首页 > 最新文献

MILCOM 2009 - 2009 IEEE Military Communications Conference最新文献

英文 中文
A statistical traffic pattern discovery system for MANETs 面向manet的统计流量模式发现系统
Pub Date : 2014-03-01 DOI: 10.1109/TDSC.2013.33
Yang Qin, Dijiang Huang, Bing Li
Anonymous MANET routing relies on techniques such as re-encryption on each hop to hide end-to-end communication relations. However, passive signal detectors and traffic analyzers can still retrieve sensitive information from PHY and MAC layers through statistical traffic analysis. In this paper, we propose a statistical traffic pattern discovery (STPD) system. STPD intends to find out the sources and destinations of captured packets and discover the end-to-end communication relations. The proposed approach does not require analyzers to be actively involved in MANET transmissions or to decrypt the traffic. We present theoretical models as well as extensive simulations to demonstrate our solutions.
匿名MANET路由依赖于每一跳的重新加密等技术来隐藏端到端的通信关系。然而,被动信号检测器和流量分析器仍然可以通过统计流量分析从物理层和MAC层检索敏感信息。本文提出了一种统计流量模式发现(STPD)系统。STPD的目的是找出捕获报文的源和目的,发现端到端的通信关系。提出的方法不需要分析器积极参与MANET传输或解密流量。我们提出了理论模型以及广泛的模拟来证明我们的解决方案。
{"title":"A statistical traffic pattern discovery system for MANETs","authors":"Yang Qin, Dijiang Huang, Bing Li","doi":"10.1109/TDSC.2013.33","DOIUrl":"https://doi.org/10.1109/TDSC.2013.33","url":null,"abstract":"Anonymous MANET routing relies on techniques such as re-encryption on each hop to hide end-to-end communication relations. However, passive signal detectors and traffic analyzers can still retrieve sensitive information from PHY and MAC layers through statistical traffic analysis. In this paper, we propose a statistical traffic pattern discovery (STPD) system. STPD intends to find out the sources and destinations of captured packets and discover the end-to-end communication relations. The proposed approach does not require analyzers to be actively involved in MANET transmissions or to decrypt the traffic. We present theoretical models as well as extensive simulations to demonstrate our solutions.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127869265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
The benefits of a network tasking order in combat search and rescue missions 网络任务顺序在战斗搜索和救援任务中的好处
Pub Date : 2012-10-10 DOI: 10.1109/milcom.2009.5380128
M. Gocmen, K. Hopkinson, M. Compton
Networked communications play a crucial role in United States Armed Forces operations. As the military moves towards more network centric (Net-Centric) operations, it becomes increasingly important to use the network as effectively as possible with respect to the overall mission. This article advocates the use of a Network Tasking Order (NTO), which allows operators to reason about the network based on asset movement, capabilities, and communication requirements. The NTO is similar to the Air Tasking Order, which gives insight into the plan for physical assets in a military mission. In this paper we illustrate the benefit of an NTO in a Combat Search and Rescue (CSAR) scenario. While demonstrating the CSAR mission, we assume the use of the Joint Tactical Radio System (JTRS) for communication. Our premise is that the knowledge in an NTO can be used to achieve better CSAR missions and yield better decision-making opportunities to the mission commanders. Our results show that the End-to-End (ETE) delay with the aid of an NTO in high traffic conditions is shorter compared to those without the NTO and bandwidth requirements are also lower. In low traffic conditions, the ETE delay is shorter without the aid of an NTO, but at the cost of higher bandwidth utilization.
