22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

481<br />

Disadvantages: Complicated <strong>and</strong> time consuming planning. Too large risk<br />

of doing mistake (no necessary relations). For a large number of devices, error-free<br />

planning is practically impossible.<br />

Table II. Time of generation for different methods of planning<br />

Number<br />

of devices<br />

Generation time<br />

Case 1 Case 2 Case 3<br />

100 1 h 22 min. 16 min. 1 h 22 min.<br />

200 5, 5 h 1h 6 min 5,5 h<br />

500 34 h 40 min. 7 h 15 h 53 min.<br />

1000 5 days 8 h 27 h 36 min. 31 h 46 min<br />

2000 23 days 4 days 15 h 2 days 15 h<br />

5000 145 days 29 days 6 days 14 h<br />

In conclusion, it should be noted that in extreme situations (large networks)<br />

both methods in its pure form are not acceptable. Therefore, our solution is in some<br />

sense a combination of both methods of planning.<br />

VII. Adaptive method<br />

General idea<br />

This method is iterative. Iteration is single validity period. The method starts<br />

from a network set up on each to each. The method is called adaptive, because<br />

in subsequent iterations the network connections are modified in such a way, as to<br />

adapt to the real needs for connections. The aim of this method is to obtain such a<br />

set of cryptographic relations that will not require further modification (of course<br />

apart from the modifications related to exceptional situations, such as the introduction<br />

of new user).<br />

Additional requirements<br />

The method requires all active connections to be registered by devices<br />

of the management system. Thanks to this, the planning subsystem will know<br />

which relations are necessary. In a minimum variant, to record only the first call<br />

within a relation is sufficient. For this purpose, an existing electronic distribution<br />

channel can be used.<br />

Initial conditions<br />

Before the first iteration, the relations are established on each to each. Prior<br />

to initiating the system there is not time regime yet, so it does not matter that

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!