KEYWORDS: Information security, Computer security, Data processing, Control systems, Network security, Data modeling, Systems modeling, Receivers, Prototyping, Lithium
Battlefield monitoring involves collecting streaming data from different sources, transmitting the data over a
heterogeneous network, and processing queries in real-time in order to respond to events in a timely manner.
Nodes in these networks differ with respect to their trustworthiness, processing, storage, and communication
capabilities. Links in the network differ with respect to their communication bandwidth. The topology of the
network itself is subject to change, as the nodes and links may become unavailable. Continuous queries executed
in such environments must also meet some quality of service (QoS) requirements, such as, response time and
throughput. Data streams generated from the various nodes in the network belong to different security levels;
consequently, these must be processed in a secure manner without causing unauthorized leakage or modification.
Towards this end, we demonstrate how an existing complex event processing system can be extended to execute
queries and events in a secure manner in such a dynamic and heterogeneous environment.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.