首页 > 最新文献

MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)最新文献

英文 中文
Secrecy capacity probability of a SIMO system with dissimilar and non-integer Nakagami-m fading factors 具有不同非整数Nakagami-m衰落因子的SIMO系统的保密能力概率
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170738
Xian Liu
In this paper, we investigate the information-theoretic secrecy of a system with multiple legitimate receivers and multiple eavesdroppers. This system is subject to the Nakagami-m fading. Unlike some existing works, we do not assume that the fading parameters are identical or integers. Although the complexity is significantly increased, we are able to derive a set of closed-form formulas for the outage probability and the probability of strictly positive secrecy capacity.
本文研究了具有多个合法接收方和多个窃听方的系统的信息保密问题。该系统受中上米衰落的影响。与一些现有的工作不同,我们不假设衰落参数是相同的或整数。虽然复杂性大大增加,但我们能够推导出一组关于中断概率和严格正保密能力概率的封闭公式。
{"title":"Secrecy capacity probability of a SIMO system with dissimilar and non-integer Nakagami-m fading factors","authors":"Xian Liu","doi":"10.1109/MILCOM.2017.8170738","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170738","url":null,"abstract":"In this paper, we investigate the information-theoretic secrecy of a system with multiple legitimate receivers and multiple eavesdroppers. This system is subject to the Nakagami-m fading. Unlike some existing works, we do not assume that the fading parameters are identical or integers. Although the complexity is significantly increased, we are able to derive a set of closed-form formulas for the outage probability and the probability of strictly positive secrecy capacity.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126650256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dataset generator for next generation system call host intrusion detection systems 一个用于下一代系统调用主机入侵检测系统的数据集生成器
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170835
Marcus Pendleton, Shouhuai Xu
Over the years, system calls (syscalls) have become an increasingly popular data source for host intrusion detection systems (HIDS). This is partly due to their strong security semantic implications. As syscalls conform to a program's control-flow graph, a deviation in a syscall sequence may imply a deviation in a program's control-flow graph. This is useful for detecting the control-flow hijacking class of attacks. Additionally, malware must utilize syscalls in order to provide any utility to the attacker, with the exception of some denial-of-service attacks. Because all syscalls are observable from the kernel, this makes evasion difficult for attackers under syscall HIDS. Given their suitability for HIDS, many approaches based on syscalls have been proposed. However, the syscall datasets available are not always the most suitable for these and emerging techniques in analytics, as they may need additional structural or contextual information about syscalls in their decision engine. Furthermore, this flatness of previous datasets often pigeonholes solutions into those which are limited by that data view. It is also burdensome on the researcher to generate his own custom dataset. In this work, we propose an extensible syscall dataset generator which includes structural and limited contextual information regarding syscalls, yet allows for researchers to easily add their own features to more quickly develop and evaluate their systems. Our dataset generator can aid researchers in widening the solution space for syscall HIDS.
多年来,系统调用(sycall)已成为主机入侵检测系统(HIDS)日益流行的数据源。这部分是由于它们强大的安全语义含义。由于系统调用符合程序的控制流图,因此系统调用序列中的偏差可能意味着程序的控制流图中的偏差。这对于检测控制流劫持类攻击很有用。此外,恶意软件必须利用系统调用,以便为攻击者提供任何实用程序,某些拒绝服务攻击除外。因为所有的系统调用都可以从内核中观察到,这使得攻击者很难在系统调用HIDS下逃避攻击。考虑到它们对HIDS的适用性,已经提出了许多基于系统调用的方法。然而,可用的系统调用数据集并不总是最适合这些和新兴的分析技术,因为它们可能需要关于决策引擎中的系统调用的额外结构或上下文信息。此外,以前数据集的这种平整性经常将解决方案归类为受数据视图限制的解决方案。对于研究人员来说,生成自己的自定义数据集也很麻烦。在这项工作中,我们提出了一个可扩展的系统调用数据集生成器,其中包括关于系统调用的结构和有限的上下文信息,但允许研究人员轻松添加自己的功能,以更快地开发和评估他们的系统。我们的数据集生成器可以帮助研究人员扩大系统调用HIDS的解决方案空间。
