首页 > 最新文献

MILCOM 2012 - 2012 IEEE Military Communications Conference最新文献

英文 中文
Efficiency of dynamic content adaptation based on semantic description of web service call context 基于web服务调用上下文语义描述的动态内容自适应效率
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415810
J. Sliwa, B. Jasiul
This article tackles the problem of supplying the low level commanders with information from information sources located on higher command levels, distributed using Web services, the most commonly used technology in modern command and control systems. There has been proposed the Adaptation Framework For Web Services Provision (AFRO) that defines a mechanism for effective Web services invocation in tactical networks, which are considered disadvantaged in terms of available throughput, delay and error rate. Its implementation, in the form of AFRO Proxy performs so called adaptation actions, which are modifications of the SOAP XML messages by changing their encoding to more efficient or dropping information that are accepted to be removed by the service requester. The proposed adaptation mechanism gives promising effects for low level commanders located at the battlefield. They can be supplied with information generally available on high command levels, which, up to now, were very rarely distributed to tactical networks.
本文解决了向低级指挥官提供来自位于较高指挥级别的信息源的信息的问题,这些信息使用Web服务(现代指挥和控制系统中最常用的技术)进行分发。已经提出了Web服务提供适应框架(AFRO),该框架定义了在战术网络中有效调用Web服务的机制,战术网络在可用吞吐量、延迟和错误率方面被认为处于不利地位。它的实现,以AFRO代理的形式执行所谓的适应操作,这是通过将SOAP XML消息的编码更改为更有效或删除被服务请求者接受的信息来修改SOAP XML消息。所提出的适应机制对于处于战场上的低级别指挥员具有良好的效果。他们可以提供一般在高级指挥级别上可获得的信息,这些信息到目前为止很少分发给战术网络。
{"title":"Efficiency of dynamic content adaptation based on semantic description of web service call context","authors":"J. Sliwa, B. Jasiul","doi":"10.1109/MILCOM.2012.6415810","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415810","url":null,"abstract":"This article tackles the problem of supplying the low level commanders with information from information sources located on higher command levels, distributed using Web services, the most commonly used technology in modern command and control systems. There has been proposed the Adaptation Framework For Web Services Provision (AFRO) that defines a mechanism for effective Web services invocation in tactical networks, which are considered disadvantaged in terms of available throughput, delay and error rate. Its implementation, in the form of AFRO Proxy performs so called adaptation actions, which are modifications of the SOAP XML messages by changing their encoding to more efficient or dropping information that are accepted to be removed by the service requester. The proposed adaptation mechanism gives promising effects for low level commanders located at the battlefield. They can be supplied with information generally available on high command levels, which, up to now, were very rarely distributed to tactical networks.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84265690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Use of dynamic flight paths to enhance support to priority subscribers on a communications UAV 利用动态飞行路径增强对通信无人机上优先用户的支持
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415606
P. Charlesworth, S. M. Allen
Airborne communications nodes are often proposed as a component in future communications networks. This paper proposes that, in any ground network served by such a node, there is an optimum location for an airborne communications node. The paper examines the example of a Medium Altitude/Long Endurance (MALE) UAV carrying an airborne communications node which supports a community of mobile subscribers. Consider the case of a power-limited communications payload being flown on a UAV in support of a large community of mobile subscribers. Each subscriber is connected to the UAV payload by a two-way radio link. Radio links are only activated when there is traffic to be exchanged, thus the RF power demanded from the payload is changing regularly. An algorithm has been developed which attempts to maximize coverage of the subscriber community by moving the UAV between waypoints at which coverage is maximized. The algorithm, called Select Locally Optimum Waypoints (SLOW), estimates the future locations of subscribers from historic traffic and location data, and uses this information to move to waypoints at which the greatest number of links can be supported within the available RF power, and to the required signal quality. This improves the overall coverage of the subscriber community. This paper considers the performance of the algorithm in different conditions. Initially the performance of the algorithm is assessed against the maximum RF power available from the payload. The paper considers the case where all subscribers are given equal weighting, and then addresses the case where 20% of subscribers are given priority access to the payload. The paper also considers how the algorithm responds to different traffic patterns and concludes with a brief assessment of the airspace implications of allowing the UAV to track the mobile subscribers.
