首页 > 最新文献

MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)最新文献

英文 中文
Leveraging and Fusing Civil and Military Sensors to support Disaster Relief Operations in Smart Environments 利用和融合民用和军用传感器,支持智能环境下的救灾行动
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9021004
K. Wrona, M. Tortonesi, M. Marks, Niranjan Suri
Natural disasters occur unpredictably and can range in severity from something locally manageable to large scale events that require external intervention. In particular, when large scale disasters occur, they can cause widespread damage and overwhelm the ability of local governments and authorities to respond. In such situations, Civil-Military Cooperation (CIMIC) is essential for a rapid and robust Humanitarian Assistance and Disaster Relief (HADR) operation. These type of operations bring to bear the Command and Control (C2) and Logistics capabilities of the military to rapidly deploy assets to help with the disaster relief activities. Smart Cities and Smart Environments, embedded with IoT, introduce multiple sensing modalities that typically provide wide coverage over the deployed area. Given that the military does not own or control these assets, they are sometimes referred to as gray assets, which are not as trustworthy as blue assets, owned by the military. However, leveraging these gray assets can significantly improve the ability for the military to quickly obtain Situational Awareness (SA) about the disaster and optimize the planning of rescue operations and allocation of resources to achieve the best possible effects. Fusing the information from the civilian IoT sensors with the custom military sensors could help validate and improve trust in the information from the gray assets. The focus of this paper is to further examine this challenge of achieving Civil-Military cooperation for HADR operations by leveraging and fusing information from gray and blue assets.
自然灾害的发生是不可预测的,其严重程度从局部可控到需要外部干预的大规模事件不等。特别是,当大规模灾难发生时,它们可能造成广泛的破坏,并使地方政府和当局的反应能力不堪重负。在这种情况下,军民合作(CIMIC)对于快速而有力的人道主义援助和救灾行动至关重要。这些类型的行动需要军队的指挥和控制(C2)和后勤能力来快速部署资产,以帮助进行救灾活动。嵌入物联网的智慧城市和智能环境引入了多种传感模式,通常在部署区域内提供广泛的覆盖范围。由于军方并不拥有或控制这些资产,因此它们有时被称为灰色资产,即不像军方拥有的蓝色资产那样值得信赖。然而,利用这些灰色资产可以显著提高军队快速获得灾难态势感知(SA)的能力,并优化救援行动的规划和资源分配,以达到最佳效果。将来自民用物联网传感器的信息与定制军用传感器融合可以帮助验证和提高对灰色资产信息的信任。本文的重点是通过利用和融合灰色和蓝色资产的信息,进一步研究在HADR行动中实现军民合作的挑战。
{"title":"Leveraging and Fusing Civil and Military Sensors to support Disaster Relief Operations in Smart Environments","authors":"K. Wrona, M. Tortonesi, M. Marks, Niranjan Suri","doi":"10.1109/MILCOM47813.2019.9021004","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021004","url":null,"abstract":"Natural disasters occur unpredictably and can range in severity from something locally manageable to large scale events that require external intervention. In particular, when large scale disasters occur, they can cause widespread damage and overwhelm the ability of local governments and authorities to respond. In such situations, Civil-Military Cooperation (CIMIC) is essential for a rapid and robust Humanitarian Assistance and Disaster Relief (HADR) operation. These type of operations bring to bear the Command and Control (C2) and Logistics capabilities of the military to rapidly deploy assets to help with the disaster relief activities. Smart Cities and Smart Environments, embedded with IoT, introduce multiple sensing modalities that typically provide wide coverage over the deployed area. Given that the military does not own or control these assets, they are sometimes referred to as gray assets, which are not as trustworthy as blue assets, owned by the military. However, leveraging these gray assets can significantly improve the ability for the military to quickly obtain Situational Awareness (SA) about the disaster and optimize the planning of rescue operations and allocation of resources to achieve the best possible effects. Fusing the information from the civilian IoT sensors with the custom military sensors could help validate and improve trust in the information from the gray assets. The focus of this paper is to further examine this challenge of achieving Civil-Military cooperation for HADR operations by leveraging and fusing information from gray and blue assets.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129982040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Portable Programmable Layer 3 QoS for Tactical MANETs: A P4/PSA-Based Architectural Approach 战术manet的便携式可编程第三层QoS:一种基于P4/ psa的体系结构方法
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020849
A. Poylisher, Y. Gottlieb, L. Kant
With the currently deployed tactical software defined radios (SDRs), there is no easy way to develop advanced Layer 3 (L3) QoS functionalities independently of the idiosyncrasies of the operating systems (OSs) and Layer 2 (L2) technologies. This significantly slows down large-scale R&D efforts on L3 QoS for tactical radios. In this position paper, we propose an architectural approach to support a large set of advanced L3 QoS behaviors, portable across tactical devices based on the P4 (programming protocol-independent packet processors) language and the Portable Switching Architecture (PSA). Our goal is to initiate a productive discussion among the interested industry, academic, and government parties that could lead to standardization that significantly accelerates research and development of application- and missionaware L3 QoS for future tactical networks.