{"title":"A dataset generator for next generation system call host intrusion detection systems","authors":"Marcus Pendleton, Shouhuai Xu","doi":"10.1109/MILCOM.2017.8170835","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170835","url":null,"abstract":"Over the years, system calls (syscalls) have become an increasingly popular data source for host intrusion detection systems (HIDS). This is partly due to their strong security semantic implications. As syscalls conform to a program's control-flow graph, a deviation in a syscall sequence may imply a deviation in a program's control-flow graph. This is useful for detecting the control-flow hijacking class of attacks. Additionally, malware must utilize syscalls in order to provide any utility to the attacker, with the exception of some denial-of-service attacks. Because all syscalls are observable from the kernel, this makes evasion difficult for attackers under syscall HIDS. Given their suitability for HIDS, many approaches based on syscalls have been proposed. However, the syscall datasets available are not always the most suitable for these and emerging techniques in analytics, as they may need additional structural or contextual information about syscalls in their decision engine. Furthermore, this flatness of previous datasets often pigeonholes solutions into those which are limited by that data view. It is also burdensome on the researcher to generate his own custom dataset. In this work, we propose an extensible syscall dataset generator which includes structural and limited contextual information regarding syscalls, yet allows for researchers to easily add their own features to more quickly develop and evaluate their systems. Our dataset generator can aid researchers in widening the solution space for syscall HIDS.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126940640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Design and analysis of dual helix liquid metal antenna 双螺旋液态金属天线的设计与分析
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170731
Jonathan Thews, A. O'Donnell, Alan J. Michaels
The goal of this paper is to expand on previously researched Eutectic Gallium-Indium (EGaIn) alloy liquid metal antennas to create an antenna that can change both polarization and frequency to meet the users needs. This concept is described through analytical models of helix antennas, simulations performed in FEKO, and measured results of a proof-of-concept dual frequency L-band GPS-focused hardware model. Although ongoing work is being performed to more efficiently feed this proof-of-concept liquid metal antenna, the overall realized gain of the helix aligned well with theoretical models.
本文的目标是扩展先前研究的共晶镓铟(EGaIn)合金液态金属天线,以创建可以改变极化和频率以满足用户需求的天线。该概念通过螺旋天线的分析模型、在FEKO中进行的仿真以及概念验证的双频l波段gps硬件模型的测量结果来描述。虽然为了更有效地为这种概念验证型液态金属天线提供馈电还在进行中,但螺旋结构的总体实现增益与理论模型非常吻合。
{"title":"Design and analysis of dual helix liquid metal antenna","authors":"Jonathan Thews, A. O'Donnell, Alan J. Michaels","doi":"10.1109/MILCOM.2017.8170731","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170731","url":null,"abstract":"The goal of this paper is to expand on previously researched Eutectic Gallium-Indium (EGaIn) alloy liquid metal antennas to create an antenna that can change both polarization and frequency to meet the users needs. This concept is described through analytical models of helix antennas, simulations performed in FEKO, and measured results of a proof-of-concept dual frequency L-band GPS-focused hardware model. Although ongoing work is being performed to more efficiently feed this proof-of-concept liquid metal antenna, the overall realized gain of the helix aligned well with theoretical models.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130544610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure VM migration in tactical cloudlets 战术云中的安全虚拟机迁移
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170742
G. Lewis, Sebastián Echeverría, D. Klinedinst, Keegan Williams
Tactical cloudlets are forward-deployed, discoverable, virtual-machine-based servers that can be hosted on vehicles or other platforms to provide a computation offload and data staging infrastructure for mobile devices in the field. Because of the mobility of cloudlets in the field, as well as dynamic missions, a mobile user of a cloudlet might need to migrate active capabilities (computation and data) to another trusted cloudlet. A common solution for establishing trust between two nodes is to create and share credentials in advance, and then use a third-party, online trusted authority to validate the credentials of the nodes. However, the characteristics of tactical environments do not consistently provide access to that third-party authority or certificate repository because they are DIL environments (disconnected, intermittent, limited). The goal of this paper is to present a solution for secure VM migration between tactical cloudlets based on secure key generation and exchange in the field.
