Military Science and Tactics

Military Science and Tactics

Methods Intrution To Confidentiality In Cyber-Electromagnetic Networks (Case Study Of Military Ad-Hoc Network)

Document Type : Research/Original/Regular Article

Authors
Master of Defense Management, AJA Command and Staff University, Tehran, Iran.
Abstract
Background: Historically, ad-hoc networks are mainly used for tactical applications related to military networks to improve battlefield communications. An ad-hoc network provides a suitable framework for addressing these issues, as it provides a mobile distributed network without the need for pre-defined infrastructures and provides connectivity beyond direct line of sight.
Objective: to identify methods of infiltrating military ad-hoc networks from the aspect of confidentiality.
Methodology: the type of applied research and the method of this research is descriptive because the researcher seeks to identify the subject and based on what it is and without the intervention and manipulation of variables with the available information regarding the identification of the methods of penetration into cyber electromagnetic networks in a systematic and descriptive manner. Systematically address the current situation, and the research approach is mixed
The statistical population is the employees working in the army of the Islamic Republic of Iran, who are familiar with the concepts of cyber-electromagnetism and have at least 15 years of service in such jobs.
Findings and Originality: In the field of confidentiality, 9 active classic attacks, 7 passive classic attacks and 5 attack methods were identified based on the attack meter database.
Keywords
Subjects

mobile Ad Hoc routing protocols. 10(4), 78-93. doi:10.1109/SURV.2008.080407.
·         Agrawal, R., Faujdar, N., Romero, C., Sharma, O., Abdulsahib, G., Khalaf, O., Ghoneim, O. (2023, March ). Classification and comparison of ad hoc networks: A review. Egyptian Informatics Journal, 24(1), 1-25. doi:https://doi.org/10.1016/j.eij.2022.10.004.
·         Barmanroy, D., & Chaki, R. (2014). Different Types of Attacks for WANs. In N. Chaki, & R. Chaki, Intrusion Detection in Wireless Ad-Hoc Networks (pp. 95-110).
·         Basagni, S., Conti, M., Giordano, S., & Stojmenovic, I. (2013). Mobile Ad Hoc Networking: Cutting Edge Directions (Second ed., Vol. 23).
·         Chang, T.-H., Lin, J.-W., Chen, C.-M., & Lai, G.-H. (2018). The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic or Manual? 2018 IEEE Conference on Dependable and Secure Computing (DSC) (pp. 1-4). Kaohsiung, Taiwan: IEEE. doi:10.1109/DESEC.2018.8625156
·         Copeland, M. (2021). Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud. New Braunfels, TX, USA. doi:https://doi.org/10.1007/978-1-4842-7132-2.
·         Enterprise Matrix. (2020, Decamber 29). Retrieved from attack.mitre.org: https://attack.mitre.org/matrices/enterprise/ Enterprise Matrix.
·         FM 3-0. (2017, October 6). Operations. Headquarters, Department Of The Army. Washington: Department of the Army USA.
·         Harris Corporatio. (2024). AN/PRC-167 MULTI-CHANNEL MANPACK. Retrieved from www.l3harris.com: https://www.l3harris.com/all-capabilities/an-prc-167-multi-channel-manpack.
·         Harris Corporation. (2024, January 13). AN/PRC-163 MULTI-CHANNEL HANDHELD RADIO. Retrieved from www.l3harris.com/: https://www.l3harris.com/all-capabilities/an-prc-163-multi-channel-handheld-radio.
·         Nabben, K., & Rennie, E. (2022). Ad hoc network. Internet Policy Review, 11(2). Retrieved from https://doi.org/10.14763/2022.2.1666.
·         Sbai, O., & Elboukhari, M. (2018). Classification of Mobile Ad Hoc Networks Attacks. Chulalongkorn University provided by UniNet, 618-624.
·         Singh, J., Dutta, P., & Chakrabarti, A. (2018). Ad Hoc Networks (1 ed.). Springer Singapore. doi:https://doi.org/10.1007/978-981-10-8770-7.
·         Stukova , I., & Crawford, B. (2019, Lune). Short-Term Self-Moving Tactical Networks In Austere Environments. Master Of Science In Network Operations And Technology, 123. Monterey, California.
·         Toh, C., Lee, E., & Ramos, N. (2004). Next-generation tactical ad hoc mobile wireless. Technology Review Journal, 125.