首页 > 最新文献

MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)最新文献

英文 中文
Geometry-Informed Transmission Strength Scaling in Barrage Relay Networks 基于几何信息的弹幕中继网络传输强度缩放
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652995
B. Kraczek, Nicholas Woolsey
Barrage relay networks (BRNs) are a type of ad hoc wireless network with current and proposed uses in military, disaster response, industrial and vehicle-to-vehicle applications. BRNs are designed specifically to operate robustly without any information about the relative positions of other nodes on the network. The nodes in a specific connection within a BRN are determined by the formation of a controlled barrage region (CBR). There is a trade-off between reliability and node utilization or the number of nodes that are reserved for a single unicast link. In a previous paper, we investigated the suitability of BRNs for higher-density networks, which are anticipated with the explosion of network-connected devices. We showed that node utilization increases superlinearly with both node density and the distance between source and destination, calling into question the suitability of BRNs for use in high-density networks. In this paper we use a connected graph model to show that CBR formation algorithm generates a specific geometry in the limit of infinite node density. Applying this geometry to a more physically realistic random channel model (RCM) with finite node density, we propose tuning the model by scaling the transmission power of receivers. The transmit power is based on received signal strength during the sending of request to send (RTS) and clear to send (CTS) packets, used to determine the nodes used in the CBR. We show that in discrete event simulations this signal strength scaling can reduce the utilization while simultaneously improving the probability of CBR formation.
弹幕中继网络(brn)是一种自组织无线网络,目前和计划用于军事、灾难响应、工业和车对车应用。brn是专门设计用于鲁棒运行的,不需要任何关于网络上其他节点相对位置的信息。BRN内特定连接中的节点由控制弹幕区域(CBR)的形成决定。在可靠性和节点利用率或为单个单播链路保留的节点数量之间存在权衡。在之前的一篇论文中,我们研究了brn对高密度网络的适用性,这是随着网络连接设备的爆炸式增长而预期的。我们发现节点利用率随着节点密度和源与目标之间的距离呈超线性增长,这就对brn在高密度网络中的适用性提出了质疑。本文利用连通图模型证明了CBR生成算法在无限节点密度极限下生成一个特定的几何形状。将这种几何结构应用于具有有限节点密度的更现实的随机信道模型(RCM),我们建议通过缩放接收器的发射功率来调整模型。发送功率是基于发送请求发送(RTS)和清除发送(CTS)数据包时接收到的信号强度,用于确定在CBR中使用的节点。研究表明,在离散事件模拟中,这种信号强度缩放可以降低利用率,同时提高CBR形成的概率。
{"title":"Geometry-Informed Transmission Strength Scaling in Barrage Relay Networks","authors":"B. Kraczek, Nicholas Woolsey","doi":"10.1109/MILCOM52596.2021.9652995","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652995","url":null,"abstract":"Barrage relay networks (BRNs) are a type of ad hoc wireless network with current and proposed uses in military, disaster response, industrial and vehicle-to-vehicle applications. BRNs are designed specifically to operate robustly without any information about the relative positions of other nodes on the network. The nodes in a specific connection within a BRN are determined by the formation of a controlled barrage region (CBR). There is a trade-off between reliability and node utilization or the number of nodes that are reserved for a single unicast link. In a previous paper, we investigated the suitability of BRNs for higher-density networks, which are anticipated with the explosion of network-connected devices. We showed that node utilization increases superlinearly with both node density and the distance between source and destination, calling into question the suitability of BRNs for use in high-density networks. In this paper we use a connected graph model to show that CBR formation algorithm generates a specific geometry in the limit of infinite node density. Applying this geometry to a more physically realistic random channel model (RCM) with finite node density, we propose tuning the model by scaling the transmission power of receivers. The transmit power is based on received signal strength during the sending of request to send (RTS) and clear to send (CTS) packets, used to determine the nodes used in the CBR. We show that in discrete event simulations this signal strength scaling can reduce the utilization while simultaneously improving the probability of CBR formation.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127205334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Constrained Resource Allocation Problems in Communications: An Information-assisted Approach 通信中的受限资源分配问题:一种信息辅助方法
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652917
I. Ahmed, H. Sadjadpour, S. Yousefi
We consider a class of resource allocation problems given a set of unconditional constraints whose objective function satisfies Bellman's optimality principle. Such problems are ubiquitous in wireless communication, signal processing, and networking. These constrained combinatorial optimization problems are, in general, NP-Hard. This paper proposes two algorithms to solve this class of problems using a dynamic programming framework assisted by an information-theoretic measure. We demonstrate that the proposed algorithms ensure optimal solutions under carefully chosen conditions and use significantly reduced computational resources. We substantiate our claims by solving the power-constrained bit allocation problem in 5G massive Multiple-Input Multiple-Output receivers using the proposed approach.