网络通信在美国武装部队的行动中起着至关重要的作用。随着军事向更多的网络中心(Net-Centric)作战方向发展,就整体任务而言,尽可能有效地使用网络变得越来越重要。本文提倡使用网络任务命令(NTO),它允许运营商根据资产移动、能力和通信需求来推断网络。NTO类似于“空中任务令”,可以深入了解军事任务中实物资产的计划。在本文中,我们说明了NTO在战斗搜索和救援(CSAR)场景中的好处。在演示CSAR任务时,我们假设使用联合战术无线电系统(JTRS)进行通信。我们的前提是,NTO中的知识可以用于实现更好的CSAR任务,并为任务指挥官提供更好的决策机会。我们的研究结果表明,在高流量条件下,与没有NTO的情况相比,使用NTO的端到端(ETE)延迟更短,带宽需求也更低。在低流量条件下,不使用NTO可以缩短延迟,但代价是带宽利用率较高。
{"title":"The benefits of a network tasking order in combat search and rescue missions","authors":"M. Gocmen, K. Hopkinson, M. Compton","doi":"10.1109/milcom.2009.5380128","DOIUrl":"https://doi.org/10.1109/milcom.2009.5380128","url":null,"abstract":"Networked communications play a crucial role in United States Armed Forces operations. As the military moves towards more network centric (Net-Centric) operations, it becomes increasingly important to use the network as effectively as possible with respect to the overall mission. This article advocates the use of a Network Tasking Order (NTO), which allows operators to reason about the network based on asset movement, capabilities, and communication requirements. The NTO is similar to the Air Tasking Order, which gives insight into the plan for physical assets in a military mission. In this paper we illustrate the benefit of an NTO in a Combat Search and Rescue (CSAR) scenario. While demonstrating the CSAR mission, we assume the use of the Joint Tactical Radio System (JTRS) for communication. Our premise is that the knowledge in an NTO can be used to achieve better CSAR missions and yield better decision-making opportunities to the mission commanders. Our results show that the End-to-End (ETE) delay with the aid of an NTO in high traffic conditions is shorter compared to those without the NTO and bandwidth requirements are also lower. In low traffic conditions, the ETE delay is shorter without the aid of an NTO, but at the cost of higher bandwidth utilization.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123666895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Implementation of collaborative RF localization using a software-defined Radio network 使用软件定义无线网络实现协作射频定位
Pub Date : 2012-09-12 DOI: 10.1109/milcom.2009.5380001
Augustine A. Honore, Ryan W. Thomas, Richard K. Martin, Stuart H. Kurkowski
Current U.S. military pursuits, such as the Joint Tactical Radio System (JTRS), are based on a software-defined radio (SDR) system. These kinds of systems use the flexibility of software to make old and new radio technology interoperable. Co-existence of different radio technologies has the potential to be a force enabler, but it still falls short, particularly for military operations in which failure to co-exist can cause interference fratricide between allied radios. We designed a collaborative network of cognitive radios derived from flexible, commercially-available SDRs. Using a network of SDRs as an experimental test bed, we implemented a detection and RF characterization algorithm, gathering signal data from multiple spatially diverse points in the network. This provided three main contributions: determining the process for pre-characterizing the SDRs; developing the measurement procedure for effective transmitter detection and estimation; and identifying effective real-world network topologies.
目前美国的军事追求,如联合战术无线电系统(JTRS),是基于软件定义无线电(SDR)系统。这类系统利用软件的灵活性使新旧无线电技术可互操作。不同无线电技术的共存有可能成为一种力量,但它仍然不够,特别是在军事行动中,如果不能共存,可能会导致盟军无线电之间的干扰自相残杀。我们设计了一个由灵活的、可商用的sdr衍生而来的认知无线电协作网络。利用sdr网络作为实验测试平台,我们实现了一种检测和射频表征算法,从网络中多个空间不同的点收集信号数据。这提供了三个主要贡献:确定特别提款权的预表征过程;开发有效的发射机检测和估计的测量程序;识别有效的现实世界网络拓扑结构。
{"title":"Implementation of collaborative RF localization using a software-defined Radio network","authors":"Augustine A. Honore, Ryan W. Thomas, Richard K. Martin, Stuart H. Kurkowski","doi":"10.1109/milcom.2009.5380001","DOIUrl":"https://doi.org/10.1109/milcom.2009.5380001","url":null,"abstract":"Current U.S. military pursuits, such as the Joint Tactical Radio System (JTRS), are based on a software-defined radio (SDR) system. These kinds of systems use the flexibility of software to make old and new radio technology interoperable. Co-existence of different radio technologies has the potential to be a force enabler, but it still falls short, particularly for military operations in which failure to co-exist can cause interference fratricide between allied radios. We designed a collaborative network of cognitive radios derived from flexible, commercially-available SDRs. Using a network of SDRs as an experimental test bed, we implemented a detection and RF characterization algorithm, gathering signal data from multiple spatially diverse points in the network. This provided three main contributions: determining the process for pre-characterizing the SDRs; developing the measurement procedure for effective transmitter detection and estimation; and identifying effective real-world network topologies.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131706662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Some considerations of DS-SS BPSK spectral density and error rate of a high bit rate rake DS-SS BPSK频谱密度和高码率rake误码率的一些考虑
Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5380055
R. Framjee, V. Prabhu
As cellular technologies evolve, evaluation of modulation schemes with frequency selective fading is an important consideration. We present methods to evaluate a high data rate DS-SS BPSK reverse link, over a wideband channel, with filters and a modified delayed signature dual finger RAKE. For several years the standard Gaussian approximation has been used to estimate error rate of DS-SS BPSK. We derive simple upper and lower bounds on the conditional error rates. The upper bound is in terms of the error rate obtained with two intersymbol interference terms and bounds on the marginal distribution of the smaller terms. The Gaussian approximation error rate is pessimistic for SNR's greater than 8dB and 12dB when compared to that obtained by the total probability theorem and upper bound respectively. Intersymbol interference is not Gaussian and at high front end signal-to-noise ratio's (SNR's) our error rate bound is a better estimate. We have also derived the bandwidth occupancy in a rigorous way for the first time by developing a method to compute the spectral density. The fractional containment bandwidth with two Gold codes is smaller than that with a PN sequence. The spectral density has no discrete lines while it is a function of the signature coefficients and chip Fourier transform. Within the bandwidth the spectral density of a set of frequencies is 15dB greater than at other frequencies and this set varies from signature to signature. Finally, we show that a modified delayed signature RAKE combats multipath interference. These methods can be used to evaluate a dual space diversity four finger RAKE and to select signatures that minimize adjacent and co-channel interference.
随着蜂窝技术的发展,频率选择性衰落调制方案的评估是一个重要的问题。我们提出了在宽带信道上使用滤波器和改进的延迟签名双指RAKE来评估高数据速率DS-SS BPSK反向链路的方法。近年来,标准高斯近似被用于估计DS-SS BPSK的误差率。我们推导了条件错误率的简单上界和下界。上界是用两个符号间干扰项得到的错误率和较小项的边际分布的边界来表示的。当信噪比大于8dB和12dB时,高斯近似的误差率与全概率定理和上界计算的误差率相比是悲观的。码间干扰不是高斯的,在高前端信噪比(SNR)下,我们的误码率界是一个更好的估计。我们还通过开发一种计算谱密度的方法,首次严格地推导出了带宽占用。两个Gold序列的分数包含带宽小于一个PN序列的分数包含带宽。谱密度无离散线,是特征系数和芯片傅里叶变换的函数。在带宽范围内,一组频率的频谱密度比其他频率的频谱密度大15dB,并且该频谱密度随特征的不同而不同。最后,我们展示了一种改进的延迟签名RAKE对抗多径干扰。这些方法可用于评估双空间分集四指RAKE并选择最小相邻和共信道干扰的签名。
{"title":"Some considerations of DS-SS BPSK spectral density and error rate of a high bit rate rake","authors":"R. Framjee, V. Prabhu","doi":"10.1109/MILCOM.2009.5380055","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5380055","url":null,"abstract":"As cellular technologies evolve, evaluation of modulation schemes with frequency selective fading is an important consideration. We present methods to evaluate a high data rate DS-SS BPSK reverse link, over a wideband channel, with filters and a modified delayed signature dual finger RAKE. For several years the standard Gaussian approximation has been used to estimate error rate of DS-SS BPSK. We derive simple upper and lower bounds on the conditional error rates. The upper bound is in terms of the error rate obtained with two intersymbol interference terms and bounds on the marginal distribution of the smaller terms. The Gaussian approximation error rate is pessimistic for SNR's greater than 8dB and 12dB when compared to that obtained by the total probability theorem and upper bound respectively. Intersymbol interference is not Gaussian and at high front end signal-to-noise ratio's (SNR's) our error rate bound is a better estimate. We have also derived the bandwidth occupancy in a rigorous way for the first time by developing a method to compute the spectral density. The fractional containment bandwidth with two Gold codes is smaller than that with a PN sequence. The spectral density has no discrete lines while it is a function of the signature coefficients and chip Fourier transform. Within the bandwidth the spectral density of a set of frequencies is 15dB greater than at other frequencies and this set varies from signature to signature. Finally, we show that a modified delayed signature RAKE combats multipath interference. These methods can be used to evaluate a dual space diversity four finger RAKE and to select signatures that minimize adjacent and co-channel interference.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"55 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116755600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed multiple antenna carrier- and sampling-frequency synchronization for OFDM OFDM的分布式多天线载波和采样频率同步
Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5379710
J. Kleider, Xiaoli Ma, Chris Steenhoek
Multiple antenna systems have been shown to provide significant performance improvements for network nodes; however, the vast majority of nodes in military networks will be limited to single channel devices due to mobility (size and power) and ease of use considerations. In this paper we apply a new joint synchronization-pilot sequence (JSPS) optimization design technique to multiple transmitter OFDM systems. We consider the cases where the transmitters could be co-located or distributed (i.e. multiple single-channel transmitters) in space. Independent JSPSs are designed for each transmitter in a multiple antenna system and can be utilized to estimate the carrier frequency offset (CFO) and sampling frequency offset (SFO) of each antenna independently. We study the mean square error (MSE) for the estimation of CFO and SFO and compare the performance of our estimators to a closed form solution for AWGN channels. We show that the performance of our proposed iterative estimators for distributed CFO and SFO estimation is approximately equivalent to the estimation performance in the co-located CFO and SFO estimation case. The iterative estimator for the distributed case is also found to be of low complexity, with only a linear complexity increase over the co-located estimator. We have also measured, via simulation, the performance of the CFO estimator for distributed Rayleigh fading multipath channels.
多天线系统已被证明可以为网络节点提供显著的性能改进;然而,由于移动性(尺寸和功率)和易用性考虑,军事网络中的绝大多数节点将仅限于单通道设备。本文将一种新的联合同步导频序列(JSPS)优化设计技术应用于多发射机OFDM系统。我们考虑了发射机可以在空间中共存或分布的情况(即多个单通道发射机)。针对多天线系统中的每个发射机设计了独立的JSPSs,可用于独立估计每个天线的载波频偏(CFO)和采样频偏(SFO)。我们研究了CFO和SFO估计的均方误差(MSE),并将我们的估计器的性能与AWGN信道的封闭形式解决方案进行了比较。我们表明,我们提出的迭代估计器在分布式CFO和SFO估计情况下的性能近似等同于共定位CFO和SFO估计情况下的估计性能。分布式情况下的迭代估计器也具有较低的复杂度,其复杂度仅比同位估计器线性增加。我们还通过仿真测量了分布式瑞利衰落多径信道CFO估计器的性能。
{"title":"Distributed multiple antenna carrier- and sampling-frequency synchronization for OFDM","authors":"J. Kleider, Xiaoli Ma, Chris Steenhoek","doi":"10.1109/MILCOM.2009.5379710","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379710","url":null,"abstract":"Multiple antenna systems have been shown to provide significant performance improvements for network nodes; however, the vast majority of nodes in military networks will be limited to single channel devices due to mobility (size and power) and ease of use considerations. In this paper we apply a new joint synchronization-pilot sequence (JSPS) optimization design technique to multiple transmitter OFDM systems. We consider the cases where the transmitters could be co-located or distributed (i.e. multiple single-channel transmitters) in space. Independent JSPSs are designed for each transmitter in a multiple antenna system and can be utilized to estimate the carrier frequency offset (CFO) and sampling frequency offset (SFO) of each antenna independently. We study the mean square error (MSE) for the estimation of CFO and SFO and compare the performance of our estimators to a closed form solution for AWGN channels. We show that the performance of our proposed iterative estimators for distributed CFO and SFO estimation is approximately equivalent to the estimation performance in the co-located CFO and SFO estimation case. The iterative estimator for the distributed case is also found to be of low complexity, with only a linear complexity increase over the co-located estimator. We have also measured, via simulation, the performance of the CFO estimator for distributed Rayleigh fading multipath channels.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125089920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enabling Mobile Networks through secure naming 通过安全命名启用移动网络
Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5379843
Devan Rehunathan, R. Atkinson, S. Bhatti
Mobile Networks are increasingly important in land-, sea-and air-based military scenarios. The interest in supporting network mobility for Internet Protocol (IP) networks has led to the Network Mobility (NEMO) protocol extensions being proposed for IP within the IETF. These extensions are based on the work already completed on host mobility for Mobile IP (MIP). The current work is based on the use of software agents: a Home Agent (HA) intercepts packets destined for the addresses in the mobile network and uses an IP-in-IP tunnel to send the packets to the Mobile Router (MR) located at a Care of Address (CoA), which terminates the tunnel. As the mobile network moves to new IP networks, the MR updates the HA with its new CoA. While this tunnelling approach represents a sound engineering solution for backwards compatibility, and is the only one that has been pursued within the IETF, it has seen little deployment, either in support of mobile hosts or mobile networks. We make the case for an alternative approach based on secure naming. We make a comparison in operation with the current tunnelling-based approach, both in architecture and by analysis of protocol operation. Our initial analyses indicate that a naming-based approach shows promise as a viable alternative to a tunnelling-based approach, and could offer other architectural benefits.
