{"title":"Terminal transmit adaptation for optimal link availability","authors":"Ludong Wang, B. Jezek","doi":"10.1109/MILCOM.2009.5379865","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379865","url":null,"abstract":"The techniques of Terminal transmit adaptation are critical for achieving maximal channel throughput when the link loss exhibits large variation. In this paper, some technical issues regarding transmit power control and mode adaptation in satellite communication (SATCOM) systems are addressed. The transmit adaptation is explored in terms of optimizing the link availability. The analysis extends the common assumption of white Gaussian noise channel to include the case of color noise interference, which is practical in applications as bandwidth resource becomes less sufficient to the demands. Based on this extended assumption, the need of differentiated power adaptation criteria is demonstrated. A closed-loop power control and mode adaptation scheme is subsequently derived to meet that operational need. In addition, a generic case of power-controlled carriers operating among non-power-controlled carriers is analyzed and an approach for mitigating the interference impact is given. The presented analysis and designs are intended for user terminals to accommodate potentially large link variation that exists in both commercial and military Ka-band. They are even more critical for military EHF satellite SATCOM systems.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132935725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Myong H. Kang, Margery Li, B. Montrose, Amitabh Khashnobish, S. Elliott, M. Bell, Steven D. Pieper
{"title":"Overview of the security architecture of the Comprehensive Maritime Awareness system","authors":"Myong H. Kang, Margery Li, B. Montrose, Amitabh Khashnobish, S. Elliott, M. Bell, Steven D. Pieper","doi":"10.1109/MILCOM.2009.5379809","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379809","url":null,"abstract":"The Comprehensive Maritime Awareness (CMA) system tries to identify anomalous behavior and potential threats associated with the global maritime domain that could impact the United States and coalition partners' security. It analyzes data from multiple sources that impose different data handling requirements, to discover potential threats. Security architecture and mechanisms are essential enablers for data sharing. More data stewards will share their data when they feel secure with the data protection mechanism of the system that will host their data. Critical technologies for data protection and access mediation for CMA are Oracle label security (OLS) and attribute-based access control (ABAC) based on federated identity management. Federated identity providers use security assertion markup language (SAML) 2.0 as a protocol to exchange user identity and attributes. This paper provides a high-level overview of the CMA security architecture. It explains how different security mechanisms seamlessly work together to protect data and mediate access.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134027030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kevin C. Lee, Adam Piechowicz, M. Gerla, A. Tiwari, A. Ganguli, D. Krzysiak
{"title":"Delay tolerant Mobility Aware Routing/Mobility Dissemination Protocol for the airborne network","authors":"Kevin C. Lee, Adam Piechowicz, M. Gerla, A. Tiwari, A. Ganguli, D. Krzysiak","doi":"10.1109/MILCOM.2009.5379888","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379888","url":null,"abstract":"Despite “airborne network (AN) topology design” and careful planning of AN trajectories, unexpected disruptions (from hardware failures to changes in mission requirements and hostile attacks) may cause nodes not to connect to one another directly or indirectly either because they are out of one another's range or because nodes do not meet one another according to their preplanned trajectories. Since an end-to-end path within the AN is not always guaranteed, packets have to be delivered in a delay-tolerant fashion, namely, some intermediate nodes will need to buffer packets during times of disconnectivity. In our earlier work we developed Mobility Aware Routing Protocol and Mobility Dissemination Protocol (MARP/MDP) that used preplanned trajectories of airborne nodes to make intelligent routing decisions preemptively. In this paper we present a delay-tolerant strategy (MARP/MDP+DTN) to predict the minimum end-to-end delay and obtain the corresponding path. In addition, MARP/MDP+DTN accounts for local queueing (MARP/MDP+DTN+QC) to minimize congestion and further improves end-to-end delay with the positive side effect of load-balancing. Simulation results have shown an improvement of 52% in packet delivery ratio in MARP/MDP+DTN. MARP/MDP+DTN+QC also exhibits extremely short latency, about 90% reduction from MARP/MDP+DTN in highly congested network. Moreover, MARP+DTN+QC balances local traffic 67% better than MARP+DTN in high traffic load scenarios.