MILCOM 2007 - IEEE Military Communications Conference最新文献

筛选
英文 中文
Guidelines for Reference Monitors in Embedded INFOSEC Applications 嵌入式信息安全应用中参考监视器指南
MILCOM 2007 - IEEE Military Communications Conference Pub Date : 2007-10-01 DOI: 10.1109/MILCOM.2007.4455232
David C. Vallese
{"title":"Guidelines for Reference Monitors in Embedded INFOSEC Applications","authors":"David C. Vallese","doi":"10.1109/MILCOM.2007.4455232","DOIUrl":"https://doi.org/10.1109/MILCOM.2007.4455232","url":null,"abstract":"This paper addresses the enforcement of the principle of least privilege in embedded INFOSEC applications through the development of a security component, the Reference Monitor (RM). The concept of the principle of least privilege has been around since the mid 1970's. The enforcement of this principle grants the most restrictive set of privileges for an authorized task. The RM component is useful for an embedment that is developed with a separation kernel that does not have built in security policies. The RM component resides outside the separation kernel and enforces a system-wide security policy through a combination of Discretionary Access Control (DAC) mechanisms and Mandatory Access Control (MAC) mechanisms. This paper discusses the architectural guidelines and the implementation of a RM component in an embedded INFOSEC application.","PeriodicalId":135777,"journal":{"name":"MILCOM 2007 - IEEE Military Communications Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115888538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Localization Accuracy in Wireless Sensor Networks using Location Verification Feedback 利用位置验证反馈提高无线传感器网络定位精度
MILCOM 2007 - IEEE Military Communications Conference Pub Date : 2007-10-01 DOI: 10.1109/MILCOM.2007.4454844
D. Al-Abri, J. Mcnair
{"title":"Improving Localization Accuracy in Wireless Sensor Networks using Location Verification Feedback","authors":"D. Al-Abri, J. Mcnair","doi":"10.1109/MILCOM.2007.4454844","DOIUrl":"https://doi.org/10.1109/MILCOM.2007.4454844","url":null,"abstract":"The ability of a node to determine its location is an important task in wireless sensor networks as users are usually interested in knowing where the measurements are taken. In this paper, we study the use of location verification as a feedback mechanism to improve the localization accuracy. We first describe the general approach used. Then, we describe several algorithms to improve the accuracy of localization schemes for various practical situations. We consider algorithms for networks where nodes can obtain several independent location estimates and networks where the node can only obtain a single location estimate. We analyze these algorithms analytically and through simulation; and show that a significant improvement in localization accuracy can be accomplished in few iterations of executing these location verification-based feedback improvement schemes.","PeriodicalId":135777,"journal":{"name":"MILCOM 2007 - IEEE Military Communications Conference","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance of Transmitted Reference UWB Communications with Imperfect Power Control 不完全功率控制下的传输参考超宽带通信性能
MILCOM 2007 - IEEE Military Communications Conference Pub Date : 2007-10-01 DOI: 10.1109/MILCOM.2007.4455249
Liping Li, J. Townsend, R. Ulman
{"title":"Performance of Transmitted Reference UWB Communications with Imperfect Power Control","authors":"Liping Li, J. Townsend, R. Ulman","doi":"10.1109/MILCOM.2007.4455249","DOIUrl":"https://doi.org/10.1109/MILCOM.2007.4455249","url":null,"abstract":"Ultra-wideband (UWB) communications using transmitted reference (TR) have been studied in multipath, multiuser environments under the assumption that interfering users have the same power as the desired user at the receiver. This assumption frequently does not hold in ad-hoc wireless communications where centralized power control is not employed due to survivability and complexity constraints. In this paper, we investigate the performance of UWB networks where transmitters in close proximity (\"high-power\") to a receiver cause significant interference with the desired signal due to the much larger power levels of these signals. To mitigate the detrimental effect of high-power users, a technique which is called chip discrimination is applied at the receiver. Both \"standard\" transmitted reference (STR) and differential transmitted reference (DTR) schemes for multipath channels are considered. Results show dramatic improvement in performance for TR systems using chip discrimination when compared to conventional reception without centralized power control.","PeriodicalId":135777,"journal":{"name":"MILCOM 2007 - IEEE Military Communications Conference","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124561986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IPv6 Experimental Results Portend Operational Benefits for Military Systems IPv6实验结果预示着军事系统的作战效益