移动网络在陆基、海基和空基军事场景中越来越重要。对支持互联网协议(IP)网络的网络移动性的兴趣导致了IETF为IP提出了网络移动性(NEMO)协议扩展。这些扩展是基于已经完成的针对移动IP (MIP)的主机移动性的工作。目前的工作是基于软件代理的使用:一个Home Agent (HA)拦截发往移动网络中的地址的数据包,并使用IP-in-IP隧道将数据包发送到位于地址保护(CoA)的移动路由器(MR),后者终止隧道。当移动网络迁移到新的IP网络时,MR会用新的CoA更新HA。虽然这种隧道方法代表了向后兼容性的可靠工程解决方案,并且是IETF内部唯一追求的解决方案,但在支持移动主机或移动网络方面,它几乎没有得到部署。我们提出了一种基于安全命名的替代方法。从架构和协议运行分析两方面对现有的基于隧道的方法进行了操作比较。我们的初步分析表明,基于命名的方法有望成为基于隧道的方法的可行替代方案,并且可以提供其他架构优势。
{"title":"Enabling Mobile Networks through secure naming","authors":"Devan Rehunathan, R. Atkinson, S. Bhatti","doi":"10.1109/MILCOM.2009.5379843","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379843","url":null,"abstract":"Mobile Networks are increasingly important in land-, sea-and air-based military scenarios. The interest in supporting network mobility for Internet Protocol (IP) networks has led to the Network Mobility (NEMO) protocol extensions being proposed for IP within the IETF. These extensions are based on the work already completed on host mobility for Mobile IP (MIP). The current work is based on the use of software agents: a Home Agent (HA) intercepts packets destined for the addresses in the mobile network and uses an IP-in-IP tunnel to send the packets to the Mobile Router (MR) located at a Care of Address (CoA), which terminates the tunnel. As the mobile network moves to new IP networks, the MR updates the HA with its new CoA. While this tunnelling approach represents a sound engineering solution for backwards compatibility, and is the only one that has been pursued within the IETF, it has seen little deployment, either in support of mobile hosts or mobile networks. We make the case for an alternative approach based on secure naming. We make a comparison in operation with the current tunnelling-based approach, both in architecture and by analysis of protocol operation. Our initial analyses indicate that a naming-based approach shows promise as a viable alternative to a tunnelling-based approach, and could offer other architectural benefits.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125476479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Performance analysis of space-time codes over two-way relay channels 双向中继信道空时码的性能分析
Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5380063
N. Xu, Shengli Fu
In this paper, we explore the advantages of network coding and space-time coding in improving the performance of two-way relay channel communications where two terminals absent of direct link exchange information through a single relay in between. Network coding allows embracing interference from other terminals thereby turning it into a capacity boost. Application of space-time codes yields higher capacity by exploiting spatial diversity. The joint performance of both aforementioned techniques is studied in this paper. Specifically, we propose a new class of decode-and-forward (DF) relaying strategy, evaluated in terms of bit error rate by both theoretical analysis and simulation. Based on our results, DF outperforms the existing amplify-and-decode and partial-decode-and-forward protocols.
