You are previewing Network Science for Military Coalition Operations: Information Exchange and Interaction.
O'Reilly logo
Network Science for Military Coalition Operations: Information Exchange and Interaction

Book Description

Network Science for Military Coalition Operations: Information Exchange and Interaction presents an advanced view of this delicate and vital operation. However, an understanding of the science behind coalition operations can benefit not just military operations, but any context in the modern world where two independent organizations need to collaborate together for a shared goal. In this age of globalization, the research in this book becomes of unprecedented importance, not only for the military, where most stable and advance techniques are required, but also for society at large, which also demands constant improvement in network science.

Table of Contents

  1. Copyright
  2. Editorial Advisory Board
  3. List of Reviewers
  4. Foreword
  5. Preface
    1. DIFFERENT TYPES OF NETWORKS
    2. COALITION NETWORKS
    3. STRUCTURE OF THE BOOK
    4. WHO IS THE BOOK FOR?
    5. WHO IS THE BOOK NOT FOR?
  6. Acknowledgment
  7. 1. Coalition Communication and Information Networks
    1. 1. Inter-Domain Routing in Mobile Ad Hoc Networks: Challenges and New Directions
      1. ABSTRACT
      2. INTRODUCTION
      3. FUNCTION OF BGP
        1. Decision vs. Signaling
        2. Unification vs. Interoperation
        3. Connectivity vs. Commitment
      4. ISSUES OF BGP OVER MANETS
      5. ISSUES OF EXISTING AD HOC ROUTING MECHANISMS
      6. ISSUES OF MOBILE AD HOC INTER-DOMAIN ROUTING PROTOCOLS
      7. A SOLUTION FRAMEWORK FOR MOBILE AD HOC INTER-DOMAIN ROUTING
        1. Handling Domain-level Topology Changes
        2. Membership Management and Announcement
        3. Policy Support
        4. Data plane Operations
      8. ISSUES OF MOBILE AD HOC INTER-DOMAIN ROUTING POLICIES
        1. Common policy Specifications for Inter-Domain Routing
        2. Issues of Dynamic Policy Refinement over MANETs
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
      11. REFERENCES
    2. 2. Quality of Sensor-Originated Information in Coalition Information Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. QUALITY OF INFORMATION (QOI)
        1. The Quality of Information
        2. Information and QoI for sensor-Enabled Applications
        3. QoI-Aware perimeter protection
      5. QOI IN DYNAMIC SENSOR-ENABLED APPLICATION ENVIRONMENTS
        1. The Four viewpoints of Qos
        2. The four viewpoints of QoI
      6. INFORMATION PROCESSORS AND OPERATORS
      7. QUALITY METADATA MODEL
        1. The Base QoI Metadata Data Model
        2. The Base Vol Metadata Data Model
      8. CONCLUSION
      9. ACKNOWLEDGMENT
      10. REFERENCES
      11. ENDNOTES
    3. 3. Graph Mining Techniques for Networking Applications: A Review
      1. ABSTRACT
      2. INTRODUCTION
        1. Networking Applications
        2. Central problems in Networking Applications
      3. GRAPH MINING PROBLEMS FOR NETWORKING APPLICATIONS
        1. Graph Classification
        2. Graph Clustering
          1. Relationship to Centrality Analysis
        3. Graph Matching
        4. Indexing Graphs
        5. Frequent pattern Mining
        6. Graph Reachability Queries
        7. Viral Influence in Networks
        8. Graph streaming Applications
        9. Graph spectrum Analysis and statistics
      4. CONCLUSION
      5. REFERENCES
      6. ENDNOTE
    4. 4. Region Coverage and Protection with Sensors: A Survey
