2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE最新文献

筛选
英文 中文
Pilotless carrier phase-synchronization via LDPC code feedback 基于LDPC码反馈的无人载波相位同步
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680463
E. Vallés, R. Wesel, J. Villasenor, Christopher R. Jones, M. Simon
{"title":"Pilotless carrier phase-synchronization via LDPC code feedback","authors":"E. Vallés, R. Wesel, J. Villasenor, Christopher R. Jones, M. Simon","doi":"10.1109/MILCOM.2010.5680463","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680463","url":null,"abstract":"This paper addresses the carrier-phase estimation problem under the low SNR conditions often encountered in turbo and LDPC-coded applications. In [1] a decision-directed carrier synchronization (DDCS) circuit that uses soft information from an iterative LDPC decoder was presented for BPSK and QPSK constellations with constant phase offsets. In this work, we present a method that is able to handle arbitrary constellations with a random-walk phase noise process. Loop SNR equations are derived and the performance for different constellations is shown. An extension of the DDCS algorithm is described that uses a search and tracking method based on measuring the number of satisfied LDPC constraint-node equations equations at the decoder and is able to track arbitrary carrier phase.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134068157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Resource Brokering Service: Automatic plan composition and execution 资源代理服务:自动计划组合和执行
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680336
M. Ford, M. Ljungberg, D. J. Van Hook, R. Shaw, Ethan Aubin
{"title":"Resource Brokering Service: Automatic plan composition and execution","authors":"M. Ford, M. Ljungberg, D. J. Van Hook, R. Shaw, Ethan Aubin","doi":"10.1109/MILCOM.2010.5680336","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680336","url":null,"abstract":"We address supporting unanticipated users and uses of limited information resources (sensors, databases, weapons -any resource intrinsically tied to digital information) in a timely and efficient fashion. Platform-centric systems often preclude users and uses not identified when the system was developed and deployed. Net-centric approaches, however, can address these problems by allowing services and information to be discovered and accessed at run-time. We have developed a Resource Brokering Service (RBS) that uses net-centric principles to enable multi-domain information and resource sharing and support for unanticipated users and uses. The RBS uses a modular software component framework for dynamically composing and tasking heterogeneous resources including sensors, data feeds, processors, archived data, networks, and even analysts into resilient, mission-oriented workflows. The RBS is applicable to multiple sense-decide-act military domains including missile defense, space situation awareness, ISR, border protection, and cyber defense. In this paper we give an overview of the concepts of the RBS and describe the process of transforming abstract plans to executable plans.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134086313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A hybrid cognitive-neurophysiological approach to resilient cyber security 弹性网络安全的混合认知-神经生理学方法
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5679585
M. Liam, G. S. Bahr, D. Balaban Carey, G. Bell Matthew, R. Ford, L. Fox Kevin, R. Henning Ronda, B. Smith Wayne
{"title":"A hybrid cognitive-neurophysiological approach to resilient cyber security","authors":"M. Liam, G. S. Bahr, D. Balaban Carey, G. Bell Matthew, R. Ford, L. Fox Kevin, R. Henning Ronda, B. Smith Wayne","doi":"10.1109/MILCOM.2010.5679585","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5679585","url":null,"abstract":"Cyber infrastructure remains vulnerable. Communications systems lack resiliency, a characteristic common to many natural systems. In this work, we present an interdisciplinary neurotechnological approach to considering resilience in cyber communications systems. A model for communications systems security is reconciled with corresponding models of physiological situational awareness and cognitive adaptive goal direction. Finally, we discuss operational considerations of our approach to achieving resiliency, particularly as it relates to cloud computing.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128920438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Policy-controlled dynamic spectrum access in multitiered mobile networks 多层移动网络中策略控制的动态频谱接入
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5679567
Y. Gottlieb, C. Chiang, Ritu Chadh, Hagai Ohel, Kimberly Moeltner, S. Ali, Y. Kumar, R. Bauer
{"title":"Policy-controlled dynamic spectrum access in multitiered mobile networks","authors":"Y. Gottlieb, C. Chiang, Ritu Chadh, Hagai Ohel, Kimberly Moeltner, S. Ali, Y. Kumar, R. Bauer","doi":"10.1109/MILCOM.2010.5679567","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5679567","url":null,"abstract":"Managed mobile ad hoc networks, such as tactical networks, are frequently implemented using multiple subnets, or tiers, so that nodes in one tier can communicate to nodes in another tier only through gateways that can communicate in both tiers. This structure imposes an extra burden on network planning personnel to plan and configure appropriate nodes as gateways between tiers taking into account the connectivity between tiers required to meet communication needs and the robustness required to deal with failures and mobility. This paper presents Net Communication Goals—a policy for specifying connectivity between tiers—and an implementation of a system for enforcing these policies. Using Net Communication Goals, or net goals, network planning personnel need only specify the required number of connections between tiers. These policies are then dynamically enforced within each tier, reconfiguring the frequencies used by network nodes to provide dynamic access to different parts of the available spectrum, thereby automatically maintaining the needed connectivity without manual intervention.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131093683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
REAM: RAKE receiver enhanced authentication method REAM: RAKE接收器增强的身份验证方法
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680394
Fangming He, Wei Wang, H. Man
{"title":"REAM: RAKE receiver enhanced authentication method","authors":"Fangming He, Wei Wang, H. Man","doi":"10.1109/MILCOM.2010.5680394","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680394","url":null,"abstract":"The broadcast nature of the wireless medium poses a serious challenge to the security of wireless communications and networks. Traditional computational security strategies always fail to prevent the eavesdropper from overhearing the communications. Recently, the unique characteristics of wireless channel fingerprints, e.g. randomness and reciprocity, have been successfully used to enhance the security of the wireless network. We expand our previous work on exploring particular physical parameters of fingerprints, and focus on a new scheme in which we use the RAKE receiver to differentiate users under low transmission power. RAKE receiver may capture and estimate fingerprints through poor autocorrelation of the spreading coding. As the fingerprint is incomputable and unpredictable, and may only be detected by the pair of transmitter and receiver, it may be fully utilized to design an efficient authentication method. Simulation results strongly verify the efficiency of our proposed method, especially in the case of low SNR.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133619136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
FPGA-based, multi-processor HW-SW system for Single-Chip Crypto applications 基于fpga的多处理器HW-SW系统,用于单片机加密应用
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680127
A. Fitzgerald, M. Lukowiak, M. Kurdziel, C. Mackey, Kenneth Smith, Brian C. Boorman, D. Harris, W. Skiba
{"title":"FPGA-based, multi-processor HW-SW system for Single-Chip Crypto applications","authors":"A. Fitzgerald, M. Lukowiak, M. Kurdziel, C. Mackey, Kenneth Smith, Brian C. Boorman, D. Harris, W. Skiba","doi":"10.1109/MILCOM.2010.5680127","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680127","url":null,"abstract":"This paper discusses design and analysis of an FPGA-based system containing two isolated, Altera Nios II softcore processors that share data through two custom crypto-engines. FPGA-based Single-Chip Cryptographic (SCC) techniques were employed to ensure full red/black separation. Each crypto-engine is a hardware implementation of the Advanced Encryption Standard (AES), operating in Galois/Counter mode (GCM). The features of the AES crypto-engines were varied with the goal of determining which best achieve high performance or minimal hardware usage. To quantify the costs of red/black separation, a thorough analysis of resource requirements was performed. The hardware/software approach was utilized in order to provide appropriate levels of flexibilty and performance, allowing for a range of target applications.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132166214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The CCSDS Space Data Link Security protocol CCSDS空间数据链路安全协议
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680491
I. Sanchez, G. Moury, H. Weiss
{"title":"The CCSDS Space Data Link Security protocol","authors":"I. Sanchez, G. Moury, H. Weiss","doi":"10.1109/MILCOM.2010.5680491","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680491","url":null,"abstract":"The Consultative Committee for Space Data Systems (CCSDS) initiated work several years ago to develop a knowledge-base and relevant standards for the protection of the Telecommand and Telemetry communications and data systems of space missions of their Member Space Agencies. A particularly recent CCSDS security effort concerns the development and specification of a Space Data Link Security (SDLS) protocol that can provide security services to the existing CCSDS family of Space Data Link (SDL) protocols: Telecommand (TC), Telemetry (TM) and Advanced Orbiting Systems (AOS). Those CCSDS SDL protocols are used extensively for Telecommand as well as for both Housekeeping and Payload Telemetry space links by the entire civil space community. While ad-hoc security implementations have been developed by several CCSDS Member Agencies, there is a recognition that a commonly engineered security protocol with minimal logical and physical integration impact on CCSDS space data link protocols and compatible with Space Link Extension (SLE) protocols would be very beneficial not only for CCSDS Member Agencies but also for commercial space missions, space data handling equipment suppliers and possibly other future applications such as civilian Unmanned Aerial Vehicles (UAV) data links. This paper will describe the protocol requirements, the provided security services, issues concerning its implementation and integration/interface with TM, TC and AOS data link protocols as well as its current development status.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133155254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Implementation and on-air testing of a 64 kbps wideband HF data waveform 64 kbps宽带高频数据波形的实现和无线测试
