首页 > 最新文献

2016 International Conference on Military Communications and Information Systems (ICMCIS)最新文献

英文 中文
A method of network workload generation for evaluation of intrusion detection systems in SDN environment 一种用于SDN环境下入侵检测系统评估的网络工作负载生成方法
Damian Jankowski, M. Amanowicz
Software defined networks create new opportunities for an implementation of the intrusion detection and protection methods. Therefore, special data collections called datasets are necessary for the development, testing and evaluation of such mechanisms. For the SDN environment, there are no prepared datasets that could be used directly to develop IDS methods. These sets contain tuples with features, which represent the activities performed in the IT system. In the presented approach, normal and malicious traffic are generated in the SDN virtual environment. The workload for the dataset is generated in a random manner. The proposed method enables the generation of flows, which can be used for the evaluation of various SDN-based intrusion detection methods.
软件定义的网络为入侵检测和保护方法的实现创造了新的机会。因此,开发、测试和评估这种机制需要称为数据集的特殊数据集合。对于SDN环境,没有现成的数据集可以直接用于开发IDS方法。这些集合包含具有特征的元组,这些特征表示在IT系统中执行的活动。在该方法中,在SDN虚拟环境中产生正常流量和恶意流量。数据集的工作负载以随机方式生成。该方法能够生成流,可用于评估各种基于sdn的入侵检测方法。
{"title":"A method of network workload generation for evaluation of intrusion detection systems in SDN environment","authors":"Damian Jankowski, M. Amanowicz","doi":"10.1109/ICMCIS.2016.7496575","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496575","url":null,"abstract":"Software defined networks create new opportunities for an implementation of the intrusion detection and protection methods. Therefore, special data collections called datasets are necessary for the development, testing and evaluation of such mechanisms. For the SDN environment, there are no prepared datasets that could be used directly to develop IDS methods. These sets contain tuples with features, which represent the activities performed in the IT system. In the presented approach, normal and malicious traffic are generated in the SDN virtual environment. The workload for the dataset is generated in a random manner. The proposed method enables the generation of flows, which can be used for the evaluation of various SDN-based intrusion detection methods.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133554232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A review of modeling toolbox for BigData 大数据建模工具箱综述
Hadi Hashem, D. Ranc
Modeling tools and operators help the user / developer to identify the processing field on the top of the sequence and to send into the computing module only the data related to the requested result. The remaining data is not relevant and it will slow down the processing. The biggest challenge nowadays is to get high quality processing results with a reduced computing time and costs. The processing sequence must be reviewed on the top, so that we could add one or more modeling tools. The existing processing models do not take in consideration this aspect and focus on getting high calculation performances which will increase the computing time and costs. In this paper we provide you a study of the main modeling tools for BigData.
建模工具和操作符帮助用户/开发人员识别序列顶部的处理字段,并仅将与请求结果相关的数据发送到计算模块。剩下的数据是不相关的,它会减慢处理速度。目前最大的挑战是在减少计算时间和成本的情况下获得高质量的处理结果。处理顺序必须在顶部进行检查,以便我们可以添加一个或多个建模工具。现有的处理模型没有考虑到这方面的问题,而是一味追求较高的计算性能,从而增加了计算时间和成本。在本文中,我们为您提供了大数据的主要建模工具的研究。
{"title":"A review of modeling toolbox for BigData","authors":"Hadi Hashem, D. Ranc","doi":"10.1109/ICMCIS.2016.7496565","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496565","url":null,"abstract":"Modeling tools and operators help the user / developer to identify the processing field on the top of the sequence and to send into the computing module only the data related to the requested result. The remaining data is not relevant and it will slow down the processing. The biggest challenge nowadays is to get high quality processing results with a reduced computing time and costs. The processing sequence must be reviewed on the top, so that we could add one or more modeling tools. The existing processing models do not take in consideration this aspect and focus on getting high calculation performances which will increase the computing time and costs. In this paper we provide you a study of the main modeling tools for BigData.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128189207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RSS-based secret key generation for indoor and outdoor WBANs using on-body sensor nodes 基于rss的室内外无线宽带网络密钥生成
T. Castel, P. Van Torre, H. Rogier
Given that the market of wearables is in so-called hypergrowth mode, more and more of these on-body devices will interact with each other. These body-to-body, device-to-device links should not only provide reliable but also secure communication of personal user data. Therefore, we have analyzed the potential of using the unique reciprocal body-to-body channel between two legitimate parties, to create a high-level security key that is unknown to an eavesdropper. Both randomly moving legitimate parties, typically called Alice and Bob, were equipped with low-power wireless on-body sensor nodes, which collect the Received Signal Strength values. Additionally, the eavesdropper Eve, who is continuously sniffing the body-to-body channel using a third sensor node, collects her own sequence of RSS values, which are expected to be highly decorrelated from the RSS values from both Alice and Bob. Based on a statistical analysis, applied to Received Signal Strength values to verify the correlation, entropy and mutual information, the body-to-body link seems very suitable for RSS-based secret key generation in indoor and outdoor Wireless Body Area Networks. Moreover, this practical and lightweight alternative for secret key generation ensures low on-chip complexity and, hence, low computational power consumption.
