首页 > 最新文献

MILCOM 2012 - 2012 IEEE Military Communications Conference最新文献

英文 中文
Interference analysis of interleaved and localized mapping schemes in OFDMA system with Carrier Frequency Offset 载波频偏OFDMA系统中交错和局部映射方案的干扰分析
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415778
B. Ranjha, M. I. Chowdhury, M. Kavehrad
In this paper, we analyze the effect of Carrier Frequency Offset (CFO) of multiple users on the SINR of a single user in OFDMA based uplink communication receiver. We have computed an explicit SINR expression for two types of mapping strategies used in uplink OFDMA systems namely Interleaved Frequency Division Multiple Access (IFDMA) and Localized Frequency Division Multiple Access (LFDMA). SINR expressions in case of carrier frequency offset correction are also computed. Using simulations, we have compared the total average interference due to different values of CFO's of multiple users for both mapping schemes. Simulation results also show that the average value of Inter-Carrier Interference (ICI) for localized mapping is higher than interleaved mapping while the average value of Multiuser Interference (MUI) is higher for interleaved mapping. Moreover, the average MUI for localized mapping is minimum at the center of the band and it increases as we move towards the band edges. We also observe a flat response for ICI and MUI for interleaved mapping.
本文分析了基于OFDMA的上行通信接收机中多用户载波频偏(CFO)对单用户信噪比的影响。我们计算了上行OFDMA系统中使用的两种类型的映射策略的显式SINR表达式,即交错频分多址(IFDMA)和局部频分多址(LFDMA)。同时计算了载波频偏校正情况下的SINR表达式。通过仿真,我们比较了两种映射方案中不同用户CFO值引起的总平均干扰。仿真结果还表明,局域映射的载波间干扰(ICI)均值高于交错映射,多用户干扰(MUI)均值高于交错映射。此外,局域化映射的平均MUI在带中心处最小,并且随着我们向带边缘移动而增加。我们还观察到交错映射的ICI和MUI的平坦响应。
{"title":"Interference analysis of interleaved and localized mapping schemes in OFDMA system with Carrier Frequency Offset","authors":"B. Ranjha, M. I. Chowdhury, M. Kavehrad","doi":"10.1109/MILCOM.2012.6415778","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415778","url":null,"abstract":"In this paper, we analyze the effect of Carrier Frequency Offset (CFO) of multiple users on the SINR of a single user in OFDMA based uplink communication receiver. We have computed an explicit SINR expression for two types of mapping strategies used in uplink OFDMA systems namely Interleaved Frequency Division Multiple Access (IFDMA) and Localized Frequency Division Multiple Access (LFDMA). SINR expressions in case of carrier frequency offset correction are also computed. Using simulations, we have compared the total average interference due to different values of CFO's of multiple users for both mapping schemes. Simulation results also show that the average value of Inter-Carrier Interference (ICI) for localized mapping is higher than interleaved mapping while the average value of Multiuser Interference (MUI) is higher for interleaved mapping. Moreover, the average MUI for localized mapping is minimum at the center of the band and it increases as we move towards the band edges. We also observe a flat response for ICI and MUI for interleaved mapping.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82499217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A cyber-physical approach to a wide-area actionable system for the power grid 电网广域可操作系统的网络物理方法
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415666
Josef D. Allen, Xiuwen Liu, Ivan Lozano, Xin Yuan
Unexpected occurrences of large-area cascading failures due to small disturbances in worldwide electricity grids serve as evidence of their intrinsic instability. As the grid is the most fundamental critical infrastructure in any modern society, detection and mitigation of such cascading failures due to accidental failures or malicious attacks are of vital importance to both civilian and military applications. However, due to the unique physical properties of electricity, such as its travel speed, systems must be able to react within a fraction of second in order to detect and prevent occurrences of cascading failures. In this paper, by modeling the grid as a cyber-physical system, we propose a decentralized, hierarchical framework to develop and implement a wide-area actionable system, capable of detecting and mitigating potential cascading failures. The states of the grid and physical constraints are modeled as manifolds, and evolution of the grid becomes a path on the manifold. By decomposing the grid into resilience zones with minimal power flow between them, we utilize precomputed scenarios in each resilience zone to develop a parametrized model. During deployment, online phasor measurements will be used to estimate the stability within each zone and interactions among them. The detection of cascading failures will be based on the detection of cascading failing paths among the K hop trees built for each zone. We illustrate the effectiveness of the proposed approach using the 2003 Italy blackout scenarios, and we discuss practical requirements in order to deploy such a system.
