首页 > 最新文献

MILCOM 2012 - 2012 IEEE Military Communications Conference最新文献

英文 中文
Polite: A policy framework for building managed mobile apps 礼貌:构建托管移动应用程序的政策框架
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415731
U. Kumar, Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor
The proliferation of smart phones inside enterprises and the number of enterprise apps (applications) available for various smart phone platforms has been increasing. This trend is expected to continue as smart phones tend to become the device of choice to access both enterprise and personal data. Making enterprise sensitive data accessible on smart phones requires that adequate protection mechanisms be available on these devices to ensure that sensitive data is not compromised due to various reasons, such as employees losing phones to malicious apps (installed by the user) running on the phones. Most of the existing solutions either provide device level control or have an external agent monitoring the application's behavior, and has numerous limitations. In this paper we propose a framework, Polite, to build enterprise mobile apps that can be managed at run-time, which is less intrusive to the end user while providing stronger security guarantees to the enterprise. We describe several critical scenarios where controlling the run time behavior of apps on the phone is essential and how our architecture can provide security guarantees that are not possible with existing solutions. Performance results of our implementation indicate that our framework induces a minimal overhead of only 6% that may be acceptable for most enterprise mobile apps.
智能手机在企业内部的普及以及各种智能手机平台上可用的企业应用程序(应用程序)的数量一直在增加。随着智能手机逐渐成为访问企业和个人数据的首选设备,这一趋势预计将继续下去。在智能手机上访问企业敏感数据需要在这些设备上提供足够的保护机制,以确保敏感数据不会因为各种原因而泄露,例如员工的手机被手机上运行的恶意应用程序(由用户安装)丢失。大多数现有的解决方案要么提供设备级控制,要么有一个外部代理监视应用程序的行为,并且有许多限制。在本文中,我们提出了一个框架,Polite,来构建可以在运行时管理的企业移动应用程序,它对最终用户的干扰较小,同时为企业提供更强的安全保证。我们描述了几个关键场景,其中在手机上控制应用程序的运行时行为是必不可少的,以及我们的架构如何提供现有解决方案无法实现的安全保证。我们实现的性能结果表明,我们的框架产生的最小开销只有6%,这对于大多数企业移动应用程序来说是可以接受的。
{"title":"Polite: A policy framework for building managed mobile apps","authors":"U. Kumar, Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor","doi":"10.1109/MILCOM.2012.6415731","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415731","url":null,"abstract":"The proliferation of smart phones inside enterprises and the number of enterprise apps (applications) available for various smart phone platforms has been increasing. This trend is expected to continue as smart phones tend to become the device of choice to access both enterprise and personal data. Making enterprise sensitive data accessible on smart phones requires that adequate protection mechanisms be available on these devices to ensure that sensitive data is not compromised due to various reasons, such as employees losing phones to malicious apps (installed by the user) running on the phones. Most of the existing solutions either provide device level control or have an external agent monitoring the application's behavior, and has numerous limitations. In this paper we propose a framework, Polite, to build enterprise mobile apps that can be managed at run-time, which is less intrusive to the end user while providing stronger security guarantees to the enterprise. We describe several critical scenarios where controlling the run time behavior of apps on the phone is essential and how our architecture can provide security guarantees that are not possible with existing solutions. Performance results of our implementation indicate that our framework induces a minimal overhead of only 6% that may be acceptable for most enterprise mobile apps.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"2013 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86468890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Non-linear programming approach to simulation of the general adversarial agents problem 用非线性规划方法模拟一般对抗代理问题
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415645
J. Mange, D. Kountanis
The adversarial agents problem is a generalized game-theoretic problem in which a set of agents faces a set of adversarial agents of varying types and capabilities, and must plan and perform actions to try to accomplish a specified goal; instances of this problem are often conceived as military combat situations. In this paper, we formulate the general adversarial agents problem as a non-linear integer programming problem, and show how an optimizing solver can be used to generate strategies for instances of the problem, with examples to illustrate the approach. Finally, we discuss the usefulness of such a formulation for real-world problems, particularly in system modeling and simulation for verification of heuristic strategy and planning algorithms and approaches.
