首页 > 最新文献

MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)最新文献

英文 中文
Evaluating physical-layer security for secondary users in cognitive radio systems with attackers 有攻击者的认知无线电系统中辅助用户的物理层安全性评估
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170855
D. Rawat, Olumide Malomo, C. Bajracharya, Min Song
Cognitive radio network (CRN) is regarded as an emerging technology for better spectrum efficiency where unlicensed secondary users (SUs) sense RF spectrum to find idle channels and access them opportunistically without causing any harmful interference to licensed primary users (PUs). However, RF spectrum sensing and sharing along with reconfigurable capabilities of SUs bring severe security vulnerabilities in the network. In this paper, we analyze physical-layer security (secrecy rates) of SUs in CRN in the presence of eavesdroppers, jammers and PU emulators (PUEs) where SUs compete not only with jammers and eavesdroppers who are trying to reduce SU's secrecy rates but also against PUEs who are trying to compel the SUs from their current channel by imitating the behavior of PUs. In addition, a legitimate SU competes with other SUs with a sharing attitude for dynamic spectrum access to gain a high secrecy rate, however, the malicious users (i.e., attackers) attempt to abuse the channels egotistically. The main contribution of this work is the design of a game theoretic approach to maximize utilities (that is proportional to secrecy rates) of SUs in the presence of eavesdroppers, jammers and PUEs. Furthermore, SUs use signal energy and cyclostationary feature detection along with location verification technique to detect PUEs. As the proposed approach is generic and considers different attackers, it can be particularized to a situation with eavesdroppers only, jammers only or PUEs only while evaluating physical-layer security of SUs in CRN. We evaluate the performance of the proposed approach using results obtained from simulations. The results show that the proposed approach outperforms other existing methods.
认知无线电网络(Cognitive radio network, CRN)是一种新兴的频谱效率技术,通过非授权的辅助用户(su)感知射频频谱,发现空闲信道,并在不对授权的主用户(pu)造成任何有害干扰的情况下利用它们。然而,射频频谱的感知和共享以及单元的可重构能力给网络带来了严重的安全漏洞。在本文中,我们分析了在窃听者、干扰者和PU仿真器(pue)存在的情况下,CRN中SU的物理层安全性(保密率),其中SU不仅与试图降低SU保密率的干扰者和窃听者竞争,而且还与试图通过模仿PU的行为迫使SU离开当前信道的pue竞争。此外,合法的用户以共享的态度与其他用户竞争动态频谱访问,以获得较高的保密率,而恶意用户(即攻击者)则试图以自我为中心滥用信道。这项工作的主要贡献是设计了一种博弈论方法,以在窃听者、干扰者和pue存在的情况下最大化SUs的效用(与保密率成正比)。此外,SUs使用信号能量和循环平稳特征检测以及位置验证技术来检测pue。由于该方法具有通用性,且考虑了不同的攻击者,因此在评估CRN中单个用户的物理层安全性时,可以将其细化为仅窃听者、仅干扰者或仅pue的情况。我们使用仿真结果来评估所提出方法的性能。结果表明,该方法优于其他现有方法。
{"title":"Evaluating physical-layer security for secondary users in cognitive radio systems with attackers","authors":"D. Rawat, Olumide Malomo, C. Bajracharya, Min Song","doi":"10.1109/MILCOM.2017.8170855","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170855","url":null,"abstract":"Cognitive radio network (CRN) is regarded as an emerging technology for better spectrum efficiency where unlicensed secondary users (SUs) sense RF spectrum to find idle channels and access them opportunistically without causing any harmful interference to licensed primary users (PUs). However, RF spectrum sensing and sharing along with reconfigurable capabilities of SUs bring severe security vulnerabilities in the network. In this paper, we analyze physical-layer security (secrecy rates) of SUs in CRN in the presence of eavesdroppers, jammers and PU emulators (PUEs) where SUs compete not only with jammers and eavesdroppers who are trying to reduce SU's secrecy rates but also against PUEs who are trying to compel the SUs from their current channel by imitating the behavior of PUs. In addition, a legitimate SU competes with other SUs with a sharing attitude for dynamic spectrum access to gain a high secrecy rate, however, the malicious users (i.e., attackers) attempt to abuse the channels egotistically. The main contribution of this work is the design of a game theoretic approach to maximize utilities (that is proportional to secrecy rates) of SUs in the presence of eavesdroppers, jammers and PUEs. Furthermore, SUs use signal energy and cyclostationary feature detection along with location verification technique to detect PUEs. As the proposed approach is generic and considers different attackers, it can be particularized to a situation with eavesdroppers only, jammers only or PUEs only while evaluating physical-layer security of SUs in CRN. We evaluate the performance of the proposed approach using results obtained from simulations. The results show that the proposed approach outperforms other existing methods.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115557236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hierarchical learning for automated malware classification 用于自动恶意软件分类的分层学习
