D-CEWS: DEVS-Based Cyber-Electronic Warfare M&S Framework for Enhanced Communication Effectiveness Analysis in Battlefield
Abstract
:1. Introduction
1.1. Problem Statement and Functional Limitation in Tactical M&S
1.2. Research Gap and Major Contributions
1.3. Paper Structure
2. Literature Review
2.1. Agent-Based Battlefield M&S
2.2. Communication Metric-Based M&S
2.3. Difference in the Proposed Framework
- Full-scale modeling and simulation based on the cyber-electronic warfare: Most previously reported formal research only focused on communication effects and related engagement effects using a small set of communication indicators. In addition, concerning cyber-security subjects, studies have been performed based only on general domains that are unlikely to be realized in an actual military M&S communication environment, such as malicious payload-frame injection. However, the present study is based on the D-CEWS framework, simulating various wireless threats such as electronic warfare-based jamming, cyber-warfare-based routing attacks, and worm attacks, all of which are considered to be potentially high in the actual tactical environment, especially in the battalion-level dynamic wireless communication network. D-CEWS was also used to determine whether operational efficiency was enhanced or reduced as a result of communication issues per threat type by modeling this with the confidentiality, integrity, and availability (CIA) concepts.
- Configuration of countermeasures dedicated to each threat: The adaptive countermeasures of friendly blue defenders against various wireless threats such as jamming, man-in-the-middle attack and spoofing, DDoS, blackhole and wormhole-based routing attacks, and network worm propagation–infection threats were also standardized as zero-sum-based anti-jamming in the case of jamming. In addition, changes in the operational efficiency of the relevant blue forces were also simulated. This approach can be presented as an M&S idea that can solve the security limitations caused by heterogeneity in the military tactical network [22,23,24].
- Securing the practicality and reliability of M&S: Unlike other studies that have been officially reported, all of the parameters and derived results presented in this study were similarly standardized within the NS-3-based background with reference to the specification information operating in the actual battalion-level tactical unmanned system environment.
- Achieving game-theory-based optimization of attack and defense behavior: Previous studies have performed normalization and optimization of simulated results by repeatedly performing M&S or adjusting key parameters as statistically significant error values were applied. The optimization method based on the rewards for each executing assault and defense was standardized in this study by upgrading to a zero-sum-based game-theory context, further systematizing the approach. This approach was inspired by the direction of simulating the competitive behavior of actors by major threats in the wireless network [25,26].
3. Principles of Decision for the Proposed Work
3.1. Definition of D-CEWS (DEVS-Based Cyber-Electronic Warfare M&S) Framework
3.2. Implementation of Zero-Sum-Based Dynamic Game Component
- is the set of actors, is the opposing force, and is the unmanned defender. In this case, depending on the directivity of payoff, signaling, and feedback by an actor in a random episode, the opposing force was configured as an active cyber-electronic warfare threat leader and sender. The unmanned defender was configured as a passive, reactive follower and receiver, or, conversely, the unmanned defender was formulated as dynamic cyber-electronic warfare responding leader and sender. The opposing forces are formulated as passive naïve followers and receivers.
- , , and are sets of actor types; is defined as an element of the proactive or reactive event set-based private information of the unmanned defender , and is defined as an element of cyber-electronic warfare threat element set-based private information of the opposing force . The types were either divided or combined with the abstraction based on the abilities to add and subtract rewards by actor, and the unmanned defender, which has a nondeterministic response logic set group, versus the opposing force decisively composing the element set with the intelligence validity of the unmanned defender, which is termed ρ.
- , , and are sets of game strategies related to mutual zero-sum competition between each opposing force and the unmanned defender , which are composed based on the sender and receiver signaling relations. is defined as a strategy group based on the proactive or reactive event sets possessed by the defender, and is defined as a strategy group based on the sets of cyber-electronic warfare threat elements possessed by the opposing force as effective defender surface information.
- , , and are the sets of signals of the opposing force and the unmanned defender , which are selected or deselected depending on the actor’s active or passive signaling mechanisms. The opposing force has as the leading attack signal set to achieve invasion through the selected arbitrary cyber-electronic warfare threat, and the unmanned defender has as a leading defense signal set for complete detection, avoidance, and prevention of the opposing force’s threat.
