首页 > 最新文献

MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)最新文献

英文 中文
Using Distributed Ledgers For Command and Control – Concepts and Challenges 在命令和控制中使用分布式账本——概念和挑战
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652985
David C. Last, M. Atighetchi, P. Pal, Ryan Toner
The US military is focused on transitioning its warf-ighting philosophy towards the Multi-Domain Command and Control (MDC2) concept, which integrates lands, sea, air, space, and cyberspace forces into a unified planning and execution structure. This structure depends on reliable exchange of plans and intelligence reports, which is hindered by the development of adversary capabilities in the areas of radio jamming and other communications-denying technologies. The battlefield of the future will consist of dispersed units with intermittent, constrained communications who nevertheless need to maintain a consistent view of shared plans and information. We are developing a proof-of-concept prototype MDC2 system to explore the requirements and limitations of a solution in this space. There are many distributed database solutions that could be used for this prototype; upon investigation, we believe that Distributed Ledger Technologies (DLT) are an ideal fit for the particular constraints of this use case. We have selected Hyperledger Fabric as the particular DLT implementation on which we are building this prototype. As part of this research, we are developing a Hyperledger-based prototype as well as a baseline implementation that reflects how the DoD handles this process today. We will use both of these systems in a series of experiments that evaluate how well they perform in the areas of database consistency, constrained tactical networks, and conditional authorities, and we will measure their performance using a suite of metrics that will allow us to compare the DLT-based prototype with the baseline system. This paper outlines the challenges we will address through this research; the completed research will encompass our solutions to these challenges.
美军正致力于将其作战理念向多域指挥与控制(MDC2)概念过渡,该概念将陆地、海洋、空中、太空和网络空间力量整合到统一的规划和执行结构中。这种结构依赖于可靠的计划和情报报告的交换,这受到对手在无线电干扰和其他通信阻断技术领域能力发展的阻碍。未来的战场将由分散的单位组成,这些单位的通信断断续续,但需要对共享的计划和信息保持一致的看法。我们正在开发一个概念验证原型MDC2系统,以探索该领域解决方案的需求和限制。有许多分布式数据库解决方案可用于此原型;经过调查,我们认为分布式账本技术(DLT)非常适合这个用例的特定限制。我们选择了Hyperledger Fabric作为构建此原型的特定DLT实现。作为这项研究的一部分,我们正在开发一个基于超级账本的原型,以及一个反映国防部目前如何处理这一过程的基线实现。我们将在一系列实验中使用这两个系统,评估它们在数据库一致性、受限战术网络和条件权限方面的表现,我们将使用一套指标来衡量它们的性能,这些指标将使我们能够将基于dlt的原型与基线系统进行比较。本文概述了我们将通过这项研究解决的挑战;完成的研究将包括我们对这些挑战的解决方案。
{"title":"Using Distributed Ledgers For Command and Control – Concepts and Challenges","authors":"David C. Last, M. Atighetchi, P. Pal, Ryan Toner","doi":"10.1109/MILCOM52596.2021.9652985","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652985","url":null,"abstract":"The US military is focused on transitioning its warf-ighting philosophy towards the Multi-Domain Command and Control (MDC2) concept, which integrates lands, sea, air, space, and cyberspace forces into a unified planning and execution structure. This structure depends on reliable exchange of plans and intelligence reports, which is hindered by the development of adversary capabilities in the areas of radio jamming and other communications-denying technologies. The battlefield of the future will consist of dispersed units with intermittent, constrained communications who nevertheless need to maintain a consistent view of shared plans and information. We are developing a proof-of-concept prototype MDC2 system to explore the requirements and limitations of a solution in this space. There are many distributed database solutions that could be used for this prototype; upon investigation, we believe that Distributed Ledger Technologies (DLT) are an ideal fit for the particular constraints of this use case. We have selected Hyperledger Fabric as the particular DLT implementation on which we are building this prototype. As part of this research, we are developing a Hyperledger-based prototype as well as a baseline implementation that reflects how the DoD handles this process today. We will use both of these systems in a series of experiments that evaluate how well they perform in the areas of database consistency, constrained tactical networks, and conditional authorities, and we will measure their performance using a suite of metrics that will allow us to compare the DLT-based prototype with the baseline system. This paper outlines the challenges we will address through this research; the completed research will encompass our solutions to these challenges.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114471729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Sub-Sample Dithering to Reduce Probability of Signal Detection 子样本抖动在降低信号检测概率中的应用