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170758
Shayok Chakraborty, J. W. Stokes, Lin Xiao, Dengyong Zhou, M. Marinescu, Anil Thomas
Despite widespread use of commercial anti-virus products, the number of malicious files detected on home and corporate computers continues to increase at a significant rate. Recently, anti-virus companies have started investing in machine learning solutions to augment signatures manually designed by analysts. A malicious file's determination is often represented as a hierarchical structure consisting of a type (e.g. Worm, Backdoor), a platform (e.g. Win32, Win64), a family (e.g. Rbot, Rugrat) and a family variant (e.g. A, B). While there has been substantial research in automated malware classification, the aforementioned hierarchical structure, which can provide additional information to the classification models, has been ignored. In this paper, we propose the novel idea and study the performance of employing hierarchical learning algorithms for automated classification of malicious files. To the best of our knowledge, this is the first research effort which incorporates the hierarchical structure of the malware label in its automated classification and in the security domain, in general. It is important to note that our method does not require any additional effort by analysts because they typically assign these hierarchical labels today. Our empirical results on a real world, industrial-scale malware dataset of 3.6 million files demonstrate that incorporation of the label hierarchy achieves a significant reduction of 33.1% in the binary error rate as compared to a non-hierarchical classifier which is traditionally used in such problems.
尽管商业杀毒产品被广泛使用,但在家庭和公司电脑上检测到的恶意文件数量仍在以显著的速度增长。最近,反病毒公司开始投资机器学习解决方案,以增强分析师手动设计的签名。恶意文件的确定通常表示为由类型(例如Worm,后门),平台(例如Win32, Win64),家族(例如Rbot, Rugrat)和家族变体(例如A, B)组成的层次结构。尽管在恶意软件自动分类方面已经有大量研究,但上述可以为分类模型提供额外信息的层次结构一直被忽略。在本文中,我们提出了新的思想,并研究了采用层次学习算法对恶意文件进行自动分类的性能。据我们所知,这是第一次将恶意软件标签的层次结构纳入其自动分类和安全领域的研究工作。重要的是要注意,我们的方法不需要分析师的任何额外工作,因为他们今天通常分配这些分层标签。我们在现实世界中360万个文件的工业规模恶意软件数据集上的经验结果表明,与传统上用于此类问题的非分层分类器相比,标签层次结构的结合在二进制错误率上显著降低了33.1%。
{"title":"Hierarchical learning for automated malware classification","authors":"Shayok Chakraborty, J. W. Stokes, Lin Xiao, Dengyong Zhou, M. Marinescu, Anil Thomas","doi":"10.1109/MILCOM.2017.8170758","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170758","url":null,"abstract":"Despite widespread use of commercial anti-virus products, the number of malicious files detected on home and corporate computers continues to increase at a significant rate. Recently, anti-virus companies have started investing in machine learning solutions to augment signatures manually designed by analysts. A malicious file's determination is often represented as a hierarchical structure consisting of a type (e.g. Worm, Backdoor), a platform (e.g. Win32, Win64), a family (e.g. Rbot, Rugrat) and a family variant (e.g. A, B). While there has been substantial research in automated malware classification, the aforementioned hierarchical structure, which can provide additional information to the classification models, has been ignored. In this paper, we propose the novel idea and study the performance of employing hierarchical learning algorithms for automated classification of malicious files. To the best of our knowledge, this is the first research effort which incorporates the hierarchical structure of the malware label in its automated classification and in the security domain, in general. It is important to note that our method does not require any additional effort by analysts because they typically assign these hierarchical labels today. Our empirical results on a real world, industrial-scale malware dataset of 3.6 million files demonstrate that incorporation of the label hierarchy achieves a significant reduction of 33.1% in the binary error rate as compared to a non-hierarchical classifier which is traditionally used in such problems.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Delay-tolerant data sharing in tactical environments 战术环境中的容延迟数据共享
