2016 International Conference on Military Communications and Information Systems (ICMCIS)最新文献

筛选
英文 中文
A method of network workload generation for evaluation of intrusion detection systems in SDN environment 一种用于SDN环境下入侵检测系统评估的网络工作负载生成方法
Damian Jankowski, M. Amanowicz
{"title":"A method of network workload generation for evaluation of intrusion detection systems in SDN environment","authors":"Damian Jankowski, M. Amanowicz","doi":"10.1109/ICMCIS.2016.7496575","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496575","url":null,"abstract":"Software defined networks create new opportunities for an implementation of the intrusion detection and protection methods. Therefore, special data collections called datasets are necessary for the development, testing and evaluation of such mechanisms. For the SDN environment, there are no prepared datasets that could be used directly to develop IDS methods. These sets contain tuples with features, which represent the activities performed in the IT system. In the presented approach, normal and malicious traffic are generated in the SDN virtual environment. The workload for the dataset is generated in a random manner. The proposed method enables the generation of flows, which can be used for the evaluation of various SDN-based intrusion detection methods.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133554232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A review of modeling toolbox for BigData 大数据建模工具箱综述
Hadi Hashem, D. Ranc
{"title":"A review of modeling toolbox for BigData","authors":"Hadi Hashem, D. Ranc","doi":"10.1109/ICMCIS.2016.7496565","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496565","url":null,"abstract":"Modeling tools and operators help the user / developer to identify the processing field on the top of the sequence and to send into the computing module only the data related to the requested result. The remaining data is not relevant and it will slow down the processing. The biggest challenge nowadays is to get high quality processing results with a reduced computing time and costs. The processing sequence must be reviewed on the top, so that we could add one or more modeling tools. The existing processing models do not take in consideration this aspect and focus on getting high calculation performances which will increase the computing time and costs. In this paper we provide you a study of the main modeling tools for BigData.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128189207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RSS-based secret key generation for indoor and outdoor WBANs using on-body sensor nodes 基于rss的室内外无线宽带网络密钥生成
T. Castel, P. Van Torre, H. Rogier
{"title":"RSS-based secret key generation for indoor and outdoor WBANs using on-body sensor nodes","authors":"T. Castel, P. Van Torre, H. Rogier","doi":"10.1109/ICMCIS.2016.7496540","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496540","url":null,"abstract":"Given that the market of wearables is in so-called hypergrowth mode, more and more of these on-body devices will interact with each other. These body-to-body, device-to-device links should not only provide reliable but also secure communication of personal user data. Therefore, we have analyzed the potential of using the unique reciprocal body-to-body channel between two legitimate parties, to create a high-level security key that is unknown to an eavesdropper. Both randomly moving legitimate parties, typically called Alice and Bob, were equipped with low-power wireless on-body sensor nodes, which collect the Received Signal Strength values. Additionally, the eavesdropper Eve, who is continuously sniffing the body-to-body channel using a third sensor node, collects her own sequence of RSS values, which are expected to be highly decorrelated from the RSS values from both Alice and Bob. Based on a statistical analysis, applied to Received Signal Strength values to verify the correlation, entropy and mutual information, the body-to-body link seems very suitable for RSS-based secret key generation in indoor and outdoor Wireless Body Area Networks. Moreover, this practical and lightweight alternative for secret key generation ensures low on-chip complexity and, hence, low computational power consumption.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"92-C 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Delay analysis of STDMA in grid wireless sensor networks 网格无线传感器网络中STDMA的时延分析
I. Amdouni, C. Adjih, P. Minet, T. Plesse
{"title":"Delay analysis of STDMA in grid wireless sensor networks","authors":"I. Amdouni, C. Adjih, P. Minet, T. Plesse","doi":"10.1109/ICMCIS.2016.7496580","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496580","url":null,"abstract":"TDMA (Time Division Multiple Access)) is known to be an affective method for energy saving in wireless sensor networks (WSNs). However, when any slot is exclusively reserved to one node, the TDMA-based protocols suffer from low-channel utilization and high data delivery delays. STDMA (Spatial reuse TDMA) avoids these drawbacks by allowing multiple nodes to access the same time slot provided that these nodes do not interfere. The objective of this paper is to evaluate the delay performance of STDMA assuming grid networks and a random ordering of the slots in the STDMA cycle. The evaluation is performed both with a stochastic analytical model and by experiments based on a known STDMA method called VCM. Results show that the random ordering performance is rather good. A framework for STDMA applied to general graphs under SINR interference model is also presented.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114458051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assisted content-based labelling and classification of documents 协助基于内容的文档标记和分类
