{"title":"Cluster-based cooperative communication with network coding in wireless networks","authors":"Z. Haas, Tuan-Che Chen","doi":"10.1109/MILCOM.2010.5680471","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680471","url":null,"abstract":"Cooperative communication is a promising way to reduce probability of packet loss. The massive deployment of nodes in wireless sensor network renders such networks especially attractive for exploiting the advantage of cooperative diversity. Similarly, when used appropriately, network coding could also improve the probability of correct reception. In this paper, we introduce the cluster-based Cooperative Coding (CC) protocol, which is based on the integration of cooperative communication and network coding. In particular, in the CC protocol, network nodes are grouped into multiple clusters and nodes within the same cluster cooperate in transmitting and receiving packets. Such an integration reduces the amount of redundant information being forwarded to ensure high probability of correct end-to-end reception, when link-level retransmission of erroneous packets is not allowed (i.e., no linklevel feedback). In particular, our analysis shows how to optimize the performance of the network by properly sizing the clusters. Compared to schemes without cooperation (whether with or without network coding), our simulation results demonstrate the significant performance improvement of the proposed scheme.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127848817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thuy D. Nguyen, Mark A. Gondree, D. Shifflett, Jean Khosalim, T. Levin, C. Irvine
{"title":"A cloud-oriented cross-domain security architecture","authors":"Thuy D. Nguyen, Mark A. Gondree, D. Shifflett, Jean Khosalim, T. Levin, C. Irvine","doi":"10.1109/MILCOM.2010.5680360","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680360","url":null,"abstract":"The Monterey Security Architecture addresses the need to share high-value data across multiple domains of different classification levels while enforcing information flow policies. The architecture allows users with different security authorizations to securely collaborate and exchange information using commodity computers and familiar commercial client software that generally lack the prerequisite assurance and functional security protections. MYSEA seeks to meet two compelling requirements, often assumed to be at odds: enforcing critical, mandatory security policies, and allowing access and collaboration in a familiar work environment. Recent additions to the MYSEA design expand the architecture to support a cloud of cross-domain services, hosted within a federation of multilevel secure (MLS) MYSEA servers. The MYSEA cloud supports single-sign on, service replication, and network-layer quality of security service. This new cross-domain, distributed architecture follows the consumption and delivery model for cloud services, while maintaining the federated control model necessary to support and protect cross-domain collaboration within the enterprise. The resulting architecture shows the feasibility of high-assurance, cross-domain services hosted within a community cloud suitable for inter-agency, or joint, collaboration. This paper summarizes the MYSEA architecture and discusses MYSEA's approach to provide an MLS-constrained cloud computing environment.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122397636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Palanivel A. Kodeswaran, Wenjia Li, A. Joshi, Timothy W. Finin, F. Perich
{"title":"Enforcing secure and robust routing with declarative policies","authors":"Palanivel A. Kodeswaran, Wenjia Li, A. Joshi, Timothy W. Finin, F. Perich","doi":"10.1109/MILCOM.2010.5680362","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680362","url":null,"abstract":"Internet routers must adhere to many polices governing the selection of paths that meet potentially complex constraints on length, security, symmetry and organizational preferences. Many routing problems are caused by their misconfigura-tion, usually due to a combination of human errors and the lack of a high-level formal language for specifying routing policies that can be used to generate router configurations. We describe an approach that obviates many problems by using a declarative language for specifying network-wide routing policies to automatically configure routers and also inform software agents that can diagnose and correct networking problems. Our policy language is grounded in ontologies encoded in the Semantic Web language OWL, supporting machine understanding and interoperability. Polices expressed in it can be automatically compiled into low-level router configurations and intelligent agents can reason with them to diagnose and correct routing problems. We have prototyped the approach and evaluated the results both in a simulator and on a small physical network. Our results show that the framework performs well on a number of use cases, including checking for policy coherence, preventing asymmetric routing patterns, applying organizational preferences, and diagnosing and correcting failures.