MILCOM 2012 - 2012 IEEE Military Communications Conference最新文献

筛选
英文 中文
Polite: A policy framework for building managed mobile apps 礼貌:构建托管移动应用程序的政策框架
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415731
U. Kumar, Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor
{"title":"Polite: A policy framework for building managed mobile apps","authors":"U. Kumar, Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor","doi":"10.1109/MILCOM.2012.6415731","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415731","url":null,"abstract":"The proliferation of smart phones inside enterprises and the number of enterprise apps (applications) available for various smart phone platforms has been increasing. This trend is expected to continue as smart phones tend to become the device of choice to access both enterprise and personal data. Making enterprise sensitive data accessible on smart phones requires that adequate protection mechanisms be available on these devices to ensure that sensitive data is not compromised due to various reasons, such as employees losing phones to malicious apps (installed by the user) running on the phones. Most of the existing solutions either provide device level control or have an external agent monitoring the application's behavior, and has numerous limitations. In this paper we propose a framework, Polite, to build enterprise mobile apps that can be managed at run-time, which is less intrusive to the end user while providing stronger security guarantees to the enterprise. We describe several critical scenarios where controlling the run time behavior of apps on the phone is essential and how our architecture can provide security guarantees that are not possible with existing solutions. Performance results of our implementation indicate that our framework induces a minimal overhead of only 6% that may be acceptable for most enterprise mobile apps.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"2013 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86468890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Non-linear programming approach to simulation of the general adversarial agents problem 用非线性规划方法模拟一般对抗代理问题
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415645
J. Mange, D. Kountanis
{"title":"Non-linear programming approach to simulation of the general adversarial agents problem","authors":"J. Mange, D. Kountanis","doi":"10.1109/MILCOM.2012.6415645","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415645","url":null,"abstract":"The adversarial agents problem is a generalized game-theoretic problem in which a set of agents faces a set of adversarial agents of varying types and capabilities, and must plan and perform actions to try to accomplish a specified goal; instances of this problem are often conceived as military combat situations. In this paper, we formulate the general adversarial agents problem as a non-linear integer programming problem, and show how an optimizing solver can be used to generate strategies for instances of the problem, with examples to illustrate the approach. Finally, we discuss the usefulness of such a formulation for real-world problems, particularly in system modeling and simulation for verification of heuristic strategy and planning algorithms and approaches.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"21 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82610640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Finding overlapped communities in online social networks with Nonnegative Matrix Factorization 用非负矩阵分解法寻找在线社交网络中的重叠社区
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415744
Nam P. Nguyen, M. Thai
{"title":"Finding overlapped communities in online social networks with Nonnegative Matrix Factorization","authors":"Nam P. Nguyen, M. Thai","doi":"10.1109/MILCOM.2012.6415744","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415744","url":null,"abstract":"In this work, we introduce two approaches, namely iSNMF and iANMF, for effectively identifying social communities using Nonnegative Matrix Factorization (NMF) with I-divergence as the cost function. Our approaches work by iteratively factorizing the nonnegative input matrix through derived multiplicative update rules. By doing so, we can not only extract meaningful overlapping communities via soft community assignments produced by NMF, but also nicely handle all directed and undirected networks with or without weights. To validate the performance of our approaches, we extensively conduct experiments on both synthesized networks and real-world datasets in comparison with other NMF methods. Experimental results show that iSNMF is among the best efficient detection methods on reciprocity networks while iANMF outperforms current available methods on directed networks, especially in terms of detection quality.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80455023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
LAA: Link-layer anonymous access for tactical MANETs LAA:战术manet的链路层匿名访问
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415724
R. Song, Helen Tang
{"title":"LAA: Link-layer anonymous access for tactical MANETs","authors":"R. Song, Helen Tang","doi":"10.1109/MILCOM.2012.6415724","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415724","url":null,"abstract":"Link layer security has been widely researched in the last decade as a means of protecting wireless networks (e.g., WEP, RSN, WPA, WPA2). However, there is little research in this area for Mobile Ad Hoc Networks (MANETs), especially for tactical MANETs. Although RSN can be used for MANETs as described in the IEEE 802.11i standard, it fails to meet some requirements of tactical MANETs, such as strong security, anonymity, and quick connectivity. In this paper, we propose a link layer anonymous access protocol (LAA) in order to provide strong security and anonymity protection for tactical MANETs. The protocol uses dynamic pseudonyms as network and node identities for network access authentication to prevent tracking, tracing, and other common attacks. It uses a localized key management mechanism for local shared key and broadcast key establishment that outperforms the connectivity and efficiency of key management in RSN and other link layer security technologies such as SEAMAN. Simulations show that LAA has only a small effect on end-to-end delay and no effect on packet delivery ratio relative to the standard MAC, meanwhile providing anonymous communication, better protection and improved connectivity performance in the link layer for tactical MANETs.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"23 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82581486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Pulse rotation modulations for spread spectrum communication systems 扩频通信系统的脉冲旋转调制
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415632
Alan J. Michaels
{"title":"Pulse rotation modulations for spread spectrum communication systems","authors":"Alan J. Michaels","doi":"10.1109/MILCOM.2012.6415632","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415632","url":null,"abstract":"Spread spectrum communication systems excel in their ability to provide enhanced security and channel sharing, yet they do so at the expense of data throughput provided to each individual user. This paper introduces an alternative modulation mechanism, pulse rotation modulation (PRM), for increasing the data throughput in wideband direct sequence or chaotic sequence code-based spread spectrum systems. The result employs a temporal rotation of the spread pulse within its own symbol duration, leading to higher data throughputs that can be throttled up/down as the channel and multiple access conditions permit. Challenges with signal synchronization, code orthogonality, and carrier-induced phase rotations/phase noise are discussed. A predictive model of receiver performance is validated with simulated AWGN-channel results; both are based on extrapolations from a measured hardware prototype that has implemented a small scale example of the PRM technique.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"40 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89873977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non-satellite based field communications system for battlefield deployments 用于战场部署的非卫星野外通信系统
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415623
J. Cartmell, J. Tomici
{"title":"Non-satellite based field communications system for battlefield deployments","authors":"J. Cartmell, J. Tomici","doi":"10.1109/MILCOM.2012.6415623","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415623","url":null,"abstract":"Many wireless systems used by military ground personnel are satellite based. This paper explores a hybrid system that benefits from both satellite and terrestrial wireless technologies while overcoming the limitations of each. We present the architecture, describe the merits, and then explain the essence of the system: IP Flow mobility. After introducing this concept, we describe some of the important aspects that specifically relate to mobility and security.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"126 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90277719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy-efficient transmission scheme for monitoring of combat soldier health in tactical mobile ad hoc networks 战术移动自组织网络中作战士兵健康监测的节能传输方案
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415827
E. Egbogah, A. Fapojuwo, Liqi Shi
{"title":"An energy-efficient transmission scheme for monitoring of combat soldier health in tactical mobile ad hoc networks","authors":"E. Egbogah, A. Fapojuwo, Liqi Shi","doi":"10.1109/MILCOM.2012.6415827","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415827","url":null,"abstract":"In this paper, we propose an energy-efficient transmission scheme for monitoring soldier health in tactical mobile ad hoc networks (T-MANET). In the proposed scheme, a constrained route discovery algorithm is used to determine feasible routing paths between the source nodes and sink node. A cross-layer optimization approach is then used to determine the optimal routes and minimum power required to transmit data in the military UHF band such that the end-to-end packet delivery ratio (PDR) and end-to-end delay objectives are met. However, the optimal solution requires exponential complexity and is not suitable for implementation in resource constrained sensor motes. Therefore, we propose a heuristic algorithm called joint link node power allocation (JPA) that allocates power based on the presence of joint link nodes. From the analysis and numerical results, we find that JPA achieves energy consumption that is within 24% of the optimal value, but significantly reduces the solution complexity from exponential to polynomial by utilizing 6 times fewer iterations than the optimal solution to converge to a minimum energy solution.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"174 3","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91422718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Laboratory evaluation of military radios and network architectures 军用无线电和网络体系结构的实验室评估
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415662