K. Wrona, S. Oudkerk, A. Armando, Silvio Ranise, Riccardo Traverso, Lisa Ferrari, Richard McEvoy
{"title":"Assisted content-based labelling and classification of documents","authors":"K. Wrona, S. Oudkerk, A. Armando, Silvio Ranise, Riccardo Traverso, Lisa Ferrari, Richard McEvoy","doi":"10.1109/ICMCIS.2016.7496589","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496589","url":null,"abstract":"The correct labelling of all information at its point of origin is a critical enabler for effective information access control in modern military systems. If information is not properly labeled it cannot be shared between different communities of interest and coalition partners, which affects the responsibility to share and potentially impedes ongoing military operations. This paper describes two experiments performed at the NATO Communications and Information Agency related to supporting correct labelling of both pre-existing and newly created information objects. Two different techniques are used, one based on semantic analysis and the other on machine learning. Both approaches offer promising results in their respective use case scenarios, but require further development prior to operational deployment.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114497768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A realistic military scenario and emulation environment for experimenting with tactical communications and heterogeneous networks 一个真实的军事场景和模拟环境,用于试验战术通信和异构网络
Niranjan Suri, A. Hansson, J. Nilsson, P. Lubkowski, K. Marcus, M. Hauge, King Lee, Boyd Buchin, Levent Misirhoglu, M. Peuhkuri
{"title":"A realistic military scenario and emulation environment for experimenting with tactical communications and heterogeneous networks","authors":"Niranjan Suri, A. Hansson, J. Nilsson, P. Lubkowski, K. Marcus, M. Hauge, King Lee, Boyd Buchin, Levent Misirhoglu, M. Peuhkuri","doi":"10.1109/ICMCIS.2016.7496568","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496568","url":null,"abstract":"Emulation environments are an effective approach to experimenting with and evaluating network protocols, algorithms, and components. This paper describes a joint effort by the NATO Science & Technology Organization's IST-124 task group to develop and distribute an emulation environment and scenario. The most significant contribution is a vetted and militarily-realistic scenario that provides a rich combination of elements for experimentation. The scenario includes detailed mobility patterns for a battalion-sized operation over the course of two hours, which has been developed by military experts in planning and performing real exercises. The mobility patterns are used to drive the network emulation.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126844619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Learning multi-channel power allocation against smart jammer in cognitive radio networks 认知无线电网络中针对智能干扰的多信道功率分配学习
Feten Slimeni, B. Scheers, V. Le Nir, Zied Chtourou, R. Attia
{"title":"Learning multi-channel power allocation against smart jammer in cognitive radio networks","authors":"Feten Slimeni, B. Scheers, V. Le Nir, Zied Chtourou, R. Attia","doi":"10.1109/ICMCIS.2016.7496544","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496544","url":null,"abstract":"We model the power allocation interaction between a cognitive radio and a jammer as a two-player zero-sum game. First, we determine the power allocation strategy for the cognitive radio using a modified version of the Q-learning algorithm against fixed jamming strategies. The learned anti-jamming strategy will be compared to the common waterfilling technique. Then, we consider the power allocation game using Q-learning for both the cognitive radio and the jammer. The learned strategies will be compared to the Nash equilibrium found under the assumption of perfect knowledge. Finally, we consider the real scenario of a jammer with imperfect information.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114951908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Joint protection of a military formation using heterogeneous sensors in a mobile ad hoc network: Concept and field tests 在移动自组织网络中使用异构传感器的军事编队联合保护:概念和现场试验
Julian Hörst, F. Govaers, Berthold Rehbein, C. Barz, P. Sevenich
