Pub Date : 2021-11-29DOI: 10.1109/MILCOM52596.2021.9653081
N. Tayem, Ahmed A. Hussain, Vinay Reddy Veramareddy, A. Soliman, J. Alghazo
In this paper, we present a novel and computationally efficient DOA estimation method that works equally well for both non-coherent and coherent sources. This method is based on applying the propagator method as a linear operator to the covariance matrix of the received data taken from a single snapshot of signals impinging on a uniform linear array. A Toeplitz Hermitian data matrix is constructed and transformed to a real-valued data matrix which significantly reduces computational complexity. The propagator method obviates the need to use either eigenvalue decomposition or singular value decomposition in calculating the DOA. Finally, the Root-MUSIC method is employed in conjunction with proposed method to estimate the angles of arrivals from the received signal. Simulation results demonstrate the efficacy of the proposed method.
{"title":"Propagator Rooting Method Direction of Arrival Estimation Based on Real Data","authors":"N. Tayem, Ahmed A. Hussain, Vinay Reddy Veramareddy, A. Soliman, J. Alghazo","doi":"10.1109/MILCOM52596.2021.9653081","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653081","url":null,"abstract":"In this paper, we present a novel and computationally efficient DOA estimation method that works equally well for both non-coherent and coherent sources. This method is based on applying the propagator method as a linear operator to the covariance matrix of the received data taken from a single snapshot of signals impinging on a uniform linear array. A Toeplitz Hermitian data matrix is constructed and transformed to a real-valued data matrix which significantly reduces computational complexity. The propagator method obviates the need to use either eigenvalue decomposition or singular value decomposition in calculating the DOA. Finally, the Root-MUSIC method is employed in conjunction with proposed method to estimate the angles of arrivals from the received signal. Simulation results demonstrate the efficacy of the proposed method.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127298499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-29DOI: 10.1109/MILCOM52596.2021.9652931
D. Erricolo, William P. Alberth
A review of the evolution that led to massive MIMO system is provided. Implementation challenges are discussed and a justification for the use of the 12 GHz bandwidth is given.
对导致大规模MIMO系统的发展进行了回顾。讨论了实现挑战,并给出了使用12ghz带宽的理由。
{"title":"Massive MIMO: review and a case for the 12 GHz band","authors":"D. Erricolo, William P. Alberth","doi":"10.1109/MILCOM52596.2021.9652931","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652931","url":null,"abstract":"A review of the evolution that led to massive MIMO system is provided. Implementation challenges are discussed and a justification for the use of the 12 GHz bandwidth is given.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-29DOI: 10.1109/MILCOM52596.2021.9652944
L. Nguyen, D. Nguyen, N. Tran, Clayton Bosler, David Brunnenmeyer
This paper presents a new framework for SATCOM jamming resiliency in the presence of a smart adversary jammer that can prioritize specific channels to attack with a non-uniform probability of distribution. We first develop a model and a defense action strategy based on a Markov decision process (MDP). We propose a greedy algorithm for the MDP-based defense algorithm's policy to optimize the expected user's immediate and future discounted rewards. Next, we remove the assumption that the user has specific information about the attacker's pattern and model. We develop a Q-learning algorithm-a reinforcement learning (RL) approach-to optimize the user's policy. We show that the Q-learning method provides an attractive defense strategy solution without explicit knowledge of the jammer's strategy. Computer simulation results show that the MDP-based defense strategies are very efficient; they offer a significant data rate advantage over the simple random hopping approach. Also, the proposed Q-learning performance can achieve close to the MDP approach without explicit knowledge of the jammer's strategy or attacking model.
