Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Security and Formation of Network-Centric Operations

  • Chapter
Computation, Cryptography, and Network Security
  • 2343 Accesses

Abstract

After giving definitions and background information of key terms, we report and analyze the multi-layer graph model of network centric operations (NCOs), and we mention its advantages. Moreover, we investigate security problem of NCOs by applying methods of vertex pursuit games. Finally, in Sect. 6 we take up with the problem of network centric warfare strategic formation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now
Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Douglas B. West, Introduction to Graph Theory. Upper Saddle River, NJ: Prentice Hall, 2001.

References

  1. Aigner, M., Fromme, M.: A game of cops and robbers. Discrete Appl. Math. 8, 1–12 (1984)

    Article  MathSciNet  MATH  Google Scholar 

  2. Alberts, D.S., Garstka, J.J., Stein, F.P.: Network Centric Warfare: Developing and Leveraging Information Superiority, 2nd edn. (Revised). CCRP Publication Series, Washington (2002)

    Google Scholar 

  3. Alspach, B.: Sweeping and searching in graphs: a brief survey. Matematiche 59, 5–37 (2006)

    MathSciNet  Google Scholar 

  4. Blume, L., Easley, D., Kleinberg, J., Kleinberg, R., Tardos, E.: Network formation in the presence of contagious risk. In: Proceedings of the 12th ACM Conference on Electronic Commerce, pp. 1–10 (2011)

    Google Scholar 

  5. Bonato, A.: A Course on the Web Graph. American Mathematical Society Graduate Studies Series in Mathematics. American Mathematical Society, Providence (2008)

    Book  MATH  Google Scholar 

  6. Bonato, A., Hahn, G., Wang, C.: The cop density of a graph. Contrib. Discret. Math. 2, 133–144 (2007)

    MathSciNet  MATH  Google Scholar 

  7. Bonato, A., PraΓat, P., Wang, C.: Pursuit-evasion in models of complex networks. Internet Math. 4(4), 299–436 (2007)

    Google Scholar 

  8. Bonato, A., PraΓlat, P., Wang, C.: Vertex pursuit games in stochastic network models. In: Proceedings of the 4th Workshop on Combinatorial and Algorithmic Aspects of Networking (2007)

    Google Scholar 

  9. Borgatti, S.P., Everett M.G., Freeman, L.C.: UCINET user’s manual. Analytic Technologies, Harvard (2006)

    Google Scholar 

  10. Chung, F.R.K., Lu, L.: Complex Graphs and Networks. American Mathematical Society, Providence (2004)

    Google Scholar 

  11. Chung, F.R.K., Lu, L.: The average distance in a random graph with given expected degrees. Internet Math. 1, 91–114 (2006)

    Article  MathSciNet  Google Scholar 

  12. Jackson, M.O.: Social and Economic Networks. Princeton University Press, Princeton (2008)

    MATH  Google Scholar 

  13. Jackson, M.O., Watts, A.: The evolution of social and economic networks. J. Econ. Theory 106, 265–295 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  14. Jackson, M.O., Wolinsky, A.: A strategic model of social and economic networks. J. Econ. Theory 71(0108), 44–74 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  15. Fomin, F.V., Thilikos, D.: An annotated bibliography on guaranteed graph searching. Theor. Comput. Sci. 399, 236–245 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  16. Gao, J., Buldyrev, S.V., Stanley, H.E., Havlin, S.: Networks formed from interdependent networks. Nat. Phys. 8, 40–48 (2012)

    Article  Google Scholar 

  17. Goyal S., Vigier A.: Robust networks. Working Paper (2011)

    Google Scholar 

  18. Hahn, G.: Cops, robbers and graphs. Tatra Mt. Math. Publ. 36, 163–176 (2007)

    MathSciNet  MATH  Google Scholar 

  19. Hanneman R.A., Riddle, M.: Introduction to Social Network Methods. University of California, Riverside. http://faculty.ucr.edu/~hanneman/ (2005). Accessed 9 July 2006

  20. Kearns, M., Judd, S., Vorobeychik, Y.: Behavioral experiments on a network formation game. In: Proceedings of the 13th ACM Conference on Electronic Commerce, pp. 690–704 (2012)

    Google Scholar 

  21. Network Centric Operations Conceptual Framework. Version 1.0, November 2003, http://www.dtic.mil/dtic/tr/fulltext/u2/a457620.pdf

  22. Neufeld, S., Nowakowski, R.: A game of cops and robbers played on products of graphs. Discret. Math. 186, 253–268 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  23. Nowakowski, R., Winkler, P.: Vertex to vertex pursuit in a graph. Discret. Math. 43, 230–239 (1983)

    MathSciNet  Google Scholar 

  24. Quilliot, A.: Jeux et pointes fixes sur les graphes. Ph.D. Dissertation, Universit\(\iota\) de Paris VI (1978)

    Google Scholar 

  25. Schneider, C.M., Araujo, N.A.M., Havlin, S., Herrmann, H.J.: Toward designing robust coupled networks, arXiv:1106.3234 [condmat. stat-mech] (2011)

    Google Scholar 

  26. Shahrivar, E.M., Sundaram, S.: Strategic multi-layer network formation. In: 52nd IEEE Conference on Decision and Control, Florence, pp. 582–587, 10–13 December 2013

    Google Scholar 

  27. West, D.B.: Introduction to Graph Theory. Prentice Hall, Upper Saddle River (2001)

    Google Scholar 

  28. Wilson, C.: Network centric warfare: background and oversight issues for Congress. Congressional Research Service, The Library of Congress. http://www.fas.org/sgp/crs/natsec/RL32411.pdf (2007)

  29. Wong-Jiru, A.: Major, USAF, graph theoretical analysis of network centric operations using multi-layer models. Thesis, Air Force Institute of Technology, Department of the Air Force, Air University, Wright-Patterson Air Force Base, Ohio (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nicholas J. Daras .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Daras, N.J. (2015). Security and Formation of Network-Centric Operations. In: Daras, N., Rassias, M. (eds) Computation, Cryptography, and Network Security. Springer, Cham. https://doi.org/10.1007/978-3-319-18275-9_6

Download citation

Publish with us

Policies and ethics