- is a set of finite states based on and in the game component and defines multi-level and transitivity in the cyber-electronic warfare threat–response environment along with actions.
- , , and are finite sets of actions of the opposing force and unmanned defender for . defines the defender’s detection, defending, or false negative actions for as a transitive relationship. defines the attacker’s actions for such as reconnaissance and search for the attack point of the opposing force on .
- is a probability distribution function to calculate the probability of reaching when the opposing force performs the action referred to as and the unmanned defender performs the action termed in in the episode.
- is a function that calculates rewards obtainable based on the judgment of the actor in the episode when the opposing force group and the unmanned defender perform the actions termed and , respectively, in Therefore, the actors compete in the direction to maximize reward.
- is a signaling-based discount factor function, which cuts off the judgment ranges by an actor within [0, 1] to attenuate the effects of the signaling behaviors by an actor. Furthermore, with the limited views by the actor, it simulates the pre- and post-competitive strategy judgments by an actor in the leader–follower relationship along with the discrete flow of time.
4. Construction of Cyber-Electronic Warfare Environment in D-CEWS
4.1. Configuration of Unmanned Aerial System with Swarming Communication Drones
4.2. Classification of Cyber-Electronic Warfare-Based Wireless Threat Types
- Multi-layered jamming: It is an electronic warfare attack to disrupt the radio communication behavior of the optimized friendly network based on various jammer types such as constant type and reactive type. It mainly performs information transmission and reception disturbances between targets in consideration of main radio wave characteristics such as a directional communication channel and frequency. At this time, these multi-layered jamming attacks can achieve service availability infringement and occupation of the target through the most simplified attack vector and decision logic. In addition, it can be formalized as an initial starting point to improve the possibility for success of electronic-protocol vulnerability-based exploits and more in-depth complex cyber-electronic warfare threat types, such as privilege escalation or side-channel attacks.
- MITM (man-in-the-middle) attack: It is a cyber-warfare attack in which a malicious attacker secretly penetrates a communication channel between a legitimate sender and receiver to eavesdrop, steal, steal, or modify packet information. This is also constituted as a representative logic for determining hidden intrusion and covert activity as a form of cyber-attack. At this time, these man-in-the-middle attacks can also be composed of a spoofing threat to be described, and a starting point vector that is basically applied to blackhole- and wormhole-based routing attacks.
- Spoofing: It is a cyber-warfare attack that bypasses the prescribed access control rules in the network in response to the request of a specific target as if it were a legitimate actor. It is mainly combined with MAC-based deception and masquerade attacks, GPS spoofing, and GNSS spoofing.
- DDoS (distributed denial-of-service) attack: It is a denial-of-service cyber-warfare attack that severely depletes the limited resources of the target and service specifications while neutralizing the target’s detection and blocking, and backtrack-based countermeasures to a certain extent. It is a logic that projects and pulses a number of illegal requests, mainly periodically or asynchronously and is also used as an artificial noise-inducing technique to safely perform an exploit-based deep attack vector while hiding it. In addition, this DDoS can also be formalized as a primary attack sequence that delays the target’s response so that other types of cyber-electronic warfare threats can succeed more easily.
- Blockhole attack: Unlike other cyber-electronic warfare threats, it is a threat type that is more specialized in an ad hoc network structure. It is a routing attack-based cyber warfare threat type that absorbs all packets by projecting false routing information from the attacker to the target node that has requested an optimized real-time routing path.
- Wormhole attack: It is an advanced, route-based cyber-warfare threat type based on the blackhole attack that performs a specialized routing attack on the target and evades the response system by using the shortest concealed tunnel amongst numerous cooperating bad actors to evade the response system.
- Network worm propagation–infection: It is a cyber-warfare attack that disrupts the overall operation of the target network by replicating itself at the malicious application level in a specific host and arbitrary service, then artificially propagating and infecting it through a communication protocol. At that time, unlike other cyber-electronic warfare threats, this attack was introduced as a type that could determine the specific attack logic at the only program level. Therefore, it can be standardized as an initial concept that can be used when constructing an in-depth attack logic or related detailed vector direction related to international security level standard concepts such as CVE (common vulnerabilities and exposures) and CVSS (common vulnerability scoring system).
- The prior information and related intelligence required for the opposing forces to attack arbitrary master or slave drones in the swarm drone system, which is the target of an attack, should be minimized except for essential communication values (e.g., frequency, bandwidth, etc.), and the attack time should be short.