{"title":"Joint protection of a military formation using heterogeneous sensors in a mobile ad hoc network: Concept and field tests","authors":"Julian Hörst, F. Govaers, Berthold Rehbein, C. Barz, P. Sevenich","doi":"10.1109/ICMCIS.2016.7496543","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496543","url":null,"abstract":"This paper presents a concept on how a military formation can be jointly protected by linking available single-platform protection systems. To achieve this, a mobile ad hoc network is established between different vehicles carrying heterogeneous sensors, specifically acoustic and ESM sensors, emulating the protection systems. Distributed data fusion is applied to provide a situation overview for localizing a threat. To substantiate the concept, results from field tests regarding network, sensor, and data fusion functionality are presented.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116486420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance of distributed channel selection for cognitive MANET in the presence of intentional jamming 有意识干扰下认知MANET的分布式信道选择性能
G. Szmit, J. Dolowski, J. Lopatka
{"title":"Performance of distributed channel selection for cognitive MANET in the presence of intentional jamming","authors":"G. Szmit, J. Dolowski, J. Lopatka","doi":"10.1109/ICMCIS.2016.7496545","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496545","url":null,"abstract":"Currently, a number of different radio systems which are set up and work during a mission is growing rapidly. A traditional way to ensure coexistence of the radio systems and minimize interferences is a frequency allocation plan (pre-assigned frequencies) which is believed to be inefficient, whereas Dynamic Spectrum Access (DSA) is thought to introduce a more efficient spectrum usage. By using policy a Cognitive Radio (CR) has some autonomy to make decisions about the spectrum usage. We use sensing policies to optimize CR work against different types of frequency hopping jammers. We focus on operational usage of the policies implemented in CR, and operational assessment of services used in different types of missions, by definition of the mission service utility function. Furthermore, we compare simulation results and practical network implementation during real missions and military exercises. In this paper we focused on the assessment of influence of fast hopping signals on operational capabilities of the CR network and its ability to meet the information exchange requirement, as it is a part of military radio system, and therefore must ensure command services with required quality.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134515270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the creation of a single mission-wide information domain in military operations: Application of the information clearing house and release gateway at NATO exercise Trident Juncture 2015 关于在军事行动中创建单一任务范围的信息域:信息交换所和发布网关在北约三叉戟节点2015演习中的应用
M. Rudack, Cristina Palacios-Camarero, H. Wietgrefe
{"title":"On the creation of a single mission-wide information domain in military operations: Application of the information clearing house and release gateway at NATO exercise Trident Juncture 2015","authors":"M. Rudack, Cristina Palacios-Camarero, H. Wietgrefe","doi":"10.1109/ICMCIS.2016.7496566","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496566","url":null,"abstract":"NATO doctrine [1] clearly expresses that the establishment of a peaceful and secure environment requires a comprehensive political-civilian-military approach to crisis management [2]. According to [1], coherence was achieved through the harmonization of strategic processes, planning and objectives across the civil and military actors. This requires the establishment of trusted information channels between the actors. A cornerstone for this is to enable automatic or semiautomatic transfer of information between different security domains, therefore enabling a single information domain where partners can access and share the vast majority of mission information as suggested in [3]. The solution should ideally also enable information sharing with Non-Traditional Partners (NTPs1) in compliance with the NATO Comprehensive Approach to crisis management. An Information Clearing House (ICH) as introduced in [3] maintains a tightly managed catalog of mission relevant information, to ensure that users easily find and access the latest approved version of any information object. In addition, the ICH provides support to a release authority and to a Release Gateway (RG), which allow semi-automatic transfer of releasable products between different security domains. The combination of the three elements creates the perception of a single information domain. This paper presents how the ICH-RG and the hybrid confidentiality-releasability model [4] have been implemented at NATO exercise Trident Juncture 2015 (TRJE15) [5]. It describes the assigned roles and responsibilities for the information management and release processes as applied in this NATO certification event. Applied processes require the consideration of Community of Interests (CoIs) within the same security domain, which is not covered in the model presented in [4]. Furthermore, the real world application of the ICH has a much stronger focus on the publication of information from the lower security domains to the mission domain. Statistics for the release and publication processes are presented. The paper concludes with recommendations and required next steps in implementing the ICH as a capability in the federated mission environment.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130936818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信