Applicability of Instant Messaging in the Military Command and Control Systems Author: Juha Vermaja Superviser: Jorma Jormakka Instructor: Marko Luoma,

Slides:



Advertisements
Similar presentations
E-Commerce Based Agents over P2P Network Arbab Abdul Waheed MSc in Smart Systems Student # Nov 23, 2008 Artificial Intelligence Zhibing Zhang.
Advertisements

Presence and IM as SIP Services Jonathan Rosenberg Chief Scientist.
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Encrypting Wireless Data with VPN Techniques
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Fast L3 Handoff in Wireless LANs Andrea G. Forte Sangho Shin Henning Schulzrinne.
Supporting Group Mobility in Mission- Critical Wireless Networks for SIP- based Applications Project LaTe.
A LabVIEW-based soundcard interface for e-laboratory Ţepelea Laviniu 1, Gavriluţ Ioan 1, Neamţu Ovidiu 1, Gergely Eugen 1, Gacsádi Alexandru 1 1 University.
BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
H. 323 and firewalls: Problem Statement and Solution Framework Author: Melinda Shore, Nokia Presenter: Shannon McCracken.
Extending Instant Messaging to Provide Pervasive Personal Communication Wei Li, Fredrik Kilander and Carl Gustaf Jansson {liwei, fk, Department.
Wireless Village (WV) Mobile IMPS ( Instant Messaging and Presence Services) Reporter : Allen.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
XMPP (eXtensible Messaging and Presence Protocol ) Reporter : Allen.
SIP vs H323 Over Wireless networks Presented by Srikar Reddy Yeruva Instructor Chin Chin Chang.
Agenda Introduction to 3GPP Introduction to SIP IP Multimedia Subsystem Service Routing in IMS Implementation Conclusions.
© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation Niklas Salmela Supervisor:
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
A Seminar on Securities In Cloud Computing Presented by Sanjib Kumar Raul Mtech(ICT) Roll-10IT61B09 IIT Kharagpur Under the supervision of Prof. Indranil.
Metadata for the Cloud Telco Motivation presentation to ISO/IEC JTC1 SC32 WG2 Ewelina Szczekocka, Orange Labs Poland, Telekomunikacja Polska S.A. 25th.
Intranet, Extranet, Firewall. Intranet and Extranet.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
Packetizer ® Copyright © 2008 H.325 Beyond Today’s Second Generation Systems Paul E. Jones Rapporteur, ITU-T Q12/16 1.
Developing writing/speaking skills on Yahoo discussion groups.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Support Services & IP Multimedia Subsystem (IMS)
Marketing Management Online marketing
Instant Messaging Alan Parker Robert Callow Brian Kearney Fortunato Macari Daniel Harrington Chang Gong Wang.
Peer to Peer Applications in Ad hoc Networks Author: Jesús Hijas Networking Laboratory Helsinki University of Technology Supervisor:
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
1 Analysis of Push Initiator Tool used for Wireless Application Protocol Taotao Huang Helsinki University of Technology Department of Electrical and Communication.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
XMPP – Extensible Messaging and Presence Protocol Vidya Satyanarayanan.
569 Semantic Web. Dr. J. Lu University of windsor, Project Presentation Encrypted Web service application Encrypted Web Application Presented by:
SIPREC Conference Recording (draft-kyzivat-siprec-conference-use-cases-01) IETF 89, March 7, 2014 Authors: Michael Yan, Paul Kyzivat, Simon Romano.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Jabber Client Jeevan Varma Anga Distributed Systems(CSC8530) Villanova University.
PIC.edu Survey Review Internet2 Presence & Integrated Communications Working Group Fall Member Meeting, 2007.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
Rev A Mikko Suominen Enhancing System Capacity and Robustness by Optimizing Software Architecture in a Real-time Multiprocessor Environment.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Introduction to 學校:大同大學 班級: GI1 學號: 姓名:李奕銳 教師:葉慶隆 Jabber 1.
Omar A. Abouabdalla Network Research Group (USM) SIP – Functionality and Structure of the Protocol SIP – Functionality and Structure of the Protocol By.
Sumanth Nag Popuri.  Why do we need SIP ?  The protocol  Instant Messaging using SIP  Internet Telephony with SIP  Additional applications  Future.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Presence Networking: XMPP and Jabber Joe Hildebrand Chief Architect Jabber, Inc. Networld+Interop 1 May 2003.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 14 How Internet Chat and IM Work.
Jabber Technical Overview Presenter: Ming-Wei Lin.
IETF 67 – SIMPLE WG SIMPLE Problem Statement Draft-rang-simple-problem-statement-01 Tim Rang - Microsoft Avshalom Houri – IBM Edwin Aoki – AOL.
Information and Communication Networks Global network of innovation Siemens n.v. Marc Roelands Strategic Technology January 2004 “Context” for Emerging.
| nectar.org.au NECTAR TRAINING Module 4 From PC To Cloud or HPC.
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
IMSX Protocol Evaluation for Session Based IM draft-barnes-simple-imsx-prot-eval-00.txt Mary Barnes IETF 54 SIMPLE WG.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
SIPREC Conference Recording (draft-kyzivat-siprec-conference-use-cases-00) IETF 87, November 4, 2013 Authors: Michael Yan, Paul Kyzivat, Simon Romano.
Best SMS Gateway Software Provider Company in India By Aruhat Technologies.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Peer-to-peer networking
Chapter 8: Monitoring the Network
Discussion Issues on IMS-based NGN
Presentation transcript:

