{"title":"A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of Things","authors":"Bryan N. Groves, Cong Pu","doi":"10.1109/MILCOM47813.2019.9021050","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021050","url":null,"abstract":"As an essential ingredient of Internet of Things (IoT), IPv6-based Low Power and Lossy Networks (LLNs) largely consisting of various resource-constrained devices are expeditiously proliferating and playing an important role in the realization of ubiquitous computing and communication infrastructure. In order to provide efficient and reliable communication between resource-constrained devices and connect them to the Internet, a novel routing protocol for LLNs, a.k.a. RPL, has been proposed. However, due to wide distribution, openness, and instinctive resource constraints of IoT devices, IoT and its applications become an ideal target for cyber attacks. Thus, investigating potential attacks against IoT-related routing protocol is a top priority to improve the security of the future IoT systems. In this paper, we propose a Gini index-based countermeasure to effectively detect and mitigate sybil attack in RPL- based LLNs, where the malicious node multicasts an excessive number of DODAG Information Solicitation (DIS) messages with different fictitious identities to cause the legitimate nodes to restart the Trickle algorithm frequently and broadcast a large number of DODAG Information Object (DIO) messages to quickly drain the limited energy resource of legitimate nodes. We conduct extensive simulation experiments for performance evaluation and comparison using OMNeT++, and the simulation results show that the proposed countermeasure can accurately detect and effectively mitigate sybil attack, indicating a viable approach against cyber attack in the Internet of Things.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114688793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Gobbi, J. Hay, Nathaniel A Tanner, Larry Lipke, Scot Miller, J. A. Kirk
{"title":"Wideband Automated Planning Tool (WAPT) Prototype Development","authors":"R. Gobbi, J. Hay, Nathaniel A Tanner, Larry Lipke, Scot Miller, J. A. Kirk","doi":"10.1109/MILCOM47813.2019.9020751","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020751","url":null,"abstract":"Major focus in this software prototype development is the application of automated algorithmic techniques to the planning of communications services on military and commercial satellite systems. The emphasis to date is on priority-based military systems, but the flexibility to accommodate commercial systems with varied service access mechanisms is built in. The overall goal is to decrease scenario planning times from days-to-weeks to minutes on standard, but, capable laptop computers. This level of performance has been met in developmental testing, and will enable resilient operations of satellite networks by supporting fast reallocation of terminal resources. The types of algorithms employed depend on the application. For service planning when terminal endpoints are within antenna beam coverage areas, a deterministic linear programming algorithm is employed. When beam coverage is not provided for new services, i.e., when many uncovered terminal endpoints exist, a probabilistic approach using a genetic algorithm is employed to heuristically search for antenna beam configurations meeting prioritized access requests. Alternatively, when lower volumes of new, uncovered endpoints exist, specialized beam adjustment algorithms are applied. Additionally, a framework has been developed to enable operations in an enterprise environment with automated service access request (SAR) processes, which further advances resilient satellite network operations.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116058737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-preserving Crowd-sensing for Dynamic Spectrum Access","authors":"Erald Troja, Joshua Gitter","doi":"10.1109/MILCOM47813.2019.9020713","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020713","url":null,"abstract":"Dynamic spectrum access (DSA) is a well established paradigm which addresses the spectrum shortage caused by the rapid growth of connected wireless devices. In contrast to the legacy fixed spectrum allocation policies, DSA allows license-exempt users to access the licensed spectrum bands when not in use by their respective owners. While the database-driven DSA model is well suited for the TV white-space databases, other more fluid spectrum opportunities, such as the NOAA spectrum bands, remain exploreable only by either a solitary cyclostationary or multinodal cooperative signal detection and classification. While the multinodal, cooperative method offers improved signal detection and classification over solitary cyclostationary sensing, it does not provide any means of preserving the user's location privacy. Furthermore, both sensing methods suffer from very large delay due in part from the quiet periods they need to undergo in order to identify incumbent signal. To this end, we propose a location privacy-preserving crowd-sensing scheme for the DSA paradigm. Our proposed method provides location privacy for the crowd-sensing workers by leveraging the ElGamal cryptographic primitive, and it provides query obfuscation for the querying user through the $k{-}$anonymity paradigm. Through extensive experimentation, we show that our method is efficient for a realistic deployment.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124671182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianguo Jiang, Jiuming Chen, Tianbo Gu, K. Choo, Chao Liu, Min Yu, Wei-qing Huang, P. Mohapatra