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170773
Sebastián Echeverría, G. Lewis, Marc Novakouski, Jeff Boleng
Personnel operating in tactical environments heavily rely on information sharing to perform their missions. Solutions deployed in these environments need to focus on reliability and performance, in addition to usability to work as unattended as possible due to the often chaotic nature of operations. In this paper we propose a solution for delay-tolerant data sharing, in particular file sharing, using well supported, common networking protocols. The solution is based on the concept of broadcatching, which combines a delay-tolerant protocol such as BitTorrent with a publish/subscribe mechanism such as RSS to enable “many to one” information sharing. Experimental data shows that it is a promising approach for enabling reliable, mostly unattended data sharing on tactical networks in tactical environments.
在战术环境中作战的人员严重依赖信息共享来执行任务。在这些环境中部署的解决方案需要关注可靠性和性能,以及由于操作通常混乱的性质而尽可能无人值守的可用性。在本文中,我们提出了一个解决方案,以容忍延迟的数据共享,特别是文件共享,使用良好的支持,通用的网络协议。该解决方案基于广播的概念,它结合了像BitTorrent这样的延迟容忍协议和像RSS这样的发布/订阅机制,以实现“多对一”的信息共享。实验数据表明,这是一种很有前途的方法,可以在战术环境下的战术网络上实现可靠的、大多数无人值守的数据共享。
{"title":"Delay-tolerant data sharing in tactical environments","authors":"Sebastián Echeverría, G. Lewis, Marc Novakouski, Jeff Boleng","doi":"10.1109/MILCOM.2017.8170773","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170773","url":null,"abstract":"Personnel operating in tactical environments heavily rely on information sharing to perform their missions. Solutions deployed in these environments need to focus on reliability and performance, in addition to usability to work as unattended as possible due to the often chaotic nature of operations. In this paper we propose a solution for delay-tolerant data sharing, in particular file sharing, using well supported, common networking protocols. The solution is based on the concept of broadcatching, which combines a delay-tolerant protocol such as BitTorrent with a publish/subscribe mechanism such as RSS to enable “many to one” information sharing. Experimental data shows that it is a promising approach for enabling reliable, mostly unattended data sharing on tactical networks in tactical environments.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124022721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Shortest paths for routing information over temporally dynamic communication networks 在临时动态通信网络上路由信息的最短路径
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170722
M. Hirsch, Azar Sadeghnejad, Héctor J. Ortiz-Peña
There has been a significant increase in the number of sensors deployed to accomplish military missions. These sensors might be on manned or unmanned resources, and might collect quantitative and/or qualitative information important for mission success. Of critical importance for mission success is ensuring that the collected information is routed to the people/systems that need the information for the proper making of decisions. For military applications, routing of information across a communication network has typically been accomplished using fixed, a priori defined, routing paths. When bandwidth between resources is unlimited, this presents no problems. However, in bandwidth constrained environments, when not all information is able to be routed across the network, then fixed routing paths presents limitations in information reaching appropriate consumers. In this research, we consider the advantages to using dynamic shortest temporal path routes for the information, as opposed to fixed routing paths. Multiple metrics show empirically the benefit to dynamic shortest path routes.