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652935
J. Norris, J. Nieto
Communications Security is Achieved in the Physical Layer with the utilization of Low Probability of Detection (LPD) and Low Probability of Intercept (LPI) Modulation Techniques. Standard modulation techniques have cyclical time varying properties that can be exploited by signals intelligence (SIGINT) for signal detection, traffic analysis, and signal interception. There is a large body of analysis on wide-sense cyclostationary features of these modulation techniques with the conclusion that the primary cause of periodic cyclostationary features is the modulation symbol rate. Deterministic variability in the symbol rate can be used to reduce or eliminate cyclostationary features. Several techniques have been proposed, including DAC clock dithering. In this paper we provide a description of a polyphase resampler application to provide symbol rate dithering and an analysis of the dithering on the second, and higher order cyclostationary features. Multiple modulation types are included in the analysis. ADC de-dithering is typically not an option at the receiver - the delays inherent in standard receiver architectures prohibit real-time control of the ADC during signal demodulation while the polyphase resampler can be applied digitally within the receiver at matched filter sample rates.
利用低探测概率(LPD)和低截获概率(LPI)调制技术在物理层实现通信安全。标准调制技术具有周期性时变特性,可被信号智能(SIGINT)用于信号检测、流量分析和信号拦截。对这些调制技术的广义循环平稳特性进行了大量的分析,得出了周期性循环平稳特性的主要原因是调制符号率。符号率的确定性可变性可用于减少或消除循环平稳特征。提出了几种技术,包括DAC时钟抖动。在本文中,我们提供了一个多相重采样器的应用描述,以提供符号速率抖动,并分析了抖动对二阶和高阶循环平稳特征。多种调制类型包括在分析中。ADC去抖动通常不是接收器的选项-标准接收器架构固有的延迟禁止在信号解调期间对ADC进行实时控制,而多相重采样器可以在接收器内以匹配的滤波器采样率进行数字应用。
{"title":"Application of Sub-Sample Dithering to Reduce Probability of Signal Detection","authors":"J. Norris, J. Nieto","doi":"10.1109/MILCOM52596.2021.9652935","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652935","url":null,"abstract":"Communications Security is Achieved in the Physical Layer with the utilization of Low Probability of Detection (LPD) and Low Probability of Intercept (LPI) Modulation Techniques. Standard modulation techniques have cyclical time varying properties that can be exploited by signals intelligence (SIGINT) for signal detection, traffic analysis, and signal interception. There is a large body of analysis on wide-sense cyclostationary features of these modulation techniques with the conclusion that the primary cause of periodic cyclostationary features is the modulation symbol rate. Deterministic variability in the symbol rate can be used to reduce or eliminate cyclostationary features. Several techniques have been proposed, including DAC clock dithering. In this paper we provide a description of a polyphase resampler application to provide symbol rate dithering and an analysis of the dithering on the second, and higher order cyclostationary features. Multiple modulation types are included in the analysis. ADC de-dithering is typically not an option at the receiver - the delays inherent in standard receiver architectures prohibit real-time control of the ADC during signal demodulation while the polyphase resampler can be applied digitally within the receiver at matched filter sample rates.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121620856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs 战术木星:战术机动网络中分散计算的动态调度
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652937
A. Poylisher, A. Cichocki, K. Guo, J. Hunziker, L. Kant, B. Krishnamachari, A. Avestimehr, M. Annavaram
We present Tactical Jupiter, an adaptation of the recently developed Jupiter framework for scheduling of dispersed computations on heterogeneous resources to tactical MANETs. Tactical Jupiter addresses the challenges to distributed scheduling posed by intermittent connectivity and scarce/variable bandwidth, variable computational resource utilization by background load, and node attrition. Our key contributions include: (a) disruption handling via increased autonomy of task executors, (b) low-overhead ML-based task completion time estimation in presence of background load, and (c) resilient dissemination mechanisms for monitoring information.
