E. Vallés, R. Wesel, J. Villasenor, Christopher R. Jones, M. Simon
{"title":"Pilotless carrier phase-synchronization via LDPC code feedback","authors":"E. Vallés, R. Wesel, J. Villasenor, Christopher R. Jones, M. Simon","doi":"10.1109/MILCOM.2010.5680463","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680463","url":null,"abstract":"This paper addresses the carrier-phase estimation problem under the low SNR conditions often encountered in turbo and LDPC-coded applications. In [1] a decision-directed carrier synchronization (DDCS) circuit that uses soft information from an iterative LDPC decoder was presented for BPSK and QPSK constellations with constant phase offsets. In this work, we present a method that is able to handle arbitrary constellations with a random-walk phase noise process. Loop SNR equations are derived and the performance for different constellations is shown. An extension of the DDCS algorithm is described that uses a search and tracking method based on measuring the number of satisfied LDPC constraint-node equations equations at the decoder and is able to track arbitrary carrier phase.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134068157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ford, M. Ljungberg, D. J. Van Hook, R. Shaw, Ethan Aubin
{"title":"Resource Brokering Service: Automatic plan composition and execution","authors":"M. Ford, M. Ljungberg, D. J. Van Hook, R. Shaw, Ethan Aubin","doi":"10.1109/MILCOM.2010.5680336","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680336","url":null,"abstract":"We address supporting unanticipated users and uses of limited information resources (sensors, databases, weapons -any resource intrinsically tied to digital information) in a timely and efficient fashion. Platform-centric systems often preclude users and uses not identified when the system was developed and deployed. Net-centric approaches, however, can address these problems by allowing services and information to be discovered and accessed at run-time. We have developed a Resource Brokering Service (RBS) that uses net-centric principles to enable multi-domain information and resource sharing and support for unanticipated users and uses. The RBS uses a modular software component framework for dynamically composing and tasking heterogeneous resources including sensors, data feeds, processors, archived data, networks, and even analysts into resilient, mission-oriented workflows. The RBS is applicable to multiple sense-decide-act military domains including missile defense, space situation awareness, ISR, border protection, and cyber defense. In this paper we give an overview of the concepts of the RBS and describe the process of transforming abstract plans to executable plans.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134086313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Liam, G. S. Bahr, D. Balaban Carey, G. Bell Matthew, R. Ford, L. Fox Kevin, R. Henning Ronda, B. Smith Wayne
{"title":"A hybrid cognitive-neurophysiological approach to resilient cyber security","authors":"M. Liam, G. S. Bahr, D. Balaban Carey, G. Bell Matthew, R. Ford, L. Fox Kevin, R. Henning Ronda, B. Smith Wayne","doi":"10.1109/MILCOM.2010.5679585","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5679585","url":null,"abstract":"Cyber infrastructure remains vulnerable. Communications systems lack resiliency, a characteristic common to many natural systems. In this work, we present an interdisciplinary neurotechnological approach to considering resilience in cyber communications systems. A model for communications systems security is reconciled with corresponding models of physiological situational awareness and cognitive adaptive goal direction. Finally, we discuss operational considerations of our approach to achieving resiliency, particularly as it relates to cloud computing.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128920438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Gottlieb, C. Chiang, Ritu Chadh, Hagai Ohel, Kimberly Moeltner, S. Ali, Y. Kumar, R. Bauer
{"title":"Policy-controlled dynamic spectrum access in multitiered mobile networks","authors":"Y. Gottlieb, C. Chiang, Ritu Chadh, Hagai Ohel, Kimberly Moeltner, S. Ali, Y. Kumar, R. Bauer","doi":"10.1109/MILCOM.2010.5679567","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5679567","url":null,"abstract":"Managed mobile ad hoc networks, such as tactical networks, are frequently implemented using multiple subnets, or tiers, so that nodes in one tier can communicate to nodes in another tier only through gateways that can communicate in both tiers. This structure imposes an extra burden on network planning personnel to plan and configure appropriate nodes as gateways between tiers taking into account the connectivity between tiers required to meet communication needs and the robustness required to deal with failures and mobility. This paper presents Net Communication Goals—a policy for specifying connectivity between tiers—and an implementation of a system for enforcing these policies. Using Net Communication Goals, or net goals, network planning personnel need only specify the required number of connections between tiers. These policies are then dynamically enforced within each tier, reconfiguring the frequencies used by network nodes to provide dynamic access to different parts of the available spectrum, thereby automatically maintaining the needed connectivity without manual intervention.