首页 > 最新文献

MILCOM 2012 - 2012 IEEE Military Communications Conference最新文献

英文 中文
Non-linear programming approach to simulation of the general adversarial agents problem 用非线性规划方法模拟一般对抗代理问题
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415645
J. Mange, D. Kountanis
The adversarial agents problem is a generalized game-theoretic problem in which a set of agents faces a set of adversarial agents of varying types and capabilities, and must plan and perform actions to try to accomplish a specified goal; instances of this problem are often conceived as military combat situations. In this paper, we formulate the general adversarial agents problem as a non-linear integer programming problem, and show how an optimizing solver can be used to generate strategies for instances of the problem, with examples to illustrate the approach. Finally, we discuss the usefulness of such a formulation for real-world problems, particularly in system modeling and simulation for verification of heuristic strategy and planning algorithms and approaches.
对抗代理问题是一个广义的博弈论问题,其中一组代理面对一组不同类型和能力的对抗代理,并且必须计划和执行行动以试图完成指定的目标;这个问题的实例通常被认为是军事战斗情况。在本文中,我们将一般的对抗代理问题表述为一个非线性整数规划问题,并展示了如何使用优化求解器为问题的实例生成策略,并举例说明了该方法。最后,我们讨论了这种公式对现实世界问题的有用性,特别是在验证启发式策略和规划算法和方法的系统建模和仿真中。
{"title":"Non-linear programming approach to simulation of the general adversarial agents problem","authors":"J. Mange, D. Kountanis","doi":"10.1109/MILCOM.2012.6415645","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415645","url":null,"abstract":"The adversarial agents problem is a generalized game-theoretic problem in which a set of agents faces a set of adversarial agents of varying types and capabilities, and must plan and perform actions to try to accomplish a specified goal; instances of this problem are often conceived as military combat situations. In this paper, we formulate the general adversarial agents problem as a non-linear integer programming problem, and show how an optimizing solver can be used to generate strategies for instances of the problem, with examples to illustrate the approach. Finally, we discuss the usefulness of such a formulation for real-world problems, particularly in system modeling and simulation for verification of heuristic strategy and planning algorithms and approaches.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"21 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82610640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
LAA: Link-layer anonymous access for tactical MANETs LAA:战术manet的链路层匿名访问
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415724
R. Song, Helen Tang
Link layer security has been widely researched in the last decade as a means of protecting wireless networks (e.g., WEP, RSN, WPA, WPA2). However, there is little research in this area for Mobile Ad Hoc Networks (MANETs), especially for tactical MANETs. Although RSN can be used for MANETs as described in the IEEE 802.11i standard, it fails to meet some requirements of tactical MANETs, such as strong security, anonymity, and quick connectivity. In this paper, we propose a link layer anonymous access protocol (LAA) in order to provide strong security and anonymity protection for tactical MANETs. The protocol uses dynamic pseudonyms as network and node identities for network access authentication to prevent tracking, tracing, and other common attacks. It uses a localized key management mechanism for local shared key and broadcast key establishment that outperforms the connectivity and efficiency of key management in RSN and other link layer security technologies such as SEAMAN. Simulations show that LAA has only a small effect on end-to-end delay and no effect on packet delivery ratio relative to the standard MAC, meanwhile providing anonymous communication, better protection and improved connectivity performance in the link layer for tactical MANETs.
链路层安全作为一种保护无线网络(如WEP、RSN、WPA、WPA2)的手段在过去十年中得到了广泛的研究。然而,对于移动自组网(manet),特别是战术自组网,这方面的研究很少。虽然RSN可以用于IEEE 802.11i标准中描述的manet,但它不能满足战术manet的一些要求,如强安全性、匿名性和快速连接。本文提出了一种链路层匿名访问协议(LAA),为战术manet提供强大的安全性和匿名性保护。该协议使用动态假名作为网络和节点的身份进行网络接入认证,防止跟踪、跟踪等常见攻击。它使用本地化的密钥管理机制建立本地共享密钥和广播密钥,优于RSN和其他链路层安全技术(如SEAMAN)中密钥管理的连通性和效率。仿真结果表明,与标准MAC相比,LAA对端到端延迟的影响很小,对分组发送率没有影响,同时为战术manet提供了匿名通信、更好的保护和更高的链路层连接性能。
{"title":"LAA: Link-layer anonymous access for tactical MANETs","authors":"R. Song, Helen Tang","doi":"10.1109/MILCOM.2012.6415724","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415724","url":null,"abstract":"Link layer security has been widely researched in the last decade as a means of protecting wireless networks (e.g., WEP, RSN, WPA, WPA2). However, there is little research in this area for Mobile Ad Hoc Networks (MANETs), especially for tactical MANETs. Although RSN can be used for MANETs as described in the IEEE 802.11i standard, it fails to meet some requirements of tactical MANETs, such as strong security, anonymity, and quick connectivity. In this paper, we propose a link layer anonymous access protocol (LAA) in order to provide strong security and anonymity protection for tactical MANETs. The protocol uses dynamic pseudonyms as network and node identities for network access authentication to prevent tracking, tracing, and other common attacks. It uses a localized key management mechanism for local shared key and broadcast key establishment that outperforms the connectivity and efficiency of key management in RSN and other link layer security technologies such as SEAMAN. Simulations show that LAA has only a small effect on end-to-end delay and no effect on packet delivery ratio relative to the standard MAC, meanwhile providing anonymous communication, better protection and improved connectivity performance in the link layer for tactical MANETs.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"23 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82581486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Non-satellite based field communications system for battlefield deployments 用于战场部署的非卫星野外通信系统
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415623
J. Cartmell, J. Tomici
Many wireless systems used by military ground personnel are satellite based. This paper explores a hybrid system that benefits from both satellite and terrestrial wireless technologies while overcoming the limitations of each. We present the architecture, describe the merits, and then explain the essence of the system: IP Flow mobility. After introducing this concept, we describe some of the important aspects that specifically relate to mobility and security.
军事地面人员使用的许多无线系统都是基于卫星的。本文探讨了一种从卫星和地面无线技术中受益的混合系统,同时克服了各自的局限性。首先介绍了该系统的架构,描述了其优点,然后解释了该系统的本质:IP流移动性。在介绍这个概念之后,我们将描述与移动性和安全性相关的一些重要方面。
{"title":"Non-satellite based field communications system for battlefield deployments","authors":"J. Cartmell, J. Tomici","doi":"10.1109/MILCOM.2012.6415623","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415623","url":null,"abstract":"Many wireless systems used by military ground personnel are satellite based. This paper explores a hybrid system that benefits from both satellite and terrestrial wireless technologies while overcoming the limitations of each. We present the architecture, describe the merits, and then explain the essence of the system: IP Flow mobility. After introducing this concept, we describe some of the important aspects that specifically relate to mobility and security.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"126 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90277719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pulse rotation modulations for spread spectrum communication systems 扩频通信系统的脉冲旋转调制
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415632
Alan J. Michaels
Spread spectrum communication systems excel in their ability to provide enhanced security and channel sharing, yet they do so at the expense of data throughput provided to each individual user. This paper introduces an alternative modulation mechanism, pulse rotation modulation (PRM), for increasing the data throughput in wideband direct sequence or chaotic sequence code-based spread spectrum systems. The result employs a temporal rotation of the spread pulse within its own symbol duration, leading to higher data throughputs that can be throttled up/down as the channel and multiple access conditions permit. Challenges with signal synchronization, code orthogonality, and carrier-induced phase rotations/phase noise are discussed. A predictive model of receiver performance is validated with simulated AWGN-channel results; both are based on extrapolations from a measured hardware prototype that has implemented a small scale example of the PRM technique.