我们提出了战术木星,这是最近开发的木星框架的一个改编,用于调度异构资源上的分散计算到战术manet。战术木星解决了间歇性连接和稀缺/可变带宽、后台负载的可变计算资源利用率和节点损耗给分布式调度带来的挑战。我们的主要贡献包括:(a)通过增加任务执行者的自主权来处理中断,(b)在后台负载存在的情况下,基于ml的低开销任务完成时间估计,以及(c)监控信息的弹性传播机制。
{"title":"Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs","authors":"A. Poylisher, A. Cichocki, K. Guo, J. Hunziker, L. Kant, B. Krishnamachari, A. Avestimehr, M. Annavaram","doi":"10.1109/MILCOM52596.2021.9652937","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652937","url":null,"abstract":"We present Tactical Jupiter, an adaptation of the recently developed Jupiter framework for scheduling of dispersed computations on heterogeneous resources to tactical MANETs. Tactical Jupiter addresses the challenges to distributed scheduling posed by intermittent connectivity and scarce/variable bandwidth, variable computational resource utilization by background load, and node attrition. Our key contributions include: (a) disruption handling via increased autonomy of task executors, (b) low-overhead ML-based task completion time estimation in presence of background load, and (c) resilient dissemination mechanisms for monitoring information.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123295240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Concepts and Directions for Future IoT and C2 Interoperability 未来物联网和C2互操作性的概念和方向
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653093
Manas Pradhan, Marco Manso, James R. Michaelis
The evolving fields of Information and Communications Technology (ICT) and the Internet of Things (IoT) have allowed a multitude of state and non-state actors to leverage remote, ubiquitous and context rich computing for solving future challenges. Individually, standards underlying ICT/IoT serve the purpose they were devised for in supporting predetermined use cases and application domains, but often present significant challenges when underlying technologies must be re-purposed or integrated in new ways. Corresponding technology integration challenges are often addressed through ad-hoc solutions (e.g., stove-piped interfaces, data federation and exchange services) which make it very difficult to scale and adapt to the needs of cross-coalition Command Control (C2) infrastructures. Following from NATO IST-176 efforts, this paper reviews key design requirements for developing NATO C2 Data Models to facilitate COTS IoT and NATO STANAG interoperability. Here, the idea is not to propose an entirely new standard but to identify and catalogue methods to reuse existing standards to improve interoperability as well as introduce extensibility to enable next-generation coalition operations.
信息和通信技术(ICT)和物联网(IoT)领域的不断发展,使众多国家和非国家行为体能够利用远程、无处不在和上下文丰富的计算来解决未来的挑战。单独而言,ICT/IoT的基础标准在支持预定用例和应用领域方面达到了设计目的,但当基础技术必须以新的方式重新利用或集成时,往往会带来重大挑战。相应的技术集成挑战通常通过特别解决方案(例如,炉管接口、数据联合和交换服务)来解决,这使得很难扩展和适应跨联盟指挥控制(C2)基础设施的需求。根据北约IST-176的工作,本文回顾了开发北约C2数据模型的关键设计要求,以促进COTS物联网和北约STANAG互操作性。在这里,我们的想法不是提出一个全新的标准,而是确定和编目重用现有标准的方法,以提高互操作性,并引入可扩展性,使下一代联合作战成为可能。
{"title":"Concepts and Directions for Future IoT and C2 Interoperability","authors":"Manas Pradhan, Marco Manso, James R. Michaelis","doi":"10.1109/MILCOM52596.2021.9653093","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653093","url":null,"abstract":"The evolving fields of Information and Communications Technology (ICT) and the Internet of Things (IoT) have allowed a multitude of state and non-state actors to leverage remote, ubiquitous and context rich computing for solving future challenges. Individually, standards underlying ICT/IoT serve the purpose they were devised for in supporting predetermined use cases and application domains, but often present significant challenges when underlying technologies must be re-purposed or integrated in new ways. Corresponding technology integration challenges are often addressed through ad-hoc solutions (e.g., stove-piped interfaces, data federation and exchange services) which make it very difficult to scale and adapt to the needs of cross-coalition Command Control (C2) infrastructures. Following from NATO IST-176 efforts, this paper reviews key design requirements for developing NATO C2 Data Models to facilitate COTS IoT and NATO STANAG interoperability. Here, the idea is not to propose an entirely new standard but to identify and catalogue methods to reuse existing standards to improve interoperability as well as introduce extensibility to enable next-generation coalition operations.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"42 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129881363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Wireless Link Connectivity for Resilient Multi-Hop Networks 弹性多跳网络的无线链路连接研究
