Protection of military and commercial information on wireless networks today is one of the most relevant and popular research topics for research. U.S. agency DARPA is going to April 1 of this year to spend quite a serious workshop on wireless communications in its headquarters in Arlington, Virginia.
What there will be a speech? Of course, for the greatest possible reliability military wireless networks, because it provides a link to rapidly learn about everything and thus make the right decisions.
Our reference: DARPA - the agency that deals with research projects that address the needs of the American army. The task of DARPA - to maintain the level of development at such a level that the armed forces had superiority over other technical means of the armies of the world. (Ed.)
Thus, the purpose of regular agency DARPA effort is the development of a new software that can make wireless networks more resistant to most types of unexpected effects, as well as improve their functionality and reliability. After all, in those areas where reliable communications infrastructure is missing, the military reluctant to rely only on wireless communication, and it can be subject to interference by the enemy, not to mention the direct interception them your messages transmitted by radio.
At the same time available at the hands of the soldiers of the devices perform double duty: they not only provide access to information, and they form an information network itself, because coming through the radio information can be recorded on a computer and then subjected to an appropriate treatment.
But if so, it requires constant monitoring of the safety of both transmitting and receiving stations, that is, the need to increase their reliability is very high. After all, everyone knew that the violations of information security can be very easy to damage the entire wireless communication system in a given area, and that in a modern warfare action to allow no means!
And now for the solution of this and several other issues related to the security of wireless communication systems, DARPA has developed a special program, which aims to create new network of programs that will give the military the opportunity to work with your wireless network even in accidental or malicious exposure to their individual nodes.
Currently, our efforts are focused on the safety of individual units, rather than the network as a whole, so one radio station operating incorrectly can weaken the entire network - said program manager Wayne Foel. We must change the way we manage the wireless network communication through the development of new software for current and future communication systems, which should be deprived of many of today#39;s shortcomings.
The U.S. missile defense system will cover the reboot?
Therefore, the main objective of the program is to develop such programs that will enhance the viability and reliability of the system as a whole and are automatically adapt the network to work, despite the damage to some of its individual elements. Just as neighbors living in the same area, know each other well and can immediately see suspicious people on the street, and the new software should immediately identify unusual activity in communication systems, which may indicate the possibility of external influence.
For example, the adversary can affect your relationship, and not so much in order to eliminate it from the system, as in order to convey a completely different order or message. In fact it#39;s very similar to how if someone has stolen your bank card, knew her pin number and began to use it as their own.
However, today#39;s cards already have their own systems of protection. The credit card company has different systems of protection, allowing to determine that someone stole it and uses it instead of you - said Foel - so unexpected, not typical for you, place of purchase, the number and range of acquisitions - all of these factors can be quite sufficient to ensure that your card itself raised the alarm.
Moreover, such programs improve the reliability and methods of control may well be applied to wireless military communications, and in the same way you can test specific parts of the network, suspicious in terms of possible impacts on them by the enemy. We want to create a new software to meet the demands of today and for this to come on April 1 and all that good talk - says Foel.