为完成军事任务而部署的传感器数量已显著增加。这些传感器可能在有人或无人资源上,并可能收集对任务成功很重要的定量和/或定性信息。对任务成功至关重要的是确保将收集到的信息传送给需要这些信息以作出正确决策的人员/系统。对于军事应用,信息在通信网络上的路由通常是使用固定的、先验定义的路由路径来完成的。当资源之间的带宽是无限的时,这不会出现问题。然而,在带宽受限的环境中,当并非所有信息都能够通过网络进行路由时,固定的路由路径会限制信息到达适当的消费者。在这项研究中,我们考虑了使用动态最短时间路径路由的优势,而不是固定的路由路径。多个指标从经验上显示了动态最短路径路由的好处。
{"title":"Shortest paths for routing information over temporally dynamic communication networks","authors":"M. Hirsch, Azar Sadeghnejad, Héctor J. Ortiz-Peña","doi":"10.1109/MILCOM.2017.8170722","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170722","url":null,"abstract":"There has been a significant increase in the number of sensors deployed to accomplish military missions. These sensors might be on manned or unmanned resources, and might collect quantitative and/or qualitative information important for mission success. Of critical importance for mission success is ensuring that the collected information is routed to the people/systems that need the information for the proper making of decisions. For military applications, routing of information across a communication network has typically been accomplished using fixed, a priori defined, routing paths. When bandwidth between resources is unlimited, this presents no problems. However, in bandwidth constrained environments, when not all information is able to be routed across the network, then fixed routing paths presents limitations in information reaching appropriate consumers. In this research, we consider the advantages to using dynamic shortest temporal path routes for the information, as opposed to fixed routing paths. Multiple metrics show empirically the benefit to dynamic shortest path routes.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115653045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
User location determination using delay and Doppler measurements in LEO satellite systems 在低轨道卫星系统中使用延迟和多普勒测量来确定用户位置
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170797
Y. Vasavada, Deepak Arur, C. Ravishankar, C. Barnett
Although an external Global Navigational Satellite System (GNSS) solution is often relied upon for fixing the location of user terminals (UTs), fixing the UT position autonomously in LEO satellite systems is a tractable problem which has a system benefit. An autonomous solution comes to use if the GNSS solution becomes unavailable either temporarily (e.g., due to a delay in initial GNSS position fix) or for prolonged periods (due to major outages or regulatory constraints), or if the system security policies do not allow transmission of the user position over the air. In this paper, we describe two nonlinear root-finding algorithms (applicable either at the UT or at the satellite Gateway (GW)) that take as the inputs the delay and Doppler offset measurements from the physical layer receiver and generate an estimate of the user location (and optionally velocity) as the output. Algorithm simulation results suggest that a high accuracy estimate (in which position error exceeds 1 km in less than 10% cases) is possible when UT has visibility to more than one satellite, while less accurate results (e.g., ∼ 20% chance of position errors exceeding 2 km) are achievable in a single satellite scenario.