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652882
Gautam Trivedi, B. Jabbari
Wireless multi-hop networks are rapidly becoming an integral part of next generation mobile communications. These networks are highly scalable, self-organizing, dynamic, and may share spectrum with others while operating in resource-constrained environments. As a result, these networks are highly susceptible to link failure. In particular, wireless multi-hop sensor networks are required to maintain a high level of resiliency in order to deliver sensor data with minimum latency. One way to achieve such resiliency is by maximizing the probability of maintaining a high level of topological connectivity. In this paper, we develop a graph-theoretic model that maintains a high level of connectivity in the presence of internal and external interference. Given a pool of available channels, we utilize spectrum sensing to determine the state of each channel, achieve channel state consensus across the network using distributed average consensus approach and use graph coloring for channel allocation in order to minimize interference experienced from adjacent nodes as well as external interference sources. These models, corroborated by simulation, are then utilized to quantify the improvement in network resiliency as measured by link connectivity.
无线多跳网络正迅速成为下一代移动通信的重要组成部分。这些网络是高度可扩展的、自组织的、动态的,并且在资源受限的环境中运行时可以与其他网络共享频谱。因此,这些网络极易受到链路故障的影响。特别是,无线多跳传感器网络需要保持高水平的弹性,以便以最小的延迟交付传感器数据。实现这种弹性的一种方法是最大化维持高水平拓扑连通性的可能性。在本文中,我们开发了一个图论模型,在存在内部和外部干扰的情况下保持高水平的连通性。给定可用信道池,我们利用频谱感知来确定每个信道的状态,使用分布式平均共识方法在整个网络中实现信道状态共识,并使用图着色进行信道分配,以最大限度地减少来自相邻节点以及外部干扰源的干扰。这些模型通过仿真得到证实,然后利用它们来量化通过链路连通性衡量的网络弹性的改进。
{"title":"On Wireless Link Connectivity for Resilient Multi-Hop Networks","authors":"Gautam Trivedi, B. Jabbari","doi":"10.1109/MILCOM52596.2021.9652882","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652882","url":null,"abstract":"Wireless multi-hop networks are rapidly becoming an integral part of next generation mobile communications. These networks are highly scalable, self-organizing, dynamic, and may share spectrum with others while operating in resource-constrained environments. As a result, these networks are highly susceptible to link failure. In particular, wireless multi-hop sensor networks are required to maintain a high level of resiliency in order to deliver sensor data with minimum latency. One way to achieve such resiliency is by maximizing the probability of maintaining a high level of topological connectivity. In this paper, we develop a graph-theoretic model that maintains a high level of connectivity in the presence of internal and external interference. Given a pool of available channels, we utilize spectrum sensing to determine the state of each channel, achieve channel state consensus across the network using distributed average consensus approach and use graph coloring for channel allocation in order to minimize interference experienced from adjacent nodes as well as external interference sources. These models, corroborated by simulation, are then utilized to quantify the improvement in network resiliency as measured by link connectivity.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130216284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep GEM-Based Network for Weakly Supervised UWB Ranging Error Mitigation 基于深度gem的弱监督超宽带测距误差抑制网络
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653015.
Yuxiao Li, S. Mazuelas, Yuan Shen
Ultra-wideband (UWB)-based techniques, while becoming mainstream approaches for high-accurate positioning, tend to be challenged by ranging bias in harsh environments. The emerging learning-based methods for error mitigation have shown great performance improvement via exploiting high semantic features from raw data. However, these methods rely heavily on fully labeled data, leading to a high cost for data acquisition. We present a learning framework based on weak supervision for UWB ranging error mitigation. Specifically, we propose a deep learning method based on the generalized expectation-maximization (GEM) algorithm for robust UWB ranging error mitigation under weak supervision. Such method integrate probabilistic modeling into the deep learning scheme, and adopt weakly supervised labels as prior information. Extensive experiments in various supervision scenarios illustrate the superiority of the proposed method.