机载通信节点经常被提议作为未来通信网络的一个组成部分。本文提出,在任何由这种节点服务的地面网络中,都存在一个机载通信节点的最优位置。本文研究了一种携带机载通信节点的中高空/长航时(MALE)无人机的例子,该节点支持一个移动用户社区。考虑在无人机上飞行功率有限的通信有效载荷以支持大型移动用户社区的情况。每个用户通过双向无线电链路连接到无人机有效载荷。无线电链路只有在有通信要交换时才会被激活,因此负载所需的射频功率是有规律地变化的。已经开发了一种算法,该算法通过在覆盖最大化的航路点之间移动无人机来尝试最大化用户社区的覆盖。该算法被称为选择局部最优路径点(SLOW),它根据历史流量和位置数据估计用户的未来位置,并利用这些信息移动到可用射频功率范围内可支持最大数量链路的路径点,并达到所需的信号质量。这提高了订户社区的总体覆盖率。本文考虑了该算法在不同条件下的性能。最初,算法的性能是根据有效载荷提供的最大射频功率进行评估的。本文考虑了所有订阅者被赋予相同权重的情况,然后讨论了20%的订阅者被赋予优先访问负载的情况。本文还考虑了该算法如何响应不同的流量模式,并对允许无人机跟踪移动用户的空域影响进行了简要评估。
{"title":"Use of dynamic flight paths to enhance support to priority subscribers on a communications UAV","authors":"P. Charlesworth, S. M. Allen","doi":"10.1109/MILCOM.2012.6415606","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415606","url":null,"abstract":"Airborne communications nodes are often proposed as a component in future communications networks. This paper proposes that, in any ground network served by such a node, there is an optimum location for an airborne communications node. The paper examines the example of a Medium Altitude/Long Endurance (MALE) UAV carrying an airborne communications node which supports a community of mobile subscribers. Consider the case of a power-limited communications payload being flown on a UAV in support of a large community of mobile subscribers. Each subscriber is connected to the UAV payload by a two-way radio link. Radio links are only activated when there is traffic to be exchanged, thus the RF power demanded from the payload is changing regularly. An algorithm has been developed which attempts to maximize coverage of the subscriber community by moving the UAV between waypoints at which coverage is maximized. The algorithm, called Select Locally Optimum Waypoints (SLOW), estimates the future locations of subscribers from historic traffic and location data, and uses this information to move to waypoints at which the greatest number of links can be supported within the available RF power, and to the required signal quality. This improves the overall coverage of the subscriber community. This paper considers the performance of the algorithm in different conditions. Initially the performance of the algorithm is assessed against the maximum RF power available from the payload. The paper considers the case where all subscribers are given equal weighting, and then addresses the case where 20% of subscribers are given priority access to the payload. The paper also considers how the algorithm responds to different traffic patterns and concludes with a brief assessment of the airspace implications of allowing the UAV to track the mobile subscribers.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"16 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84460145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Novel energy efficient relaying schemes for wireless sensor networks 无线传感器网络的新型节能中继方案
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415870
Chitradeep Majumdar, S. Merchant, U. Desai
This paper proposes novel relaying schemes based on recently proposed Modified Alamouti Code and Time Switch Space Time Coding for a homogeneous sensor network architecture. New relaying schemes based on the incorporation of aforementioned techniques in a Sensor Network framework are considered. An exhaustive analysis in terms of the total energy consumption and delay characteristics as performance metric is investigated and quantified both for stand alone and clustered sensor networking scenario. Variable Rate M-QAM modulation schemes are considered for varying gateway distances. It is observed that for the standalone case, the proposed schemes can provide significant savings in terms of energy consumption as compared to non cooperative mode and conventional Alamouti scheme. For clustered case, conventional Alamouti based scheme outperforms the proposed relaying scheme up to a certain critical threshold distance beyond which the M-Alamouti based relaying schemes becomes slightly more efficient by 16 % when we have a single antenna gateway and cluster distance is 100m and gateway distance is 500 meter. Similar trend is observed when the distance between the clusters is increased from 100 to 200 meters. For a system with gateway having single and dual antennas the energy efficiency with respect to a non cooperative single antenna gateway system falls typically within a window of 70 to 90% for long haul distances around 320 m onwards.