世界范围内电网由于小扰动引起的大面积级联故障的意外发生是其内在不稳定性的证据。由于电网是任何现代社会中最基本的关键基础设施,因此检测和减轻由于意外故障或恶意攻击而导致的级联故障对于民用和军事应用都至关重要。然而,由于电的独特物理特性,例如其传播速度,系统必须能够在几分之一秒内做出反应,以检测和防止级联故障的发生。在本文中,通过将网格建模为一个网络物理系统,我们提出了一个分散的分层框架来开发和实施一个广域可操作的系统,能够检测和减轻潜在的级联故障。网格的状态和物理约束被建模为流形,网格的演化成为流形上的路径。通过将电网分解为具有最小功率流的弹性区,我们利用每个弹性区的预先计算情景来开发参数化模型。在部署过程中,在线相量测量将用于评估每个层内的稳定性以及它们之间的相互作用。级联故障的检测将基于为每个区域构建的K跳树之间的级联故障路径的检测。我们使用2003年意大利停电场景说明了所建议方法的有效性,并讨论了部署这样一个系统的实际要求。
{"title":"A cyber-physical approach to a wide-area actionable system for the power grid","authors":"Josef D. Allen, Xiuwen Liu, Ivan Lozano, Xin Yuan","doi":"10.1109/MILCOM.2012.6415666","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415666","url":null,"abstract":"Unexpected occurrences of large-area cascading failures due to small disturbances in worldwide electricity grids serve as evidence of their intrinsic instability. As the grid is the most fundamental critical infrastructure in any modern society, detection and mitigation of such cascading failures due to accidental failures or malicious attacks are of vital importance to both civilian and military applications. However, due to the unique physical properties of electricity, such as its travel speed, systems must be able to react within a fraction of second in order to detect and prevent occurrences of cascading failures. In this paper, by modeling the grid as a cyber-physical system, we propose a decentralized, hierarchical framework to develop and implement a wide-area actionable system, capable of detecting and mitigating potential cascading failures. The states of the grid and physical constraints are modeled as manifolds, and evolution of the grid becomes a path on the manifold. By decomposing the grid into resilience zones with minimal power flow between them, we utilize precomputed scenarios in each resilience zone to develop a parametrized model. During deployment, online phasor measurements will be used to estimate the stability within each zone and interactions among them. The detection of cascading failures will be based on the detection of cascading failing paths among the K hop trees built for each zone. We illustrate the effectiveness of the proposed approach using the 2003 Italy blackout scenarios, and we discuss practical requirements in order to deploy such a system.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"30 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83446151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Collaborative applications at the Tactical Edge through resilient group dissemination in DTN DTN中弹性群体传播在战术边缘的协同应用
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415786
Jacob Green, John L. Schultz
Civilian and wired military networks possess a rich ecosystem of applications that depend upon communication across a relatively stable and clean network. Conversely, the extremely harsh communication environment of the Tactical Edge Network (TEN) precludes all but a few highly customized network applications from working well there. Consequently, there is a severe lack of applications for information sharing and exchange in the TEN, which often leaves war-fighters without timely access to relevant information. To expand the capabilities and applications available at the tactical edge, this paper presents a group dissemination middleware service and one possible realization of it using the Bundle Protocol (DTN). We discuss how this middleware can function as the enabling technology around which many collaborative applications can work well at the tactical edge, while capitalizing on the reuse of an immense body of COTS technology.