{"title":"SATCOM Jamming Resiliency under Non-Uniform Probability of Attacks","authors":"L. Nguyen, D. Nguyen, N. Tran, Clayton Bosler, David Brunnenmeyer","doi":"10.1109/MILCOM52596.2021.9652944","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652944","url":null,"abstract":"This paper presents a new framework for SATCOM jamming resiliency in the presence of a smart adversary jammer that can prioritize specific channels to attack with a non-uniform probability of distribution. We first develop a model and a defense action strategy based on a Markov decision process (MDP). We propose a greedy algorithm for the MDP-based defense algorithm's policy to optimize the expected user's immediate and future discounted rewards. Next, we remove the assumption that the user has specific information about the attacker's pattern and model. We develop a Q-learning algorithm-a reinforcement learning (RL) approach-to optimize the user's policy. We show that the Q-learning method provides an attractive defense strategy solution without explicit knowledge of the jammer's strategy. Computer simulation results show that the MDP-based defense strategies are very efficient; they offer a significant data rate advantage over the simple random hopping approach. Also, the proposed Q-learning performance can achieve close to the MDP approach without explicit knowledge of the jammer's strategy or attacking model.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123080178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-29DOI: 10.1109/MILCOM52596.2021.9652958
A. Kaminsky, M. Kurdziel, Steven Farris, M. Lukowiak, S. Radziszowski
A Cross Domain Problem (CDP) is the question of how to securely access and exchange information between the domains of varying security levels. A Cross Domain Solution (CDS) addresses the CDP by designing the framework and protocols for such access and transfers. Most existing CDS methods rely on policies and trusted parties to manage different security levels. A CDS that can function in the presence of untrusted parties is a challenge. Functional Encryption (FE) is an encryption scheme in which a secret key allows one to compute a specific function of plaintext from the ciphertext. FE is a generalization of identity-based and attribute-based encryption frameworks. General and simultaneously practical FE is an emerging area, and only special types of encryption schemes and functions are effectively handled within existing systems. We apply the concepts of FE to explore a new solution to the CDP, and we argue that our solution does not leak information, provided that widely accepted assumptions about standard digital signatures hold. We built a practical software case study application using a trusted Key Distribution Center (KDC), a standard symmetric key block cipher component (like the AES), and using the Elliptic Curve Digital Signature Algorithm (ECDSA). The experiments show that the computational overhead introduced to routing by our method is cost effective, where the additional cost is equivalent to just a few applications of standard digital signatures.
{"title":"Solving the Cross Domain Problem with Functional Encryption","authors":"A. Kaminsky, M. Kurdziel, Steven Farris, M. Lukowiak, S. Radziszowski","doi":"10.1109/MILCOM52596.2021.9652958","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652958","url":null,"abstract":"A Cross Domain Problem (CDP) is the question of how to securely access and exchange information between the domains of varying security levels. A Cross Domain Solution (CDS) addresses the CDP by designing the framework and protocols for such access and transfers. Most existing CDS methods rely on policies and trusted parties to manage different security levels. A CDS that can function in the presence of untrusted parties is a challenge. Functional Encryption (FE) is an encryption scheme in which a secret key allows one to compute a specific function of plaintext from the ciphertext. FE is a generalization of identity-based and attribute-based encryption frameworks. General and simultaneously practical FE is an emerging area, and only special types of encryption schemes and functions are effectively handled within existing systems. We apply the concepts of FE to explore a new solution to the CDP, and we argue that our solution does not leak information, provided that widely accepted assumptions about standard digital signatures hold. We built a practical software case study application using a trusted Key Distribution Center (KDC), a standard symmetric key block cipher component (like the AES), and using the Elliptic Curve Digital Signature Algorithm (ECDSA). The experiments show that the computational overhead introduced to routing by our method is cost effective, where the additional cost is equivalent to just a few applications of standard digital signatures.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-29DOI: 10.1109/MILCOM52596.2021.9652948
Saeed Kaviani, Bo Ryu, E. Ahmed, Kevin Larson, Anh-Ngoc Le, Alex Yahja, J. H. Kim
Highly dynamic mobile ad-hoc networks (MANETs) remain as one of the most challenging environments to develop and deploy robust, efficient, and scalable routing protocols. In this paper, we present DeepCQ+ routing protocol which, in a novel manner, integrates emerging multi-agent deep reinforcement learning (MADRL) techniques into existing Q-learning-based routing protocols and their variants, and achieves persistently higher performance across a wide range of topology and mobility configurations. While keeping the overall protocol structure of the Q-learning-based routing protocols, DeepCQ+ replaces statically configured parameterized thresholds and hand-written rules with carefully designed MADRL agents such that no configuration of such parameters is required a priori. Extensive simulation shows that DeepCQ+ yields significantly increased end-to-end throughput with lower overhead and no apparent degradation of end-to-end delays (hop counts) compared to its Q-learning-based counterparts. Qualitatively, and perhaps more significantly, DeepCQ+ maintains remarkably similar performance gains under many scenarios that it was not trained for in terms of network sizes, mobility conditions, and traffic dynamics. To the best of our knowledge, this is the first successful application of the MADRL framework for the MANET routing problem that demonstrates a high degree of scalability and robustness even under the environments that are outside the trained range of scenarios. This implies that our MARL-based DeepCQ+ design solution significantly improves the performance of Q-learning-based CQ+ baseline approach for comparison and increases its practicality and explainability because the real-world MANET environment will likely vary outside the trained range of MANET scenarios. Additional techniques to further increase the gains in performance and scalability are discussed.