本文提出了一种基于改进Alamouti码和时间开关时空编码的新型中继方案,用于同构传感器网络结构。在传感器网络框架中考虑了基于上述技术的新中继方案。在独立和集群传感器网络场景中,对总能耗和延迟特性作为性能指标进行了详尽的分析和量化。可变速率M-QAM调制方案被考虑用于不同的网关距离。可以观察到,对于独立的情况,与非合作模式和传统的Alamouti方案相比,所提出的方案可以在能源消耗方面提供显着的节省。对于集群情况,传统的基于Alamouti的中继方案在一定的临界阈值距离内优于所提出的中继方案,超过该阈值距离,当我们有一个单天线网关,集群距离为100米,网关距离为500米时,基于M-Alamouti的中继方案的效率略高16%。当星团之间的距离从100米增加到200米时,也观察到类似的趋势。对于具有单天线和双天线网关的系统,相对于非合作单天线网关系统,对于大约320米以上的长距离,能量效率通常落在70%至90%的窗口内。
{"title":"Novel energy efficient relaying schemes for wireless sensor networks","authors":"Chitradeep Majumdar, S. Merchant, U. Desai","doi":"10.1109/MILCOM.2012.6415870","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415870","url":null,"abstract":"This paper proposes novel relaying schemes based on recently proposed Modified Alamouti Code and Time Switch Space Time Coding for a homogeneous sensor network architecture. New relaying schemes based on the incorporation of aforementioned techniques in a Sensor Network framework are considered. An exhaustive analysis in terms of the total energy consumption and delay characteristics as performance metric is investigated and quantified both for stand alone and clustered sensor networking scenario. Variable Rate M-QAM modulation schemes are considered for varying gateway distances. It is observed that for the standalone case, the proposed schemes can provide significant savings in terms of energy consumption as compared to non cooperative mode and conventional Alamouti scheme. For clustered case, conventional Alamouti based scheme outperforms the proposed relaying scheme up to a certain critical threshold distance beyond which the M-Alamouti based relaying schemes becomes slightly more efficient by 16 % when we have a single antenna gateway and cluster distance is 100m and gateway distance is 500 meter. Similar trend is observed when the distance between the clusters is increased from 100 to 200 meters. For a system with gateway having single and dual antennas the energy efficiency with respect to a non cooperative single antenna gateway system falls typically within a window of 70 to 90% for long haul distances around 320 m onwards.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"26 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79481926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ARQ-based key scheduling algorithm over correlated erasure channels 基于arq的相关擦除信道密钥调度算法
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415667
Y. S. Khiabani, Shuangqing Wei
This paper focuses on the problem of sharing secret keys using the Automatic Repeat reQuest (ARQ) protocol. We first model the forward and feedback channels as erasure channels for both legitimate receiver (Bob) and an eavesdropper (Eve). In prior works, wiretap channel is modeled as statistically independent packet erasure channels for Bob and Eve. In this paper, we go beyond the state-of-the-art by addressing correlated erasure events across the wiretap channel. The created randomness is shared between two legitimate parties through ARQ transmission that will be mapped into a destination set using the first order digital filter with feedback. Then, we characterize Eve's information loss about this shared destination set, due to inevitable transmission errors that will be manipulated by privacy amplification to generate a series of secret keys about which Eve's knowledge remains negligible. We define two metrics to measure secrecy enhancement: outage probability and secret key rate. The resulting secrecy improvement is presented as a function of the correlation coefficients and the erasure probabilities for both channels. It is shown that secrecy improvement is achievable even when Eve has a better channel than the legitimate receiver, and her channel condition is unknown.
研究了基于自动重复请求(ARQ)协议的密钥共享问题。我们首先将前向和反馈通道建模为合法接收者(Bob)和窃听者(Eve)的擦除通道。在先前的工作中,窃听信道被建模为统计独立的Bob和Eve的数据包擦除信道。在本文中,我们超越了国家的最先进的解决相关擦除事件横跨窃听信道。创建的随机性通过ARQ传输在两个合法方之间共享,该传输将使用带反馈的一阶数字滤波器映射到目标集。然后,我们描述了Eve关于这个共享目标集的信息丢失,由于不可避免的传输错误,这些错误将被隐私放大操纵,以生成一系列Eve所知道的密钥。我们定义了两个度量保密增强的指标:中断概率和密钥率。由此产生的保密性改进是两个信道的相关系数和擦除概率的函数。结果表明,即使Eve拥有比合法接收方更好的信道,并且她的信道状况是未知的,保密改进也是可以实现的。
{"title":"ARQ-based key scheduling algorithm over correlated erasure channels","authors":"Y. S. Khiabani, Shuangqing Wei","doi":"10.1109/MILCOM.2012.6415667","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415667","url":null,"abstract":"This paper focuses on the problem of sharing secret keys using the Automatic Repeat reQuest (ARQ) protocol. We first model the forward and feedback channels as erasure channels for both legitimate receiver (Bob) and an eavesdropper (Eve). In prior works, wiretap channel is modeled as statistically independent packet erasure channels for Bob and Eve. In this paper, we go beyond the state-of-the-art by addressing correlated erasure events across the wiretap channel. The created randomness is shared between two legitimate parties through ARQ transmission that will be mapped into a destination set using the first order digital filter with feedback. Then, we characterize Eve's information loss about this shared destination set, due to inevitable transmission errors that will be manipulated by privacy amplification to generate a series of secret keys about which Eve's knowledge remains negligible. We define two metrics to measure secrecy enhancement: outage probability and secret key rate. The resulting secrecy improvement is presented as a function of the correlation coefficients and the erasure probabilities for both channels. It is shown that secrecy improvement is achievable even when Eve has a better channel than the legitimate receiver, and her channel condition is unknown.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85291368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A qualitative and quantitative method for predicting sentiment toward deployed U.S. forces 预测对驻韩美军的情绪的定性和定量方法
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415650
M. Rahmes, Kathy Wilder, J. Yates, K. Fox, Margaret M. Knepper, Jay K. Hackett