鉴于可穿戴设备市场正处于所谓的高速增长模式,越来越多的这些穿戴式设备将相互交互。这些身体到身体、设备到设备的链接不仅应该提供可靠的个人用户数据通信,而且应该提供安全的通信。因此,我们分析了在两个合法方之间使用唯一的对等体对体通道的可能性,以创建窃听者不知道的高级安全密钥。两个随机移动的合法方,通常称为Alice和Bob,都配备了低功耗无线传感器节点,用于收集接收信号强度值。此外,窃听者Eve使用第三个传感器节点持续嗅探体对体通道,收集她自己的RSS值序列,这些值与Alice和Bob的RSS值高度去相关。基于统计分析,应用接收信号强度值验证相关性、熵和互信息,体对体链路似乎非常适合于室内和室外无线体域网络中基于rss的密钥生成。此外,这种实用且轻量级的密钥生成替代方案确保了芯片上的低复杂性,从而降低了计算功耗。
{"title":"RSS-based secret key generation for indoor and outdoor WBANs using on-body sensor nodes","authors":"T. Castel, P. Van Torre, H. Rogier","doi":"10.1109/ICMCIS.2016.7496540","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496540","url":null,"abstract":"Given that the market of wearables is in so-called hypergrowth mode, more and more of these on-body devices will interact with each other. These body-to-body, device-to-device links should not only provide reliable but also secure communication of personal user data. Therefore, we have analyzed the potential of using the unique reciprocal body-to-body channel between two legitimate parties, to create a high-level security key that is unknown to an eavesdropper. Both randomly moving legitimate parties, typically called Alice and Bob, were equipped with low-power wireless on-body sensor nodes, which collect the Received Signal Strength values. Additionally, the eavesdropper Eve, who is continuously sniffing the body-to-body channel using a third sensor node, collects her own sequence of RSS values, which are expected to be highly decorrelated from the RSS values from both Alice and Bob. Based on a statistical analysis, applied to Received Signal Strength values to verify the correlation, entropy and mutual information, the body-to-body link seems very suitable for RSS-based secret key generation in indoor and outdoor Wireless Body Area Networks. Moreover, this practical and lightweight alternative for secret key generation ensures low on-chip complexity and, hence, low computational power consumption.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"92-C 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Delay analysis of STDMA in grid wireless sensor networks 网格无线传感器网络中STDMA的时延分析
I. Amdouni, C. Adjih, P. Minet, T. Plesse
TDMA (Time Division Multiple Access)) is known to be an affective method for energy saving in wireless sensor networks (WSNs). However, when any slot is exclusively reserved to one node, the TDMA-based protocols suffer from low-channel utilization and high data delivery delays. STDMA (Spatial reuse TDMA) avoids these drawbacks by allowing multiple nodes to access the same time slot provided that these nodes do not interfere. The objective of this paper is to evaluate the delay performance of STDMA assuming grid networks and a random ordering of the slots in the STDMA cycle. The evaluation is performed both with a stochastic analytical model and by experiments based on a known STDMA method called VCM. Results show that the random ordering performance is rather good. A framework for STDMA applied to general graphs under SINR interference model is also presented.