民用和有线军事网络拥有丰富的应用生态系统,依赖于在相对稳定和清洁的网络上进行通信。相反,战术边缘网络(TEN)极其恶劣的通信环境使除少数高度定制的网络应用程序之外的所有应用程序都无法在那里正常工作。因此,十大国家严重缺乏信息共享和交换的应用程序,这往往使作战人员无法及时获得相关信息。为了扩展战术边缘可用的功能和应用程序,本文提出了一种组传播中间件服务以及使用束协议(Bundle Protocol, DTN)的一种可能实现。我们将讨论这个中间件如何作为使能技术发挥作用,围绕它,许多协作应用程序可以在战术边缘很好地工作,同时利用大量COTS技术的重用。
{"title":"Collaborative applications at the Tactical Edge through resilient group dissemination in DTN","authors":"Jacob Green, John L. Schultz","doi":"10.1109/MILCOM.2012.6415786","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415786","url":null,"abstract":"Civilian and wired military networks possess a rich ecosystem of applications that depend upon communication across a relatively stable and clean network. Conversely, the extremely harsh communication environment of the Tactical Edge Network (TEN) precludes all but a few highly customized network applications from working well there. Consequently, there is a severe lack of applications for information sharing and exchange in the TEN, which often leaves war-fighters without timely access to relevant information. To expand the capabilities and applications available at the tactical edge, this paper presents a group dissemination middleware service and one possible realization of it using the Bundle Protocol (DTN). We discuss how this middleware can function as the enabling technology around which many collaborative applications can work well at the tactical edge, while capitalizing on the reuse of an immense body of COTS technology.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"67 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89392004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Games applied to jam resistant DSA radios 游戏应用于抗干扰DSA无线电
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415633
Gregory Rucker, R. Cole, D. Cansever, A. Mishra
In this paper, we apply Game Theory to the exploration into the development of Medium Access Protocols (MACs) for Dynamic Spectrum Access (DSA) software-define Secondary Radios (SRs) in the presence of Adversarial Jammers (AJs). We develop the Static Game representation of a hierarchical game involving the Primary Users (PUs) and the SRs and AJs. We then define a Dynamic, Repetitive Game to test the effectiveness of different SR and AJ agent strategies. These strategies are defined in terms of how aggressive the agents modify their future play based upon observations related to previous play outcomes. The observations are defined in the context of incomplete information, as it is not likely that a radio transceiver is capable of discerning all possible plays of competitors across all channels while also potentially transmitting on a given channel. We develop the Agent-Based Simulation (ABS) to investigate and analyze various versions of these games and agent strategies. We report on the results of the ABS investigations and our mathematical analysis.
在本文中,我们应用博弈论来探索在对抗性干扰机(aj)存在的情况下动态频谱接入(DSA)软件定义二次无线电(SRs)的介质访问协议(mac)的开发。我们开发了一个包含主用户(pu)、sr和aj的分层博弈的静态博弈表示。然后我们定义了一个动态的,重复的游戏来测试不同的SR和AJ代理策略的有效性。这些策略是根据代理如何积极地根据与先前游戏结果相关的观察来修改他们未来的游戏来定义的。观察结果是在信息不完全的情况下定义的,因为无线电收发器不太可能能够识别竞争对手在所有频道上的所有可能的播放,同时还可能在给定频道上传输。我们开发了基于agent的仿真(ABS)来调查和分析这些博弈的不同版本和agent策略。我们报道ABS的调查结果和我们的数学分析。
{"title":"Games applied to jam resistant DSA radios","authors":"Gregory Rucker, R. Cole, D. Cansever, A. Mishra","doi":"10.1109/MILCOM.2012.6415633","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415633","url":null,"abstract":"In this paper, we apply Game Theory to the exploration into the development of Medium Access Protocols (MACs) for Dynamic Spectrum Access (DSA) software-define Secondary Radios (SRs) in the presence of Adversarial Jammers (AJs). We develop the Static Game representation of a hierarchical game involving the Primary Users (PUs) and the SRs and AJs. We then define a Dynamic, Repetitive Game to test the effectiveness of different SR and AJ agent strategies. These strategies are defined in terms of how aggressive the agents modify their future play based upon observations related to previous play outcomes. The observations are defined in the context of incomplete information, as it is not likely that a radio transceiver is capable of discerning all possible plays of competitors across all channels while also potentially transmitting on a given channel. We develop the Agent-Based Simulation (ABS) to investigate and analyze various versions of these games and agent strategies. We report on the results of the ABS investigations and our mathematical analysis.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87862629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fault tolerant bio-inspired topology control mechanism for autonomous mobile node distribution in MANETs 自主移动网络节点分布的容错仿生拓扑控制机制