本文探讨了网络编码和空时编码在提高双向中继信道通信性能方面的优势,其中没有直接链路的两个终端通过中间的单个中继交换信息。网络编码允许接受来自其他终端的干扰,从而将其转化为容量提升。空时码的应用通过利用空间分异获得更高的容量。本文对上述两种技术的联合性能进行了研究。具体来说,我们提出了一种新的解码转发(DF)中继策略,通过理论分析和仿真来评估误码率。基于我们的结果,DF优于现有的放大解码和部分解码转发协议。
{"title":"Performance analysis of space-time codes over two-way relay channels","authors":"N. Xu, Shengli Fu","doi":"10.1109/MILCOM.2009.5380063","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5380063","url":null,"abstract":"In this paper, we explore the advantages of network coding and space-time coding in improving the performance of two-way relay channel communications where two terminals absent of direct link exchange information through a single relay in between. Network coding allows embracing interference from other terminals thereby turning it into a capacity boost. Application of space-time codes yields higher capacity by exploiting spatial diversity. The joint performance of both aforementioned techniques is studied in this paper. Specifically, we propose a new class of decode-and-forward (DF) relaying strategy, evaluated in terms of bit error rate by both theoretical analysis and simulation. Based on our results, DF outperforms the existing amplify-and-decode and partial-decode-and-forward protocols.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125479184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Tolerating adversaries in the estimation of network parameters from noisy data: A nonlinear filtering approach 从噪声数据中估计网络参数的容忍对手:一种非线性滤波方法
Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5380092
D. Stott, Lloyd G. Greenwald, Patrick Kreidl, Brian DeCleene Bae
Estimating network parameters from noisy data is a hard problem that can be made even more difficult by the presence of a malicious adversary who may corrupt the measurement process by capturing a trusted node or perturbing data externally. The adversary may have complete knowledge of the networking protocols that rely on the parameter estimates and may adjust its effect on the system to push protocols into incorrect operating regimes. This work focuses on studying how an adversary may impact the estimation of link quality (LQ) of a communications link. We propose a nonlinear filtering solution that simultaneously tracks both the quality of a link and the state of the adversary, tracking the latter to tolerate better the corruption in tracking the former. We provide empirical results while considering several types of adversarial perturbation, including ones that falsely report the LQ measurements or jam a link. Extensions of these analytical techniques and empirical results show how assumptions about symmetry between the LQ of each direction of a bidirectional link can improve adversary tracking and, in turn, LQ estimation.
从有噪声的数据中估计网络参数是一个困难的问题,而恶意攻击者的存在可能会通过捕获可信节点或干扰外部数据来破坏测量过程,从而使问题变得更加困难。攻击者可能完全了解依赖于参数估计的网络协议,并可能调整其对系统的影响,将协议推入错误的操作机制。这项工作的重点是研究攻击者如何影响通信链路链路质量(LQ)的估计。我们提出了一种非线性滤波解决方案,它同时跟踪链路的质量和对手的状态,跟踪后者以更好地容忍跟踪前者时的腐败。我们提供了经验结果,同时考虑了几种类型的对抗性扰动,包括错误报告LQ测量或阻塞链接的扰动。这些分析技术的扩展和经验结果表明,关于双向链路每个方向LQ之间对称性的假设如何改善对手跟踪,进而改善LQ估计。
{"title":"Tolerating adversaries in the estimation of network parameters from noisy data: A nonlinear filtering approach","authors":"D. Stott, Lloyd G. Greenwald, Patrick Kreidl, Brian DeCleene Bae","doi":"10.1109/MILCOM.2009.5380092","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5380092","url":null,"abstract":"Estimating network parameters from noisy data is a hard problem that can be made even more difficult by the presence of a malicious adversary who may corrupt the measurement process by capturing a trusted node or perturbing data externally. The adversary may have complete knowledge of the networking protocols that rely on the parameter estimates and may adjust its effect on the system to push protocols into incorrect operating regimes. This work focuses on studying how an adversary may impact the estimation of link quality (LQ) of a communications link. We propose a nonlinear filtering solution that simultaneously tracks both the quality of a link and the state of the adversary, tracking the latter to tolerate better the corruption in tracking the former. We provide empirical results while considering several types of adversarial perturbation, including ones that falsely report the LQ measurements or jam a link. Extensions of these analytical techniques and empirical results show how assumptions about symmetry between the LQ of each direction of a bidirectional link can improve adversary tracking and, in turn, LQ estimation.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116024081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of soft-decision decoding metrics in a QAM system with phase and amplitude errors 相位和幅度误差QAM系统软判决译码指标的比较
Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5380120
Jason D. Ellis, M. Pursley
Demodulation of M-ary quadrature amplitude modulation (M-QAM) requires the receiver to estimate the phase and amplitude of the received signal. The demodulator performance is sensitive to errors in these estimates, and the sensitivity increases as M increases. We examine the effects of phase and amplitude errors on the performance of QAM communication systems with error-control coding and soft-decision decoding. Performance comparisons are given for 16-QAM and 64-QAM for two error-control coding techniques and two soft-decision decoding metrics.