      1. ABSTRACT
      2. INTRODUCTION
      3. COVERAGE OF A REGION
      4. RANDOM PLACEMENT OF SENSORS TO COVER A REGION
      5. RANDOM PARTIAL COVERAGE
      6. GRID PLACEMENT COVERAGE
      7. GRID PLACEMENT K-COVERAGE
      8. COVERAGE OF AN AREA WITH APPROIMATE POSITIONING OF SENSORS
      9. BOUNDED REGIONS
      10. OTHER FACTORS IN COVERAGE FOR A REGION
      11. USING SENSORS TO CREATE A BARRIER
      12. CONCLUSION
      13. ACKNOWLEDGMENT
      14. REFERENCES
  8. 2. Security and Policy Technologies for Coalitions
    1. 5. Security across Disparate Management Domains in Coalition MANETs
      1. ABSTRACT
      2. INTRODUCTION
      3. ADVERSARIAL MODELS AND SECURITY METRICS
        1. Space-Time Delimited Adversary
        2. Physical Layer Metrics
        3. Routing Layer Metrics
      4. PHYSICAL LAYER COMMUNICATION IN COALITION MANETS
        1. Jamming Attacks
        2. Smart (Energy Efficient) Jamming Attacks over 802.11x Networks
        3. Jamming Resistant Physical Layer Key Exchange
          1. Uncoordinated Frequency Hopping
          2. Information Theoretic Secure Key Exchange
        4. Physical Layer Identity
      5. COOPERATIVE ROUTING IN COALITION MANETS
        1. Simple Packet Forwarding Network
        2. Content-Based Routing
        3. Network Coding Based Cooperative Routing
        4. In-Network Data Aggregation
      6. INTER-DOMAIN ROUTING IN COALITION MANETS
        1. Inter-Domain Routing Security On The Internet
        2. Inter-Domain Routing in MANETs
          1. Address Ownership
          2. Route Correctness
          3. Verification of Correct Forwarding Behavior
      7. SUMMARY
      8. ACKNOWLEDGMENT
      9. REFERENCES
    2. 6. Policy Technologies for Federation and Interoperation of Coalition Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. SCENARIO AND REQUIREMENTS
      4. POLICY LIFECYCLE
        1. Policy Management Architecture and Library
        2. Policy Authoring and Management
          1. Policy Authoring
          2. Policy Analysis
          3. Policy Management
        3. Policy Negotiation
      5. POLICY TECHNOLOGIES FOR COALITION OPERATIONS
        1. Policy-Enabled Federated Database
        2. Policy-Enabled Publish/Subscribe Middleware
        3. Performance implications of Policy Enablement
      6. CONCLUSION
      7. REFERENCES
    3. 7. Policies to Enable Secure Dynamic Community Establishment
      1. ABSTRACT
      2. INTRODUCTION
      3. SELF-MANAGED CELL FRAMEWORK
      4. ROLE-BASED INFRASTRUCTURE FOR COMMUNITY MANAGEMENT
        1. Community Model
        2. Secure Management
          1. Coordination Role
          2. Authentication Role
          3. Membership Management Role
          4. Access Control Role
      5. PATTERNS FOR BUILDING LARGE-SCALE COMMUNITIES
        1. Structure
          1. Peer-to-Peer (P2P)
          2. Composition
          3. Aggregation
          4. Fusion
        2. Task-Allocation
          1. Hierarchical Control
          2. Cooperative Control
          3. Auction
          4. Mutual Control
          5. Diffusion
        3. Communication
          1. Diffusion
          2. Shared Bus
          3. Correlation
          4. Store-and-Forward
      6. FEDERATION AND COMPOSITION
      7. FORMAL SPECIFICATION AND MODEL-CHECKING
        1. Basic Self-Managed Cell Model
        2. Policy Model
        3. Architectural Model
      8. EVALUATION
      9. CONCLUSION
      10. REFERENCES
      11. ENDNOTES
    4. 8. Policy Technologies for Security Management in Coalition Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. FRAMEWORK FOR SECURITY POLICIES