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415743
S. Gundry, Jianmin Zou, Janusz Kusyk, M. U. Uyar, C. Sahin
We introduce a fault tolerant bio-inspired topolog-ical control mechanism (TCM-Y) for the evolutionary decision making process of autonomous mobile nodes that adaptively adjust their spatial configuration in MANETs. TCM-Y is based on differential evolution and maintains a user-defined minimum connectivity for each node with its near neighbors. TCM-Y, therefore, provides a topology control mechanism which is fault tolerant with regards to network connectivity that each mobile node is required to maintain. In its fitness calculations, TCM-Y uses the Yao graph structure to enforce a user-defined minimum number of neighbors while obtaining uniform network topology. The effectiveness of TCM-Y is evaluated by comparing it with our differential evolution based topology mechanism (TCM-DE) that uses virtual forces from neighbors in its fitness function. Experimental results obtained from simulation software show that TCM-Y performs well with respect to normalized area coverage, the average connectivity, and the minimum connectivity achieved by mobile nodes. Simulation experiments demonstrate that TCM-Y generates encouraging results for uniform distribution of mobile nodes over unknown terrains while maintaining a user-defined minimum connectivity between neighboring nodes.
本文引入了一种容错生物拓扑控制机制(TCM-Y),用于自主移动节点自适应调整其空间配置的进化决策过程。TCM-Y基于差分进化,并为每个节点与其近邻保持用户定义的最小连通性。因此,TCM-Y提供了一种拓扑控制机制,该机制对每个移动节点需要维护的网络连接具有容错能力。在适应度计算中,TCM-Y使用Yao图结构强制用户定义的最小邻居数,同时获得统一的网络拓扑。通过将TCM-Y与基于差分进化的拓扑机制(TCM-DE)进行比较,评估了TCM-Y的有效性,后者在适应度函数中使用来自邻居的虚拟力。仿真软件的实验结果表明,TCM-Y在归一化面积覆盖、平均连通性和移动节点的最小连通性方面表现良好。仿真实验表明,TCM-Y在保持用户定义的相邻节点之间最小连通性的同时,在未知地形上的移动节点均匀分布产生了令人鼓舞的结果。
{"title":"Fault tolerant bio-inspired topology control mechanism for autonomous mobile node distribution in MANETs","authors":"S. Gundry, Jianmin Zou, Janusz Kusyk, M. U. Uyar, C. Sahin","doi":"10.1109/MILCOM.2012.6415743","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415743","url":null,"abstract":"We introduce a fault tolerant bio-inspired topolog-ical control mechanism (TCM-Y) for the evolutionary decision making process of autonomous mobile nodes that adaptively adjust their spatial configuration in MANETs. TCM-Y is based on differential evolution and maintains a user-defined minimum connectivity for each node with its near neighbors. TCM-Y, therefore, provides a topology control mechanism which is fault tolerant with regards to network connectivity that each mobile node is required to maintain. In its fitness calculations, TCM-Y uses the Yao graph structure to enforce a user-defined minimum number of neighbors while obtaining uniform network topology. The effectiveness of TCM-Y is evaluated by comparing it with our differential evolution based topology mechanism (TCM-DE) that uses virtual forces from neighbors in its fitness function. Experimental results obtained from simulation software show that TCM-Y performs well with respect to normalized area coverage, the average connectivity, and the minimum connectivity achieved by mobile nodes. Simulation experiments demonstrate that TCM-Y generates encouraging results for uniform distribution of mobile nodes over unknown terrains while maintaining a user-defined minimum connectivity between neighboring nodes.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"20 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87408093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Bandwidth optimizations for standards-based publish/subscribe in disadvantaged grids 在不利网格中基于标准的发布/订阅的带宽优化
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415635
E. Skjervold, K. Lund, T. H. Bloebaum, F. T. Johnsen
