Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415731
U. Kumar, Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor
The proliferation of smart phones inside enterprises and the number of enterprise apps (applications) available for various smart phone platforms has been increasing. This trend is expected to continue as smart phones tend to become the device of choice to access both enterprise and personal data. Making enterprise sensitive data accessible on smart phones requires that adequate protection mechanisms be available on these devices to ensure that sensitive data is not compromised due to various reasons, such as employees losing phones to malicious apps (installed by the user) running on the phones. Most of the existing solutions either provide device level control or have an external agent monitoring the application's behavior, and has numerous limitations. In this paper we propose a framework, Polite, to build enterprise mobile apps that can be managed at run-time, which is less intrusive to the end user while providing stronger security guarantees to the enterprise. We describe several critical scenarios where controlling the run time behavior of apps on the phone is essential and how our architecture can provide security guarantees that are not possible with existing solutions. Performance results of our implementation indicate that our framework induces a minimal overhead of only 6% that may be acceptable for most enterprise mobile apps.
{"title":"Polite: A policy framework for building managed mobile apps","authors":"U. Kumar, Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor","doi":"10.1109/MILCOM.2012.6415731","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415731","url":null,"abstract":"The proliferation of smart phones inside enterprises and the number of enterprise apps (applications) available for various smart phone platforms has been increasing. This trend is expected to continue as smart phones tend to become the device of choice to access both enterprise and personal data. Making enterprise sensitive data accessible on smart phones requires that adequate protection mechanisms be available on these devices to ensure that sensitive data is not compromised due to various reasons, such as employees losing phones to malicious apps (installed by the user) running on the phones. Most of the existing solutions either provide device level control or have an external agent monitoring the application's behavior, and has numerous limitations. In this paper we propose a framework, Polite, to build enterprise mobile apps that can be managed at run-time, which is less intrusive to the end user while providing stronger security guarantees to the enterprise. We describe several critical scenarios where controlling the run time behavior of apps on the phone is essential and how our architecture can provide security guarantees that are not possible with existing solutions. Performance results of our implementation indicate that our framework induces a minimal overhead of only 6% that may be acceptable for most enterprise mobile apps.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"2013 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86468890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415645
J. Mange, D. Kountanis
The adversarial agents problem is a generalized game-theoretic problem in which a set of agents faces a set of adversarial agents of varying types and capabilities, and must plan and perform actions to try to accomplish a specified goal; instances of this problem are often conceived as military combat situations. In this paper, we formulate the general adversarial agents problem as a non-linear integer programming problem, and show how an optimizing solver can be used to generate strategies for instances of the problem, with examples to illustrate the approach. Finally, we discuss the usefulness of such a formulation for real-world problems, particularly in system modeling and simulation for verification of heuristic strategy and planning algorithms and approaches.
{"title":"Non-linear programming approach to simulation of the general adversarial agents problem","authors":"J. Mange, D. Kountanis","doi":"10.1109/MILCOM.2012.6415645","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415645","url":null,"abstract":"The adversarial agents problem is a generalized game-theoretic problem in which a set of agents faces a set of adversarial agents of varying types and capabilities, and must plan and perform actions to try to accomplish a specified goal; instances of this problem are often conceived as military combat situations. In this paper, we formulate the general adversarial agents problem as a non-linear integer programming problem, and show how an optimizing solver can be used to generate strategies for instances of the problem, with examples to illustrate the approach. Finally, we discuss the usefulness of such a formulation for real-world problems, particularly in system modeling and simulation for verification of heuristic strategy and planning algorithms and approaches.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"21 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82610640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415744
Nam P. Nguyen, M. Thai
In this work, we introduce two approaches, namely iSNMF and iANMF, for effectively identifying social communities using Nonnegative Matrix Factorization (NMF) with I-divergence as the cost function. Our approaches work by iteratively factorizing the nonnegative input matrix through derived multiplicative update rules. By doing so, we can not only extract meaningful overlapping communities via soft community assignments produced by NMF, but also nicely handle all directed and undirected networks with or without weights. To validate the performance of our approaches, we extensively conduct experiments on both synthesized networks and real-world datasets in comparison with other NMF methods. Experimental results show that iSNMF is among the best efficient detection methods on reciprocity networks while iANMF outperforms current available methods on directed networks, especially in terms of detection quality.