战术云是向前部署的、可发现的、基于虚拟机的服务器,可以托管在车辆或其他平台上,为现场的移动设备提供计算卸载和数据分级基础设施。由于cloudlet在现场以及动态任务中的移动性,cloudlet的移动用户可能需要将活动功能(计算和数据)迁移到另一个可信的cloudlet。在两个节点之间建立信任的常见解决方案是提前创建并共享凭据,然后使用第三方在线可信机构验证节点的凭据。然而,战术环境的特征并不能始终如一地提供对第三方权威机构或证书存储库的访问,因为它们是DIL环境(断开连接、断断续续、有限)。本文的目标是提出一种基于现场安全密钥生成和交换的战术云之间VM安全迁移的解决方案。
{"title":"Secure VM migration in tactical cloudlets","authors":"G. Lewis, Sebastián Echeverría, D. Klinedinst, Keegan Williams","doi":"10.1109/MILCOM.2017.8170742","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170742","url":null,"abstract":"Tactical cloudlets are forward-deployed, discoverable, virtual-machine-based servers that can be hosted on vehicles or other platforms to provide a computation offload and data staging infrastructure for mobile devices in the field. Because of the mobility of cloudlets in the field, as well as dynamic missions, a mobile user of a cloudlet might need to migrate active capabilities (computation and data) to another trusted cloudlet. A common solution for establishing trust between two nodes is to create and share credentials in advance, and then use a third-party, online trusted authority to validate the credentials of the nodes. However, the characteristics of tactical environments do not consistently provide access to that third-party authority or certificate repository because they are DIL environments (disconnected, intermittent, limited). The goal of this paper is to present a solution for secure VM migration between tactical cloudlets based on secure key generation and exchange in the field.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132687587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A secrecy model in satellite fading channels 卫星衰落信道中的保密模型
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170778
Xian Liu
The Hoyt distribution can be used to characterize two types of fading in satellite communications. In this paper, the secrecy of the Hoyt-Hoyt fading channel is investigated. A set of exact formulas of the probability of strictly positive secrecy capacity are derived. Profile examples are illustrated to show the effects of secrecy capacity.
霍伊特分布可用于描述卫星通信中两种类型的衰落。本文研究了霍伊特-霍伊特衰落信道的保密性问题。导出了一组严格正保密能力概率的精确公式。举例说明了保密能力的影响。
{"title":"A secrecy model in satellite fading channels","authors":"Xian Liu","doi":"10.1109/MILCOM.2017.8170778","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170778","url":null,"abstract":"The Hoyt distribution can be used to characterize two types of fading in satellite communications. In this paper, the secrecy of the Hoyt-Hoyt fading channel is investigated. A set of exact formulas of the probability of strictly positive secrecy capacity are derived. Profile examples are illustrated to show the effects of secrecy capacity.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132831332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WISCA SDR network WISCA SDR网络
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170824
Hanguang Yu, Hyunseok Lee, Richard M. Gutierrez, A. Herschfelt, D. Bliss
In this paper, the WISCA Software Defined Radio (SDR) Network platform are presented. The WISCA SDR Network provides the user with a highly configurable and flexible algorithm development platform to conduct wireless communication research. Each node in the network utilizes Ettus Research USRP (Universal Software Radio Peripheral) technology for the radio frequency front end, along with the industry standard MATLAB algorithm development environment for baseband processing. As a result, the WISCA SDR network allows the user to develop and test new concepts quickly. It demonstrates the flexibility of this system by providing a couple of examples involving message forwarding, carrier sensing and a joint radar-communications system. To help improve and further develop the system, the WISCA SDR Network will be released as an open source project.
