{"title":"Asymmetric Collision Phenomenon and its Impact on Underwater Acoustic Networks","authors":"Yu Luo, Lina Pu","doi":"10.1109/MILCOM55135.2022.10017477","DOIUrl":"https://doi.org/10.1109/MILCOM55135.2022.10017477","url":null,"abstract":"Through experimental results, we reveal an asymmetric collision phenomenon in Underwater Acoustic Networks (UANs), which is caused by the different collision tolerance of preamble and data fields in acoustic communications. The asymmetric collision phenomenon can significantly affect the performance of underwater MAC protocols. In order to accurately evaluate underwater MAC, we develop an asymmetric collision model and use slotted ALOHA, a popular random access MAC in UANs, as an example to illustrate how asymmetric collision affects MAC performance under different network settings and routing strategies. Simulation results verify that the asymmetric model is superior to the traditional model in terms of collision probability, throughput and throughput-progress calculations.","PeriodicalId":239804,"journal":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115630660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Cleverly, Bridgit Mendler, David Brunnenmeyer, Jeffrey Fry
{"title":"Near Term Resilient Teleports for DoD SATCOM","authors":"G. Cleverly, Bridgit Mendler, David Brunnenmeyer, Jeffrey Fry","doi":"10.1109/MILCOM55135.2022.10017831","DOIUrl":"https://doi.org/10.1109/MILCOM55135.2022.10017831","url":null,"abstract":"DoD SATCOM plays a critical role in US defense communications. Current SATCOM systems are nearing capacity in an environment with multiple threat vectors that compromise availability. In response to these challenges, US Space Strategy is moving away from large, centralized platforms to distributed, flexible platforms. Future systems envision cross-linked satellites and proliferated LEO. However, it is vital that as space systems are made more resilient, ground infrastructure is also strengthened through disaggregation. This paper proposes that near term solutions ‐ provided by or before 2030 ‐ could fall into three different Courses of Action (COAs): (1) a layered managed services network, (2) commercial teleport integration, or (3) proliferated ground. The performance of each of these COAs is evaluated to assess the costs and benefits of each approach. This paper recommends that these COAs be rolled out in succession based upon feasibility. A combination of the proposed COAs will help DoD SATCOM to bridge near term systems with long term goals and keep pace with a rapidly changing battlespace.","PeriodicalId":239804,"journal":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126130122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency-Hop-Coded SCB for Tactical Networks","authors":"Arwid Komulainen, Jimmi Grönkvist, U. Sterner","doi":"10.1109/MILCOM55135.2022.10017769","DOIUrl":"https://doi.org/10.1109/MILCOM55135.2022.10017769","url":null,"abstract":"Effective command and control on the battlefield requires robust communications. Using multi-hop communications based on synchronized cooperative broadcast (SCB) has previously been proposed as a means to increase range, robustness and efficiency for tactical ad hoc networks. A modification of the retransmission policy of SCB utilizing fountain coding is proposed and evaluated in the Anglova scenario. The modified protocol is shown to be capable of supporting higher user data rates and increased robustness compared to previous versions of SCB.","PeriodicalId":239804,"journal":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125426546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Loevenich, Jonas Bode, Tobias Hürten, Luca Liberto, Florian Spelter, Paulo H. L. Rettore, R. Lopes
{"title":"Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study","authors":"J. Loevenich, Jonas Bode, Tobias Hürten, Luca Liberto, Florian Spelter, Paulo H. L. Rettore, R. Lopes","doi":"10.1109/MILCOM55135.2022.10017788","DOIUrl":"https://doi.org/10.1109/MILCOM55135.2022.10017788","url":null,"abstract":"Dynamic changes caused by conditions such as challenging terrain or hostile encounters force tactical networks to be highly adaptable. To tackle this problem, new proposals implement Reinforcement Learning (RL) based solutions for routing in such complex environments. As high security is another crucial demand for tactical networks, we examine the vulnerability of one such solution against the novel attack vector of adversarial attacks specifically targeting RL algorithms. Utilizing a suite of varying attack methods, we find the targeted solution to be vulnerable to multiple attacks. Further, we found the best attacks to exploit knowledge about the victim agent to a high degree. Lastly, we outline the need for additional research exploring more complex attack strategies to expose the vulnerabilities of other RL proposals for tactical networks. This investigation may also ignite the design/implementation of defensive measures to increase robustness in vulnerable systems.","PeriodicalId":239804,"journal":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126750702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Shake, Jun Sun, IV ThomasC.Royster, A. Narula-Tam
