A Security Framework for Systems-of-Systems
Systems of systems have been used recently in many complex scenarios to simplify network communication, resources allocation and management. Given the dynamic and heterogeneous nature of systems of systems, providing security in such an environment is challenging and requires significant management and processing resources. In this paper, a security framework based on the Multi-Label Switching Protocol is proposed, which not only provides the network with connectivity, reliability and Quality of Service, but also adds several security features such as traffic separation and isolation with minimal management and configuration overhead. Furthermore, a more advanced security configuration based on the integration of IPsec and Multi-Label Switching Protocol is proposed.
KeywordsSystems of Systems Security framework MPLS
The authors acknowledge the financial support of the Deanship of Scientific Research at the German Jordanian University for the presented work in this paper.
- 1.Kennedy, M., Llewellyn-Jones, D., Shi, Q., Merabti, M.: System-of-systems security: a survey. In: The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010), Liverpool, UK, 21–22 June 2010Google Scholar
- 2.Chiprianov, V., Gallon, L., Munier, M., Aniorte, P., Lalanne, V.: Challenges in security engineering of systems-of-systems. In: Conference de l’Ingenierie Logiciel (CIEL), Paris, France (2014)Google Scholar
- 3.Ruiz, J.F., Rudolph, C., Maña, A., Arjona, M.: A security engineering process for systems of systems using security patterns. In: 2014 IEEE International Systems Conference Proceedings, pp. 8–11, March 2014Google Scholar
- 4.Belloir, N., Chiprianov, V., Ahmad, M., Munier, M., Gallon, L., Bruel, J.-M.: Using relax operators into an MDE security requirement elicitation process for systems of systems. In: Proceedings of the 2014 European Conference on Software Architecture Workshops (ECSAW 2014), Article 32, p. 4. ACM, New York (2014)Google Scholar
- 5.Agrawal, D.: A new schema for security in dynamic uncertain environments. In: 2009 IEEE Sarnoff Symposium, pp. 1–5. IEEE (2009)Google Scholar
- 6.Trivellato, D., Zannone, N., Etalle, S.: Poster: protecting information in systems of systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), pp. 865–868. ACM, New York (2011)Google Scholar
- 7.Zhou, B., Arabo, A., Drew, O., Llewellyn-Jones, D., Merabti, M., Shi, Q., Waller, A., Craddock, R., Jones, G., Yau, A.: Data flow security analysis for system-of-systems in a public security incident. In: 3rd Conference on Advances in Computer Security and Forensics. Liverpool John-Moores University (2008)Google Scholar
- 10.Lemeshko, O.V., Yeremenko, O.S., Tariki, N., Hailan, A.M.: Fault-tolerance improvement for core and edge of IP network. In: 2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT), Lviv 2016, pp. 161–164 (2016)Google Scholar
- 11.Obermaisser, R., Abuteir, M., Khalifeh, A., Abou-Tair, D.D.I.: Systems-of-systems framework for providing real-time patient monitoring and care: challenges and solutions. In: International Workshop on ICTs for Improving Patients Rehabilitation Research Techniques, pp. 129–142. Springer, Heidelberg (2014)Google Scholar
- 12.Security of the MPLS Architecture, white paper, Cisco Systems, Inc. http://www.cisco.com/warp/public/cc/pd/iosw/prodlit/mxinf_ds.pdf