Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415645
J. Mange, D. Kountanis
The adversarial agents problem is a generalized game-theoretic problem in which a set of agents faces a set of adversarial agents of varying types and capabilities, and must plan and perform actions to try to accomplish a specified goal; instances of this problem are often conceived as military combat situations. In this paper, we formulate the general adversarial agents problem as a non-linear integer programming problem, and show how an optimizing solver can be used to generate strategies for instances of the problem, with examples to illustrate the approach. Finally, we discuss the usefulness of such a formulation for real-world problems, particularly in system modeling and simulation for verification of heuristic strategy and planning algorithms and approaches.
{"title":"Non-linear programming approach to simulation of the general adversarial agents problem","authors":"J. Mange, D. Kountanis","doi":"10.1109/MILCOM.2012.6415645","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415645","url":null,"abstract":"The adversarial agents problem is a generalized game-theoretic problem in which a set of agents faces a set of adversarial agents of varying types and capabilities, and must plan and perform actions to try to accomplish a specified goal; instances of this problem are often conceived as military combat situations. In this paper, we formulate the general adversarial agents problem as a non-linear integer programming problem, and show how an optimizing solver can be used to generate strategies for instances of the problem, with examples to illustrate the approach. Finally, we discuss the usefulness of such a formulation for real-world problems, particularly in system modeling and simulation for verification of heuristic strategy and planning algorithms and approaches.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"21 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82610640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415724
R. Song, Helen Tang
Link layer security has been widely researched in the last decade as a means of protecting wireless networks (e.g., WEP, RSN, WPA, WPA2). However, there is little research in this area for Mobile Ad Hoc Networks (MANETs), especially for tactical MANETs. Although RSN can be used for MANETs as described in the IEEE 802.11i standard, it fails to meet some requirements of tactical MANETs, such as strong security, anonymity, and quick connectivity. In this paper, we propose a link layer anonymous access protocol (LAA) in order to provide strong security and anonymity protection for tactical MANETs. The protocol uses dynamic pseudonyms as network and node identities for network access authentication to prevent tracking, tracing, and other common attacks. It uses a localized key management mechanism for local shared key and broadcast key establishment that outperforms the connectivity and efficiency of key management in RSN and other link layer security technologies such as SEAMAN. Simulations show that LAA has only a small effect on end-to-end delay and no effect on packet delivery ratio relative to the standard MAC, meanwhile providing anonymous communication, better protection and improved connectivity performance in the link layer for tactical MANETs.
{"title":"LAA: Link-layer anonymous access for tactical MANETs","authors":"R. Song, Helen Tang","doi":"10.1109/MILCOM.2012.6415724","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415724","url":null,"abstract":"Link layer security has been widely researched in the last decade as a means of protecting wireless networks (e.g., WEP, RSN, WPA, WPA2). However, there is little research in this area for Mobile Ad Hoc Networks (MANETs), especially for tactical MANETs. Although RSN can be used for MANETs as described in the IEEE 802.11i standard, it fails to meet some requirements of tactical MANETs, such as strong security, anonymity, and quick connectivity. In this paper, we propose a link layer anonymous access protocol (LAA) in order to provide strong security and anonymity protection for tactical MANETs. The protocol uses dynamic pseudonyms as network and node identities for network access authentication to prevent tracking, tracing, and other common attacks. It uses a localized key management mechanism for local shared key and broadcast key establishment that outperforms the connectivity and efficiency of key management in RSN and other link layer security technologies such as SEAMAN. Simulations show that LAA has only a small effect on end-to-end delay and no effect on packet delivery ratio relative to the standard MAC, meanwhile providing anonymous communication, better protection and improved connectivity performance in the link layer for tactical MANETs.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"23 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82581486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415623
J. Cartmell, J. Tomici
Many wireless systems used by military ground personnel are satellite based. This paper explores a hybrid system that benefits from both satellite and terrestrial wireless technologies while overcoming the limitations of each. We present the architecture, describe the merits, and then explain the essence of the system: IP Flow mobility. After introducing this concept, we describe some of the important aspects that specifically relate to mobility and security.