{"title":"Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies","authors":"T. Shake, Jun Sun, IV ThomasC.Royster, A. Narula-Tam","doi":"10.1109/MILCOM55135.2022.10017632","DOIUrl":"https://doi.org/10.1109/MILCOM55135.2022.10017632","url":null,"abstract":"The vision of continuous network connectivity for users located anywhere on Earth is increasingly being enabled by satellite constellations with hundreds to thousands of satellites operating in low altitude orbits (typically somewhere between a few hundred and two thousand km). These constellations are often referred to as proliferated Low Earth Orbit (pLEO) constellations. Potential military use of such constellations would require a high degree of resilience against various types of failures. This paper examines how resilience to satellite failures in particular is affected by topology and topology management for a moderate-sized constellation of 360 low-earth-orbit satellites providing 2X-redundant global coverage. We present simulations quantifying the effects of two vs. four inter-satellite links (ISLs) per satellite, and of dynamic post-failure topology reconfiguration vs static topology management. Simulations show differences of 65–80 % in mission connectivity between 4- ISL topologies with dynamic topology reconfiguration and 2- ISL topologies with static topology using two different traffic scenarios.11DISTRIBUTION STATEMENT A. Approved for public release. Distribution is unlimited. This material is based upon work supported by the Defense Advanced Research Projects Agency under Air Force Contract No. FA8702-15-D-0001. The views, opinions and/or findings expressed are those of the authors and should not be interpreted as representing the official views or policies of the Department of Defense or the U.S. Government","PeriodicalId":239804,"journal":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126853021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Kim, Denizkhan Kara, V. Paruchuri, Sibin Mohan, Greg Kimberly, Denis Osipychev, Jae H. Kim, Josh D. Eckhardt, M. Pajic
{"title":"Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs","authors":"K. Kim, Denizkhan Kara, V. Paruchuri, Sibin Mohan, Greg Kimberly, Denis Osipychev, Jae H. Kim, Josh D. Eckhardt, M. Pajic","doi":"10.1109/MILCOM55135.2022.10017482","DOIUrl":"https://doi.org/10.1109/MILCOM55135.2022.10017482","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) find increasing use in mission critical tasks both in civilian and military operations. Most UAVs rely on Inertial Measurement Units (IMUs) to calculate vehicle attitude and track vehicle position. Therefore, an incorrect IMU reading can cause a vehicle to destabilize, and possibly even crash. In this paper, we describe how a strategic adversary might be able to introduce spurious IMU values that can deviate a vehicle from its mission-specified path while at the same time evade customary anomaly detection mechanisms, thereby effectively perpetuating a “stealthy attack” on the system. We explore the feasibility of a Deep Neural Network (DNN) that uses a vehicle's state information to calculate the applicable IMU values to perpetrate such an attack. The eventual goal is to cause a vehicle to perturb enough from its mission parameters to compromise mission reliability, while, from the operator's perspective, the vehicle still appears to be operating normally.","PeriodicalId":239804,"journal":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116427654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Maracchion, Timothy Woods, Sean Furman, A. Drozd
{"title":"The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks","authors":"C. Maracchion, Timothy Woods, Sean Furman, A. Drozd","doi":"10.1109/MILCOM55135.2022.10017958","DOIUrl":"https://doi.org/10.1109/MILCOM55135.2022.10017958","url":null,"abstract":"The use of private blockchains is proposed to enhance decentralized 5G-based DoD wireless network security, auditability, governance, and overall performance. This paper explores and validates methods for leveraging smart contracts and decentralized consensus mechanisms inherent to blockchain approaches to securely enhance wireless network performance. A real-time, decentralized architectural software implementation is postulated with detailed interfaces to determine how blockchain and smart