基于超宽带(UWB)的技术虽然成为高精度定位的主流方法,但在恶劣环境下往往受到测距偏差的挑战。新兴的基于学习的错误缓解方法通过利用原始数据的高语义特征,显示出巨大的性能改进。然而,这些方法严重依赖于完全标记的数据,导致数据采集成本高。提出了一种基于弱监督的学习框架,用于超宽带测距误差缓解。具体而言,我们提出了一种基于广义期望最大化(GEM)算法的深度学习方法,用于弱监督下的鲁棒超宽带测距误差缓解。该方法将概率建模融入深度学习方案,并采用弱监督标签作为先验信息。在各种监管场景下的大量实验证明了该方法的优越性。
{"title":"Deep GEM-Based Network for Weakly Supervised UWB Ranging Error Mitigation","authors":"Yuxiao Li, S. Mazuelas, Yuan Shen","doi":"10.1109/MILCOM52596.2021.9653015.","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653015.","url":null,"abstract":"Ultra-wideband (UWB)-based techniques, while becoming mainstream approaches for high-accurate positioning, tend to be challenged by ranging bias in harsh environments. The emerging learning-based methods for error mitigation have shown great performance improvement via exploiting high semantic features from raw data. However, these methods rely heavily on fully labeled data, leading to a high cost for data acquisition. We present a learning framework based on weak supervision for UWB ranging error mitigation. Specifically, we propose a deep learning method based on the generalized expectation-maximization (GEM) algorithm for robust UWB ranging error mitigation under weak supervision. Such method integrate probabilistic modeling into the deep learning scheme, and adopt weakly supervised labels as prior information. Extensive experiments in various supervision scenarios illustrate the superiority of the proposed method.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129983255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integrating Cybersecurity Into a Big Data Ecosystem 将网络安全融入大数据生态系统
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652997
Anne M. Tall, C. Zou, Jun Wang
This paper provides an overview of the security service controls that are applied in a big data processing (BDP) system to defend against cyber security attacks. We validate this approach by modeling attacks and effectiveness of security service controls in a sequence of states and transitions. This Finite State Machine (FSM) approach uses the probable effectiveness of security service controls, as defined in the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). The attacks used in the model are defined in the ATT&CK™ framework. Five different BDP security architecture configurations are considered, spanning from a low-cost default BDP configuration to a more expensive, industry supported layered security architecture. The analysis demonstrates the importance of a multi-layer approach to implementing security in BDP systems. With increasing interest in using BDP systems to analyze sensitive data sets, it is important to understand and justify BDP security architecture configurations with their significant costs. The output of the model demonstrates that over the run time, larger investment in security service controls results in significantly more uptime. There is a significant increase in uptime with a linear increase in security service control investment. We believe that these results support our recommended BDP security architecture. That is, a layered architecture with security service controls integrated into the user interface, boundary, central management of security policies, and applications that incorporate privacy preserving programs. These results enable making BDP systems operational for sensitive data accessed in a multi-tenant environment.