虽然通常依赖外部全球导航卫星系统(GNSS)解决方案来固定用户终端(UT)的位置,但在LEO卫星系统中自主固定UT位置是一个可处理的问题,具有系统效益。如果GNSS解决方案暂时(例如,由于初始GNSS位置固定的延迟)或长时间(由于重大中断或监管限制)不可用,或者如果系统安全策略不允许通过空中传输用户位置,则需要使用自主解决方案。在本文中,我们描述了两种非线性寻根算法(适用于UT或卫星网关(GW)),它们将物理层接收器的延迟和多普勒偏移测量作为输入,并生成用户位置(以及可选的速度)的估计作为输出。算法模拟结果表明,当UT对一颗以上卫星可见时,可以实现高精度估计(在不到10%的情况下位置误差超过1公里),而在单个卫星情况下,可以实现较低精度的结果(例如,位置误差超过2公里的机会约为20%)。
{"title":"User location determination using delay and Doppler measurements in LEO satellite systems","authors":"Y. Vasavada, Deepak Arur, C. Ravishankar, C. Barnett","doi":"10.1109/MILCOM.2017.8170797","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170797","url":null,"abstract":"Although an external Global Navigational Satellite System (GNSS) solution is often relied upon for fixing the location of user terminals (UTs), fixing the UT position autonomously in LEO satellite systems is a tractable problem which has a system benefit. An autonomous solution comes to use if the GNSS solution becomes unavailable either temporarily (e.g., due to a delay in initial GNSS position fix) or for prolonged periods (due to major outages or regulatory constraints), or if the system security policies do not allow transmission of the user position over the air. In this paper, we describe two nonlinear root-finding algorithms (applicable either at the UT or at the satellite Gateway (GW)) that take as the inputs the delay and Doppler offset measurements from the physical layer receiver and generate an estimate of the user location (and optionally velocity) as the output. Algorithm simulation results suggest that a high accuracy estimate (in which position error exceeds 1 km in less than 10% cases) is possible when UT has visibility to more than one satellite, while less accurate results (e.g., ∼ 20% chance of position errors exceeding 2 km) are achievable in a single satellite scenario.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128738746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assigning teams to tasks under time-varying coordination costs 在协调成本随时间变化的情况下为团队分配任务
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170828
Yuan N. Li, P. Basu
Coordination among workers within a collaborative team environment is a key factor to its success but it is challenging to come up with a general model for relative costs and benefits of coordination. In a typical work environment, teams with sufficient aggregate expertise are selected to work on an incoming sequence of tasks one by one; it is often the case that the cost of coordination among the same set of workers within a team decreases over time for future tasks of similar difficulty since the workers get more familiar with each other. We study the problem of assigning available teams with adequate aggregate expertise to arriving tasks when the coordination cost can vary over time, as long as it does not increase over time. We propose an efficient team-to-task assignment algorithm that minimizes aggregate costs (due to assignment, coordination and context-switching). The algorithm automatically finds the number of times a specific team should be assigned to a task in the sequence by applying dynamic programming iteratively and guarantees a local optimal solution. We also study a strategy for team assembly in this time varying coordination cost scenario.
在协作团队环境中,员工之间的协调是其成功的关键因素,但提出一个协调的相对成本和收益的通用模型是具有挑战性的。在典型的工作环境中,选择具有足够专业知识的团队一个接一个地处理传入的任务序列;通常情况下,团队中同一组工作人员之间的协调成本会随着时间的推移而降低,因为工作人员彼此更加熟悉。我们研究的问题是,当协调成本随时间变化,只要不随时间增加,分配具有足够专业知识的可用团队来完成任务。我们提出了一种高效的团队到任务分配算法,该算法将总成本(由于分配、协调和上下文切换)最小化。该算法通过动态规划的迭代方法,自动找到序列中某一特定团队应分配任务的次数,并保证局部最优解。我们还研究了在这种随时间变化的协调成本情况下的团队组合策略。
{"title":"Assigning teams to tasks under time-varying coordination costs","authors":"Yuan N. Li, P. Basu","doi":"10.1109/MILCOM.2017.8170828","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170828","url":null,"abstract":"Coordination among workers within a collaborative team environment is a key factor to its success but it is challenging to come up with a general model for relative costs and benefits of coordination. In a typical work environment, teams with sufficient aggregate expertise are selected to work on an incoming sequence of tasks one by one; it is often the case that the cost of coordination among the same set of workers within a team decreases over time for future tasks of similar difficulty since the workers get more familiar with each other. We study the problem of assigning available teams with adequate aggregate expertise to arriving tasks when the coordination cost can vary over time, as long as it does not increase over time. We propose an efficient team-to-task assignment algorithm that minimizes aggregate costs (due to assignment, coordination and context-switching). The algorithm automatically finds the number of times a specific team should be assigned to a task in the sequence by applying dynamic programming iteratively and guarantees a local optimal solution. We also study a strategy for team assembly in this time varying coordination cost scenario.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125371007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Underdetermined source number estimation based on complex wishart distribution using nested arrays 基于嵌套数组的复杂wishart分布的待定源数估计
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170830
Yu Rong, D. Bliss
We propose a likelihood test for a covariance estimated from sample data which is used to determine the number of narrow band source signals. This Minimum Description Length (MDL) estimator is shown to be robust against deviations from the assumption of equal noise level across the array. A number of source Direction-Of-Arrivals (DOA) greater than the number of physical array elements is of interest. We propose a novel spatial smoothing algorithm which accurately estimates parameters for the covariance likelihood test. Improved parameter estimation performance is achieved when compared with the conventional spatial smoothing algorithm. Finally, the proposed source number estimator is validated through numerical results and compared with other recently developed approaches.