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"67 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131776412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity propagation in N-tier systems","authors":"Anil C Patel, M. McRoberts, Melissa Crenshaw","doi":"10.1109/MILCOM.2009.5379926","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379926","url":null,"abstract":"While SOA promises great benefits in productivity and flexibility, the tools for securing these systems continue to lag behind. The ideal of SOA security is to provide trusted containers and frameworks that enforce policies established during deployment, and remove security logic and policy from application code completely. Standards such as WS-Security address some of the issues, but enterprise systems don't stop and start with web services. In an N-tier the user is authenticated at the client platform, and this authentication will ultimately determine access to resources in back-end data stores. The challenge is to create a framework for the end-to-end propagation of user credentials across N-tiers, which doesn't rely on custom security code within applications. This paper will describe a working prototype framework that propagates user credentials through web application, web service and database tiers, and applies label-based access control (LBAC) policies within the database. The paper will also outline known gaps in web and SOA standards, and directions for future work.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134442711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Template design and propagation gain for multipath UWB channels with per-path frequency-dependent distortion","authors":"Neil Mehta, A. Duel-Hallen, H. Hallen","doi":"10.1109/MILCOM.2009.5380076","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5380076","url":null,"abstract":"Due to the large bandwidth allocation, Ultra-Wideband (UWB) channels exhibit frequency-dependent distortion of individual multipath components. This per-path distortion is particularly significant in outdoor UWB applications, where line-of-sight (LOS) or non-distorted reflected signals might not be available at the receiver, and the dominant propagation mechanisms involve shadowing (diffraction) or reflection by small objects (e.g. signs or lamp-posts). In this paper, a physical model is employed in the design of robust correlation receiver templates for outdoor single and multipath impulse radio channels characterized by per-path distortion. It is demonstrated that receivers which employ a set of partial derivatives templates are near-optimal in terms of energy capture while the simple transmit pulse template provides excellent complexity-performance trade-offs for most practical scenarios. Moreover, iterative receiver structures that maintain the energy capture in the presence of overlapping multipath components are investigated. Finally, a large gap between the propagation gains of the transmit pulses in the lower and upper bands of the FCC spectrum is characterized for several propagation mechanisms.*","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"15 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133042555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructing underwater sensor based barriers using distributed auctions","authors":"S. Barr, Benyuan Liu, Jie Wang","doi":"10.1109/MILCOM.2009.5379969","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379969","url":null,"abstract":"Technology advancement has allowed submarines to evade standard sonar detection. A viable alternative is to place magnetic or acoustic sensors in close proximity to possible underwater pathways of submarines. This approach may require deploying large-scale underwater sensor networks to form 3-dimensional barriers.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115098642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WiMAX at traffic-demanding electronic warfare air exercise ELITE 2008","authors":"Luis Bastos, H. Wietgrefe","doi":"10.1109/MILCOM.2009.5379891","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379891","url":null,"abstract":"The Hybrid Extension Module (HEM) Prototype implements a NATO C3 Agency (NC3A) concept for future Deployable Headquarter communications infrastructure in support of NATO Response Force (NRF) and Expeditionary Operations. It makes use of a hybrid transmission system composed of IP-converged wireless (WiMAX) and wired (fiber optics) solutions. In 2008, NC3A improved many aspects of the HEM Prototype and deployed it to the international electronic warfare air exercise ELITE 2008. This exercise posed a particularly demanding scenario involving significant asymmetric real-time traffic, long-range obstructed radio links, and a polluted radio frequency environment, for which the HEM Prototype was not initially tailored. The focus of the experiment was on WiMAX performance from different angles: radio performance, interference susceptibility, broadband capacity, and configuration and deployment flexibility. This paper introduces the scenario and challenges posed by ELITE 2008. It addresses the improvements performed to the HEM Prototype to match the operational requirements. It then describes the actual deployment to the ELITE exercise area and focuses on the most relevant tests performed to the WiMAX system. Results obtained put in evidence the validity of WiMAX as a wireless transmission technology for deployable headquarter communications, due to its flexibility in adapting to demanding military scenarios, its resistance to interference, and its remarkable radio performance under sub-optimal conditions.