{"title":"Finding overlapped communities in online social networks with Nonnegative Matrix Factorization","authors":"Nam P. Nguyen, M. Thai","doi":"10.1109/MILCOM.2012.6415744","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415744","url":null,"abstract":"In this work, we introduce two approaches, namely iSNMF and iANMF, for effectively identifying social communities using Nonnegative Matrix Factorization (NMF) with I-divergence as the cost function. Our approaches work by iteratively factorizing the nonnegative input matrix through derived multiplicative update rules. By doing so, we can not only extract meaningful overlapping communities via soft community assignments produced by NMF, but also nicely handle all directed and undirected networks with or without weights. To validate the performance of our approaches, we extensively conduct experiments on both synthesized networks and real-world datasets in comparison with other NMF methods. Experimental results show that iSNMF is among the best efficient detection methods on reciprocity networks while iANMF outperforms current available methods on directed networks, especially in terms of detection quality.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80455023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415724
R. Song, Helen Tang
Link layer security has been widely researched in the last decade as a means of protecting wireless networks (e.g., WEP, RSN, WPA, WPA2). However, there is little research in this area for Mobile Ad Hoc Networks (MANETs), especially for tactical MANETs. Although RSN can be used for MANETs as described in the IEEE 802.11i standard, it fails to meet some requirements of tactical MANETs, such as strong security, anonymity, and quick connectivity. In this paper, we propose a link layer anonymous access protocol (LAA) in order to provide strong security and anonymity protection for tactical MANETs. The protocol uses dynamic pseudonyms as network and node identities for network access authentication to prevent tracking, tracing, and other common attacks. It uses a localized key management mechanism for local shared key and broadcast key establishment that outperforms the connectivity and efficiency of key management in RSN and other link layer security technologies such as SEAMAN. Simulations show that LAA has only a small effect on end-to-end delay and no effect on packet delivery ratio relative to the standard MAC, meanwhile providing anonymous communication, better protection and improved connectivity performance in the link layer for tactical MANETs.
{"title":"LAA: Link-layer anonymous access for tactical MANETs","authors":"R. Song, Helen Tang","doi":"10.1109/MILCOM.2012.6415724","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415724","url":null,"abstract":"Link layer security has been widely researched in the last decade as a means of protecting wireless networks (e.g., WEP, RSN, WPA, WPA2). However, there is little research in this area for Mobile Ad Hoc Networks (MANETs), especially for tactical MANETs. Although RSN can be used for MANETs as described in the IEEE 802.11i standard, it fails to meet some requirements of tactical MANETs, such as strong security, anonymity, and quick connectivity. In this paper, we propose a link layer anonymous access protocol (LAA) in order to provide strong security and anonymity protection for tactical MANETs. The protocol uses dynamic pseudonyms as network and node identities for network access authentication to prevent tracking, tracing, and other common attacks. It uses a localized key management mechanism for local shared key and broadcast key establishment that outperforms the connectivity and efficiency of key management in RSN and other link layer security technologies such as SEAMAN. Simulations show that LAA has only a small effect on end-to-end delay and no effect on packet delivery ratio relative to the standard MAC, meanwhile providing anonymous communication, better protection and improved connectivity performance in the link layer for tactical MANETs.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"23 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82581486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415632
Alan J. Michaels
Spread spectrum communication systems excel in their ability to provide enhanced security and channel sharing, yet they do so at the expense of data throughput provided to each individual user. This paper introduces an alternative modulation mechanism, pulse rotation modulation (PRM), for increasing the data throughput in wideband direct sequence or chaotic sequence code-based spread spectrum systems. The result employs a temporal rotation of the spread pulse within its own symbol duration, leading to higher data throughputs that can be throttled up/down as the channel and multiple access conditions permit. Challenges with signal synchronization, code orthogonality, and carrier-induced phase rotations/phase noise are discussed. A predictive model of receiver performance is validated with simulated AWGN-channel results; both are based on extrapolations from a measured hardware prototype that has implemented a small scale example of the PRM technique.