我们提出了一个从样本数据估计协方差的似然检验,用于确定窄带源信号的数量。该最小描述长度(MDL)估计器对阵列上噪声水平相等的假设偏差具有鲁棒性。源到达方向(DOA)的数量大于物理阵列元素的数量是值得关注的。提出了一种新的空间平滑算法,可以准确估计协方差似然检验的参数。与传统的空间平滑算法相比,该算法的参数估计性能得到了提高。最后,通过数值结果验证了所提出的源数估计方法,并与最近发展的其他方法进行了比较。
{"title":"Underdetermined source number estimation based on complex wishart distribution using nested arrays","authors":"Yu Rong, D. Bliss","doi":"10.1109/MILCOM.2017.8170830","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170830","url":null,"abstract":"We propose a likelihood test for a covariance estimated from sample data which is used to determine the number of narrow band source signals. This Minimum Description Length (MDL) estimator is shown to be robust against deviations from the assumption of equal noise level across the array. A number of source Direction-Of-Arrivals (DOA) greater than the number of physical array elements is of interest. We propose a novel spatial smoothing algorithm which accurately estimates parameters for the covariance likelihood test. Improved parameter estimation performance is achieved when compared with the conventional spatial smoothing algorithm. Finally, the proposed source number estimator is validated through numerical results and compared with other recently developed approaches.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127518475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The design and implementation of a multicast address moving target defensive system for internet-of-things applications 物联网多播地址移动目标防御系统的设计与实现
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170748
Kevin Andrea, A. Gumusalan, R. Simon, H. Harney
Distributed Denial of Service (DDoS) attacks serve to diminish the ability of the network to perform its intended function over time. The paper presents the design, implementation and analysis of a protocol based upon a technique for address agility called DDoS Resistant Multicast (DRM). After describing the our architecture and implementation we show an analysis that quantifies the overhead on network performance. We then present the Simple Agile RPL multiCAST (SARCAST), an Internet-of-Things routing protocol for DDoS protection. We have implemented and evaluated SARCAST in a working IoT operating system and testbed. Our results show that SARCAST provides very high levels of protection against DDoS attacks with virtually no impact on overall performance.
