Abstract
AbstractSuccessful missions in the field often rely upon communication technologies for tactics and coordination. One middleware used in securing these communication channels is Data Distribution Service (DDS) which employs a publish-subscribe model. However, researchers have found several security vulnerabilities in DDS implementations. DDS-Cerberus (DDS-C) is a security layer implemented into DDS to mitigate impersonation attacks using Kerberos authentication and ticketing. Even with the addition of DDS-C, the real-time message sending of DDS also needs to be upheld. This paper extends our previous work to analyze DDS-C’s impact on performance in a use case implementation. The use case covers an artificial intelligence (AI) scenario that connects edge sensors across a commercial network. Specifically, it characterizes how DDS-C performs between unmanned aerial vehicles (UAV), the cloud, and video streams for facial recognition. The experiments send a set number of video frames over the network using DDS to be processed by AI and displayed on a screen. An evaluation of network traffic using DDS-C revealed that it was not statistically significant compared to DDS for the majority of the configuration runs. The results demonstrate that DDS-C provides security benefits without significantly hindering the overall performance.
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference27 articles.
1. Sánchez R, Evans J, Minden G (1999) Networking on the battlefield: challenges in highly dynamic multi-hop wireless networks, In: MILCOM 1999, IEEE military communications, conference proceedings (Cat. No. 99CH36341), vol. 2, p 751-755, IEEE
2. Munir A, Kwon J, Lee JH, Kong J, Blasch E, Aved AJ, Muhammad K (2021) FogSurv: a fog-assisted architecture for urban surveillance using artificial intelligence and data fusion, IEEE Access, 9, 111938–111959.
3. Nobre J, Rosario D, Both C, Cerqueira E, Gerla M (2016) Toward software-defined battlefield networking, IEEE Commun Mag 54(10):152–157. https://doi.org/10.1109/MCOM.2016.7588285
4. Object Management Group: OMG Standards for Industries, https://www.omg.org/industries/index.htm. Accessed 11 Oct 2021
5. Abdulghani RM, Alrehili MM, Almuhanna AA, Alhazmi OH (2020) Vulnerabilities and security issues in IoT protocols, In: 2020 First international conference of smart systems and emerging technologies (SMARTTECH), p 7–12, IEEE