对于目前部署的战术软件定义无线电(sdr),没有一种简单的方法可以独立于操作系统(os)和第2层(L2)技术的特性来开发先进的第3层(L3) QoS功能。这大大减缓了战术无线电L3 QoS的大规模研发工作。在这篇意见书中,我们提出了一种架构方法来支持大量高级L3 QoS行为,基于P4(编程协议独立包处理器)语言和便携式交换架构(PSA)跨战术设备可移植。我们的目标是在感兴趣的行业、学术界和政府各方之间发起一场富有成效的讨论,这可能导致标准化,从而显著加快未来战术网络应用和任务感知L3 QoS的研究和开发。
{"title":"Portable Programmable Layer 3 QoS for Tactical MANETs: A P4/PSA-Based Architectural Approach","authors":"A. Poylisher, Y. Gottlieb, L. Kant","doi":"10.1109/MILCOM47813.2019.9020849","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020849","url":null,"abstract":"With the currently deployed tactical software defined radios (SDRs), there is no easy way to develop advanced Layer 3 (L3) QoS functionalities independently of the idiosyncrasies of the operating systems (OSs) and Layer 2 (L2) technologies. This significantly slows down large-scale R&D efforts on L3 QoS for tactical radios. In this position paper, we propose an architectural approach to support a large set of advanced L3 QoS behaviors, portable across tactical devices based on the P4 (programming protocol-independent packet processors) language and the Portable Switching Architecture (PSA). Our goal is to initiate a productive discussion among the interested industry, academic, and government parties that could lead to standardization that significantly accelerates research and development of application- and missionaware L3 QoS for future tactical networks.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115431164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced RF Fingerprinting for IoT Devices with Recurrent Neural Networks 基于循环神经网络的物联网设备增强射频指纹识别
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9021080
Kevin Merchant, Bryan D. Nousain
As the Internet of Things (IoT) continues to expand, there is a growing necessity for improved techniques to authenticate the identity of wireless transmitters. In this paper, we develop a physical-layer authentication technique using a neural network structure with both convolutional and recurrent components to distinguish transmissions originating from a particular target device from all others. In addition, we demonstrate strong performance in a realistic multipath channel environment, as well as show that classifier performance remains strong when presented with transmissions from devices that were never seen by the classifier during training. We explore the latter benefit in more detail via an experiment which measures the performance on unknown devices as a function of the number of devices seen during training. Next, we highlight the importance of frequency synchronization prior to fingerprint extraction by demonstrating that a network trained on unsynchronized transmissions is easily fooled by a simple frequency shift in a transmitted waveform. Finally, we increase the applicability of our approach to IoT devices by presenting a simple technique for reducing the memory footprint of trained models by 95% while maintaining strong performance.