- Since the attack should be specialized as an availability disturbance attack based on a multi-hop wireless ad hoc based unmanned reconnaissance platform, the detailed attack vector should be configurable only based on the wireless network characteristics, excluding the brigade level or higher-level wired network characteristics.
- The execution process from the start of attack to the final success should be simple.
- The form of initial attack contact point interface should be provided as a ”starting point” so that successive attack chains can be formulated because the types of threats are not limited to the threat types buried in the scope of simple cyber warfare or electronic warfare, etc., but were fused into cyber-electronic warfare.
- It should also be easy to define friendly forces’ active–adaptive countermeasure-based interventions in opposing forces’ attack activities.
- They should be able to have specialized detailed attack vectors as confidentiality and integrity compromise attacks on multi-hop wireless ad hoc based unmanned reconnaissance platforms.
- They should be able to perform relevant exploit actions in a simple wired legacy environment and through radio wave radiation. In addition, they should be able to target any ground combat platform that is advanced based on All-IP.
- Beyond simply interfering with the sending and receiving of reconnaissance information of the friendly swarm drone system as with the multi-layered jamming threat described above, they must simulate the actions of the opposing forces’ agent who can read, take over, or modify the reconnaissance information.
- Legitimate existing sender-friendly drones and receiver-friendly commanders should not be able to immediately catch the relevant threatening actions, in contrast to the multi-layered jamming threats, which are immediately detectable with changes in the communication entropy based on metrics such as the packet delivery rate and received signal strength.
- Depending on the strength of the attack, the degree of damage to confidentiality, integrity, and availability should be dynamically changeable. Accordingly, the increase or decrease in operational efficiency should also be able to accompany.
- Existing jamming threats that cause availability disruption develop plenty of attack channels that the target can follow all the way back to the propagation terminal. It exposed many diverse residual artifacts (e.g., jammer location and size, jammer radiation range and three-dimensional movable range, etc.) through the analysis of the directivity of radiated radio energy. Accordingly, existing defenders can easily detect and neutralize it, either by reversely jammed or physically removed with invisible firepower projection. In order to minimize the reduction in attack and survival efficiency due to these countermeasures, it can be diversified and utilized as complex jammer types such as deceptive jamming and side-channel jamming. Eventually, the availability disturbance threat behaviors for the radio wave-based physical layer and the TCP and UDP-based network-transmission layer should be simulated to minimize the attenuation of the attack efficiency by the defender’s countermeasure actions, such as detection, evasion, prevention, and traceback. In addition, such threats should be able to target even the most advanced arbitrary ground combat platform based on All-IP.
- In the case of the multi-layered jamming threat described above, the variables per se, such as the radiation, period, and pattern of jamming energy, were divided by jammer type when they were operated. As a result, it should be able to create tradeoffs that benefit the attacker so that the limitation as a whole can be reinforced while the possibility of causing damage to the jamming type’s availability can be retained as much as possible.
- The attack should be optimizable as burst-based pulsing or constant-type attacks considering the target and communication environment at the wireless network protocol level.
- Similar to jammer threats, the degree of damage of availability should be dynamically and rapidly changeable according to the strength of the attacks, and it should be possible to accompany the increase or decrease in operational efficiency accordingly.
- The previously mentioned cyber-electronic warfare threats were not introduced as specialized threat types to perform optimum attacks in multi-hop-based dynamic wireless ad hoc environments, but were instead developed with the current legacy type of wired/wireless network–host topology in mind. Therefore, the threats that consider all the unique characteristics (collaborative routing and anomaly detection, node joining and leaving, etc.) cultivated by the wireless ad hoc network concept per se should be removed. The attack efficiency in comparison with existing threats should also be improved.
- It should be able to possess specialized, detailed attack vectors as attacks that cause damage to the confidentiality, integrity, and availability of multi-hop wireless ad hoc based unmanned reconnaissance platforms. It should also be able to exploit actions centering on wireless ad hoc. In addition, it should be able to target any ground combat platform that was advanced based on the All-IP environment.
- For changes in network transmission and reception based on perturbation, viewing and hijacking, unauthorized modification, etc., legitimate existing sender-friendly drones and receiver-friendly commanders should not be able to easily catch the threat.