对抗代理问题是一个广义的博弈论问题,其中一组代理面对一组不同类型和能力的对抗代理,并且必须计划和执行行动以试图完成指定的目标;这个问题的实例通常被认为是军事战斗情况。在本文中,我们将一般的对抗代理问题表述为一个非线性整数规划问题,并展示了如何使用优化求解器为问题的实例生成策略,并举例说明了该方法。最后,我们讨论了这种公式对现实世界问题的有用性,特别是在验证启发式策略和规划算法和方法的系统建模和仿真中。
{"title":"Non-linear programming approach to simulation of the general adversarial agents problem","authors":"J. Mange, D. Kountanis","doi":"10.1109/MILCOM.2012.6415645","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415645","url":null,"abstract":"The adversarial agents problem is a generalized game-theoretic problem in which a set of agents faces a set of adversarial agents of varying types and capabilities, and must plan and perform actions to try to accomplish a specified goal; instances of this problem are often conceived as military combat situations. In this paper, we formulate the general adversarial agents problem as a non-linear integer programming problem, and show how an optimizing solver can be used to generate strategies for instances of the problem, with examples to illustrate the approach. Finally, we discuss the usefulness of such a formulation for real-world problems, particularly in system modeling and simulation for verification of heuristic strategy and planning algorithms and approaches.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"21 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82610640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Finding overlapped communities in online social networks with Nonnegative Matrix Factorization 用非负矩阵分解法寻找在线社交网络中的重叠社区
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415744
Nam P. Nguyen, M. Thai
In this work, we introduce two approaches, namely iSNMF and iANMF, for effectively identifying social communities using Nonnegative Matrix Factorization (NMF) with I-divergence as the cost function. Our approaches work by iteratively factorizing the nonnegative input matrix through derived multiplicative update rules. By doing so, we can not only extract meaningful overlapping communities via soft community assignments produced by NMF, but also nicely handle all directed and undirected networks with or without weights. To validate the performance of our approaches, we extensively conduct experiments on both synthesized networks and real-world datasets in comparison with other NMF methods. Experimental results show that iSNMF is among the best efficient detection methods on reciprocity networks while iANMF outperforms current available methods on directed networks, especially in terms of detection quality.
在这项工作中,我们引入了两种方法,即iSNMF和iANMF,以i -散度作为成本函数,使用非负矩阵分解(NMF)有效地识别社会群体。我们的方法是通过推导出的乘法更新规则对非负输入矩阵进行迭代分解。这样,我们不仅可以通过NMF产生的软社区分配提取有意义的重叠社区,而且可以很好地处理所有有权和无权网络。为了验证我们的方法的性能,我们在合成网络和真实世界的数据集上进行了广泛的实验,并与其他NMF方法进行了比较。实验结果表明,iSNMF在互易网络中是最有效的检测方法之一,而iANMF在有向网络中优于现有的检测方法,特别是在检测质量方面。
{"title":"Finding overlapped communities in online social networks with Nonnegative Matrix Factorization","authors":"Nam P. Nguyen, M. Thai","doi":"10.1109/MILCOM.2012.6415744","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415744","url":null,"abstract":"In this work, we introduce two approaches, namely iSNMF and iANMF, for effectively identifying social communities using Nonnegative Matrix Factorization (NMF) with I-divergence as the cost function. Our approaches work by iteratively factorizing the nonnegative input matrix through derived multiplicative update rules. By doing so, we can not only extract meaningful overlapping communities via soft community assignments produced by NMF, but also nicely handle all directed and undirected networks with or without weights. To validate the performance of our approaches, we extensively conduct experiments on both synthesized networks and real-world datasets in comparison with other NMF methods. Experimental results show that iSNMF is among the best efficient detection methods on reciprocity networks while iANMF outperforms current available methods on directed networks, especially in terms of detection quality.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80455023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
LAA: Link-layer anonymous access for tactical MANETs LAA:战术manet的链路层匿名访问
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415724
R. Song, Helen Tang
Link layer security has been widely researched in the last decade as a means of protecting wireless networks (e.g., WEP, RSN, WPA, WPA2). However, there is little research in this area for Mobile Ad Hoc Networks (MANETs), especially for tactical MANETs. Although RSN can be used for MANETs as described in the IEEE 802.11i standard, it fails to meet some requirements of tactical MANETs, such as strong security, anonymity, and quick connectivity. In this paper, we propose a link layer anonymous access protocol (LAA) in order to provide strong security and anonymity protection for tactical MANETs. The protocol uses dynamic pseudonyms as network and node identities for network access authentication to prevent tracking, tracing, and other common attacks. It uses a localized key management mechanism for local shared key and broadcast key establishment that outperforms the connectivity and efficiency of key management in RSN and other link layer security technologies such as SEAMAN. Simulations show that LAA has only a small effect on end-to-end delay and no effect on packet delivery ratio relative to the standard MAC, meanwhile providing anonymous communication, better protection and improved connectivity performance in the link layer for tactical MANETs.
