MILCOM 2009 - 2009 IEEE Military Communications Conference最新文献

筛选
英文 中文
Analysis of the operation and design of handheld terminals (HHT) within MUOS network MUOS网络中手持终端(HHT)的运行分析与设计
MILCOM 2009 - 2009 IEEE Military Communications Conference Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5379960
J. Cheah, Patrick Browne
{"title":"Analysis of the operation and design of handheld terminals (HHT) within MUOS network","authors":"J. Cheah, Patrick Browne","doi":"10.1109/MILCOM.2009.5379960","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379960","url":null,"abstract":"Input to JTRS' future increment products may present an opportunity to address the design and the operational needs for MUOS handheld terminals. In terms of capacity, bit rate, coverage, availability and portability, MUOS handheld terminals provide significantly enhanced warfighter capability over the existing UHF Satellite Communication (SATCOM). In addition, it fulfills the needs for the hereto unavailable net centric communication link for the warfighter on-the-move (OTM) operation. The Size, Weight and Power (SWaP) design to meet the MUOS handheld terminal requirements present a notable physical layer technology challenge. This paper attempts to delineate these issues, and provides the results of a notional design analysis.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114352303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Challenges and alternatives in building a Secure Information Sharing Environment through a community-driven Cross Domain infrastructure 通过社区驱动的跨域基础设施构建安全信息共享环境的挑战和替代方案
MILCOM 2009 - 2009 IEEE Military Communications Conference Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5379902
B. Farroha, D. Farroha, M. Whitfield
{"title":"Challenges and alternatives in building a Secure Information Sharing Environment through a community-driven Cross Domain infrastructure","authors":"B. Farroha, D. Farroha, M. Whitfield","doi":"10.1109/MILCOM.2009.5379902","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379902","url":null,"abstract":"The challenges of building a Secure Information Sharing Environment are based on increased need to share data across agencies and security domains. The need has grown to also include sharing secure data with allied and coalition forces while protecting specific key parts of the information due to legal and ethical issues. There is an increasing need to automate the process where data is sanitized and shared in a seamless manner to empower our warfighters and commercial entities to increase the security and enhance services to the community. The obstacle is that information is generally stored flat files in multiple security domains and there are laws that prohibits sharing the whole data, but allows access to the majority of items. The task of architecting systems that enables Cross Domain (CD) capabilities is a significant undertaking that requires an understanding of data systems, technologies, governance, and cultures. The UCDMO is charged with analyzing the DoD/IC community needs, the current technologies and the future technologies that are at various phases of development to facilitate Assured Information Sharing (AIS) goals. The long term goal is to build a SOA based Enterprise that enables the community to use the diverse resources across various domains to deliver the information to the intended destination.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117150552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
OSSIE-based GRA testbed 基于ossi的GRA测试平台
MILCOM 2009 - 2009 IEEE Military Communications Conference Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5380082
E. Redding, T. Rittenbach, H. Satake, C. Dietrich
{"title":"OSSIE-based GRA testbed","authors":"E. Redding, T. Rittenbach, H. Satake, C. Dietrich","doi":"10.1109/MILCOM.2009.5380082","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5380082","url":null,"abstract":"This purpose of this paper is to document an architectural validation approach for the Government Reference Architecture (GRA) for SATCOM terminals. The approach integrates the Virginia Tech OSSIE SCA Core Framework with a UML model of the GRA, coupled with low-fidelity models of the SATCOM components. This approach uses the Rhapsody tool to implement the GRA-based testbed from documentation through executable code generation. The end result is a system that demonstrates the portability of the GRA while simultaneously validating the GRA against a representative system. Furthermore, the system demonstrates the reduced development time required for architecture extensions through the incorporation of existing projects and automated code generation.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116297385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Relay selection from a battery energy efficiency perspective 从电池能效的角度选择继电器
MILCOM 2009 - 2009 IEEE Military Communications Conference Pub Date : 2009-10-18 DOI: 10.1109/TCOMM.2011.041111.100128
Wenshu Zhang, Dongliang Duan, Liuqing Yang
