{"title":"Analysis of the operation and design of handheld terminals (HHT) within MUOS network","authors":"J. Cheah, Patrick Browne","doi":"10.1109/MILCOM.2009.5379960","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379960","url":null,"abstract":"Input to JTRS' future increment products may present an opportunity to address the design and the operational needs for MUOS handheld terminals. In terms of capacity, bit rate, coverage, availability and portability, MUOS handheld terminals provide significantly enhanced warfighter capability over the existing UHF Satellite Communication (SATCOM). In addition, it fulfills the needs for the hereto unavailable net centric communication link for the warfighter on-the-move (OTM) operation. The Size, Weight and Power (SWaP) design to meet the MUOS handheld terminal requirements present a notable physical layer technology challenge. This paper attempts to delineate these issues, and provides the results of a notional design analysis.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114352303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges and alternatives in building a Secure Information Sharing Environment through a community-driven Cross Domain infrastructure","authors":"B. Farroha, D. Farroha, M. Whitfield","doi":"10.1109/MILCOM.2009.5379902","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379902","url":null,"abstract":"The challenges of building a Secure Information Sharing Environment are based on increased need to share data across agencies and security domains. The need has grown to also include sharing secure data with allied and coalition forces while protecting specific key parts of the information due to legal and ethical issues. There is an increasing need to automate the process where data is sanitized and shared in a seamless manner to empower our warfighters and commercial entities to increase the security and enhance services to the community. The obstacle is that information is generally stored flat files in multiple security domains and there are laws that prohibits sharing the whole data, but allows access to the majority of items. The task of architecting systems that enables Cross Domain (CD) capabilities is a significant undertaking that requires an understanding of data systems, technologies, governance, and cultures. The UCDMO is charged with analyzing the DoD/IC community needs, the current technologies and the future technologies that are at various phases of development to facilitate Assured Information Sharing (AIS) goals. The long term goal is to build a SOA based Enterprise that enables the community to use the diverse resources across various domains to deliver the information to the intended destination.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117150552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OSSIE-based GRA testbed","authors":"E. Redding, T. Rittenbach, H. Satake, C. Dietrich","doi":"10.1109/MILCOM.2009.5380082","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5380082","url":null,"abstract":"This purpose of this paper is to document an architectural validation approach for the Government Reference Architecture (GRA) for SATCOM terminals. The approach integrates the Virginia Tech OSSIE SCA Core Framework with a UML model of the GRA, coupled with low-fidelity models of the SATCOM components. This approach uses the Rhapsody tool to implement the GRA-based testbed from documentation through executable code generation. The end result is a system that demonstrates the portability of the GRA while simultaneously validating the GRA against a representative system. Furthermore, the system demonstrates the reduced development time required for architecture extensions through the incorporation of existing projects and automated code generation.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116297385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relay selection from a battery energy efficiency perspective","authors":"Wenshu Zhang, Dongliang Duan, Liuqing Yang","doi":"10.1109/TCOMM.2011.041111.100128","DOIUrl":"https://doi.org/10.1109/TCOMM.2011.041111.100128","url":null,"abstract":"Relay network is proposed as a means of improving the error performance and energy efficiency of the wireless networks. Inspired by the battery power efficiency (BPE) analysis in [1], relay selection from the battery energy efficiency perspective turns out to be an interesting topic. Under the general network setup which integrates typical transmission and reception modules, we adopt the realistic nonlinear battery model, extend the BPE results in [1] to relay network over Rayleigh fading channels, investigate the optimum and suboptimum energy allocation solutions for the relaying transmission, and finally establish the relay selection criterion from the battery energy efficiency point of view. Both the theoretical derivation and numerical results show that, subject to the same average bit error rate (BER) performance constraint, relaying does not necessarily increase the system energy efficiency, but is a possible alternative of the direct transmission depending on the relaying situation. Additionally, we prove that the two relaying protocols Decode and Forward (DF) and Amplify and Forward (AF) are equivalent for relay selection over Rayleigh fading channels at high SNR.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"55 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123555381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Burmester, P. Das, Martin Edwards, Alec Yasinsac
{"title":"Multi-domain Trust Management in variable-threat environments - a user-centric model","authors":"M. Burmester, P. Das, Martin Edwards, Alec Yasinsac","doi":"10.1109/MILCOM.2009.5379712","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379712","url":null,"abstract":"Trust Management (TM) systems are trust infrastructures that support authorization for security-critical actions in decentralized environments. In this paper we present a user-centric view to address trust management as it impacts the unanticipated user and/or user behavior for multi-domain applications. This protection can be tuned to deal with users who may be responsible for an elevated threat level, and builds upon a resource-centric architecture. Our model is suitable for variable-threat environments and allows for temporary adjustments of trust levels. The expectation is to enable a Trust Management Agent to determine appropriateness of the unanticipated user or behavior, and reverse restrictions without compromising actions that took place during such periods —we term this, rollback-access. We argue that a rollback-access capability is an essential feature for security-critical applications, and is appropriate for today's military and intelligence community coalitions as they execute their particular missions in the Global War on Terrorism.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122082889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scale Time Offset Robust Modulation for code division multiaccess","authors":"D. Jenkins","doi":"10.1109/MILCOM.2009.5379815","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379815","url":null,"abstract":"This paper introduces and analyzes Scale-Time Offset Robust Modulation (STORM) for use in code division multiaccess (CDMA) systems using spread quadrature phase shift keying (QPSK) to increase the capacity of a CDMA network. Since current commercial CDMA systems have dedicated spectrum, the capacity is primarily limited by the interference of other CDMA users; thus, power control and multiuser interference mitigation are the focus of CDMA capacity enhancements. Although extensive research in these areas continues, significant, robust, practical capacity enhancements have been difficult to realize for existing commercial CDMA systems such as Wideband-CDMA (WCDMA). STORM offers potential to practically enhance the capacity of CDMA systems by robustly realizing more rapid power control and more efficient multiuser interference mitigation.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124073826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparitive analysis of Army waveforms & commercial wireless protocols at the PHY/MAC layers","authors":"R. Reddy, D. McKeon","doi":"10.1109/MILCOM.2009.5379996","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379996","url":null,"abstract":"This paper will present a comparison of the basic resource definition in an OFDMA MAC/PHY layers for WiMAX and the TDMA/OFDM MAC/PHY. The majority of current radios in development for the US Army use TDMA/OFDM. This comparison will be conducted by defining and discussing the basic unit of system resource, e.g. the “slot”. Following the protocol comparison, some simulation results comparing the performance of both systems will be provided.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126124022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attack scenario recognition through heterogeneous event stream analysis","authors":"S. Mathew, S. Upadhyaya","doi":"10.1109/MILCOM.2009.5379763","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379763","url":null,"abstract":"Stealthy, goal-oriented multistage attacks are difficult to detect since they often consist of specific attack steps that do not cause significant variations in the statistical distributions of data streams. We present an approach for attack scenario detection and recognition that is based on analyzing data streams from multiple heterogeneous sensors. Events captured from these sensors are used to generate high-dimensional state vectors that characterize overall system-wide activity. Monitoring the time series of these state vectors through Principal Component Analysis forms the basis of an anomaly detection technique for real-time scenario detection. Data traffic from a real network that emulates a military intelligence network is used to test and validate this approach. Results indicate that our approach is both effective and has low computational requirements, making it a candidate for practical implementation.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128576698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced base-to-user satellite Gain Variation Reduction algorithm for MUOS","authors":"Xiaowei Yang, D. Bossler, J. Sadowsky","doi":"10.1109/MILCOM.2009.5379772","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379772","url":null,"abstract":"Based on Universal Mobile Telecommunications System (UMTS) Wideband Code Division Multiple Access (WCDMA) technology, the Mobile User Objective System (MUOS) provides a wide range of wireless telecommunications services to the war fighter over geosynchronous satellites. As MUOS is a multiple beam system, it is of paramount importance for the User Entry (UE) to select the best beam, which in turn requires accurate transmit power from the satellite. To minimize the satellite path gain uncertainty from the base station to the UE, the Enhanced Gain Variation Reduction (EGVR) algorithm is proposed. Implemented on the basis of the measurements of the received signal code power (RSCP) of the pilot channel from the UE and the measurements of the received signal code power at the terrestrial base station, the EGVR process generates the transmission power estimate and integrates it into the overall gain adjust system to keep the transmission power levels as desired. The features of the algorithm include the weighted gain adjusts generated from the estimation error, appropriate timers to control the measurement flow, and differential measurements to eliminate the common errors between satellite beams. The preliminary study shows that the EGVR can reduce the power uncertainty from 2.4 dB to 0.4 dB, in addition to reducing any differential errors encountered. With the blending of the telemetry feedback into the algorithm, it can make the transmit power uncertainty even smaller.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128715280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecture of a management system for wideband SATCOM enterprise terminal facility elements","authors":"T. Blackman, J. Hand, D. Fritz, Anthony Hodges","doi":"10.1109/MILCOM.2009.5379835","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379835","url":null,"abstract":"Management of the devices in a Wideband SATCOM enterprise earth terminal facility (ETF) is currently fragmented among multiple systems, and some of these legacy systems provide only limited functionality. This paper describes the architecture of a consolidated system to manage the elements of an ETF. Such a system can offer a number of benefits. First, the ETF management system can provide a consolidated, flexible “northbound” interface to one or more higher-level, centralized management systems, replacing legacy monitoring and control orderwires and bringing the flexibility of the Internet Protocol to extend richer management visibility outside of the terminal facility while avoiding the use of expensive SATCOM resources for management overhead when terrestrial IP paths are available This interface will be built using Service-Oriented Architecture (SOA) principles and web services technologies, in accordance with current practice within the community of stakeholders in the system. The ETF management system can offer local operations staff a more complete operational picture of the terminal facilities and the services supported by the facility. The proposed management system will replace some of the multiple existing management systems, and interface with others. Finally, the system can locally store the administrative state of devices in the facility, allowing restoral of device configuration in case of replacement or repair. The locally-stored administrative state may also be imported or exported to the management system. This system state “cache” feature can serve as a basis for a future policy-based management capability.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129316298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}