考虑一类资源分配问题,给定一组无条件约束,其目标函数满足Bellman最优原则。这些问题在无线通信、信号处理和网络中无处不在。一般来说,这些约束组合优化问题是np困难的。本文提出了两种算法来解决这类问题,使用一个动态规划框架和一个信息论测度。我们证明,所提出的算法确保在精心选择的条件下的最优解,并使用显著减少的计算资源。我们通过使用所提出的方法解决5G大规模多输入多输出接收机中功率受限的位分配问题来证实我们的说法。
{"title":"Constrained Resource Allocation Problems in Communications: An Information-assisted Approach","authors":"I. Ahmed, H. Sadjadpour, S. Yousefi","doi":"10.1109/MILCOM52596.2021.9652917","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652917","url":null,"abstract":"We consider a class of resource allocation problems given a set of unconditional constraints whose objective function satisfies Bellman's optimality principle. Such problems are ubiquitous in wireless communication, signal processing, and networking. These constrained combinatorial optimization problems are, in general, NP-Hard. This paper proposes two algorithms to solve this class of problems using a dynamic programming framework assisted by an information-theoretic measure. We demonstrate that the proposed algorithms ensure optimal solutions under carefully chosen conditions and use significantly reduced computational resources. We substantiate our claims by solving the power-constrained bit allocation problem in 5G massive Multiple-Input Multiple-Output receivers using the proposed approach.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127351246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CloudImmu: Transparent Protection of Binary Applications in the Cloud CloudImmu:云中的二进制应用程序的透明保护
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653063
Xinyuan Wang
As more organizations are moving their IT infrastructures from on-premises to the cloud, cloud security breaches have just surpassed on-premises breaches. There is a pressing need to develop practical and deployable cyber defense capabilities to protect the enormous amount of potentially vulnerable binary applications in the cloud from previously unseen cyberattacks. In this paper, we present CloudImmu, a practical cloud cyber defense system that is built upon a novel combination of binary rewriting and instrumentation techniques, virtual machine introspection and hypervisor level anomaly detection techniques. Our immunization tool has successfully “immunized” large real world binary applications such as bash, Snort, and our experiments with real world exploits have shown that CloudImmu can detect and block cyberattacks on properly immunized, otherwise vulnerable binary applications in virtual machines in real-time without using any prior knowledge of the attacks. Our benchmark experiments show that CloudImmu incurs less than 1.06% overall run-time performance overhead on typical applications with typical workloads.
随着越来越多的组织将其IT基础设施从内部部署迁移到云,云安全漏洞已经超过了内部部署漏洞。迫切需要开发实用且可部署的网络防御能力,以保护云中大量潜在的易受攻击的二进制应用程序免受以前未见过的网络攻击。在本文中,我们介绍了CloudImmu,这是一个实用的云网络防御系统,它建立在二进制重写和仪器技术,虚拟机自省和管理程序级异常检测技术的新颖组合之上。我们的免疫工具已经成功地“免疫”了现实世界中的大型二进制应用程序,如bash、Snort,我们对现实世界中的漏洞利用进行的实验表明,CloudImmu可以在不使用任何攻击先验知识的情况下,实时检测并阻止对适当免疫的易受攻击的虚拟机中的二进制应用程序的网络攻击。我们的基准测试实验表明,在具有典型工作负载的典型应用程序上,CloudImmu产生的总体运行时性能开销不到1.06%。
{"title":"CloudImmu: Transparent Protection of Binary Applications in the Cloud","authors":"Xinyuan Wang","doi":"10.1109/MILCOM52596.2021.9653063","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653063","url":null,"abstract":"As more organizations are moving their IT infrastructures from on-premises to the cloud, cloud security breaches have just surpassed on-premises breaches. There is a pressing need to develop practical and deployable cyber defense capabilities to protect the enormous amount of potentially vulnerable binary applications in the cloud from previously unseen cyberattacks. In this paper, we present CloudImmu, a practical cloud cyber defense system that is built upon a novel combination of binary rewriting and instrumentation techniques, virtual machine introspection and hypervisor level anomaly detection techniques. Our immunization tool has successfully “immunized” large real world binary applications such as bash, Snort, and our experiments with real world exploits have shown that CloudImmu can detect and block cyberattacks on properly immunized, otherwise vulnerable binary applications in virtual machines in real-time without using any prior knowledge of the attacks. Our benchmark experiments show that CloudImmu incurs less than 1.06% overall run-time performance overhead on typical applications with typical workloads.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125561597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Rate FEC for $M$-ary Orthogonal Modulation 任意正交调制的低速率FEC
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653115
F. J. Block
The use of standard binary turbo codes has previously been shown to work well with noncoherent $M$-ary orthogonal modulation, particularly when used with iterative demodulation and decoding at the receiver. For channels with very low signal-to-noise ratios, the code rate may need to be reduced below those provided by typical turbo codes. Rather than designing additional lower rate turbo codes for these cases, repetition can be used. One possibility to incorporate repetition is to repeat individual $M$-ary orthogonal channel symbols, which can be noncoherently combined at the receiver. An alternative approach is to repeat and interleave code bits prior to mapping them to channel symbols. In this paper, this bit repetition approach, combined with a receiver utilizing an iterative demodulation and decoding technique in which the demodulator itself is also iterative, is shown to outperform symbol repetition.
标准二进制turbo码的使用已经被证明可以很好地与非相干的正交调制一起工作,特别是在接收机上与迭代解调和解码一起使用时。对于信噪比非常低的信道,码率可能需要降低到低于典型turbo码所提供的码率。而不是为这些情况设计额外的低速率涡轮码,可以使用重复。加入重复的一种可能性是重复单独的任意正交信道符号,这些符号可以在接收器上进行非相干组合。另一种方法是在将代码位映射到通道符号之前重复和交错代码位。在本文中,这种位重复方法与利用迭代解调和解码技术的接收器相结合,其中解调器本身也是迭代的,被证明优于符号重复。
{"title":"Low-Rate FEC for $M$-ary Orthogonal Modulation","authors":"F. J. Block","doi":"10.1109/MILCOM52596.2021.9653115","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653115","url":null,"abstract":"The use of standard binary turbo codes has previously been shown to work well with noncoherent $M$-ary orthogonal modulation, particularly when used with iterative demodulation and decoding at the receiver. For channels with very low signal-to-noise ratios, the code rate may need to be reduced below those provided by typical turbo codes. Rather than designing additional lower rate turbo codes for these cases, repetition can be used. One possibility to incorporate repetition is to repeat individual $M$-ary orthogonal channel symbols, which can be noncoherently combined at the receiver. An alternative approach is to repeat and interleave code bits prior to mapping them to channel symbols. In this paper, this bit repetition approach, combined with a receiver utilizing an iterative demodulation and decoding technique in which the demodulator itself is also iterative, is shown to outperform symbol repetition.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116528169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covert Communications under Multiple-Antenna Eavesdropping without Channel State Information 无信道状态信息的多天线窃听下的秘密通信
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652954
Yuchen Zhang, Sa Xiao, Jianquan Wang, Xiaojun Yuan, Wanbin Tang
In this paper, we investigate covert communications under multiple-antenna eavesdropping, and explore the impact of the channel state information (CSI) at the adversary on the covertness of the system with noise uncertainty. We first analyze the detection performance of the adversary without the CSI of the eavesdropping channel. Specially, the generalized likelihood ratio (GLR) detection is adopted to handle this scenario. Then, a more practical scenario with the uncertain noise power at the adversary is considered, and the covertness of the system is analyzed. In addition, the optimal transmit power at the legitimate transmitter is derived theoretically to maximize the covert throughput. Finally, we present numerical results to compare the covert throughputs when the adversary knows or doesn't know the CSI. The results demonstrate the significance of unknown CSI at the adversary when considering the covert throughput of the system.
本文研究了多天线窃听下的隐蔽通信,探讨了敌方信道状态信息(CSI)对具有噪声不确定性的系统隐蔽性的影响。我们首先分析了在没有窃听信道CSI的情况下对手的检测性能。特别地,采用广义似然比(GLR)检测来处理这种情况。然后,考虑了敌方噪声功率不确定的实际情况,分析了系统的隐蔽性。此外,从理论上推导了合法发射机的最佳发射功率,以使隐蔽吞吐量最大化。最后,我们给出了数值结果来比较攻击者知道或不知道CSI时的隐蔽吞吐量。当考虑系统的隐蔽吞吐量时,结果表明未知CSI对对手的重要性。
{"title":"Covert Communications under Multiple-Antenna Eavesdropping without Channel State Information","authors":"Yuchen Zhang, Sa Xiao, Jianquan Wang, Xiaojun Yuan, Wanbin Tang","doi":"10.1109/MILCOM52596.2021.9652954","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652954","url":null,"abstract":"In this paper, we investigate covert communications under multiple-antenna eavesdropping, and explore the impact of the channel state information (CSI) at the adversary on the covertness of the system with noise uncertainty. We first analyze the detection performance of the adversary without the CSI of the eavesdropping channel. Specially, the generalized likelihood ratio (GLR) detection is adopted to handle this scenario. Then, a more practical scenario with the uncertain noise power at the adversary is considered, and the covertness of the system is analyzed. In addition, the optimal transmit power at the legitimate transmitter is derived theoretically to maximize the covert throughput. Finally, we present numerical results to compare the covert throughputs when the adversary knows or doesn't know the CSI. The results demonstrate the significance of unknown CSI at the adversary when considering the covert throughput of the system.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122704781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications DerechoDDS:关键任务应用的强一致性数据分布
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653032
Lorenzo Rosa, Weijia Song, L. Foschini, Antonio Corradi, K. Birman
Mission-critical applications frequently rely on communication middleware products, enabling ease of deployment, component integration, and proven dependability. However, existing communication middleware options present limitations such as weak consistency guarantees, reflecting concerns about overheads for strong forms of assurance. The hardware landscape is now evolving: hardware-based kernel bypass technologies like Remote Direct Memory Access (RDMA) offer faster communication with near-perfect reliability. This paper introduces DerechoDDS, an implementation of the OMG Data Distribution Service (DDS) layered over Derecho, an open-source library embodying a new approach to atomic multicast that maps efficiently to RDMA (or TCP emulations of RDMA). We first describe how DerechoDDS maps the standard DDS API on the Derecho library to achieve a zero-copy data path among remote entities. Then, we propose a novel QoS policy to control the level of consistency for data distribution. We demonstrate that DerechoDDS offers comparable or substantially higher performance than today's major DDS implementations, while simultaneously strengthening guarantees. Even when configured for strong consistency, DerechoDDS achieves high performance.
关键任务应用程序经常依赖于通信中间件产品,从而实现易于部署、组件集成和可靠的可靠性。然而,现有的通信中间件选项存在局限性,例如弱一致性保证,反映了对强形式保证的开销的关注。硬件领域正在不断发展:基于硬件的内核旁路技术,如远程直接内存访问(RDMA),提供了近乎完美的可靠性和更快的通信速度。本文介绍了DerechoDDS,它是OMG数据分发服务(DDS)在Derecho之上的一种实现,Derecho是一个开源库,体现了一种新的原子多播方法,可以有效地映射到RDMA(或RDMA的TCP模拟)。我们首先描述了DerechoDDS如何在Derecho库上映射标准DDS API,以实现远程实体之间的零复制数据路径。然后,我们提出了一种新的QoS策略来控制数据分布的一致性水平。我们证明了DerechoDDS提供了与当今主要DDS实现相当或实质上更高的性能,同时加强了保证。即使配置为强一致性,DerechoDDS也能实现高性能。
{"title":"DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications","authors":"Lorenzo Rosa, Weijia Song, L. Foschini, Antonio Corradi, K. Birman","doi":"10.1109/MILCOM52596.2021.9653032","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653032","url":null,"abstract":"Mission-critical applications frequently rely on communication middleware products, enabling ease of deployment, component integration, and proven dependability. However, existing communication middleware options present limitations such as weak consistency guarantees, reflecting concerns about overheads for strong forms of assurance. The hardware landscape is now evolving: hardware-based kernel bypass technologies like Remote Direct Memory Access (RDMA) offer faster communication with near-perfect reliability. This paper introduces DerechoDDS, an implementation of the OMG Data Distribution Service (DDS) layered over Derecho, an open-source library embodying a new approach to atomic multicast that maps efficiently to RDMA (or TCP emulations of RDMA). We first describe how DerechoDDS maps the standard DDS API on the Derecho library to achieve a zero-copy data path among remote entities. Then, we propose a novel QoS policy to control the level of consistency for data distribution. We demonstrate that DerechoDDS offers comparable or substantially higher performance than today's major DDS implementations, while simultaneously strengthening guarantees. Even when configured for strong consistency, DerechoDDS achieves high performance.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114587380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Channel Cooperative Broadcast for Narrowband Tactical Networks 窄带战术网多信道协同广播
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653059
Arwid Komulainen, Jimmi Grönkvist, U. Sterner
Effective command and control on the battlefield requires robust communications. Using multi-hop communications based on synchronized cooperative broadcast (SCB) has previously been proposed as a means to increase range, robustness and efficiency for tactical ad hoc networks. In this paper, multi-channel extensions of SCB are proposed for increasing the network throughput of a narrowband frequency hopping waveform. The proposed algorithms make use of side bands of the primary channel and the effects of out-of-band interference on the proposed algorithms are analyzed. The evaluation shows how the use of neighboring channels can improve the efficiency of a narrowband data waveform. It is shown that the algorithms using two channels can work despite severe levels of out-of-band interference. Algorithms using three channels, which has twice the throughput of the most robust single channel configuration, is more sensitive to out-of-band interference and requires larger frequency separation between the channels.
战场上有效的指挥和控制需要强大的通信。基于同步协同广播(SCB)的多跳通信是战术自组网中提高通信距离、鲁棒性和效率的一种手段。为了提高窄带跳频波形的网络吞吐量,本文提出了SCB的多通道扩展。所提出的算法利用了主信道的边带,并分析了带外干扰对所提出算法的影响。结果表明,利用相邻信道可以提高窄带数据波形的效率。结果表明,尽管存在严重的带外干扰,使用两个信道的算法仍能正常工作。使用三通道的算法,其吞吐量是最鲁棒的单通道配置的两倍,对带外干扰更敏感,并且通道之间需要更大的频率间隔。
{"title":"Multi-Channel Cooperative Broadcast for Narrowband Tactical Networks","authors":"Arwid Komulainen, Jimmi Grönkvist, U. Sterner","doi":"10.1109/MILCOM52596.2021.9653059","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653059","url":null,"abstract":"Effective command and control on the battlefield requires robust communications. Using multi-hop communications based on synchronized cooperative broadcast (SCB) has previously been proposed as a means to increase range, robustness and efficiency for tactical ad hoc networks. In this paper, multi-channel extensions of SCB are proposed for increasing the network throughput of a narrowband frequency hopping waveform. The proposed algorithms make use of side bands of the primary channel and the effects of out-of-band interference on the proposed algorithms are analyzed. The evaluation shows how the use of neighboring channels can improve the efficiency of a narrowband data waveform. It is shown that the algorithms using two channels can work despite severe levels of out-of-band interference. Algorithms using three channels, which has twice the throughput of the most robust single channel configuration, is more sensitive to out-of-band interference and requires larger frequency separation between the channels.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129950140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spark Optimization of Linear Codes for Reliable Data Delivery by Relay Drones 中继无人机可靠数据传输线性代码的火花优化
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653053
Ioannis Chatzigeorgiou
Data gathering operations in remote locations often rely on relay drones, which collect, store and deliver transmitted information to a ground control station. The probability of the ground control station successfully reconstructing the gathered data can be increased if random linear coding (RLC) is used, especially when feedback channels between the drones and the transmitter are not available. RLC decoding can be complemented by partial packet recovery (PPR), which utilizes sparse recovery principles to repair erroneously received data before RLC decoding takes place. We explain that the spark of the transpose of the parity-check matrix of the linear code, that is, the smallest number of linearly-dependent columns of the matrix, influences the effectiveness of PPR. We formulate a spark optimization problem and obtain code designs that achieve a gain over PPR-assisted RLC, in terms of the probability that the ground control station will decode the delivered data.
