M. Striki, K. Manousakis, D. Kindred, D. Sterne, G. Lawler, N. Ivanic, G. Tran
{"title":"Quantifying resiliency and detection latency of intrusion detection structures","authors":"M. Striki, K. Manousakis, D. Kindred, D. Sterne, G. Lawler, N. Ivanic, G. Tran","doi":"10.1109/MILCOM.2009.5379997","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379997","url":null,"abstract":"A network intrusion detection (ID) system detects malicious behavior by analyzing network traffic. Malicious behavior may target the disruption of communications, infrastructure services, and applications. A number of ID techniques proposed for dynamic wireless networks (e.g., sensor, ad-hoc and mobile ad-hoc networks) are based on the creation of an overlay hierarchy or other structure to organize the collection and processing of ID data. The particular structure chosen may significantly impact the ID system's performance with respect to network overhead, responsiveness, scalability, detection latency, resiliency to failures, and other factors. In this paper, we propose the formal definition and quantification of resiliency and detection latency. Specifically, we introduce analytical expressions that map ID structures to the metric space of real numbers. We define this mapping for a) various types of tree structures that have been proposed previously for dynamic wireless systems and b) a hypercube structure that presents promising resiliency characteristics. This analysis reveals important tradeoffs among the various ID structures under consideration.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122053412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint power, rate, and channel allocation in multilink (cognitive) radio system","authors":"P. Larsson, Jonas Kronander","doi":"10.1109/MILCOM.2009.5379724","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379724","url":null,"abstract":"We consider multi-constrained power, rate and channel allocation crafted for low power consumption, delay tolerant traffic, and under interfering link conditions that may be used in a cognitive radio system. Specifically, an iterative distributed algorithm, based on a sum-power constrained sum-rate maximization with upper (and lower) per user and channel power and rate constraints, as well as upper per user sum-power and sum-rate constraints is developed. The feasibility and performance of the algorithm is demonstrated by simulation in a cellular system. Simulations show that the multiple constraints are handled while improving the sum-rate vs. sum-power relative an “equal power adaptive rate” RRM approach.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129605838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiantao Sun, L. Cimini, L. Greenstein, Douglas S. Chany, Jan Kruysy
{"title":"Coordinated zero-forcing beamforming in multipoint MIMO networks for backhaul applications","authors":"Xiantao Sun, L. Cimini, L. Greenstein, Douglas S. Chany, Jan Kruysy","doi":"10.1109/MILCOM.2009.5379904","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379904","url":null,"abstract":"The capacity of a multipoint MIMO wireless network is interference-limited. In order to increase the system capacity, MIMO precoding at the transmitter and decoding at the receiver can be employed so that interference among different nodes is eliminated or suppressed. In this paper, we propose precoding/decoding techniques based on an iterative zero-forcing approach. By utilizing the extra degrees of freedom provided by multiple transmit and receive antennas, this algorithm achieves good signal-to-interference-plus-noise ratio (SINR) and fast convergence. The sum-rate capacity and convergence behavior of this algorithm are studied and the possible application to MIMO backhaul networks is discussed.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128257189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical time-domain model for radio over free space optical military communication systems under turbulence channels","authors":"W. Lim, Tae-Sik Cho, Kiseon Kim, Changho Yun","doi":"10.1109/MILCOM.2009.5379930","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379930","url":null,"abstract":"In this paper, an analytical time-domain model is presented to analyze the radio over free space optical (RoFSO) systems under two turbulence channels, the log-normal and the exponential channel. This analytical model uses general cases of a dual-drive Mach-Zehnder modulator (DD-MZM) and photodetector (PD) for typical optical double sideband (ODSB) and single sideband (OSSB) signals under turbulence channels. This results in output current after a PD as a function of the summation of each frequency component in time domain. Additionally, we derive a closed-form average BER performance under turbulence channels. The numerical result shows that as the scintillation index increases from 0.25 to 0.75 under the log-normal channel, the average BER decreases almost 5.6 dB at the signal power of −30 dBm for ODSB.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124692291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asynchronous SNR estimation of PSK/QAM modulated signals in flat-fading channels","authors":"W. Headley, C. da Silva","doi":"10.1109/MILCOM.2009.5379976","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379976","url":null,"abstract":"The majority of prior work in signal-to-noise ratio estimation makes fairly strong assumptions concerning a priori knowledge of the channel state and signal. For instance, many of these estimators assume knowledge of the modulation scheme of the signal, or even complete knowledge of the transmitted set of modulated data symbols (typically through the use of training sequences). Even more universally, perfect time synchronization between the transmitter and receiver is assumed. The purpose of this paper is to remove some of these commonly stated assumptions through the presentation of a novel asynchronous, noncoherent, and non-data-aided method-of-moments based signal-to-noise ratio estimator for PSK/QAM modulated signals in flat-fading channels. This estimator requires no a priori knowledge of the channel gain, phase, and delay, nor the specific modulation scheme (PSK or QAM) and modulation order used.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127026032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shameem Ahmed, Thadpong Pongthawornkamol, K. Nahrstedt, M. Caesar, Guijun Wang