{"title":"Non-satellite based field communications system for battlefield deployments","authors":"J. Cartmell, J. Tomici","doi":"10.1109/MILCOM.2012.6415623","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415623","url":null,"abstract":"Many wireless systems used by military ground personnel are satellite based. This paper explores a hybrid system that benefits from both satellite and terrestrial wireless technologies while overcoming the limitations of each. We present the architecture, describe the merits, and then explain the essence of the system: IP Flow mobility. After introducing this concept, we describe some of the important aspects that specifically relate to mobility and security.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"126 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90277719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415632
Alan J. Michaels
Spread spectrum communication systems excel in their ability to provide enhanced security and channel sharing, yet they do so at the expense of data throughput provided to each individual user. This paper introduces an alternative modulation mechanism, pulse rotation modulation (PRM), for increasing the data throughput in wideband direct sequence or chaotic sequence code-based spread spectrum systems. The result employs a temporal rotation of the spread pulse within its own symbol duration, leading to higher data throughputs that can be throttled up/down as the channel and multiple access conditions permit. Challenges with signal synchronization, code orthogonality, and carrier-induced phase rotations/phase noise are discussed. A predictive model of receiver performance is validated with simulated AWGN-channel results; both are based on extrapolations from a measured hardware prototype that has implemented a small scale example of the PRM technique.
{"title":"Pulse rotation modulations for spread spectrum communication systems","authors":"Alan J. Michaels","doi":"10.1109/MILCOM.2012.6415632","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415632","url":null,"abstract":"Spread spectrum communication systems excel in their ability to provide enhanced security and channel sharing, yet they do so at the expense of data throughput provided to each individual user. This paper introduces an alternative modulation mechanism, pulse rotation modulation (PRM), for increasing the data throughput in wideband direct sequence or chaotic sequence code-based spread spectrum systems. The result employs a temporal rotation of the spread pulse within its own symbol duration, leading to higher data throughputs that can be throttled up/down as the channel and multiple access conditions permit. Challenges with signal synchronization, code orthogonality, and carrier-induced phase rotations/phase noise are discussed. A predictive model of receiver performance is validated with simulated AWGN-channel results; both are based on extrapolations from a measured hardware prototype that has implemented a small scale example of the PRM technique.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"40 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89873977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415662
S. Newman, Jeffrey Schindler, J. Shah, Sandra P. Tinta
As the ARMY prepares to deploy modern tactical networks in theater [1], there is an increasing need to ensure that radio systems will perform up to expectations before integrating them into emerging Army Capability Sets for Brigade tactical networks. Evaluating these radio systems before field deployments in a controlled laboratory setting provides a critical opportunity to establish baseline performance levels, as well as to identify and resolve design flaws and engineering bugs, long before they are encountered in the field. This paper discusses the role of the CERDEC S&TCD Radio Evaluation and Analysis Laboratory (REAL) in evaluating military radio networks, not only as black-box systems, but also as part of a larger tactical network consisting of a mix of radio systems. This testing has already become an important element of the Army's Agile Process, and has demonstrated its value many times over in preparing new technologies for operational experimentation in the Army's Network Integration Evaluations (NIE) taking place at Ft Bliss, TX.
{"title":"Laboratory evaluation of military radios and network architectures","authors":"S. Newman, Jeffrey Schindler, J. Shah, Sandra P. Tinta","doi":"10.1109/MILCOM.2012.6415662","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415662","url":null,"abstract":"As the ARMY prepares to deploy modern tactical networks in theater [1], there is an increasing need to ensure that radio systems will perform up to expectations before integrating them into emerging Army Capability Sets for Brigade tactical networks. Evaluating these radio systems before field deployments in a controlled laboratory setting provides a critical opportunity to establish baseline performance levels, as well as to identify and resolve design flaws and engineering bugs, long before they are encountered in the field. This paper discusses the role of the CERDEC S&TCD Radio Evaluation and Analysis Laboratory (REAL) in evaluating military radio networks, not only as black-box systems, but also as part of a larger tactical network consisting of a mix of radio systems. This testing has already become an important element of the Army's Agile Process, and has demonstrated its value many times over in preparing new technologies for operational experimentation in the Army's Network Integration Evaluations (NIE) taking place at Ft Bliss, TX.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"48 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84804992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415824
C. Danilov, T. Henderson, O. Brewer, J. H. Kim, J. Macker, B. Adamson
This paper presents a multicast routing mechanism supporting the classical IP multicast service model that can dynamically use redundant forwarding in the parts of the network affected by a high rate of topology changes, while converging to regular multicast distribution trees where or when the network becomes relatively stable. The rationale is that intermittent connectivity directly affects the ability of routers to synchronize on their view of the network, thus making it difficult to converge on efficient distribution trees, while network wide broadcast may be prohibitively expensive for relatively sparse groups. We describe a hybrid approach, called Elastic Multicast, which dynamically expands to limited scope broadcast when needed, and converges single path forwarding if the network is stable, through independent routing decisions made at each node.
