Deployment
Key Managers need to be physically safe
- Not likely to be deployed on ridges w/ good propagation
Cryptographic Authentication expected to follow traditional Line of Command
- Certificate tractability
- User trust in local Key Manager
Key Managers can be assigned along functional lines
- Forward Observers, Artillery Support, Logistics, Coalition Forces