Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...

22.01.2015 Views

480 Military Communications and Information Technology... economy, business, daily life etc. But generally it states that roughly 80% of the effects come from 20% of the causes. Table I. Time of generation in each to each method Number of devices Time of data generation 100 1 h 22 min. 200 5, 5 h 500 34 h 40 min. 1000 5 days 8 h 2000 23 days 5000 145 days Applying this rule to communication system we can assume, that from point of view of single user, 80% realized connections are addressed to only 20% of other users. For the simplification of further considerations let’s assume that each user communicates with only 20% of other users. It lets us for applying “according to needs” method. VI. According to needs method In this method, only the required relations are established. In this case, the number of relations satisfies the condition: ½ * N ≤ R < ½ * N * (N – 1). Examples of generation times for different numbers of devices and for the case, which is consistent with our assumption (arising from the Pareto principle) are given in the table 2 in column 2. For comparison, column 1 shows the generation times using the each to each method. Column 3 presents generation times, assuming that each user communicates with at most 100 other users. In practice, the relations are defined manually, using a symmetric table whose rows and columns are identified by numbers of devices. Table entries on the diagonal are unavailable, because establishing relation with the device itself has no practical meaning. Placing the symbol X in a cell at the intersection of row i and column j means establishing a relation between devices i and j. The efficiency of this method depends on the ability of perception of the operator. To imagine the scale of difficulty one can compare this process to lay the puzzle, where the number of elements corresponds to the number of devices. If the image consists of 1000 items such task seems not feasible in a short time. Suppose that a large screen monitor (e.g. 21’’) can fit a part of table with the dimension 40 x 40 devices. If 1000 devices in the system works, such a part is just one of 625 parts. Advantages: Number of relations adapted to real needs. The relatively short generation time. Adequate for the institution, where some connections are not allowed.

Chapter 4: Information Assurance & Cyber Defence 481 Disadvantages: Complicated and time consuming planning. Too large risk of doing mistake (no necessary relations). For a large number of devices, error-free planning is practically impossible. Table II. Time of generation for different methods of planning Number of devices Generation time Case 1 Case 2 Case 3 100 1 h 22 min. 16 min. 1 h 22 min. 200 5, 5 h 1h 6 min 5,5 h 500 34 h 40 min. 7 h 15 h 53 min. 1000 5 days 8 h 27 h 36 min. 31 h 46 min 2000 23 days 4 days 15 h 2 days 15 h 5000 145 days 29 days 6 days 14 h In conclusion, it should be noted that in extreme situations (large networks) both methods in its pure form are not acceptable. Therefore, our solution is in some sense a combination of both methods of planning. VII. Adaptive method General idea This method is iterative. Iteration is single validity period. The method starts from a network set up on each to each. The method is called adaptive, because in subsequent iterations the network connections are modified in such a way, as to adapt to the real needs for connections. The aim of this method is to obtain such a set of cryptographic relations that will not require further modification (of course apart from the modifications related to exceptional situations, such as the introduction of new user). Additional requirements The method requires all active connections to be registered by devices of the management system. Thanks to this, the planning subsystem will know which relations are necessary. In a minimum variant, to record only the first call within a relation is sufficient. For this purpose, an existing electronic distribution channel can be used. Initial conditions Before the first iteration, the relations are established on each to each. Prior to initiating the system there is not time regime yet, so it does not matter that

480 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

economy, business, daily life etc. But generally it states that roughly 80% of the effects<br />

come from 20% of the causes.<br />

Table I. Time of generation in each to each method<br />

Number of devices Time of data generation<br />

100 1 h 22 min.<br />

200 5, 5 h<br />

500 34 h 40 min.<br />

1000 5 days 8 h<br />

2000 23 days<br />

5000 145 days<br />

Applying this rule to communication system we can assume, that from point<br />

of view of single user, 80% realized connections are addressed to only 20% of other<br />

users. For the simplification of further considerations let’s assume that each user<br />

communicates with only 20% of other users. It lets us for applying “according to<br />

needs” method.<br />

VI. According to needs method<br />

In this method, only the required relations are established. In this case,<br />

the number of relations satisfies the condition:<br />

½ * N ≤ R < ½ * N * (N – 1).<br />

Examples of generation times for different numbers of devices <strong>and</strong> for the case,<br />

which is consistent with our assumption (arising from the Pareto principle) are<br />

given in the table 2 in column 2. For comparison, column 1 shows the generation<br />

times using the each to each method. Column 3 presents generation times, assuming<br />

that each user communicates with at most 100 other users. In practice, the relations<br />

are defined manually, using a symmetric table whose rows <strong>and</strong> columns are<br />

identified by numbers of devices. Table entries on the diagonal are unavailable,<br />

because establishing relation with the device itself has no practical meaning. Placing<br />

the symbol X in a cell at the intersection of row i <strong>and</strong> column j means establishing<br />

a relation between devices i <strong>and</strong> j.<br />

The efficiency of this method depends on the ability of perception of the operator.<br />

To imagine the scale of difficulty one can compare this process to lay the puzzle,<br />

where the number of elements corresponds to the number of devices. If the image<br />

consists of 1000 items such task seems not feasible in a short time. Suppose that<br />

a large screen monitor (e.g. 21’’) can fit a part of table with the dimension 40 x 40<br />

devices. If 1000 devices in the system works, such a part is just one of 625 parts.<br />

Advantages: Number of relations adapted to real needs. The relatively short generation<br />

time. Adequate for the institution, where some connections are not allowed.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!