The ability to automatically predict likelihood of reaction to specific events and situational awareness is important to many military and commercial applications. Gauging population sentiment for targeted response areas and having the ability to predict or control sentiment within these areas is invaluable. Review of reception towards deployed forces must be analyzed, especially in areas vital for U.S. national interests. Predicting population behavior is critical for success and must include a qualitative as well as a quantitative solution. Additionally, a feedback mechanism is needed for periodically updating reception towards presence of U.S. Forces over time. We propose a method for predicting sentiment towards deployed U.S. Forces in near real time, to efficiently propitiate manpower resources, allocate equipment assets, and reduce cost of analyses. Sentiment prediction is becoming an increasingly important and feasible task based on social media, open source data, physical imagery and abundance of video data feeds. Predicting reaction to events can be time consuming. Locating the most likely affected areas is very tedious, requiring much human labor effort, and it is often difficult to obtain the best information on a timely basis. An efficient tool would be helpful to rapidly parse text that has been extracted from an intelligent algorithm in order to evaluate the population sentiment for the targeted area. Multiple data inputs and artificial intelligence (AI) algorithms are required in order to support sound decision making theory. The goal of our system, called GlobalSite, is to deliver trustworthy threat analysis systems and services that understand situations, while being a vital tool for continuing mission operations information.
自动预测对特定事件的反应可能性和态势感知的能力对许多军事和商业应用都很重要。测量目标响应区域的人口情绪,并有能力预测或控制这些区域的情绪是非常宝贵的。必须分析对部署部队的接收情况,特别是在对美国国家利益至关重要的地区。预测人口行为是成功的关键,必须包括定性和定量的解决方案。此外,需要一种反馈机制,以便随着时间的推移,定期更新对美军存在的接收情况。我们提出了一种近实时预测对部署美军的情绪的方法,以有效地分配人力资源,分配设备资产,并降低分析成本。基于社交媒体、开源数据、物理图像和丰富的视频数据源,情绪预测正成为一项越来越重要和可行的任务。预测人们对事件的反应可能非常耗时。定位最可能受影响的区域是非常繁琐的,需要大量的人力劳动,并且通常很难及时获得最佳信息。一个有效的工具将有助于快速解析从智能算法中提取的文本,以评估目标区域的人口情绪。为了支持合理的决策理论,需要多种数据输入和人工智能(AI)算法。我们的系统名为GlobalSite,其目标是提供可信赖的威胁分析系统和服务,以了解情况,同时成为持续任务操作信息的重要工具。
{"title":"A qualitative and quantitative method for predicting sentiment toward deployed U.S. forces","authors":"M. Rahmes, Kathy Wilder, J. Yates, K. Fox, Margaret M. Knepper, Jay K. Hackett","doi":"10.1109/MILCOM.2012.6415650","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415650","url":null,"abstract":"The ability to automatically predict likelihood of reaction to specific events and situational awareness is important to many military and commercial applications. Gauging population sentiment for targeted response areas and having the ability to predict or control sentiment within these areas is invaluable. Review of reception towards deployed forces must be analyzed, especially in areas vital for U.S. national interests. Predicting population behavior is critical for success and must include a qualitative as well as a quantitative solution. Additionally, a feedback mechanism is needed for periodically updating reception towards presence of U.S. Forces over time. We propose a method for predicting sentiment towards deployed U.S. Forces in near real time, to efficiently propitiate manpower resources, allocate equipment assets, and reduce cost of analyses. Sentiment prediction is becoming an increasingly important and feasible task based on social media, open source data, physical imagery and abundance of video data feeds. Predicting reaction to events can be time consuming. Locating the most likely affected areas is very tedious, requiring much human labor effort, and it is often difficult to obtain the best information on a timely basis. An efficient tool would be helpful to rapidly parse text that has been extracted from an intelligent algorithm in order to evaluate the population sentiment for the targeted area. Multiple data inputs and artificial intelligence (AI) algorithms are required in order to support sound decision making theory. The goal of our system, called GlobalSite, is to deliver trustworthy threat analysis systems and services that understand situations, while being a vital tool for continuing mission operations information.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"55 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82323012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Link state distribution rate scaling for maintaining topology in mobile wireless networks 维持移动无线网络拓扑结构的链路状态分布速率缩放
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415795
Shane A. Fink, V. Chan, Christopher C. Yu
In some current mobile ad hoc network designs, we have observed that the link state update protocol may take up all the network throughput and leave little to no capacity for data transmission. In this paper we explore the throughput scaling necessary to maintain an updated topology in a fixed rate mobile infrastructureless wireless network. We use a mobility model where each node travels along a random chord on the circle formed by the maximum transmission radius of the fixed rate system. Combined with a constant velocity and assuming independent movement, this allows us to determine a distribution for the time tos disconnection in the network, or link coherence time. For all-to-all topology updates, where after each link disconnect every node updates every other node of its link state, we show that the per node throughput for maintaining topologyscales as Ω(η2). We then develop numeric results for rate scaling using IP packets sized for Ethernet, that is 12 kbit (1.5 kbyte) packets. For this random chord mobility model, we show throughput scaling for networks of 10 to 1000 nodes. We plot results for 95%, 99%, and 99.9% probabilities of successful protocol distribution (based on the link coherence time distribution and the throughput) and for ratios of transmission range to velocity of 1, 10, and 100. We show that even for networks where the ratio of transmission range to velocity is 100 (that is, the transmission range is 100 times the velocity), the throughput scales on the order of Mb/s for networks with more than 100 nodes. For a 99.9% probability of successful protocol distribution, a network of 100 nodes with a ratio of transmission range to velocity of 100 requires a throughput per node of over 220 Mbps. For the same network with 1000 nodes, a throughput per node of over 23 Gbps is necessary.