{"title":"Pulse rotation modulations for spread spectrum communication systems","authors":"Alan J. Michaels","doi":"10.1109/MILCOM.2012.6415632","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415632","url":null,"abstract":"Spread spectrum communication systems excel in their ability to provide enhanced security and channel sharing, yet they do so at the expense of data throughput provided to each individual user. This paper introduces an alternative modulation mechanism, pulse rotation modulation (PRM), for increasing the data throughput in wideband direct sequence or chaotic sequence code-based spread spectrum systems. The result employs a temporal rotation of the spread pulse within its own symbol duration, leading to higher data throughputs that can be throttled up/down as the channel and multiple access conditions permit. Challenges with signal synchronization, code orthogonality, and carrier-induced phase rotations/phase noise are discussed. A predictive model of receiver performance is validated with simulated AWGN-channel results; both are based on extrapolations from a measured hardware prototype that has implemented a small scale example of the PRM technique.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"40 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89873977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415623
J. Cartmell, J. Tomici
Many wireless systems used by military ground personnel are satellite based. This paper explores a hybrid system that benefits from both satellite and terrestrial wireless technologies while overcoming the limitations of each. We present the architecture, describe the merits, and then explain the essence of the system: IP Flow mobility. After introducing this concept, we describe some of the important aspects that specifically relate to mobility and security.
{"title":"Non-satellite based field communications system for battlefield deployments","authors":"J. Cartmell, J. Tomici","doi":"10.1109/MILCOM.2012.6415623","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415623","url":null,"abstract":"Many wireless systems used by military ground personnel are satellite based. This paper explores a hybrid system that benefits from both satellite and terrestrial wireless technologies while overcoming the limitations of each. We present the architecture, describe the merits, and then explain the essence of the system: IP Flow mobility. After introducing this concept, we describe some of the important aspects that specifically relate to mobility and security.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"126 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90277719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415827
E. Egbogah, A. Fapojuwo, Liqi Shi
In this paper, we propose an energy-efficient transmission scheme for monitoring soldier health in tactical mobile ad hoc networks (T-MANET). In the proposed scheme, a constrained route discovery algorithm is used to determine feasible routing paths between the source nodes and sink node. A cross-layer optimization approach is then used to determine the optimal routes and minimum power required to transmit data in the military UHF band such that the end-to-end packet delivery ratio (PDR) and end-to-end delay objectives are met. However, the optimal solution requires exponential complexity and is not suitable for implementation in resource constrained sensor motes. Therefore, we propose a heuristic algorithm called joint link node power allocation (JPA) that allocates power based on the presence of joint link nodes. From the analysis and numerical results, we find that JPA achieves energy consumption that is within 24% of the optimal value, but significantly reduces the solution complexity from exponential to polynomial by utilizing 6 times fewer iterations than the optimal solution to converge to a minimum energy solution.