随着物联网(IoT)的不断扩展,越来越需要改进技术来验证无线发射器的身份。在本文中,我们开发了一种物理层认证技术,使用具有卷积和循环组件的神经网络结构来区分来自特定目标设备的传输。此外,我们在真实的多路径信道环境中展示了强大的性能,并且表明当呈现来自训练期间分类器从未见过的设备的传输时,分类器的性能仍然很强。我们通过一个实验更详细地探讨了后者的好处,该实验测量了未知设备上的性能,作为训练期间看到的设备数量的函数。接下来,我们通过展示在不同步传输上训练的网络很容易被传输波形中的简单频移所欺骗,强调了在指纹提取之前频率同步的重要性。最后,我们通过提出一种简单的技术来提高我们的方法对物联网设备的适用性,该技术可以在保持强大性能的同时将训练模型的内存占用减少95%。
{"title":"Enhanced RF Fingerprinting for IoT Devices with Recurrent Neural Networks","authors":"Kevin Merchant, Bryan D. Nousain","doi":"10.1109/MILCOM47813.2019.9021080","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021080","url":null,"abstract":"As the Internet of Things (IoT) continues to expand, there is a growing necessity for improved techniques to authenticate the identity of wireless transmitters. In this paper, we develop a physical-layer authentication technique using a neural network structure with both convolutional and recurrent components to distinguish transmissions originating from a particular target device from all others. In addition, we demonstrate strong performance in a realistic multipath channel environment, as well as show that classifier performance remains strong when presented with transmissions from devices that were never seen by the classifier during training. We explore the latter benefit in more detail via an experiment which measures the performance on unknown devices as a function of the number of devices seen during training. Next, we highlight the importance of frequency synchronization prior to fingerprint extraction by demonstrating that a network trained on unsynchronized transmissions is easily fooled by a simple frequency shift in a transmitted waveform. Finally, we increase the applicability of our approach to IoT devices by presenting a simple technique for reducing the memory footprint of trained models by 95% while maintaining strong performance.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115576706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability 稳健适应的理由:自主资源管理是一个弱点
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020984
Joseph Noor, A. Ali-Eldin, Luis Garcia, C. Rao, Venkateswara Dasari, Deepak Ganesan, B. Jalaeian, P. Shenoy, M. Srivastava
Autonomic resource management for distributed edge computing systems provides an effective means of enabling dynamic placement and adaptation in the face of network changes, load dynamics, and failures. However, adaptation in-and-of-itself offers a side channel by which malicious entities can extract valuable information. An attacker can take advantage of autonomic resource management techniques to fool a system into misallocating resources and crippling applications. Using a few scenarios, we outline how attacks can be launched using partial knowledge of the resource management substrate - with as little as a single compromised node. We argue that any system that provides adaptation must consider resource management as an attack surface. As such, we propose ADAPT2, a framework that incorporates concepts taken from Moving-Target Defense and state estimation techniques to ensure correctness and obfuscate resource management, thereby protecting valuable system and application information from leaking.
分布式边缘计算系统的自主资源管理提供了一种有效的方法,可以在面对网络变化、负载动态和故障时实现动态放置和适应。然而,自适应本身提供了一个侧面通道,恶意实体可以通过该通道提取有价值的信息。攻击者可以利用自主资源管理技术欺骗系统,使其资源分配不当,从而破坏应用程序。通过几个场景,我们概述了如何利用资源管理底层的部分知识发起攻击——只需一个受损的节点。我们认为,任何提供自适应的系统都必须将资源管理视为攻击面。因此,我们提出了ADAPT2,这是一个框架,它结合了来自移动目标防御和状态估计技术的概念,以确保正确性和混淆资源管理,从而保护有价值的系统和应用程序信息免受泄漏。
{"title":"The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability","authors":"Joseph Noor, A. Ali-Eldin, Luis Garcia, C. Rao, Venkateswara Dasari, Deepak Ganesan, B. Jalaeian, P. Shenoy, M. Srivastava","doi":"10.1109/MILCOM47813.2019.9020984","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020984","url":null,"abstract":"Autonomic resource management for distributed edge computing systems provides an effective means of enabling dynamic placement and adaptation in the face of network changes, load dynamics, and failures. However, adaptation in-and-of-itself offers a side channel by which malicious entities can extract valuable information. An attacker can take advantage of autonomic resource management techniques to fool a system into misallocating resources and crippling applications. Using a few scenarios, we outline how attacks can be launched using partial knowledge of the resource management substrate - with as little as a single compromised node. We argue that any system that provides adaptation must consider resource management as an attack surface. As such, we propose ADAPT2, a framework that incorporates concepts taken from Moving-Target Defense and state estimation techniques to ensure correctness and obfuscate resource management, thereby protecting valuable system and application information from leaking.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114657173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects from Mutual Coupling on Communication Link Reliability 相互耦合对通信链路可靠性的影响
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020846
Sofia Bergström, T. Lindgren
This paper presents a method to assess the reliability of a communication system integrated on a platform. It is done in terms of the probability that the performance will fulfil a certain requirement. The method is demonstrated using a scenario where two dipoles, simulation two antennas on the same military platform, are communicating with another platform. Non-orthogonal and orthogonal frequency hopping are used and the statistical impact from the antenna on the SINR is investigated. The method is proved useful as it can compare and visualize different complex antenna configurations.
