Optimal Sensor Placement in the Network Structure from a Defence Point of View
Abstract:
This article presents a method for optimising sensor placement in a general network topology. Sensor placement is calculated by balancing maximised closeness to the monitored nodes with sensor location distribution for protection. The model serves cyber defence planning and critical infrastructure defence. It uses node and link weights as parameters to describe information quantity, data importance to a defender, and criticality to the network operator. General network analysis, together with a penalty factor for describing distributed defence requirements, underpins the methodology. The Sprint operator network in the USA is used as an example to demonstrate the methodology.
AUTHORS
Finnish Defence Research Agency Riihimäki,
Finland
Vesa Kuikka obtained the degree of licentiate in Philosophy in physics in 1986 from the University of Helsinki and in mathematics in 2004 from Åbo Akademi. Vesa Kuikka is a Fellow of the Actuarial Society of Finland (FASF). He works at the Finnish Defence Research Agency (FDRA) as a member of the mathematical modelling team. His research interests are in modelling complex networks, communication networks, social networks, military capabilities, and macroscopic level combats.
Finnish Defence Research Agency Riihimäki,
Finland
Captain (Eng.), Adj. Prof., Dr. Juha-Pekka Nikkarila obtained PhD in Physics (2008), MSc in Physics (2006), and MSc(Tech.) in Electrical Engineering (2016). He serves as a researcher and a special officer at the Finnish Defence Research Agency (FDRA) with current research interests including modelling cyber influencing, resilience, and warfare. He has served at FDRA since 2012 with research interests in operation analysis, electronic warfare, and cyber studies. He served in academia and industry from 2006-2012.
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive