首页 > 最新文献

MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)最新文献

英文 中文
vCDS: A Virtualized Cross Domain Solution Architecture vCDS:虚拟化跨域解决方案架构
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652903
Nathan Daughety, Marcus Pendleton, Shouhuai Xu, L. Njilla, John Franco
With the paradigm shift to cloud-based operations, reliable and secure access to and transfer of data between differing security domains has never been more essential. A Cross Domain Solution (CDS) is a guarded interface which serves to execute the secure access and/or transfer of data between isolated and/or differing security domains defined by an administrative security policy. Cross domain security requires trustworthiness at the confluence of the hardware and software components which implement a security policy. Security components must be relied upon to defend against widely encompassing threats – consider insider threats and nation state threat actors which can be both onsite and offsite threat actors – to information assurance. Current implementations of CDS systems use suboptimal Trusted Computing Bases (TCB) without any formal verification proofs, confirming the gap between blind trust and trustworthiness. Moreover, most CDSs are exclusively operated by Department of Defense agencies and are not readily available to the commercial sectors, nor are they available for independent security verification. Still, more CDSs are only usable in physically isolated environments such as Sensitive Compartmented Information Facilities and are inconsistent with the paradigm shift to cloud environments. Our purpose is to address the question of how trustworthiness can be implemented in a remotely deployable CDS that also supports availability and accessibility to all sectors. In this paper, we present a novel CDS system architecture which is the first to use a formally verified TCB. Additionally, our CDS model is the first of its kind to utilize a computation-isolation approach which allows our CDS to be remotely deployable for use in cloud-based solutions.
随着模式向基于云的操作转变,在不同安全域之间可靠和安全的访问和传输数据从未像现在这样重要。跨域解决方案(CDS)是一个受保护的接口,用于在管理安全策略定义的隔离和/或不同的安全域之间执行安全访问和/或传输数据。跨域安全要求在实现安全策略的硬件和软件组件的汇合处具有可信度。必须依靠安全组件来抵御广泛的威胁——考虑内部威胁和民族国家威胁行为者,这些威胁行为者可能是现场和场外的威胁行为者——以及信息保障。当前CDS系统的实现使用的是次优可信计算基础(TCB),没有任何正式的验证证明,从而证实了盲目信任与可信赖性之间的差距。此外,大多数信用违约互换是由国防部机构独家操作的,商业部门不容易获得,也无法进行独立的安全核查。然而,更多的cds只能在物理隔离的环境中使用,例如敏感分隔信息设施,并且与向云环境的范式转移不一致。我们的目的是解决如何在支持所有部门可用性和可访问性的远程部署CDS中实现可信度的问题。在本文中,我们提出了一个新的CDS系统架构,这是第一个使用正式验证的TCB。此外,我们的CDS模型是同类中第一个利用计算隔离方法的模型,这使得我们的CDS可以远程部署,用于基于云的解决方案。
{"title":"vCDS: A Virtualized Cross Domain Solution Architecture","authors":"Nathan Daughety, Marcus Pendleton, Shouhuai Xu, L. Njilla, John Franco","doi":"10.1109/MILCOM52596.2021.9652903","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652903","url":null,"abstract":"With the paradigm shift to cloud-based operations, reliable and secure access to and transfer of data between differing security domains has never been more essential. A Cross Domain Solution (CDS) is a guarded interface which serves to execute the secure access and/or transfer of data between isolated and/or differing security domains defined by an administrative security policy. Cross domain security requires trustworthiness at the confluence of the hardware and software components which implement a security policy. Security components must be relied upon to defend against widely encompassing threats – consider insider threats and nation state threat actors which can be both onsite and offsite threat actors – to information assurance. Current implementations of CDS systems use suboptimal Trusted Computing Bases (TCB) without any formal verification proofs, confirming the gap between blind trust and trustworthiness. Moreover, most CDSs are exclusively operated by Department of Defense agencies and are not readily available to the commercial sectors, nor are they available for independent security verification. Still, more CDSs are only usable in physically isolated environments such as Sensitive Compartmented Information Facilities and are inconsistent with the paradigm shift to cloud environments. Our purpose is to address the question of how trustworthiness can be implemented in a remotely deployable CDS that also supports availability and accessibility to all sectors. In this paper, we present a novel CDS system architecture which is the first to use a formally verified TCB. Additionally, our CDS model is the first of its kind to utilize a computation-isolation approach which allows our CDS to be remotely deployable for use in cloud-based solutions.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"308 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123227318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conditional Rician $K$-Factor Discrimination for Indoor Localization via AOA Estimation 基于AOA估计的室内定位条件医师K因子判别
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653091
D. L. Hall, D. Jenkins
This paper proposes conditioning angle of arrival (AOA) algorithms for pseudo-spectrum fingerprint acquisition based on line of sight (LOS) and non-LOS detection schema for optimizing indoor localization. The proposed approach merges two AOA based methods being that of the MUltiple Signal Classsification (MUSIC) algorithm and virtual MUSIC algorithm into a conditional based localization approach with a uniform circular array (UCA). The paper begins by demonstrating the environmental dependencies of the two AOA approaches based on the Rician $K$-factor metric. The $K$-factor is then exploited as an algorithm selection metric to arrive at improved localization performance in a realistic indoor environment.
提出了基于视距(LOS)和非视距(non-LOS)检测模式的伪光谱指纹采集调节到达角(AOA)算法,用于优化室内定位。该方法将两种基于AOA的多信号分类(MUSIC)算法和虚拟MUSIC算法合并为基于条件的均匀圆阵列(UCA)定位方法。本文首先展示了基于医师K因子度量的两种AOA方法的环境依赖性。然后利用K因子作为算法选择度量,在真实的室内环境中达到改进的定位性能。
{"title":"Conditional Rician $K$-Factor Discrimination for Indoor Localization via AOA Estimation","authors":"D. L. Hall, D. Jenkins","doi":"10.1109/MILCOM52596.2021.9653091","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653091","url":null,"abstract":"This paper proposes conditioning angle of arrival (AOA) algorithms for pseudo-spectrum fingerprint acquisition based on line of sight (LOS) and non-LOS detection schema for optimizing indoor localization. The proposed approach merges two AOA based methods being that of the MUltiple Signal Classsification (MUSIC) algorithm and virtual MUSIC algorithm into a conditional based localization approach with a uniform circular array (UCA). The paper begins by demonstrating the environmental dependencies of the two AOA approaches based on the Rician $K$-factor metric. The $K$-factor is then exploited as an algorithm selection metric to arrive at improved localization performance in a realistic indoor environment.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121613099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Plug-n-Play in Named Data Networking 在命名数据网络中启用即插即用
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653033
Tianyuan Yu, Philipp Moll, Zhiyi Zhang, A. Afanasyev, Lixia Zhang
“Plug-and-play” is a highly desired property in networking, which enables new entities to be plugged into a networked system following a systematic, and automated if possible, process to start playing, i.e. sending and receiving packets. In IP networks, DHCP services provide the plug function to enable an IP host to play. In this paper we discuss the plug step in an NDN network, articulate the fundamental differences in NDN's plug step as compared to that of IP, and describe our initial designs for plugging new entities into an NDN network in three different use case scenarios. These design exercises show that NDN's plug process requires mutual authentication between the configurer and the configuree (the entity to be plugged in), which is context specific and represents a major challenge in the plug process. We addressed this challenge by making use of existing authentication systems.
“即插即用”是网络中非常需要的属性,它使新实体能够按照系统的、如果可能的话自动化的过程插入网络系统,即发送和接收数据包。在IP网络中,DHCP服务提供插拔功能,使IP主机能够正常使用。在本文中,我们讨论了NDN网络中的插入步骤,阐明了NDN的插入步骤与IP的基本区别,并描述了我们在三种不同用例场景中将新实体插入NDN网络的初步设计。这些设计实践表明,NDN的插入过程需要配置者和被配置者(要插入的实体)之间的相互认证,这是特定于环境的,是插入过程中的一个主要挑战。我们通过利用现有的身份验证系统来解决这个问题。
{"title":"Enabling Plug-n-Play in Named Data Networking","authors":"Tianyuan Yu, Philipp Moll, Zhiyi Zhang, A. Afanasyev, Lixia Zhang","doi":"10.1109/MILCOM52596.2021.9653033","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653033","url":null,"abstract":"“Plug-and-play” is a highly desired property in networking, which enables new entities to be plugged into a networked system following a systematic, and automated if possible, process to start playing, i.e. sending and receiving packets. In IP networks, DHCP services provide the plug function to enable an IP host to play. In this paper we discuss the plug step in an NDN network, articulate the fundamental differences in NDN's plug step as compared to that of IP, and describe our initial designs for plugging new entities into an NDN network in three different use case scenarios. These design exercises show that NDN's plug process requires mutual authentication between the configurer and the configuree (the entity to be plugged in), which is context specific and represents a major challenge in the plug process. We addressed this challenge by making use of existing authentication systems.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"37 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132359527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IEEE MILCOM 2021 Welcome Letter IEEE MILCOM 2021欢迎信
Pub Date : 2021-11-29 DOI: 10.1109/milcom52596.2021.9652994
{"title":"IEEE MILCOM 2021 Welcome Letter","authors":"","doi":"10.1109/milcom52596.2021.9652994","DOIUrl":"https://doi.org/10.1109/milcom52596.2021.9652994","url":null,"abstract":"","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133883053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technical Program Chairs 技术项目主席
Pub Date : 2021-11-29 DOI: 10.1109/milcom52596.2021.9652999
Xianfeng Zhao, Hyoung Joon Kim
The 21st IEEE International NEWCAS Conference will be held in Edinburgh, Scotland, on June 26 – 28, 2023. The program of the conference will be tailored to reflect the wide spectrum of topics and research interest shared among the organizing entities. This collaboration will be oriented towards advanced research in adaptive systems which constitutes the highlights of the NEWCAS conference, but also areas related to analog and digital signal processing, low power consumption, circuits and systems designs.
第21届IEEE国际NEWCAS会议将于2023年6月26日至28日在苏格兰爱丁堡举行。会议的计划将被调整,以反映组织实体之间共享的广泛主题和研究兴趣。这次合作将面向自适应系统的先进研究,这是NEWCAS会议的亮点,也是与模拟和数字信号处理、低功耗、电路和系统设计相关的领域。
{"title":"Technical Program Chairs","authors":"Xianfeng Zhao, Hyoung Joon Kim","doi":"10.1109/milcom52596.2021.9652999","DOIUrl":"https://doi.org/10.1109/milcom52596.2021.9652999","url":null,"abstract":"The 21st IEEE International NEWCAS Conference will be held in Edinburgh, Scotland, on June 26 – 28, 2023. The program of the conference will be tailored to reflect the wide spectrum of topics and research interest shared among the organizing entities. This collaboration will be oriented towards advanced research in adaptive systems which constitutes the highlights of the NEWCAS conference, but also areas related to analog and digital signal processing, low power consumption, circuits and systems designs.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129372167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synchronization Steps for Low Complexity Chirp Spread Spectrum (CSS) Receivers 低复杂度啁啾扩频(CSS)接收机的同步步骤
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652971
Xiaofei Chen, E. Venosa, F. Harris
The chirp spread spectrum (CSS) has gained much attention over the recent years due to its wide adoption in low power wide area network technologies (LPWANs). It is one of the promising physical layer (PHY) options for fulfilling long range and low data rate communication that occur in many of today's Internet of Things (IoT) devices, i.e., LORA and etc. This paper discusses the low complexity and low power implementation of a CSS modem from synchronization perspectives. We address the CSS receiver architecture with consideration to its unique synchronization steps under low Signal to Noise Ratio (SNR) environment.
近年来,啁啾扩频(CSS)由于在低功耗广域网(lpwan)技术中的广泛应用而受到了广泛的关注。它是实现当今许多物联网(IoT)设备(即LORA等)中长距离和低数据速率通信的有前途的物理层(PHY)选项之一。本文从同步的角度讨论了CSS调制解调器的低复杂度和低功耗实现。考虑到CSS接收器在低信噪比(SNR)环境下的独特同步步骤,我们解决了CSS接收器架构。
{"title":"Synchronization Steps for Low Complexity Chirp Spread Spectrum (CSS) Receivers","authors":"Xiaofei Chen, E. Venosa, F. Harris","doi":"10.1109/MILCOM52596.2021.9652971","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652971","url":null,"abstract":"The chirp spread spectrum (CSS) has gained much attention over the recent years due to its wide adoption in low power wide area network technologies (LPWANs). It is one of the promising physical layer (PHY) options for fulfilling long range and low data rate communication that occur in many of today's Internet of Things (IoT) devices, i.e., LORA and etc. This paper discusses the low complexity and low power implementation of a CSS modem from synchronization perspectives. We address the CSS receiver architecture with consideration to its unique synchronization steps under low Signal to Noise Ratio (SNR) environment.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"58 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132865038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unifying Address and Name Based Communication in Wireless Medium Access Control 无线介质访问控制中基于地址和名称的统一通信
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652896
Mohammed Elbadry, F. Ye, Peter Milder
Edge nodes deployed in edge environments (e.g., IoT) have two common use cases: i) access control and ii) disseminating data. An address based paradigm is suitable for sending access control commands to specific nodes, yet a name based one excels at filtering and disseminating data based on content regardless of who has the data. Current address based communication mandates grouping among nodes (e.g., using BSSID), incurring high overheads (e.g., periodic beacons); whereas name based discovery is much more efficient and flexible. However, the name based paradigm needs many assets possessed in the address based paradigm (e.g., frame rate adaptation). Such complementary strengths and needs call for unification of both paradigms to meet current edge environment needs. In this paper, we introduce a unified medium access control design that combines both paradigms. Our unified design eliminates the need for grouping in address based communication by a name based discovery protocol, enabling filtering based on address or data attributes. It leverages address based unicast rate adaptation to benefit name based communication through Our experiments show the system's ability to discover neighbor addresses based on application attributes, and filter thousands of both name and address based entries efficiently. It reduces latency of name based communication by 30X, and loss rate from 10-20% to 0% through address based rate adaptation algorithm with reliability.
部署在边缘环境(例如物联网)中的边缘节点有两个常见用例:i)访问控制和ii)传播数据。基于地址的范例适合于向特定节点发送访问控制命令,而基于名称的范例擅长于根据内容过滤和传播数据,而不管谁拥有数据。当前基于地址的通信要求在节点之间进行分组(例如,使用BSSID),导致高开销(例如,周期性信标);而基于名称的发现则更加高效和灵活。然而,基于名称的范式需要在基于地址的范式中拥有的许多资产(例如,帧率适应)。这种互补的优势和需求需要两种范式的统一,以满足当前边缘环境的需求。在本文中,我们介绍了一种结合这两种范式的统一的媒体访问控制设计。我们的统一设计消除了通过基于名称的发现协议对基于地址的通信进行分组的需要,从而实现了基于地址或数据属性的过滤。我们的实验表明,系统能够根据应用程序属性发现邻居地址,并有效地过滤数以千计的基于名称和地址的条目。通过可靠的基于地址的速率自适应算法,将基于名称的通信延迟降低30倍,将损失率从10-20%降低到0%。
{"title":"Unifying Address and Name Based Communication in Wireless Medium Access Control","authors":"Mohammed Elbadry, F. Ye, Peter Milder","doi":"10.1109/MILCOM52596.2021.9652896","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652896","url":null,"abstract":"Edge nodes deployed in edge environments (e.g., IoT) have two common use cases: i) access control and ii) disseminating data. An address based paradigm is suitable for sending access control commands to specific nodes, yet a name based one excels at filtering and disseminating data based on content regardless of who has the data. Current address based communication mandates grouping among nodes (e.g., using BSSID), incurring high overheads (e.g., periodic beacons); whereas name based discovery is much more efficient and flexible. However, the name based paradigm needs many assets possessed in the address based paradigm (e.g., frame rate adaptation). Such complementary strengths and needs call for unification of both paradigms to meet current edge environment needs. In this paper, we introduce a unified medium access control design that combines both paradigms. Our unified design eliminates the need for grouping in address based communication by a name based discovery protocol, enabling filtering based on address or data attributes. It leverages address based unicast rate adaptation to benefit name based communication through Our experiments show the system's ability to discover neighbor addresses based on application attributes, and filter thousands of both name and address based entries efficiently. It reduces latency of name based communication by 30X, and loss rate from 10-20% to 0% through address based rate adaptation algorithm with reliability.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Feasibility of Detecting Software Supply Chain Attacks 软件供应链攻击检测的可行性研究
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652901
Xinyuan Wang
The Supply chain attack is the stealthy and sophisticated cyberattack that aims to compromise a target by exploiting weaknesses and vulnerabilities in its supply chain. Recent supply chain attacks (e.g., SolarWinds attack) have compromised some of the most secured IT infrastructures of government agencies and enterprises. The European Union Agency for Cybersecurity, ENISA, has predicted that there will be 3 times more supply chain attacks in 2021 than in 2020. In this paper, we look into the problem of supply chain attacks, the challenges of defending software supply chain attacks. We analyze what it takes to effectively prevent software supply chain attacks, and show that it is indeed feasible and practical for the customers to detect certain software supply chain attacks. We propose an information flow based detection approach that enables end users to detect many software supply chain attacks without dealing with any of the underlying software suppliers.
供应链攻击是一种隐秘而复杂的网络攻击,旨在利用目标供应链中的弱点和漏洞来破坏目标。最近的供应链攻击(例如SolarWinds攻击)已经破坏了政府机构和企业的一些最安全的IT基础设施。欧盟网络安全机构(ENISA)预测,2021年的供应链攻击将是2020年的3倍。本文研究了供应链攻击问题,以及防御软件供应链攻击所面临的挑战。我们分析了如何有效地预防软件供应链攻击,并表明客户检测某些软件供应链攻击确实是可行和实用的。我们提出了一种基于信息流的检测方法,使最终用户能够检测许多软件供应链攻击,而无需处理任何底层软件供应商。
{"title":"On the Feasibility of Detecting Software Supply Chain Attacks","authors":"Xinyuan Wang","doi":"10.1109/MILCOM52596.2021.9652901","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652901","url":null,"abstract":"The Supply chain attack is the stealthy and sophisticated cyberattack that aims to compromise a target by exploiting weaknesses and vulnerabilities in its supply chain. Recent supply chain attacks (e.g., SolarWinds attack) have compromised some of the most secured IT infrastructures of government agencies and enterprises. The European Union Agency for Cybersecurity, ENISA, has predicted that there will be 3 times more supply chain attacks in 2021 than in 2020. In this paper, we look into the problem of supply chain attacks, the challenges of defending software supply chain attacks. We analyze what it takes to effectively prevent software supply chain attacks, and show that it is indeed feasible and practical for the customers to detect certain software supply chain attacks. We propose an information flow based detection approach that enables end users to detect many software supply chain attacks without dealing with any of the underlying software suppliers.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133353466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery 无线网络拓扑控制:可调弹性和网络流量交付
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653017
J. Macker, Caleb Bowers, S. Kompella, C. Kam, Jeffery W. Weston
We consider the problem of wireless topology control with adjustable k-resilience and we evaluate related unicast and multicast network traffic delivery statistics across a series of initial simulation experiments. Our main goal is to examine design tradeoffs between resilient topology control, transmission power requirements, and resultant network throughput characteristics. We also present newly developed extensions to the network simulator, NS3, supporting multicast traffic experimentation. Our results for the random geometric networks studied demonstrate that moderate levels of $k$-resilience result in improvements in unicast traffic delivery while managing the growth of transmission power requirements across the network. These same trends were also observed for multicast experiments with connected dominating set (CDS) based forwarding, but traffic delivery did not improve for higher $k$ connectivities in the case of basic multicast flooding. Overall, we conclude that topology control edge connectivity resilience adds significant traffic delivery improvements in addition to providing other benefits, but the additional cost for establishing topological resiliency needs to be carefully considered against other defined system constraints. To address transmit power increases associated with resiliency and to improve traffic capacity in lower $k$ network topologies, further research is planned in applying network directivity components and multi-channel network architectures to the problem space.