本文提出了一种评估平台集成通信系统可靠性的方法。它是根据性能满足一定要求的概率来完成的。该方法通过一个场景进行了演示,其中两个偶极子,模拟同一军事平台上的两个天线,与另一个平台通信。采用非正交跳频和正交跳频,研究了天线对信噪比的统计影响。结果表明,该方法可以比较和可视化不同的复杂天线结构。
{"title":"Effects from Mutual Coupling on Communication Link Reliability","authors":"Sofia Bergström, T. Lindgren","doi":"10.1109/MILCOM47813.2019.9020846","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020846","url":null,"abstract":"This paper presents a method to assess the reliability of a communication system integrated on a platform. It is done in terms of the probability that the performance will fulfil a certain requirement. The method is demonstrated using a scenario where two dipoles, simulation two antennas on the same military platform, are communicating with another platform. Non-orthogonal and orthogonal frequency hopping are used and the statistical impact from the antenna on the SINR is investigated. The method is proved useful as it can compare and visualize different complex antenna configurations.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123405079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Tactical Voice Communications using Cooperative Broadcast over a Narrowband Channel 利用窄带信道上的协作广播改进战术语音通信
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020954
Arwid Komulainen, Jimmi Grönkvist, U. Sterner, Ulrika Uppman
Effective command and control on the battlefield requires robust voice communications. Single-hop combat-net radios operating on narrowband channels are typically used to provide push-to-talk voice communications. For a battalion operating over large areas, maintaining reliable communication using single-hop radios is challenging and may require manually placed, dedicated radio relays. In this paper, it is shown how a multi-hop protocol based on cooperative broadcast can be used for providing more robust and resource-efficient narrowband voice communications. Cooperative broadcast for tactical voice communications is evaluated in a realistic scenario using network simulations. The results show that the multi-hop protocol provides great improvements in terms of robustness and resource efficiency compared to the single-hop system.
战场上有效的指挥和控制需要强大的语音通信。在窄带信道上操作的单跳作战网无线电通常用于提供一键通语音通信。对于一个在大范围作战的营来说,使用单跳无线电保持可靠的通信是具有挑战性的,可能需要手动放置专用的无线电中继。本文展示了如何利用基于协作广播的多跳协议来提供更鲁棒和资源高效的窄带语音通信。通过网络仿真,对战术语音通信的协同广播进行了评估。结果表明,与单跳协议相比,多跳协议在鲁棒性和资源效率方面都有很大的提高。
{"title":"Improving Tactical Voice Communications using Cooperative Broadcast over a Narrowband Channel","authors":"Arwid Komulainen, Jimmi Grönkvist, U. Sterner, Ulrika Uppman","doi":"10.1109/MILCOM47813.2019.9020954","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020954","url":null,"abstract":"Effective command and control on the battlefield requires robust voice communications. Single-hop combat-net radios operating on narrowband channels are typically used to provide push-to-talk voice communications. For a battalion operating over large areas, maintaining reliable communication using single-hop radios is challenging and may require manually placed, dedicated radio relays. In this paper, it is shown how a multi-hop protocol based on cooperative broadcast can be used for providing more robust and resource-efficient narrowband voice communications. Cooperative broadcast for tactical voice communications is evaluated in a realistic scenario using network simulations. The results show that the multi-hop protocol provides great improvements in terms of robustness and resource efficiency compared to the single-hop system.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123420136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scalable Blockchain Implementation for Edge-based Internet of Things Platform 基于边缘的物联网平台的可扩展区块链实现
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020726
Abel O. Gomez Rivera, Deepak K. Tosh, L. Njilla
State-of-the-art centralized internet of things (IoT) architectures suffer from scalability issues in terms of both devices and transactions. Centralized architecture infers a central server with finite resources to process the communication demands of large IoT networks. The security of such IoT infrastructures is contingent on the protection of the central server. To address the challenges of security and scalability of transactions, we design and implement an edge-based blockchain network, where a set of edge nodes are incorporated to serve the requests of field devices. The edge nodes of our network offer security and processing functionalities to data transactions made by field devices. Besides the proposed architecture, a proof of concept of our edge-based blockchain platform is implemented to study its feasibility and performance. The platform achieves the fundamental security properties and addresses the transaction scalability issue. Blockchain technology and edge computing have the potential to enable a robust, and flexible architecture for IoT networks while maintaining low latency and high availability. The effectiveness of the proposed architecture is evaluated in a simulated network.