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128480579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of multi-packet transmission and reception on the throughput capacity of wireless ad hoc networks","authors":"Bita Azimdoost, R. Hamid, J. Garcia-Luna-Aceves","doi":"10.1109/MILCOM.2010.5680382","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680382","url":null,"abstract":"We study the capacity of random wireless ad hoc networks when nodes are capable of multi-packet transmission and reception (MPTR). This paper extends the unified framework of (n, m, k)-cast by Wang et al. [6] for single-packet reception (SPR) at each node to the case of MPTR. (n, m, k)-cast considers all types of information dissemination including unicast routing, multicast routing, broadcasting and anycasting. In this context, n, m, and k represent the total number of nodes in the network, the number of destinations for each communication group and the actual number of destinations that receive the packets, respectively. We show that the capacity of a wireless ad hoc network of n nodes in which nodes have a communication range of r(n) and engage in an (n, m, k) -casting scales as Θ(n√mr<sup>3</sup>(n)/k), Θ(nr<sup>2</sup>(n)/k) and Θ(nr<sup>4</sup>(n)) bits per second when m = O(1/r<sup>2</sup>(n)), Ω(k) = 1/r<sup>2</sup>(n) = O(m) and k = Ω(1/r<sup>2</sup>(n)), respectively. We show that the use of MPTR leads to a gain of Θ(logn) compared to the capacity attained with multi-packet reception (MPR), and to a gain of Θ((logn)<sup>2</sup>) compared to the capacity attained with SPR, when Ω(√logn/n) = r(n) = O(√loglogn/3logn).","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114242200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting the capture effect opportunistically in MANETs","authors":"Hui Xu, J. Garcia-Luna-Aceves, H. Sadjadpour","doi":"10.1109/MILCOM.2010.5680159","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680159","url":null,"abstract":"Channel fading has been regarded as a negative factor for successful packet transmission. However, with deep fading, although collisions for a given transmission may exist, the capture effect can allow the transmission to succeed as long as the channel for the transmitted signal is strong enough and is weak enough for the interference signals. Accordingly, we propose an asynchronous medium access control (MAC) scheme that selects a packet with the highest success probability to be transmitted. We call this approach opportunistic interference management (OIM). The basic mechanism in OIM consists of probing the channel conditions for multiple neighbors concurrently, and then selecting to transmit those packets corresponding to the winners of the probing phase. OIM improves the probability of successful transmission and increases network throughput without adding extra delays for inter-nodal handshakes. Mathematical analysis and simulations are used to validate the advantages of OIM over the traditional packet-transmission scheme used in MAC protocols today.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123575905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-user diversity in single-radio OFDMA ad hoc networks based on Gibbs sampling","authors":"M. Veyseh, J. Garcia-Luna-Aceves, H. Sadjadpour","doi":"10.1109/MILCOM.2010.5679529","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5679529","url":null,"abstract":"Multiuser Diversity Medium Access or MDMA is a new cross-layer channel allocation scheme that exploits channel fading diversity and attains concurrency utilizing OFDMA in single-radio ad hoc networks. Channel throughput is enhanced by enabling concurrent transmissions from multiple nodes to the same receiver or from a single transmitter to multiple receivers over orthogonal Subchannels. Also, concurrency is attained when two hop away neighbors can utilize the same subchannel to transmit data to nodes not neighboring the other two hop neighbor. Each subchannel uses a portion of the available bandwidth and contains a grouping of subcarriers or tones which are orthogonal carriers of lower-rate input data streams. A new subchannel assignment algorithm based on Gibbs sampling is presented. This algorithm operates alongside the proposed MAC signaling to distribute subchannels among nodes to exploit channel fading condition on each communication link and to minimize hidden terminal interference. The new MAC addresses the synchronization requirements of OFDMA and the needs of the subchannel assignment algorithm. We present simulation results on the throughput gains obtained with our design compared to traditional channel assignment techniques for multi-channel networks.