MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)最新文献

筛选
英文 中文
vCDS: A Virtualized Cross Domain Solution Architecture vCDS:虚拟化跨域解决方案架构
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652903
Nathan Daughety, Marcus Pendleton, Shouhuai Xu, L. Njilla, John Franco
{"title":"vCDS: A Virtualized Cross Domain Solution Architecture","authors":"Nathan Daughety, Marcus Pendleton, Shouhuai Xu, L. Njilla, John Franco","doi":"10.1109/MILCOM52596.2021.9652903","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652903","url":null,"abstract":"With the paradigm shift to cloud-based operations, reliable and secure access to and transfer of data between differing security domains has never been more essential. A Cross Domain Solution (CDS) is a guarded interface which serves to execute the secure access and/or transfer of data between isolated and/or differing security domains defined by an administrative security policy. Cross domain security requires trustworthiness at the confluence of the hardware and software components which implement a security policy. Security components must be relied upon to defend against widely encompassing threats – consider insider threats and nation state threat actors which can be both onsite and offsite threat actors – to information assurance. Current implementations of CDS systems use suboptimal Trusted Computing Bases (TCB) without any formal verification proofs, confirming the gap between blind trust and trustworthiness. Moreover, most CDSs are exclusively operated by Department of Defense agencies and are not readily available to the commercial sectors, nor are they available for independent security verification. Still, more CDSs are only usable in physically isolated environments such as Sensitive Compartmented Information Facilities and are inconsistent with the paradigm shift to cloud environments. Our purpose is to address the question of how trustworthiness can be implemented in a remotely deployable CDS that also supports availability and accessibility to all sectors. In this paper, we present a novel CDS system architecture which is the first to use a formally verified TCB. Additionally, our CDS model is the first of its kind to utilize a computation-isolation approach which allows our CDS to be remotely deployable for use in cloud-based solutions.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"308 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123227318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conditional Rician $K$-Factor Discrimination for Indoor Localization via AOA Estimation 基于AOA估计的室内定位条件医师K因子判别
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653091
D. L. Hall, D. Jenkins
{"title":"Conditional Rician $K$-Factor Discrimination for Indoor Localization via AOA Estimation","authors":"D. L. Hall, D. Jenkins","doi":"10.1109/MILCOM52596.2021.9653091","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653091","url":null,"abstract":"This paper proposes conditioning angle of arrival (AOA) algorithms for pseudo-spectrum fingerprint acquisition based on line of sight (LOS) and non-LOS detection schema for optimizing indoor localization. The proposed approach merges two AOA based methods being that of the MUltiple Signal Classsification (MUSIC) algorithm and virtual MUSIC algorithm into a conditional based localization approach with a uniform circular array (UCA). The paper begins by demonstrating the environmental dependencies of the two AOA approaches based on the Rician $K$-factor metric. The $K$-factor is then exploited as an algorithm selection metric to arrive at improved localization performance in a realistic indoor environment.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121613099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Plug-n-Play in Named Data Networking 在命名数据网络中启用即插即用
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653033
Tianyuan Yu, Philipp Moll, Zhiyi Zhang, A. Afanasyev, Lixia Zhang
{"title":"Enabling Plug-n-Play in Named Data Networking","authors":"Tianyuan Yu, Philipp Moll, Zhiyi Zhang, A. Afanasyev, Lixia Zhang","doi":"10.1109/MILCOM52596.2021.9653033","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653033","url":null,"abstract":"“Plug-and-play” is a highly desired property in networking, which enables new entities to be plugged into a networked system following a systematic, and automated if possible, process to start playing, i.e. sending and receiving packets. In IP networks, DHCP services provide the plug function to enable an IP host to play. In this paper we discuss the plug step in an NDN network, articulate the fundamental differences in NDN's plug step as compared to that of IP, and describe our initial designs for plugging new entities into an NDN network in three different use case scenarios. These design exercises show that NDN's plug process requires mutual authentication between the configurer and the configuree (the entity to be plugged in), which is context specific and represents a major challenge in the plug process. We addressed this challenge by making use of existing authentication systems.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"37 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132359527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IEEE MILCOM 2021 Welcome Letter IEEE MILCOM 2021欢迎信