在目前的一些移动自组织网络设计中,我们观察到链路状态更新协议可能占用所有的网络吞吐量,并且几乎没有留下数据传输的容量。在本文中,我们探讨了在固定速率移动基础设施无线网络中保持更新拓扑所需的吞吐量扩展。我们使用一个移动模型,其中每个节点沿着固定速率系统的最大传输半径形成的圆上的随机弦移动。结合恒定速度和假设独立运动,这使我们能够确定网络中断开时间的分布,或链路相干时间。对于所有到所有的拓扑更新,在每个链路断开后,每个节点更新其链路状态的每个其他节点,我们显示维护拓扑的每个节点吞吐量为Ω(η2)。然后,我们使用以太网的IP数据包大小(即12 kbit (1.5 kbyte)数据包)开发速率缩放的数值结果。对于这个随机弦迁移模型,我们展示了10到1000个节点的网络的吞吐量缩放。我们绘制了95%、99%和99.9%成功协议分发概率的结果(基于链路相干时间分布和吞吐量),以及传输距离与速度之比为1、10和100的结果。我们表明,即使对于传输范围与速度之比为100的网络(即传输范围是速度的100倍),对于超过100个节点的网络,吞吐量也会以Mb/s的数量级增长。对于99.9%的成功协议分发概率,传输范围与速度之比为100的100个节点的网络要求每个节点的吞吐量超过220 Mbps。对于具有1000个节点的同一网络,每个节点的吞吐量必须超过23 Gbps。
{"title":"Link state distribution rate scaling for maintaining topology in mobile wireless networks","authors":"Shane A. Fink, V. Chan, Christopher C. Yu","doi":"10.1109/MILCOM.2012.6415795","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415795","url":null,"abstract":"In some current mobile ad hoc network designs, we have observed that the link state update protocol may take up all the network throughput and leave little to no capacity for data transmission. In this paper we explore the throughput scaling necessary to maintain an updated topology in a fixed rate mobile infrastructureless wireless network. We use a mobility model where each node travels along a random chord on the circle formed by the maximum transmission radius of the fixed rate system. Combined with a constant velocity and assuming independent movement, this allows us to determine a distribution for the time tos disconnection in the network, or link coherence time. For all-to-all topology updates, where after each link disconnect every node updates every other node of its link state, we show that the per node throughput for maintaining topologyscales as Ω(η2). We then develop numeric results for rate scaling using IP packets sized for Ethernet, that is 12 kbit (1.5 kbyte) packets. For this random chord mobility model, we show throughput scaling for networks of 10 to 1000 nodes. We plot results for 95%, 99%, and 99.9% probabilities of successful protocol distribution (based on the link coherence time distribution and the throughput) and for ratios of transmission range to velocity of 1, 10, and 100. We show that even for networks where the ratio of transmission range to velocity is 100 (that is, the transmission range is 100 times the velocity), the throughput scales on the order of Mb/s for networks with more than 100 nodes. For a 99.9% probability of successful protocol distribution, a network of 100 nodes with a ratio of transmission range to velocity of 100 requires a throughput per node of over 220 Mbps. For the same network with 1000 nodes, a throughput per node of over 23 Gbps is necessary.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"97 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80550459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using hybrid simulation/emulation for experimental assessment of routing policy on mission outcomes 基于混合仿真/仿真的路由策略对任务结果的实验评估
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415576
G. Carl, J. V. Hook
As tactical military networks deploy new IP-capable radios (e.g., JTRS), it is expected that network connectivity will increase both within and among Service and Coalition networking domains (e.g., Army, Navy, NATO). Joint commanders will likely desire control of this increased connectivity to complete their mission goals. One mechanism known to (coarsely) manage multiple disparate IP networks is BGP routing policy. As such, this paper presents an experimental framework to estimate BGP's policy impacts on mission outcomes (e.g., expected Blue/Red casualties). In support of this effort, a testing platform was developed by integrating an agent-based combat simulation tool with a large-scale network emulation platform. Here, the simulation tool provides military mission modeling (e.g., force movements) and metrics (e.g., casualties counts) while the network emulation platform models the mission's underlying communications network (e.g., link characteristics, protocols, policy). Using this testbed, a sample military mission was evaluated over three communication architectures. The first architecture connected (Blue) mission units together using (fixed) point-to-point circuits, whereas the latter two used shortest-path (dynamic) routing and policy-based (dynamic) routing, respectively. It was found that both dynamically routed network architectures provided better Blue/Red casualty ratios and higher network reachability than the fixed, point-to-point network architecture. However, the addition of BGP policy did degrade performance relative to short-path routing. Furthermore, the degradation in mission and network performance did vary based on the BGP policies implemented. This paper's results imply that if policy-based routing is to be considered as a network management element for newly deployed joint IP networks, further experimental assessment is needed to understand the inter-relationships between BGP policy, mission outcomes, and network performance.
