Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496587
A. Armando, Gabriele Costa, A. Merlo, Luca Verderame, K. Wrona
Mobile devices have an important role to play in the private as well as the professional activities of working people. However, their use can pose a serious threat to the security of the working environment. Many organizations therefore establish a specific bring your own device (BYOD) policy. This paper presents a proposal for how to foster a secure, policy-aware BYOD work environment. Our solution involves enforcement of fine-grained security policies for personal devices while relieving owners of having to make critical decisions and take responsibility for behavior of applications installed on their devices. We report our experience in developing and applying a security policy based on the existing guidelines of the NATO Communications and Information Agency (NCI Agency).
{"title":"Developing a NATO BYOD security policy","authors":"A. Armando, Gabriele Costa, A. Merlo, Luca Verderame, K. Wrona","doi":"10.1109/ICMCIS.2016.7496587","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496587","url":null,"abstract":"Mobile devices have an important role to play in the private as well as the professional activities of working people. However, their use can pose a serious threat to the security of the working environment. Many organizations therefore establish a specific bring your own device (BYOD) policy. This paper presents a proposal for how to foster a secure, policy-aware BYOD work environment. Our solution involves enforcement of fine-grained security policies for personal devices while relieving owners of having to make critical decisions and take responsibility for behavior of applications installed on their devices. We report our experience in developing and applying a security policy based on the existing guidelines of the NATO Communications and Information Agency (NCI Agency).","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496581
Arwid Komulainen, Jimmi Grönkvist, J. Nilsson
Cooperative broadcasting is a promising technique for efficient as well as robust broadcast of information in ad hoc networks. The paper compares the capacity of scheduled cooperative broadcasting with the capacity of Spatial Reuse TDMA (STDMA) for broadcast traffic in ad hoc networks. Three different routing methods for STDMA are considered: a tree-based solution; default MPR-flooding; and a robust version of MPR-flooding obtained by increasing the MPR coverage parameter. The results show that scheduled cooperative broadcasting, besides being robust, also has a higher capacity than STDMA unless the networks are dense, i.e., many neighbors and short average hop lengths. In that case STDMA is efficient as a packet can be broadcasted to the whole network with just a few retransmissions.
{"title":"Comparing the capacity of cooperative broadcast to spatial reuse TDMA in ad hoc networks","authors":"Arwid Komulainen, Jimmi Grönkvist, J. Nilsson","doi":"10.1109/ICMCIS.2016.7496581","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496581","url":null,"abstract":"Cooperative broadcasting is a promising technique for efficient as well as robust broadcast of information in ad hoc networks. The paper compares the capacity of scheduled cooperative broadcasting with the capacity of Spatial Reuse TDMA (STDMA) for broadcast traffic in ad hoc networks. Three different routing methods for STDMA are considered: a tree-based solution; default MPR-flooding; and a robust version of MPR-flooding obtained by increasing the MPR coverage parameter. The results show that scheduled cooperative broadcasting, besides being robust, also has a higher capacity than STDMA unless the networks are dense, i.e., many neighbors and short average hop lengths. In that case STDMA is efficient as a packet can be broadcasted to the whole network with just a few retransmissions.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124439131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496578
H. Saarnisaari
Communication system performance under jamming can be analyzed in most cases if the jamming hit rate (the percentage of jammed bits) is known or could be estimated. Radar electronic warfare (EW) engineers have used the theory of coincidence of pulse trains for similar situations with success. However, the theory does not hold for communications in all scenarios, especially if a fast sweeping (or stepping) jamming signal disturbs a frequency agile signal. Herein, a modification to the theory is proposed. Furthermore, it is shown by simulations that the modified theory is able to predict the hit rate also in scenarios that are difficult to the original theory. The provided simple to use analysis method is usable not just for communications engineers afraid of jamming and detection but also for EW engineers working on the opposite side.
{"title":"Sweep jamming hit rate analysis for frequency agile communications","authors":"H. Saarnisaari","doi":"10.1109/ICMCIS.2016.7496578","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496578","url":null,"abstract":"Communication system performance under jamming can be analyzed in most cases if the jamming hit rate (the percentage of jammed bits) is known or could be estimated. Radar electronic warfare (EW) engineers have used the theory of coincidence of pulse trains for similar situations with success. However, the theory does not hold for communications in all scenarios, especially if a fast sweeping (or stepping) jamming signal disturbs a frequency agile signal. Herein, a modification to the theory is proposed. Furthermore, it is shown by simulations that the modified theory is able to predict the hit rate also in scenarios that are difficult to the original theory. The provided simple to use analysis method is usable not just for communications engineers afraid of jamming and detection but also for EW engineers working on the opposite side.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132017038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496569
Gang Xu, Lei Yang, Song Zhou, G. Bi
In this paper, a novel algorithm of rotational parameter estimation is proposed for high-resolution inverse synthetic aperture (ISAR) imaging of maneuvering targets. For a non-uniform rotation target, the signal model is formulated. Then, an entropy minimization approach is used to estimate the rotational parameters, which is solved by using a coordinate descent algorithm based on quasi-Newton method. The estimated parameters are used to rescale the reconstructed ISAR image to extract the target geometry. Finally, experimental analysis is performed to confirm the effectiveness of the proposed algorithm.