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131093683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"REAM: RAKE receiver enhanced authentication method","authors":"Fangming He, Wei Wang, H. Man","doi":"10.1109/MILCOM.2010.5680394","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680394","url":null,"abstract":"The broadcast nature of the wireless medium poses a serious challenge to the security of wireless communications and networks. Traditional computational security strategies always fail to prevent the eavesdropper from overhearing the communications. Recently, the unique characteristics of wireless channel fingerprints, e.g. randomness and reciprocity, have been successfully used to enhance the security of the wireless network. We expand our previous work on exploring particular physical parameters of fingerprints, and focus on a new scheme in which we use the RAKE receiver to differentiate users under low transmission power. RAKE receiver may capture and estimate fingerprints through poor autocorrelation of the spreading coding. As the fingerprint is incomputable and unpredictable, and may only be detected by the pair of transmitter and receiver, it may be fully utilized to design an efficient authentication method. Simulation results strongly verify the efficiency of our proposed method, especially in the case of low SNR.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133619136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Fitzgerald, M. Lukowiak, M. Kurdziel, C. Mackey, Kenneth Smith, Brian C. Boorman, D. Harris, W. Skiba
{"title":"FPGA-based, multi-processor HW-SW system for Single-Chip Crypto applications","authors":"A. Fitzgerald, M. Lukowiak, M. Kurdziel, C. Mackey, Kenneth Smith, Brian C. Boorman, D. Harris, W. Skiba","doi":"10.1109/MILCOM.2010.5680127","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680127","url":null,"abstract":"This paper discusses design and analysis of an FPGA-based system containing two isolated, Altera Nios II softcore processors that share data through two custom crypto-engines. FPGA-based Single-Chip Cryptographic (SCC) techniques were employed to ensure full red/black separation. Each crypto-engine is a hardware implementation of the Advanced Encryption Standard (AES), operating in Galois/Counter mode (GCM). The features of the AES crypto-engines were varied with the goal of determining which best achieve high performance or minimal hardware usage. To quantify the costs of red/black separation, a thorough analysis of resource requirements was performed. The hardware/software approach was utilized in order to provide appropriate levels of flexibilty and performance, allowing for a range of target applications.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132166214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The CCSDS Space Data Link Security protocol","authors":"I. Sanchez, G. Moury, H. Weiss","doi":"10.1109/MILCOM.2010.5680491","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680491","url":null,"abstract":"The Consultative Committee for Space Data Systems (CCSDS) initiated work several years ago to develop a knowledge-base and relevant standards for the protection of the Telecommand and Telemetry communications and data systems of space missions of their Member Space Agencies. A particularly recent CCSDS security effort concerns the development and specification of a Space Data Link Security (SDLS) protocol that can provide security services to the existing CCSDS family of Space Data Link (SDL) protocols: Telecommand (TC), Telemetry (TM) and Advanced Orbiting Systems (AOS). Those CCSDS SDL protocols are used extensively for Telecommand as well as for both Housekeeping and Payload Telemetry space links by the entire civil space community. While ad-hoc security implementations have been developed by several CCSDS Member Agencies, there is a recognition that a commonly engineered security protocol with minimal logical and physical integration impact on CCSDS space data link protocols and compatible with Space Link Extension (SLE) protocols would be very beneficial not only for CCSDS Member Agencies but also for commercial space missions, space data handling equipment suppliers and possibly other future applications such as civilian Unmanned Aerial Vehicles (UAV) data links. This paper will describe the protocol requirements, the provided security services, issues concerning its implementation and integration/interface with TM, TC and AOS data link protocols as well as its current development status.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133155254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Jorgenson, Robert W. Johnson, R. Blocksome, R. W. Nelson, Dwayne Harris, Gary Boesdorfer