{"title":"Relay selection from a battery energy efficiency perspective","authors":"Wenshu Zhang, Dongliang Duan, Liuqing Yang","doi":"10.1109/TCOMM.2011.041111.100128","DOIUrl":"https://doi.org/10.1109/TCOMM.2011.041111.100128","url":null,"abstract":"Relay network is proposed as a means of improving the error performance and energy efficiency of the wireless networks. Inspired by the battery power efficiency (BPE) analysis in [1], relay selection from the battery energy efficiency perspective turns out to be an interesting topic. Under the general network setup which integrates typical transmission and reception modules, we adopt the realistic nonlinear battery model, extend the BPE results in [1] to relay network over Rayleigh fading channels, investigate the optimum and suboptimum energy allocation solutions for the relaying transmission, and finally establish the relay selection criterion from the battery energy efficiency point of view. Both the theoretical derivation and numerical results show that, subject to the same average bit error rate (BER) performance constraint, relaying does not necessarily increase the system energy efficiency, but is a possible alternative of the direct transmission depending on the relaying situation. Additionally, we prove that the two relaying protocols Decode and Forward (DF) and Amplify and Forward (AF) are equivalent for relay selection over Rayleigh fading channels at high SNR.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"55 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123555381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Multi-domain Trust Management in variable-threat environments - a user-centric model 可变威胁环境下的多域信任管理——以用户为中心的模型
MILCOM 2009 - 2009 IEEE Military Communications Conference Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5379712
M. Burmester, P. Das, Martin Edwards, Alec Yasinsac
{"title":"Multi-domain Trust Management in variable-threat environments - a user-centric model","authors":"M. Burmester, P. Das, Martin Edwards, Alec Yasinsac","doi":"10.1109/MILCOM.2009.5379712","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379712","url":null,"abstract":"Trust Management (TM) systems are trust infrastructures that support authorization for security-critical actions in decentralized environments. In this paper we present a user-centric view to address trust management as it impacts the unanticipated user and/or user behavior for multi-domain applications. This protection can be tuned to deal with users who may be responsible for an elevated threat level, and builds upon a resource-centric architecture. Our model is suitable for variable-threat environments and allows for temporary adjustments of trust levels. The expectation is to enable a Trust Management Agent to determine appropriateness of the unanticipated user or behavior, and reverse restrictions without compromising actions that took place during such periods —we term this, rollback-access. We argue that a rollback-access capability is an essential feature for security-critical applications, and is appropriate for today's military and intelligence community coalitions as they execute their particular missions in the Global War on Terrorism.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122082889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scale Time Offset Robust Modulation for code division multiaccess 码分多址的尺度时偏鲁棒调制
MILCOM 2009 - 2009 IEEE Military Communications Conference Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5379815
D. Jenkins
{"title":"Scale Time Offset Robust Modulation for code division multiaccess","authors":"D. Jenkins","doi":"10.1109/MILCOM.2009.5379815","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379815","url":null,"abstract":"This paper introduces and analyzes Scale-Time Offset Robust Modulation (STORM) for use in code division multiaccess (CDMA) systems using spread quadrature phase shift keying (QPSK) to increase the capacity of a CDMA network. Since current commercial CDMA systems have dedicated spectrum, the capacity is primarily limited by the interference of other CDMA users; thus, power control and multiuser interference mitigation are the focus of CDMA capacity enhancements. Although extensive research in these areas continues, significant, robust, practical capacity enhancements have been difficult to realize for existing commercial CDMA systems such as Wideband-CDMA (WCDMA). STORM offers potential to practically enhance the capacity of CDMA systems by robustly realizing more rapid power control and more efficient multiuser interference mitigation.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124073826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comparitive analysis of Army waveforms & commercial wireless protocols at the PHY/MAC layers 陆军波形与商用无线协议在PHY/MAC层的比较分析
MILCOM 2009 - 2009 IEEE Military Communications Conference Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5379996
R. Reddy, D. McKeon
{"title":"A comparitive analysis of Army waveforms & commercial wireless protocols at the PHY/MAC layers","authors":"R. Reddy, D. McKeon","doi":"10.1109/MILCOM.2009.5379996","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379996","url":null,"abstract":"This paper will present a comparison of the basic resource definition in an OFDMA MAC/PHY layers for WiMAX and the TDMA/OFDM MAC/PHY. The majority of current radios in development for the US Army use TDMA/OFDM. This comparison will be conducted by defining and discussing the basic unit of system resource, e.g. the “slot”. Following the protocol comparison, some simulation results comparing the performance of both systems will be provided.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126124022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attack scenario recognition through heterogeneous event stream analysis 通过异构事件流分析识别攻击场景
MILCOM 2009 - 2009 IEEE Military Communications Conference Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5379763
S. Mathew, S. Upadhyaya