偏远地区的数据收集操作通常依赖于中继无人机,它们收集、存储并将传输的信息传递给地面控制站。采用随机线性编码(RLC)可以提高地面控制站成功重建采集数据的概率,特别是当无人机和发射机之间的反馈信道不可用时。RLC解码可以通过部分包恢复(PPR)来补充,它利用稀疏恢复原理在RLC解码发生之前修复错误接收的数据。我们解释了线性码的奇偶校验矩阵的转置的火花,即矩阵中线性相关列的最小个数,会影响PPR的有效性。我们制定了一个火花优化问题,并获得了在地面控制站解码传输数据的概率方面优于ppr辅助RLC的代码设计。
{"title":"Spark Optimization of Linear Codes for Reliable Data Delivery by Relay Drones","authors":"Ioannis Chatzigeorgiou","doi":"10.1109/MILCOM52596.2021.9653053","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653053","url":null,"abstract":"Data gathering operations in remote locations often rely on relay drones, which collect, store and deliver transmitted information to a ground control station. The probability of the ground control station successfully reconstructing the gathered data can be increased if random linear coding (RLC) is used, especially when feedback channels between the drones and the transmitter are not available. RLC decoding can be complemented by partial packet recovery (PPR), which utilizes sparse recovery principles to repair erroneously received data before RLC decoding takes place. We explain that the spark of the transpose of the parity-check matrix of the linear code, that is, the smallest number of linearly-dependent columns of the matrix, influences the effectiveness of PPR. We formulate a spark optimization problem and obtain code designs that achieve a gain over PPR-assisted RLC, in terms of the probability that the ground control station will decode the delivered data.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128699317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels 无线信道时变多径分量聚类算法研究
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653014
Guiqi Sun, Chen Huang, Zihang Cheng, R. He, B. Ai, A. Molisch
Extensive channel measurements have shown that multipath components (MPCs) generally exist as clusters, and cluster-based channel models are therefore widely used for system design and assessment. Since the dynamic behavior, i.e., the time evolution, of the channels plays an important role for many applications, an accurate algorithm for the clustering of time-varying MPCs is required; a variety of algorithms have been proposed, yet little attention has been given to a fair comparison of their relative advantages and drawbacks. In this paper, we review and investigate the typical clustering methods for MPCs in wireless channels. Three popular classes of algorithms, namely distance-based (K-Power-Means), density-based (K-power-density), and evolution-based clustering methods, are analyzed and compared based on both synthetic and measured channel data. The F-measure is used to quantify and evaluate the clustering performance of the three algorithms, and also investigate their performance when only static snapshots of the channel are available. From the comparison, the evolution-based clustering method shows great potential to address the dynamic clustering problem for wireless time-varying channels.
