Supporting Command and Control (C2) of an Embarked Commander: Tunneling SIPRNet Data Across an UNCLAS Wireless LAN
NAVAL POSTGRADUATE SCHOOL MONTEREY CA
Pagination or Media Count:
Command and Control C2 by todays embarked commanders requires timely and reliable access to classified data systems at the C2 node provided by the ship. Most often, the ships spaces provided to an embarked staff are inadequate to support the commanders C2 requirements. Often, there are not enough classified computers or classified Local Area Network LAN connections. To facilitate improved ability to exercise C2, a ships company technicians typically place a hub on the network to provide extra connection points. This procedure takes time for the technicians to implement and requires physical connection to the wired network. A potential alternative may be to leverage current IEEE 802.11 technology to provide wireless connectivity for these clients, yet wireless technology alone will not address this problem. Coupling an 802.11 network with Secret Client Tunneling Device SCTD-enabled classified laptops can provide the access to classified data that is required by the embarked commander to exercise command and control of his assigned forces. This thesis examines the use of the KOV-26 Talon card and the KIV-54 cryptographic module, both NSA Type I encryptors, as a method of tunneling SIPRNet data across an afloat unclassified wireless Local Area Network LAN.
- Computer Systems
- Computer Systems Management and Standards
- Command, Control and Communications Systems