Xiaoqing Fan, Joel Llewelyn, A. Wagner, Matthew P. Kuzdeba
{"title":"Resilient communication against adversarial path-errors","authors":"Xiaoqing Fan, Joel Llewelyn, A. Wagner, Matthew P. Kuzdeba","doi":"10.1109/MILCOM.2017.8170790","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170790","url":null,"abstract":"We consider a communication problem in which a transmitter encodes a source into several streams that are subject to modification by an omniscient adversary while en route. We design encodings with a distortion guarantee that degrades gradually as the number of streams that the adversary alters increases. Notably, we find that a mixture of highly redundant coding and uncoded transmission outperforms schemes that protect all of the transmitted data against adversarial attack. This finding is confirmed both theoretically and experimentally.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129335317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical statistical inference attack against PHY-layer key extraction in real environments","authors":"R. Zhu, Tao Shu, Huirong Fu","doi":"10.1109/MILCOM.2017.8170755","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170755","url":null,"abstract":"Traditional cryptographic secret key establishment mechanisms are facing challenges with the fast growth of high-performance computing, and can be very costly in many settings, e.g. in wireless ad-hoc networks, since they consume scarce resources such as bandwidth and battery power. As an alternative, link-signature-based (LSB) secret key extraction techniques have received many interests in recent years. It is believed that these mechanisms are secure, based on the fundamental assumption that wireless signals received at two locations separated by more than half a wavelength apart are uncorrelated. However, recently it has been observed that in some circumstances this assumption does not hold, rendering LSB key extraction mechanisms vulnerable to attacks. This paper studies empirical statistical inference attacks (SIA) to LSB key extraction, whereby an attacker infers the signature of a target link, and henceforce recovers the secret key extracted from that signature, by observing the surrounding links. Different from prior work that assumes a theoretical link-correlation model for the inference, our study does not make any assumption on link correlation. Instead, ours is taking a machine learning method for link inference based on empirically measured link data. Machine learning (ML) algorithms are developed to launch SIA under various realistic scenarios. Our experiment results show that even without making assumptions on link correlation, the proposed inference algorithms are still quite effective, and can reduce the key search space by many orders of magnitudes compared to brutal force search.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129433561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Warren Smith, G. Kuperman, Michael Chan, Eric Morgan, H. Nguyen, N. Schear, Bich Vu, A. Weinert, M. Weyant, Daniel Whisman
{"title":"Cloud computing in tactical environments","authors":"Warren Smith, G. Kuperman, Michael Chan, Eric Morgan, H. Nguyen, N. Schear, Bich Vu, A. Weinert, M. Weyant, Daniel Whisman","doi":"10.1109/MILCOM.2017.8170823","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170823","url":null,"abstract":"Ground personnel at the tactical edge often lack data and analytics that would increase their effectiveness. To address this problem, this work investigates methods to deploy cloud computing capabilities in tactical environments. Our approach is to identify representative applications and to design a system that spans the software/hardware stack to support such applications while optimizing the use of scarce resources. This paper presents our high-level design and the results of initial experiments that indicate the validity of our approach.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"5 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123658499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Elastic multicast: Design extensions and experimentation results","authors":"B. Adamson, J. Macker, Jeffery W. Weston","doi":"10.1109/MILCOM.2017.8170808","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170808","url":null,"abstract":"This paper describes a new implementation of the Elastic Multicast (EM) protocol including new design enhancements for improved dynamic operation. The paper also presents additional performance data collected from emulation-based mobile network experiments. EM is a low complexity extension to Simplified Multicast Forwarding (SMF) that adds group-specific dynamic pruning of the SMF-based multicast forwarding mesh for higher rate traffic flows. It therefore reduces overhead by pruning the SMF relay sets in areas where no receivers exist. Our experimental emulation results show that, under a variety of mobility conditions and multicast group distribution patterns, EM maintains SMF-like data delivery robustness while significantly reducing overhead. We also demonstrate that a new design feature that provides preemptive ACK messages for active receiver groups leads to lower loss under mobility and sparse receiver groups. Based upon the results, we consider this feature critical to be included in any future EM design. We also present experimental results examining the performance of EM with classical flooding (CF) and connected dominating set (CDS) relay modes. We show, for the experiments examined, that CF provides some reduced loss with minimal additional overhead when used with EM. We also discuss future work and ongoing issues.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114313587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A more robust and efficient physical layer for SEDR airborne waveform","authors":"O. Goubet, R. Fracchia, A. Descharles","doi":"10.1109/MILCOM.2017.8170739","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170739","url":null,"abstract":"The SATURN Enhanced Data Rate (SEDR) waveform has been introduced by Line Of Sight (LOS) NATO standardization group as the new coalition standard for military airborne Ultra High Frequency (UHF) communications. However, the current design of its physical layer presents several shortcomings since it is a straightforward transposition of SATURN definition to wider channels. Indeed, new generation wide-band solutions have to cope with new issues, such as multi-path fading, which do not affect current narrow-band solutions. This paper presents the different points of the current SEDR physical layer which could expose critical communications like the military aeronautical ones to reliability issues and proposes a new physical layer which increases significantly the robustness of the system.