contracts apply to real-world wireless networks based on a patented approach developed by the authors. Methods are presented for decentralized wireless networks to perform network arbitration, spectrum service level agreements, and business logic through low latency blockchain transactions. Simulation results characterize the performance of typical blockchain transaction latencies in decentralized wireless network paradigms to determine feasibility. Use case studies of federal and non-federal spectrum sharing are discussed that demonstrate how a private decentralized blockchain architecture and smart contracts can provide considerably improved wireless network performance.","PeriodicalId":239804,"journal":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114373271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems","authors":"M. Silvius, M. McHenry, A. Lackpour, J. Molnar","doi":"10.1109/MILCOM55135.2022.10017533","DOIUrl":"https://doi.org/10.1109/MILCOM55135.2022.10017533","url":null,"abstract":"The Multiband Control Channel Architecture (MICCA) is a combination of a system framework and a collection of message protocols necessary to establish command, control, and communications links between a spectrum planning tool (called a Tactical Decision Aide (TDA)) and Spectrum Dependent Systems (SDS) radios. MICCA provides machine interconnections between complimentary systems that are standardized, open, scalable, extensible, and allow for future technology insertion as the ecosystem evolves. MICCA enables a robust spectrum management and access solution that is required to more efficiently use available spectrum and to facilitate sharing of spectrum resources amongst heterogeneous systems. The enhanced SDS control also allows DoD spectrum-dependent systems (SDSs) to be able to “operate through” in environments of intentional or unintentional interference. A preliminary MICCA demonstration was used to prove the initial system design.","PeriodicalId":239804,"journal":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126811689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware Impairments","authors":"J. S. Kaminski, David Stein, J. Weitzen","doi":"10.1109/MILCOM55135.2022.10017915","DOIUrl":"https://doi.org/10.1109/MILCOM55135.2022.10017915","url":null,"abstract":"Radio Frequency (RF) Fingerprinting is proposed as a key method of authentication and physical layer security in 5G and beyond networks. The process could classify a device based on the impairments in the received signal that are caused by hardware imperfections in the transmitter. This paper proposes a method that allows a device to add a filter to the transmit chain that removes the RF fingerprint from the transmit signal. We assess the effectiveness of this technique by computing several divergence-based metrics on the RF fingerprints to determine if the fingerprint has been successfully “removed.” Our results indicate that this technique can remove a statistical fingerprint calculated on the received waveform's time domain responses.","PeriodicalId":239804,"journal":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114880295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sravani Kurma, Keshav Singh, P. Sharma, Chih-Peng Li
{"title":"Outage Probability Analysis of Uplink Cell-Free Massive MIMO with User Mobility","authors":"Sravani Kurma, Keshav Singh, P. Sharma, Chih-Peng Li","doi":"10.1109/MILCOM55135.2022.10017452","DOIUrl":"https://doi.org/10.1109/MILCOM55135.2022.10017452","url":null,"abstract":"Cell-free massive multiple input and multiple output (CF-mMIMO) communication is the one of candidate technologies for the sixth generation (6G) wireless communication systems, as it has the ability to manage inter-cell interference in MIMO systems. In this paper, we consider a CF-mMIMO system that comprises a central processing unit (CPU), a large number of distributed access points (APs), each equipped with a multiple number of antennas, and arbitrarily distributed multiple single-antenna user equipment (UEs). Each AP is assumed to serve a fewer number of UEs. This system approach provides higher spectral efficiency (SE) and energy efficiency (EE) while offering the uniform quality of service (QoS) to all the UEs despite its low-complexity signal processing. Incorporating the practical scenarios of imperfect channel state information (CSI) and the mobility of the UEs using various types of Doppler power spectra models, we derive the closed-form expression for the outage probability (OP) in the uplink of the CF-mMIMO system considering Welch-Satterthwaite approximation. Finally, we validate the correctness of the derived expressions through numerical simulations.","PeriodicalId":239804,"journal":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}