{"title":"Topology-aware Optimal Task Allocation for publish/subscribe-based mission critical environment","authors":"Shameem Ahmed, Thadpong Pongthawornkamol, K. Nahrstedt, M. Caesar, Guijun Wang","doi":"10.1109/MILCOM.2009.5379968","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379968","url":null,"abstract":"A mission critical environment (MCE) consists of error-prone, highly variable, and highly rate limited communication channels. Paradoxically, this substantially increases the need to perform optimal task allocation (OTA), while at the same time making it much harder to perform OTA efficiently. To simplify the problem, we consider OTA for publish/subscribe-based MCE since it has unique characteristics such as high level publish/subscribe node and task differentiation and high scalability. In this work, we formulate the OTA problem for publish/subscribe-based MCEs, propose an architectural framework and distributed communication protocols emphasizing the unique challenges of MCE. We adopt well-known Hungarian method and Rectangular Assignment algorithm to solve OTA problem in publish/subscribe-based MCE in polynomial time. Through simulations, we evaluate the performance of our proposed system for multiple publish/subscribe scenarios. Our results indicate that our proposed solutions achieve the goal of OTA in highly dynamic environments, with low processing time and communication overhead.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124212235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Zafar, Z. H. Mir, S. Shams, M. Ikram, W. A. Baig, Ki-Hyung Kim, S. Yoo
{"title":"On improved relay nodes placement in Two-Tiered Wireless Sensor Networks","authors":"B. Zafar, Z. H. Mir, S. Shams, M. Ikram, W. A. Baig, Ki-Hyung Kim, S. Yoo","doi":"10.1109/MILCOM.2009.5379784","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379784","url":null,"abstract":"In Wireless Sensor Networks (WSNs) energy is a scarce resource which must be utilized efficiently in order to enhance the network lifetime. Two-Tiered Wireless Sensor Network (TT-WSN) architecture is proposed to improve the lifetime longevity of the network. In TT-WSN the lower tier consists of sensor nodes (SN), which are mainly responsible for sensing the environment and forwarding the data to its one hop neighbor relay node (RN). While the upper tier is constituent of more power affluent relay nodes (RNs), which deliver the data to the base station through potentially multiple connected relay nodes in a multi-hop fashion. As relay nodes are more expensive, it is therefore desirable to deploy a minimum number of such nodes so that every sensor node has at least one relay node as its one-hop neighbor and all the relay nodes form a connected network. Unfortunately the problem of finding such a minimum set of relay nodes is NP-Hard. Thus an approximation based algorithm is required to solve the problem in polynomial time. Existing solutions are either very complex or less efficient. In this paper we present a fast approximation algorithm to solve the problem in polynomial time. The performance of the algorithm is compared with the existing algorithms through simulations. The extensive simulation results show that our algorithm outperforms the existing algorithms in terms of number of relay nodes deployed.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114064613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Herald Beljour, L. Coryell, T. Fung, J. Gallagher, R. Hoffmann, G. Michael, J. Shields
{"title":"Army SATCOM on the move technology initiatives","authors":"Herald Beljour, L. Coryell, T. Fung, J. Gallagher, R. Hoffmann, G. Michael, J. Shields","doi":"10.1109/MILCOM.2009.5379775","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379775","url":null,"abstract":"The Army is increasingly reliant on Beyond Line of Sight (BLOS) communications due to a non-contiguous battlefield. The Warfighter also requires mobility and network connectivity to provide the needed level of near real-time, tactically-relevant information. On-the-move (OTM) space based communications forms a critical layer in supporting these essential networking capabilities.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121486219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Range estimation of tactical radio waveforms using Link Budget Analysis","authors":"Junghwan Kim, Ayoade Oguntade, M. Oza, Suil Kim","doi":"10.1109/MILCOM.2009.5380029","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5380029","url":null,"abstract":"Multiband tactical communication modems must employ different waveforms to meet various demands in quality and nature of data. Range maximization, high data throughput and power conservation requirements are usually not fulfilled by a single waveform. To effectively deliver tactical multimedia data including coded audio, text, video, map and navigation information using radio, multiple choice of frequency bands exist. These include: HF, VHF and UHF. However, along with the effective delivery of quality data, the maximization of transmission range under hostile propagation environments - especially under terrain blockage in ground-to-ground (GTG) communication scenario - is of utmost importance. This paper discusses the results of Link Budget Analysis performed for the estimation of maximum delivery range using variety of data rates for three typically different waveforms - High Frequency Waveform (HFW), Very High Frequency Waveform (VHFW) and OFDM based Wideband Network Waveform (WNW). Center frequencies of 27 MHz, 60 MHz, and 500 MHz respectively were used for the simulations. Results show that HFW produces the longest range, followed by VHFW and the WNW - which delivered the highest data rate.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121567855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Initial power adjustment and link adaptation from direct-sequence spread-spectrum demodulator statistics","authors":"S. Boyd, M. Pursley","doi":"10.1109/MILCOM.2009.5380130","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5380130","url":null,"abstract":"Statistics obtained during demodulation are used in a direct-sequence spread-spectrum packet radio network to govern the adjustment of transmitter power within the first few packets of a session. The statistics are also employed by an adaptive transmission protocol to select the modulation parameters and the rate of the error-control code for each packet. The power-adjustment protocol uses the statistics to ensure that the transmitter power level is high enough to satisfy the signal strength requirements at the receiver and low enough to prevent unnecessary interference to nearby radios. We describe a protocol for which modulation and coding parameters are adapted to achieve the most efficient combination for the given channel conditions. We evaluate the performance of each protocol for several channels. The protocols are not given any information about the type of channel or the channel parameters, yet they are able to use the demodulator statistics to efficiently set the initial power level and adapt transmissions throughout the session.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121572382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}