Title
Plugging the leaks without unplugging your network in the midst of Disaster
Abstract
Network Disaster Recovery research has examined behavior of networks after disasters with an aim to restoring normal conditions. In addition to probable loss of connectivity, a disaster scenario can also lead to security risks. However, network security has been examined extensively under normal conditions, and not under conditions that ensue after disasters. Therefore, security issues should be addressed during the period of chaos after a disaster, but before operating conditions return to normal. Furthermore, security should be assured, while still allowing access to the network to enable public communication in order to assist in disaster relief efforts. In general, the desire to help with public assistance requires opening up access to the network, while security concerns add pressure to close down or limit access to the network. In this study, we show that the objectives of availability and confidentiality, two objectives that have not previously been considered together in disaster scenarios, can be simultaneously achieved. For our study, we evaluated six wireless devices with various network configurations, including a laptop, a Kindle Fire e-reader, an Android tablet, a Google Nexus phone, an IP camera, and an Apple TV, to approximate behaviors of a communication network under a disaster scenario. Actual data leakage was tracked and observed for these devices. To the best of our knowledge this has not previously been examined in a systematic manner for post-disaster scenarios. After illustrating the data leakage of various devices, we analyze the risk associated with the various types of leakage. Moving private traffic to a VPN would free the physical network for use as a public resource.
Year
DOI
Venue
2012
10.1109/LCN.2012.6423620
LCN
Keywords
Field
DocType
business continuity,computer network security,mobile computing,telecommunication traffic,Android tablet,Apple TV,Google Nexus phone,IP camera,Kindle Fire e-reader,VPN,connectivity loss,data leakage,disaster relief efforts,laptop,network configurations,network disaster recovery research,network security,post-disaster scenarios,private traffic,public communication,security risks,wireless devices,Availability,Confidentiality,Data Leakage,Network Disaster Recovery,Post-Disaster Network Security
Mobile computing,Android (operating system),Telecommunications network,Computer security,Computer science,Emergency management,Network security,Computer network,Network Access Control,Business continuity,Disaster recovery
Conference
ISSN
Citations 
PageRank 
0742-1303
0
0.34
References 
Authors
0
4
Name
Order
Citations
PageRank
Aaron D. Goldman100.68
Arif Selcuk Uluagac270.81
Raheem Beyah321314.78
John A. Copeland445660.84