Priority-based QoS Extensions and IAM Improvements

Authors

  • Gyudong Park ADS&TR Institute – Command and Control Systems PMO, Agency for Defense Development, Seoul, Korea
  • Hyoek Jin Choi ADS&TR Institute – Command and Control Systems PMO, Agency for Defense Development, Seoul, Korea

DOI:

https://doi.org/10.13052/jwe1540-9589.2362

Keywords:

Access congestion, priority-based access control (PBAC)

Abstract

The command and control system operates in a harsh and dynamic environment with limited resources and have a very high risk of failure or malfunction. In the case of military information systems, including the command and control system, the efficiency and effectiveness of system resource management are very important and required. Therefore, the application of a QoS-like approach is necessary to improve the operational effectiveness of all command and control system resources. However, supporting QoS at the entire command and control system level incurs additional costs and burdens for implementation and operation. This paper describes the necessity and possibility of collaboration with QoS and IAM (identity and access management) among the collaboration between core functions within the command and control system. This paper proposes an extended QoS approach to improve the operational effectiveness of the entire command and control system resources. As a result of this research, expanded concepts, structures, standards, and methods of collaboration between QoS and IAM are developed and presented, and their feasibility is demonstrated through prototype development and experiments.

Downloads

Download data is not yet available.

Author Biographies

Gyudong Park, ADS&TR Institute – Command and Control Systems PMO, Agency for Defense Development, Seoul, Korea

Gyudong Park received his Ph.D. in computer engineering from Hongik University, Korea, in 2014. He has been working for the Agency for Defense Development (ADD), Seoul, Korea as a researcher since 1998. His research areas include command and control, interoperability, network, information exchange, and security.

Hyoek Jin Choi, ADS&TR Institute – Command and Control Systems PMO, Agency for Defense Development, Seoul, Korea

Hyoek Jin Choi received his MD in Dongguk University in 1995. From 1995 to now, he has been a researcher for the Agency for Defense Development (ADD), Seoul, Korea. His research areas are the command and control system, cyber security and artificial intelligence.

References

David S. Alberts, Richard E. Hayes, Understanding Command and Control, CCRP, 2006

Cristina Aurrecoechea, Andrew T. Campbell & Linda Hauw, A survey of QoS architectures, Vol. 6, pp. 138–151, 1998

Gyudong Park, Hocheol Jeon, AIQIA : An Integration Architecture between System Layers to Improve Interoperability, KIMST Annual Conference Proceedings, pp. 1116–1117, 2022

Ishaq Azhar Mohammed, Intelligent authentication for identity and access management: a review paper, IJMIE, Vol. 3, Issue 1, pp. 696–705, 2013

Lihao Chen, Jiayi Zhang, Tao Gao, and Tongtong Wang, Analysis of QoS Schemes and Shaping Strategies for Large Scale IP Networks based on Network Calculus, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 355, Springer,

Toerless Eckert & Stewart Bryant, Quality of Service (QoS), Future Networks, Services and Management pp. 309–344, 2021

J. M. Ppallan, K. Arunachalam, S. S. Gantha, S. Jaiswal, S. Song and A. Nigam, A Method for Enabling Context-Awareness at Transport Layer for Improved Quality-of-Service Control, IEEE Access, Vol. 9, pp. 123987–123998, 2021,

Y. Xue, C. Gedo, C. Christou, B. Liebowitz, A Framework for Military Precedence-Based Assured Services in GIG IP Networks, IEEE MILCOM, 2007.

Sunghwa Son, Gwangjin Wi and Kyung-Joon Park, Situation-Aware Survivable Network Design for MDPI, Applied sciences, 2022.

Gyudong Park, Hocheol Jeon, Gyu Myoung Lee, Byungchun Jeon, A Study on Implementation and Improvement of Triple-Metric Based QoS for Military Networks, The Journal of Korean Institute of Communications and Information Sciences, 2022.

Bharatha Sreeja G Mubeen Begum Saleem Venkata Sravya Divya K Jayashree R, Issues with perimeter based network security and a better model to resolve them, European Journal of Molecular & Clinical Medicine, Vol. 7, Issue 9, pp. 2437–2444, 2020.

Shabnam Mohammad Hasani, Nasser Modiri, Criteria Specifications for the Comparison and Evaluation of Access Control Models, I. J. Computer Network and Information Security, Vol. 5, pp. 19–29, 2013.

David F. Ferraiolo, John F. Barkley, D. Richard Kuhn, Authors Info & Claims, A role-based access control model and reference implementation within a corporate intranet, ACM Transactions on Information and System Security. Vol. 2, Issue 1, pp. 34–64, 1999.

Vincent C. Hu; D. Richard Kuhn; David F. Ferraiolo; Jeffrey Voas, Attribute-Based Access Control, IEEE Computer, Vol. 48, Issue 2, pp. 85–88, 2015.

A. Corradi; R. Montanari; D. Tibaldi, Context-based access control for ubiquitous service provisioning, Proceedings of the 28th Annual International Computer Software and Applications Conference, COMPSAC 2004.

Gyudong Park, Gi-Yoon Jeon, Jong-Oh Kim, A Study on Improvement of the Military IdAM Using Edge-Sovereign Identity (ESI), Journal of Web Engineering, pp. 1435–1448, 2022.

Downloads

Published

2024-11-04

How to Cite

Park, G. ., & Choi, H. J. . (2024). Priority-based QoS Extensions and IAM Improvements. Journal of Web Engineering, 23(06), 769–786. https://doi.org/10.13052/jwe1540-9589.2362

Issue

Section

Data Science and Network Intelligence in Web Science