{"title":"Attack scenario recognition through heterogeneous event stream analysis","authors":"S. Mathew, S. Upadhyaya","doi":"10.1109/MILCOM.2009.5379763","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379763","url":null,"abstract":"Stealthy, goal-oriented multistage attacks are difficult to detect since they often consist of specific attack steps that do not cause significant variations in the statistical distributions of data streams. We present an approach for attack scenario detection and recognition that is based on analyzing data streams from multiple heterogeneous sensors. Events captured from these sensors are used to generate high-dimensional state vectors that characterize overall system-wide activity. Monitoring the time series of these state vectors through Principal Component Analysis forms the basis of an anomaly detection technique for real-time scenario detection. Data traffic from a real network that emulates a military intelligence network is used to test and validate this approach. Results indicate that our approach is both effective and has low computational requirements, making it a candidate for practical implementation.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128576698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhanced base-to-user satellite Gain Variation Reduction algorithm for MUOS 基于MUOS的增强基对用户卫星增益变化减小算法
MILCOM 2009 - 2009 IEEE Military Communications Conference Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5379772
Xiaowei Yang, D. Bossler, J. Sadowsky
{"title":"Enhanced base-to-user satellite Gain Variation Reduction algorithm for MUOS","authors":"Xiaowei Yang, D. Bossler, J. Sadowsky","doi":"10.1109/MILCOM.2009.5379772","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379772","url":null,"abstract":"Based on Universal Mobile Telecommunications System (UMTS) Wideband Code Division Multiple Access (WCDMA) technology, the Mobile User Objective System (MUOS) provides a wide range of wireless telecommunications services to the war fighter over geosynchronous satellites. As MUOS is a multiple beam system, it is of paramount importance for the User Entry (UE) to select the best beam, which in turn requires accurate transmit power from the satellite. To minimize the satellite path gain uncertainty from the base station to the UE, the Enhanced Gain Variation Reduction (EGVR) algorithm is proposed. Implemented on the basis of the measurements of the received signal code power (RSCP) of the pilot channel from the UE and the measurements of the received signal code power at the terrestrial base station, the EGVR process generates the transmission power estimate and integrates it into the overall gain adjust system to keep the transmission power levels as desired. The features of the algorithm include the weighted gain adjusts generated from the estimation error, appropriate timers to control the measurement flow, and differential measurements to eliminate the common errors between satellite beams. The preliminary study shows that the EGVR can reduce the power uncertainty from 2.4 dB to 0.4 dB, in addition to reducing any differential errors encountered. With the blending of the telemetry feedback into the algorithm, it can make the transmit power uncertainty even smaller.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128715280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architecture of a management system for wideband SATCOM enterprise terminal facility elements 宽带卫星通信企业终端设备要素管理系统的体系结构
MILCOM 2009 - 2009 IEEE Military Communications Conference Pub Date : 2009-10-18 DOI: 10.1109/MILCOM.2009.5379835
T. Blackman, J. Hand, D. Fritz, Anthony Hodges
{"title":"Architecture of a management system for wideband SATCOM enterprise terminal facility elements","authors":"T. Blackman, J. Hand, D. Fritz, Anthony Hodges","doi":"10.1109/MILCOM.2009.5379835","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379835","url":null,"abstract":"Management of the devices in a Wideband SATCOM enterprise earth terminal facility (ETF) is currently fragmented among multiple systems, and some of these legacy systems provide only limited functionality. This paper describes the architecture of a consolidated system to manage the elements of an ETF. Such a system can offer a number of benefits. First, the ETF management system can provide a consolidated, flexible “northbound” interface to one or more higher-level, centralized management systems, replacing legacy monitoring and control orderwires and bringing the flexibility of the Internet Protocol to extend richer management visibility outside of the terminal facility while avoiding the use of expensive SATCOM resources for management overhead when terrestrial IP paths are available This interface will be built using Service-Oriented Architecture (SOA) principles and web services technologies, in accordance with current practice within the community of stakeholders in the system. The ETF management system can offer local operations staff a more complete operational picture of the terminal facilities and the services supported by the facility. The proposed management system will replace some of the multiple existing management systems, and interface with others. Finally, the system can locally store the administrative state of devices in the facility, allowing restoral of device configuration in case of replacement or repair. The locally-stored administrative state may also be imported or exported to the management system. This system state “cache” feature can serve as a basis for a future policy-based management capability.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129316298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信