MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)最新文献

筛选
英文 中文
Secrecy capacity probability of a SIMO system with dissimilar and non-integer Nakagami-m fading factors 具有不同非整数Nakagami-m衰落因子的SIMO系统的保密能力概率
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170738
Xian Liu
{"title":"Secrecy capacity probability of a SIMO system with dissimilar and non-integer Nakagami-m fading factors","authors":"Xian Liu","doi":"10.1109/MILCOM.2017.8170738","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170738","url":null,"abstract":"In this paper, we investigate the information-theoretic secrecy of a system with multiple legitimate receivers and multiple eavesdroppers. This system is subject to the Nakagami-m fading. Unlike some existing works, we do not assume that the fading parameters are identical or integers. Although the complexity is significantly increased, we are able to derive a set of closed-form formulas for the outage probability and the probability of strictly positive secrecy capacity.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126650256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dataset generator for next generation system call host intrusion detection systems 一个用于下一代系统调用主机入侵检测系统的数据集生成器
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170835
Marcus Pendleton, Shouhuai Xu
{"title":"A dataset generator for next generation system call host intrusion detection systems","authors":"Marcus Pendleton, Shouhuai Xu","doi":"10.1109/MILCOM.2017.8170835","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170835","url":null,"abstract":"Over the years, system calls (syscalls) have become an increasingly popular data source for host intrusion detection systems (HIDS). This is partly due to their strong security semantic implications. As syscalls conform to a program's control-flow graph, a deviation in a syscall sequence may imply a deviation in a program's control-flow graph. This is useful for detecting the control-flow hijacking class of attacks. Additionally, malware must utilize syscalls in order to provide any utility to the attacker, with the exception of some denial-of-service attacks. Because all syscalls are observable from the kernel, this makes evasion difficult for attackers under syscall HIDS. Given their suitability for HIDS, many approaches based on syscalls have been proposed. However, the syscall datasets available are not always the most suitable for these and emerging techniques in analytics, as they may need additional structural or contextual information about syscalls in their decision engine. Furthermore, this flatness of previous datasets often pigeonholes solutions into those which are limited by that data view. It is also burdensome on the researcher to generate his own custom dataset. In this work, we propose an extensible syscall dataset generator which includes structural and limited contextual information regarding syscalls, yet allows for researchers to easily add their own features to more quickly develop and evaluate their systems. Our dataset generator can aid researchers in widening the solution space for syscall HIDS.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126940640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Design and analysis of dual helix liquid metal antenna 双螺旋液态金属天线的设计与分析
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170731
Jonathan Thews, A. O'Donnell, Alan J. Michaels
{"title":"Design and analysis of dual helix liquid metal antenna","authors":"Jonathan Thews, A. O'Donnell, Alan J. Michaels","doi":"10.1109/MILCOM.2017.8170731","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170731","url":null,"abstract":"The goal of this paper is to expand on previously researched Eutectic Gallium-Indium (EGaIn) alloy liquid metal antennas to create an antenna that can change both polarization and frequency to meet the users needs. This concept is described through analytical models of helix antennas, simulations performed in FEKO, and measured results of a proof-of-concept dual frequency L-band GPS-focused hardware model. Although ongoing work is being performed to more efficiently feed this proof-of-concept liquid metal antenna, the overall realized gain of the helix aligned well with theoretical models.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130544610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure VM migration in tactical cloudlets 战术云中的安全虚拟机迁移
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170742
G. Lewis, Sebastián Echeverría, D. Klinedinst, Keegan Williams
{"title":"Secure VM migration in tactical cloudlets","authors":"G. Lewis, Sebastián Echeverría, D. Klinedinst, Keegan Williams","doi":"10.1109/MILCOM.2017.8170742","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170742","url":null,"abstract":"Tactical cloudlets are forward-deployed, discoverable, virtual-machine-based servers that can be hosted on vehicles or other platforms to provide a computation offload and data staging infrastructure for mobile devices in the field. Because of the mobility of cloudlets in the field, as well as dynamic missions, a mobile user of a cloudlet might need to migrate active capabilities (computation and data) to another trusted cloudlet. A common solution for establishing trust between two nodes is to create and share credentials in advance, and then use a third-party, online trusted authority to validate the credentials of the nodes. However, the characteristics of tactical environments do not consistently provide access to that third-party authority or certificate repository because they are DIL environments (disconnected, intermittent, limited). The goal of this paper is to present a solution for secure VM migration between tactical cloudlets based on secure key generation and exchange in the field.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132687587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A secrecy model in satellite fading channels 卫星衰落信道中的保密模型
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170778
Xian Liu
{"title":"A secrecy model in satellite fading channels","authors":"Xian Liu","doi":"10.1109/MILCOM.2017.8170778","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170778","url":null,"abstract":"The Hoyt distribution can be used to characterize two types of fading in satellite communications. In this paper, the secrecy of the Hoyt-Hoyt fading channel is investigated. A set of exact formulas of the probability of strictly positive secrecy capacity are derived. Profile examples are illustrated to show the effects of secrecy capacity.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132831332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WISCA SDR network WISCA SDR网络
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170824
Hanguang Yu, Hyunseok Lee, Richard M. Gutierrez, A. Herschfelt, D. Bliss
{"title":"WISCA SDR network","authors":"Hanguang Yu, Hyunseok Lee, Richard M. Gutierrez, A. Herschfelt, D. Bliss","doi":"10.1109/MILCOM.2017.8170824","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170824","url":null,"abstract":"In this paper, the WISCA Software Defined Radio (SDR) Network platform are presented. The WISCA SDR Network provides the user with a highly configurable and flexible algorithm development platform to conduct wireless communication research. Each node in the network utilizes Ettus Research USRP (Universal Software Radio Peripheral) technology for the radio frequency front end, along with the industry standard MATLAB algorithm development environment for baseband processing. As a result, the WISCA SDR network allows the user to develop and test new concepts quickly. It demonstrates the flexibility of this system by providing a couple of examples involving message forwarding, carrier sensing and a joint radar-communications system. To help improve and further develop the system, the WISCA SDR Network will be released as an open source project.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129297280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Effects of interference between co-located frequency-hopping ad hoc networks 同址跳频自组织网络间干扰的影响