本文概述了在大数据处理(BDP)系统中用于防御网络安全攻击的安全服务控制。我们通过在一系列状态和转换中对攻击和安全服务控制的有效性进行建模来验证这种方法。这种有限状态机(FSM)方法利用了安全服务控制的可能有效性,正如美国国家标准与技术研究院(NIST)风险管理框架(RMF)中定义的那样。模型中使用的攻击在ATT&CK™框架中定义。本文考虑了五种不同的BDP安全体系结构配置,从低成本的默认BDP配置到更昂贵的、行业支持的分层安全体系结构。分析证明了在BDP系统中实现安全的多层方法的重要性。随着人们对使用BDP系统分析敏感数据集越来越感兴趣,理解和证明BDP安全体系结构配置及其巨大的成本是很重要的。该模型的输出表明,在运行期间,对安全服务控制的较大投资将显著延长正常运行时间。随着安全服务控制投资的线性增加,正常运行时间显著增加。我们认为这些结果支持我们推荐的BDP安全架构。也就是说,将安全服务控件集成到用户界面、边界、安全策略的集中管理和包含隐私保护程序的应用程序中的分层体系结构。这些结果使BDP系统能够在多租户环境中访问敏感数据。
{"title":"Integrating Cybersecurity Into a Big Data Ecosystem","authors":"Anne M. Tall, C. Zou, Jun Wang","doi":"10.1109/MILCOM52596.2021.9652997","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652997","url":null,"abstract":"This paper provides an overview of the security service controls that are applied in a big data processing (BDP) system to defend against cyber security attacks. We validate this approach by modeling attacks and effectiveness of security service controls in a sequence of states and transitions. This Finite State Machine (FSM) approach uses the probable effectiveness of security service controls, as defined in the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). The attacks used in the model are defined in the ATT&CK™ framework. Five different BDP security architecture configurations are considered, spanning from a low-cost default BDP configuration to a more expensive, industry supported layered security architecture. The analysis demonstrates the importance of a multi-layer approach to implementing security in BDP systems. With increasing interest in using BDP systems to analyze sensitive data sets, it is important to understand and justify BDP security architecture configurations with their significant costs. The output of the model demonstrates that over the run time, larger investment in security service controls results in significantly more uptime. There is a significant increase in uptime with a linear increase in security service control investment. We believe that these results support our recommended BDP security architecture. That is, a layered architecture with security service controls integrated into the user interface, boundary, central management of security policies, and applications that incorporate privacy preserving programs. These results enable making BDP systems operational for sensitive data accessed in a multi-tenant environment.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124488235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Terrain-Scatter Augmented Vertical Plane Model for Radio Path Loss Estimation in Complex Terrain: (Invited Paper) 地形散射增强垂直平面模型在复杂地形下的无线电路径损失估计(特邀论文)
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653008
D. Breton, C. Haedrich
The fundamental challenge of complex (typically mountainous or urban) terrain for radio-frequency systems is that a direct line-of-sight is difficult or impossible to achieve between a radio transmitter and receiver. In the context of ground-based military operations, occupying line-of-sight positions to optimize communications or surveillance capabilities often exposes Soldiers and/or equipment to unacceptable risks from both conventional and electronic warfare. Propagation models for tactical use commonly analyze terrain only in the vertical plane containing both transmitter and receiver in order to simplify both the required data and computational burdens. However, these advantages come at the cost of ignoring reflections from topography within and outside the vertical plane path, which can have serious implications for radio-frequency direction finding, surveillance, and high-speed data transfer in complex terrain. This work summarizes our efforts to address these issues by developing a hybrid path loss model, one specifically designed for ground-to-ground radio links in complex rural terrain. The model uses an existing international-standard vertical plane diffraction model (VPM) to account for path losses associated with obstacles, and then augments those results with geospatially derived terrain reflection/scattering effects. Our prototype Terrain Scatter Augmented Vertical Plane Model (TSAVPM) provides physically credible path loss results in complex terrain at tactically relevant spatial scales (∼250 sq. km) and computational costs (under 40 seconds on a single 4.2 GHz central processing unit).
