首页 > 最新文献

MILCOM 2013 - 2013 IEEE Military Communications Conference最新文献

英文 中文
Resilient Leadership Delegation in Tactical Systems 战术系统中的弹性领导授权
Pub Date : 2013-12-01 DOI: 10.1109/MILCOM.2013.321
Rishabh Dudheria, W. Trappe, N. Minsky
Transferring the role of leadership between members of a team is an important requirement in tactical operations as it allows an operation to continue in spite of unforeseen events. Delegation, at first glance, appears to be the simple act of giving someone else a right that one possesses. However, this basic function is challenging to implement electronically, and thus there is a need for mechanisms to enforce flexible delegation policies in distributed systems. It has been shown that Law Governed Interaction (LGI) can address these challenges based on the assumption of the trustworthiness of its own enforcement infrastructure. However, to meet the needs of tactical missions, the proposed mechanism should also be resilient to the Byzantine compromise of the infrastructure. Therefore, in this paper we extend the original LGI model to provide containment, guaranteeing that a single Byzantine agent cannot compromise the properties of the system and in general, our approach can withstand the presence of multiple Byzantine agents as long as a correlated pair of agents is not corrupt.
在战术行动中,在团队成员之间转移领导角色是一项重要的要求,因为它可以使行动在不可预见的情况下继续进行。授权,乍一看,似乎是将自己拥有的权利给予他人的简单行为。然而,以电子方式实现这个基本功能是具有挑战性的,因此需要在分布式系统中实施灵活的委托策略的机制。事实证明,基于其自身执法基础设施的可信度假设,法律约束的互动(LGI)可以解决这些挑战。但是,为了满足战术任务的需要,提议的机制还应能够适应基础设施的拜占庭式妥协。因此,在本文中,我们扩展了原始的LGI模型来提供遏制,保证单个拜占庭代理不会损害系统的属性,并且通常,我们的方法可以承受多个拜占庭代理的存在,只要相关的代理对没有损坏。
{"title":"Resilient Leadership Delegation in Tactical Systems","authors":"Rishabh Dudheria, W. Trappe, N. Minsky","doi":"10.1109/MILCOM.2013.321","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.321","url":null,"abstract":"Transferring the role of leadership between members of a team is an important requirement in tactical operations as it allows an operation to continue in spite of unforeseen events. Delegation, at first glance, appears to be the simple act of giving someone else a right that one possesses. However, this basic function is challenging to implement electronically, and thus there is a need for mechanisms to enforce flexible delegation policies in distributed systems. It has been shown that Law Governed Interaction (LGI) can address these challenges based on the assumption of the trustworthiness of its own enforcement infrastructure. However, to meet the needs of tactical missions, the proposed mechanism should also be resilient to the Byzantine compromise of the infrastructure. Therefore, in this paper we extend the original LGI model to provide containment, guaranteeing that a single Byzantine agent cannot compromise the properties of the system and in general, our approach can withstand the presence of multiple Byzantine agents as long as a correlated pair of agents is not corrupt.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117130608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JIM-Beam: Jamming-Resilient Wireless Flooding Based on Spatial Randomness JIM-Beam:基于空间随机性的抗干扰无线泛洪
Pub Date : 2013-12-01 DOI: 10.1109/MILCOM.2013.86
Jerry T. Chiang, Yih-Chun Hu
Many network operations rely on the flooding operation to provide long-term performance. Mitigating malicious interference in a flooding network is thus crucial in assuring availability. Recently, several protocols based on uncoordinated spread spectrum have been proposed for secure key establishment and jamming mitigation. In this paper, we present the JIM-Beam flooding protocol that randomizes the orientation of the main lobe of a node's directional antenna so that: (1) the attacker must jam in an inherently narrowband fashion, and (2) JIM-Beam is secure regardless of the attacker's computational and reaction abilities. We perform Monte Carlo simulations and show that JIM-Beam provides substantial performance improvements for packet flooding. We also discuss how combining JIM-Beam with existing antijamming schemes can provide substantial advantages to the combined system.
许多网络操作依赖于注水操作来提供长期性能。因此,减轻洪水网络中的恶意干扰对于确保可用性至关重要。近年来,人们提出了几种基于非协调扩频的安全密钥建立和抗干扰协议。在本文中,我们提出了JIM-Beam泛洪协议,该协议随机化节点定向天线的主瓣方向,以便:(1)攻击者必须以固有的窄带方式进行干扰,(2)无论攻击者的计算和反应能力如何,JIM-Beam都是安全的。我们进行了蒙特卡罗模拟,并表明JIM-Beam为数据包泛洪提供了实质性的性能改进。我们还讨论了如何将JIM-Beam与现有的抗干扰方案相结合,从而为组合系统提供实质性的优势。
{"title":"JIM-Beam: Jamming-Resilient Wireless Flooding Based on Spatial Randomness","authors":"Jerry T. Chiang, Yih-Chun Hu","doi":"10.1109/MILCOM.2013.86","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.86","url":null,"abstract":"Many network operations rely on the flooding operation to provide long-term performance. Mitigating malicious interference in a flooding network is thus crucial in assuring availability. Recently, several protocols based on uncoordinated spread spectrum have been proposed for secure key establishment and jamming mitigation. In this paper, we present the JIM-Beam flooding protocol that randomizes the orientation of the main lobe of a node's directional antenna so that: (1) the attacker must jam in an inherently narrowband fashion, and (2) JIM-Beam is secure regardless of the attacker's computational and reaction abilities. We perform Monte Carlo simulations and show that JIM-Beam provides substantial performance improvements for packet flooding. We also discuss how combining JIM-Beam with existing antijamming schemes can provide substantial advantages to the combined system.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Approach for WLAN Channel Selection Based on Outage Capacity 基于中断容量的无线局域网信道选择新方法
Pub Date : 2013-12-01 DOI: 10.1109/MILCOM.2013.281
Bahador Amiri, H. Sadjadpour
This paper introduces a new channel selection metric and its implementation for wireless networks. It is demonstrated that channel utilization and channel quality are two essential performance factors for wireless networks. Then, we define Non-Utilized Outage Capacity (NUOC) as a cross-layer channel metric which provides an intelligent adaptivity between these two performance factors. We also determine steps required for implementation of this new channel selection metric which includes measurement, decision and execution. The proposed mechanism in this paper is easy to implement in IEEE 802.11 standard which makes it very desirable and practical for these networks. Our simulation results show that our new scheme provides better performance compared to other well-known schemes.
本文介绍了一种新的无线网络信道选择度量及其实现方法。研究表明,信道利用率和信道质量是影响无线网络性能的两个重要因素。然后,我们将未使用中断容量(NUOC)定义为跨层信道度量,该度量在这两个性能因素之间提供智能自适应。我们还确定了实现这个新的通道选择度量所需的步骤,包括测量、决策和执行。本文提出的机制易于在IEEE 802.11标准中实现,对于这些网络来说是非常理想和实用的。仿真结果表明,与其他已知方案相比,新方案具有更好的性能。
{"title":"A New Approach for WLAN Channel Selection Based on Outage Capacity","authors":"Bahador Amiri, H. Sadjadpour","doi":"10.1109/MILCOM.2013.281","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.281","url":null,"abstract":"This paper introduces a new channel selection metric and its implementation for wireless networks. It is demonstrated that channel utilization and channel quality are two essential performance factors for wireless networks. Then, we define Non-Utilized Outage Capacity (NUOC) as a cross-layer channel metric which provides an intelligent adaptivity between these two performance factors. We also determine steps required for implementation of this new channel selection metric which includes measurement, decision and execution. The proposed mechanism in this paper is easy to implement in IEEE 802.11 standard which makes it very desirable and practical for these networks. Our simulation results show that our new scheme provides better performance compared to other well-known schemes.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121308226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives 基于信任的多目标战术网络服务组合与绑定
Pub Date : 2013-12-01 DOI: 10.1109/MILCOM.2013.314
Yating Wang, I. Chen, Jin-Hee Cho, Kevin S. Chan, A. Swami
Tactical networks must select service providers to meet service requirements of an operation while facing resource constraints and high security vulnerability. In such an environment nodes provide services to support various operations and/ may request services to support the operations as well. We formulate the problem of service composition and service binding as a multi-objective optimization (MOO) problem, minimizing the service cost, while maximizing the quality of service (QoS) and quality of information (QoI). The MOO problem is essentially a node-to-service assignment problem such that by dynamically formulating service composition, and selecting the right nodes to provide requested services, the network can support concurrent operations while achieving multiple system objectives. We develop a trust-based service composition and binding protocol. We demonstrate that the trust-based scheme outperforms the counterpart non-trust-based scheme. Furthermore, our trust-based scheme can effectively penalize malicious nodes performing self-promotion attacks, thus filtering out malicious nodes and can ultimately lead to high user satisfaction.
战术网络在面临资源约束和高安全漏洞的情况下,必须选择服务提供商以满足作战的服务需求。在这样的环境中,节点提供服务来支持各种操作,并且/也可以请求服务来支持这些操作。我们将服务组合和服务绑定问题表述为一个多目标优化(MOO)问题,最小化服务成本,同时最大化服务质量(QoS)和信息质量(QoI)。MOO问题本质上是一个节点到服务分配问题,通过动态地制定服务组合,并选择正确的节点来提供所请求的服务,网络可以在实现多个系统目标的同时支持并发操作。我们开发了一个基于信任的服务组合和绑定协议。我们证明了基于信任的方案优于非基于信任的方案。此外,我们的基于信任的方案可以有效地惩罚进行自我推广攻击的恶意节点,从而过滤掉恶意节点,最终达到较高的用户满意度。
{"title":"Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives","authors":"Yating Wang, I. Chen, Jin-Hee Cho, Kevin S. Chan, A. Swami","doi":"10.1109/MILCOM.2013.314","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.314","url":null,"abstract":"Tactical networks must select service providers to meet service requirements of an operation while facing resource constraints and high security vulnerability. In such an environment nodes provide services to support various operations and/ may request services to support the operations as well. We formulate the problem of service composition and service binding as a multi-objective optimization (MOO) problem, minimizing the service cost, while maximizing the quality of service (QoS) and quality of information (QoI). The MOO problem is essentially a node-to-service assignment problem such that by dynamically formulating service composition, and selecting the right nodes to provide requested services, the network can support concurrent operations while achieving multiple system objectives. We develop a trust-based service composition and binding protocol. We demonstrate that the trust-based scheme outperforms the counterpart non-trust-based scheme. Furthermore, our trust-based scheme can effectively penalize malicious nodes performing self-promotion attacks, thus filtering out malicious nodes and can ultimately lead to high user satisfaction.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126315445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance Analysis of Asymmetric RF/FSO Dual-Hop Relaying Systems for UAV Applications 无人机非对称RF/FSO双跳中继系统性能分析
Pub Date : 2013-11-20 DOI: 10.1109/MILCOM.2013.280
Jaedon Park, Eunju Lee, G. Park, Bongsoo Roh, Gi-Wan Yoon
In this paper, we analyze the performance of a dual-hop relaying system composed of asymmetric radio frequency (RF) and free-space optics (FSO) (RF/FSO) links. We consider an asymmetric amplify-and-forward (AF) relay which converts the received RF signal into an optical signal using the subcarrier intensity modulation (SIM) scheme. The RF and FSO channels are assumed to experience Rayleigh and Gamma-Gamma fading distributions, respectively. Particularly, we derive the average probability of error as well as ergodic capacity upper bound of the asymmetric RF/FSO dual-hop relaying system, in closed-forms. As a result, the asymmetric RF/FSO relaying system shows slightly worse performance in average probability of error and ergodic capacity upper bound than the RF/RF relaying system in the low SNR. Over the SNR of 20 dB, however, the asymmetric RF/FSO relaying system shows very similar performance in average probability of error and ergodic capacity upper bound to the RF/RF relaying system. The derived mathematical expressions are verified by exactly matching Monte-Carlo simulation results.