链路层安全作为一种保护无线网络(如WEP、RSN、WPA、WPA2)的手段在过去十年中得到了广泛的研究。然而,对于移动自组网(manet),特别是战术自组网,这方面的研究很少。虽然RSN可以用于IEEE 802.11i标准中描述的manet,但它不能满足战术manet的一些要求,如强安全性、匿名性和快速连接。本文提出了一种链路层匿名访问协议(LAA),为战术manet提供强大的安全性和匿名性保护。该协议使用动态假名作为网络和节点的身份进行网络接入认证,防止跟踪、跟踪等常见攻击。它使用本地化的密钥管理机制建立本地共享密钥和广播密钥,优于RSN和其他链路层安全技术(如SEAMAN)中密钥管理的连通性和效率。仿真结果表明,与标准MAC相比,LAA对端到端延迟的影响很小,对分组发送率没有影响,同时为战术manet提供了匿名通信、更好的保护和更高的链路层连接性能。
{"title":"LAA: Link-layer anonymous access for tactical MANETs","authors":"R. Song, Helen Tang","doi":"10.1109/MILCOM.2012.6415724","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415724","url":null,"abstract":"Link layer security has been widely researched in the last decade as a means of protecting wireless networks (e.g., WEP, RSN, WPA, WPA2). However, there is little research in this area for Mobile Ad Hoc Networks (MANETs), especially for tactical MANETs. Although RSN can be used for MANETs as described in the IEEE 802.11i standard, it fails to meet some requirements of tactical MANETs, such as strong security, anonymity, and quick connectivity. In this paper, we propose a link layer anonymous access protocol (LAA) in order to provide strong security and anonymity protection for tactical MANETs. The protocol uses dynamic pseudonyms as network and node identities for network access authentication to prevent tracking, tracing, and other common attacks. It uses a localized key management mechanism for local shared key and broadcast key establishment that outperforms the connectivity and efficiency of key management in RSN and other link layer security technologies such as SEAMAN. Simulations show that LAA has only a small effect on end-to-end delay and no effect on packet delivery ratio relative to the standard MAC, meanwhile providing anonymous communication, better protection and improved connectivity performance in the link layer for tactical MANETs.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"23 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82581486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Pulse rotation modulations for spread spectrum communication systems 扩频通信系统的脉冲旋转调制
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415632
Alan J. Michaels
Spread spectrum communication systems excel in their ability to provide enhanced security and channel sharing, yet they do so at the expense of data throughput provided to each individual user. This paper introduces an alternative modulation mechanism, pulse rotation modulation (PRM), for increasing the data throughput in wideband direct sequence or chaotic sequence code-based spread spectrum systems. The result employs a temporal rotation of the spread pulse within its own symbol duration, leading to higher data throughputs that can be throttled up/down as the channel and multiple access conditions permit. Challenges with signal synchronization, code orthogonality, and carrier-induced phase rotations/phase noise are discussed. A predictive model of receiver performance is validated with simulated AWGN-channel results; both are based on extrapolations from a measured hardware prototype that has implemented a small scale example of the PRM technique.