扩频通信系统在提供增强的安全性和信道共享方面表现出色,但这样做是以牺牲提供给每个用户的数据吞吐量为代价的。本文介绍了一种替代调制机制——脉冲旋转调制(PRM),用于提高宽带直接序列或混沌序列码扩频系统的数据吞吐量。其结果是在其自身的符号持续时间内使用扩展脉冲的时间旋转,导致更高的数据吞吐量,可以在信道和多址条件允许的情况下上下调节。讨论了信号同步、编码正交性和载波引起的相位旋转/相位噪声等问题。用awgn信道仿真结果验证了接收机性能预测模型;两者都是基于一个已测量的硬件原型的外推,该原型已经实现了一个小规模的PRM技术示例。
{"title":"Pulse rotation modulations for spread spectrum communication systems","authors":"Alan J. Michaels","doi":"10.1109/MILCOM.2012.6415632","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415632","url":null,"abstract":"Spread spectrum communication systems excel in their ability to provide enhanced security and channel sharing, yet they do so at the expense of data throughput provided to each individual user. This paper introduces an alternative modulation mechanism, pulse rotation modulation (PRM), for increasing the data throughput in wideband direct sequence or chaotic sequence code-based spread spectrum systems. The result employs a temporal rotation of the spread pulse within its own symbol duration, leading to higher data throughputs that can be throttled up/down as the channel and multiple access conditions permit. Challenges with signal synchronization, code orthogonality, and carrier-induced phase rotations/phase noise are discussed. A predictive model of receiver performance is validated with simulated AWGN-channel results; both are based on extrapolations from a measured hardware prototype that has implemented a small scale example of the PRM technique.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"40 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89873977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Laboratory evaluation of military radios and network architectures 军用无线电和网络体系结构的实验室评估
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415662
S. Newman, Jeffrey Schindler, J. Shah, Sandra P. Tinta
As the ARMY prepares to deploy modern tactical networks in theater [1], there is an increasing need to ensure that radio systems will perform up to expectations before integrating them into emerging Army Capability Sets for Brigade tactical networks. Evaluating these radio systems before field deployments in a controlled laboratory setting provides a critical opportunity to establish baseline performance levels, as well as to identify and resolve design flaws and engineering bugs, long before they are encountered in the field. This paper discusses the role of the CERDEC S&TCD Radio Evaluation and Analysis Laboratory (REAL) in evaluating military radio networks, not only as black-box systems, but also as part of a larger tactical network consisting of a mix of radio systems. This testing has already become an important element of the Army's Agile Process, and has demonstrated its value many times over in preparing new technologies for operational experimentation in the Army's Network Integration Evaluations (NIE) taking place at Ft Bliss, TX.
随着陆军准备在战区部署现代战术网络[1],在将无线电系统集成到旅战术网络的新兴陆军能力集之前,确保其性能达到预期的需求日益增加。在受控的实验室环境中进行现场部署之前,对这些无线电系统进行评估,为建立基准性能水平以及识别和解决设计缺陷和工程缺陷提供了重要机会,早在现场遇到这些问题之前。本文讨论了CERDEC S&TCD无线电评估和分析实验室(REAL)在评估军事无线电网络中的作用,不仅作为黑箱系统,而且作为由无线电系统混合组成的更大战术网络的一部分。该测试已经成为陆军敏捷过程的重要组成部分,并在德克萨斯州布利斯堡进行的陆军网络集成评估(NIE)的操作实验中多次证明了其价值。
{"title":"Laboratory evaluation of military radios and network architectures","authors":"S. Newman, Jeffrey Schindler, J. Shah, Sandra P. Tinta","doi":"10.1109/MILCOM.2012.6415662","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415662","url":null,"abstract":"As the ARMY prepares to deploy modern tactical networks in theater [1], there is an increasing need to ensure that radio systems will perform up to expectations before integrating them into emerging Army Capability Sets for Brigade tactical networks. Evaluating these radio systems before field deployments in a controlled laboratory setting provides a critical opportunity to establish baseline performance levels, as well as to identify and resolve design flaws and engineering bugs, long before they are encountered in the field. This paper discusses the role of the CERDEC S&TCD Radio Evaluation and Analysis Laboratory (REAL) in evaluating military radio networks, not only as black-box systems, but also as part of a larger tactical network consisting of a mix of radio systems. This testing has already become an important element of the Army's Agile Process, and has demonstrated its value many times over in preparing new technologies for operational experimentation in the Army's Network Integration Evaluations (NIE) taking place at Ft Bliss, TX.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"48 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84804992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Elastic multicast for tactical communications 战术通信的弹性多播
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415824
C. Danilov, T. Henderson, O. Brewer, J. H. Kim, J. Macker, B. Adamson
This paper presents a multicast routing mechanism supporting the classical IP multicast service model that can dynamically use redundant forwarding in the parts of the network affected by a high rate of topology changes, while converging to regular multicast distribution trees where or when the network becomes relatively stable. The rationale is that intermittent connectivity directly affects the ability of routers to synchronize on their view of the network, thus making it difficult to converge on efficient distribution trees, while network wide broadcast may be prohibitively expensive for relatively sparse groups. We describe a hybrid approach, called Elastic Multicast, which dynamically expands to limited scope broadcast when needed, and converges single path forwarding if the network is stable, through independent routing decisions made at each node.