NATO has identified Web services as a key enabler for its network enabled capability. Web services facilitate interoperability, easy integration and use of commercial off-the-shelf components, and while request/response-based schemes have hitherto been predominant, publish/subscribe-based services are gaining ground. SOAP-based Web services, however, introduce considerable communication overhead, and optimization must be done to enable use on the tactical level. Data compression is one such optimization, and it works well for large messages. We claim that the inherent characteristics of publish/subscribe-based Web services are such that using difference-based compression will allow effective compression also for small messages. In this paper we present the design and implementation of a proof-of-concept mechanism called ZDiff, which we have tested on several types of military data formats. Together with our SOAP-based proxy system it can be used together with commercial off-the-shelf Web services software. The results show that difference-based compression outperforms traditional compression for small messages, at the same time as it never performs worse than traditional compression for larger messages.
北约已经将Web服务确定为其网络启用能力的关键推动者。Web服务促进了互操作性、易于集成和使用商业现成组件,尽管基于请求/响应的模式迄今为止占主导地位,但基于发布/订阅的服务正在取得进展。然而,基于soap的Web服务引入了相当大的通信开销,并且必须进行优化才能在战术级别上使用。数据压缩就是这样一种优化,它适用于大型消息。我们声称,基于发布/订阅的Web服务的固有特征是,使用基于差异的压缩将允许对小消息进行有效的压缩。在本文中,我们介绍了一种名为ZDiff的概念验证机制的设计和实现,我们已经在几种类型的军事数据格式上进行了测试。与我们基于soap的代理系统一起,它可以与商业现成的Web服务软件一起使用。结果表明,对于小消息,基于差异的压缩优于传统压缩,同时对于大消息,它的性能不会比传统压缩差。
{"title":"Bandwidth optimizations for standards-based publish/subscribe in disadvantaged grids","authors":"E. Skjervold, K. Lund, T. H. Bloebaum, F. T. Johnsen","doi":"10.1109/MILCOM.2012.6415635","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415635","url":null,"abstract":"NATO has identified Web services as a key enabler for its network enabled capability. Web services facilitate interoperability, easy integration and use of commercial off-the-shelf components, and while request/response-based schemes have hitherto been predominant, publish/subscribe-based services are gaining ground. SOAP-based Web services, however, introduce considerable communication overhead, and optimization must be done to enable use on the tactical level. Data compression is one such optimization, and it works well for large messages. We claim that the inherent characteristics of publish/subscribe-based Web services are such that using difference-based compression will allow effective compression also for small messages. In this paper we present the design and implementation of a proof-of-concept mechanism called ZDiff, which we have tested on several types of military data formats. Together with our SOAP-based proxy system it can be used together with commercial off-the-shelf Web services software. The results show that difference-based compression outperforms traditional compression for small messages, at the same time as it never performs worse than traditional compression for larger messages.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"54 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87422098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A NNEC-compliant approach for a Future Mission Network 面向未来任务网络的nnec兼容方法
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415626
Alberto Domingo, H. Wietgrefe
The NATO Network-Enabled Capabilities concept (NNEC) enables NATO to maximize the sharing of information and services in a wide variety of missions, characterized by a a-priori uncertainty about the mission service requirements, partner composition and command and control structures. NNEC guidance and principles are well documented in the NNEC framework and the NNEC Body of Knowledge (BoK). Experience and lessons learnt from mission support in Afghanistan's International Security Assistance Force (ISAF) and Libya (Operation Unified Protector OUP) have shown that deploying NNEC capabilities from scratch is complex and time consuming. Therefore, NATO and the Nations have decided to formalize the implementation of NNEC into a flexible, tailor-able and scalable capability known as the Future Mission Network (FMN). The FMN seeks to implement a NNEC-aligned set of network, systems and services, along with the necessary doctrine and processes, to facilitate federation of mission information and supporting capabilities in future operations. This paper will introduce the NATO NNEC framework and Body of Knowledge, its persistent requirements and the associated NNEC operational and technical achievements. Then, the NATO requirements for a Future Mission Network (FMN) are derived, taking into account experience from recent operations and also the NATO transformational vision and political guidance. Finally, the NNEC compliant approach for a NATO Future Mission Network is described, along with the high-level material and non-material solutions to facilitate information sharing in federated environments.
