M. Heino, Matias Turunen, Miika Vuorenmaa, T. Riihonen
{"title":"Design of RF Self-interference Cancellation Circuit for 100-W Full-Duplex Radio at 225–400 MHz","authors":"M. Heino, Matias Turunen, Miika Vuorenmaa, T. Riihonen","doi":"10.1109/ICMCIS52405.2021.9486417","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486417","url":null,"abstract":"The full-duplex (FD) technology enables future military radios to simultaneously transmit and receive (STAR) on the same and adjacent frequencies. This enhances spectral efficiency and makes simultaneous integrated tactical communications and electronic warfare operations possible as opposed to the current time- or frequency-division radios used in military applications. The main challenge in implementing full-duplex radios is the strong self-interference (SI) between the transmitter and the receiver requiring solutions how to cancel the coupling, which has been largely resolved at higher ultra high frequency (UHF) bands for low power transmission. This paper presents a radio-frequency SI cancellation circuit suitable especially for very high-power military applications at military-relevant lower UHF band (225–400 MHz). The circuit couples power from the transmitter and tunes the phase and amplitude of the signal to destructively combine with the received SI, and thus isolates the receiver and transmitter. The paper introduces a concept consisting of a 90° vector modulator and switchable delay lines for a low-loss and high-power-handling cancellation circuit that enables operation with very-high transmit powers of even up to 1 kW.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123391398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yvon Livran, Ir. Vincent Le Nir, S. Couturier, M. Suchanski, P. Kaniewski, J. Romanik, Alexander Hamilton, P. Howland, M. Tracy
{"title":"Electromagnetic Environment Situational Awareness","authors":"Yvon Livran, Ir. Vincent Le Nir, S. Couturier, M. Suchanski, P. Kaniewski, J. Romanik, Alexander Hamilton, P. Howland, M. Tracy","doi":"10.1109/ICMCIS52405.2021.9486420","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486420","url":null,"abstract":"Military radio, EW and RF sensor systems operate in a congested and contested electromagnetic environment. The NATO Science and Technology Organization established the Research Task Group 069 in order to take charge of the IST-146 project on Electromagnetic Environment Situational Awareness. The project was aimed at evaluating the operational benefits for NATO in line with the Electromagnetic Spectrum Strategy and at evaluating the Radio Environmental Map (REM) technology. The paper describes the military scenario considered for the study. Its operational analysis establishes the importance of Electromagnetic Spectrum Command and Control integrated with other C2 processes. The description of the data sources, models, and representation is done. Key user benefits are highlighted. Then proposals for possible evolution of electromagnetic operations and spectrum management within NATO are made. The paper further describes the proposed reference architecture based on the Internet of Things (IoT). It establishes how the relationships between the REM elements have been validated through the project scenario. Tests and simulations, carried out for the construction of measurement-based REMs and transmitter localization, are presented. The paper finally describes the proposed demonstration, which enables understanding through visualization of an interference situation and de-confliction by dynamically re-assigning frequencies.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127180888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reinforcement Learning Environment for Tactical Networks","authors":"Thies Möhlenhof, N. Jansen, Wiam Rachid","doi":"10.1109/ICMCIS52405.2021.9486411","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486411","url":null,"abstract":"Providing situational awareness is a crucial requirement and a challenging task in the tactical domain. Tactical networks can be characterized as Disconnected, Intermittent and Limited (DIL) networks. The use of cross-layer approaches in DIL networks can help to better utilize the tactical communications resources and thus improve the overall situational awareness perceived by the user. The specification of suitable cross-layer strategies (heuristics) which describe the rules for optimizing the applications remains a challenging task. We introduce an architectural concept which proposes the use of decentralized, machine learning based reinforcement agents to improve the use of network resources in DIL networks. This approach shall lead to more sophisticated strategies which are learned autonomously by the agents. As basis for the training of such reinforcement learning (RL) agents, an architecture for a learning environment is introduced. Since for the training of these agents a large number of scenarios is needed, an additional tactical model is defined. The purpose of the tactical model is to generate scenarios with dynamically changing network conditions and dynamic information exchanges between the applications and thus build the basis for training the RL agents. The tactical model itself is also based on RL agents, which simulate military units in a war gaming environment.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125303633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. M. Eswarappa, Paulo H. L. Rettore, J. Loevenich, P. Sevenich, R. Lopes