本文提出了一种支持经典IP组播业务模型的组播路由机制,该机制可以在网络中受拓扑变化率高的部分动态地使用冗余转发,同时在网络相对稳定时收敛到规则的组播分布树。其基本原理是,间歇性连接直接影响路由器在其网络视图上同步的能力,从而使其难以收敛于有效的分布树,而网络范围的广播对于相对稀疏的组来说可能过于昂贵。我们描述了一种称为弹性组播的混合方法,它在需要时动态扩展到有限范围的广播,并且在网络稳定时收敛单路径转发,通过在每个节点上做出独立的路由决策。
{"title":"Elastic multicast for tactical communications","authors":"C. Danilov, T. Henderson, O. Brewer, J. H. Kim, J. Macker, B. Adamson","doi":"10.1109/MILCOM.2012.6415824","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415824","url":null,"abstract":"This paper presents a multicast routing mechanism supporting the classical IP multicast service model that can dynamically use redundant forwarding in the parts of the network affected by a high rate of topology changes, while converging to regular multicast distribution trees where or when the network becomes relatively stable. The rationale is that intermittent connectivity directly affects the ability of routers to synchronize on their view of the network, thus making it difficult to converge on efficient distribution trees, while network wide broadcast may be prohibitively expensive for relatively sparse groups. We describe a hybrid approach, called Elastic Multicast, which dynamically expands to limited scope broadcast when needed, and converges single path forwarding if the network is stable, through independent routing decisions made at each node.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"12 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84090064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Online learning in decentralized multi-user spectrum access with synchronized explorations 同步探索的分散多用户频谱访问中的在线学习
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415693
Cem Tekin, M. Liu
In this paper we consider decentralized multi-user online learning of unused spectrum bands as an opportunistic spectrum access (OSA) problem. There is a set of M secondary users exploiting the spectrum opportunities in K channels. We develop a distributed algorithm for the secondary users that will learn the optimal allocation with logarithmic regret. Thus, our algorithm achieves the fastest convergence rate to the optimal allocation. In a more general framework, our algorithm gives an order optimal solution to the decentralized multi-player multi-armed bandit problem with general reward functions.
本文将未使用频段的分散多用户在线学习作为机会频谱接入(OSA)问题来考虑。有一组M个二级用户利用K个频道的频谱机会。我们为次要用户开发了一种分布式算法,该算法将学习具有对数遗憾的最优分配。因此,我们的算法对最优分配的收敛速度最快。在更一般的框架下,我们的算法给出了具有一般奖励函数的分散多人多手强盗问题的有序最优解。
{"title":"Online learning in decentralized multi-user spectrum access with synchronized explorations","authors":"Cem Tekin, M. Liu","doi":"10.1109/MILCOM.2012.6415693","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415693","url":null,"abstract":"In this paper we consider decentralized multi-user online learning of unused spectrum bands as an opportunistic spectrum access (OSA) problem. There is a set of M secondary users exploiting the spectrum opportunities in K channels. We develop a distributed algorithm for the secondary users that will learn the optimal allocation with logarithmic regret. Thus, our algorithm achieves the fastest convergence rate to the optimal allocation. In a more general framework, our algorithm gives an order optimal solution to the decentralized multi-player multi-armed bandit problem with general reward functions.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"79 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83798067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Performance of Combatant Command satellite (COCOMSat) communications in contested environments 战斗指挥卫星(COCOMSat)在竞争环境中的通信性能
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415768
K. Y. Jo, D. M. Cascio
This paper presents satellite loading methodologies for loading satellite communications (SATCOM) requirements on commercial Ka-band satellites in contested environments experiencing jamming. Future high-capacity Ka-band commercial satellites will rely on ground concentration nodes (GCNs) and adaptive coding and modulation (ACM) techniques to provide digital video broadcasting/return channel via satellite (DVB/RCS) services for forward and return links to achieve high throughput. Traffic flows between user beams are coordinated through GCNs thus requiring double hops for peer-to-peer traffic while reachback traffic requires single hops relying on terrestrial networks. Cell-like user beams are assembled in arrays designed to enhance user coverage and supportability. Optimal satellite loading in the presence of uplink jamming is derived to minimize satellite and terminals powers and to maximize the supported data rates. Throughput degradation in contested environments results when the transponders begin to operate in a non-linear mode approaching saturation.