{"title":"Elastic multicast for tactical communications","authors":"C. Danilov, T. Henderson, O. Brewer, J. H. Kim, J. Macker, B. Adamson","doi":"10.1109/MILCOM.2012.6415824","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415824","url":null,"abstract":"This paper presents a multicast routing mechanism supporting the classical IP multicast service model that can dynamically use redundant forwarding in the parts of the network affected by a high rate of topology changes, while converging to regular multicast distribution trees where or when the network becomes relatively stable. The rationale is that intermittent connectivity directly affects the ability of routers to synchronize on their view of the network, thus making it difficult to converge on efficient distribution trees, while network wide broadcast may be prohibitively expensive for relatively sparse groups. We describe a hybrid approach, called Elastic Multicast, which dynamically expands to limited scope broadcast when needed, and converges single path forwarding if the network is stable, through independent routing decisions made at each node.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"12 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84090064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415693
Cem Tekin, M. Liu
In this paper we consider decentralized multi-user online learning of unused spectrum bands as an opportunistic spectrum access (OSA) problem. There is a set of M secondary users exploiting the spectrum opportunities in K channels. We develop a distributed algorithm for the secondary users that will learn the optimal allocation with logarithmic regret. Thus, our algorithm achieves the fastest convergence rate to the optimal allocation. In a more general framework, our algorithm gives an order optimal solution to the decentralized multi-player multi-armed bandit problem with general reward functions.
{"title":"Online learning in decentralized multi-user spectrum access with synchronized explorations","authors":"Cem Tekin, M. Liu","doi":"10.1109/MILCOM.2012.6415693","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415693","url":null,"abstract":"In this paper we consider decentralized multi-user online learning of unused spectrum bands as an opportunistic spectrum access (OSA) problem. There is a set of M secondary users exploiting the spectrum opportunities in K channels. We develop a distributed algorithm for the secondary users that will learn the optimal allocation with logarithmic regret. Thus, our algorithm achieves the fastest convergence rate to the optimal allocation. In a more general framework, our algorithm gives an order optimal solution to the decentralized multi-player multi-armed bandit problem with general reward functions.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"79 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83798067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415768
K. Y. Jo, D. M. Cascio
This paper presents satellite loading methodologies for loading satellite communications (SATCOM) requirements on commercial Ka-band satellites in contested environments experiencing jamming. Future high-capacity Ka-band commercial satellites will rely on ground concentration nodes (GCNs) and adaptive coding and modulation (ACM) techniques to provide digital video broadcasting/return channel via satellite (DVB/RCS) services for forward and return links to achieve high throughput. Traffic flows between user beams are coordinated through GCNs thus requiring double hops for peer-to-peer traffic while reachback traffic requires single hops relying on terrestrial networks. Cell-like user beams are assembled in arrays designed to enhance user coverage and supportability. Optimal satellite loading in the presence of uplink jamming is derived to minimize satellite and terminals powers and to maximize the supported data rates. Throughput degradation in contested environments results when the transponders begin to operate in a non-linear mode approaching saturation.