随着战术军事网络部署新的具有ip能力的无线电(例如,JTRS),预计各军种和联盟网络域(例如,陆军、海军、北约)内部和之间的网络连接将会增加。联合指挥官很可能希望控制这种增强的连通性,以完成他们的任务目标。一种已知的(粗略地)管理多个不同IP网络的机制是BGP路由策略。因此,本文提出了一个实验框架来估计BGP对任务结果的政策影响(例如,预期的蓝/红伤亡)。为了支持这项工作,通过集成基于智能体的战斗仿真工具和大型网络仿真平台,开发了一个测试平台。在这里,仿真工具提供军事任务建模(例如,部队移动)和度量(例如,伤亡人数),而网络仿真平台模拟任务的底层通信网络(例如,链路特性,协议,策略)。使用该测试平台,在三种通信架构上对一个示例军事任务进行了评估。第一个架构使用(固定的)点对点电路将(Blue)任务单元连接在一起,而后两个架构分别使用最短路径(动态)路由和基于策略的(动态)路由。研究发现,与固定的点对点网络体系结构相比,动态路由网络体系结构提供了更好的蓝/红伤亡率和更高的网络可达性。但是,相对于短路径路由,BGP策略的加入确实降低了性能。此外,任务性能和网络性能的下降确实因所实施的BGP策略而异。本文的结果表明,如果将基于策略的路由视为新部署的联合IP网络的网络管理元素,则需要进一步的实验评估,以了解BGP策略、任务结果和网络性能之间的相互关系。
{"title":"Using hybrid simulation/emulation for experimental assessment of routing policy on mission outcomes","authors":"G. Carl, J. V. Hook","doi":"10.1109/MILCOM.2012.6415576","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415576","url":null,"abstract":"As tactical military networks deploy new IP-capable radios (e.g., JTRS), it is expected that network connectivity will increase both within and among Service and Coalition networking domains (e.g., Army, Navy, NATO). Joint commanders will likely desire control of this increased connectivity to complete their mission goals. One mechanism known to (coarsely) manage multiple disparate IP networks is BGP routing policy. As such, this paper presents an experimental framework to estimate BGP's policy impacts on mission outcomes (e.g., expected Blue/Red casualties). In support of this effort, a testing platform was developed by integrating an agent-based combat simulation tool with a large-scale network emulation platform. Here, the simulation tool provides military mission modeling (e.g., force movements) and metrics (e.g., casualties counts) while the network emulation platform models the mission's underlying communications network (e.g., link characteristics, protocols, policy). Using this testbed, a sample military mission was evaluated over three communication architectures. The first architecture connected (Blue) mission units together using (fixed) point-to-point circuits, whereas the latter two used shortest-path (dynamic) routing and policy-based (dynamic) routing, respectively. It was found that both dynamically routed network architectures provided better Blue/Red casualty ratios and higher network reachability than the fixed, point-to-point network architecture. However, the addition of BGP policy did degrade performance relative to short-path routing. Furthermore, the degradation in mission and network performance did vary based on the BGP policies implemented. This paper's results imply that if policy-based routing is to be considered as a network management element for newly deployed joint IP networks, further experimental assessment is needed to understand the inter-relationships between BGP policy, mission outcomes, and network performance.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"20 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83287412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest-transparent instruction authentication for self-patching kernels 自修补内核的客户透明指令认证
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415582
Dannie M. Stanley, Zhui Deng, Dongyan Xu, R. Porter, S. Snyder
Attackers can exploit vulnerable programs that are running with elevated permissions to insert kernel rootkits into a system. Security mechanisms have been created to prevent kernel rootkit implantation by relocating the vulnerable physical system to a guest virtual machine and enforcing a W ⊕ KX memory access control policy from the host virtual machine monitor. Such systems must also be able to identify and authorize the introduction of known-good kernel code. Previous works use cryptographic hashes to verify the integrity of kernel code at load-time. The hash creation and verification procedure depends on immutable kernel code. However, some modern kernels contain self-patching kernel code; they may overwrite executable instructions in memory after load-time. Such dynamic patching may occur for a variety of reason including: CPU optimizations, multiprocessor compatibility adjustments, and advanced debugging. The previous hash verification procedure cannot handle such modifications. We describe the design and implementation of a procedure that verifies the integrity of each modified instruction as it is introduced into the guest kernel. Our experiments with a self-patching Linux guest kernel show that our system can correctly detect and verify all valid instruction modifications and reject all invalid ones. In most cases our patch-level verification procedure incurs only nominal performance impact.
