TY - GEN
T1 - Applying systems engineering in tactical wireless network analysis with Bayesian networks
AU - Chan, Philip
AU - Mansuri, Mo
AU - Man, Hong
PY - 2010
Y1 - 2010
N2 - Systems engineering approaches are employed to measure and to analyze vulnerabilities of military tactical RF wireless networks. The goal is to develop smart and innovative performance matrixes through electronic warfare (EW) modeling and simulation scenarios. Systematic systems engineering approaches with radio frequency (RF) electronic warfare modeling and simulation scenarios are built to support research in vulnerability analysis. RF electronic warfare models are used to provide a practical yet simple process for assessing and investigate the vulnerability of tactical RF systems. The focus is on military or tactical wireless network within a system of systems (SoS) context research area. Wireless RF communication network vulnerabilities critically studied within Department of Defense (DoD) organizations to provide a comprehensive network vulnerability assessment approach. Researchers have proposed a variety of methods to build network trees with chains of exploits, and then perform normal post-graph vulnerability analysis. This paper presents an approach to use Bayesian network to model, calculate and analyze all potential vulnerability paths in wireless RF networks.
AB - Systems engineering approaches are employed to measure and to analyze vulnerabilities of military tactical RF wireless networks. The goal is to develop smart and innovative performance matrixes through electronic warfare (EW) modeling and simulation scenarios. Systematic systems engineering approaches with radio frequency (RF) electronic warfare modeling and simulation scenarios are built to support research in vulnerability analysis. RF electronic warfare models are used to provide a practical yet simple process for assessing and investigate the vulnerability of tactical RF systems. The focus is on military or tactical wireless network within a system of systems (SoS) context research area. Wireless RF communication network vulnerabilities critically studied within Department of Defense (DoD) organizations to provide a comprehensive network vulnerability assessment approach. Researchers have proposed a variety of methods to build network trees with chains of exploits, and then perform normal post-graph vulnerability analysis. This paper presents an approach to use Bayesian network to model, calculate and analyze all potential vulnerability paths in wireless RF networks.
KW - Bayesian networks
KW - Systems engineering
KW - Vulnerability assessment
KW - Wireless network analysis
UR - http://www.scopus.com/inward/record.url?scp=78649860326&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78649860326&partnerID=8YFLogxK
U2 - 10.1109/CICSyN.2010.45
DO - 10.1109/CICSyN.2010.45
M3 - Conference contribution
AN - SCOPUS:78649860326
SN - 9780769541587
T3 - Proceedings - 2nd International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2010
SP - 208
EP - 215
BT - Proceedings - 2nd International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2010
T2 - 2nd International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2010
Y2 - 28 July 2010 through 30 July 2010
ER -