- The concept of multiple malicious collaborators should be considered, and a complex attack chain against it should also be configurable.
- The multi-layered jamming and DDoS, which were predefined to cause a threat to the availability within the friendly swarm communication drone system for reconnaissance reporting that was turning around, have a limitation that the opposing force should always be projecting directional radio waves or network access to the friendly drone system without fail. That is, if the opposing forces are unable to gradually improve attack efficiency due to the friendly drone system’s immediate response actions, the longer the attack duration, the greater the chance of exposing meaningful artifacts to friendly forces and being targeted as an object of traceback and invisible firepower projection. Accordingly, an advanced attack type in the form of APT (advanced persistent threat) should be created and presentable from the perspective of M&S so that threats to the friendly forces can be automatically carried out at the application level with only one successful attacker-led invasion and exploitation.
- It should be possible to construct a kill chain that can maximize the induction of the target’s cognitive bias to be compatible with the more sophisticated social engineering attack concept for military operating environments such as disinformation and deception.
- Beyond simply occupying friendly networks, it should also be able to take over control.
- It should be possible to achieve the threat state and the occupation of the target node more quickly.
5. Simulation and Results
5.1. Modeling of Battlefield Scenarios and Related Parameters
Parameter (1/2) | Value | Parameter (2/2) | Value |
---|---|---|---|
Simulation time (s) | 100~1000 | Delay model | Constant speed propagation |
Number of runs | 10 | Loss model | Friis, TwoRayGround |
Size of battlefield (m) | 1000 × 1000~3000 × 3000 | Mobility model | Constant position |
Number of slaves | 10 | TCP/IP stack | IEEE 802.11b |
Number of master and GCS | 1 | Transmission power (dBm) | 5~47 |
Channel model | DSSS, OFDM (WNW [34]) | Packet interval (s) | 0.01~1 |
Channel capacity (Mbps) | 1~11 | Guard interval (ns) | 1600 |
Bandwidth (Mbps) | 0.128~10 | Tx gain, Rx gain (dB) | −1, −10 |
Frequency (MHz) | 22 | Routing protocol | AODV |
Packet size (byte) | 32~1024 | Authentication algorithm | ECDSA-based |
Velocity of drones (m/s) | 2~10 | Number of mission points | 1 |
PER and BER reference | NIST model | Engagement distance (m) | 100~1000 |
Main mission | Reconnaissance report | Behavior for main mission | Communication relay |
5.2. Experimental Results
6. Discussion
- Scalability and diversity issues: All the derived results of the simulation are limited to showing the communication effect and engagement effect on the cyber-electronic warfare threats that occurred within the unilateral C2 channel from the perspective of the drone performing the reconnaissance report and the entire squads centered on the commander. That is, the M&S according to threats to platforms other than drones should be considered, and detailed simulation effect analysis by combat unit performing actual engagement should also be performed. Furthermore, in addition to the PDR and RSS-based experimental results, additional communication metrics such as PER, BER, throughput, bandwidth, reliability, latency, load, routing, and resource should also be considered to conduct effect analysis. Variables specialized in the cyber-environment such as attack success probability, defense success probability, transmission success probability for reconnaissance, and measure of effectiveness for combat, etc., should also be considered.
- Reliability and practicality issues: Although this study is a DEVS-based M&S study that considers the complexity related to cyber-electronic warfare threats in the rapidly changing tactical network operating environment following military modernization, the experimental results cannot represent the actual battlefield environment due to the nature of the research field. Accordingly, it is necessary to secure the reliability of the model through additional verification routines such as augmentation and normalization.
- Issue of quantitative comparison to previous studies: According to the authors’ maximum investigation and judgment, M&S studies on military communication effects and combat effects related to cyber-electronic warfare threats have not been officially reported. That is, it is difficult to quantitatively compare the proposed studies with similar research fields by attribute. Since this situation should be due to the fact that proposed this study based on D-CEWS first identified cyber-electronic warfare threats not considered in previous studies and applied the threats to a virtualized warfare environment to simulate the effect analysis in order to fully secure the distinction of this study, it will be necessary to additionally derive simulation results related to the definition of meaningful tactical operation scenarios.
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Army Modernization Strategy. Available online: https://www.army.mil/e2/downloads/rv7/2019_army_modernization_strategy_final.pdf (accessed on 7 March 2022).