MILCOM 2007 - IEEE Military Communications Conference Pub Date : 2007-10-01 DOI: 10.1109/MILCOM.2007.4455341
T. Walsh, Joyce S. Kerr, A. K. Jain
{"title":"IPv6 Experimental Results Portend Operational Benefits for Military Systems","authors":"T. Walsh, Joyce S. Kerr, A. K. Jain","doi":"10.1109/MILCOM.2007.4455341","DOIUrl":"https://doi.org/10.1109/MILCOM.2007.4455341","url":null,"abstract":"Transitioning military systems to the next generation Internet Protocol Version 6 (IPv6) is a large and complex problem. The use of experimentation and validation in laboratory and field demonstrations, and field exercises are the optimal ways to illustrate the operational improvements of the advanced features of IPv6. Through the participation in Joint Users Interoperability Communications Exercise 2006 (JUICE 06), Program Executive Office Command, Control and Communications, Tactical (PEO C3T) Common Hardware Systems Product Directorate (PD CHS), in collaboration with CERDEC S&TCD, successfully demonstrated the use of IPv6 advanced features, namely auto-configuration and network mobility (NEMO). The results of JUICE 06 showed how the use of IPv6 would provide the military with improvements in network initialization, tactical reorganization and mobility with minimal user intervention. CHS plans future expanded experimentation and participation in JUICE 07. The future work will provide a framework for quantitative IPv6 performance metrics. Using an automated test tool, CHS will generate traffic at varying packet sizes and traffic rates to provide information pertaining to network performance, such as throughput, latency and packet loss.","PeriodicalId":135777,"journal":{"name":"MILCOM 2007 - IEEE Military Communications Conference","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114463433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Constrained Rate-Maximization Scheduling for Uplink OFDMA 基于约束的OFDMA上行最大速率调度
MILCOM 2007 - IEEE Military Communications Conference Pub Date : 2007-10-01 DOI: 10.1109/MILCOM.2007.4454875
Yao Ma
{"title":"Constrained Rate-Maximization Scheduling for Uplink OFDMA","authors":"Yao Ma","doi":"10.1109/MILCOM.2007.4454875","DOIUrl":"https://doi.org/10.1109/MILCOM.2007.4454875","url":null,"abstract":"In this paper, we study the sum rate maximization algorithms with and without proportional fairness for uplink orthogonal frequency division multiple access (OFDMA). For fair scheduling, we propose a selective multiuser diversity (SMuD) scheme with normalized channel signal-to-noise ratio (n-SNR) ranking for user selection at each carrier to achieve a long term access fairness. To achieve rate maximization without access fairness, we propose a transmission power-SNR-product (PSP)-ranking based SMuD scheme, which takes into account different users' unequal transmission powers and channel SNRs, and provides a near-optimal sum-rate. For both schemes, the transmit power of each user is allocated to the assigned carriers using either equal power allocation (EPA) or waterfilling (WF). Analytical throughput and fairness metrics for both n-SNR and PSP SMuD schemes over Rayleigh channels are derived and verified via simulations. These results put new insight into the achievable uplink OFDMA performance with and without proportional fairness and the effects of various system and channel parameters.","PeriodicalId":135777,"journal":{"name":"MILCOM 2007 - IEEE Military Communications Conference","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114557976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Antenna Downselection for Co-Channel Interference Mitigation in a Mobile-to-Mobile Channel 移动对移动信道中同信道干扰抑制的天线下行选择