对于射频系统来说,复杂地形(通常是山区或城市)的根本挑战是无线电发射机和接收机之间很难或不可能实现直接的视线。在地面军事行动的背景下,占领视线位置以优化通信或监视能力通常会使士兵和/或设备面临常规和电子战的不可接受的风险。战术传播模型通常只在包含发射器和接收器的垂直平面上分析地形,以简化所需的数据和计算负担。然而,这些优势的代价是忽略了垂直平面路径内外地形的反射,这可能对复杂地形中的射频测向、监视和高速数据传输产生严重影响。这项工作总结了我们通过开发一种混合路径损耗模型来解决这些问题的努力,该模型是专门为复杂农村地形的地对地无线电链路设计的。该模型使用现有的国际标准垂直平面衍射模型(VPM)来考虑与障碍物相关的路径损失,然后使用地理空间衍生的地形反射/散射效应来增强这些结果。我们的原型地形散射增强垂直平面模型(TSAVPM)在战术相关空间尺度(~ 250平方公里)的复杂地形中提供物理可信的路径损失结果。km)和计算成本(在单个4.2 GHz中央处理器上不到40秒)。
{"title":"Terrain-Scatter Augmented Vertical Plane Model for Radio Path Loss Estimation in Complex Terrain: (Invited Paper)","authors":"D. Breton, C. Haedrich","doi":"10.1109/MILCOM52596.2021.9653008","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653008","url":null,"abstract":"The fundamental challenge of complex (typically mountainous or urban) terrain for radio-frequency systems is that a direct line-of-sight is difficult or impossible to achieve between a radio transmitter and receiver. In the context of ground-based military operations, occupying line-of-sight positions to optimize communications or surveillance capabilities often exposes Soldiers and/or equipment to unacceptable risks from both conventional and electronic warfare. Propagation models for tactical use commonly analyze terrain only in the vertical plane containing both transmitter and receiver in order to simplify both the required data and computational burdens. However, these advantages come at the cost of ignoring reflections from topography within and outside the vertical plane path, which can have serious implications for radio-frequency direction finding, surveillance, and high-speed data transfer in complex terrain. This work summarizes our efforts to address these issues by developing a hybrid path loss model, one specifically designed for ground-to-ground radio links in complex rural terrain. The model uses an existing international-standard vertical plane diffraction model (VPM) to account for path losses associated with obstacles, and then augments those results with geospatially derived terrain reflection/scattering effects. Our prototype Terrain Scatter Augmented Vertical Plane Model (TSAVPM) provides physically credible path loss results in complex terrain at tactically relevant spatial scales (∼250 sq. km) and computational costs (under 40 seconds on a single 4.2 GHz central processing unit).","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116724175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond $L_{p}$ Norms: Delving Deeper into Robustness to Physical Image Transformations 超越$L_{p}$规范:深入研究物理图像变换的鲁棒性
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653101
Vikash Sehwag, J. W. Stokes, Cha Zhang
With the increasing adoption of deep learning in computer vision-based applications, it becomes critical to achieve robustness to real-world image transformations, such as geometric, photometric, and weather changes, even in the presence of an adversary. However, earlier work has focused on only a few transformations, such as image translation, rotation, or coloring. We close this gap by analyzing and improving robustness against twenty-four different physical transformations. First, we demonstrate that adversarial attacks based on each physical transformation significantly reduce the accuracy of deep neural networks. Next, we achieve robustness against these attacks based on adversarial training, where we show that single-step data augmentation significantly improves robustness against these attacks. We also demonstrate the generalization of robustness to these types of attacks, where robustness achieved against one attack also generalizes to some other attack vectors. Finally, we show that using an ensemble-based robust training approach, robustness against multiple attacks can be achieved simultaneously by a single network. In particular, our proposed method improves the aggregate robustness, against twenty-four different attacks, from 21.4% to 50.0% on the ImageNet dataset.