本文介绍了WISCA软件定义无线电(SDR)网络平台。WISCA SDR网络为用户进行无线通信研究提供了一个高度可配置、灵活的算法开发平台。网络中的每个节点采用Ettus Research USRP(通用软件无线电外设)技术作为射频前端,并使用行业标准的MATLAB算法开发环境进行基带处理。因此,WISCA SDR网络允许用户快速开发和测试新概念。它通过提供涉及消息转发、载波传感和联合雷达通信系统的几个示例来演示该系统的灵活性。为了帮助改进和进一步发展该系统,WISCA SDR网络将作为一个开源项目发布。
{"title":"WISCA SDR network","authors":"Hanguang Yu, Hyunseok Lee, Richard M. Gutierrez, A. Herschfelt, D. Bliss","doi":"10.1109/MILCOM.2017.8170824","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170824","url":null,"abstract":"In this paper, the WISCA Software Defined Radio (SDR) Network platform are presented. The WISCA SDR Network provides the user with a highly configurable and flexible algorithm development platform to conduct wireless communication research. Each node in the network utilizes Ettus Research USRP (Universal Software Radio Peripheral) technology for the radio frequency front end, along with the industry standard MATLAB algorithm development environment for baseband processing. As a result, the WISCA SDR network allows the user to develop and test new concepts quickly. It demonstrates the flexibility of this system by providing a couple of examples involving message forwarding, carrier sensing and a joint radar-communications system. To help improve and further develop the system, the WISCA SDR Network will be released as an open source project.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129297280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Effects of interference between co-located frequency-hopping ad hoc networks 同址跳频自组织网络间干扰的影响
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170801
K. Fors, S. Linder, J. Nilsson, U. Sterner
Traffic in military ad hoc networks are often broadcast or multicast traffic. A robust and efficient way to handle this type of traffic is the multi-point-relay (MPR) method. Furthermore, frequency spectrum is a scarce resource and must often be shared by several networks resulting in a risk for internetwork interference. The objective of this paper is to analyze the effects from internetwork interference in frequency-hopping (FH) ad hoc networks. Earlier work show that performance on a communication link can be degraded by interference between FH systems sharing the same spectrum resource. Results in this paper show that ad hoc networks are robust against FH interference in terms of a maintained high delivery ratio, but it is achieved at the cost of reduced capacity in the network. This reduction can in some scenarios be severe resulting in two networks with interference being less efficient than time-sharing between the networks.
军用自组织网络中的流量通常是广播或组播流量。多点中继(multi-point relay, MPR)是处理这类流量的一种鲁棒且有效的方法。此外,频谱是一种稀缺资源,经常必须由多个网络共享,从而导致网络间干扰的风险。本文的目的是分析跳频(FH)自组网中网络间干扰的影响。早期的研究表明,共享相同频谱资源的跳频系统之间的干扰会降低通信链路的性能。本文的研究结果表明,在保持高传输率方面,ad hoc网络对跳频干扰具有鲁棒性,但这是以降低网络容量为代价的。在某些情况下,这种减少可能会导致两个具有干扰的网络的效率低于网络之间的分时。
{"title":"Effects of interference between co-located frequency-hopping ad hoc networks","authors":"K. Fors, S. Linder, J. Nilsson, U. Sterner","doi":"10.1109/MILCOM.2017.8170801","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170801","url":null,"abstract":"Traffic in military ad hoc networks are often broadcast or multicast traffic. A robust and efficient way to handle this type of traffic is the multi-point-relay (MPR) method. Furthermore, frequency spectrum is a scarce resource and must often be shared by several networks resulting in a risk for internetwork interference. The objective of this paper is to analyze the effects from internetwork interference in frequency-hopping (FH) ad hoc networks. Earlier work show that performance on a communication link can be degraded by interference between FH systems sharing the same spectrum resource. Results in this paper show that ad hoc networks are robust against FH interference in terms of a maintained high delivery ratio, but it is achieved at the cost of reduced capacity in the network. This reduction can in some scenarios be severe resulting in two networks with interference being less efficient than time-sharing between the networks.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123741740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling the age of information in emulated ad hoc networks 模拟自组织网络中的信息时代建模
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170800
C. Kam, S. Kompella, G. Nguyen, J. Wieselthier, A. Ephremides
The age of information is a measure of the freshness of continually updated information, which has been studied theoretically for a variety of queueing models. We conduct an experimental evaluation of the age of information in various emulated network settings to see how well the queue models approximate a network for the purpose of age. We use CORE and EMANE to deploy a one-dimensional multi-hop network, and a two-dimensional grid multi-hop network, and we compare to the theoretical age under the D/M/1 and D/D/1 queue models. We observe that for these regular static networks, the D/D/1 models the average age performance better than the D/M/1 in lightly loaded networks with low loss. When losses increase, the age is greater than predicted by the D/D/1 model.