最先进的集中式物联网(IoT)架构在设备和事务方面都存在可扩展性问题。集中式架构是指一台资源有限的中央服务器来处理大型物联网网络的通信需求。这种物联网基础设施的安全性取决于对中央服务器的保护。为了解决交易的安全性和可扩展性的挑战,我们设计并实现了一个基于边缘的区块链网络,其中包含一组边缘节点来服务于现场设备的请求。我们网络的边缘节点为现场设备进行的数据交易提供安全和处理功能。除了提出的架构外,还实现了基于边缘的区块链平台的概念验证,以研究其可行性和性能。该平台实现了基本的安全属性,并解决了事务的可伸缩性问题。区块链技术和边缘计算有潜力为物联网网络提供强大、灵活的架构,同时保持低延迟和高可用性。在一个仿真网络中对所提架构的有效性进行了评估。
{"title":"Scalable Blockchain Implementation for Edge-based Internet of Things Platform","authors":"Abel O. Gomez Rivera, Deepak K. Tosh, L. Njilla","doi":"10.1109/MILCOM47813.2019.9020726","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020726","url":null,"abstract":"State-of-the-art centralized internet of things (IoT) architectures suffer from scalability issues in terms of both devices and transactions. Centralized architecture infers a central server with finite resources to process the communication demands of large IoT networks. The security of such IoT infrastructures is contingent on the protection of the central server. To address the challenges of security and scalability of transactions, we design and implement an edge-based blockchain network, where a set of edge nodes are incorporated to serve the requests of field devices. The edge nodes of our network offer security and processing functionalities to data transactions made by field devices. Besides the proposed architecture, a proof of concept of our edge-based blockchain platform is implemented to study its feasibility and performance. The platform achieves the fundamental security properties and addresses the transaction scalability issue. Blockchain technology and edge computing have the potential to enable a robust, and flexible architecture for IoT networks while maintaining low latency and high availability. The effectiveness of the proposed architecture is evaluated in a simulated network.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123972260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
HopSAC: Frequency Hopping Parameter Estimation Based on Random Sample Consensus for Counter-Unmanned Aircraft Systems 基于随机样本一致性的反无人机系统跳频参数估计
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020841
Brandon F. Lo, Scott Torborg, Chun Kin Au-Yeung
Small unmanned aircraft systems (UAS), commonly known as drones and widely used in recreational and commercial applications, have caused alarming concerns of public safety and homeland security due to frequently reported unauthorized UAS incidents in recent years. To effectively disable potential threats from frequency hopping drones and controllers, the counter attack of Counter-UAS (CUAS) systems typically require parameter estimation of the frequency hopping signals with high precision and low complexity for real-time responses. Therefore, a model parameter estimation method to meet all these requirements becomes a challenge for CUAS systems. In this paper, a novel hopping parameter estimation method based on random sample consensus called HopSAC is proposed to conquer this challenge. Given a small set of samples, HopSAC estimates the parameters of linear frequency hopping sequence and achieves high multiple target detection performance with low implementation complexity that can be realized in real time. Simulation results show that the proposed HopSAC significantly outperforms linear Least Squares method in achieving exceptional accuracy of model parameter estimation under the impact of gross errors, timing errors, and multiple UAS targets.