时分多址(TDMA)被认为是无线传感器网络(WSNs)中有效的节能方法。然而,当任何插槽被一个节点独占时,基于tdma的协议存在信道利用率低和数据传输延迟高的问题。STDMA(空间复用TDMA)通过允许多个节点访问相同的时隙来避免这些缺点,前提是这些节点互不干扰。本文的目的是在假设栅格网络和STDMA周期中槽的随机顺序的情况下,评估STDMA的延迟性能。评估是通过随机分析模型和基于已知的STDMA方法(称为VCM)的实验进行的。结果表明,该方法具有较好的随机排序性能。提出了一种适用于信噪比干扰模型下一般图的STDMA框架。
{"title":"Delay analysis of STDMA in grid wireless sensor networks","authors":"I. Amdouni, C. Adjih, P. Minet, T. Plesse","doi":"10.1109/ICMCIS.2016.7496580","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496580","url":null,"abstract":"TDMA (Time Division Multiple Access)) is known to be an affective method for energy saving in wireless sensor networks (WSNs). However, when any slot is exclusively reserved to one node, the TDMA-based protocols suffer from low-channel utilization and high data delivery delays. STDMA (Spatial reuse TDMA) avoids these drawbacks by allowing multiple nodes to access the same time slot provided that these nodes do not interfere. The objective of this paper is to evaluate the delay performance of STDMA assuming grid networks and a random ordering of the slots in the STDMA cycle. The evaluation is performed both with a stochastic analytical model and by experiments based on a known STDMA method called VCM. Results show that the random ordering performance is rather good. A framework for STDMA applied to general graphs under SINR interference model is also presented.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114458051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assisted content-based labelling and classification of documents 协助基于内容的文档标记和分类
K. Wrona, S. Oudkerk, A. Armando, Silvio Ranise, Riccardo Traverso, Lisa Ferrari, Richard McEvoy
The correct labelling of all information at its point of origin is a critical enabler for effective information access control in modern military systems. If information is not properly labeled it cannot be shared between different communities of interest and coalition partners, which affects the responsibility to share and potentially impedes ongoing military operations. This paper describes two experiments performed at the NATO Communications and Information Agency related to supporting correct labelling of both pre-existing and newly created information objects. Two different techniques are used, one based on semantic analysis and the other on machine learning. Both approaches offer promising results in their respective use case scenarios, but require further development prior to operational deployment.
在现代军事系统中,对所有信息的来源进行正确标记是有效的信息访问控制的关键因素。如果信息没有正确标记,就不能在不同的利益团体和联盟伙伴之间共享,这会影响共享的责任,并可能阻碍正在进行的军事行动。本文描述了在北约通信和信息局进行的两项实验,这些实验与支持对已有和新创建的信息对象进行正确标记有关。使用了两种不同的技术,一种基于语义分析,另一种基于机器学习。这两种方法在各自的用例场景中都提供了有希望的结果,但是在操作部署之前需要进一步的开发。
{"title":"Assisted content-based labelling and classification of documents","authors":"K. Wrona, S. Oudkerk, A. Armando, Silvio Ranise, Riccardo Traverso, Lisa Ferrari, Richard McEvoy","doi":"10.1109/ICMCIS.2016.7496589","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496589","url":null,"abstract":"The correct labelling of all information at its point of origin is a critical enabler for effective information access control in modern military systems. If information is not properly labeled it cannot be shared between different communities of interest and coalition partners, which affects the responsibility to share and potentially impedes ongoing military operations. This paper describes two experiments performed at the NATO Communications and Information Agency related to supporting correct labelling of both pre-existing and newly created information objects. Two different techniques are used, one based on semantic analysis and the other on machine learning. Both approaches offer promising results in their respective use case scenarios, but require further development prior to operational deployment.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114497768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A realistic military scenario and emulation environment for experimenting with tactical communications and heterogeneous networks 一个真实的军事场景和模拟环境,用于试验战术通信和异构网络
Niranjan Suri, A. Hansson, J. Nilsson, P. Lubkowski, K. Marcus, M. Hauge, King Lee, Boyd Buchin, Levent Misirhoglu, M. Peuhkuri
Emulation environments are an effective approach to experimenting with and evaluating network protocols, algorithms, and components. This paper describes a joint effort by the NATO Science & Technology Organization's IST-124 task group to develop and distribute an emulation environment and scenario. The most significant contribution is a vetted and militarily-realistic scenario that provides a rich combination of elements for experimentation. The scenario includes detailed mobility patterns for a battalion-sized operation over the course of two hours, which has been developed by military experts in planning and performing real exercises. The mobility patterns are used to drive the network emulation.