信息年龄是对不断更新的信息的新鲜度的度量,已经从理论上对各种排队模型进行了研究。我们对各种模拟网络设置中的信息年龄进行了实验评估,以了解队列模型如何很好地近似于年龄目的的网络。利用CORE和EMANE分别部署了一维多跳网络和二维网格多跳网络,并对D/M/1和D/D/1队列模型下的理论年龄进行了比较。我们观察到,对于这些常规静态网络,D/D/1模型的平均年龄性能优于D/M/1模型在低损耗轻负载网络中的平均年龄性能。当损失增加时,年龄大于D/D/1模型预测的年龄。
{"title":"Modeling the age of information in emulated ad hoc networks","authors":"C. Kam, S. Kompella, G. Nguyen, J. Wieselthier, A. Ephremides","doi":"10.1109/MILCOM.2017.8170800","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170800","url":null,"abstract":"The age of information is a measure of the freshness of continually updated information, which has been studied theoretically for a variety of queueing models. We conduct an experimental evaluation of the age of information in various emulated network settings to see how well the queue models approximate a network for the purpose of age. We use CORE and EMANE to deploy a one-dimensional multi-hop network, and a two-dimensional grid multi-hop network, and we compare to the theoretical age under the D/M/1 and D/D/1 queue models. We observe that for these regular static networks, the D/D/1 models the average age performance better than the D/M/1 in lightly loaded networks with low loss. When losses increase, the age is greater than predicted by the D/D/1 model.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121216186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
SATCOM innovation: Priorities for modern development 卫星通信创新:现代发展的重点
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170761
A. Vigil, Mark Jasen, Dahesh A. Khalil
As DoD SATCOM stakeholders and developers, it is vital to understand innovative technical trends and both leverage and influence them in order to best address our priorities. These SATCOM development priorities are growth, adoption of open commercial standards, systemic availability and simplification. Major innovative trends in SATCOM development are Digital IF, modem advances and geographical distribution of strategic RF entry points. Digital IF uses standards-based DSP innovation to enable highly advantageous SATCOM terminal system repartitioning. Modem innovations include updated protocols, interface reduction, all-digital implementations, tailoring of mod-cod sets, automated power and mod-cod responsive to traffic demand and link condition, and detailed attention to human factors. Geographic distribution of strategic RF entry points offers geographic diversity through terrestrial IF transport. All of these innovative trends enable growth in capabilities, bandwidth, link counts and systemic availability. All are based on open commercial standards which serve to simplify development, equipment, test processes, planning and operations. The challenge now is to leverage the progress of these trends optimally to help the DoD SATCOM user best support the warfighter. Optimal development along these trend lines, addressing the cited priorities, will be realized by greater awareness of these trends, rapid adoption of commercial offerings and adoption of open commercial standards along the lines of maximum commercial proliferation. On all counts, close collaboration between stakeholders is key to realizing the potential of these innovative trends.
作为国防部卫星通信利益相关者和开发人员,了解创新技术趋势并利用和影响它们以最好地解决我们的优先事项至关重要。这些卫星通信发展的优先事项是增长、采用开放的商业标准、系统可用性和简化。卫星通信发展的主要创新趋势是数字中频、调制解调器的进步和战略射频入口点的地理分布。数字中频使用基于标准的DSP创新,使高度有利的卫星通信终端系统重新划分。调制解调器的创新包括更新协议、减少接口、全数字化实现、调制解调器组的定制、自动电源和调制解调器响应流量需求和链路条件,以及对人为因素的详细关注。战略射频入口点的地理分布通过地面中频传输提供地理多样性。所有这些创新趋势都促进了性能、带宽、链路数和系统可用性的增长。所有这些都基于开放的商业标准,以简化开发,设备,测试过程,计划和操作。现在面临的挑战是如何以最佳方式利用这些趋势的进展,以帮助国防部卫星通信用户最好地支持作战人员。沿着这些趋势线的最佳发展,解决所引用的优先事项,将通过对这些趋势的更大认识,快速采用商业产品和采用开放的商业标准来实现最大的商业扩散。总之,利益攸关方之间的密切合作是实现这些创新趋势潜力的关键。
{"title":"SATCOM innovation: Priorities for modern development","authors":"A. Vigil, Mark Jasen, Dahesh A. Khalil","doi":"10.1109/MILCOM.2017.8170761","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170761","url":null,"abstract":"As DoD SATCOM stakeholders and developers, it is vital to understand innovative technical trends and both leverage and influence them in order to best address our priorities. These SATCOM development priorities are growth, adoption of open commercial standards, systemic availability and simplification. Major innovative trends in SATCOM development are Digital IF, modem advances and geographical distribution of strategic RF entry points. Digital IF uses standards-based DSP innovation to enable highly advantageous SATCOM terminal system repartitioning. Modem innovations include updated protocols, interface reduction, all-digital implementations, tailoring of mod-cod sets, automated power and mod-cod responsive to traffic demand and link condition, and detailed attention to