{"title":"DeepCQ+: Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks","authors":"Saeed Kaviani, Bo Ryu, E. Ahmed, Kevin Larson, Anh-Ngoc Le, Alex Yahja, J. H. Kim","doi":"10.1109/MILCOM52596.2021.9652948","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652948","url":null,"abstract":"Highly dynamic mobile ad-hoc networks (MANETs) remain as one of the most challenging environments to develop and deploy robust, efficient, and scalable routing protocols. In this paper, we present DeepCQ+ routing protocol which, in a novel manner, integrates emerging multi-agent deep reinforcement learning (MADRL) techniques into existing Q-learning-based routing protocols and their variants, and achieves persistently higher performance across a wide range of topology and mobility configurations. While keeping the overall protocol structure of the Q-learning-based routing protocols, DeepCQ+ replaces statically configured parameterized thresholds and hand-written rules with carefully designed MADRL agents such that no configuration of such parameters is required a priori. Extensive simulation shows that DeepCQ+ yields significantly increased end-to-end throughput with lower overhead and no apparent degradation of end-to-end delays (hop counts) compared to its Q-learning-based counterparts. Qualitatively, and perhaps more significantly, DeepCQ+ maintains remarkably similar performance gains under many scenarios that it was not trained for in terms of network sizes, mobility conditions, and traffic dynamics. To the best of our knowledge, this is the first successful application of the MADRL framework for the MANET routing problem that demonstrates a high degree of scalability and robustness even under the environments that are outside the trained range of scenarios. This implies that our MARL-based DeepCQ+ design solution significantly improves the performance of Q-learning-based CQ+ baseline approach for comparison and increases its practicality and explainability because the real-world MANET environment will likely vary outside the trained range of MANET scenarios. Additional techniques to further increase the gains in performance and scalability are discussed.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123854387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-29DOI: 10.1109/MILCOM52596.2021.9653022
Frederick M. Chache, Sean Maxon, R. Narayanan, Ramesh Bharadwaj
To be useful, wireless sensor networks (WSNs) must be relied upon even when dispersed across environments that lack consistent internet access. To this end, we propose a mesh network architecture based on the Better Approach to Mobile Ad-hoc Networking (B.A.T.M.A.N.) algorithm in conjunction with the long range, low power communication protocol, LoRa, to transmit messages. Adaptations including methods of time synchronization, slotted ALOHA transmission and Quality of Service (QoS) considerations with a network-traffic-aware data routing protocol for a multi-source/multi-sink network configuration have been implemented. With this solution, nodes can create an ad-hoc network, sharing internet access and greatly expanding the network coverage without the need for any additional infrastructure. Our QoS-aware routing metrics have been tested in simulation and show performance improvements over traditional B.A.T.M.A.N. destination routing algorithms in these low data rate systems.
{"title":"QoS Extension to a B.A.T.M.A.N. based LoRa Mesh Network","authors":"Frederick M. Chache, Sean Maxon, R. Narayanan, Ramesh Bharadwaj","doi":"10.1109/MILCOM52596.2021.9653022","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653022","url":null,"abstract":"To be useful, wireless sensor networks (WSNs) must be relied upon even when dispersed across environments that lack consistent internet access. To this end, we propose a mesh network architecture based on the Better Approach to Mobile Ad-hoc Networking (B.A.T.M.A.N.) algorithm in conjunction with the long range, low power communication protocol, LoRa, to transmit messages. Adaptations including methods of time synchronization, slotted ALOHA transmission and Quality of Service (QoS) considerations with a network-traffic-aware data routing protocol for a multi-source/multi-sink network configuration have been implemented. With this solution, nodes can create an ad-hoc network, sharing internet access and greatly expanding the network coverage without the need for any additional infrastructure. Our QoS-aware routing metrics have been tested in simulation and show performance improvements over traditional B.A.T.M.A.N. destination routing algorithms in these low data rate systems.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-29DOI: 10.1109/MILCOM52596.2021.9652992
Stefan Weithoffer, Rami Klaimi, C. A. Nour
The complexity involved to blindly detect the channel code parameters in the case of their imperfect knowledge is generally measured in terms of the minimum number of frames that an eavesdropper needs to observe for successful detection, adding an additional layer of privacy. In this work, starting from a defined almost regular interleaver for Turbo codes, we propose methods to construct a larger set of distinct interleavers that increases the minimum number of observations by a factor equal to the size of the constructed set. Furthermore, the generated sets of interleavers can be described by defining only a small number of parameters and are shown to achieve a comparable error correcting performance to base interleavers. To validate the proposed implementation-friendly method, an application example for information frame sizes $mathrm{K}=128$ bits and $mathrm{K}=512$ bits is provided for the construction of two sets of 8192 interleavers, prohibitively increasing detection complexity by state-of-the-art methods.
{"title":"Mitigating Blind Detection Through Protograph Based Interleaving for Turbo Codes","authors":"Stefan Weithoffer, Rami Klaimi, C. A. Nour","doi":"10.1109/MILCOM52596.2021.9652992","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652992","url":null,"abstract":"The complexity involved to blindly detect the channel code parameters in the case of their imperfect knowledge is generally measured in terms of the minimum number of frames that an eavesdropper needs to observe for successful detection, adding an additional layer of privacy. In this work, starting from a defined almost regular interleaver for Turbo codes, we propose methods to construct a larger set of distinct interleavers that increases the minimum number of observations by a factor equal to the size of the constructed set. Furthermore, the generated sets of interleavers can be described by defining only a small number of parameters and are shown to achieve a comparable error correcting performance to base interleavers. To validate the proposed implementation-friendly method, an application example for information frame sizes $mathrm{K}=128$ bits and $mathrm{K}=512$ bits is provided for the construction of two sets of 8192 interleavers, prohibitively increasing detection complexity by state-of-the-art methods.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127565168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-29DOI: 10.1109/MILCOM52596.2021.9653004
M. Rupar, Erlend Larsen, H. B. Saglam, Ruben Bascuñana Blasco, Julian A. Savin, Nadine Brueck
As information technology advances, the need for distributed communications on the battlefield continues to grow. Moreover, NATO activities are multi-nation engagements, and necessitate communications between member countries and from the theater of operations back to command centers. The NATO Information Systems Technology (IST) 172 research task group is investigating non-satellite and non-high frequency (HF) technologies for beyond line-of-sight (BLOS) communications, creating links between disparate battlefield nodes. The study is examining existing and emerging capabilities within the NATO member nations, and considering their applicability to two representative communications scenarios. Range extension, ease of interoperability between member nations, frequency coordination considerations and existing radio hardware are all to be included in the analysis.
{"title":"Airborne Beyond Line of Sight Communication Networks","authors":"M. Rupar, Erlend Larsen, H. B. Saglam, Ruben Bascuñana Blasco, Julian A. Savin, Nadine Brueck","doi":"10.1109/MILCOM52596.2021.9653004","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653004","url":null,"abstract":"As information technology advances, the need for distributed communications on the battlefield continues to grow. Moreover, NATO activities are multi-nation engagements, and necessitate communications between member countries and from the theater of operations back to command centers. The NATO Information Systems Technology (IST) 172 research task group is investigating non-satellite and non-high frequency (HF) technologies for beyond line-of-sight (BLOS) communications, creating links between disparate battlefield nodes. The study is examining existing and emerging capabilities within the NATO member nations, and considering their applicability to two representative communications scenarios. Range extension, ease of interoperability between member nations, frequency coordination considerations and existing radio hardware are all to be included in the analysis.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127568916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-29DOI: 10.1109/MILCOM52596.2021.9652930
P. Montezuma, R. Madeira, Hugo Serra, P. Viegas, R. Dinis, J. Oliveira, João Guerreiro
Uplink high throughput is essential to assure good situational awareness in Unmanned Aerial Vehicles (UAVs) mission. For that purpose larger bandwidths should be combined with the maximum possible spectral efficiency at the uplink. This leads to the use of multilevel broadband modulations with high Peak-to-Average Power Ratio (PAPR) values that may compromise the power amplification efficiency of current amplification technologies. High efficiency can be assured in these links with a new amplification scheme based on the Quantized Digital Amplification (QDA) technique that combines broadband support with both low complexity and high energy efficiency of signal power amplification stage. Spectral efficiency is also assured due to the QDA capacity to deal efficiently with multilevel modulations with high PAPRs, commonly used to assure high spectral efficiencies. The several cases analyzed here show the effectiveness and the robustness of the new technique to support efficiently the signal amplification in these links.