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115360637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated planning for remote penetration testing","authors":"Lloyd G. Greenwald, R. Shanley","doi":"10.1109/MILCOM.2009.5379852","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379852","url":null,"abstract":"In this work we consider the problem of automatically designing a penetration test plan that can be executed remotely, without prior knowledge of the target machine or network. We develop a methodology for generating and executing remote testing plans that takes into account the uncertainty of using remote tools both to gain knowledge of the system and to provide the penetration testing actions. Our solution provides automated generation of multi-step penetration test plans that are robust to uncertainty during execution. We tackle this problem by making use of modeling techniques from partially observable Markov decision processes (POMDPs). We automate this process by taking advantage of efficient solutions for solving POMDPs, and further, automatically derive these models through automated access to vulnerability databases such as the national vulnerabilities database (NVD). We demonstrate our implemented solution on a series of example problems.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115374963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Poylisher, C. Serban, John Lee, Te Lu, R. Chadha, C. Chiang, K. Jakubowski, R. Orlando
{"title":"Virtual Ad hoc Network testbeds for high fidelity testing of tactical network applications","authors":"A. Poylisher, C. Serban, John Lee, Te Lu, R. Chadha, C. Chiang, K. Jakubowski, R. Orlando","doi":"10.1109/MILCOM.2009.5379721","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379721","url":null,"abstract":"Testing of applications for tactical MANETs poses a special technical challenge due to the difficulty of conducting experiments in an ad hoc network environment at a scale larger than a few nodes. One approach is to conduct experiments in a testbed that can imitate a tactical MANET to the highest feasible level of fidelity. For applications, this is achieved by executing unmodified software under real operating systems and realistic hardware resources. For the network, it is achieved by using an emulated/simulated network that behaves like a real MANET in some/all layers of the protocol stack. In this paper, we describe the current state of Virtual Ad hoc Network (VAN) Testbed1 technologies for constructing testbeds that allow testing unmodified tactical applications over simulated MANETs, including network-aware applications. On the application side, we employ Xen-based virtualization to provide high fildelity of application execution environment, testbed resource scalability and manageability. On the network side, we employ user-provided simulation models and enable seamless integration of the hosts that run the software under test with virtual nodes in a simulated network. Our goal is to enable running experiments over large-scale (500–1000 nodes) MANETs using VAN testbeds.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114861247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using flow control to improve performance of Demand-Assignment Multiple Access systems with performance enhancing proxies","authors":"P. Feighery, K. Scott, D. Goldsmith","doi":"10.1109/MILCOM.2009.5379828","DOIUrl":"https://doi.org/10.1109/MILCOM.2009.5379828","url":null,"abstract":"It is widely known that TCP's congestion control algorithm can cause it to under-perform when round trip times and error rates are high. Performance Enhancing Proxies (PEPs) can improve performance by breaking end-to-end TCP connections and using a separate, tuned transport protocol to transit ‘stressed’ links. While PEPs can be tuned to work well when a single pair of PEPs bracket a fixed-rate link, these systems can be difficult to tune when the stressed link has variable bandwidth as in a Demand Assigned Multiple Access (DAMA) scheme, when multiple encrypted enclaves must share the outgoing bandwidth, or when the round trip times vary widely. Previous efforts have shown the effect of using a modified version of the TCP Vegas congestion control algorithm in Time Division Multiple Access (TDMA) DAMA systems where bandwidth is allocated based on current queue length and where multiple enclaves must share the outgoing bandwidth. This paper examines the performance of a DAMA based system when the TCP PEP uses flow control between the PEP and the DAMA access terminal. This improves performance by removing an adverse interaction between PEP congestion control and DAMA channel access protocols. We show the effects of employing proxies when the modem provides direct feedback about the amount of data it is willing to consume.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116279920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}