human factors. Geographic distribution of strategic RF entry points offers geographic diversity through terrestrial IF transport. All of these innovative trends enable growth in capabilities, bandwidth, link counts and systemic availability. All are based on open commercial standards which serve to simplify development, equipment, test processes, planning and operations. The challenge now is to leverage the progress of these trends optimally to help the DoD SATCOM user best support the warfighter. Optimal development along these trend lines, addressing the cited priorities, will be realized by greater awareness of these trends, rapid adoption of commercial offerings and adoption of open commercial standards along the lines of maximum commercial proliferation. On all counts, close collaboration between stakeholders is key to realizing the potential of these innovative trends.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"424 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122797777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards data assurance and resilience in IoT using blockchain 使用区块链实现物联网中的数据保障和弹性
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170858
Xueping Liang, Juan Zhao, S. Shetty, Danyi Li
Data assurance and resilience are crucial security issues in cloud-based IoT applications. With the widespread adoption of drones in IoT scenarios such as warfare, agriculture and delivery, effective solutions to protect data integrity and communications between drones and the control system have been in urgent demand to prevent potential vulnerabilities that may cause heavy losses. To secure drone communication during data collection and transmission, as well as preserve the integrity of collected data, we propose a distributed solution by utilizing blockchain technology along with the traditional cloud server. Instead of registering the drone itself to the blockchain, we anchor the hashed data records collected from drones to the blockchain network and generate a blockchain receipt for each data record stored in the cloud, reducing the burden of moving drones with the limit of battery and process capability while gaining enhanced security guarantee of the data. This paper presents the idea of securing drone data collection and communication in combination with a public blockchain for provisioning data integrity and cloud auditing. The evaluation shows that our system is a reliable and distributed system for drone data assurance and resilience with acceptable overhead and scalability for a large number of drones.
在基于云的物联网应用中,数据保障和弹性是关键的安全问题。随着无人机在战争、农业和快递等物联网场景中的广泛应用,迫切需要有效的解决方案来保护无人机与控制系统之间的数据完整性和通信,以防止可能造成重大损失的潜在漏洞。为了确保无人机在数据采集和传输过程中的通信安全,并保持收集数据的完整性,我们提出了一种利用区块链技术与传统云服务器相结合的分布式解决方案。我们不是将无人机本身注册到区块链,而是将无人机收集到的散列数据记录锚定到区块链网络,并为存储在云端的每条数据记录生成区块链收据,减少了无人机在电池和处理能力限制下的移动负担,同时增强了数据的安全保障。本文提出了保护无人机数据收集和通信的想法,并结合公共区块链来提供数据完整性和云审计。评估表明,我们的系统是一个可靠的分布式系统,可用于无人机数据保障和弹性,具有可接受的开销和大量无人机的可扩展性。
{"title":"Towards data assurance and resilience in IoT using blockchain","authors":"Xueping Liang, Juan Zhao, S. Shetty, Danyi Li","doi":"10.1109/MILCOM.2017.8170858","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170858","url":null,"abstract":"Data assurance and resilience are crucial security issues in cloud-based IoT applications. With the widespread adoption of drones in IoT scenarios such as warfare, agriculture and delivery, effective solutions to protect data integrity and communications between drones and the control system have been in urgent demand to prevent potential vulnerabilities that may cause heavy losses. To secure drone communication during data collection and transmission, as well as preserve the integrity of collected data, we propose a distributed solution by utilizing blockchain technology along with the traditional cloud server. Instead of registering the drone itself to the blockchain, we anchor the hashed data records collected from drones to the blockchain network and generate a blockchain receipt for each data record stored in the cloud, reducing the burden of moving drones with the limit of battery and process capability while gaining enhanced security guarantee of the data. This paper presents the idea of securing drone data collection and communication in combination with a public blockchain for provisioning data integrity and cloud auditing. The evaluation shows that our system is a reliable and distributed system for drone data assurance and resilience with acceptable overhead and scalability for a large number of drones.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124862947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 158
期刊
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1