REVEAL: Real-time Evaluation and Verification of External Adversarial Links

Alexander Marder, Jon Larrea, Kc Claffy, Erik Kline, Kyle Jamieson, Bradley Huffaker, Lincoln Thurlow, Matthew Luckie

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Department of Defense (DOD) use of commercial networks entails unprecedented reliance on untrusted third-party communications infrastructure, and the associated risk of exposing DOD communications to an adversary. Traversing adversary-controlled infrastructure allows DOD's adversaries to recognize, disrupt, or extract intelligence even from encrypted communications. The resulting arms race of obfuscation vs intelligence techniques has an inherent limitation: with each new obfuscation, DOD can never know if it fools the adversary, or if the adversary is simply lulling DOD into a false sense of security.We believe the next great capability leap for operating through commercial networks will likely come from sophisticated analytics that provide situational awareness of the threats within the communications infrastructure, and implementations that dynamically route communications along benign paths. These systems will restructure communication paths to avoid adversary-controlled infrastructure within the cellular networks and the broader Internet, adding depth to existing DOD defenses and keeping communications unobservable by the adversary.In this paper, we describe our vision for this emerging conceptual framework. We first describe the threat model for DOD communications and use cases that motivate our approach. We then discuss specific threats for each component of the cellular communication infrastructure- - radio access network, mobile core, and Internet- - and our vision for securing communications against those threats. For the radio access network and Internet components, we also describe proofs-of-concept for our proposed approaches, demonstrating their feasibility.

Original languageAmerican English
Title of host publication2024 IEEE Military Communications Conference, MILCOM 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1106-1111
Number of pages6
ISBN (Electronic)9798350374230
DOIs
StatePublished - 2024
Event2024 IEEE Military Communications Conference, MILCOM 2024 - Washington, United States
Duration: Oct 28 2024Nov 1 2024

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Conference

Conference2024 IEEE Military Communications Conference, MILCOM 2024
Country/TerritoryUnited States
CityWashington
Period10/28/2411/1/24

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Keywords

  • 5G
  • emerging concepts
  • mobile
  • security
  • wireless

Fingerprint

Dive into the research topics of 'REVEAL: Real-time Evaluation and Verification of External Adversarial Links'. Together they form a unique fingerprint.

Cite this