仿真环境是试验和评估网络协议、算法和组件的有效方法。本文描述了北约科技组织IST-124任务组开发和分发仿真环境和场景的联合努力。最重要的贡献是一个经过审查和军事现实的场景,为实验提供了丰富的元素组合。该方案包括一个营规模的行动在两个小时内的详细机动模式,这是军事专家在规划和执行实际演习时制定的。移动性模式用于驱动网络仿真。
{"title":"A realistic military scenario and emulation environment for experimenting with tactical communications and heterogeneous networks","authors":"Niranjan Suri, A. Hansson, J. Nilsson, P. Lubkowski, K. Marcus, M. Hauge, King Lee, Boyd Buchin, Levent Misirhoglu, M. Peuhkuri","doi":"10.1109/ICMCIS.2016.7496568","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496568","url":null,"abstract":"Emulation environments are an effective approach to experimenting with and evaluating network protocols, algorithms, and components. This paper describes a joint effort by the NATO Science & Technology Organization's IST-124 task group to develop and distribute an emulation environment and scenario. The most significant contribution is a vetted and militarily-realistic scenario that provides a rich combination of elements for experimentation. The scenario includes detailed mobility patterns for a battalion-sized operation over the course of two hours, which has been developed by military experts in planning and performing real exercises. The mobility patterns are used to drive the network emulation.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126844619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Learning multi-channel power allocation against smart jammer in cognitive radio networks 认知无线电网络中针对智能干扰的多信道功率分配学习
Feten Slimeni, B. Scheers, V. Le Nir, Zied Chtourou, R. Attia
We model the power allocation interaction between a cognitive radio and a jammer as a two-player zero-sum game. First, we determine the power allocation strategy for the cognitive radio using a modified version of the Q-learning algorithm against fixed jamming strategies. The learned anti-jamming strategy will be compared to the common waterfilling technique. Then, we consider the power allocation game using Q-learning for both the cognitive radio and the jammer. The learned strategies will be compared to the Nash equilibrium found under the assumption of perfect knowledge. Finally, we consider the real scenario of a jammer with imperfect information.
我们将认知无线电和干扰机之间的功率分配互动建模为二人零和游戏。首先,我们使用改进版本的q -学习算法来确定针对固定干扰策略的认知无线电的功率分配策略。将学习到的抗干扰策略与常见的充水技术进行比较。然后,我们考虑了基于q学习的认知无线电和干扰机的功率分配博弈。将学习到的策略与完全知识假设下的纳什均衡进行比较。最后,我们考虑了具有不完全信息的干扰机的真实情况。
{"title":"Learning multi-channel power allocation against smart jammer in cognitive radio networks","authors":"Feten Slimeni, B. Scheers, V. Le Nir, Zied Chtourou, R. Attia","doi":"10.1109/ICMCIS.2016.7496544","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496544","url":null,"abstract":"We model the power allocation interaction between a cognitive radio and a jammer as a two-player zero-sum game. First, we determine the power allocation strategy for the cognitive radio using a modified version of the Q-learning algorithm against fixed jamming strategies. The learned anti-jamming strategy will be compared to the common waterfilling technique. Then, we consider the power allocation game using Q-learning for both the cognitive radio and the jammer. The learned strategies will be compared to the Nash equilibrium found under the assumption of perfect knowledge. Finally, we consider the real scenario of a jammer with imperfect information.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114951908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Joint protection of a military formation using heterogeneous sensors in a mobile ad hoc network: Concept and field tests 在移动自组织网络中使用异构传感器的军事编队联合保护:概念和现场试验
Julian Hörst, F. Govaers, Berthold Rehbein, C. Barz, P. Sevenich
This paper presents a concept on how a military formation can be jointly protected by linking available single-platform protection systems. To achieve this, a mobile ad hoc network is established between different vehicles carrying heterogeneous sensors, specifically acoustic and ESM sensors, emulating the protection systems. Distributed data fusion is applied to provide a situation overview for localizing a threat. To substantiate the concept, results from field tests regarding network, sensor, and data fusion functionality are presented.