扩频通信系统在提供增强的安全性和信道共享方面表现出色,但这样做是以牺牲提供给每个用户的数据吞吐量为代价的。本文介绍了一种替代调制机制——脉冲旋转调制(PRM),用于提高宽带直接序列或混沌序列码扩频系统的数据吞吐量。其结果是在其自身的符号持续时间内使用扩展脉冲的时间旋转,导致更高的数据吞吐量,可以在信道和多址条件允许的情况下上下调节。讨论了信号同步、编码正交性和载波引起的相位旋转/相位噪声等问题。用awgn信道仿真结果验证了接收机性能预测模型;两者都是基于一个已测量的硬件原型的外推,该原型已经实现了一个小规模的PRM技术示例。
{"title":"Pulse rotation modulations for spread spectrum communication systems","authors":"Alan J. Michaels","doi":"10.1109/MILCOM.2012.6415632","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415632","url":null,"abstract":"Spread spectrum communication systems excel in their ability to provide enhanced security and channel sharing, yet they do so at the expense of data throughput provided to each individual user. This paper introduces an alternative modulation mechanism, pulse rotation modulation (PRM), for increasing the data throughput in wideband direct sequence or chaotic sequence code-based spread spectrum systems. The result employs a temporal rotation of the spread pulse within its own symbol duration, leading to higher data throughputs that can be throttled up/down as the channel and multiple access conditions permit. Challenges with signal synchronization, code orthogonality, and carrier-induced phase rotations/phase noise are discussed. A predictive model of receiver performance is validated with simulated AWGN-channel results; both are based on extrapolations from a measured hardware prototype that has implemented a small scale example of the PRM technique.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"40 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89873977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non-satellite based field communications system for battlefield deployments 用于战场部署的非卫星野外通信系统
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415623
J. Cartmell, J. Tomici
Many wireless systems used by military ground personnel are satellite based. This paper explores a hybrid system that benefits from both satellite and terrestrial wireless technologies while overcoming the limitations of each. We present the architecture, describe the merits, and then explain the essence of the system: IP Flow mobility. After introducing this concept, we describe some of the important aspects that specifically relate to mobility and security.
军事地面人员使用的许多无线系统都是基于卫星的。本文探讨了一种从卫星和地面无线技术中受益的混合系统,同时克服了各自的局限性。首先介绍了该系统的架构,描述了其优点,然后解释了该系统的本质:IP流移动性。在介绍这个概念之后,我们将描述与移动性和安全性相关的一些重要方面。
{"title":"Non-satellite based field communications system for battlefield deployments","authors":"J. Cartmell, J. Tomici","doi":"10.1109/MILCOM.2012.6415623","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415623","url":null,"abstract":"Many wireless systems used by military ground personnel are satellite based. This paper explores a hybrid system that benefits from both satellite and terrestrial wireless technologies while overcoming the limitations of each. We present the architecture, describe the merits, and then explain the essence of the system: IP Flow mobility. After introducing this concept, we describe some of the important aspects that specifically relate to mobility and security.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"126 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90277719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy-efficient transmission scheme for monitoring of combat soldier health in tactical mobile ad hoc networks 战术移动自组织网络中作战士兵健康监测的节能传输方案
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415827
E. Egbogah, A. Fapojuwo, Liqi Shi
In this paper, we propose an energy-efficient transmission scheme for monitoring soldier health in tactical mobile ad hoc networks (T-MANET). In the proposed scheme, a constrained route discovery algorithm is used to determine feasible routing paths between the source nodes and sink node. A cross-layer optimization approach is then used to determine the optimal routes and minimum power required to transmit data in the military UHF band such that the end-to-end packet delivery ratio (PDR) and end-to-end delay objectives are met. However, the optimal solution requires exponential complexity and is not suitable for implementation in resource constrained sensor motes. Therefore, we propose a heuristic algorithm called joint link node power allocation (JPA) that allocates power based on the presence of joint link nodes. From the analysis and numerical results, we find that JPA achieves energy consumption that is within 24% of the optimal value, but significantly reduces the solution complexity from exponential to polynomial by utilizing 6 times fewer iterations than the optimal solution to converge to a minimum energy solution.