随着时间的推移,分布式拒绝服务(DDoS)攻击会削弱网络执行其预期功能的能力。本文介绍了一种基于地址敏捷技术的协议的设计、实现和分析,称为抗DDoS多播(DRM)。在描述了我们的体系结构和实现之后,我们将展示一个量化网络性能开销的分析。然后,我们提出了简单敏捷RPL组播(SARCAST),一种用于DDoS保护的物联网路由协议。我们已经在物联网操作系统和测试平台上实施和评估了SARCAST。我们的结果表明,SARCAST对DDoS攻击提供了非常高水平的保护,而对整体性能几乎没有影响。
{"title":"The design and implementation of a multicast address moving target defensive system for internet-of-things applications","authors":"Kevin Andrea, A. Gumusalan, R. Simon, H. Harney","doi":"10.1109/MILCOM.2017.8170748","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170748","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks serve to diminish the ability of the network to perform its intended function over time. The paper presents the design, implementation and analysis of a protocol based upon a technique for address agility called DDoS Resistant Multicast (DRM). After describing the our architecture and implementation we show an analysis that quantifies the overhead on network performance. We then present the Simple Agile RPL multiCAST (SARCAST), an Internet-of-Things routing protocol for DDoS protection. We have implemented and evaluated SARCAST in a working IoT operating system and testbed. Our results show that SARCAST provides very high levels of protection against DDoS attacks with virtually no impact on overall performance.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127822515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient distribution of fragmented sensor data for obfuscation 用于混淆的碎片传感器数据的有效分布
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170861
Jason A. Wampler, Chien Hsieh, Andrew Toth
The inherent nature of unattended sensors makes these devices most vulnerable to detection, exploitation, and denial in contested environments. Physical access is often cited as the easiest way to compromise any device or network. A new mechanism for mitigating these types of attacks developed under the Assistant Secretary of Defense for Research and Engineering, ASD(R&E) project, “Smoke Screen in Cyberspace”, was previously demonstrated in a live, over-the-air experiment. Smoke Screen encrypts, slices up, and disburses redundant fragments of files throughout the network. This paper describes enhancements to the disbursement of the file fragments routing improving the efficiency and time to completion of fragment distribution by defining the exact route, fragments should take to the destination. This is the first step in defining a custom protocol for the discovery of participating nodes and the efficient distribution of fragments in a mobile network. Future work will focus on the movement of fragments to avoid traffic analysis and avoid the collection of the entire fragment set that would enable an adversary to reconstruct the original piece of data.
无人值守传感器的固有特性使这些设备在竞争环境中最容易受到检测、利用和拒绝。物理访问通常被认为是破坏任何设备或网络的最简单方法。在负责研究与工程的助理国防部长ASD(R&E)项目“网络空间烟幕”下开发的一种减轻这些类型攻击的新机制,此前已在现场无线实验中进行了演示。烟幕在整个网络中加密、切片和分发冗余的文件片段。本文描述了对文件分片路由支付的改进,通过定义分片到目的地的确切路由,提高了分片分发的效率和完成时间。这是定义自定义协议的第一步,用于在移动网络中发现参与节点和有效分发碎片。未来的工作将集中在碎片的移动上,以避免流量分析,并避免收集整个碎片集,这将使对手能够重建原始数据。
{"title":"Efficient distribution of fragmented sensor data for obfuscation","authors":"Jason A. Wampler, Chien Hsieh, Andrew Toth","doi":"10.1109/MILCOM.2017.8170861","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170861","url":null,"abstract":"The inherent nature of unattended sensors makes these devices most vulnerable to detection, exploitation, and denial in contested environments. Physical access is often cited as the easiest way to compromise any device or network. A new mechanism for mitigating these types of attacks developed under the Assistant Secretary of Defense for Research and Engineering, ASD(R&E) project, “Smoke Screen in Cyberspace”, was previously demonstrated in a live, over-the-air experiment. Smoke Screen encrypts, slices up, and disburses redundant fragments of files throughout the network. This paper describes enhancements to the disbursement of the file fragments routing improving the efficiency and time to completion of fragment distribution by defining the exact route, fragments should take to the destination. This is the first step in defining a custom protocol for the discovery of participating nodes and the efficient distribution of fragments in a mobile network. Future work will focus on the movement of fragments to avoid traffic analysis and avoid the collection of the entire fragment set that would enable an adversary to reconstruct the original piece of data.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123819132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Compressive sensing based direction-of-arrival estimation using reweighted greedy block coordinate descent algorithm for ESPAR antennas 基于压缩感知的ESPAR天线到达方向估计——重加权贪婪块坐标下降算法
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170862
H. Yazdani, A. Vosoughi, N. Rahnavard
In this paper, we consider the problem of direction-of-arrival (DoA) estimation using electronically steerable parasitic array radiator (ESPAR) antenna based on compressive sensing. For an ESPAR antenna, the beampatterns and sparse model of DoA estimation problem in terms of overcomplete dictionary and sampling grid is presented. The DoA estimation problem is formulated as a mixed-norm ℓ2,1 minimization problem and the reactance domain multiple signal classification (RD-MUSIC) spatial spectrum for ESPAR antenna is introduced. Then, we propose reweighted greedy block coordinate descent (RW-GBCD) and reweighted ℓ2,1-SVD (RW-ℓ2,1-SVD) algorithms for DOA estimation using ESPAR. The performance of RW-GBCD for DoA estimation is compared to that of GBCD, ℓ2,1-SVD and RD-MUSIC algorithms. RW-GBCD benefits from less computational complexity compared to RW-ℓ2,1-SVD. Simulation results demonstrate that the performance of RW-GBCD is better than that of GBCD and ℓ2,1-SVD. When angle separation is less than 10°, RW-ℓ2,1-SVD outperforms RW-GBCD. However, when angle separation is more than 10°, the performance of RW-GBCD in terms of root mean square error (RMSE) is approximately the same as that of RW-ℓ2,1-SVD.