本文提出了一个概念,即如何通过连接可用的单平台保护系统来联合保护一个军事编队。为了实现这一目标,在携带异构传感器(特别是声学和ESM传感器)的不同车辆之间建立了一个移动自组织网络,以模拟保护系统。应用分布式数据融合为威胁本地化提供态势概览。为了证实这一概念,给出了有关网络、传感器和数据融合功能的现场测试结果。
{"title":"Joint protection of a military formation using heterogeneous sensors in a mobile ad hoc network: Concept and field tests","authors":"Julian Hörst, F. Govaers, Berthold Rehbein, C. Barz, P. Sevenich","doi":"10.1109/ICMCIS.2016.7496543","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496543","url":null,"abstract":"This paper presents a concept on how a military formation can be jointly protected by linking available single-platform protection systems. To achieve this, a mobile ad hoc network is established between different vehicles carrying heterogeneous sensors, specifically acoustic and ESM sensors, emulating the protection systems. Distributed data fusion is applied to provide a situation overview for localizing a threat. To substantiate the concept, results from field tests regarding network, sensor, and data fusion functionality are presented.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116486420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance of distributed channel selection for cognitive MANET in the presence of intentional jamming 有意识干扰下认知MANET的分布式信道选择性能
G. Szmit, J. Dolowski, J. Lopatka
Currently, a number of different radio systems which are set up and work during a mission is growing rapidly. A traditional way to ensure coexistence of the radio systems and minimize interferences is a frequency allocation plan (pre-assigned frequencies) which is believed to be inefficient, whereas Dynamic Spectrum Access (DSA) is thought to introduce a more efficient spectrum usage. By using policy a Cognitive Radio (CR) has some autonomy to make decisions about the spectrum usage. We use sensing policies to optimize CR work against different types of frequency hopping jammers. We focus on operational usage of the policies implemented in CR, and operational assessment of services used in different types of missions, by definition of the mission service utility function. Furthermore, we compare simulation results and practical network implementation during real missions and military exercises. In this paper we focused on the assessment of influence of fast hopping signals on operational capabilities of the CR network and its ability to meet the information exchange requirement, as it is a part of military radio system, and therefore must ensure command services with required quality.
目前,在任务期间建立和工作的不同无线电系统的数量正在迅速增加。确保无线电系统共存和减少干扰的传统方法是频率分配计划(预先分配频率),这被认为是低效的,而动态频谱接入(DSA)被认为是更有效的频谱使用。通过使用策略,认知无线电(CR)有一定的自主权来决定频谱的使用。我们使用传感策略来优化CR工作,以应对不同类型的跳频干扰。通过定义任务服务效用函数,我们重点关注在CR中实现的策略的操作使用,以及在不同类型任务中使用的服务的操作评估。此外,我们将仿真结果与实际网络在实际任务和军事演习中的实现进行了比较。作为军用无线电系统的组成部分,快速跳变信号对通信网络作战能力的影响及其满足信息交换要求的能力的评估是本文研究的重点。
{"title":"Performance of distributed channel selection for cognitive MANET in the presence of intentional jamming","authors":"G. Szmit, J. Dolowski, J. Lopatka","doi":"10.1109/ICMCIS.2016.7496545","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496545","url":null,"abstract":"Currently, a number of different radio systems which are set up and work during a mission is growing rapidly. A traditional way to ensure coexistence of the radio systems and minimize interferences is a frequency allocation plan (pre-assigned frequencies) which is believed to be inefficient, whereas Dynamic Spectrum Access (DSA) is thought to introduce a more efficient spectrum usage. By using policy a Cognitive Radio (CR) has some autonomy to make decisions about the spectrum usage. We use sensing policies to optimize CR work against different types of frequency hopping jammers. We focus on operational usage of the policies implemented in CR, and operational assessment of services used in different types of missions, by definition of the mission service utility function. Furthermore, we compare simulation results and practical network implementation during real missions and military exercises. In this paper we focused on the assessment of influence of fast hopping signals on operational capabilities of the CR network and its ability to meet the information exchange requirement, as it is a part of military radio system, and therefore must ensure command services with required quality.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134515270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the creation of a single mission-wide information domain in military operations: Application of the information clearing house and release gateway at NATO exercise Trident Juncture 2015 关于在军事行动中创建单一任务范围的信息域:信息交换所和发布网关在北约三叉戟节点2015演习中的应用
M. Rudack, Cristina Palacios-Camarero, H. Wietgrefe
NATO doctrine [1] clearly expresses that the establishment of a peaceful and secure environment requires a comprehensive political-civilian-military approach to crisis management [2]. According to [1], coherence was achieved through the harmonization of strategic processes, planning and objectives across the civil and military actors. This requires the establishment of trusted information channels between the actors. A cornerstone for this is to enable automatic or semiautomatic transfer of information between different security domains, therefore enabling a single information domain where partners can access and share the vast majority of mission information as suggested in [3]. The solution should ideally also enable information sharing with Non-Traditional Partners (NTPs1) in compliance with the NATO Comprehensive Approach to crisis management. An Information Clearing House (ICH) as introduced in [3] maintains a tightly managed catalog of mission relevant information, to ensure that users easily find and access the latest approved version of any information object. In addition, the ICH provides support to a release authority and to a Release Gateway (RG), which allow semi-automatic transfer of releasable products between different security domains. The combination of the three elements creates the perception of a single information domain. This paper presents how the ICH-RG and the hybrid confidentiality-releasability model [4] have been implemented at NATO exercise Trident Juncture 2015 (TRJE15) [5]. It describes the assigned roles and responsibilities for the information management and release processes as applied in this NATO certification event. Applied processes require the consideration of Community of Interests (CoIs) within the same security domain, which is not covered in the model presented in [4]. Furthermore, the real world application of the ICH has a much stronger focus on the publication of information from the lower security domains to the mission domain. Statistics for the release and publication processes are presented. The paper concludes with recommendations and required next steps in implementing the ICH as a capability in the federated mission environment.