随着基于计算机视觉的应用越来越多地采用深度学习,即使在对手存在的情况下,实现对真实世界图像变换(如几何、光度和天气变化)的鲁棒性也变得至关重要。然而,早期的工作只关注少数转换,如图像平移、旋转或着色。我们通过分析和改进针对24种不同物理转换的健壮性来缩小这一差距。首先,我们证明了基于每个物理变换的对抗性攻击显著降低了深度神经网络的准确性。接下来,我们基于对抗性训练实现了对这些攻击的鲁棒性,其中我们表明单步数据增强显着提高了对这些攻击的鲁棒性。我们还演示了对这些类型攻击的鲁棒性的泛化,其中针对一种攻击获得的鲁棒性也泛化到其他一些攻击向量。最后,我们证明了使用基于集成的鲁棒性训练方法,可以通过单个网络同时实现对多种攻击的鲁棒性。特别是,我们提出的方法提高了总体鲁棒性,针对24种不同的攻击,在ImageNet数据集上从21.4%提高到50.0%。
{"title":"Beyond $L_{p}$ Norms: Delving Deeper into Robustness to Physical Image Transformations","authors":"Vikash Sehwag, J. W. Stokes, Cha Zhang","doi":"10.1109/MILCOM52596.2021.9653101","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653101","url":null,"abstract":"With the increasing adoption of deep learning in computer vision-based applications, it becomes critical to achieve robustness to real-world image transformations, such as geometric, photometric, and weather changes, even in the presence of an adversary. However, earlier work has focused on only a few transformations, such as image translation, rotation, or coloring. We close this gap by analyzing and improving robustness against twenty-four different physical transformations. First, we demonstrate that adversarial attacks based on each physical transformation significantly reduce the accuracy of deep neural networks. Next, we achieve robustness against these attacks based on adversarial training, where we show that single-step data augmentation significantly improves robustness against these attacks. We also demonstrate the generalization of robustness to these types of attacks, where robustness achieved against one attack also generalizes to some other attack vectors. Finally, we show that using an ensemble-based robust training approach, robustness against multiple attacks can be achieved simultaneously by a single network. In particular, our proposed method improves the aggregate robustness, against twenty-four different attacks, from 21.4% to 50.0% on the ImageNet dataset.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116748191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterization and Modeling of Frequency-Selective Ship-to-Ship Channels 频率选择船对船信道的表征和建模
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652980
Jae Y. Park, Florendo S. Encarnado, C. R. Flint, K. Redwine
Recent expansion of wireless radio frequency (RF) communications services to the maritime environment has attracted increased attention to propagation and channel modeling over the sea surface. The study of RF maritime propagation has a long history, but much research is still needed to characterize and model the ship-to-ship communication channel. In this paper, the phenomenon of the ship-to-ship channel being frequency selective is introduced. It is demonstrated that this frequency selectivity depends on signal bandwidth and link range, but not on delay spread, a metric typically applied in classifying terrestrial fading channels. Another distinctive feature of this channel is that the sea surface-reflected multipath delay is less than 1 nanosecond. Taking the extremely short delay into account, modeling of the ship-to-ship channel is provided for waveform performance analysis. Performance of coherent binary phase-shift keying (BPSK) is evaluated using the model developed. Results show that the BPSK performance degradation due to maritime fading can be substantial, especially for wideband signals, producing irreducible errors.
最近无线射频(RF)通信服务在海洋环境中的扩展引起了人们对海面传播和信道建模的越来越多的关注。射频海上传播的研究已经有了很长的历史,但是舰对舰通信信道的表征和建模仍然需要大量的研究。本文介绍了舰对舰信道的频率选择性现象。结果表明,这种频率选择性取决于信号带宽和链路范围,而不取决于延迟扩展,这是一种通常用于分类地面衰落信道的度量。该信道的另一个显著特征是海面反射的多径延迟小于1纳秒。考虑到极短的时延,对舰对舰信道进行建模,进行波形性能分析。利用该模型对相干二相移键控(BPSK)的性能进行了评价。结果表明,由于海上衰落导致的BPSK性能下降可能是实质性的,特别是对于宽带信号,产生不可减小的误差。
{"title":"Characterization and Modeling of Frequency-Selective Ship-to-Ship Channels","authors":"Jae Y. Park, Florendo S. Encarnado, C. R. Flint, K. Redwine","doi":"10.1109/MILCOM52596.2021.9652980","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652980","url":null,"abstract":"Recent expansion of wireless radio frequency (RF) communications services to the maritime environment has attracted increased attention to propagation and channel modeling over the sea surface. The study of RF maritime propagation has a long history, but much research is still needed to characterize and model the ship-to-ship communication channel. In this paper, the phenomenon of the ship-to-ship channel being frequency selective is introduced. It is demonstrated that this frequency selectivity depends on signal bandwidth and link range, but not on delay spread, a metric typically applied in classifying terrestrial fading channels. Another distinctive feature of this channel is that the sea surface-reflected multipath delay is less than 1 nanosecond. Taking the extremely short delay into account, modeling of the ship-to-ship channel is provided for waveform performance analysis. Performance of coherent binary phase-shift keying (BPSK) is evaluated using the model developed. Results show that the BPSK performance degradation due to maritime fading can be substantial, especially for wideband signals, producing irreducible errors.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117214038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1