{"title":"Rotational motion estimaiton of high-resoluiton ISAR imaigng for manuvering targets","authors":"Gang Xu, Lei Yang, Song Zhou, G. Bi","doi":"10.1109/ICMCIS.2016.7496569","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496569","url":null,"abstract":"In this paper, a novel algorithm of rotational parameter estimation is proposed for high-resolution inverse synthetic aperture (ISAR) imaging of maneuvering targets. For a non-uniform rotation target, the signal model is formulated. Then, an entropy minimization approach is used to estimate the rotational parameters, which is solved by using a coordinate descent algorithm based on quasi-Newton method. The estimated parameters are used to rescale the reconstructed ISAR image to extract the target geometry. Finally, experimental analysis is performed to confirm the effectiveness of the proposed algorithm.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131543003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496541
Xavier Leturc, C. L. Le Martret, P. Ciblat
In this paper, two spectrum sensing procedures are studied. The first one is based on a modification of the Energy Detector (ED) and the second one is based on a two-sample Goodness-of-Fit (GoF) test. The two procedures require a vector of noise samples, and are robust against noise uncertainty. Exact probability of detection are given for deterministic and Gaussian signal over additive white Gaussian noise (AWGN) and Rayleigh flat fading channel for the modified ED. Simulations show that the two procedures outperform previous schemes.
{"title":"Robust spectrum sensing algorithms under noise uncertainty","authors":"Xavier Leturc, C. L. Le Martret, P. Ciblat","doi":"10.1109/ICMCIS.2016.7496541","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496541","url":null,"abstract":"In this paper, two spectrum sensing procedures are studied. The first one is based on a modification of the Energy Detector (ED) and the second one is based on a two-sample Goodness-of-Fit (GoF) test. The two procedures require a vector of noise samples, and are robust against noise uncertainty. Exact probability of detection are given for deterministic and Gaussian signal over additive white Gaussian noise (AWGN) and Rayleigh flat fading channel for the modified ED. Simulations show that the two procedures outperform previous schemes.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125189917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496555
Muhammad Hafeez Chaudhary, B. Scheers
The rapid progress in electronics, sensing, actuation, signal processing, and communication networking has spurred emergence of new technologies like Internet of Things (IoT). In this paper, we report our work on a multi-function IoT (MioT) platform. The MioT supports multiple wireless waveforms that can be used for long as well as short range and beyond-line-of-sight environments and an IEEE 802.15.4 ultra-wide band (UWB) waveform for accurate and precise RF-positioning system in harsh wireless environments, e.g., indoor and industrial environments. With the MioT a library of software APIs are provided to configure different parameters of the device through the USB interface. Besides, USB can also be used to transfer data from host to the MioT and vice-versa. Using the MioT we develop a flexible implementation of the DMR access technology. This implementation is used to provide a robust long-range link for robotic command and control and for cognitive management of WiFi mesh-networks in a project for robotic-assisted search and rescue operations in disaster areas. We also report our preliminary results on RF-ranging based on the UWB waveform.
{"title":"Software-defined wireless communications and positioning device for IoT development","authors":"Muhammad Hafeez Chaudhary, B. Scheers","doi":"10.1109/ICMCIS.2016.7496555","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496555","url":null,"abstract":"The rapid progress in electronics, sensing, actuation, signal processing, and communication networking has spurred emergence of new technologies like Internet of Things (IoT). In this paper, we report our work on a multi-function IoT (MioT) platform. The MioT supports multiple wireless waveforms that can be used for long as well as short range and beyond-line-of-sight environments and an IEEE 802.15.4 ultra-wide band (UWB) waveform for accurate and precise RF-positioning system in harsh wireless environments, e.g., indoor and industrial environments. With the MioT a library of software APIs are provided to configure different parameters of the device through the USB interface. Besides, USB can also be used to transfer data from host to the MioT and vice-versa. Using the MioT we develop a flexible implementation of the DMR access technology. This implementation is used to provide a robust long-range link for robotic command and control and for cognitive management of WiFi mesh-networks in a project for robotic-assisted search and rescue operations in disaster areas. We also report our preliminary results on RF-ranging based on the UWB waveform.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132815591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496577
P. Eles, B. Pennell, M. Richter
This paper summarises the results of an initial study examining the alignment of NATO Policy documents through text analysis. The paper describes a simple approach to abstracting content from policy and implementation documents through subject matter expert (SME)-guided dictionary creation, and we describe the implementation of novel methods to measure and visualize the alignment between pairs of documents. We describe how the process was implemented to measure the vertical and horizontal alignment of NATO policy and implementation documents to provide real-time support for the drafting of NATO documents. We discuss challenges faced in the implementation, and propose potential future solutions.
