2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE最新文献

筛选
英文 中文
A design of rate-adaptive LDPC codes for distributed source coding using PEG algorithm 基于PEG算法的分布式信源编码的自适应LDPC码设计
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680317
Min Jang, J. Kang, Sang-Hyo Kim
{"title":"A design of rate-adaptive LDPC codes for distributed source coding using PEG algorithm","authors":"Min Jang, J. Kang, Sang-Hyo Kim","doi":"10.1109/MILCOM.2010.5680317","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680317","url":null,"abstract":"We propose a method for constructing rate-adaptive low-density parity check (LDPC) codes with large girth by syndrome merging with progressive-edge-growth (PEG) algorithm. Proposed scheme has a different structure from LDPC accumulate (LDPCA) codes. As a result, the new construction method turns the girth up for each specific code, and eliminates error floor.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"50 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117312569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Measurement, identification and calculation of cyber defense metrics 网络防御指标的测量、识别和计算
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680489
Juan Sandoval, Suzanne Hassell
{"title":"Measurement, identification and calculation of cyber defense metrics","authors":"Juan Sandoval, Suzanne Hassell","doi":"10.1109/MILCOM.2010.5680489","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680489","url":null,"abstract":"This paper presents performance metrics to be used for evaluation of cyber dynamic defense solutions. Currently, there are no standard, industry-defined metrics or benchmarks for evaluating cyber security architectures and systems for dynamic defense. These systems have relied instead on a layered, “defense in depth” approach, where the only measurement made is the number of defenses. In order to characterize the performance of cyber defense solutions, a variety of metrics need to be defined and captured based on observable effects on both cyber attacks and defenses. By establishing these metrics, the benefit each individual layer provides to an overall defensive solution can be determined, allowing system designers to select the most effective suite of defensive techniques. The metrics presented were formulated using a discrete event simulation of dynamic defense solutions. The focus of this simulation was to assess the increased cost to cyber attackers, where cost is based in time. Metrics are captured from the perspective of the defender, as well as that of the attacker. Collection of data supporting computation of the metrics will be shown in a discrete event simulation environment, as well as recommendations for network locations and equipment that can be used to collect these metrics in a notional network architecture.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116186089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Implementation and evaluation of accountability using flow-net in wireless networks 在无线网络中使用流网的责任实现与评估
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680278
Yang Xiao, Ke Meng, Daisuke Takahashi
{"title":"Implementation and evaluation of accountability using flow-net in wireless networks","authors":"Yang Xiao, Ke Meng, Daisuke Takahashi","doi":"10.1109/MILCOM.2010.5680278","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680278","url":null,"abstract":"In order to provide accountability, a better logging system is needed so that not only the activities but also their relationships are captured. To this end, our previous work proposed a novel logging mechanism, flow-net methodology, for accountability. In this paper, we extend the flow-net methodology and present its design and implementation in wireless networks. We also evaluate the performance of flow-net and compare it to that of audit log files.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116279909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An overview of beamforming and power allocation for MIMO relays MIMO中继的波束形成与功率分配概述
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680432
Y. Hua
{"title":"An overview of beamforming and power allocation for MIMO relays","authors":"Y. Hua","doi":"10.1109/MILCOM.2010.5680432","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680432","url":null,"abstract":"This paper provides an overview of the design of transmit and receive beamformers and transmit power allocation for MIMO relays. Soft and hard methods for interference cancelation are presented, which play a critical role for all MIMO relays whether they are full-duplex or half-duplex, regenerative or non-regenerative, one-way relay or two-way relay. A perspective of MIMO relays in a network of many hops is illustrated. A distinction is made between feedback loop of energy and feedback loop of noise. Subspace computation and a generalized water-filling (GWF) algorithm are shown as important building blocks for the design.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129461564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Preliminary results of a technology demonstration of the internet routing in space capability over a geostationary communications satellite 在地球静止通信卫星上进行互联网空间路由能力技术演示的初步结果
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680418
E. Cuevas, Z. Tang
{"title":"Preliminary results of a technology demonstration of the internet routing in space capability over a geostationary communications satellite","authors":"E. Cuevas, Z. Tang","doi":"10.1109/MILCOM.2010.5680418","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680418","url":null,"abstract":"The Internet Protocol Routing in Space (IRIS) was developed by an industry group, under the auspices of the United States Department of Defense1 as a Joint Capability Technology Demonstration (JCTD). The primary goal of the IRIS JCTD is to assess the network capability and operational utility of an IP router in space. This paper discusses the results obtained from laboratory and field tests which were specifically designed to evaluate the functionality and performance. Most of the results were obtained during a recent demonstration using 3 ground terminals operating with the IRIS payload on-board INTELSAT-14 (IS-14). Emphasis is given to application and network performance resulting from the end-to-end Quality of Service and Bandwidth on Demand capabilities of IRIS.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129522919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Routing trade-offs in sparse and mobile heterogeneous multi-radio ad hoc networks 稀疏和移动异构多无线电自组织网络中的路由权衡
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680383
L. Landmark, K. Ovsthus, O. Kure