本文分析了由非对称射频(RF)和自由空间光学(RF/FSO)链路组成的双跳中继系统的性能。我们考虑了一种非对称放大转发(AF)继电器,它使用子载波强度调制(SIM)方案将接收到的射频信号转换为光信号。假设射频和FSO信道分别经历瑞利和γ - γ衰落分布。特别地,我们导出了非对称RF/FSO双跳中继系统的平均误差概率和遍历容量上界。结果表明,在低信噪比条件下,非对称RF/FSO中继系统的平均误差概率和遍历容量上界性能略低于RF/RF中继系统。然而,在信噪比为20 dB时,非对称RF/FSO中继系统在平均误差概率和遍频容量上限方面表现出与RF/RF中继系统非常相似的性能。通过与蒙特卡罗仿真结果的精确匹配,验证了推导出的数学表达式。
{"title":"Performance Analysis of Asymmetric RF/FSO Dual-Hop Relaying Systems for UAV Applications","authors":"Jaedon Park, Eunju Lee, G. Park, Bongsoo Roh, Gi-Wan Yoon","doi":"10.1109/MILCOM.2013.280","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.280","url":null,"abstract":"In this paper, we analyze the performance of a dual-hop relaying system composed of asymmetric radio frequency (RF) and free-space optics (FSO) (RF/FSO) links. We consider an asymmetric amplify-and-forward (AF) relay which converts the received RF signal into an optical signal using the subcarrier intensity modulation (SIM) scheme. The RF and FSO channels are assumed to experience Rayleigh and Gamma-Gamma fading distributions, respectively. Particularly, we derive the average probability of error as well as ergodic capacity upper bound of the asymmetric RF/FSO dual-hop relaying system, in closed-forms. As a result, the asymmetric RF/FSO relaying system shows slightly worse performance in average probability of error and ergodic capacity upper bound than the RF/RF relaying system in the low SNR. Over the SNR of 20 dB, however, the asymmetric RF/FSO relaying system shows very similar performance in average probability of error and ergodic capacity upper bound to the RF/RF relaying system. The derived mathematical expressions are verified by exactly matching Monte-Carlo simulation results.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127049577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge ICEMAN:一种高效、稳健、安全的网络边缘态势感知系统
Pub Date : 2013-11-18 DOI: 10.1109/MILCOM.2013.255
Samuel B. Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, M. Gerla, H. Sadjadpour, J. Garcia-Luna-Aceves
Situational awareness applications in disaster response and tactical scenarios require efficient communication without a managed infrastructure. In principle, the performance, size, weight, and power of commercial off-the-shelf mobile phones and tablets are sufficient to support such applications, provided that efficient protocols and mechanisms are put in place for the efficient and secure sharing and storage of content among such devices. ICEMAN (Information CEntric Mobile Ad-hoc Networking) is a system that allows applications to request content objects by their attributes, and integrates its API with utility-based dissemination, caching, and network-coding mechanisms to deliver content. ICEMAN is implemented based on the Haggle architecture running in the Android operating system, and supports distributed situational-awareness applications operating in networks subject to severe disruption. Its functionality is described, and performance results of the ICEMAN implementation running in mobile phones and the CORE/EMANE network emulation are presented for several test scenarios.
灾难响应和战术场景中的态势感知应用需要在没有托管基础设施的情况下进行有效的通信。原则上,商用现成的移动电话和平板电脑的性能、尺寸、重量和功率足以支持此类应用程序,前提是在这些设备之间建立有效的协议和机制,以实现高效和安全的内容共享和存储。ICEMAN(以信息为中心的移动自组织网络)是一个系统,它允许应用程序通过其属性请求内容对象,并将其API与基于实用程序的传播、缓存和网络编码机制集成在一起以交付内容。ICEMAN是基于运行在Android操作系统上的Haggle架构实现的,并支持在严重中断的网络中运行的分布式态势感知应用程序。对其功能进行了描述,并给出了ICEMAN实现在手机上运行的性能结果和CORE/EMANE网络仿真的几个测试场景。
{"title":"ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge","authors":"Samuel B. Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, M. Gerla, H. Sadjadpour, J. Garcia-Luna-Aceves","doi":"10.1109/MILCOM.2013.255","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.255","url":null,"abstract":"Situational awareness applications in disaster response and tactical scenarios require efficient communication without a managed infrastructure. In principle, the performance, size, weight, and power of commercial off-the-shelf mobile phones and tablets are sufficient to support such applications, provided that efficient protocols and mechanisms are put in place for the efficient and secure sharing and storage of content among such devices. ICEMAN (Information CEntric Mobile Ad-hoc Networking) is a system that allows applications to request content objects by their attributes, and integrates its API with utility-based dissemination, caching, and network-coding mechanisms to deliver content. ICEMAN is implemented based on the Haggle architecture running in the Android operating system, and supports distributed situational-awareness applications operating in networks subject to severe disruption. Its functionality is described, and performance results of the ICEMAN implementation running in mobile phones and the CORE/EMANE network emulation are presented for several test scenarios.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122171905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Performance of Multipath in Fiber-Wireless (FiWi) Access Network with Network Virtualization 基于网络虚拟化的FiWi接入网多路径性能研究