- Bonabeau, E. Agent-based modeling: Methods and techniques for simulating human systems. Proc. Natl. Acad. Sci. USA 2002, 99, 7280–7287. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Choi, S.; Kwon, O.J.; Oh, H.; Shin, D. Method for effectiveness assessment of electronic warfare systems in cyberspace. Symmetry 2020, 12, 2107. [Google Scholar] [CrossRef]
- DOD C3 Modernization Strategy. Available online: https://dodcio.defense.gov/Portals/0/Documents/DoD-C3-Strategy.pdf (accessed on 7 March 2022).
- Tague, P.; Li, M.; Poovendran, R. Mitigation of control channel jamming under node capture attacks. IEEE Trans. Mob. Comput. 2009, 8, 1221–1234. [Google Scholar] [CrossRef] [Green Version]
- Conti, M.; Dragoni, N.; Lesyk, V. A Survey of Man in the Middle Attacks. IEEE Commun. Surv. Tutor. 2016, 18, 2027–2051. [Google Scholar] [CrossRef]
- Schmidt, D.; Radke, K.; Camtepe, S.; Foo, E.; Ren, M. A survey and analysis of the GNSS spoofing threat and countermeasures. ACM Comput. Surv. 2016, 48, 1–31. [Google Scholar] [CrossRef]
- Zargar, S.T.; Joshi, J.; Tipper, D. A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks. IEEE Commun. Surv. Tutor. 2013, 15, 2046–2069. [Google Scholar] [CrossRef] [Green Version]
- Tseng, F.H.; Chou, L.D.; Chao, H.C. A survey of black hole attacks in wireless mobile ad hoc networks. Hum. Cent. Comput. Inf. Sci. 2011, 1, 4. [Google Scholar] [CrossRef] [Green Version]
- Meghdadi, M.; Ozdemir, S.; Güler, I. A survey of wormhole-based attacks and their countermeasures in wireless sensor networks. IETE Tech. Rev. 2011, 28, 89–102. [Google Scholar] [CrossRef]
- Kaur, R.; Singh, M. A survey on zero-day polymorphic worm detection techniques. IEEE Commun. Surv. Tutor. 2014, 16, 1520–1549. [Google Scholar] [CrossRef]
- Hayward, P. The Measurement of Combat Effectiveness. Oper. Res. 1968, 16, 314–323. [Google Scholar] [CrossRef]
- Cil, I.; Mala, M. A multi-agent architecture for modelling and simulation of small military unit combat in asymmetric warfare. Expert Syst. Appl. 2010, 37, 1331–1343. [Google Scholar] [CrossRef]
- Seo, K.M.; Choi, C.; Kim, T.G.; Kim, J.H. DEVS-based combat modeling for engagement-level simulation. Simul. Trans. Soc. Model. Simul. Int. 2014, 90, 759–781. [Google Scholar] [CrossRef]
- Connors, C.D.; Miller, J.O.; Lunday, B.J. Using agent-based modeling and a designed experiment to simulate and analyze a new air-to-air missile. J. Def. Model. Simul. 2016, 13, 321–330. [Google Scholar] [CrossRef]
- Thompson, B.; Morris-King, J. An agent-based modeling framework for cybersecurity in mobile tactical networks. J. Def. Model. Simul. 2018, 15, 205–218. [Google Scholar] [CrossRef] [Green Version]
- Shin, K.; Nam, H.; Lee, T. Communication Modeling for a Combat Simulation in a Network Centric Warfare Environment. In Proceedings of the 2013 Winter Simulations Conference (WSC), Washington, DC, USA, 8–11 December 2013; pp. 1503–1514. [Google Scholar]
- Li, Y.; Baccelli, F.; Dhillon, H.S.; Andrews, J.G. Statistical Modeling and Probabilistic Analysis of Cellular Networks with Determinantal Point Processes. IEEE Trans. Commun. 2015, 63, 3405–3422. [Google Scholar] [CrossRef] [Green Version]
