首页 > 最新文献

MILCOM 2005 - 2005 IEEE Military Communications Conference最新文献

英文 中文
SYN-DMAC: a directional MAC protocol for ad hoc networks with synchronization SYN-DMAC:用于具有同步功能的ad hoc网络的定向MAC协议
Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1606005
J. Wang, Y. Fang, D. Wu
Directional antenna has received intensive research interests in recent years due to its potential to increase communication efficiency and resilience to interference and jamming. In this paper, we provide a novel directional MAC protocol termed SYN-DMAC for ad hoc networks with synchronization. We demonstrate our proposed SYN-DMAC can efficiently address the major open problems in the directional MAC design such as the deafness problem, the hidden terminal problem, the exposed terminal problem and the head-of-line (HOL) blocking problem. Preliminary simulation results show that our scheme significantly improves throughput in comparison with IEEE 802.11 MAC protocol
定向天线由于具有提高通信效率和抗干扰能力的优点,近年来受到了广泛的研究。本文提出了一种新的定向MAC协议,称为SYN-DMAC,用于具有同步功能的ad hoc网络。结果表明,本文提出的SYN-DMAC可以有效地解决定向MAC设计中的主要开放性问题,如失聪问题、隐藏终端问题、暴露终端问题和线路首阻塞问题。初步仿真结果表明,与IEEE 802.11 MAC协议相比,该方案显著提高了吞吐量
{"title":"SYN-DMAC: a directional MAC protocol for ad hoc networks with synchronization","authors":"J. Wang, Y. Fang, D. Wu","doi":"10.1109/MILCOM.2005.1606005","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606005","url":null,"abstract":"Directional antenna has received intensive research interests in recent years due to its potential to increase communication efficiency and resilience to interference and jamming. In this paper, we provide a novel directional MAC protocol termed SYN-DMAC for ad hoc networks with synchronization. We demonstrate our proposed SYN-DMAC can efficiently address the major open problems in the directional MAC design such as the deafness problem, the hidden terminal problem, the exposed terminal problem and the head-of-line (HOL) blocking problem. Preliminary simulation results show that our scheme significantly improves throughput in comparison with IEEE 802.11 MAC protocol","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126789662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Asynchronous energy-efficient MAC protocols for wireless sensor networks 无线传感器网络的异步节能MAC协议
Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605942
Qingchun Ren, Q. Liang
In this paper, we propose two asynchronous energy-efficient MAC protocols: A-MAC and ASCEMAC, from contention- and schedule-based perspectives correspondingly. Through applying free-running method, novel rescheduling and time-slot allocation schemes, A-MAC and ASCEMAC do not require network time synchronization any more, which is necessary in existing energy-efficient MAC protocols. So, our algorithms are more suitable for the system which is difficult to ensure perfect network time synchronization. Moreover, we present a traffic-intensity- and network-density-based model to compute essential algorithm parameters: power on/off duration, interval of schedule broadcast, as well as super-time-slot size and sequence
本文分别从争用和调度的角度提出了两种异步节能的MAC协议:A-MAC和ASCEMAC。通过采用自由运行方法、新颖的重调度和时隙分配方案,A-MAC和ASCEMAC不再需要网络时间同步,而这在现有的高能效MAC协议中是必需的。因此,我们的算法更适合于难以保证完美网络时间同步的系统。此外,我们提出了一个基于流量强度和网络密度的模型来计算基本算法参数:开/关时间、调度广播间隔以及超时隙大小和顺序
{"title":"Asynchronous energy-efficient MAC protocols for wireless sensor networks","authors":"Qingchun Ren, Q. Liang","doi":"10.1109/MILCOM.2005.1605942","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605942","url":null,"abstract":"In this paper, we propose two asynchronous energy-efficient MAC protocols: A-MAC and ASCEMAC, from contention- and schedule-based perspectives correspondingly. Through applying free-running method, novel rescheduling and time-slot allocation schemes, A-MAC and ASCEMAC do not require network time synchronization any more, which is necessary in existing energy-efficient MAC protocols. So, our algorithms are more suitable for the system which is difficult to ensure perfect network time synchronization. Moreover, we present a traffic-intensity- and network-density-based model to compute essential algorithm parameters: power on/off duration, interval of schedule broadcast, as well as super-time-slot size and sequence","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123290737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security protocols in wireless tactical sensor networks 无线战术传感器网络中的安全协议
Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605883
D. Vergados, G. Stergiou
Advances in technology led to the development of sensor networks at low cost. Sensor networks can he used in several application areas including military, health, home, environmental and space exploration. Sensor nodes have several constraints, like limited computational and energy resources that pose design issues to researchers. In tactical sensor networks security plays an important role, since these networks are deployed in hostile environments and run safety-critical applications. This paper presents security protocols used in wireless networks and considers how well these algorithms can he applied to wireless tactical sensor networks
技术的进步促使传感器网络以低成本发展。传感器网络可用于多个应用领域,包括军事、卫生、家庭、环境和空间探索。传感器节点有一些限制,比如有限的计算和能源资源,给研究人员带来了设计问题。在战术传感器网络中,安全起着重要作用,因为这些网络部署在敌对环境中并运行安全关键应用。本文介绍了无线网络中使用的安全协议,并考虑了这些算法在无线战术传感器网络中的应用
{"title":"Security protocols in wireless tactical sensor networks","authors":"D. Vergados, G. Stergiou","doi":"10.1109/MILCOM.2005.1605883","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605883","url":null,"abstract":"Advances in technology led to the development of sensor networks at low cost. Sensor networks can he used in several application areas including military, health, home, environmental and space exploration. Sensor nodes have several constraints, like limited computational and energy resources that pose design issues to researchers. In tactical sensor networks security plays an important role, since these networks are deployed in hostile environments and run safety-critical applications. This paper presents security protocols used in wireless networks and considers how well these algorithms can he applied to wireless tactical sensor networks","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126428351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid end-to-end QOS architecture for heterogeneous networks (like the global information grid) 用于异构网络(如全球信息网格)的混合端到端QOS体系结构
Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1606078
B. Doshi, L. Benmohamed, A. DeSimone
In this paper, we discuss an architecture and several mechanisms for meeting the quality of service (QoS) requirements of a set of very diverse applications over networks of very heterogeneous network domains. Many of these domains have significant mobility and temporal variation in resource capacities. While DoD 's global information grid (the GIG) is a prime example of a network of this type, commercial Internet and intranets increasingly face similar QoS requirements and operate in similar heterogeneous and dynamic environments. Meeting these challenges and still maintaining high resource efficiency, involves mechanisms in data, control, and management planes. In addition to meeting the QoS requirements of applications, these mechanisms also need to honor the importance level of the user and mission involved in the application. Thus, these mechanisms also perform policy based triage function when the requirements of all users and applications cannot be satisfied due to unexpectedly high demand or unexpected reduction in capacity due to failure, weather condition, etc. The architecture we propose here groups applications into service classes, each with its QoS requirements. Any specific instance of an application has an importance level (IL) determined by organizational policy. We use the requirements, one set for each service class-IL combination, as key drivers for designing a hybrid architecture involving session level admission control and preemption for session oriented service classes, and a packet level marking scheme allowing differential treatment of packets from different service classes and from different ILs.