北约网络能力概念(NNEC)使北约能够在各种任务中最大限度地共享信息和服务,其特点是任务服务需求、合作伙伴组成和指挥控制结构的先验不确定性。NNEC指南和原则在NNEC框架和NNEC知识体系(BoK)中有很好的记录。从阿富汗国际安全援助部队(ISAF)和利比亚(统一保护行动)任务支持的经验和教训表明,从头部署NNEC能力是复杂和耗时的。因此,北约和各国决定将NNEC的实施正式化,使其成为一种灵活、可定制和可扩展的能力,即未来任务网络(FMN)。FMN寻求实施一套与nnec一致的网络、系统和服务,以及必要的理论和过程,以促进任务信息的联合和未来作战的支持能力。本文将介绍北约NNEC框架和知识体系,其持续要求以及相关的NNEC操作和技术成就。然后,考虑到近期行动的经验以及北约转型愿景和政治指导,推导出北约对未来任务网络(FMN)的要求。最后,描述了北约未来任务网络的NNEC兼容方法,以及促进联邦环境中信息共享的高级材料和非材料解决方案。
{"title":"A NNEC-compliant approach for a Future Mission Network","authors":"Alberto Domingo, H. Wietgrefe","doi":"10.1109/MILCOM.2012.6415626","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415626","url":null,"abstract":"The NATO Network-Enabled Capabilities concept (NNEC) enables NATO to maximize the sharing of information and services in a wide variety of missions, characterized by a a-priori uncertainty about the mission service requirements, partner composition and command and control structures. NNEC guidance and principles are well documented in the NNEC framework and the NNEC Body of Knowledge (BoK). Experience and lessons learnt from mission support in Afghanistan's International Security Assistance Force (ISAF) and Libya (Operation Unified Protector OUP) have shown that deploying NNEC capabilities from scratch is complex and time consuming. Therefore, NATO and the Nations have decided to formalize the implementation of NNEC into a flexible, tailor-able and scalable capability known as the Future Mission Network (FMN). The FMN seeks to implement a NNEC-aligned set of network, systems and services, along with the necessary doctrine and processes, to facilitate federation of mission information and supporting capabilities in future operations. This paper will introduce the NATO NNEC framework and Body of Knowledge, its persistent requirements and the associated NNEC operational and technical achievements. Then, the NATO requirements for a Future Mission Network (FMN) are derived, taking into account experience from recent operations and also the NATO transformational vision and political guidance. Finally, the NNEC compliant approach for a NATO Future Mission Network is described, along with the high-level material and non-material solutions to facilitate information sharing in federated environments.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"1 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87477845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Anti-jamming defense mechanism in cognitive radios networks 认知无线电网络的抗干扰防御机制
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415653
Marcelo Camilo, D. Moura, J. F. Galdino, R. Salles
Cognitive Radio is a technology that enables the spectrum sharing in an opportunistic fashion. However, as the development of cognitive radio technology occurs, its security problems like jamming arise. In this paper, we studied the jamming attack in cognitive radio networks. We sketched a scenario comprised by a primary user, a secondary user, and a spectrum jammer (namely attacker). Since the legitimate secondary user needs to transmit control messages and data in the available channels, we derived the best combinations of the number of control and data channels to the legitimate secondary user in face of different data applications considering the quality of service requirements reliability and throughput. We also considered the device with and without power constraints.