{"title":"Assessing NATO policy alignment through text analysis: An initial study","authors":"P. Eles, B. Pennell, M. Richter","doi":"10.1109/ICMCIS.2016.7496577","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496577","url":null,"abstract":"This paper summarises the results of an initial study examining the alignment of NATO Policy documents through text analysis. The paper describes a simple approach to abstracting content from policy and implementation documents through subject matter expert (SME)-guided dictionary creation, and we describe the implementation of novel methods to measure and visualize the alignment between pairs of documents. We describe how the process was implemented to measure the vertical and horizontal alignment of NATO policy and implementation documents to provide real-time support for the drafting of NATO documents. We discuss challenges faced in the implementation, and propose potential future solutions.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496579
G. Eriksson, S. Linder
For tactical military communication independence of a fixed infrastructure, base stations or central node is an advantage. Multihop routing in ad hoc networks have these benefits, it is, however, highly dependent on accurate link status in the network to find routes which can be problematic in mobile scenarios. A relatively new concept of cooperative relaying, in which several relay nodes simultaneously retransmits identical copies of the message on the same channel, is promising as it eliminates the need of routing. In this paper, we analyze the performance of an OFDM based cooperative simultaneous relaying scheme in a city scenario with relay nodes located at the same street. The performance is evaluated on measured channels for the individual links and compared with the performance of a traditional single relay technique. The results show that in the investigated scenario, cooperative relaying can increase the median path gain several dB compared to a single relay. However, even if the median path gain is higher there are occurrences of lower path gain with cooperation than with a single relay. The number of occurrences are decreased with more cooperating nodes and can be further decreased by specific cooperative relay techniques, such as phase dithering or delay diversity.
{"title":"Analysis of cooperative relaying in an urban scenario","authors":"G. Eriksson, S. Linder","doi":"10.1109/ICMCIS.2016.7496579","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496579","url":null,"abstract":"For tactical military communication independence of a fixed infrastructure, base stations or central node is an advantage. Multihop routing in ad hoc networks have these benefits, it is, however, highly dependent on accurate link status in the network to find routes which can be problematic in mobile scenarios. A relatively new concept of cooperative relaying, in which several relay nodes simultaneously retransmits identical copies of the message on the same channel, is promising as it eliminates the need of routing. In this paper, we analyze the performance of an OFDM based cooperative simultaneous relaying scheme in a city scenario with relay nodes located at the same street. The performance is evaluated on measured channels for the individual links and compared with the performance of a traditional single relay technique. The results show that in the investigated scenario, cooperative relaying can increase the median path gain several dB compared to a single relay. However, even if the median path gain is higher there are occurrences of lower path gain with cooperation than with a single relay. The number of occurrences are decreased with more cooperating nodes and can be further decreased by specific cooperative relay techniques, such as phase dithering or delay diversity.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116285285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496582
A. A. Yaseen, M. Bayart
In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. The advantage of this proposed approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.
{"title":"Attack-tolerant networked control system in presence of the controller hijacking attack","authors":"A. A. Yaseen, M. Bayart","doi":"10.1109/ICMCIS.2016.7496582","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496582","url":null,"abstract":"In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. The advantage of this proposed approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117346292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496583
John Melrose, K. Wrona, Thomas Guenther, Raymond Haakseth, N. Nordbotten, Lars Westerdahl
While information assurance recognizes confidentiality, integrity and availability as properties of information that need to be protected, the use of security metadata has historically been well understood only for protecting confidentiality. In the case of integrity and availability, while the need for their protection is recognized, little attention has been paid to how metadata could be used to describe the required degrees of protection. The research problem addressed by this paper is how to understand the characteristics of integrity and availability in an information security context and identify the necessary metadata elements of each.
{"title":"Labelling for integrity and availability","authors":"John Melrose, K. Wrona, Thomas Guenther, Raymond Haakseth, N. Nordbotten, Lars Westerdahl","doi":"10.1109/ICMCIS.2016.7496583","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496583","url":null,"abstract":"While information assurance recognizes confidentiality, integrity and availability as properties of information that need to be protected, the use of security metadata has historically been well understood only for protecting confidentiality. In the case of integrity and availability, while the need for their protection is recognized, little attention has been paid to how metadata could be used to describe the required degrees of protection. The research problem addressed by this paper is how to understand the characteristics of integrity and availability in an information security context and identify the necessary metadata elements of each.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127875441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}