攻击者可以利用以更高权限运行的易受攻击的程序将内核rootkit插入系统。通过将易受攻击的物理系统重新定位到客户虚拟机,并从主机虚拟机监视器强制执行W⊕KX内存访问控制策略,创建了安全机制来防止内核rootkit植入。这样的系统还必须能够识别并授权引入已知良好的内核代码。以前的工作使用加密哈希在加载时验证内核代码的完整性。哈希创建和验证过程依赖于不可变的内核代码。然而,一些现代内核包含自修补内核代码;它们可能在加载后覆盖内存中的可执行指令。这种动态补丁可能由于各种原因而发生,包括:CPU优化、多处理器兼容性调整和高级调试。之前的哈希验证过程无法处理此类修改。我们描述了一个过程的设计和实现,该过程在每个被修改的指令被引入客户内核时验证其完整性。我们对一个自修补的Linux客户内核进行的实验表明,我们的系统可以正确地检测和验证所有有效的指令修改,并拒绝所有无效的指令修改。在大多数情况下,我们的补丁级验证过程只会产生名义上的性能影响。
{"title":"Guest-transparent instruction authentication for self-patching kernels","authors":"Dannie M. Stanley, Zhui Deng, Dongyan Xu, R. Porter, S. Snyder","doi":"10.1109/MILCOM.2012.6415582","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415582","url":null,"abstract":"Attackers can exploit vulnerable programs that are running with elevated permissions to insert kernel rootkits into a system. Security mechanisms have been created to prevent kernel rootkit implantation by relocating the vulnerable physical system to a guest virtual machine and enforcing a W ⊕ KX memory access control policy from the host virtual machine monitor. Such systems must also be able to identify and authorize the introduction of known-good kernel code. Previous works use cryptographic hashes to verify the integrity of kernel code at load-time. The hash creation and verification procedure depends on immutable kernel code. However, some modern kernels contain self-patching kernel code; they may overwrite executable instructions in memory after load-time. Such dynamic patching may occur for a variety of reason including: CPU optimizations, multiprocessor compatibility adjustments, and advanced debugging. The previous hash verification procedure cannot handle such modifications. We describe the design and implementation of a procedure that verifies the integrity of each modified instruction as it is introduced into the guest kernel. Our experiments with a self-patching Linux guest kernel show that our system can correctly detect and verify all valid instruction modifications and reject all invalid ones. In most cases our patch-level verification procedure incurs only nominal performance impact.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"18 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81367576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adaptive virtual slot for enhancing QoS of voice communication in MIL-STD-188-220 提高MIL-STD-188-220语音通信QoS的自适应虚拟插槽
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415747
Jae-Joon Lee, Dongwook Kim, Jaesung Lim
Voice communication requires stricter QoS than other types of data communication. Thus, network operations, including the MAC layer protocol, should provide specific voice communication handling to meet voice application requirements. The current MIL-STD-188-220 does not guarantee the QoS of voice communication because of the round robin scheduling mechanism in network access control. Thus, we propose a hybrid MAC that provides adaptive virtual slots for voice messages on top of Deterministic Adaptable Priority Network Access Delay (DAP-NAD). In our proposed scheme, packet delay and jitter requirements of voice communication can be guaranteed, regardless of the number of stations in the network. Besides, the jitter tolerance time allows the other stations to adaptively transmit their data without disturbing voice communication and preserving data packet delay. The extensive simulation results show that the proposed scheme can guarantee quality of voice communication, regardless of network size.
