Upload
zakary-warrick
View
212
Download
0
Embed Size (px)
Citation preview
1
3rd AFCEA EUROPE Student Conference, London 2010
Master Resident and Network Master Resident and Network Management in National Management in National
Network-Centric System over Network-Centric System over Hidden LayerHidden Layer
Krzysztof [email protected]
Military University of Technology, Faculty of Electronics, Telecommunications Institute
Warsaw, Poland
2
3rd AFCEA Europe Student Conference, London 2010
OutlineOutline
IntroductionMain elements of NNCSHidden Protocol BridgesMaster ResidentImplementationReferences
3
3rd AFCEA Europe Student Conference, London 2010
IntroductionIntroduction
What is NNCS?
National Network Centric System is a military platform for information
warfare that takes advantageof the hidden data transmissionto gain informational lead over
a potential enemy.
4
3rd AFCEA Europe Student Conference, London 2010
Main elements of NNCSMain elements of NNCS
Hidden Protocol InterpretersMaster ResidentHidden Protocol BridgesHidden data links (Voice over IP,
PSTN, GSM, VHF, Wi-Fi and Video over IP soon)
5
3rd AFCEA Europe Student Conference, London 2010
Hidden Protocol BridgeHidden Protocol Bridge
HPB is the connection between two types of data links.
There are two types of HPB:-HPB-H (hardware bridge)-HPB-S (software bridge)
6
3rd AFCEA Europe Student Conference, London 2010
HPB-HHPB-H
Data link #1(eg. VoIP)
Data link #2(eg. PSTN)
Audio signalwith embedded watermark
7
3rd AFCEA Europe Student Conference, London 2010
HPB-SHPB-S
Watermarkembedder
Audio signal sourceHidden information
RS/BCHcoder
eg. VoIP
call Watermark
extractor
RS/BCHdecoder
RS/BCHcoder
Watermarkembedder
Audio signal source
eg. GSM call
HPB-S
8
3rd AFCEA Europe Student Conference, London 2010
Master ResidentMaster Resident
Master Resident is the key element of NNCS.
MR
HPI
HPB
HPI
HPI
HPI
HPI
HPB
HPB
HPB
HPI
9
3rd AFCEA Europe Student Conference, London 2010
ImplementationImplementation
Implementation was made with use of: VMPC one-way function and stream cipher Watermarking methods: DCM and OFDM Error correction codes: BCH and Reed-
Solomon NNCS Wi-Fi Debian GNU/Linux 5.0 as an operating
system
10
3rd AFCEA Europe Student Conference, London 2010
ReferencesReferences B. Żołtak, ,,VMPC – One way function and stream cipher”, Fast Software
Encryption 2004 (FSE’2004), Feb. 2004 P. Gajewski, J. Łopatka, Z. Piotrowski, ,,A new method of frequency offset
correction using coherent averaging”, Journal of Telecommunications and Information Technology, Jan. 2005, pp. 142-146,Warsaw
Z. Piotrowski, ,,Drift correction modulation scheme for digital audio watermarking”, The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing China (submitted for publication)
Z. Piotrowski, K. Sawicki, M. Bednarczyk, P. Gajewski, ,,New hidden and secure data transmission method proposal for military IEEE 802.11 networks”, Intelligent Information Hiding – Multimedia Signal Processing 2010, Darmstadt, Germany
Z. Piotrowski, ,,The National Network-Centric System and its components in the age of Information Warfare”, Safety and Security Engineering III, SAFE III, WIT Press 2009, Southampton, Boston, pp. 301-309
K.Wodecki, ,,Hidden Protocol Interpreter and its main features in the watermarking battle net”, 2nd AFCEA Europe Student Conference, Brussels, 2009
11
3rd AFCEA Europe Student Conference, London 2010
Thank you!