{"title":"Routing trade-offs in sparse and mobile heterogeneous multi-radio ad hoc networks","authors":"L. Landmark, K. Ovsthus, O. Kure","doi":"10.1109/MILCOM.2010.5680383","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680383","url":null,"abstract":"Ad-hoc routing protocols are generally not optimized for networks with mobile nodes having one or more heterogeneous radios. Our simulations of heterogeneous radio networks, using a proactive routing protocol, show that longrange and low bandwidth radios are beneficial up to the supported radio capacity. The benefit of long-range radios is their ability to provide consistent routes. Thus, short-range and high bandwidth radios should only carry the exceed traffic at high traffic load. Also, in a dual radio network it was found that at high traffic load and moderate mobility, reduced packet loss was achieved by manipulating the topology table by turning off some low capacity radios. This paper discusses and illustrates various trade-offs in determining which radio to select under different scenarios.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129707727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficiency of multiparty networking protocols over mobile tactical radios on VHF bands VHF波段移动战术无线电上的多方网络协议效率
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680089
Li Li, T. Kunz
{"title":"Efficiency of multiparty networking protocols over mobile tactical radios on VHF bands","authors":"Li Li, T. Kunz","doi":"10.1109/MILCOM.2010.5680089","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680089","url":null,"abstract":"Multiparty routing protocols for resource constraint VHF Mobile Tactical Networks are studied by employing a modeling platform that integrates VHF tactical radio signal measurement data and practical network deployment scenarios. The standard approach of Simplified Multicast Forwarding based on the 2-hop neighborhood information and a typical alternative using 1-hop network clustering are compared to examine their overhead cost and their applicability in the tactical network. It is found that the 2-hop neighborhood information based solution may generate high message overhead when disseminating the link status information. The 1-hop clustering scheme, on the other hand, may require improvement on its packet forwarding efficiency.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128662456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Security for distributed SOA at the tactical edge 分布式SOA在战术上的安全性
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680146
R. Maule, W. Lewis
{"title":"Security for distributed SOA at the tactical edge","authors":"R. Maule, W. Lewis","doi":"10.1109/MILCOM.2010.5680146","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680146","url":null,"abstract":"Service-Oriented Architecture (SOA) presents new paradigms for security and information assurance. Security processes for legacy systems are not sufficient to secure a distributed SOA. Yet, many of the new services arriving at the tactical edge for Fleet testing are based on web services—meaning that SOA is somewhat inevitable. This paper addresses some of the challenges encountered when testing SOA in live Fleet operations and in controlled laboratory experiments. Discussion of SOA capabilities is followed by a case study that uses them to determine the source of a latency failure under expected user tactical load. The case study concerns performance issues encountered in both field and laboratory experiments when implementing certificates to secure web services in distributed service-based tactical workflow automation.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"249 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129963294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure channel establishment in disadvantaged networks : Optimizing TLS using intercepting proxies 劣势网络中安全通道的建立:利用拦截代理优化TLS
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680335
Joseph A. Cooley, R. Khazan, Sam McVeety
{"title":"Secure channel establishment in disadvantaged networks : Optimizing TLS using intercepting proxies","authors":"Joseph A. Cooley, R. Khazan, Sam McVeety","doi":"10.1109/MILCOM.2010.5680335","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680335","url":null,"abstract":"Transport Layer Security (TLS) is a secure communication protocol that is used in many secure electronic applications. In order to establish a TLS connection, a client and server engage in a handshake, which usually involves the transmission of digital certificates. In this paper we present a practical speedup of TLS handshakes over bandwidth-constrained, high-latency (i.e. disadvantaged) links by reducing the communication overhead associated with the transmission of digital certificates. This speedup is achieved by deploying two specialized TLS proxies across such links. Working in tandem, one proxy replaces certificate data in packets being sent across the disadvantaged link with a short reference, while the proxy on the other side of the link restores the certificate data in the packet. Local or remote caches supply the certificate data. Our solution preserves the end-to-end security of TLS and is designed to be transparent to third-party applications, and will thus facilitate rapid deployment by removing the need to modify existing installations of TLS clients and TLS servers. Testing shows that this technique can reduce the overall bandwidth used during a handshake by 50% in test emulation and by over 20% of TLS session volume in practice. In addition, it can reduce the time required to establish a secure channel by over 40% across Iridium, a widely used satellite link in practice.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128882627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi packet reception and network coding† 多包接收和网络编码†
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680144
Arman Rezaee, L. Zeger, M. Médard
{"title":"Multi packet reception and network coding†","authors":"Arman Rezaee, L. Zeger, M. Médard","doi":"10.1109/MILCOM.2010.5680144","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680144","url":null,"abstract":"We consider throughput and delay gains resulting from network coding used to complement multi-packet reception in a fully connected network with broadcast traffic. The network is comprised of N nodes, J of which have data packets to be distributed to all other nodes. Owing to half-duplex constraints, a transmitting node is not able to receive data from other transmitting nodes in the same time slot. This requires a node to be back-filled with the information that it is missing. We consider singlepacket reception, (for which network coding alone yields no gain), multi-packet reception without network coding, and combined multi-packet reception and network coding. We show that the initial transmissions and the back-filling process can be greatly sped up through a combination of network coding and multi-packet reception. In particular, we show that MPR capability of 2 will not reduce the total delivery time for packets within a data network unless network coding is used. We also demonstrate that a combination of network coding and multi-packet reception can reduce this time by a factor of m, where m is the MPR capability of the system. We demonstrate that network coding can substitute for some degree of MPR and achieve the same, or almost the same, performance as the higher degree of MPR without network coding. In effect, network coding allows almost double the traffic for a given level of MPR.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132845030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信