{"title":"Implementation and on-air testing of a 64 kbps wideband HF data waveform","authors":"M. Jorgenson, Robert W. Johnson, R. Blocksome, R. W. Nelson, Dwayne Harris, Gary Boesdorfer","doi":"10.1109/MILCOM.2010.5680480","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680480","url":null,"abstract":"Even with advances in the past two decades, data rates on a single 3 kHz HF channel are, at most, 9.6 kbps with forward error correction. In the digitized battlefield, this sharply limits the number and types of services which can be supported over HF. It is shown that in 12 kHz, a prototype waveform developed to take advantage of wider bandwidth channels can provide data rates of up to 38.4 kbps over a wide range of sky-wave channels. The waveform also includes data rates of 48 and 64 kbps that will be operable on a smaller number of sky-wave channels, but which would be expected to provide reliable communications in surface wave channels. On-air testing of the prototype wideband waveform, implemented as a software upgrade to existing modem hardware, has been undertaken over an 1100 km sky-wave link between Cedar Rapids, Iowa and Dallas, Texas. Tests to date have proven successful operation at 38.4 kbps on this link. When receive diversity has been employed on the link, data rates up to 64 kbps have been successfully used on this sky-wave link.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115349295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Llewellyn Means, A. Godhwani, C. Pitts, Matthew Murfield, T. Delaney, L. Wallace, K. Fong, R. Gobbi
{"title":"Unclassified DSN Capability for MUOS Users: Paper Number: 1569289515","authors":"Llewellyn Means, A. Godhwani, C. Pitts, Matthew Murfield, T. Delaney, L. Wallace, K. Fong, R. Gobbi","doi":"10.1109/MILCOM.2010.5680272","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680272","url":null,"abstract":"The Mobile User Objective System (MUOS) is the next generation Department of Defense (DoD) Ultra High Frequency (UHF) satellite communications (SATCOM) system that will provide the warfighter with modern worldwide mobile communication services, utilizing the code division multiple access (CDMA) waveform for use in the military UHF SATCOM band. In addition to providing point-to-point capability between MUOS Functional Terminals (MFTs), MUOS also provides connectivity for the user to communicate with users on the Defense Switched Network (DSN) via the DoD Teleport sites. This allows the user on-demand capability for real-time reachback through the DSN. The current MUOS baseline allows for secure communications using the Secure Communication Interoperability Protocol (SCIP) to other SCIP-compatible and enabled devices within the DSN; however, the user community requested additional capability to allow MUOS users to establish and receive nonsecure voice calls through the DSN. The Narrowband SATCOM Systems Engineering Group (NSSEG) was given the responsibility of researching and developing solutions to allow MUOS users to connect to DSN with unclassified voice while still meeting encryption requirements over the satellite. The NSSEG was successful in identifying the requirements, candidate solutions, and obtaining the necessary funding for implementation. This paper will describe the results of the study and the implementation which has been recommended for development.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115649085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On iterative decoding of two-level superposition codes for cooperative broadcasting based on QPSK and 4-PAM constellations","authors":"R. Morelos-Zaragoza","doi":"10.1109/MILCOM.2010.5680340","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680340","url":null,"abstract":"This paper considers iterative decoding of two-level superposition codes used in cooperative broadcasting over wireless networks. The coding scheme consists of two low-density parity-check (LDPC) codes combined using Plotkin's |u|u + v|-construction and provides two levels of error protection. Coding for cooperative broadcasting differs from conventional single-source broadcast coding. Instead of binary addition of subcode codewords performed by a single-source encoder, in superposition coding two modulated subcode sequences, produced by two coordinated and independent sources, are combined at the antenna of the receiver. Expressions are derived for the bit metrics, or log-likelihood ratio values, used by an iterative decoder for two-level superposition coding schemes based on BPSK, QPSK and 4-PAM modulated sequences. It is shown that conventional equal-energy 4-PAM constellations do not work well with two-level superposition coding. A solution is proposed in which 4-PAM constellations of different levels of average energy are used.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124102134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}