认知无线电是一种以机会主义方式实现频谱共享的技术。然而,随着认知无线电技术的发展,出现了干扰等安全问题。本文对认知无线网络中的干扰攻击进行了研究。我们概述了一个由主用户、辅助用户和频谱干扰器(即攻击者)组成的场景。由于合法的辅助用户需要在可用的通道中传输控制消息和数据,因此我们在考虑服务质量要求、可靠性和吞吐量的情况下,导出了面对不同数据应用程序时,合法辅助用户的控制通道和数据通道的最佳组合。我们还考虑了有和没有功率限制的设备。
{"title":"Anti-jamming defense mechanism in cognitive radios networks","authors":"Marcelo Camilo, D. Moura, J. F. Galdino, R. Salles","doi":"10.1109/MILCOM.2012.6415653","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415653","url":null,"abstract":"Cognitive Radio is a technology that enables the spectrum sharing in an opportunistic fashion. However, as the development of cognitive radio technology occurs, its security problems like jamming arise. In this paper, we studied the jamming attack in cognitive radio networks. We sketched a scenario comprised by a primary user, a secondary user, and a spectrum jammer (namely attacker). Since the legitimate secondary user needs to transmit control messages and data in the available channels, we derived the best combinations of the number of control and data channels to the legitimate secondary user in face of different data applications considering the quality of service requirements reliability and throughput. We also considered the device with and without power constraints.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"13 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80043477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fault tolerance requirements of tactical Information Management systems 战术信息管理系统的容错要求
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415721
J. Cleveland, J. Loyall, J. Hanna
Information Management (IM) services provide a powerful capability for military operations, enabling managed information exchange based on the characteristics of the information that is needed and the information that is available, rather than on explicit knowledge of the information consumers, producers, and repositories. To be usable in tactical environments and mission critical operations, IM services need to be resilient to faults and failures, which can be due to many factors, including design or implementation flaws, misconfiguration, corruption, hardware or infrastructure failure, resource intermittency or contention, or hostile actions. This paper presents a reference model for representing the performance and fault tolerance requirements of IM services in tactical operations. A Joint Close Air Support operation is described using this representation and the viability of canonical fault tolerance techniques are examined for a given deployment.
信息管理(IM)服务为军事行动提供了强大的能力,支持基于所需信息和可用信息特征的托管信息交换,而不是基于信息消费者、生产者和存储库的明确知识。为了在战术环境和关键任务操作中可用,IM服务需要对故障和失败具有弹性,这可能是由于许多因素造成的,包括设计或实现缺陷、错误配置、损坏、硬件或基础设施故障、资源间歇性或争用,或敌对行动。本文提出了一种表示战术作战中IM服务性能和容错需求的参考模型。使用此表示描述了联合近距离空中支援操作,并对给定部署的规范容错技术的可行性进行了检查。
{"title":"Fault tolerance requirements of tactical Information Management systems","authors":"J. Cleveland, J. Loyall, J. Hanna","doi":"10.1109/MILCOM.2012.6415721","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415721","url":null,"abstract":"Information Management (IM) services provide a powerful capability for military operations, enabling managed information exchange based on the characteristics of the information that is needed and the information that is available, rather than on explicit knowledge of the information consumers, producers, and repositories. To be usable in tactical environments and mission critical operations, IM services need to be resilient to faults and failures, which can be due to many factors, including design or implementation flaws, misconfiguration, corruption, hardware or infrastructure failure, resource intermittency or contention, or hostile actions. This paper presents a reference model for representing the performance and fault tolerance requirements of IM services in tactical operations. A Joint Close Air Support operation is described using this representation and the viability of canonical fault tolerance techniques are examined for a given deployment.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"506 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77064386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mining diverse opinions 挖掘不同的意见