北约学说bb1明确表示,建立一个和平与安全的环境需要对危机管理采取全面的政治-民事-军事方法bb1。根据bbb,通过协调民事和军事行为体的战略进程、规划和目标,实现了一致性。这需要在参与者之间建立可信的信息通道。这方面的一个基础是在不同的安全域之间实现自动或半自动的信息传输,从而实现一个单一的信息域,其中合作伙伴可以访问和共享[3]中建议的绝大多数任务信息。理想情况下,该解决方案还应能够按照北约危机管理综合办法,与非传统伙伴(NTPs1)共享信息。[3]中引入的信息交换中心维护着一个严格管理的任务相关信息目录,以确保用户能够轻松地找到和访问任何信息对象的最新批准版本。此外,ICH还提供了对发布授权和发布网关(RG)的支持,RG允许在不同的安全域之间半自动地转移可发布产品。这三个元素的组合创造了对单个信息域的感知。本文介绍了ICH-RG和混合机密性-可释放性模型[4]如何在北约“三叉戟结合点2015”(TRJE15)[5]演习中实施。它描述了在北约认证事件中应用的信息管理和发布过程所分配的角色和职责。所应用的流程需要考虑同一安全域中的利益共同体(coi),[4]中所提供的模型没有涵盖这一点。此外,在现实世界中,ICH的应用更加注重从较低安全领域到任务领域的信息发布。介绍了发布和出版过程的统计数据。本文最后提出了在联邦任务环境中将ICH作为一种能力实施的建议和所需的后续步骤。
{"title":"On the creation of a single mission-wide information domain in military operations: Application of the information clearing house and release gateway at NATO exercise Trident Juncture 2015","authors":"M. Rudack, Cristina Palacios-Camarero, H. Wietgrefe","doi":"10.1109/ICMCIS.2016.7496566","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496566","url":null,"abstract":"NATO doctrine [1] clearly expresses that the establishment of a peaceful and secure environment requires a comprehensive political-civilian-military approach to crisis management [2]. According to [1], coherence was achieved through the harmonization of strategic processes, planning and objectives across the civil and military actors. This requires the establishment of trusted information channels between the actors. A cornerstone for this is to enable automatic or semiautomatic transfer of information between different security domains, therefore enabling a single information domain where partners can access and share the vast majority of mission information as suggested in [3]. The solution should ideally also enable information sharing with Non-Traditional Partners (NTPs1) in compliance with the NATO Comprehensive Approach to crisis management. An Information Clearing House (ICH) as introduced in [3] maintains a tightly managed catalog of mission relevant information, to ensure that users easily find and access the latest approved version of any information object. In addition, the ICH provides support to a release authority and to a Release Gateway (RG), which allow semi-automatic transfer of releasable products between different security domains. The combination of the three elements creates the perception of a single information domain. This paper presents how the ICH-RG and the hybrid confidentiality-releasability model [4] have been implemented at NATO exercise Trident Juncture 2015 (TRJE15) [5]. It describes the assigned roles and responsibilities for the information management and release processes as applied in this NATO certification event. Applied processes require the consideration of Community of Interests (CoIs) within the same security domain, which is not covered in the model presented in [4]. Furthermore, the real world application of the ICH has a much stronger focus on the publication of information from the lower security domains to the mission domain. Statistics for the release and publication processes are presented. The paper concludes with recommendations and required next steps in implementing the ICH as a capability in the federated mission environment.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130936818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 International Conference on Military Communications and Information Systems (ICMCIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1