我们考虑了具有可调k弹性的无线拓扑控制问题,并通过一系列初始仿真实验评估了相关的单播和多播网络流量交付统计数据。我们的主要目标是检查弹性拓扑控制、传输功率要求和由此产生的网络吞吐量特性之间的设计权衡。我们还介绍了新开发的网络模拟器NS3的扩展,支持多播流量实验。我们对随机几何网络的研究结果表明,适度的k弹性水平可以改善单播流量交付,同时管理整个网络中传输功率需求的增长。在基于连接支配集(CDS)转发的组播实验中也观察到这些相同的趋势,但是在基本组播泛滥的情况下,更高的$k$连接并没有改善流量交付。总的来说,我们得出结论,拓扑控制边缘连接弹性除了提供其他好处外,还增加了显著的流量交付改进,但是建立拓扑弹性的额外成本需要根据其他已定义的系统约束仔细考虑。为了解决与弹性相关的传输功率增加问题,并提高低k网络拓扑中的流量容量,计划进一步研究将网络指向性组件和多通道网络架构应用于问题空间。
{"title":"Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery","authors":"J. Macker, Caleb Bowers, S. Kompella, C. Kam, Jeffery W. Weston","doi":"10.1109/MILCOM52596.2021.9653017","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653017","url":null,"abstract":"We consider the problem of wireless topology control with adjustable k-resilience and we evaluate related unicast and multicast network traffic delivery statistics across a series of initial simulation experiments. Our main goal is to examine design tradeoffs between resilient topology control, transmission power requirements, and resultant network throughput characteristics. We also present newly developed extensions to the network simulator, NS3, supporting multicast traffic experimentation. Our results for the random geometric networks studied demonstrate that moderate levels of $k$-resilience result in improvements in unicast traffic delivery while managing the growth of transmission power requirements across the network. These same trends were also observed for multicast experiments with connected dominating set (CDS) based forwarding, but traffic delivery did not improve for higher $k$ connectivities in the case of basic multicast flooding. Overall, we conclude that topology control edge connectivity resilience adds significant traffic delivery improvements in addition to providing other benefits, but the additional cost for establishing topological resiliency needs to be carefully considered against other defined system constraints. To address transmit power increases associated with resiliency and to improve traffic capacity in lower $k$ network topologies, further research is planned in applying network directivity components and multi-channel network architectures to the problem space.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133838400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node 外部节点总功率干扰限制下的自组网
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652949
C. Kam, J. Macker, Caleb Bowers, S. Kompella
The purpose of this work is to connect wireless nodes to form an ad hoc network, while trying to limit the interference to a node or device that is external to the network. Specifically, we consider two forms of the problem of limiting interference caused by the emitted power required to form the connections within a network. First, we consider a case where the interference at the external node cannot exceed some power threshold, and we would like to connect as many nodes together to form a tree without exceeding that threshold. We call this the Largest Constrained Tree (LCT) problem, which we model as a graph where the cost to connect a pair of nodes is the sum of the interference caused by transmitting in each direction. The second form of the problem we consider is the case where the power incident on the external node must be minimized, and we would like to connect nodes to form a network backbone, specifically a connected dominating set (CDS). As an approximation, we model the power emitted by the leaf nodes to the CDS as a smaller fixed amount, due to the transmission being out of band or having directionality gain. To solve these problems, we formulate them as mixed integer linear programs, and we demonstrate their performance through Monte Carlo simulation for various network sizes, node densities, external node distances, and network activity levels.
这项工作的目的是连接无线节点以形成一个自组织网络,同时试图限制对网络外部节点或设备的干扰。具体来说,我们考虑了两种形式的问题,即限制由形成网络内连接所需的发射功率引起的干扰。首先,我们考虑一种外部节点的干扰不能超过某个功率阈值的情况,我们希望将尽可能多的节点连接在一起形成一棵树,但不超过该阈值。我们称之为最大约束树(LCT)问题,我们将其建模为一个图,其中连接一对节点的代价是在每个方向上传输所引起的干扰的总和。我们考虑的问题的第二种形式是外部节点上的电源事件必须最小化,并且我们希望连接节点以形成网络骨干,特别是连接支配集(CDS)。作为近似,我们将叶节点向CDS发射的功率建模为较小的固定量,这是由于传输在带外或具有方向性增益。为了解决这些问题,我们将它们表述为混合整数线性规划,并通过蒙特卡罗模拟对各种网络大小、节点密度、外部节点距离和网络活动水平进行了性能演示。
{"title":"Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node","authors":"C. Kam, J. Macker, Caleb Bowers, S. Kompella","doi":"10.1109/MILCOM52596.2021.9652949","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652949","url":null,"abstract":"The purpose of this work is to connect wireless nodes to form an ad hoc network, while trying to limit the interference to a node or device that is external to the network. Specifically, we consider two forms of the problem of limiting interference caused by the emitted power required to form the connections within a network. First, we consider a case where the interference at the external node cannot exceed some power threshold, and we would like to connect as many nodes together to form a tree without exceeding that threshold. We call this the Largest Constrained Tree (LCT) problem, which we model as a graph where the cost to connect a pair of nodes is the sum of the interference caused by transmitting in each direction. The second form of the problem we consider is the case where the power incident on the external node must be minimized, and we would like to connect nodes to form a network backbone, specifically a connected dominating set (CDS). As an approximation, we model the power emitted by the leaf nodes to the CDS as a smaller fixed amount, due to the transmission being out of band or having directionality gain. To solve these problems, we formulate them as mixed integer linear programs, and we demonstrate their performance through Monte Carlo simulation for various network sizes, node densities, external node distances, and network activity levels.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122071862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1