S. Newman, Jeffrey Schindler, J. Shah, Sandra P. Tinta
{"title":"Laboratory evaluation of military radios and network architectures","authors":"S. Newman, Jeffrey Schindler, J. Shah, Sandra P. Tinta","doi":"10.1109/MILCOM.2012.6415662","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415662","url":null,"abstract":"As the ARMY prepares to deploy modern tactical networks in theater [1], there is an increasing need to ensure that radio systems will perform up to expectations before integrating them into emerging Army Capability Sets for Brigade tactical networks. Evaluating these radio systems before field deployments in a controlled laboratory setting provides a critical opportunity to establish baseline performance levels, as well as to identify and resolve design flaws and engineering bugs, long before they are encountered in the field. This paper discusses the role of the CERDEC S&TCD Radio Evaluation and Analysis Laboratory (REAL) in evaluating military radio networks, not only as black-box systems, but also as part of a larger tactical network consisting of a mix of radio systems. This testing has already become an important element of the Army's Agile Process, and has demonstrated its value many times over in preparing new technologies for operational experimentation in the Army's Network Integration Evaluations (NIE) taking place at Ft Bliss, TX.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"48 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84804992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tactical troposcatter applications in challenging climate zones 战术对流层散射应用在具有挑战性的气候带
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415601
Luis Bastos, H. Wietgrefe
{"title":"Tactical troposcatter applications in challenging climate zones","authors":"Luis Bastos, H. Wietgrefe","doi":"10.1109/MILCOM.2012.6415601","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415601","url":null,"abstract":"Transportable troposcatter terminals are a valid beyond line-of-sight (BLOS) transmission medium in support of NATO expeditionary operations. Troposcatter systems are able to provide augmentation capacity to SATCOM in support of forward-deployed military headquarters and a valid alternative to tandem line-of-sight systems. In more tactical scenarios, where capacity and reach requirements are less demanding, the ability to deploy low transmission delay wireless links is a critical capability to support secondary deployed locations. In this paper, the authors analyze the performance and military potential of short-range tactical transit case based troposcatter terminals in tactical scenarios typical of smaller deployed locations. The analysis is performed with a commercial implementation of a troposcatter system deployed to a realistic tactical scenario subject to challenging propagation conditions.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"4 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72982627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
High throughput Ku-band satellites for aeronautical applications 航空用高通量ku波段卫星
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415863
C. McLain, Sunil Panthi, M. Sturza, J. Hetrick
{"title":"High throughput Ku-band satellites for aeronautical applications","authors":"C. McLain, Sunil Panthi, M. Sturza, J. Hetrick","doi":"10.1109/MILCOM.2012.6415863","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415863","url":null,"abstract":"Recent advancements in Ku-band high throughput satellites (HTS) will allow commercial Ku-band aeronautical mobile satellite systems (AMSS) to equal or exceed commercial Ka-band AMSS systems on cost and performance. The AMSS market is currently dominated by Ku-band solutions, both in the commercial sector (eXConnect, Row44, Yonder) and the government sector (Tachyon, Boeing Broadband Satellite Network (formerly Connexion), various UAV and ISR systems). All of these systems use conventional continental-scale wide beams that are leased from Fixed Satellite Service (FSS) providers such as Intelsat and Eutelsat. In the next several years the dominance of Ku-band AMSS will be challenged by Ka-band systems such as Inmarsat-5, which use multiple spot beams to offer enhanced performance. Previous work has suggested that these systems may offer better performance and better economics than conventional Ku-band systems [1]. The key insight of this paper is that the performance advantage of spot beam Ka-band systems comes from their smaller beam size rather than their frequency of operation, meaning that a Ku-band spot beam satellite can also be built with similar sized spot beams to Ka-band systems and can achieve competitive cost and performance as compared to a Ka-band spot beam systems. High throughput spot beam Ku-band systems, such as Intelsat's EpicNG system, are now in development and will be fielded in the same timeframe as Inmarsat-5. This result has critical implications for existing users and operators of AMSS systems: - Currently installed Ku-band terminals will be able to take advantage of dramatic improvements in performance when high throughput Ku-band becomes available - Current Ku-band will not have to undergo costly Ka-band retrofits to maintain competitive performance - Operators can continue to invest in Ku-band terminals today without fear of obsolescence in the near future - The AMSS market will continue to be diverse and competitive for years to come.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"36 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81081107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信