语音通信比其他类型的数据通信要求更严格的QoS。因此,包括MAC层协议在内的网络运营需要提供特定的语音通信处理,以满足语音应用需求。目前的MIL-STD-188-220由于网络接入控制中的轮询调度机制,无法保证语音通信的QoS。因此,我们提出了一种混合MAC,该MAC在确定性自适应优先网络访问延迟(DAP-NAD)之上为语音消息提供自适应虚拟插槽。在我们提出的方案中,无论网络中有多少个站点,都可以保证语音通信的数据包延迟和抖动要求。此外,抖动容忍时间允许其他站在不干扰语音通信和保持数据包延迟的情况下自适应传输其数据。大量的仿真结果表明,无论网络大小如何,该方案都能保证语音通信的质量。
{"title":"Adaptive virtual slot for enhancing QoS of voice communication in MIL-STD-188-220","authors":"Jae-Joon Lee, Dongwook Kim, Jaesung Lim","doi":"10.1109/MILCOM.2012.6415747","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415747","url":null,"abstract":"Voice communication requires stricter QoS than other types of data communication. Thus, network operations, including the MAC layer protocol, should provide specific voice communication handling to meet voice application requirements. The current MIL-STD-188-220 does not guarantee the QoS of voice communication because of the round robin scheduling mechanism in network access control. Thus, we propose a hybrid MAC that provides adaptive virtual slots for voice messages on top of Deterministic Adaptable Priority Network Access Delay (DAP-NAD). In our proposed scheme, packet delay and jitter requirements of voice communication can be guaranteed, regardless of the number of stations in the network. Besides, the jitter tolerance time allows the other stations to adaptively transmit their data without disturbing voice communication and preserving data packet delay. The extensive simulation results show that the proposed scheme can guarantee quality of voice communication, regardless of network size.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"118 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81455026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A combination of quickest detection with oracle approximating shrinkage estimation and its application to spectrum sensing in cognitive radio 最快速检测与oracle逼近收缩估计的结合及其在认知无线电频谱感知中的应用
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415682
Feng Lin, Zhen Hu, R. Qiu, M. Wicks
Spectrum sensing is a fundamental problem in cognitive radio. How to sense the presence of primary user promptly in order to avoid the unexpected interference is a key issue to the system. The motivation of our work is to detect the primary user signal using small size data in short time. In this paper, a quickest detection based approach is proposed for spectrum sensing. This approach employs covariance matrix estimation instead of sample covariance matrix as the first step, then the core idea of sequential detection or quickest detection is borrowed and utilized here to improve the performance of traditional eigenvalue based MME and AGM detectors. The main advantage of the proposed approach is that it requires short data to detect quickly and it works at lower SNR environments than some traditional methods. A performance comparison between the proposed approach and other traditional methods is provided, by the simulation on captured digital TV (DTV) signal. The simulation results show this proposed approach exhibits performance improvement while the threshold keeps robust.
频谱感知是认知无线电中的一个基本问题。如何及时感知主用户的存在,避免意外干扰是系统的关键问题。我们的工作动机是在短时间内使用小尺寸数据检测主用户信号。本文提出了一种基于快速检测的频谱感知方法。该方法采用协方差矩阵估计代替样本协方差矩阵作为第一步,然后借鉴和利用序列检测或最快检测的核心思想,改进传统的基于特征值的MME和AGM检测器的性能。该方法的主要优点是需要较短的数据来快速检测,并且与传统方法相比,它可以在较低的信噪比环境下工作。通过对捕获的数字电视(DTV)信号的仿真,比较了该方法与其他传统方法的性能。仿真结果表明,该方法在保持阈值鲁棒性的同时,性能得到了提高。
{"title":"A combination of quickest detection with oracle approximating shrinkage estimation and its application to spectrum sensing in cognitive radio","authors":"Feng Lin, Zhen Hu, R. Qiu, M. Wicks","doi":"10.1109/MILCOM.2012.6415682","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415682","url":null,"abstract":"Spectrum sensing is a fundamental problem in cognitive radio. How to sense the presence of primary user promptly in order to avoid the unexpected interference is a key issue to the system. The motivation of our work is to detect the primary user signal using small size data in short time. In this paper, a quickest detection based approach is proposed for spectrum sensing. This approach employs covariance matrix estimation instead of sample covariance matrix as the first step, then the core idea of sequential detection or quickest detection is borrowed and utilized here to improve the performance of traditional eigenvalue based MME and AGM detectors. The main advantage of the proposed approach is that it requires short data to detect quickly and it works at lower SNR environments than some traditional methods. A performance comparison between the proposed approach and other traditional methods is provided, by the simulation on captured digital TV (DTV) signal. The simulation results show this proposed approach exhibits performance improvement while the threshold keeps robust.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"19 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81564970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
MILCOM 2012 - 2012 IEEE Military Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1