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121679438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time ultra-wideband frequency sweeping channel sounder for 3–18 GHz","authors":"C. U. Bas, Vinod Kristem, Rui Wang, A. Molisch","doi":"10.1109/MILCOM.2017.8170721","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170721","url":null,"abstract":"This paper presents system concept, calibration and example measurements of a novel ultra-wideband, real-time channel sounder. The sounder operates in the frequency range from 3 GHz to 18 GHz thus providing a Fourier delay resolution of 66.7 ps. The developed sounder measures overlapping sub-bands of 1 GHz bandwidth to cover the whole frequency range. This allows us to use a waveform generator and a digitizer with relatively lower sample rates and significantly lowers the cost compared to sampling the whole band at once. With the transmit power of 40 dBm, the maximum measurable path loss is 132 dB without accounting possible antenna gains. In this work, we also describe the calibration procedure along with the method to patch sub-bands into a combined channel response. This approach is validated by comparing the results from vector network analyzer(VNA) measurements performed in the same static environment. In contrast to VNAs, however, our sounder is real-time and can measure in dynamic environments with maximum Doppler spreads up to 166.7 Hz. Additionally, we present sample results from the first measurement campaign performed in an urban cellular scenario covering 3–18 GHz.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"471 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115922581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pengyuan Du, Fan Pang, T. Braun, M. Gerla, Ceilidh Hoffmann, J. H. Kim
{"title":"Traffic optimization in software defined naval network for satellite communications","authors":"Pengyuan Du, Fan Pang, T. Braun, M. Gerla, Ceilidh Hoffmann, J. H. Kim","doi":"10.1109/MILCOM.2017.8170766","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170766","url":null,"abstract":"Naval surface fleets of the United States and its allies rely on multiple satellite communication systems (SATCOM) for onboard communication with other entities such as ships, shore nodes and hosts from external networks. Current practice is for an onboard ship router to select a particular SATCOM link for each outgoing traffic flow based on a mission-specific routing policy. In this paper we propose an alternative solution by viewing the multi-SATCOM link utilization task as a traffic engineering and load balancing problem — in particular, as a Multi-Commodity Flow (MCF) optimization problem. We propose using the Flow Deviation Method (FDM) as a network-wide optimal load-balancing solution that maximizes total throughput and minimizes traffic flow delay and jitter. Our approach is equally valid for both UDP and TCP flows. Network-wide global optimization is carried out via a central controller in a Software Defined Networking (SDN) framework. For TCP flows we propose a novel solution that combines the best attributes of Multi-Path TCP, SDN and FDM. Compared to single-path TCP or MPTCP-SDN without FDM-based traffic optimizer, our proposed combined scheme is more efficient in bandwidth utilization, delay/jitter minimization and also robust against jamming and intermittent link failure. Network performance results are validated via Mininet emulation tests.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130279824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Confrontation with closed network nation: Open network society's choices and consequences","authors":"Juha Kukkola, Mari Ristolainen, J. Nikkarila","doi":"10.1109/MILCOM.2017.8170732","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170732","url":null,"abstract":"The aim of this paper is to understand how closed national networks can impact the future cyber domain from the military perspective. We argue that Russia is currently manipulating the cyber domain through identified four lines of effort that may result in advantage in a form of asymmetric frontlines in cyber battlefields. Accordingly, a ‘closed network nation’ is able to force ‘open network society’ into a reactive mode. As a result, we use scenario analysis for the estimation of open network society's strategic choices and their consequences in a case of escalation and potential confrontation with a ‘closed network nation’. This paper improves situational awareness in the cyber domain and supports global planning of cyber operations and defense.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130453322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rui Wang, C. U. Bas, S. Sangodoyin, Sooyoung Hur, Jeongho Park, Jianzhong Zhang, A. Molisch
{"title":"Stationarity region of Mm-Wave channel based on outdoor microcellular measurements at 28 GHz","authors":"Rui Wang, C. U. Bas, S. Sangodoyin, Sooyoung Hur, Jeongho Park, Jianzhong Zhang, A. Molisch","doi":"10.1109/MILCOM.2017.8170816","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170816","url":null,"abstract":"The stationarity region, i.e., the area in which the statistics of a propagation channel remain constant, is an important measure of the propagation channel, and essential for efficient system design. This paper presents what is to our knowledge the first extensive measurement campaign for measuring the stationarity region of MIMO mm-wave channels. Using a novel 28 GHz phased-array sounder with high phase stability, we present results in an urban microcell LoS, and LOS to NLOS transition region scenario, for the stationarity region of shadowing, power delay profile, and the angular power spectrum. A comparison to results at cm-waves shows considerably reduced stationarity region size, which has an important impact on system design.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"98 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131514463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A control flow graph-based signature for packer identification","authors":"Moustafa Saleh, E. Ratazzi, Shouhuai Xu","doi":"10.1109/MILCOM.2017.8170793","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170793","url":null,"abstract":"The large number of malicious files that are produced daily outpaces the current capacity of malware analysis and detection. For example, Intel Security Labs reported that during the second quarter of 2016, their system found more than 40M of new malware [1]. The damage of malware attacks is also increasingly devastating, as witnessed by the recent Cryptowall malware that has reportedly generated more than $325M in ransom payments to its perpetrators [2]. In terms of defense, it has been widely accepted that the traditional approach based on byte-string signatures is increasingly ineffective, especially for new malware samples and sophisticated variants of existing ones. New techniques are therefore needed for effective defense against malware. Motivated by this problem, the paper investigates a new defense technique against malware. The technique presented in this paper is utilized for automatic identification of malware packers that are used to obfuscate malware programs. Signatures of malware packers and obfuscators are extracted from the CFGs of malware samples. Unlike conventional byte signatures that can be evaded by simply modifying one or multiple bytes in malware samples, these signatures are more difficult to evade. For example, CFG-based signatures are shown to be resilient against instruction modifications and shuffling, as a single signature is sufficient for detecting mildly different versions of the same malware. Last but not least, the process for extracting CFG-based signatures is also made automatic.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131723828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}