在本文中,我们讨论了一种体系结构和几种机制,用于在非常异构的网络域的网络上满足一组非常不同的应用程序的服务质量(QoS)需求。其中许多领域在资源能力方面具有重大的流动性和时间变化。虽然国防部的全球信息网格(GIG)是这种类型网络的主要例子,但商业互联网和内部网越来越多地面临类似的QoS需求,并在类似的异构和动态环境中运行。应对这些挑战并保持较高的资源效率,涉及数据、控制和管理平面的机制。除了满足应用程序的QoS要求外,这些机制还需要尊重应用程序中涉及的用户和任务的重要性级别。因此,当由于意外的高需求或由于故障、天气条件等导致的容量意外减少而无法满足所有用户和应用程序的需求时,这些机制还执行基于策略的分类功能。我们在这里提出的体系结构将应用程序分组为服务类,每个服务类都有其QoS需求。应用程序的任何特定实例都具有由组织策略确定的重要性级别(IL)。我们使用需求作为设计混合架构的关键驱动因素,其中涉及面向会话的服务类别的会话级别准入控制和抢占,以及允许对来自不同服务类别和不同il的数据包进行区别处理的数据包级别标记方案。
{"title":"A hybrid end-to-end QOS architecture for heterogeneous networks (like the global information grid)","authors":"B. Doshi, L. Benmohamed, A. DeSimone","doi":"10.1109/MILCOM.2005.1606078","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606078","url":null,"abstract":"In this paper, we discuss an architecture and several mechanisms for meeting the quality of service (QoS) requirements of a set of very diverse applications over networks of very heterogeneous network domains. Many of these domains have significant mobility and temporal variation in resource capacities. While DoD 's global information grid (the GIG) is a prime example of a network of this type, commercial Internet and intranets increasingly face similar QoS requirements and operate in similar heterogeneous and dynamic environments. Meeting these challenges and still maintaining high resource efficiency, involves mechanisms in data, control, and management planes. In addition to meeting the QoS requirements of applications, these mechanisms also need to honor the importance level of the user and mission involved in the application. Thus, these mechanisms also perform policy based triage function when the requirements of all users and applications cannot be satisfied due to unexpectedly high demand or unexpected reduction in capacity due to failure, weather condition, etc. The architecture we propose here groups applications into service classes, each with its QoS requirements. Any specific instance of an application has an importance level (IL) determined by organizational policy. We use the requirements, one set for each service class-IL combination, as key drivers for designing a hybrid architecture involving session level admission control and preemption for session oriented service classes, and a packet level marking scheme allowing differential treatment of packets from different service classes and from different ILs.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A soft decision output convolutional decoder based on the application of neural networks 基于神经网络应用的软判决输出卷积解码器
Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605888
S. Berber
The paper investigates BER characteristics of a new algorithm for decoding convolutional codes based on neural networks. The novelty of the algorithm is in its capability to generate soft output estimates of the message bits encoded. It is shown that the defined noise energy function, which is traditionally used for the soft decoding algorithm of convolutional codes, can be related to the well known log likelihood function. The coding gain is calculated using a developed simulator of a coding communication system that uses a systematic 1/2-rate convolutional code
研究了一种基于神经网络的卷积码译码算法的误码率特性。该算法的新颖之处在于它能够对编码的消息位生成软输出估计。研究表明,卷积码软译码算法中常用的定义噪声能量函数可以与对数似然函数相关联。编码增益的计算使用一个开发的编码通信系统的模拟器,该系统使用系统的1/2-速率卷积码
{"title":"A soft decision output convolutional decoder based on the application of neural networks","authors":"S. Berber","doi":"10.1109/MILCOM.2005.1605888","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605888","url":null,"abstract":"The paper investigates BER characteristics of a new algorithm for decoding convolutional codes based on neural networks. The novelty of the algorithm is in its capability to generate soft output estimates of the message bits encoded. It is shown that the defined noise energy function, which is traditionally used for the soft decoding algorithm of convolutional codes, can be related to the well known log likelihood function. The coding gain is calculated using a developed simulator of a coding communication system that uses a systematic 1/2-rate convolutional code","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122554277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance evaluation of 2-element arrays of circular patch antennas in indoor clustered MIMO channels 室内集群MIMO信道中圆形贴片天线2元阵列的性能评价
Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605655
A. Forenza, R. Heath