{"title":"An energy-efficient transmission scheme for monitoring of combat soldier health in tactical mobile ad hoc networks","authors":"E. Egbogah, A. Fapojuwo, Liqi Shi","doi":"10.1109/MILCOM.2012.6415827","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415827","url":null,"abstract":"In this paper, we propose an energy-efficient transmission scheme for monitoring soldier health in tactical mobile ad hoc networks (T-MANET). In the proposed scheme, a constrained route discovery algorithm is used to determine feasible routing paths between the source nodes and sink node. A cross-layer optimization approach is then used to determine the optimal routes and minimum power required to transmit data in the military UHF band such that the end-to-end packet delivery ratio (PDR) and end-to-end delay objectives are met. However, the optimal solution requires exponential complexity and is not suitable for implementation in resource constrained sensor motes. Therefore, we propose a heuristic algorithm called joint link node power allocation (JPA) that allocates power based on the presence of joint link nodes. From the analysis and numerical results, we find that JPA achieves energy consumption that is within 24% of the optimal value, but significantly reduces the solution complexity from exponential to polynomial by utilizing 6 times fewer iterations than the optimal solution to converge to a minimum energy solution.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"174 3","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91422718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415662
S. Newman, Jeffrey Schindler, J. Shah, Sandra P. Tinta
As the ARMY prepares to deploy modern tactical networks in theater [1], there is an increasing need to ensure that radio systems will perform up to expectations before integrating them into emerging Army Capability Sets for Brigade tactical networks. Evaluating these radio systems before field deployments in a controlled laboratory setting provides a critical opportunity to establish baseline performance levels, as well as to identify and resolve design flaws and engineering bugs, long before they are encountered in the field. This paper discusses the role of the CERDEC S&TCD Radio Evaluation and Analysis Laboratory (REAL) in evaluating military radio networks, not only as black-box systems, but also as part of a larger tactical network consisting of a mix of radio systems. This testing has already become an important element of the Army's Agile Process, and has demonstrated its value many times over in preparing new technologies for operational experimentation in the Army's Network Integration Evaluations (NIE) taking place at Ft Bliss, TX.
{"title":"Laboratory evaluation of military radios and network architectures","authors":"S. Newman, Jeffrey Schindler, J. Shah, Sandra P. Tinta","doi":"10.1109/MILCOM.2012.6415662","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415662","url":null,"abstract":"As the ARMY prepares to deploy modern tactical networks in theater [1], there is an increasing need to ensure that radio systems will perform up to expectations before integrating them into emerging Army Capability Sets for Brigade tactical networks. Evaluating these radio systems before field deployments in a controlled laboratory setting provides a critical opportunity to establish baseline performance levels, as well as to identify and resolve design flaws and engineering bugs, long before they are encountered in the field. This paper discusses the role of the CERDEC S&TCD Radio Evaluation and Analysis Laboratory (REAL) in evaluating military radio networks, not only as black-box systems, but also as part of a larger tactical network consisting of a mix of radio systems. This testing has already become an important element of the Army's Agile Process, and has demonstrated its value many times over in preparing new technologies for operational experimentation in the Army's Network Integration Evaluations (NIE) taking place at Ft Bliss, TX.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"48 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84804992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415601
Luis Bastos, H. Wietgrefe
Transportable troposcatter terminals are a valid beyond line-of-sight (BLOS) transmission medium in support of NATO expeditionary operations. Troposcatter systems are able to provide augmentation capacity to SATCOM in support of forward-deployed military headquarters and a valid alternative to tandem line-of-sight systems. In more tactical scenarios, where capacity and reach requirements are less demanding, the ability to deploy low transmission delay wireless links is a critical capability to support secondary deployed locations. In this paper, the authors analyze the performance and military potential of short-range tactical transit case based troposcatter terminals in tactical scenarios typical of smaller deployed locations. The analysis is performed with a commercial implementation of a troposcatter system deployed to a realistic tactical scenario subject to challenging propagation conditions.