本文研究了基于压缩感知的电子可控寄生阵列辐射天线(ESPAR)的到达方向估计问题。针对ESPAR天线,给出了基于过完备字典和采样网格的DoA估计问题的波束方向图和稀疏模型。将DoA估计问题表述为混合范数最小化问题,并介绍了ESPAR天线的电抗域多信号分类(RD-MUSIC)空间频谱。在此基础上,提出了基于ESPAR的重加权贪婪块坐标下降(RW- gbcd)和重加权21,1 - svd (RW- 21,1 - svd)算法。并将RW-GBCD算法与GBCD、1,2 - svd和RD-MUSIC算法的DoA估计性能进行了比较。RW- gbcd与RW- l1,2 - svd相比,计算复杂度更低。仿真结果表明,RW-GBCD算法的性能优于GBCD算法和l1,2 - svd算法。当角度分离小于10°时,RW- l1,2 - svd优于RW- gbcd。然而,当角度分离大于10°时,RW- gbcd在均方根误差(RMSE)方面的性能与RW- l1,2 - svd大致相同。
{"title":"Compressive sensing based direction-of-arrival estimation using reweighted greedy block coordinate descent algorithm for ESPAR antennas","authors":"H. Yazdani, A. Vosoughi, N. Rahnavard","doi":"10.1109/MILCOM.2017.8170862","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170862","url":null,"abstract":"In this paper, we consider the problem of direction-of-arrival (DoA) estimation using electronically steerable parasitic array radiator (ESPAR) antenna based on compressive sensing. For an ESPAR antenna, the beampatterns and sparse model of DoA estimation problem in terms of overcomplete dictionary and sampling grid is presented. The DoA estimation problem is formulated as a mixed-norm ℓ<inf>2,1</inf> minimization problem and the reactance domain multiple signal classification (RD-MUSIC) spatial spectrum for ESPAR antenna is introduced. Then, we propose reweighted greedy block coordinate descent (RW-GBCD) and reweighted ℓ<inf>2,1</inf>-SVD (RW-ℓ<inf>2,1</inf>-SVD) algorithms for DOA estimation using ESPAR. The performance of RW-GBCD for DoA estimation is compared to that of GBCD, ℓ<inf>2,1</inf>-SVD and RD-MUSIC algorithms. RW-GBCD benefits from less computational complexity compared to RW-ℓ<inf>2,1</inf>-SVD. Simulation results demonstrate that the performance of RW-GBCD is better than that of GBCD and ℓ<inf>2,1</inf>-SVD. When angle separation is less than 10°, RW-ℓ<inf>2,1</inf>-SVD outperforms RW-GBCD. However, when angle separation is more than 10°, the performance of RW-GBCD in terms of root mean square error (RMSE) is approximately the same as that of RW-ℓ<inf>2,1</inf>-SVD.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126300098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1