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170801
K. Fors, S. Linder, J. Nilsson, U. Sterner
{"title":"Effects of interference between co-located frequency-hopping ad hoc networks","authors":"K. Fors, S. Linder, J. Nilsson, U. Sterner","doi":"10.1109/MILCOM.2017.8170801","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170801","url":null,"abstract":"Traffic in military ad hoc networks are often broadcast or multicast traffic. A robust and efficient way to handle this type of traffic is the multi-point-relay (MPR) method. Furthermore, frequency spectrum is a scarce resource and must often be shared by several networks resulting in a risk for internetwork interference. The objective of this paper is to analyze the effects from internetwork interference in frequency-hopping (FH) ad hoc networks. Earlier work show that performance on a communication link can be degraded by interference between FH systems sharing the same spectrum resource. Results in this paper show that ad hoc networks are robust against FH interference in terms of a maintained high delivery ratio, but it is achieved at the cost of reduced capacity in the network. This reduction can in some scenarios be severe resulting in two networks with interference being less efficient than time-sharing between the networks.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123741740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling the age of information in emulated ad hoc networks 模拟自组织网络中的信息时代建模
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170800
C. Kam, S. Kompella, G. Nguyen, J. Wieselthier, A. Ephremides
{"title":"Modeling the age of information in emulated ad hoc networks","authors":"C. Kam, S. Kompella, G. Nguyen, J. Wieselthier, A. Ephremides","doi":"10.1109/MILCOM.2017.8170800","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170800","url":null,"abstract":"The age of information is a measure of the freshness of continually updated information, which has been studied theoretically for a variety of queueing models. We conduct an experimental evaluation of the age of information in various emulated network settings to see how well the queue models approximate a network for the purpose of age. We use CORE and EMANE to deploy a one-dimensional multi-hop network, and a two-dimensional grid multi-hop network, and we compare to the theoretical age under the D/M/1 and D/D/1 queue models. We observe that for these regular static networks, the D/D/1 models the average age performance better than the D/M/1 in lightly loaded networks with low loss. When losses increase, the age is greater than predicted by the D/D/1 model.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121216186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
SATCOM innovation: Priorities for modern development 卫星通信创新:现代发展的重点
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170761
A. Vigil, Mark Jasen, Dahesh A. Khalil
{"title":"SATCOM innovation: Priorities for modern development","authors":"A. Vigil, Mark Jasen, Dahesh A. Khalil","doi":"10.1109/MILCOM.2017.8170761","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170761","url":null,"abstract":"As DoD SATCOM stakeholders and developers, it is vital to understand innovative technical trends and both leverage and influence them in order to best address our priorities. These SATCOM development priorities are growth, adoption of open commercial standards, systemic availability and simplification. Major innovative trends in SATCOM development are Digital IF, modem advances and geographical distribution of strategic RF entry points. Digital IF uses standards-based DSP innovation to enable highly advantageous SATCOM terminal system repartitioning. Modem innovations include updated protocols, interface reduction, all-digital implementations, tailoring of mod-cod sets, automated power and mod-cod responsive to traffic demand and link condition, and detailed attention to human factors. Geographic distribution of strategic RF entry points offers geographic diversity through terrestrial IF transport. All of these innovative trends enable growth in capabilities, bandwidth, link counts and systemic availability. All are based on open commercial standards which serve to simplify development, equipment, test processes, planning and operations. The challenge now is to leverage the progress of these trends optimally to help the DoD SATCOM user best support the warfighter. Optimal development along these trend lines, addressing the cited priorities, will be realized by greater awareness of these trends, rapid adoption of commercial offerings and adoption of open commercial standards along the lines of maximum commercial proliferation. On all counts, close collaboration between stakeholders is key to realizing the potential of these innovative trends.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"424 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122797777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards data assurance and resilience in IoT using blockchain 使用区块链实现物联网中的数据保障和弹性
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170858
Xueping Liang, Juan Zhao, S. Shetty, Danyi Li
{"title":"Towards data assurance and resilience in IoT using blockchain","authors":"Xueping Liang, Juan Zhao, S. Shetty, Danyi Li","doi":"10.1109/MILCOM.2017.8170858","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170858","url":null,"abstract":"Data assurance and resilience are crucial security issues in cloud-based IoT applications. With the widespread adoption of drones in IoT scenarios such as warfare, agriculture and delivery, effective solutions to protect data integrity and communications between drones and the control system have been in urgent demand to prevent potential vulnerabilities that may cause heavy losses. To secure drone communication during data collection and transmission, as well as preserve the integrity of collected data, we propose a distributed solution by utilizing blockchain technology along with the traditional cloud server. Instead of registering the drone itself to the blockchain, we anchor the hashed data records collected from drones to the blockchain network and generate a blockchain receipt for each data record stored in the cloud, reducing the burden of moving drones with the limit of battery and process capability while gaining enhanced security guarantee of the data. This paper presents the idea of securing drone data collection and communication in combination with a public blockchain for provisioning data integrity and cloud auditing. The evaluation shows that our system is a reliable and distributed system for drone data assurance and resilience with acceptable overhead and scalability for a large number of drones.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124862947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 158
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信