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680480
M. Jorgenson, Robert W. Johnson, R. Blocksome, R. W. Nelson, Dwayne Harris, Gary Boesdorfer
{"title":"Implementation and on-air testing of a 64 kbps wideband HF data waveform","authors":"M. Jorgenson, Robert W. Johnson, R. Blocksome, R. W. Nelson, Dwayne Harris, Gary Boesdorfer","doi":"10.1109/MILCOM.2010.5680480","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680480","url":null,"abstract":"Even with advances in the past two decades, data rates on a single 3 kHz HF channel are, at most, 9.6 kbps with forward error correction. In the digitized battlefield, this sharply limits the number and types of services which can be supported over HF. It is shown that in 12 kHz, a prototype waveform developed to take advantage of wider bandwidth channels can provide data rates of up to 38.4 kbps over a wide range of sky-wave channels. The waveform also includes data rates of 48 and 64 kbps that will be operable on a smaller number of sky-wave channels, but which would be expected to provide reliable communications in surface wave channels. On-air testing of the prototype wideband waveform, implemented as a software upgrade to existing modem hardware, has been undertaken over an 1100 km sky-wave link between Cedar Rapids, Iowa and Dallas, Texas. Tests to date have proven successful operation at 38.4 kbps on this link. When receive diversity has been employed on the link, data rates up to 64 kbps have been successfully used on this sky-wave link.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115349295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Unclassified DSN Capability for MUOS Users: Paper Number: 1569289515 MUOS用户的非分类DSN能力:论文号:1569289515
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680272
Llewellyn Means, A. Godhwani, C. Pitts, Matthew Murfield, T. Delaney, L. Wallace, K. Fong, R. Gobbi
{"title":"Unclassified DSN Capability for MUOS Users: Paper Number: 1569289515","authors":"Llewellyn Means, A. Godhwani, C. Pitts, Matthew Murfield, T. Delaney, L. Wallace, K. Fong, R. Gobbi","doi":"10.1109/MILCOM.2010.5680272","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680272","url":null,"abstract":"The Mobile User Objective System (MUOS) is the next generation Department of Defense (DoD) Ultra High Frequency (UHF) satellite communications (SATCOM) system that will provide the warfighter with modern worldwide mobile communication services, utilizing the code division multiple access (CDMA) waveform for use in the military UHF SATCOM band. In addition to providing point-to-point capability between MUOS Functional Terminals (MFTs), MUOS also provides connectivity for the user to communicate with users on the Defense Switched Network (DSN) via the DoD Teleport sites. This allows the user on-demand capability for real-time reachback through the DSN. The current MUOS baseline allows for secure communications using the Secure Communication Interoperability Protocol (SCIP) to other SCIP-compatible and enabled devices within the DSN; however, the user community requested additional capability to allow MUOS users to establish and receive nonsecure voice calls through the DSN. The Narrowband SATCOM Systems Engineering Group (NSSEG) was given the responsibility of researching and developing solutions to allow MUOS users to connect to DSN with unclassified voice while still meeting encryption requirements over the satellite. The NSSEG was successful in identifying the requirements, candidate solutions, and obtaining the necessary funding for implementation. This paper will describe the results of the study and the implementation which has been recommended for development.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115649085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On iterative decoding of two-level superposition codes for cooperative broadcasting based on QPSK and 4-PAM constellations 基于QPSK和4-PAM星座的协同广播两级叠加码迭代译码
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680340
R. Morelos-Zaragoza
{"title":"On iterative decoding of two-level superposition codes for cooperative broadcasting based on QPSK and 4-PAM constellations","authors":"R. Morelos-Zaragoza","doi":"10.1109/MILCOM.2010.5680340","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680340","url":null,"abstract":"This paper considers iterative decoding of two-level superposition codes used in cooperative broadcasting over wireless networks. The coding scheme consists of two low-density parity-check (LDPC) codes combined using Plotkin's |u|u + v|-construction and provides two levels of error protection. Coding for cooperative broadcasting differs from conventional single-source broadcast coding. Instead of binary addition of subcode codewords performed by a single-source encoder, in superposition coding two modulated subcode sequences, produced by two coordinated and independent sources, are combined at the antenna of the receiver. Expressions are derived for the bit metrics, or log-likelihood ratio values, used by an iterative decoder for two-level superposition coding schemes based on BPSK, QPSK and 4-PAM modulated sequences. It is shown that conventional equal-energy 4-PAM constellations do not work well with two-level superposition coding. A solution is proposed in which 4-PAM constellations of different levels of average energy are used.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124102134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信