      4. DESCRIPTION OF THE LAYERS
      5. DESCRIPTION OF THE FUNCTIONALITY AT EACH LAYER
        1. Policy Specification Layer
        2. Abstract Policies
        3. Concrete Policies
        4. Executable policies
      6. ABSTRACT POLICIES AND POLICY ANALYSIS
      7. LANGUAGE
      8. AUTHORIZATIONS
      9. OBLIGATIONS
      10. SYSTEM DESCRIPTIONS
      11. ANALYSIS
      12. THE END-USER VIEW OF POLICY MANAGEMENT
      13. INITIAL SECURITY POLICY PROOF-OF-CONCEPT PROTOTYPE
      14. BACKGROUND ON THE SCENARIO
      15. DESIGN OF THE SECURITY POLICY PROTOTYPE
      16. LESSONS LEARNED
      17. SENSOR FABRIC PROOF-OF- CONCEPT PROTOTYPE
      18. BACKGROUND ON THE SCENARIO
      19. DESIGN OF THE SECURITY POLICY –SENSOR FABRIC PROTOTYPE
      20. LESSONS LEARNED
      21. CONCLUSION
      22. REFERENCES
  9. 3. Human and Cognitive Issues in Coalitions
    1. 9. A Model for Culturally Adaptive Policy Management in Ad Hoc Collaborative Contexts
      1. ABSTRACT
      2. INTRODUCTION
      3. AN APPROACH TO MISSION PLANNING AND OPERATION SUPPORT
      4. POLICY MANAGEMENT
      5. POLICY PRESENTATION
      6. POLICY EXPLANATION
      7. POLICY EXAMPLE
      8. CULTURAL MODELS
      9. CULTURAL NETWORK ANALYSIS
        1. Exploratory CNA
        2. Confirmatory CNA
        3. Model Representation
        4. Application
      10. COLLABORATIVE DECISION SUPPORT
      11. DISCUSSION
      12. REFERENCES
    2. 10. The Network-Extended Mind
      1. ABSTRACT
      2. INTRODUCTION
      3. EXTERNALISM AND EXTENSION: A BRIEF HISTORY
      4. COGNITIVE EXTENSION
        1. Web Construction
        2. Puzzles, Papers and Human-Level Problems
        3. Extended Cognitive Systems
      5. THE EXTENDED MIND
      6. THE WEB-EXTENDED MIND: A THOUGHT (PROVOKING) EXPERIMENT
      7. SOCIALLY-EXTENDED COGNITION
      8. EXTENDED COGNITIVE SYSTEMS AND MILITARY COALITIONS
        1. Human-Centered Cognitive Extension
        2. Coalitions as Extended Cognitive Systems
      9. RELEVANT DEFENCE-RELATED RESEARCH PROGRAMS
      10. CONCLUSION
      11. ACKNOWLEDGMENT
      12. REFERENCES
      13. ADDITIONAL READING
      14. ENDNOTE
    3. 11. Cultural Network Analysis: A Cognitive Approach to Cultural Modeling
      1. ABSTRACT
      2. CULTURAL NETWORK ANALYSIS: A COGNITIVE APPROACH TO CULTURAL MODELING
      3. CULTURE AS DISTRIBUTIONS OF KNOWLEDGE
      4. WHY CULTURAL MODELS?
        1. Cultural Models vs. Cultural Dimensions
        2. Cultural Models vs. Cognitive Customs
      5. KINDS OF CULTURAL DOMAINS
      6. CULTURAL NETWORK ANALYSIS
      7. EXPLORATORY CNA
        1. Elicitation
        2. Analysis
        3. Graphical Representation
      8. CONFIRMATORY CNA
        1. Elicitation
        2. Analysis
        3. Graphical Representation
      9. APPLICATIONS
      10. ACKNOWLEDGMENT
      11. REFERENCES
    4. 12. Conversation Analysis of Coalition Communication in Network Centric Operations
      1. ABSTRACT
      2. INTRODUCTION
      3. PREVIOUS AND CURRENT COMPUTATIONAL APPROACHES
      4. SINGAPORE DATA
      5. ANALYSIS OF SINGAPORE DATA
        1. Trust and the Starlight System
        2. Methods and Results
      6. DISCUSSION AND IMPLICATION
      7. VARIATIONS OF LANGUAGE USE AND LINGUISTIC PRAGMATICS
      8. A COMPUTATIONAL PRAGMATICS APPROACH TO THE ANALYSIS OF TEAM COMMUNICATION
      9. CONCLUSION
      10. ACKNOWLEDGMENT
      11. REFERENCES
      12. ENDNOTES
  10. Compilation of References
  11. About the Contributors