{"title":"Towards Adaptive QoS in SDN-enabled Heterogeneous Tactical Networks","authors":"S. M. Eswarappa, Paulo H. L. Rettore, J. Loevenich, P. Sevenich, R. Lopes","doi":"10.1109/ICMCIS52405.2021.9486391","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486391","url":null,"abstract":"This paper introduces a mechanism to adaptively ensure Quality of Service (QoS) for user data flow by leveraging Software-Defined Networking (SDN) in heterogeneous tactical networks. We start with a hypothesis that an application using the northbound interface of the SDN controller can support the management of unreliable radio links at the edge of tactical networks. Thus, we developed applications to support adaptive shaping of user data flows over data rates supported by VHF and UHF radios, and to ensure the dropping of expired messages. We also introduce a hybrid scheduling mechanism for these user data flows using queuing discipline. The goal is to differentiate IP packets from command and control services with different QoS requirements. Our hypothesis was verified with experiments using four classes of messages with different QoS requirements, such as priority, reliability, and time of expire. Experimental results in an emulated network suggest that our solution can differentiate data flows in a heterogeneous tactical network while ensuring its QoS requirements.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129273505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating Command & Control, Constructive Simulation and Artificial Intelligence","authors":"Peter Meyer zu Drewer, Hans-Christian Schmitz","doi":"10.1109/ICMCIS52405.2021.9486418","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486418","url":null,"abstract":"Constructive Simulation (CS) systems are applied both in the military and the civilian domain for training operational staff and exploring new Command and Control (C2) procedures. Great expectations are set for the influence of AI technology on enabling and supporting C2 in future scenarios. We will argue that CS systems can be utilized for the development and testing of respective AI-based C2 services. To this end, we will provide architectural considerations regarding the integration of AI technology into CS systems.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129246299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Albert Pritzkau, Steffen Winandy, Theresa Krumbiegel
{"title":"Finding a line between trusted and untrusted information on tweets through sequence classification","authors":"Albert Pritzkau, Steffen Winandy, Theresa Krumbiegel","doi":"10.1109/ICMCIS52405.2021.9486423","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486423","url":null,"abstract":"The Internet has long since established itself as an indispensable source of information for both organizations and individuals. The lack of social responsibility of many digital platforms, however, offers many incentives for various forms of abuse. Disinformation, propaganda and fake news are just a few examples. Among the actors of information campaigns, we find not only individuals but also state actors with a clear agenda. Often, such information campaigns make use of psychological and rhetorical methods to achieve their goals. The manipulation of information is a major challenge for our democracies. It also presents us with major technical problems to identify and assess risks arising from the dissemination of such information.The following system description presents our approach to the detection of misinformation on social media data, which is twofold. Initially, we subjected the given training data to an exploratory analysis to get an overview of the general structure. Then we framed the given task as a simpler classification problem. In order to distinguish between trusted and untrusted information, using BERT (Bidirectional Encoder Representations from Transformers) as a neural network architecture for sequence classification, we started with a pre-trained model for language representation. In a supervised training step we fine-tuned this model on the given classification task with the provided annotated data.In this paper we would like to discuss both the quality of the training data and the performance of the trained classifier to derive promising directions for future work.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133363745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. S. Syms, Anthony W. Isenor, Brad Chivari, Andrew DeBaie, Alicia Hogue, B. Glessing
{"title":"Building a Maritime Picture in the Era of Big Data: The Development of the Geospatial Communication Interface+","authors":"M. S. Syms, Anthony W. Isenor, Brad Chivari, Andrew DeBaie, Alicia Hogue, B. Glessing","doi":"10.1109/ICMCIS52405.2021.9486392","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486392","url":null,"abstract":"The compilation of information in support of Maritime Domain Awareness (MDA) remains an ongoing challenge for defence and security partners. Compounding the historic difficulties of large-scale picture compilation in support of MDA, there is now the challenge of ingesting large volumes of data into systems that were never designed to consume such volumes. The Geospatial Communications Interface Plus (GCI+) represents a redesign of the Royal Canadian Navy (RCN) information architecture to support MDA. Using predominately open source technologies, GCI+ has been shown to maintain pace with the velocity and volume of maritime data. Delivery of the data in a single aggregated stream also enhances monitoring and analysis capabilities of the information system.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Lopes, Paulo H. L. Rettore, S. M. Eswarappa, J. Loevenich, P. Sevenich