在本文中,我们提出了一种在战术移动自组织网络(T-MANET)中监测士兵健康的节能传输方案。该方案采用约束路由发现算法确定源节点和汇聚节点之间可行的路由路径。然后使用跨层优化方法来确定军用UHF频段传输数据所需的最佳路由和最小功率,从而满足端到端分组传输比(PDR)和端到端延迟目标。然而,最优解需要指数复杂度,不适合在资源受限的传感器模式下实现。因此,我们提出了一种启发式算法,称为联合链路节点功率分配(JPA),该算法基于联合链路节点的存在来分配功率。从分析和数值结果中,我们发现JPA实现的能耗在最优值的24%以内,但是通过使用比最优解决方案少6倍的迭代来收敛到最小能量解决方案,从而显着降低了解决方案的复杂性,从指数到多项式。
{"title":"An energy-efficient transmission scheme for monitoring of combat soldier health in tactical mobile ad hoc networks","authors":"E. Egbogah, A. Fapojuwo, Liqi Shi","doi":"10.1109/MILCOM.2012.6415827","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415827","url":null,"abstract":"In this paper, we propose an energy-efficient transmission scheme for monitoring soldier health in tactical mobile ad hoc networks (T-MANET). In the proposed scheme, a constrained route discovery algorithm is used to determine feasible routing paths between the source nodes and sink node. A cross-layer optimization approach is then used to determine the optimal routes and minimum power required to transmit data in the military UHF band such that the end-to-end packet delivery ratio (PDR) and end-to-end delay objectives are met. However, the optimal solution requires exponential complexity and is not suitable for implementation in resource constrained sensor motes. Therefore, we propose a heuristic algorithm called joint link node power allocation (JPA) that allocates power based on the presence of joint link nodes. From the analysis and numerical results, we find that JPA achieves energy consumption that is within 24% of the optimal value, but significantly reduces the solution complexity from exponential to polynomial by utilizing 6 times fewer iterations than the optimal solution to converge to a minimum energy solution.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"174 3","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91422718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Laboratory evaluation of military radios and network architectures 军用无线电和网络体系结构的实验室评估
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415662
S. Newman, Jeffrey Schindler, J. Shah, Sandra P. Tinta
As the ARMY prepares to deploy modern tactical networks in theater [1], there is an increasing need to ensure that radio systems will perform up to expectations before integrating them into emerging Army Capability Sets for Brigade tactical networks. Evaluating these radio systems before field deployments in a controlled laboratory setting provides a critical opportunity to establish baseline performance levels, as well as to identify and resolve design flaws and engineering bugs, long before they are encountered in the field. This paper discusses the role of the CERDEC S&TCD Radio Evaluation and Analysis Laboratory (REAL) in evaluating military radio networks, not only as black-box systems, but also as part of a larger tactical network consisting of a mix of radio systems. This testing has already become an important element of the Army's Agile Process, and has demonstrated its value many times over in preparing new technologies for operational experimentation in the Army's Network Integration Evaluations (NIE) taking place at Ft Bliss, TX.
随着陆军准备在战区部署现代战术网络[1],在将无线电系统集成到旅战术网络的新兴陆军能力集之前,确保其性能达到预期的需求日益增加。在受控的实验室环境中进行现场部署之前,对这些无线电系统进行评估,为建立基准性能水平以及识别和解决设计缺陷和工程缺陷提供了重要机会,早在现场遇到这些问题之前。本文讨论了CERDEC S&TCD无线电评估和分析实验室(REAL)在评估军事无线电网络中的作用,不仅作为黑箱系统,而且作为由无线电系统混合组成的更大战术网络的一部分。该测试已经成为陆军敏捷过程的重要组成部分,并在德克萨斯州布利斯堡进行的陆军网络集成评估(NIE)的操作实验中多次证明了其价值。
{"title":"Laboratory evaluation of military radios and network architectures","authors":"S. Newman, Jeffrey Schindler, J. Shah, Sandra P. Tinta","doi":"10.1109/MILCOM.2012.6415662","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415662","url":null,"abstract":"As the ARMY prepares to deploy modern tactical networks in theater [1], there is an increasing need to ensure that radio systems will perform up to expectations before integrating them into emerging Army Capability Sets for Brigade tactical networks. Evaluating these radio systems before field deployments in a controlled laboratory setting provides a critical opportunity to establish baseline performance levels, as well as to identify and resolve design flaws and engineering bugs, long before they are encountered in the field. This paper discusses the role of the CERDEC S&TCD Radio Evaluation and Analysis Laboratory (REAL) in evaluating military radio networks, not only as black-box systems, but also as part of a larger tactical network consisting of a mix of radio systems. This testing has already become an important element of the Army's Agile Process, and has demonstrated its value many times over in preparing new technologies for operational experimentation in the Army's Network Integration Evaluations (NIE) taking place at Ft Bliss, TX.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"48 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84804992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tactical troposcatter applications in challenging climate zones 战术对流层散射应用在具有挑战性的气候带
