Priority-based QoS Extensions and IAM Improvements
DOI:
https://doi.org/10.13052/jwe1540-9589.2362Keywords:
Access congestion, priority-based access control (PBAC)Abstract
The command and control system operates in a harsh and dynamic environment with limited resources and have a very high risk of failure or malfunction. In the case of military information systems, including the command and control system, the efficiency and effectiveness of system resource management are very important and required. Therefore, the application of a QoS-like approach is necessary to improve the operational effectiveness of all command and control system resources. However, supporting QoS at the entire command and control system level incurs additional costs and burdens for implementation and operation. This paper describes the necessity and possibility of collaboration with QoS and IAM (identity and access management) among the collaboration between core functions within the command and control system. This paper proposes an extended QoS approach to improve the operational effectiveness of the entire command and control system resources. As a result of this research, expanded concepts, structures, standards, and methods of collaboration between QoS and IAM are developed and presented, and their feasibility is demonstrated through prototype development and experiments.
Downloads
References
David S. Alberts, Richard E. Hayes, Understanding Command and Control, CCRP, 2006
Cristina Aurrecoechea, Andrew T. Campbell & Linda Hauw, A survey of QoS architectures, Vol. 6, pp. 138–151, 1998
Gyudong Park, Hocheol Jeon, AIQIA : An Integration Architecture between System Layers to Improve Interoperability, KIMST Annual Conference Proceedings, pp. 1116–1117, 2022
Ishaq Azhar Mohammed, Intelligent authentication for identity and access management: a review paper, IJMIE, Vol. 3, Issue 1, pp. 696–705, 2013
Lihao Chen, Jiayi Zhang, Tao Gao, and Tongtong Wang, Analysis of QoS Schemes and Shaping Strategies for Large Scale IP Networks based on Network Calculus, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 355, Springer,
Toerless Eckert & Stewart Bryant, Quality of Service (QoS), Future Networks, Services and Management pp. 309–344, 2021
J. M. Ppallan, K. Arunachalam, S. S. Gantha, S. Jaiswal, S. Song and A. Nigam, A Method for Enabling Context-Awareness at Transport Layer for Improved Quality-of-Service Control, IEEE Access, Vol. 9, pp. 123987–123998, 2021,
Y. Xue, C. Gedo, C. Christou, B. Liebowitz, A Framework for Military Precedence-Based Assured Services in GIG IP Networks, IEEE MILCOM, 2007.
Sunghwa Son, Gwangjin Wi and Kyung-Joon Park, Situation-Aware Survivable Network Design for MDPI, Applied sciences, 2022.
Gyudong Park, Hocheol Jeon, Gyu Myoung Lee, Byungchun Jeon, A Study on Implementation and Improvement of Triple-Metric Based QoS for Military Networks, The Journal of Korean Institute of Communications and Information Sciences, 2022.
Bharatha Sreeja G Mubeen Begum Saleem Venkata Sravya Divya K Jayashree R, Issues with perimeter based network security and a better model to resolve them, European Journal of Molecular & Clinical Medicine, Vol. 7, Issue 9, pp. 2437–2444, 2020.
Shabnam Mohammad Hasani, Nasser Modiri, Criteria Specifications for the Comparison and Evaluation of Access Control Models, I. J. Computer Network and Information Security, Vol. 5, pp. 19–29, 2013.
David F. Ferraiolo, John F. Barkley, D. Richard Kuhn, Authors Info & Claims, A role-based access control model and reference implementation within a corporate intranet, ACM Transactions on Information and System Security. Vol. 2, Issue 1, pp. 34–64, 1999.
Vincent C. Hu; D. Richard Kuhn; David F. Ferraiolo; Jeffrey Voas, Attribute-Based Access Control, IEEE Computer, Vol. 48, Issue 2, pp. 85–88, 2015.
A. Corradi; R. Montanari; D. Tibaldi, Context-based access control for ubiquitous service provisioning, Proceedings of the 28th Annual International Computer Software and Applications Conference, COMPSAC 2004.
Gyudong Park, Gi-Yoon Jeon, Jong-Oh Kim, A Study on Improvement of the Military IdAM Using Edge-Sovereign Identity (ESI), Journal of Web Engineering, pp. 1435–1448, 2022.