Applicability of Instant Messaging in the Military Command and Control Systems Author: Juha Vermaja Superviser: Jorma Jormakka Instructor: Marko Luoma, Lic.Sc. Helsinki University of Technology Networking laboratory

Contents Introduction Battlefield command and control systems Instant Messaging systems IM applicability to C2 usage Demonstration Conclusions

Introduction Many different IM applications available for free of charge IETF effords has created specifications and standards Security plays an important role in IM environments The requirements for the next generation IM systems are increasing The purpose of this thesis is to study the applicability and possibility of using commercially available IM systems in military C2IS (Command and Control Information Systems)

C2 Systems Command and Control (C2) messages are text messages used in military systems for data providing C2 messages can be created manually or automatically Receiving, interpretation and presentation can be automated C2 messages are independent of the physical layer Building new C2 systems is done parallel to old ones so that there is always one mechanism ready to be deployed C2 systems are not easily replaced by newer systems due to the switching costs

C2 Systems Cont... Situation now: Many countries have developed their own C2 messaging solutions including NATO countries The interoperability is a constant concern and no specific standards have been fully adopted Some standards are agreed upon, for example NATO’s Allied Data Publication No. 3 (AdatP-3) and United States Message Text Format (USMTF) AdatP-3 provides rules, constructions and vocabulary for message text formats

C2 Systems Cont... Situation in near future: In the year 1998 several countries started a joint operation called Multilateral Interoperability Programme (MIP) MIP aim is to achieve an international interoperability of C2IS in order to support combined and joint operations MIP will serve as a guideline for future developments At the moment MIP is in an implementation phaze

Instant Messaging Systems The idea of Instant Messaging comes from the Internet Relay Chat (IRC) Instant Messaging (IM) system is a text-based message system that allows the user to exchange short messages in real-time Presence awareness in its most simple form means that a user knows if another user is online or not The biggest problem in IM systems is the lack of standards Many applications are proprietary Several third party applications have been created that can handle the communication between proprietary solutions

IETF Standardization IETF has created a standard called Instant Messaging & Presence Protocol (IMPP) IMPP working group has produced several RFC’s and drafts defining protocols and data formats needed to build global end-user presence awareness, notification and IM system 2 Major IETF RFC’s are: Model for presence and instant messaging (RFC 2778) Instant messaging / presence protocol requirements (RFC 2779)

IMPP Protocols Several candidates have been competing to get a position of an official standard of IM systems with open standard protocols Session Initiation Protocol (SIP) and Jabber are the strongest candidates Many applications already use SIP or Jabber Interoperability between SIP and Jabber is achieved by using gateways

Applicability to C2IS Security Most IM applications do not use any encryption methods All the consumer applications use plain text authentication and messages are sent in plain text format Flexibility and scalability IM systems work in client-server environment Scalability is not an problem

Applicability Scenarios Temporary and fast to build For example in disaster area where all the other communication systems have been destroyed Automated systems A computer can interpret the messages Convenience The usage of presence awareness

Demonstration The demonstration was done in a closed network that corresponds to a simple wireless local area network The purpose of the demonstration was to study the behavior of the IM applications and the traffic The results Unencrypted messages could be easily captured The network topology could be discovered A conversation that includes 2 – 10 messages is only bytes per participant

Conclusions Interoperable standards are needed Both IMPP protocols (SIP and Jabber) will stay in IM systems and cooperate via the gateways IM systems can offer many advantages Security is a big problem COTS available IM applications do not satisfy wholly the needs of the C2 communication -> Specified applications are needed to make the communication easy and practical Specified applications with specific platforms are needed in order to build automated systems

Questions? Thank you!