{"title":"Tactical troposcatter applications in challenging climate zones","authors":"Luis Bastos, H. Wietgrefe","doi":"10.1109/MILCOM.2012.6415601","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415601","url":null,"abstract":"Transportable troposcatter terminals are a valid beyond line-of-sight (BLOS) transmission medium in support of NATO expeditionary operations. Troposcatter systems are able to provide augmentation capacity to SATCOM in support of forward-deployed military headquarters and a valid alternative to tandem line-of-sight systems. In more tactical scenarios, where capacity and reach requirements are less demanding, the ability to deploy low transmission delay wireless links is a critical capability to support secondary deployed locations. In this paper, the authors analyze the performance and military potential of short-range tactical transit case based troposcatter terminals in tactical scenarios typical of smaller deployed locations. The analysis is performed with a commercial implementation of a troposcatter system deployed to a realistic tactical scenario subject to challenging propagation conditions.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"4 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72982627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415863
C. McLain, Sunil Panthi, M. Sturza, J. Hetrick
Recent advancements in Ku-band high throughput satellites (HTS) will allow commercial Ku-band aeronautical mobile satellite systems (AMSS) to equal or exceed commercial Ka-band AMSS systems on cost and performance. The AMSS market is currently dominated by Ku-band solutions, both in the commercial sector (eXConnect, Row44, Yonder) and the government sector (Tachyon, Boeing Broadband Satellite Network (formerly Connexion), various UAV and ISR systems). All of these systems use conventional continental-scale wide beams that are leased from Fixed Satellite Service (FSS) providers such as Intelsat and Eutelsat. In the next several years the dominance of Ku-band AMSS will be challenged by Ka-band systems such as Inmarsat-5, which use multiple spot beams to offer enhanced performance. Previous work has suggested that these systems may offer better performance and better economics than conventional Ku-band systems [1]. The key insight of this paper is that the performance advantage of spot beam Ka-band systems comes from their smaller beam size rather than their frequency of operation, meaning that a Ku-band spot beam satellite can also be built with similar sized spot beams to Ka-band systems and can achieve competitive cost and performance as compared to a Ka-band spot beam systems. High throughput spot beam Ku-band systems, such as Intelsat's EpicNG system, are now in development and will be fielded in the same timeframe as Inmarsat-5. This result has critical implications for existing users and operators of AMSS systems: - Currently installed Ku-band terminals will be able to take advantage of dramatic improvements in performance when high throughput Ku-band becomes available - Current Ku-band will not have to undergo costly Ka-band retrofits to maintain competitive performance - Operators can continue to invest in Ku-band terminals today without fear of obsolescence in the near future - The AMSS market will continue to be diverse and competitive for years to come.
{"title":"High throughput Ku-band satellites for aeronautical applications","authors":"C. McLain, Sunil Panthi, M. Sturza, J. Hetrick","doi":"10.1109/MILCOM.2012.6415863","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415863","url":null,"abstract":"Recent advancements in Ku-band high throughput satellites (HTS) will allow commercial Ku-band aeronautical mobile satellite systems (AMSS) to equal or exceed commercial Ka-band AMSS systems on cost and performance. The AMSS market is currently dominated by Ku-band solutions, both in the commercial sector (eXConnect, Row44, Yonder) and the government sector (Tachyon, Boeing Broadband Satellite Network (formerly Connexion), various UAV and ISR systems). All of these systems use conventional continental-scale wide beams that are leased from Fixed Satellite Service (FSS) providers such as Intelsat and Eutelsat. In the next several years the dominance of Ku-band AMSS will be challenged by Ka-band systems such as Inmarsat-5, which use multiple spot beams to offer enhanced performance. Previous work has suggested that these systems may offer better performance and better economics than conventional Ku-band systems [1]. The key insight of this paper is that the performance advantage of spot beam Ka-band systems comes from their smaller beam size rather than their frequency of operation, meaning that a Ku-band spot beam satellite can also be built with similar sized spot beams to Ka-band systems and can achieve competitive cost and performance as compared to a Ka-band spot beam systems. High throughput spot beam Ku-band systems, such as Intelsat's EpicNG system, are now in development and will be fielded in the same timeframe as Inmarsat-5. This result has critical implications for existing users and operators of AMSS systems: - Currently installed Ku-band terminals will be able to take advantage of dramatic improvements in performance when high throughput Ku-band becomes available - Current Ku-band will not have to undergo costly Ka-band retrofits to maintain competitive performance - Operators can continue to invest in Ku-band terminals today without fear of obsolescence in the near future - The AMSS market will continue to be diverse and competitive for years to come.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"36 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81081107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}