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415602
M. Srivatsa, Sihyung Lee, T. Abdelzaher
Network operations that support tactical missions are often characterized by evolving information that needs to be delivered over bandwidth constrained communication networks and presented to a social/cognitive network with limited human attention span and high stress. Most past research efforts on data dissemination examined syntactic redundancy between data items (e.g., common bit strings, entropy coding and compression, etc.), but only limited work has examined the problem of reducing semantic redundancy with the goal of providing higher quality information to end users. In this paper we propose to measure semantic redundancy in large volume text streams using online topic models and opinion analysis (e.g., topic = Location X and opinion = possible_hazard+, safe_zone-). By suppressing semantically redundant content one can better utilize bottleneck resources such as bandwidth on a resource constrained network or attention time of a human user. However, unlike syntactic redundancy (e.g., lossless compression, lossy compression with small reconstruction errors), a semantic redundancy based approach is faced with the challenge of having to deal with larger inaccuracies (e.g., false positive and false negative probabilities in an opinion classifier). This paper seeks to quantify the effectiveness of a semantic redundancy based approach (over its syntactic counterparts) as a function of such inaccuracies and present a detailed experimental evaluation using realistic information flows collected from an enterprise network with about 1500 users1.
支持战术任务的网络作战通常以不断发展的信息为特征,这些信息需要通过带宽受限的通信网络传递,并呈现给社会/认知网络,这些网络具有有限的人类注意力广度和高压力。过去大多数关于数据传播的研究都研究了数据项之间的语法冗余(例如,公共位串,熵编码和压缩等),但只有有限的工作研究了减少语义冗余的问题,目的是为最终用户提供更高质量的信息。在本文中,我们建议使用在线主题模型和意见分析(例如,主题= Location X和意见= possible_hazard+, safe_zone-)来测量大容量文本流中的语义冗余。通过抑制语义冗余内容,可以更好地利用瓶颈资源,如资源受限网络上的带宽或人类用户的注意力时间。然而,与句法冗余(例如,无损压缩,具有小重构错误的有损压缩)不同,基于语义冗余的方法面临着必须处理更大的不准确性(例如,意见分类器中的假阳性和假阴性概率)的挑战。本文试图量化基于语义冗余的方法(相对于其语法对等物)的有效性,作为这种不准确性的函数,并使用从拥有约1500名用户的企业网络收集的实际信息流进行了详细的实验评估1。
{"title":"Mining diverse opinions","authors":"M. Srivatsa, Sihyung Lee, T. Abdelzaher","doi":"10.1109/MILCOM.2012.6415602","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415602","url":null,"abstract":"Network operations that support tactical missions are often characterized by evolving information that needs to be delivered over bandwidth constrained communication networks and presented to a social/cognitive network with limited human attention span and high stress. Most past research efforts on data dissemination examined syntactic redundancy between data items (e.g., common bit strings, entropy coding and compression, etc.), but only limited work has examined the problem of reducing semantic redundancy with the goal of providing higher quality information to end users. In this paper we propose to measure semantic redundancy in large volume text streams using online topic models and opinion analysis (e.g., topic = Location X and opinion = possible_hazard+, safe_zone-). By suppressing semantically redundant content one can better utilize bottleneck resources such as bandwidth on a resource constrained network or attention time of a human user. However, unlike syntactic redundancy (e.g., lossless compression, lossy compression with small reconstruction errors), a semantic redundancy based approach is faced with the challenge of having to deal with larger inaccuracies (e.g., false positive and false negative probabilities in an opinion classifier). This paper seeks to quantify the effectiveness of a semantic redundancy based approach (over its syntactic counterparts) as a function of such inaccuracies and present a detailed experimental evaluation using realistic information flows collected from an enterprise network with about 1500 users1.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"284 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77073333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
MILCOM 2012 - 2012 IEEE Military Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1