{"title":"Performance of Combatant Command satellite (COCOMSat) communications in contested environments","authors":"K. Y. Jo, D. M. Cascio","doi":"10.1109/MILCOM.2012.6415768","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415768","url":null,"abstract":"This paper presents satellite loading methodologies for loading satellite communications (SATCOM) requirements on commercial Ka-band satellites in contested environments experiencing jamming. Future high-capacity Ka-band commercial satellites will rely on ground concentration nodes (GCNs) and adaptive coding and modulation (ACM) techniques to provide digital video broadcasting/return channel via satellite (DVB/RCS) services for forward and return links to achieve high throughput. Traffic flows between user beams are coordinated through GCNs thus requiring double hops for peer-to-peer traffic while reachback traffic requires single hops relying on terrestrial networks. Cell-like user beams are assembled in arrays designed to enhance user coverage and supportability. Optimal satellite loading in the presence of uplink jamming is derived to minimize satellite and terminals powers and to maximize the supported data rates. Throughput degradation in contested environments results when the transponders begin to operate in a non-linear mode approaching saturation.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"55 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83810626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415731
U. Kumar, Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor
The proliferation of smart phones inside enterprises and the number of enterprise apps (applications) available for various smart phone platforms has been increasing. This trend is expected to continue as smart phones tend to become the device of choice to access both enterprise and personal data. Making enterprise sensitive data accessible on smart phones requires that adequate protection mechanisms be available on these devices to ensure that sensitive data is not compromised due to various reasons, such as employees losing phones to malicious apps (installed by the user) running on the phones. Most of the existing solutions either provide device level control or have an external agent monitoring the application's behavior, and has numerous limitations. In this paper we propose a framework, Polite, to build enterprise mobile apps that can be managed at run-time, which is less intrusive to the end user while providing stronger security guarantees to the enterprise. We describe several critical scenarios where controlling the run time behavior of apps on the phone is essential and how our architecture can provide security guarantees that are not possible with existing solutions. Performance results of our implementation indicate that our framework induces a minimal overhead of only 6% that may be acceptable for most enterprise mobile apps.
{"title":"Polite: A policy framework for building managed mobile apps","authors":"U. Kumar, Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor","doi":"10.1109/MILCOM.2012.6415731","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415731","url":null,"abstract":"The proliferation of smart phones inside enterprises and the number of enterprise apps (applications) available for various smart phone platforms has been increasing. This trend is expected to continue as smart phones tend to become the device of choice to access both enterprise and personal data. Making enterprise sensitive data accessible on smart phones requires that adequate protection mechanisms be available on these devices to ensure that sensitive data is not compromised due to various reasons, such as employees losing phones to malicious apps (installed by the user) running on the phones. Most of the existing solutions either provide device level control or have an external agent monitoring the application's behavior, and has numerous limitations. In this paper we propose a framework, Polite, to build enterprise mobile apps that can be managed at run-time, which is less intrusive to the end user while providing stronger security guarantees to the enterprise. We describe several critical scenarios where controlling the run time behavior of apps on the phone is essential and how our architecture can provide security guarantees that are not possible with existing solutions. Performance results of our implementation indicate that our framework induces a minimal overhead of only 6% that may be acceptable for most enterprise mobile apps.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"2013 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86468890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415681
Leonard E. Lightfoot, Ellen Laubie
With the growing number of wireless network standards operating in the unlicensed frequency band and the military moving toward commercial off the shelf technology, the next generation of wireless sensor networks must be robust against unintentional and hostile interference. One method that has gained interest to cope with the increased spectrum use and to combat the interference vulnerability in wireless sensor networks is frequency agile communication. These techniques typically entail spectrum sensing and dynamic frequency channel allocation. In this paper, the energy detection mechanism is used to investigate how the number of frequency channels characterized for spectrum sensing impacts the accuracy of frequency channel selection and how the number of channels characterized affects the achievable throughput. From the investigation, we observed a tradeoff between the number of channels characterized, the number of energy samples used in energy detection, and the achievable throughput.
{"title":"Channel characterization and throughput tradeoff for wireless sensor networks","authors":"Leonard E. Lightfoot, Ellen Laubie","doi":"10.1109/MILCOM.2012.6415681","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415681","url":null,"abstract":"With the growing number of wireless network standards operating in the unlicensed frequency band and the military moving toward commercial off the shelf technology, the next generation of wireless sensor networks must be robust against unintentional and hostile interference. One method that has gained interest to cope with the increased spectrum use and to combat the interference vulnerability in wireless sensor networks is frequency agile communication. These techniques typically entail spectrum sensing and dynamic frequency channel allocation. In this paper, the energy detection mechanism is used to investigate how the number of frequency channels characterized for spectrum sensing impacts the accuracy of frequency channel selection and how the number of channels characterized affects the achievable throughput. From the investigation, we observed a tradeoff between the number of channels characterized, the number of energy samples used in energy detection, and the achievable throughput.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"11 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86293507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}