Pub Date : 2013-11-01 DOI: 10.1109/MILCOM.2013.161
Shan He, Guochu Shou, Yihong Hu, Zhigang Guo
Nowadays, multipath routing algorithms and resource distribution strategies of the homogeneous network are the research focus of the Fiber-Wireless (FiWi) network which is the combination of optical subnetwork and wireless subnetwork. However few studies concerned on the efficient way to set up multipath in FiWi network as the affiliation of heterogeneous networks and packet reordering are tangled problems. Separating the Internet service provider (ISP) into two independent sections, nfrastructure provider (InP) and service provider (SP), the proposal of network virtualization provides a potential method to solve this problem. As a starting point, in this paper we apply network virtualization to remove the differences between heterogeneous networks to take FiWi network as a whole. Moreover, we propose a viable way to establish multipath access in the FiWi network through the flexible use of virtual networks (VNs) which can be deployed in the virtual resource manager (VRM). Besides, we present the superior performance of multipath in the FiWi network with network virtualization based on the simulation results by using the multipath scheduling policy Weighted Round Robin (WRR).
目前,同质网络的多径路由算法和资源分配策略是光子网和无线子网相结合的光纤无线网络(FiWi)的研究热点。然而,由于FiWi网络的异构性和分组重排序是一个相互纠缠的问题,因此关于如何有效地建立多路径的研究很少。将互联网服务提供商(ISP)分离为两个独立的部分,即基础设施提供商(InP)和服务提供商(SP),网络虚拟化的提出为解决这一问题提供了一种潜在的方法。本文从网络虚拟化着手,消除异构网络之间的差异,将FiWi网络作为一个整体。此外,我们提出了一种可行的方法,通过灵活使用可以部署在虚拟资源管理器(VRM)中的虚拟网络(VNs),在FiWi网络中建立多路径访问。此外,在仿真结果的基础上,采用加权轮询调度策略(WRR)展示了多路径在具有网络虚拟化的FiWi网络中的优越性能。
{"title":"Performance of Multipath in Fiber-Wireless (FiWi) Access Network with Network Virtualization","authors":"Shan He, Guochu Shou, Yihong Hu, Zhigang Guo","doi":"10.1109/MILCOM.2013.161","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.161","url":null,"abstract":"Nowadays, multipath routing algorithms and resource distribution strategies of the homogeneous network are the research focus of the Fiber-Wireless (FiWi) network which is the combination of optical subnetwork and wireless subnetwork. However few studies concerned on the efficient way to set up multipath in FiWi network as the affiliation of heterogeneous networks and packet reordering are tangled problems. Separating the Internet service provider (ISP) into two independent sections, nfrastructure provider (InP) and service provider (SP), the proposal of network virtualization provides a potential method to solve this problem. As a starting point, in this paper we apply network virtualization to remove the differences between heterogeneous networks to take FiWi network as a whole. Moreover, we propose a viable way to establish multipath access in the FiWi network through the flexible use of virtual networks (VNs) which can be deployed in the virtual resource manager (VRM). Besides, we present the superior performance of multipath in the FiWi network with network virtualization based on the simulation results by using the multipath scheduling policy Weighted Round Robin (WRR).","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126869488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Improving the SRW Waveform via a Physical Layer Retrofit 通过物理层改造改善SRW波形
Pub Date : 2013-11-01 DOI: 10.1109/MILCOM.2013.74
Alex Blyskun, Mark Johnson, Sungill Kim, James Speros, G. Thatte, D. Williamson
In this paper we show that it is possible to improve performance and provide expanded CONOPS for an existing tactical waveform, namely the soldier radio waveform (SRW), via a physical layer retrofit. We integrated a new proof-of-concept physical layer into existing software defined radio (SDR) hardware and with the existing upper open systems interconnection (OSI) layers of SRW, and then demonstrated improvements with head-to-head field trials. To be specific, the new physical layer offers the following improvements over the baseline physical layer of SRW: (i) broadband throughputs above 6 Mbps, (ii) improved robustness to dynamic airborne and terrestrial multipath channels, and (iii) discontinuous spectra with carrier bandwidth flexibility (enabling operation even where continuous bandwidth is unavailable). The physical layer design is based on TrellisWare's universal air and ground (UAG) physical layer introduced in [1]. In that work, we discuss how the UAG's flexibility in terms of bandwidth usage and interface to upper layers could be leveraged to provide a physical layer retrofit to an existing waveforms. This paper covers the effort to target SRW, an effort which concluded in a demonstration of significant performance enhancements to SRW.