- Akhtar, N.; Ergen, S.C.; Ozkasap, O. Vehicle mobility and communication channel models for realistic and efficient highway VANET simulation. IEEE Trans. Veh. Technol. 2015, 64, 248–262. [Google Scholar] [CrossRef]
- Regragui, Y.; Moussa, N. Agent-based system simulation of wireless battlefield networks. Comput. Electr. Eng. 2016, 56, 313–333. [Google Scholar] [CrossRef] [Green Version]
- Lee, J.; Shin, S.; Park, M.; Kim, C. Agent-based simulation and its application to analyze combat effectiveness in network-centric warfare considering communication failure environments. Math. Probl. Eng. 2018, 2018, 2730671. [Google Scholar] [CrossRef] [Green Version]
- Gao, X.; Li, K.; Chen, B. Invulnerability Measure of a Military Heterogeneous Network Based on Network Structure Entropy. IEEE Access 2017, 6, 6700–6708. [Google Scholar] [CrossRef]
- Li, J.; Jiang, J.; Yang, K.; Chen, Y. Research on Functional Robustness of Heterogeneous Combat Networks. IEEE Syst. J. 2019, 13, 1487–1495. [Google Scholar] [CrossRef]
- Jia, G.; Zhou, J. Effectiveness evaluation method of application of mobile communication system based on factor analysis. Sensors 2021, 21, 5414. [Google Scholar] [CrossRef] [PubMed]
- Abdalzaher, M.S.; Seddik, K.; Elsabrouty, M.; Muta, O.; Furukawa, H.; Abdel-Rahman, A. Game theory meets wireless sensor networks security requirements and threats mitigation: A survey. Sensors 2016, 16, 1003. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Pirayesh, H.; Zeng, H. Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2022, 1–39. [Google Scholar] [CrossRef]
- Seo, S.; Kim, D. SOD2G: A Study on a Social-Engineering Organizational Defensive Deception Game Framework through Optimization of Spatiotemporal MTD and Decoy Conflict. Electronics 2021, 10, 3012. [Google Scholar] [CrossRef]
- Park, S.; Kim, H.T.; Lee, S.; Joo, H.; Kim, H. Survey on Anti-Drone Systems: Components, Designs, and Challenges. IEEE Access 2021, 9, 42635–42659. [Google Scholar] [CrossRef]
- Mekdad, Y.; Aris, A.; Babun, L.; Fergougui, A.E.; Conti, M.; Lazzeretti, R.; Uluagac, A.S. A Survey on Security and Privacy Issues of UAVs. arXiv 2021, arXiv:2109.14442. [Google Scholar]
- Hassija, V.; Chamola, V.; Agrawal, A.; Goyal, A.; Luong, N.C.; Niyato, D.; Yu, F.R.; Guizani, M. Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2021, 23, 2802–2832. [Google Scholar] [CrossRef]
- Wireless Jamming Model. Available online: https://www.nsnam.org/wiki/Wireless_jamming_model (accessed on 7 March 2022).
- Toutonji, O.A.; Yoo, S.M.; Park, M. Stability analysis of VEISV propagation modeling for network worm attack. Appl. Math. Model. 2012, 36, 2751–2761. [Google Scholar] [CrossRef]
- Wang, Y.; Wen, S.; Xiang, Y.; Zhou, W. Modeling the propagation of worms in networks: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 942–960. [Google Scholar] [CrossRef]
- Wideband Networking Waveform OFDM PHY. Available online: https://web.archive.org/web/20140312224424/http://www.spectrumsignal.com/products/pdf/wnw_ofdm_web.pdf (accessed on 7 March 2022).