MILCOM 2007 - IEEE Military Communications Conference Pub Date : 2007-10-01 DOI: 10.1109/MILCOM.2007.4454757
B. Walkenhorst, T. Pratt, S. Gaur, M. A. Ingram
{"title":"Antenna Downselection for Co-Channel Interference Mitigation in a Mobile-to-Mobile Channel","authors":"B. Walkenhorst, T. Pratt, S. Gaur, M. A. Ingram","doi":"10.1109/MILCOM.2007.4454757","DOIUrl":"https://doi.org/10.1109/MILCOM.2007.4454757","url":null,"abstract":"The performance of multi-antenna receivers in co-channel interference is investigated for narrow-band links in non-line-of-sight (NLOS) and line-of-sight (LOS) mobile-to-mobile channels. A novel architecture utilizing antenna down-selection is analyzed in simulation and compared with the performance of a conventional array architecture. Various down-selection criteria are proposed and analyzed. The simulation results show excellent performance enhancement for an MMSE selection algorithm. Several other methods are also analyzed and compared with promising results using the simple method of maximum power selection. Results are compared in terms of estimated complementary cumulative distribution functions of output signal-to-interference-plus-noise ratio (SINR) derived from Monte Carlo simulations.","PeriodicalId":135777,"journal":{"name":"MILCOM 2007 - IEEE Military Communications Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114921560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance and Scaling of Wireless Ad Hoc IPv6 Stateless Address Autoconfiguration under Mobile Gateways 移动网关下无线自组织IPv6无状态地址自动配置的性能和扩展
MILCOM 2007 - IEEE Military Communications Conference Pub Date : 2007-10-01 DOI: 10.1109/MILCOM.2007.4454768
J. Wildman, D. Hamel, R. Measel, Dan Oakum, S. Weber, M. Kam
{"title":"Performance and Scaling of Wireless Ad Hoc IPv6 Stateless Address Autoconfiguration under Mobile Gateways","authors":"J. Wildman, D. Hamel, R. Measel, Dan Oakum, S. Weber, M. Kam","doi":"10.1109/MILCOM.2007.4454768","DOIUrl":"https://doi.org/10.1109/MILCOM.2007.4454768","url":null,"abstract":"Autoconfiguration mechanisms in general, and stateless address autoconfiguration in particular, are highly desirable capabilities of military mobile ad hoc networks (MANETs). However, IPv6 stateless autoconfiguration schemes for MANETs still have to be refined, and a convincing demonstration is needed to show that these schemes can cope with the dynamic, infrastructure-free environment wherein MANETs operate. In this paper we provide a literature survey of autoconfiguration schemes designed for MANETs. In addition, we look at a specific stateless autoconfiguration scheme (by Jelger and Noel, SECON 2005). This scheme provides globally routable IPv6 prefixes to a MANET, attached to the Internet via gateways. We examine this approach through OPNET simulation, applying new mobility models to encourage squad-like clusters around gateways, introducing mobility to the gateways, and scaling the number of ad hoc nodes and the number of gateways independently. We then comment on the performance of the Jelger-Noel addressing scheme in terms of protocol overhead, autoconfiguration time, prefix hold times, and prefix stability.","PeriodicalId":135777,"journal":{"name":"MILCOM 2007 - IEEE Military Communications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114982937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
CMAP: A Real-Time Prototype for Cognitive Medium Access CMAP:认知媒介访问的实时原型
MILCOM 2007 - IEEE Military Communications Conference Pub Date : 2007-10-01 DOI: 10.1109/MILCOM.2007.4454801
S. Geirhofer, John Z. Sun, L. Tong, Brian M. Sadler
{"title":"CMAP: A Real-Time Prototype for Cognitive Medium Access","authors":"S. Geirhofer, John Z. Sun, L. Tong, Brian M. Sadler","doi":"10.1109/MILCOM.2007.4454801","DOIUrl":"https://doi.org/10.1109/MILCOM.2007.4454801","url":null,"abstract":"In this paper we present CMAP, a real-time prototype for Cognitive Medium Access (CMA). We have previously proposed CMA as a protocol that enhances coexistence with a set of independently evolving WLAN bands by constraining collisions. Based on a time-slotted physical layer, the cognitive radio uses a sense-before-transmit strategy to control its medium access. We further employ a model-based design approach to predict the WLAN's transmission behavior and reduce collisions. In this paper we present the implementation of the real-time prototype CMAP. The cognitive radio consists of a high-performance DSP/FPGA board as well as a commercial radio frontend for the 2.4 GHz ISM band. The performance of CMAP shows an excellent fit with analytical and simulation results solidifying our previous work. In addition, we use CMAP to measure its dynamic impact on the WLAN.","PeriodicalId":135777,"journal":{"name":"MILCOM 2007 - IEEE Military Communications Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116982292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Migration to Defense Enterprise Computing Centers 向国防企业计算中心的迁移