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/milcom52596.2021.9652994
{"title":"IEEE MILCOM 2021 Welcome Letter","authors":"","doi":"10.1109/milcom52596.2021.9652994","DOIUrl":"https://doi.org/10.1109/milcom52596.2021.9652994","url":null,"abstract":"","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133883053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technical Program Chairs 技术项目主席
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/milcom52596.2021.9652999
Xianfeng Zhao, Hyoung Joon Kim
{"title":"Technical Program Chairs","authors":"Xianfeng Zhao, Hyoung Joon Kim","doi":"10.1109/milcom52596.2021.9652999","DOIUrl":"https://doi.org/10.1109/milcom52596.2021.9652999","url":null,"abstract":"The 21st IEEE International NEWCAS Conference will be held in Edinburgh, Scotland, on June 26 – 28, 2023. The program of the conference will be tailored to reflect the wide spectrum of topics and research interest shared among the organizing entities. This collaboration will be oriented towards advanced research in adaptive systems which constitutes the highlights of the NEWCAS conference, but also areas related to analog and digital signal processing, low power consumption, circuits and systems designs.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129372167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synchronization Steps for Low Complexity Chirp Spread Spectrum (CSS) Receivers 低复杂度啁啾扩频(CSS)接收机的同步步骤
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652971
Xiaofei Chen, E. Venosa, F. Harris
{"title":"Synchronization Steps for Low Complexity Chirp Spread Spectrum (CSS) Receivers","authors":"Xiaofei Chen, E. Venosa, F. Harris","doi":"10.1109/MILCOM52596.2021.9652971","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652971","url":null,"abstract":"The chirp spread spectrum (CSS) has gained much attention over the recent years due to its wide adoption in low power wide area network technologies (LPWANs). It is one of the promising physical layer (PHY) options for fulfilling long range and low data rate communication that occur in many of today's Internet of Things (IoT) devices, i.e., LORA and etc. This paper discusses the low complexity and low power implementation of a CSS modem from synchronization perspectives. We address the CSS receiver architecture with consideration to its unique synchronization steps under low Signal to Noise Ratio (SNR) environment.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"58 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132865038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unifying Address and Name Based Communication in Wireless Medium Access Control 无线介质访问控制中基于地址和名称的统一通信
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652896
Mohammed Elbadry, F. Ye, Peter Milder
{"title":"Unifying Address and Name Based Communication in Wireless Medium Access Control","authors":"Mohammed Elbadry, F. Ye, Peter Milder","doi":"10.1109/MILCOM52596.2021.9652896","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652896","url":null,"abstract":"Edge nodes deployed in edge environments (e.g., IoT) have two common use cases: i) access control and ii) disseminating data. An address based paradigm is suitable for sending access control commands to specific nodes, yet a name based one excels at filtering and disseminating data based on content regardless of who has the data. Current address based communication mandates grouping among nodes (e.g., using BSSID), incurring high overheads (e.g., periodic beacons); whereas name based discovery is much more efficient and flexible. However, the name based paradigm needs many assets possessed in the address based paradigm (e.g., frame rate adaptation). Such complementary strengths and needs call for unification of both paradigms to meet current edge environment needs. In this paper, we introduce a unified medium access control design that combines both paradigms. Our unified design eliminates the need for grouping in address based communication by a name based discovery protocol, enabling filtering based on address or data attributes. It leverages address based unicast rate adaptation to benefit name based communication through Our experiments show the system's ability to discover neighbor addresses based on application attributes, and filter thousands of both name and address based entries efficiently. It reduces latency of name based communication by 30X, and loss rate from 10-20% to 0% through address based rate adaptation algorithm with reliability.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Feasibility of Detecting Software Supply Chain Attacks 软件供应链攻击检测的可行性研究
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652901
Xinyuan Wang