本文提出了一种卫星加载方法,用于在遇到干扰的竞争环境中对商用ka波段卫星加载卫星通信(SATCOM)需求。未来的高容量ka波段商业卫星将依靠地面集中节点(GCNs)和自适应编码和调制(ACM)技术,通过卫星(DVB/RCS)服务为转发和返回链路提供数字视频广播/返回信道,以实现高吞吐量。用户波束之间的流量通过GCNs进行协调,因此点对点流量需要双跳,而回传流量需要依赖地面网络的单跳。类似蜂窝的用户波束被组装成阵列,旨在增强用户覆盖和可支持性。在存在上行链路干扰的情况下,导出了以最小化卫星和终端功率和最大化支持的数据速率为目标的最优卫星负载。当应答器开始以接近饱和的非线性模式工作时,在竞争环境中会导致吞吐量下降。
{"title":"Performance of Combatant Command satellite (COCOMSat) communications in contested environments","authors":"K. Y. Jo, D. M. Cascio","doi":"10.1109/MILCOM.2012.6415768","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415768","url":null,"abstract":"This paper presents satellite loading methodologies for loading satellite communications (SATCOM) requirements on commercial Ka-band satellites in contested environments experiencing jamming. Future high-capacity Ka-band commercial satellites will rely on ground concentration nodes (GCNs) and adaptive coding and modulation (ACM) techniques to provide digital video broadcasting/return channel via satellite (DVB/RCS) services for forward and return links to achieve high throughput. Traffic flows between user beams are coordinated through GCNs thus requiring double hops for peer-to-peer traffic while reachback traffic requires single hops relying on terrestrial networks. Cell-like user beams are assembled in arrays designed to enhance user coverage and supportability. Optimal satellite loading in the presence of uplink jamming is derived to minimize satellite and terminals powers and to maximize the supported data rates. Throughput degradation in contested environments results when the transponders begin to operate in a non-linear mode approaching saturation.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"55 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83810626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Polite: A policy framework for building managed mobile apps 礼貌:构建托管移动应用程序的政策框架
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415731
U. Kumar, Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor
The proliferation of smart phones inside enterprises and the number of enterprise apps (applications) available for various smart phone platforms has been increasing. This trend is expected to continue as smart phones tend to become the device of choice to access both enterprise and personal data. Making enterprise sensitive data accessible on smart phones requires that adequate protection mechanisms be available on these devices to ensure that sensitive data is not compromised due to various reasons, such as employees losing phones to malicious apps (installed by the user) running on the phones. Most of the existing solutions either provide device level control or have an external agent monitoring the application's behavior, and has numerous limitations. In this paper we propose a framework, Polite, to build enterprise mobile apps that can be managed at run-time, which is less intrusive to the end user while providing stronger security guarantees to the enterprise. We describe several critical scenarios where controlling the run time behavior of apps on the phone is essential and how our architecture can provide security guarantees that are not possible with existing solutions. Performance results of our implementation indicate that our framework induces a minimal overhead of only 6% that may be acceptable for most enterprise mobile apps.