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132683994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing system software performance in complex system of systems environments","authors":"J. Wessel, Bryce L. Meyer","doi":"10.1109/MILCOM.2010.5680358","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680358","url":null,"abstract":"The characterization of software performance (SWP) in complex, service-oriented architecture (SOA)-based system of systems (SoS) environments is an emergent study area. This report focuses on both qualitative and quantitative ways of determining the current state of SWP in terms of both test coverage (what has been tested) and confidence (degree of testing) for SOA-based SoS environments. Practical tools and methodologies are offered to aid technical and programmatic managers in the form of a stepwise methodology toward SWP selection. Included are system architecture design considerations, resource limiters of SWP, test event design considerations, organizational and process suggestions toward improved SWP management and a matrix of measurement suggestions. Assuring mission success; Network-centric systems and technologies; System-level modeling and simulation; System of systems (SoS);Service Oriented Architecture (SOA)","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115224296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of a JTIDS-type waveform with noise-normalization combining in pulsed-noise interference","authors":"C. Kao, C. Robertson","doi":"10.1109/MILCOM.2010.5680222","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680222","url":null,"abstract":"The Joint Tactical Information Distribution System (JTIDS) is the communication terminal of Link-16. When the double-pulse structure is chosen to transmit the Link-16 data, JTIDS is a hybrid direct sequence/fast frequency-hopping spread spectrum system with a sequential diversity of two. To minimize the effect of pulsed-noise interference (PNI), a noise-normalized diversity combining MSK chip demodulator is assumed in the JTIDS receiver. The symbol error rate (SER) performance of a coherently detected JTIDS-type waveform for the double-pulse structure with noise-normalization combining (NNC) in PNI is investigated in this paper. To facilitate the evaluation, perfect frequency de-hopping, sequence synchronization, chip synchronization, and 32-chip sequence descrambling are assumed. Furthermore, maximum-likelihood chip detection is assumed rather than maximum-likelihood chip-sequence detection since the former represents a more practical assumption for a JTIDS signal. The results obtained with NNC are compared to those without NNC, as well as to those with perfect side information. The results show that for a coherently detected JTIDS-type waveform with the double-pulse structure, NNC effectively mitigates the system degradation caused by PNI.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117115105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wideband waveform optimization for multiple input single output cognitive radio with practical considerations","authors":"Zhen Hu, N. Guo, R. Qiu","doi":"10.1109/MILCOM.2010.5680114","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680114","url":null,"abstract":"This paper investigates the transmitted waveform optimization issues for wideband Multiple Input Single Output (MISO) cognitive radio. For cognitive radio, a spectral mask for the transmitted waveform is determined on spectrum sensing, and arbitrary transmitted spectral shaping is required. Meanwhile, the interferences from primary radios should be canceled at the receiver of cognitive radio. The contribution of this paper is to optimize the MISO cognitive radio communication link by jointly considering the optimization objective, the spectral mask constraint at the transmitter and the interference cancellation at the receiver. Meanwhile, reduction in transmitted peak power and quantization is still very desirable, being concerned about implementation complexity and power consumption. These motive us to consider various practical constraints for waveform optimization in the context of MISO cognitive radio. A number of solutions are provided in this paper in conjunction with numerical results showing the optimal wideband waveforms.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"58 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120896851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delay-throughput tradeoff for streaming over blockage channels with delayed feedback","authors":"H. Yao, Y. Kochman, G. Wornell","doi":"10.1109/MILCOM.2010.5680416","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680416","url":null,"abstract":"We focus on the problem of real-time streaming over a blockage channel with long feedback delay, as arises in real-time satellite communication from a comm-on-the-move (COTM) terminal. For this problem, we introduce a definition of delay that captures the real-time nature of the problem, which we show grows at least as fast as O(log(k)) for memoryless channels, where k corresponds to the number of packets in the transmission. Moreover, we show that a tradeoff exists between this delay and a natural notion of throughput that captures the bandwidth requirements of the communication. We develop and analyze an efficient “multi-burst” transmission protocol for achieving good delay-throughput tradeoffs within this framework, which we show can be augmented with coding for additional performance gains. Simulations validate the new protocols on channels with and without memory.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127506308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}