{"title":"On the Feasibility of Detecting Software Supply Chain Attacks","authors":"Xinyuan Wang","doi":"10.1109/MILCOM52596.2021.9652901","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652901","url":null,"abstract":"The Supply chain attack is the stealthy and sophisticated cyberattack that aims to compromise a target by exploiting weaknesses and vulnerabilities in its supply chain. Recent supply chain attacks (e.g., SolarWinds attack) have compromised some of the most secured IT infrastructures of government agencies and enterprises. The European Union Agency for Cybersecurity, ENISA, has predicted that there will be 3 times more supply chain attacks in 2021 than in 2020. In this paper, we look into the problem of supply chain attacks, the challenges of defending software supply chain attacks. We analyze what it takes to effectively prevent software supply chain attacks, and show that it is indeed feasible and practical for the customers to detect certain software supply chain attacks. We propose an information flow based detection approach that enables end users to detect many software supply chain attacks without dealing with any of the underlying software suppliers.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133353466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery 无线网络拓扑控制:可调弹性和网络流量交付
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653017
J. Macker, Caleb Bowers, S. Kompella, C. Kam, Jeffery W. Weston
{"title":"Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery","authors":"J. Macker, Caleb Bowers, S. Kompella, C. Kam, Jeffery W. Weston","doi":"10.1109/MILCOM52596.2021.9653017","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653017","url":null,"abstract":"We consider the problem of wireless topology control with adjustable k-resilience and we evaluate related unicast and multicast network traffic delivery statistics across a series of initial simulation experiments. Our main goal is to examine design tradeoffs between resilient topology control, transmission power requirements, and resultant network throughput characteristics. We also present newly developed extensions to the network simulator, NS3, supporting multicast traffic experimentation. Our results for the random geometric networks studied demonstrate that moderate levels of $k$-resilience result in improvements in unicast traffic delivery while managing the growth of transmission power requirements across the network. These same trends were also observed for multicast experiments with connected dominating set (CDS) based forwarding, but traffic delivery did not improve for higher $k$ connectivities in the case of basic multicast flooding. Overall, we conclude that topology control edge connectivity resilience adds significant traffic delivery improvements in addition to providing other benefits, but the additional cost for establishing topological resiliency needs to be carefully considered against other defined system constraints. To address transmit power increases associated with resiliency and to improve traffic capacity in lower $k$ network topologies, further research is planned in applying network directivity components and multi-channel network architectures to the problem space.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133838400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node 外部节点总功率干扰限制下的自组网
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652949
C. Kam, J. Macker, Caleb Bowers, S. Kompella
{"title":"Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node","authors":"C. Kam, J. Macker, Caleb Bowers, S. Kompella","doi":"10.1109/MILCOM52596.2021.9652949","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652949","url":null,"abstract":"The purpose of this work is to connect wireless nodes to form an ad hoc network, while trying to limit the interference to a node or device that is external to the network. Specifically, we consider two forms of the problem of limiting interference caused by the emitted power required to form the connections within a network. First, we consider a case where the interference at the external node cannot exceed some power threshold, and we would like to connect as many nodes together to form a tree without exceeding that threshold. We call this the Largest Constrained Tree (LCT) problem, which we model as a graph where the cost to connect a pair of nodes is the sum of the interference caused by transmitting in each direction. The second form of the problem we consider is the case where the power incident on the external node must be minimized, and we would like to connect nodes to form a network backbone, specifically a connected dominating set (CDS). As an approximation, we model the power emitted by the leaf nodes to the CDS as a smaller fixed amount, due to the transmission being out of band or having directionality gain. To solve these problems, we formulate them as mixed integer linear programs, and we demonstrate their performance through Monte Carlo simulation for various network sizes, node densities, external node distances, and network activity levels.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122071862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信