广泛的通道测量表明,多路径组件(mpc)通常以集群的形式存在,因此基于集群的通道模型被广泛用于系统设计和评估。由于信道的动态行为(即时间演化)在许多应用中起着重要作用,因此需要一种精确的时变mpc聚类算法;各种各样的算法已经被提出,但很少有人注意到他们的相对优点和缺点的公平比较。本文综述和研究了无线信道中MPCs的典型聚类方法。本文对基于距离的聚类算法(K-Power-Means)、基于密度的聚类算法(K-power-density)和基于进化的聚类算法进行了分析和比较。f度量用于量化和评估这三种算法的聚类性能,并研究它们在只有通道静态快照可用时的性能。通过比较,基于进化的聚类方法在解决无线时变信道的动态聚类问题上显示出很大的潜力。
{"title":"A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels","authors":"Guiqi Sun, Chen Huang, Zihang Cheng, R. He, B. Ai, A. Molisch","doi":"10.1109/MILCOM52596.2021.9653014","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653014","url":null,"abstract":"Extensive channel measurements have shown that multipath components (MPCs) generally exist as clusters, and cluster-based channel models are therefore widely used for system design and assessment. Since the dynamic behavior, i.e., the time evolution, of the channels plays an important role for many applications, an accurate algorithm for the clustering of time-varying MPCs is required; a variety of algorithms have been proposed, yet little attention has been given to a fair comparison of their relative advantages and drawbacks. In this paper, we review and investigate the typical clustering methods for MPCs in wireless channels. Three popular classes of algorithms, namely distance-based (K-Power-Means), density-based (K-power-density), and evolution-based clustering methods, are analyzed and compared based on both synthetic and measured channel data. The F-measure is used to quantify and evaluate the clustering performance of the three algorithms, and also investigate their performance when only static snapshots of the channel are available. From the comparison, the evolution-based clustering method shows great potential to address the dynamic clustering problem for wireless time-varying channels.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124581904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hiding the RF Signal Signature in Tactical 5G 隐藏战术5G射频信号特征
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652968
G. Elmasry, P. Corwin
Many security enhancements need to be considered in order to leverage 5G technologies for tactical networks. One important security area is the RF signal signature itself. Tactical communication waveforms rely on Transmission Security (TRANSEC) techniques in order to combat the impact of the enemy's eavesdropping and jamming capabilities. Adapting 5G for tactical communications may consider TRANSEC enhancements to include frequency hopping, orthogonality hopping, beamforming and other techniques to make the 5G RF signal have Low Probability of Detection (LPD) and Low Probability of Intercept (LPI) characteristics. This paper focuses on an approach for making it more difficult for an adversary to locate a 5G transmitting node: utilizing the 5G Multiple-Input-Multiple-output (MIMO) antenna to effectively randomize the RF signal footprint where only the Transmit/Receive (Tx/Rx) node pairs can synchronize to this randomization, thus making it harder for the enemy to make sense of the 5G RF signal.
为了将5G技术用于战术网络,需要考虑许多安全增强措施。一个重要的安全领域是射频信号签名本身。战术通信波形依赖于传输安全(TRANSEC)技术,以对抗敌人窃听和干扰能力的影响。适应5G战术通信可以考虑TRANSEC增强,包括跳频、正交跳频、波束成形等技术,使5G射频信号具有低探测概率(LPD)和低截获概率(LPI)特征。本文重点研究了一种使对手更难以定位5G发射节点的方法:利用5G多输入多输出(MIMO)天线有效地随机化RF信号足迹,其中只有发送/接收(Tx/Rx)节点对可以同步到这种随机化,从而使敌人更难理解5G RF信号。
{"title":"Hiding the RF Signal Signature in Tactical 5G","authors":"G. Elmasry, P. Corwin","doi":"10.1109/MILCOM52596.2021.9652968","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652968","url":null,"abstract":"Many security enhancements need to be considered in order to leverage 5G technologies for tactical networks. One important security area is the RF signal signature itself. Tactical communication waveforms rely on Transmission Security (TRANSEC) techniques in order to combat the impact of the enemy's eavesdropping and jamming capabilities. Adapting 5G for tactical communications may consider TRANSEC enhancements to include frequency hopping, orthogonality hopping, beamforming and other techniques to make the 5G RF signal have Low Probability of Detection (LPD) and Low Probability of Intercept (LPI) characteristics. This paper focuses on an approach for making it more difficult for an adversary to locate a 5G transmitting node: utilizing the 5G Multiple-Input-Multiple-output (MIMO) antenna to effectively randomize the RF signal footprint where only the Transmit/Receive (Tx/Rx) node pairs can synchronize to this randomization, thus making it harder for the enemy to make sense of the 5G RF signal.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129696830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1