In this paper we present a computationally efficient method to evaluate the performance of circular patch arrays (CPAs) in clustered MIMO channel models. The proposed method is based on bounds to the eigenvalues of the spatial correlation matrix that are shown to depend only on the channel angle spread. From these bounds, we derive a closed-form expression of the MIMO ergodic capacity as a function of the angle spread, which is used to estimate the performance of CPAs in different propagation environments. This method yields dramatic reduction in computational complexity due to the reduced number of channel parameters required for performance evaluation of CPAs. Simulation results show that through this method it is possible to predict the performance of CPAs, with negligible capacity loss (below 2%), for the most practical channel scenarios
在本文中,我们提出了一种计算效率高的方法来评估圆形贴片阵列(CPAs)在集群MIMO信道模型中的性能。所提出的方法是基于空间相关矩阵的特征值的边界,这些特征值仅取决于信道角扩展。在此基础上,我们推导出了MIMO遍历容量作为角度扩展函数的封闭表达式,该表达式用于估计不同传播环境下CPAs的性能。由于减少了cpa性能评估所需的通道参数数量,该方法大大降低了计算复杂性。仿真结果表明,通过这种方法可以预测cpa的性能,在大多数实际信道场景下,容量损失可以忽略不计(低于2%)
{"title":"Performance evaluation of 2-element arrays of circular patch antennas in indoor clustered MIMO channels","authors":"A. Forenza, R. Heath","doi":"10.1109/MILCOM.2005.1605655","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605655","url":null,"abstract":"In this paper we present a computationally efficient method to evaluate the performance of circular patch arrays (CPAs) in clustered MIMO channel models. The proposed method is based on bounds to the eigenvalues of the spatial correlation matrix that are shown to depend only on the channel angle spread. From these bounds, we derive a closed-form expression of the MIMO ergodic capacity as a function of the angle spread, which is used to estimate the performance of CPAs in different propagation environments. This method yields dramatic reduction in computational complexity due to the reduced number of channel parameters required for performance evaluation of CPAs. Simulation results show that through this method it is possible to predict the performance of CPAs, with negligible capacity loss (below 2%), for the most practical channel scenarios","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123112719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Survivability analysis of distributed systems using attack tree methodology 利用攻击树方法分析分布式系统的生存能力
Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605745
Casey K. Fung, Yi-Liang Chen, Xinyu Wang, J. Lee, R. Tarquini, M. Anderson, R. Linger
The survivability of system services is defined as the capability of system services to fulfil the mission objectives in the presence of malicious attacks, system failures, or accidents. Because of the severe consequences of system service failures, survivability analysis and mitigation solutions have been regarded as two of the most important aspects in distributed system development. In systems based on service-oriented architectures (SOA), the survivability analysis is fundamentally different from the traditional security-centric approaches that have been developed for traditional object-oriented, component-based systems. Under the new SOA paradigm, a system is regarded as a composition of services, each of which has well-defined goals and functionalities. For as long as a service is an independently developed component with well-defined goals and functionalities, the service can be treated as an independent system in the analysis of survivability. This paper presents an initial case study in adopting the attack tree analysis methodology for survivability study. We proposed a generic model for message-oriented systems based on SOA. This model depicts a messaging substrate composed of a group of messaging brokers with help from discover services and QoS managers to coordinate communication of a service overlay network on top of a mobile ad-hoc network (MANET). We first captured the basic service components in the system and the underlying mobile ad-hoc network. Next, we defined a mission objective in a case study and conducted attack tree analysis on the model system. From the attack tree analysis, we identified intrusion scenarios. Then we suggested a quantitative measure for system survivability. The survivability design task for a system is simply to make intrusion on the identified key components as difficult and costly as possible. From this case study, we identified the compromisable components that could be penetrated and damaged by intrusion and provided suggestions to enhance system survivability
系统服务的生存能力被定义为系统服务在存在恶意攻击、系统故障或事故的情况下完成任务目标的能力。由于系统服务故障的严重后果,生存性分析和缓解方案已被视为分布式系统开发中最重要的两个方面。在基于面向服务的体系结构(SOA)的系统中,生存能力分析与为传统的面向对象、基于组件的系统开发的传统的以安全为中心的方法有着根本的不同。在新的SOA范例下,系统被视为服务的组合,每个服务都有定义良好的目标和功能。只要服务是具有良好定义的目标和功能的独立开发组件,那么在分析生存能力时就可以将服务视为独立的系统。本文介绍了采用攻击树分析方法进行生存能力研究的初步案例研究。我们提出了一个基于SOA的面向消息系统的通用模型。该模型描述了一个由一组消息传递代理组成的消息传递基础,这些代理在发现服务和QoS管理器的帮助下协调移动自组织网络(MANET)之上的服务覆盖网络的通信。我们首先捕获了系统中的基本服务组件和底层移动自组织网络。接下来,我们在案例研究中定义了任务目标,并对模型系统进行了攻击树分析。通过攻击树分析,我们确定了入侵场景。在此基础上,提出了系统生存能力的定量度量方法。系统的生存性设计任务只是使入侵识别的关键组件变得尽可能困难和昂贵。从这个案例研究中,我们确定了可能被入侵渗透和损坏的可妥协组件,并提供了增强系统生存能力的建议
