Applicability of Instant Messaging in the Military Command
Applicability of Instant Messaging in the Military Command Control Systems Author: Juha Vermaja Superviser: Jormakka Instructor: Marko Luoma, Lic. Sc. Helsinki University of Technology Networking laboratory
Contents • Introduction • Battlefield command control systems • Instant Messaging systems • IM applicability to C 2 usage • Demonstration • Conclusions
Introduction • Many different IM applications available for free of charge • IETF effords has created specifications and standards • Security plays an important role in IM environments • The requirements for the next generation IM systems are increasing • The purpose of this thesis is to study the applicability and possibility of using commercially available IM systems in military C 2 IS (Command Control Information Systems)
C 2 Systems • Command Control (C 2) messages are text messages used in military systems for data providing • C 2 messages can be created manually or automatically • Receiving, interpretation and presentation can be automated • C 2 messages are independent of the physical layer • Building new C 2 systems is done parallel to old ones so that there is always one mechanism ready to be deployed • C 2 systems are not easily replaced by newer systems due to the switching costs
C 2 Systems Cont. . . Situation now: • Many countries have developed their own C 2 messaging solutions including NATO countries • The interoperability is a constant concern and no specific standards have been fully adopted • Some standards are agreed upon, for example NATO’s Allied Data Publication No. 3 (Adat. P-3) and United States Message Text Format (USMTF) • Adat. P-3 provides rules, constructions and vocabulary for message text formats
C 2 Systems Cont. . . Situation in near future: • In the year 1998 several countries started a joint operation called Multilateral Interoperability Programme (MIP) • MIP aim is to achieve an international interoperability of C 2 IS in order to support combined and joint operations • MIP will serve as a guideline for future developments • At the moment MIP is in an implementation phaze
Instant Messaging Systems • The idea of Instant Messaging comes from the Internet Relay Chat (IRC) • Instant Messaging (IM) system is a text-based message system that allows the user to exchange short messages in real-time • Presence awareness in its most simple form means that a user knows if another user is online or not • The biggest problem in IM systems is the lack of standards • Many applications are proprietary • Several third party applications have been created that can handle the communication between proprietary solutions
IETF Standardization • IETF has created a standard called Instant Messaging & Presence Protocol (IMPP) • IMPP working group has produced several RFC’s and drafts defining protocols and data formats needed to build global end -user presence awareness, notification and IM system • 2 Major IETF RFC’s are: • Model for presence and instant messaging (RFC 2778) • Instant messaging / presence protocol requirements (RFC 2779)
IMPP Protocols • Several candidates have been competing to get a position of an official standard of IM systems with open standard protocols • Session Initiation Protocol (SIP) and Jabber are the strongest candidates • Many applications already use SIP or Jabber • Interoperability between SIP and Jabber is achieved by using gateways
Applicability to C 2 IS • Security • Most IM applications do not use any encryption methods • All the consumer applications use plain text authentication and messages are sent in plain text format • Flexibility and scalability • IM systems work in client-server environment • Scalability is not an problem
Applicability Scenarios • Temporary and fast to build • For example in disaster area where all the other communication systems have been destroyed • Automated systems • A computer can interpret the messages • Convenience • The usage of presence awareness
Demonstration • The demonstration was done in a closed network that corresponds to a simple wireless local area network • The purpose of the demonstration was to study the behavior of the IM applications and the traffic • The results • Unencrypted messages could be easily captured • The network topology could be discovered • A conversation that includes 2 – 10 messages is only 14970 bytes per participant
Conclusions • Interoperable standards are needed • Both IMPP protocols (SIP and Jabber) will stay in IM systems and cooperate via the gateways • IM systems can offer many advantages • Security is a big problem • COTS available IM applications do not satisfy wholly the needs of the C 2 communication -> Specified applications are needed to make the communication easy and practical • Specified applications with specific platforms are needed in order to build automated systems
Questions? Thank you!
- Slides: 14