小型无人驾驶飞机系统(UAS),俗称无人机,广泛用于娱乐和商业应用,近年来由于频繁报道的未经授权的UAS事件,引起了公共安全和国土安全的担忧。为了有效地消除来自跳频无人机和控制器的潜在威胁,反无人机系统(CUAS)的反击通常需要对跳频信号进行高精度、低复杂度的参数估计,以实现实时响应。因此,如何找到一种能够满足这些要求的模型参数估计方法,成为了CUAS系统面临的一个挑战。为了克服这一难题,本文提出了一种基于随机样本一致性的跳频参数估计方法HopSAC。给定一组小的样本,HopSAC估计的参数线性跳频序列和达到高多个目标检测性能较低的实现复杂度,可以实时实现。仿真结果表明,在粗误差、定时误差和多个无人机目标的影响下,HopSAC在模型参数估计精度方面明显优于线性最小二乘法。
{"title":"HopSAC: Frequency Hopping Parameter Estimation Based on Random Sample Consensus for Counter-Unmanned Aircraft Systems","authors":"Brandon F. Lo, Scott Torborg, Chun Kin Au-Yeung","doi":"10.1109/MILCOM47813.2019.9020841","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020841","url":null,"abstract":"Small unmanned aircraft systems (UAS), commonly known as drones and widely used in recreational and commercial applications, have caused alarming concerns of public safety and homeland security due to frequently reported unauthorized UAS incidents in recent years. To effectively disable potential threats from frequency hopping drones and controllers, the counter attack of Counter-UAS (CUAS) systems typically require parameter estimation of the frequency hopping signals with high precision and low complexity for real-time responses. Therefore, a model parameter estimation method to meet all these requirements becomes a challenge for CUAS systems. In this paper, a novel hopping parameter estimation method based on random sample consensus called HopSAC is proposed to conquer this challenge. Given a small set of samples, HopSAC estimates the parameters of linear frequency hopping sequence and achieves high multiple target detection performance with low implementation complexity that can be realized in real time. Simulation results show that the proposed HopSAC significantly outperforms linear Least Squares method in achieving exceptional accuracy of model parameter estimation under the impact of gross errors, timing errors, and multiple UAS targets.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Potential Gains of Macrodiversity in mmWave Cellular Networks with Correlated Blocking 相关阻塞毫米波蜂窝网络中宏分集的潜在增益
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020721
Enass Hriba, M. Valenti
At millimeter wave (mmWave) frequencies, signals are prone to blocking by objects in the environment, which causes paths to go from line-of-sight (LOS) to non-LOS (NLOS). We consider macrodiversity as a strategy to improve the performance of mmWave cellular systems, where the user attempts to connect with two or more base stations. An accurate analysis of macrodiversity must account for the possibility of correlated blocking, which occurs when a single blockage simultaneously blocks the paths to two base stations. In this paper, we analyze the macrodiverity gain in the presence of correlated random blocking and interference. To do so, we develop a framework to determine distributions for the LOS probability, SNR, and SINR by taking into account correlated blocking. We consider a cellular uplink with both diversity combining and selection combining schemes. We also study the impact of blockage size and blockage density. We show that blocking can be both a blessing and a curse. On the one hand, the signal from the source transmitter could be blocked, and on the other hand, interfering signals tend to also be blocked, which leads to a completely different effect on macrodiversity gains. We also show that the assumption of independent blocking can lead to an incorrect evaluation of macrodiversity gain, as the correlation tends to decrease macrodiversity gain.
在毫米波(mmWave)频率下,信号容易被环境中的物体阻挡,从而导致路径从视线(LOS)转向非视线(NLOS)。我们认为宏分集是改善毫米波蜂窝系统性能的一种策略,在毫米波蜂窝系统中,用户试图连接两个或多个基站。对宏观分集的准确分析必须考虑到相关阻塞的可能性,当一个阻塞同时阻塞通往两个基站的路径时,就会发生相关阻塞。本文分析了存在相关随机阻塞和干扰时的宏观多样性增益。为此,我们开发了一个框架,通过考虑相关阻塞来确定LOS概率、信噪比和信噪比的分布。考虑了一种具有分集组合和选择组合两种方案的蜂窝上行链路。我们还研究了堵塞尺寸和堵塞密度的影响。我们表明,屏蔽可能是一种祝福,也可能是一种诅咒。一方面,来自源发射机的信号可能被阻挡,另一方面,干扰信号也容易被阻挡,这就导致了对宏分集增益的完全不同的影响。我们还表明,独立阻塞的假设可能导致对宏观多样性增益的错误评估,因为相关性倾向于降低宏观多样性增益。
{"title":"The Potential Gains of Macrodiversity in mmWave Cellular Networks with Correlated Blocking","authors":"Enass Hriba, M. Valenti","doi":"10.1109/MILCOM47813.2019.9020721","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020721","url":null,"abstract":"At millimeter wave (mmWave) frequencies, signals are prone to blocking by objects in the environment, which causes paths to go from line-of-sight (LOS) to non-LOS (NLOS). We consider macrodiversity as a strategy to improve the performance of mmWave cellular systems, where the user attempts to connect with two or more base stations. An accurate analysis of macrodiversity must account for the possibility of correlated blocking, which occurs when a single