{"title":"Performance Analysis of Proactive Neighbor Discovery in a Heterogeneous Tactical Network","authors":"R. Lopes, Paulo H. L. Rettore, S. M. Eswarappa, J. Loevenich, P. Sevenich","doi":"10.1109/ICMCIS52405.2021.9486398","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486398","url":null,"abstract":"This paper describes a quantitative evaluation of OLSRv2 proactive neighbor discovery in a heterogeneous tactical network using real military radios. Tactical networks generally have low data rates, high latency and hard to predict mobility patterns. The experimental network used in this investigation hosted mobile nodes using three different types of communication technologies, namely VHF (9.6 kbps, 20 km), UHF (240 kbps, 2 km) and SatCom (100-500 kbps - simulated). OLSRv2 was set to use multicast IPs to send hello and topology control messages within intervals suitable for the data rate available; using less than ~5% of the network nominal capacity. Therefore, we analyze results from a testbed with mobile nodes connected to a tactical network using OLSRv2 to create an overlay IP network. The quantitative results suggest that OLSRv2 can be fine-tuned to proactively discover IP nodes in radio networks with quite different link data rates. The trade-off between data overhead and time to converge is discussed over estimated metrics.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124903702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Niranjan Suri, M. Breedy, Roberto Fronteddu, A. Morelli, Eelco Cramer, J. Nilsson, A. Hansson, K. Marcus, Andreas Martens
{"title":"Evaluating the Scalability of Group Communication Protocols over Synchronized Cooperative Broadcast","authors":"Niranjan Suri, M. Breedy, Roberto Fronteddu, A. Morelli, Eelco Cramer, J. Nilsson, A. Hansson, K. Marcus, Andreas Martens","doi":"10.1109/ICMCIS52405.2021.9486407","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486407","url":null,"abstract":"Military operations in Tactical Edge Networks, usually comprised of dismounted soldiers and mobile vehicles, often have to exchange data that is received by multiple nodes in the network with one example being blue force data. Group communications protocols offer an efficient mechanism to handle such dissemination. In this paper, we examine the performance and scalability of a variety of group communications protocols over the Anglova scenario with network sizes ranging from 24 to 96 nodes. In particular, we use the Synchronized Cooperative Broadcast (SCB) radio model, as it is particularly well-suited to such communications. We report on results using the three measures of Delivery Ratio, Latency, and Bandwidth Utilization. The results show that most of the group communications protocols achieve good scalability results.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mattia Fogli, Thomas Kudla, Bram Musters, Geert L. J. Pingen, Casper van den Broek, H. Bastiaansen, Niranjan Suri, S. Webb
{"title":"Performance Evaluation of Kubernetes Distributions (K8s, K3s, KubeEdge) in an Adaptive and Federated Cloud Infrastructure for Disadvantaged Tactical Networks","authors":"Mattia Fogli, Thomas Kudla, Bram Musters, Geert L. J. Pingen, Casper van den Broek, H. Bastiaansen, Niranjan Suri, S. Webb","doi":"10.1109/ICMCIS52405.2021.9486396","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486396","url":null,"abstract":"The tactical edge domain, primarily consisting of dismounted soldiers and vehicles on the move, are typically interconnected via wireless tactical networks that are limited in terms of bandwidth, reachability, reliability, and latency. Hence, nodes in the tactical network cannot simply rely on assured access to enterprise cloud computing. Instead, they must explore other alternative models to leverage resources that are in situ, by means of a federated cloud architecture that spans the three tiers of dismounted soldiers, vehicles on the move, and operations centers. The NATO IST-168 RTG has been exploring approaches to best exploit available resources in such a federated architecture while living within the constraints of the tactical networks. The first approach has been to evaluate Kubernetes technologies to see if they are able to be deployed over tactical networks and provide the capabilities to dynamically distribute data and computing tasks over a federated cloud infrastructure composed of multiple partner nation networks. This paper provides initial performance results for various Kubernetes distributions (K8s, K3s, KubeEdge) in federated and adaptive tactical networks, leading to recommendations for further development and experimentation.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122108721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}