智能手机在企业内部的普及以及各种智能手机平台上可用的企业应用程序(应用程序)的数量一直在增加。随着智能手机逐渐成为访问企业和个人数据的首选设备,这一趋势预计将继续下去。在智能手机上访问企业敏感数据需要在这些设备上提供足够的保护机制,以确保敏感数据不会因为各种原因而泄露,例如员工的手机被手机上运行的恶意应用程序(由用户安装)丢失。大多数现有的解决方案要么提供设备级控制,要么有一个外部代理监视应用程序的行为,并且有许多限制。在本文中,我们提出了一个框架,Polite,来构建可以在运行时管理的企业移动应用程序,它对最终用户的干扰较小,同时为企业提供更强的安全保证。我们描述了几个关键场景,其中在手机上控制应用程序的运行时行为是必不可少的,以及我们的架构如何提供现有解决方案无法实现的安全保证。我们实现的性能结果表明,我们的框架产生的最小开销只有6%,这对于大多数企业移动应用程序来说是可以接受的。
{"title":"Polite: A policy framework for building managed mobile apps","authors":"U. Kumar, Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor","doi":"10.1109/MILCOM.2012.6415731","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415731","url":null,"abstract":"The proliferation of smart phones inside enterprises and the number of enterprise apps (applications) available for various smart phone platforms has been increasing. This trend is expected to continue as smart phones tend to become the device of choice to access both enterprise and personal data. Making enterprise sensitive data accessible on smart phones requires that adequate protection mechanisms be available on these devices to ensure that sensitive data is not compromised due to various reasons, such as employees losing phones to malicious apps (installed by the user) running on the phones. Most of the existing solutions either provide device level control or have an external agent monitoring the application's behavior, and has numerous limitations. In this paper we propose a framework, Polite, to build enterprise mobile apps that can be managed at run-time, which is less intrusive to the end user while providing stronger security guarantees to the enterprise. We describe several critical scenarios where controlling the run time behavior of apps on the phone is essential and how our architecture can provide security guarantees that are not possible with existing solutions. Performance results of our implementation indicate that our framework induces a minimal overhead of only 6% that may be acceptable for most enterprise mobile apps.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"2013 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86468890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Channel characterization and throughput tradeoff for wireless sensor networks 无线传感器网络的信道特性和吞吐量权衡
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415681
Leonard E. Lightfoot, Ellen Laubie
With the growing number of wireless network standards operating in the unlicensed frequency band and the military moving toward commercial off the shelf technology, the next generation of wireless sensor networks must be robust against unintentional and hostile interference. One method that has gained interest to cope with the increased spectrum use and to combat the interference vulnerability in wireless sensor networks is frequency agile communication. These techniques typically entail spectrum sensing and dynamic frequency channel allocation. In this paper, the energy detection mechanism is used to investigate how the number of frequency channels characterized for spectrum sensing impacts the accuracy of frequency channel selection and how the number of channels characterized affects the achievable throughput. From the investigation, we observed a tradeoff between the number of channels characterized, the number of energy samples used in energy detection, and the achievable throughput.
随着越来越多的无线网络标准在未经许可的频段上运行,以及军事向商用现成技术的发展,下一代无线传感器网络必须能够抵御无意和敌对干扰。频率敏捷通信是解决无线传感器网络中频谱使用增加和干扰脆弱性的一种方法。这些技术通常需要频谱感知和动态信道分配。本文利用能量检测机制研究频谱感知表征的信道数量如何影响频率通道选择的准确性,以及表征的信道数量如何影响可实现的吞吐量。从调查中,我们观察到表征通道数量,能量检测中使用的能量样本数量和可实现的吞吐量之间的权衡。
{"title":"Channel characterization and throughput tradeoff for wireless sensor networks","authors":"Leonard E. Lightfoot, Ellen Laubie","doi":"10.1109/MILCOM.2012.6415681","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415681","url":null,"abstract":"With the growing number of wireless network standards operating in the unlicensed frequency band and the military moving toward commercial off the shelf technology, the next generation of wireless sensor networks must be robust against unintentional and hostile interference. One method that has gained interest to cope with the increased spectrum use and to combat the interference vulnerability in wireless sensor networks is frequency agile communication. These techniques typically entail spectrum sensing and dynamic frequency channel allocation. In this paper, the energy detection mechanism is used to investigate how the number of frequency channels characterized for spectrum sensing impacts the accuracy of frequency channel selection and how the number of channels characterized affects the achievable throughput. From the investigation, we observed a tradeoff between the number of channels characterized, the number of energy samples used in energy detection, and the achievable throughput.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"11 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86293507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
MILCOM 2012 - 2012 IEEE Military Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1