MILCOM 2007 - IEEE Military Communications Conference Pub Date : 2007-10-01 DOI: 10.1109/MILCOM.2007.4455306
B. Bennett, D. Bussert, R. Pham
{"title":"Migration to Defense Enterprise Computing Centers","authors":"B. Bennett, D. Bussert, R. Pham","doi":"10.1109/MILCOM.2007.4455306","DOIUrl":"https://doi.org/10.1109/MILCOM.2007.4455306","url":null,"abstract":"Mirroring commercial datacenters utilizing best-of-breed maintenance, storage and monitoring practices, the Defense Enterprise Computing Centers (DECC) are establishing a new paradigm for Service, COCOM and Agency hosted information systems. The DECC provides a secure environment, trained staff, affordable hardware and flexible services which can accommodate virtually any system requirements. This paper will describe the services provided by the DECC and the process for migrating existing systems into a hosting site. It will provide an example of the process by outlining the experiences and lessons learned by DISA GE23 during the initial steps of migrating the content management servers of the CENTCOM DVB-RCS system from the DoD Gateway in Landstuhl, Germany to DECC Mechanicsburg.","PeriodicalId":135777,"journal":{"name":"MILCOM 2007 - IEEE Military Communications Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117325082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Placement of UAVs as Communication Relays Aiding Mobile Ad Hoc Wireless Networks 无人机作为辅助移动自组织无线网络的通信中继的放置
MILCOM 2007 - IEEE Military Communications Conference Pub Date : 2007-10-01 DOI: 10.1109/MILCOM.2007.4455114
I. Rubin, Runhe Zhang
{"title":"Placement of UAVs as Communication Relays Aiding Mobile Ad Hoc Wireless Networks","authors":"I. Rubin, Runhe Zhang","doi":"10.1109/MILCOM.2007.4455114","DOIUrl":"https://doi.org/10.1109/MILCOM.2007.4455114","url":null,"abstract":"Unmanned aerial vehicles (UAVs) have been used for surveillance and reconnaaissance operations. Such communications enabled platforms can also be effectively utilized to enhance the communications transport capabilitites of a mobile ad hoc wireless network. When properly embedded into the architecture of a communications network, the resultirng UAV aided terrestrial network architecture is expended into a multi-layered hierarchical network structure. The UAV aided network can provide for transport of flows that span longer distances, yield better reliability, higher mobility based robustness and upgraded throughput capacity. We have recently proposed the `robust throughput' and `robust throughput capacity' measures to characterize the capability of a mobile ad hoc wireless network to provide for robust and survivable transport of flows. Robust service is critically required for supporting applications that involve flow transactions that must not, with high probability, be transported along routes that are prematurely interrupted. To enhance the robust throughput performance of mobile ad hoc wireless networks, we present in this paper a method and algorithm that are used to place relay nodes, such as UAVs, in locations that efficiently serve to support the robustness and capacity requirements of the underlying mobile ad hoc wireless network system, and to compute the optitmal (flow admission oriented) regulation and distribution of traffic flow classes across terrestrial and UAV based routes. Our schemes are used to determine effective 3-D coordinates for placing a UAV relay node to provide for such joint performance upgrade.","PeriodicalId":135777,"journal":{"name":"MILCOM 2007 - IEEE Military Communications Conference","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116292944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信