{"title":"Quantized Digital Amplification with combination over the air - Achieving maximum efficiency on communication links between long range UAVs and satellites","authors":"P. Montezuma, R. Madeira, Hugo Serra, P. Viegas, R. Dinis, J. Oliveira, João Guerreiro","doi":"10.1109/MILCOM52596.2021.9652930","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652930","url":null,"abstract":"Uplink high throughput is essential to assure good situational awareness in Unmanned Aerial Vehicles (UAVs) mission. For that purpose larger bandwidths should be combined with the maximum possible spectral efficiency at the uplink. This leads to the use of multilevel broadband modulations with high Peak-to-Average Power Ratio (PAPR) values that may compromise the power amplification efficiency of current amplification technologies. High efficiency can be assured in these links with a new amplification scheme based on the Quantized Digital Amplification (QDA) technique that combines broadband support with both low complexity and high energy efficiency of signal power amplification stage. Spectral efficiency is also assured due to the QDA capacity to deal efficiently with multilevel modulations with high PAPRs, commonly used to assure high spectral efficiencies. The several cases analyzed here show the effectiveness and the robustness of the new technique to support efficiently the signal amplification in these links.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125640384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-29DOI: 10.1109/MILCOM52596.2021.9652924
G. Elmasry, P. Corwin
Tactical network architects are exploring ways to leverage 5G capabilities in military communications. 5G offers many capabilities that can benefit tactical networks to include directionality, dynamic spectrum management, abundant bandwidth and low latency. There are different areas of 5G that are considered by the tactical community such as security enhancements, interfacing 5G technologies with existing tactical links and waveforms, developing new MIMO antennas that meet tactical requirements, enhancing 5G spectrum emission to meet EW requirements and exploring how to adapt an open architecture for tactical 5G. This paper approaches the adaptation of 5G to tactical networks from the high-level operational views leading to a proposed lab architecture that is specific for a vertical tactical 5G solution. This is a top-down study that exposes the pros and cons of following a vertical path for tactical 5G. Vertical 5G here means the augmentation of 5G standards (e.g., 3GPP) for an open-architecture-based, tactical-specific 5G solution that can eventually lead to the full utilization of 5G capabilities within tactical networks.
{"title":"Operational Views of Vertical Tactical 5G","authors":"G. Elmasry, P. Corwin","doi":"10.1109/MILCOM52596.2021.9652924","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652924","url":null,"abstract":"Tactical network architects are exploring ways to leverage 5G capabilities in military communications. 5G offers many capabilities that can benefit tactical networks to include directionality, dynamic spectrum management, abundant bandwidth and low latency. There are different areas of 5G that are considered by the tactical community such as security enhancements, interfacing 5G technologies with existing tactical links and waveforms, developing new MIMO antennas that meet tactical requirements, enhancing 5G spectrum emission to meet EW requirements and exploring how to adapt an open architecture for tactical 5G. This paper approaches the adaptation of 5G to tactical networks from the high-level operational views leading to a proposed lab architecture that is specific for a vertical tactical 5G solution. This is a top-down study that exposes the pros and cons of following a vertical path for tactical 5G. Vertical 5G here means the augmentation of 5G standards (e.g., 3GPP) for an open-architecture-based, tactical-specific 5G solution that can eventually lead to the full utilization of 5G capabilities within tactical networks.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126543889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}