is is Protection is Node A Node B Node C 1 2 3 4 5 2 3 43 4 2 3 41 5 OWL DL OWL DL OWL Micro RDFS OWL DL OWL Micro RDFS OWL DL OWL Micro OWL DL Using rich semantics…
  • 10. 1010 Rich Semantics for Policies - Web Services MessageSecBinding TokenProtection has SecurityBinding is SecurityToken SymmetricBinding AsymmetricBinding is is SecurityHeaderLayout TransportBinding AlgorithmSuite Timestamp has hashas is hasSignatureToken hasEncryptionToken hasProtectionToken hasInitiatorToken hasRecipientSignatureToken hasRecipientToken hasInitiatorEncryptionToken hasInitiatorSignatureToken has SignatureProtectionhas isWeakerThan isStrongerThan isEquivalentTo isWeakerThan isStrongerThan isEquivalentTo isWeakerThan isStrongerThan isEquivalentTo isMoreGeneralThan isMoreSpecificThan hasTechDiffWith hasTechDiffWith isMoreGeneralThan isMoreSpecificThan hasTechDiffWith isWeakerThan isStrongerThan isEuivalentTo isWeakerThan isStrongerThan isEquivalentTo QoS requirements Information sensitivity Conditions: Network status
  • 11. 1111 Security Policies • Attribute-based • Rich semantics Allow access to resource <Service> with attribute <Sensitivity> if <Service> match BlueForceTracking and action is read MessageSecBinding TokenProtection has SecurityBinding is SecurityToken SymmetricBinding AsymmetricBinding is is SecurityHeaderLayout TransportBinding AlgorithmSuitehashas is hasSignatureToken hasEncryptionToken hasProtectionToken hasInitiatorToken hasRecipientSignatureToken hasRecipientToken hasInitiatorEncryptionToken hasInitiatorSignatureTokenhas SignatureProtectionhas isWeakerThan isStrongerThan isEquivalentTo isWeakerThan isStrongerThan isEquivalentTo isWeakerThan isStrongerThan isEquivalentTo isMoreGeneralThan isMoreSpecificThan hasTechDiffWith isMoreGeneralThan isMoreSpecificThan hasTechDiffWith isWeakerThan isStrongerThan isEuivalentTo 2 2.1 2.2 1 Allow or Deny Stronger, Equal or Weaker
  • 12. 1212 Distributed Security Policies – Security Core • (1) Multi-Domain, (2) Cross-layer and (3) Rules SecurityCore Action Condition has has TSI Common Rule Planning Diligence uses Protection <inverse property> <Foundational ontologies><Core reference ontologies> <Task ontologies> NewCondition 3 NewAction NewDomain Capability Inter-domainCommunication Core Domain NewCapability <NATO’s C3 Taxonomy> 1 2 Application Attack Detection Response
  • 14. 1414 Distributed Security Policies Preparation Mission SecurityCore <OWL DL> Node C Detection <OWL lite> Diligence <OWL lite> Protection <OWL lite> Diligence <RDFS> Protection <RDFS> Node B Node A 1 2 Version Alpha Version Bravo Version Charlie • Pre-distribution of policy statements – The system can keep versions of the policies
  • 16. 1616 Distributed Security Policies • Multi-domain • Cross-layer Packet Handler Message Handler Service Mediator 1 2 3 ActionCondition
  • 17. 1717 Distributed Security Policies • Scenario: three types of nodes moving Ni-1 Ni Ni+1 Multi-hop network T0 T1 ... Pi-1 Pi(P’i-1) Pi+1(P’i-1, (P’i)) Nodes’ type Service request Union of security domains HQ Node D <Deployed> SatComVHF UHFWLAN
  • 18. 1818 Distributed Security Policies • Connectivity Graph and Security Domains UHF, VHF, SatCom Observe, Act Orient, Act Decide 1 Detection 2 Protection 3 Attack 4 Diligence 5 Response 6 Planning Ni-1 Ni Ni+1 Security domains {1,2,3} {1,2,3,4,5} {1,2,3,4,5,6} UHF, WLAN UHF, VHF, WLAN SatCom UHF, WLAN Observe, Act Orient, Decide, Act - Observe, Orient, Act Orient, Decide, Act - L1,n L2,n L3,n <Dismounted> <Mobile> <Deployed>
  • 19. 1919 Distributed Security Policies • Security domains and the OODA-loop – This mapping is done during the preparation Observe OrientDecide Act Detection Protection Attack Diligence Response Planning Attack Diligence Planning Response Response Preparation <standard SOA> Mission <distributed SOA> 1 2 Dynamic Pre-load keys and policies
  • 20. 2020 Distributed Security Policies – OODA-loop Handheld <Dismounted> Laptop <Mobile> HQ Laptop <Deployed>
  • 21. 2121 In short decreases Specialization Deductioncapabilities General Specialized Low High Node B Node C Node A Detection Diligence Planning Protection Response Detection Diligence Protection Response Detection Diligence Protection # policy domains increase Server(s) Battalion Sensor network(s) increases # classes, instances and axioms <OWL-DL> <OWL-Lite> <RDFS>
  • 23. 2323 Conclusion • OWL-DL might be suitable for security policies in tactical networks; – Nodes’ type demands careful design and deployment – But the language is flexible and distributed by design • Critical points on policy design and deployment: – Policy structure and distribution over tactical networks • The policy distribution uses the security domains and the mission context in an attempt to connect Cyber and Kinetic domains. – Security policies can adapt to the mission’s profile • The nodes rely on the network connectivity to complement its security capabilities
  • 24. 24 Distributed Security Policies for Service- Oriented Architectures over Tactical Networks Roberto Rigolin F. Lopes1 and Stephen D. Wolthusen1,2 1. Norwegian Information Security Laboratory, Gjøvik, Norway 2. School of Mathematics and Information Security, University of London, UK {roberto.lopes, stephen.wolthusen}@hig.no