正交调幅(M-QAM)的解调需要接收机对接收信号的相位和幅度进行估计。解调性能对这些估计中的误差很敏感,并且灵敏度随M的增加而增加。我们研究了相位和幅度误差对带有错误控制编码和软判决解码的QAM通信系统性能的影响。对16-QAM和64-QAM的两种错误控制编码技术和两种软判决解码指标进行了性能比较。
{"title":"Comparison of soft-decision decoding metrics in a QAM system with phase and amplitude errors","authors":"Jason D. Ellis, M. Pursley","doi":"10.1109/MILCOM.2009.5380120","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5380120","url":null,"abstract":"Demodulation of M-ary quadrature amplitude modulation (M-QAM) requires the receiver to estimate the phase and amplitude of the received signal. The demodulator performance is sensitive to errors in these estimates, and the sensitivity increases as M increases. We examine the effects of phase and amplitude errors on the performance of QAM communication systems with error-control coding and soft-decision decoding. Performance comparisons are given for 16-QAM and 64-QAM for two error-control coding techniques and two soft-decision decoding metrics.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116161510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dynamic topology optimization and transition schemes for assuring connectivity in multihop mobile optical wireless communications networks 保证多跳移动无线光通信网络连通性的动态拓扑优化和转换方案
Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5379830
P. Velez, A. Dwivedi, P. Harshavardhana, D. Tebben, A. R. Hammons
Mobile Free Space Optical (FSO) links suffer from frequent link blockages due to opaque obstructions or link degradations that can result in degraded or failed networks. In this paper, a dynamic layer-1 based topology and routing control methodology is presented for assuring connectivity in networks with fragile links. Core components of this methodology are described with special emphasis on the dynamic topology optimization algorithm and topology transition schemes. The effectiveness of the proposed methodology depends on the fragility of links compared to the topology optimization duration. If the link fragility is comparable to the time taken to achieve the optimal topology, then this methodology will not lead to a stable network. A companion paper [1] presents link fragility results for various types of terrain and demonstrates that the expected link longevity is significantly greater than the time taken by the proposed dynamic network optimization scheme. Thus, network connectivity can be greatly improved by employing the proposed dynamic topology control methodology and optimization of physical network parameters such as antenna height.
移动自由空间光(FSO)链路经常由于不透明的阻塞或链路降级而导致链路阻塞,从而导致网络降级或故障。本文提出了一种动态的基于第一层的拓扑和路由控制方法,以保证链路脆弱的网络的连通性。描述了该方法的核心组件,特别强调了动态拓扑优化算法和拓扑转换方案。所提方法的有效性取决于链路的脆弱性与拓扑优化时间的比较。如果链路脆弱性与实现最优拓扑所花费的时间相当,那么这种方法将不会产生稳定的网络。另一篇论文[1]给出了不同地形类型下的链路脆弱性结果,并表明预期的链路寿命明显大于所提出的动态网络优化方案所花费的时间。因此,通过采用所提出的动态拓扑控制方法和优化物理网络参数(如天线高度),可以大大改善网络连通性。
{"title":"Dynamic topology optimization and transition schemes for assuring connectivity in multihop mobile optical wireless communications networks","authors":"P. Velez, A. Dwivedi, P. Harshavardhana, D. Tebben, A. R. Hammons","doi":"10.1109/MILCOM.2009.5379830","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379830","url":null,"abstract":"Mobile Free Space Optical (FSO) links suffer from frequent link blockages due to opaque obstructions or link degradations that can result in degraded or failed networks. In this paper, a dynamic layer-1 based topology and routing control methodology is presented for assuring connectivity in networks with fragile links. Core components of this methodology are described with special emphasis on the dynamic topology optimization algorithm and topology transition schemes. The effectiveness of the proposed methodology depends on the fragility of links compared to the topology optimization duration. If the link fragility is comparable to the time taken to achieve the optimal topology, then this methodology will not lead to a stable network. A companion paper [1] presents link fragility results for various types of terrain and demonstrates that the expected link longevity is significantly greater than the time taken by the proposed dynamic network optimization scheme. Thus, network connectivity can be greatly improved by employing the proposed dynamic topology control methodology and optimization of physical network parameters such as antenna height.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114604990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
MILCOM 2009 - 2009 IEEE Military Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1