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415601
Luis Bastos, H. Wietgrefe
Transportable troposcatter terminals are a valid beyond line-of-sight (BLOS) transmission medium in support of NATO expeditionary operations. Troposcatter systems are able to provide augmentation capacity to SATCOM in support of forward-deployed military headquarters and a valid alternative to tandem line-of-sight systems. In more tactical scenarios, where capacity and reach requirements are less demanding, the ability to deploy low transmission delay wireless links is a critical capability to support secondary deployed locations. In this paper, the authors analyze the performance and military potential of short-range tactical transit case based troposcatter terminals in tactical scenarios typical of smaller deployed locations. The analysis is performed with a commercial implementation of a troposcatter system deployed to a realistic tactical scenario subject to challenging propagation conditions.
可移动对流层散射终端是一种有效的超视距(BLOS)传输介质,支持北约远征作战。对流层散射系统能够为SATCOM提供增强能力,以支持前沿部署的军事总部和串联视距系统的有效替代方案。在容量和到达要求不高的战术场景中,部署低传输延迟无线链路的能力是支持次要部署位置的关键能力。在本文中,作者分析了基于对流层散射终端的近程战术过境案例在较小部署地点典型战术场景中的性能和军事潜力。该分析是通过对流层散射系统的商业实现进行的,该系统部署到一个具有挑战性的传播条件的现实战术场景中。
{"title":"Tactical troposcatter applications in challenging climate zones","authors":"Luis Bastos, H. Wietgrefe","doi":"10.1109/MILCOM.2012.6415601","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415601","url":null,"abstract":"Transportable troposcatter terminals are a valid beyond line-of-sight (BLOS) transmission medium in support of NATO expeditionary operations. Troposcatter systems are able to provide augmentation capacity to SATCOM in support of forward-deployed military headquarters and a valid alternative to tandem line-of-sight systems. In more tactical scenarios, where capacity and reach requirements are less demanding, the ability to deploy low transmission delay wireless links is a critical capability to support secondary deployed locations. In this paper, the authors analyze the performance and military potential of short-range tactical transit case based troposcatter terminals in tactical scenarios typical of smaller deployed locations. The analysis is performed with a commercial implementation of a troposcatter system deployed to a realistic tactical scenario subject to challenging propagation conditions.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"4 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72982627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
High throughput Ku-band satellites for aeronautical applications 航空用高通量ku波段卫星
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415863
C. McLain, Sunil Panthi, M. Sturza, J. Hetrick
Recent advancements in Ku-band high throughput satellites (HTS) will allow commercial Ku-band aeronautical mobile satellite systems (AMSS) to equal or exceed commercial Ka-band AMSS systems on cost and performance. The AMSS market is currently dominated by Ku-band solutions, both in the commercial sector (eXConnect, Row44, Yonder) and the government sector (Tachyon, Boeing Broadband Satellite Network (formerly Connexion), various UAV and ISR systems). All of these systems use conventional continental-scale wide beams that are leased from Fixed Satellite Service (FSS) providers such as Intelsat and Eutelsat. In the next several years the dominance of Ku-band AMSS will be challenged by Ka-band systems such as Inmarsat-5, which use multiple spot beams to offer enhanced performance. Previous work has suggested that these systems may offer better performance and better economics than conventional Ku-band systems [1]. The key insight of this paper is that the performance advantage of spot beam Ka-band systems comes from their smaller beam size rather than their frequency of operation, meaning that a Ku-band spot beam satellite can also be built with similar sized spot beams to Ka-band systems and can achieve competitive cost and performance as compared to a Ka-band spot beam systems. High throughput spot beam Ku-band systems, such as Intelsat's EpicNG system, are now in development and will be fielded in the same timeframe as Inmarsat-5. This result has critical implications for existing users and operators of AMSS systems: - Currently installed Ku-band terminals will be able to take advantage of dramatic improvements in performance when high throughput Ku-band becomes available - Current Ku-band will not have to undergo costly Ka-band retrofits to maintain competitive performance - Operators can continue to invest in Ku-band terminals today without fear of obsolescence in the near future - The AMSS market will continue to be diverse and competitive for years to come.