在本文中,我们展示了通过物理层改造可以提高性能并为现有战术波形(即士兵无线电波形(SRW))提供扩展的CONOPS。我们将一个新的概念验证物理层集成到现有的软件定义无线电(SDR)硬件和现有的SRW上层开放系统互连(OSI)层中,然后通过面对面的现场试验展示了改进。具体来说,新的物理层在SRW的基线物理层基础上提供了以下改进:(i)超过6mbps的宽带吞吐量,(ii)提高了对动态机载和地面多径信道的鲁棒性,以及(iii)具有载波带宽灵活性的不连续频谱(即使在连续带宽不可用的情况下也能运行)。物理层设计基于b[1]中介绍的TrellisWare通用空气和地面(UAG)物理层。在这项工作中,我们讨论了如何利用UAG在带宽使用和上层接口方面的灵活性,为现有波形提供物理层改造。本文涵盖了以SRW为目标的工作,该工作在SRW的显著性能增强的演示中得出结论。
{"title":"Improving the SRW Waveform via a Physical Layer Retrofit","authors":"Alex Blyskun, Mark Johnson, Sungill Kim, James Speros, G. Thatte, D. Williamson","doi":"10.1109/MILCOM.2013.74","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.74","url":null,"abstract":"In this paper we show that it is possible to improve performance and provide expanded CONOPS for an existing tactical waveform, namely the soldier radio waveform (SRW), via a physical layer retrofit. We integrated a new proof-of-concept physical layer into existing software defined radio (SDR) hardware and with the existing upper open systems interconnection (OSI) layers of SRW, and then demonstrated improvements with head-to-head field trials. To be specific, the new physical layer offers the following improvements over the baseline physical layer of SRW: (i) broadband throughputs above 6 Mbps, (ii) improved robustness to dynamic airborne and terrestrial multipath channels, and (iii) discontinuous spectra with carrier bandwidth flexibility (enabling operation even where continuous bandwidth is unavailable). The physical layer design is based on TrellisWare's universal air and ground (UAG) physical layer introduced in [1]. In that work, we discuss how the UAG's flexibility in terms of bandwidth usage and interface to upper layers could be leveraged to provide a physical layer retrofit to an existing waveforms. This paper covers the effort to target SRW, an effort which concluded in a demonstration of significant performance enhancements to SRW.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116218965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IEEE DySPAN 1900.5 Efforts to Support Spectrum Access Standardization IEEE DySPAN 1900.5努力支持频谱接入标准化
Pub Date : 2013-11-01 DOI: 10.1109/MILCOM.2013.296
L. Grande, M. Sherman, Hua Zhu, M. Kokar, J. Stine
The goal of IEEE DySPAN 1900.5 working group is to support the regulatory community and the wireless industry who rely on solutions for spectrum sharing. This group has created requirements and a flexible architecture for the proliferation of dynamic spectrum access policies. Current work is focused on defining a policy language and ontology as well as modeling spectrum consumption in an effort to create a suite of standards that support the formal representation of spectrum policy and usage in radio networks. Collaboration in standardizing solutions will improve the success and efficiency for all stakeholders in this ever changing environment. This paper will provide an overview of the current activities of the 1900.5 working group including its two current standards projects, P1900.5.1 and P1900.5.2 and interactions with regulatory bodies.