{"title":"Survivability analysis of distributed systems using attack tree methodology","authors":"Casey K. Fung, Yi-Liang Chen, Xinyu Wang, J. Lee, R. Tarquini, M. Anderson, R. Linger","doi":"10.1109/MILCOM.2005.1605745","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605745","url":null,"abstract":"The survivability of system services is defined as the capability of system services to fulfil the mission objectives in the presence of malicious attacks, system failures, or accidents. Because of the severe consequences of system service failures, survivability analysis and mitigation solutions have been regarded as two of the most important aspects in distributed system development. In systems based on service-oriented architectures (SOA), the survivability analysis is fundamentally different from the traditional security-centric approaches that have been developed for traditional object-oriented, component-based systems. Under the new SOA paradigm, a system is regarded as a composition of services, each of which has well-defined goals and functionalities. For as long as a service is an independently developed component with well-defined goals and functionalities, the service can be treated as an independent system in the analysis of survivability. This paper presents an initial case study in adopting the attack tree analysis methodology for survivability study. We proposed a generic model for message-oriented systems based on SOA. This model depicts a messaging substrate composed of a group of messaging brokers with help from discover services and QoS managers to coordinate communication of a service overlay network on top of a mobile ad-hoc network (MANET). We first captured the basic service components in the system and the underlying mobile ad-hoc network. Next, we defined a mission objective in a case study and conducted attack tree analysis on the model system. From the attack tree analysis, we identified intrusion scenarios. Then we suggested a quantitative measure for system survivability. The survivability design task for a system is simply to make intrusion on the identified key components as difficult and costly as possible. From this case study, we identified the compromisable components that could be penetrated and damaged by intrusion and provided suggestions to enhance system survivability","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126314171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Disruption tolerant networking for heterogeneous ad-hoc networks 异构ad-hoc网络的容错网络
Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605995
K. Fall
Heterogeneous ad-hoc networks, for both military and scientific applications, may be far removed from communications infrastructure such as the Internet. Yet, to be maximally useful, these networks must ultimately be connected to data storage and analysis facilities. Providing connectivity for such networks may involve exotic and unusual methods of data transfer, including acoustic, free space optical, satellite, and data mule forms of network links. problems of intermittent connectivity due to power scheduling, node failure, and packet losses from unpredictable external factors are frequently encountered. In addition, due to the myriad of assets employed, a high degree of network heterogeneity is encountered. As an approach to dealing with these two major issues, we propose the use of the disruption tolerant networking (DTN) architecture, which provides reliable asynchronous data communication across heterogeneous, failure-prone networks
用于军事和科学应用的异构自组织网络可能远离通信基础设施,如因特网。然而,为了最大限度地发挥作用,这些网络最终必须连接到数据存储和分析设施。为这样的网络提供连接可能涉及特殊的和不寻常的数据传输方法,包括网络链接的声学、自由空间光学、卫星和数据骡子形式。由于电源调度、节点故障和不可预测的外部因素造成的数据包丢失而导致的间歇性连接问题经常会遇到。此外,由于所使用的资产众多,因此会遇到高度的网络异构性。作为处理这两个主要问题的一种方法,我们建议使用中断容忍网络(DTN)架构,它在异构的、容易发生故障的网络中提供可靠的异步数据通信
{"title":"Disruption tolerant networking for heterogeneous ad-hoc networks","authors":"K. Fall","doi":"10.1109/MILCOM.2005.1605995","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605995","url":null,"abstract":"Heterogeneous ad-hoc networks, for both military and scientific applications, may be far removed from communications infrastructure such as the Internet. Yet, to be maximally useful, these networks must ultimately be connected to data storage and analysis facilities. Providing connectivity for such networks may involve exotic and unusual methods of data transfer, including acoustic, free space optical, satellite, and data mule forms of network links. problems of intermittent connectivity due to power scheduling, node failure, and packet losses from unpredictable external factors are frequently encountered. In addition, due to the myriad of assets employed, a high degree of network heterogeneity is encountered. As an approach to dealing with these two major issues, we propose the use of the disruption tolerant networking (DTN) architecture, which provides reliable asynchronous data communication across heterogeneous, failure-prone networks","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126406687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ensuring the security of warfighters' satcom via programmable cryptographic devices 通过可编程加密设备确保作战人员卫星通信的安全
Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605742
J. Bull
The National Security Agency's Cryptographic Modernization Initiative (CMI) has far reaching implications for the Information Assurance required on military satellites. The programmability tenet, one of six tenets defined in the National Security Agency (NSA)/Central Security Service (CSS) Policy 3-9, provides the greatest return on investment (ROI) by prolonging a satellite's useful life, but also presents the greatest technological risk. This paper explores trades between current performance capabilities and programmability based on available and planned technology. Algorithm transitioning, forecasting the size and complexity of future algorithms, recertification, and redundancy are technology concerns that are addressed. Several issues are highlighted and a process is proposed that can be used to determine the best return on investment for the government, including technology projections and cost as an independent variable. The end goal is ensuring the security of the Warfighter
美国国家安全局的加密现代化倡议(CMI)对军事卫星所需的信息保障具有深远的影响。可编程原则是国家安全局(NSA)/中央安全局(CSS)政策3-9中定义的六个原则之一,通过延长卫星的使用寿命提供了最大的投资回报(ROI),但也带来了最大的技术风险。本文探讨了基于可用和计划的技术的当前性能能力和可编程性之间的交易。算法转换、预测未来算法的大小和复杂性、重新认证和冗余是需要解决的技术问题。本文强调了几个问题,并提出了一个可用于确定政府最佳投资回报的过程,包括技术预测和成本作为一个独立变量。最终目标是确保战士的安全
{"title":"Ensuring the security of warfighters' satcom via programmable cryptographic devices","authors":"J. Bull","doi":"10.1109/MILCOM.2005.1605742","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605742","url":null,"abstract":"The National Security Agency's Cryptographic Modernization Initiative (CMI) has far reaching implications for the Information Assurance required on military satellites. The programmability tenet, one of six tenets defined in the National Security Agency (NSA)/Central Security Service (CSS) Policy 3-9, provides the greatest return on investment (ROI) by prolonging a satellite's useful life, but also presents the greatest technological risk. This paper explores trades between current performance capabilities and programmability based on available and planned technology. Algorithm transitioning, forecasting the size and complexity of future algorithms, recertification, and redundancy are technology concerns that are addressed. Several issues are highlighted and a process is proposed that can be used to determine the best return on investment for the government, including technology projections and cost as an independent variable. The end goal is ensuring the security of the Warfighter","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122200149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive fault localization in mobile ad hoc battlefield networks 移动自组织战场网络的自适应故障定位
Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605781
M. Natu, A. Sethi
Future battlefield networks require extensive fault management mechanism. Most existing fault localization algorithms assume availability of complete and/or deterministic dependency model. Such assumptions cannot be made in the dynamic environment of a battlefield network where nodes may move, causing periodic changes in routes. This paper is aimed at developing a fault diagnosis architecture and algorithm, which address the issue of dynamically changing dependencies in battlefield networks
未来战场网络需要广泛的故障管理机制。现有的故障定位算法大多假设存在完全或确定性的依赖模型。这样的假设不能在战场网络的动态环境中做出,因为战场网络中的节点可能会移动,导致路径的周期性变化。本文旨在开发一种故障诊断体系结构和算法,以解决战场网络中依赖关系动态变化的问题
{"title":"Adaptive fault localization in mobile ad hoc battlefield networks","authors":"M. Natu, A. Sethi","doi":"10.1109/MILCOM.2005.1605781","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605781","url":null,"abstract":"Future battlefield networks require extensive fault management mechanism. Most existing fault localization algorithms assume availability of complete and/or deterministic dependency model. Such assumptions cannot be made in the dynamic environment of a battlefield network where nodes may move, causing periodic changes in routes. This paper is aimed at developing a fault diagnosis architecture and algorithm, which address the issue of dynamically changing dependencies in battlefield networks","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114218058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
MILCOM 2005 - 2005 IEEE Military Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1