ku波段高通量卫星(HTS)的最新进展将使商用ku波段航空移动卫星系统(AMSS)在成本和性能上等于或超过商用ka波段AMSS系统。AMSS市场目前由ku波段解决方案主导,包括商业部门(eXConnect、Row44、Yonder)和政府部门(Tachyon、波音宽带卫星网络(原Connexion)、各种无人机和ISR系统)。所有这些系统都使用从国际通信卫星组织(Intelsat)和欧洲通信卫星组织(Eutelsat)等固定卫星服务(FSS)提供商租用的传统大陆级宽波束。在接下来的几年里,ku波段AMSS的主导地位将受到ka波段系统的挑战,例如Inmarsat-5,它使用多个点波束来提供增强的性能。先前的工作表明,这些系统可能比传统的ku波段系统提供更好的性能和更好的经济效益。本文的关键观点是,点波束ka波段系统的性能优势来自于它们更小的波束尺寸,而不是它们的工作频率,这意味着ku波段点波束卫星也可以用与ka波段系统相似大小的点波束来建造,并且与ka波段点波束系统相比,可以实现具有竞争力的成本和性能。高通量点波束ku波段系统,如国际通信卫星组织的EpicNG系统,目前正在开发中,并将在与Inmarsat-5相同的时间框架内部署。这一结果对AMSS系统的现有用户和运营商具有重要意义:-当高吞吐量ku波段可用时,目前安装的ku波段终端将能够利用性能的显着改善-目前的ku波段无需进行昂贵的ka波段改造以保持具有竞争力的性能-运营商今天可以继续投资ku波段终端,而不必担心在不久的将来会过时- AMSS市场将在未来几年继续多样化和竞争。
{"title":"High throughput Ku-band satellites for aeronautical applications","authors":"C. McLain, Sunil Panthi, M. Sturza, J. Hetrick","doi":"10.1109/MILCOM.2012.6415863","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415863","url":null,"abstract":"Recent advancements in Ku-band high throughput satellites (HTS) will allow commercial Ku-band aeronautical mobile satellite systems (AMSS) to equal or exceed commercial Ka-band AMSS systems on cost and performance. The AMSS market is currently dominated by Ku-band solutions, both in the commercial sector (eXConnect, Row44, Yonder) and the government sector (Tachyon, Boeing Broadband Satellite Network (formerly Connexion), various UAV and ISR systems). All of these systems use conventional continental-scale wide beams that are leased from Fixed Satellite Service (FSS) providers such as Intelsat and Eutelsat. In the next several years the dominance of Ku-band AMSS will be challenged by Ka-band systems such as Inmarsat-5, which use multiple spot beams to offer enhanced performance. Previous work has suggested that these systems may offer better performance and better economics than conventional Ku-band systems [1]. The key insight of this paper is that the performance advantage of spot beam Ka-band systems comes from their smaller beam size rather than their frequency of operation, meaning that a Ku-band spot beam satellite can also be built with similar sized spot beams to Ka-band systems and can achieve competitive cost and performance as compared to a Ka-band spot beam systems. High throughput spot beam Ku-band systems, such as Intelsat's EpicNG system, are now in development and will be fielded in the same timeframe as Inmarsat-5. This result has critical implications for existing users and operators of AMSS systems: - Currently installed Ku-band terminals will be able to take advantage of dramatic improvements in performance when high throughput Ku-band becomes available - Current Ku-band will not have to undergo costly Ka-band retrofits to maintain competitive performance - Operators can continue to invest in Ku-band terminals today without fear of obsolescence in the near future - The AMSS market will continue to be diverse and competitive for years to come.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"36 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81081107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
MILCOM 2012 - 2012 IEEE Military Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1