blockage simultaneously blocks the paths to two base stations. In this paper, we analyze the macrodiverity gain in the presence of correlated random blocking and interference. To do so, we develop a framework to determine distributions for the LOS probability, SNR, and SINR by taking into account correlated blocking. We consider a cellular uplink with both diversity combining and selection combining schemes. We also study the impact of blockage size and blockage density. We show that blocking can be both a blessing and a curse. On the one hand, the signal from the source transmitter could be blocked, and on the other hand, interfering signals tend to also be blocked, which leads to a completely different effect on macrodiversity gains. We also show that the assumption of independent blocking can lead to an incorrect evaluation of macrodiversity gain, as the correlation tends to decrease macrodiversity gain.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129292044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detection of Prevalent Malware Families with Deep Learning 基于深度学习的流行恶意软件家族检测
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020790
J. W. Stokes, C. Seifert, Jerry Li, Nizar Hejazi
Attackers evolve their malware over time in order to evade detection, and the rate of change varies from family to family depending on the amount of resources these groups devote to their “product”. This rapid change forces anti-malware companies to also direct much human and automated effort towards combatting these threats. These companies track thousands of distinct malware families and their variants, but the most prevalent families are often particularly problematic. While some companies employ many analysts to investigate and create new signatures for these highly prevalent families, we take a different approach and propose a new deep learning system to learn a semantic feature embedding which better discriminates the files within each of these families. Identifying files which are close in a metric space is the key aspect of malware clustering systems. The DeepSim system employs a Siamese Neural Network (SNN), which has previously shown promising results in other domains, to learn this embedding for the cosine distance in the feature space. The error rate for K-Nearest Neighbor classification using DeepSim's SNN with two hidden layers is 0.011% compared to 0.42% for a Jaccard Index-based baseline which has been used by several previously proposed systems to identify similar malware files.
随着时间的推移,攻击者会进化他们的恶意软件,以逃避检测,而变化的速度因家族而异,这取决于这些组织对其“产品”投入的资源数量。这种快速的变化迫使反恶意软件公司也将更多的人力和自动化工作用于对抗这些威胁。这些公司追踪了数千种不同的恶意软件家族及其变种,但最普遍的家族往往特别有问题。虽然一些公司雇佣了许多分析师来调查和创建这些高度流行的家族的新签名,但我们采取了不同的方法,并提出了一个新的深度学习系统来学习语义特征嵌入,从而更好地区分这些家族中的每个文件。识别在度量空间中接近的文件是恶意软件集群系统的关键方面。DeepSim系统采用了连体神经网络(Siamese Neural Network, SNN)来学习特征空间中余弦距离的嵌入,该网络之前在其他领域已经显示出有希望的结果。使用DeepSim的SNN和两个隐藏层进行k -最近邻分类的错误率为0.011%,而基于Jaccard指数的基线的错误率为0.42%,该基准已被几个先前提出的系统用于识别类似的恶意软件文件。
{"title":"Detection of Prevalent Malware Families with Deep Learning","authors":"J. W. Stokes, C. Seifert, Jerry Li, Nizar Hejazi","doi":"10.1109/MILCOM47813.2019.9020790","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020790","url":null,"abstract":"Attackers evolve their malware over time in order to evade detection, and the rate of change varies from family to family depending on the amount of resources these groups devote to their “product”. This rapid change forces anti-malware companies to also direct much human and automated effort towards combatting these threats. These companies track thousands of distinct malware families and their variants, but the most prevalent families are often particularly problematic. While some companies employ many analysts to investigate and create new signatures for these highly prevalent families, we take a different approach and propose a new deep learning system to learn a semantic feature embedding which better discriminates the files within each of these families. Identifying files which are close in a metric space is the key aspect of malware clustering systems. The DeepSim system employs a Siamese Neural Network (SNN), which has previously shown promising results in other domains, to learn this embedding for the cosine distance in the feature space. The error rate for K-Nearest Neighbor classification using DeepSim's SNN with two hidden layers is 0.011% compared to 0.42% for a Jaccard Index-based baseline which has been used by several previously proposed systems to identify similar malware files.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130856364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1