IEEE DySPAN 1900.5工作组的目标是为依赖频谱共享解决方案的监管界和无线行业提供支持。该小组为动态频谱访问策略的扩展创建了需求和灵活的体系结构。目前的工作重点是定义策略语言和本体,以及为频谱消耗建模,努力创建一套标准,支持频谱策略的正式表示和无线电网络中的使用。在这个不断变化的环境中,标准化解决方案的协作将提高所有利益相关者的成功和效率。本文将概述1900.5工作组的当前活动,包括其两个当前标准项目,P1900.5.1和P1900.5.2,以及与监管机构的互动。
{"title":"IEEE DySPAN 1900.5 Efforts to Support Spectrum Access Standardization","authors":"L. Grande, M. Sherman, Hua Zhu, M. Kokar, J. Stine","doi":"10.1109/MILCOM.2013.296","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.296","url":null,"abstract":"The goal of IEEE DySPAN 1900.5 working group is to support the regulatory community and the wireless industry who rely on solutions for spectrum sharing. This group has created requirements and a flexible architecture for the proliferation of dynamic spectrum access policies. Current work is focused on defining a policy language and ontology as well as modeling spectrum consumption in an effort to create a suite of standards that support the formal representation of spectrum policy and usage in radio networks. Collaboration in standardizing solutions will improve the success and efficiency for all stakeholders in this ever changing environment. This paper will provide an overview of the current activities of the 1900.5 working group including its two current standards projects, P1900.5.1 and P1900.5.2 and interactions with regulatory bodies.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122764096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Coherent Distributed Techniques for Tactical Radio Networks: Enabling Long Range Communications with Reduced Size, Weight, Power and Cost 战术无线电网络的相干分布式技术:以更小的尺寸、重量、功率和成本实现远程通信
Pub Date : 2013-11-01 DOI: 10.1109/MILCOM.2013.117
D. Scherber, P. Bidigare, Richard O'Donnell, M. Rebholz, M. Oyarzun, Charlie Obranovich, William Kulp, Daniel Chang, D. Brown
This paper addresses the use of distributed coherent communication techniques across a wireless network of tactical radios to enable extended-range communications. Conventional tactical communication systems providing multi-kilometer terrestrial ranges utilize large and costly manpack or vehicular-mount radios. In this paper we discuss techniques for distributing the transmit functions coherently across a network of small, low-power squad radios to achieve similar ranges. We present a testbed implementation of these techniques and over-the-air demonstrations of coherent distributed transmit communications at 3.5 km standoff and 1.25Mbps data rates using radios operating with under 20dBm of transmit power each.
本文讨论了在战术无线电无线网络中使用分布式相干通信技术来实现扩展范围通信。提供多公里地面范围的传统战术通信系统使用大型和昂贵的便携式或车载无线电。在本文中,我们讨论了在一个小的、低功率的小组无线电网络中相干地分配发射功能以达到相似的距离的技术。我们提出了这些技术的测试平台实现,以及使用每个发射功率低于20dBm的无线电在3.5公里距离和1.25Mbps数据速率下的相干分布式传输通信的空中演示。
{"title":"Coherent Distributed Techniques for Tactical Radio Networks: Enabling Long Range Communications with Reduced Size, Weight, Power and Cost","authors":"D. Scherber, P. Bidigare, Richard O'Donnell, M. Rebholz, M. Oyarzun, Charlie Obranovich, William Kulp, Daniel Chang, D. Brown","doi":"10.1109/MILCOM.2013.117","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.117","url":null,"abstract":"This paper addresses the use of distributed coherent communication techniques across a wireless network of tactical radios to enable extended-range communications. Conventional tactical communication systems providing multi-kilometer terrestrial ranges utilize large and costly manpack or vehicular-mount radios. In this paper we discuss techniques for distributing the transmit functions coherently across a network of small, low-power squad radios to achieve similar ranges. We present a testbed implementation of these techniques and over-the-air demonstrations of coherent distributed transmit communications at 3.5 km standoff and 1.25Mbps data rates using radios operating with under 20dBm of transmit power each.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114492861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
MILCOM 2013 - 2013 IEEE Military Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1