- Mireles, J.D.; Ficke, E.; Cho, J.H.; Hurley, P.; Xu, S. Metrics towards measuring cyber agility. IEEE Trans. Inf. Forensics Secur. 2019, 14, 3217–3232. [Google Scholar] [CrossRef] [Green Version]
- Muhati, E.; Rawat, D.B. Hidden Markov Model Enabled Prediction and Visualization of Cyber Agility in IoT era. IEEE Internet Things J. 2021, 1–11. [Google Scholar] [CrossRef]
- Pawlick, J.; Colbert, E.; Zhu, Q. A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Comput. Surv. 2019, 52, 1–28. [Google Scholar] [CrossRef] [Green Version]
Parameter (1/2) | Value | Parameter (2/2) | Value |
---|---|---|---|
Number of jammers | 1~4 | Energy supply of jammer (J) | 50~100 |
Jammer type | Reactive | Response coefficient of jammer (%) | 20~100 |
Initial jammer power (W) | 0.1~0.5 | Update period (s) | 0.005~1.0 |
Maximum permissible jammer power (W) | 0.5~1.0 | Radiation angle (°) | 5~60 (directivity) |
Preparation time for radiation (s) | 7 | Response time for anti-jamming (s) | 20 |
Types | Major Parameter | Value |
---|---|---|
MITM with MAC spoofing | Number of MITM nodes | 1~3 |
Number of fake MAC address pair | 0~3 | |
Probability of sniffing (%) | 50~100 | |
Signal probability of spoofing (%) | 70~100 | |
Probability of theft (%) | 10~30 | |
DDoS | Bulk payload (byte) | 1000~500,000 |
Burst pulsing rate (Kbps) | 2560~655,360 | |
Delay time of DoS (s) | 0.001~1.0 | |
Number of zombies | 10~100 | |
Blackhole attack | Signal probability of false routing information (%) | 30~100 |
Probability of masquerade (%) | 20~80 | |
Probability of perturbation (%) | 20~80 | |
Wormhole attack | Number of collaborative attackers with tunnel | 2~5 |
Probability of collaborative masquerade (%) | 5~50 | |
Probability of collaborative perturbation (%) | 5~50 | |
Worm propagation and infection | Worm model | SIR-based UDP worm |
Number of scan rate each infected node | 100~500 | |
Payload (byte) | 32~1024 | |
Vulnerability (%) | 10~100 | |
Probability of infection (%) | 10~90 | |
Number of interconnected drones | 0~4 | |
Number of internal components in target | 4~32 | |
Number of links between components inside the drone | 4~32 |
Battlefield | ||
---|---|---|
1000 × 1000~3000 × 3000 Plane map in NS-3 | ||
Combat unit | ||
Blue force | Tanks and infantry | 10, 10 |
Squad commander | 1 | |
Drones | 11 | |
Red force | Ground vehicles and infantry | 5, 5 |
Cyber-electronic warfare agents | 1 | |
PoD and PoH in combat scenario | ||
Blue force | POD of blue force (%) | |
POH of blue force (%) | ||
Red force | POD of red force (%) | |
POH of red force (%) |
Threat Type | Functional Damage Effect in Battlefield | |||||||
---|---|---|---|---|---|---|---|---|
Message Interchange | Communication Relay | Movement | Detection | Fire | ||||
Transmission | Receive | Eavesdropping of Sender | Eavesdropping of Receiver | |||||
Multi-layered jamming | X | X | O (when eavesdropping jammers are used, △) | O (when eavesdropping jammers are used, △) | X | ▲ | ▲ (partial) | O |
MITM with MAC spoofing | O | X | △ | △ | △ | ▲ | O | O |
DDoS | X | X | O | O | X | ▲ | ▲ (partial) | O |
Blockhole attack | O | ▲ | △ | △ | ▲ | ▲ (partial) | O | O |
Wormhole attack | O | ▲ | △ | △ | ▲ | ▲ (partial) | O | O |
Worm propagation and infection | ▲ (partial) | X | O | O | X | ▲ | O | O |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Seo, S.; Han, S.; Kim, D. D-CEWS: DEVS-Based Cyber-Electronic Warfare M&S Framework for Enhanced Communication Effectiveness Analysis in Battlefield. Sensors 2022, 22, 3147. https://doi.org/10.3390/s22093147
Seo S, Han S, Kim D. D-CEWS: DEVS-Based Cyber-Electronic Warfare M&S Framework for Enhanced Communication Effectiveness Analysis in Battlefield. Sensors. 2022; 22(9):3147. https://doi.org/10.3390/s22093147
Chicago/Turabian StyleSeo, Sang, Sangwoo Han, and Dohoon Kim. 2022. "D-CEWS: DEVS-Based Cyber-Electronic Warfare M&S Framework for Enhanced Communication Effectiveness Analysis in Battlefield" Sensors 22, no. 9: 3147. https://doi.org/10.3390/s22093147
APA StyleSeo, S., Han, S., & Kim, D. (2022). D-CEWS: DEVS-Based Cyber-Electronic Warfare M&S Framework for Enhanced Communication Effectiveness Analysis in Battlefield. Sensors, 22(9), 3147. https://doi.org/10.3390/s22093147