{"title":"Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation","authors":"Jianguo Jiang, Jiuming Chen, Tianbo Gu, K. Choo, Chao Liu, Min Yu, Wei-qing Huang, P. Mohapatra","doi":"10.1109/MILCOM47813.2019.9020931","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020931","url":null,"abstract":"Existing insider threat detection models and frameworks generally focus on characterizing and detecting malicious insiders, for example by fusing behavioral analysis, machine learning, psychological characters, management measures, etc. However, it remains challenging to design a practical insider threat detection scheme that can be efficiently implemented and deployed in a real-world system. For example, existing approaches focus on extracting features from user behavioral activities but they lack in-depth correlation and decision making for suspected alerts; thus, resulting in high false positives and low detection accuracy. In this work, we propose a novel online insider threat detection system, Warder, which leverages diverse feature dimensions (using neural language processing) and fuses content and behavior features to create a user's daily profile to facilitate threat detection. Besides, hypergraph-based threat scenario feature tree is designed to correlate suspicious users' activities with threat scenarios to further screen the users. In practice, Warder can also be constantly updated using newly discovered features and threat scenarios. We evaluate the performance of Warder using the public CMU CERT dataset, as well as that of approaches from the Oxford group and CMU group. Findings from the evaluation demonstrate that Warder outperforms the other two competing approaches.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123896830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christopher Simpkin, I. Taylor, A. Preece, G. Bent, Richard J. Tomsett, R. Ganti, O. Worthington
{"title":"Coalition C3 Information Exchange Using Binary Symbolic Vectors","authors":"Christopher Simpkin, I. Taylor, A. Preece, G. Bent, Richard J. Tomsett, R. Ganti, O. Worthington","doi":"10.1109/MILCOM47813.2019.9020950","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020950","url":null,"abstract":"Communicating information between entities requires there to be a common understanding of the language and the concepts being exchanged. Where information has to be rapidly conveyed, or where the communications are limited, the use of specialized language or symbols is often used but this requires the various parties to know the precise meaning of the terminology (i.e. the parties can correctly interpret the language or symbols used). In this paper we propose a new potential approach for information exchange that makes use of binary symbolic vectors to semantically represent the information to be exchanged. We show how such vector representations can be used to semantically convey large amounts information between coalition partners in a compact representation that can be interpreted at different levels of semantic abstraction. In this paper we illustrate the concept by showing how a complex text (in this case Shakespeare's play Hamlet) can be represented using symbolic vectors. We discuss how such representations can be efficiently communicated between coalition partners and how this can significantly reduce the communications requirements. We develop the concept to illustrate how symbolic vectors could be used to perform command and control functions in distributed decentralized coalition operations.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125541886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laura Poplawski Ma, S. Zabele, C. Merlin, G. Lauer, S. Dabideen
{"title":"QFloor: Queue Delay Reduction in Dynamic Backpressure Networks","authors":"Laura Poplawski Ma, S. Zabele, C. Merlin, G. Lauer, S. Dabideen","doi":"10.1109/MILCOM47813.2019.9020717","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020717","url":null,"abstract":"QFloor addresses the high queuing delays inherent in backpressure forwarding, including in dynamic or oscillatory networks. QFloor is purely local and reactionary: it adds placeholder bytes to the advertised queue values with the explicit goal of keeping the minimum queue depth at a static pre-configured number of bytes. QFloor deals with queue depth dynamics by looking at the queue depth over a dynamically-sized observation window of time, adding placeholder bytes if that minimum depth is too high, and removing placeholder bytes whenever the backpressure algorithm dictates a dequeue from a queue with only placeholder bytes. Experimentation in a fully-implemented backpressure forwarding system shows that QFloor can reduce the end-to-end latency by more than 90% even in a network with only one and two-hop paths.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128633077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When Autonomous Intelligent Goodware Will Fight Autonomous Intelligent Malware: A Possible Future of Cyber Defense","authors":"P. Théron, A. Kott","doi":"10.1109/MILCOM47813.2019.9021038","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021038","url":null,"abstract":"In the coming years, the future of military combat will include, on one hand, artificial intelligence-optimized complex command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) and networks and, on the other hand, autonomous intelligent Things fighting autonomous intelligent Things at a fast pace. Under this perspective, enemy forces will seek to disable or disturb our autonomous Things and our complex infrastructures and systems. Autonomy, scale and complexity in our defense systems will trigger new cyber-attack strategies, and autonomous intelligent malware (AIM) will be part of the picture. Should these cyber-attacks succeed while human operators remain unaware or unable to react fast enough due to the speed, scale or complexity of the mission, systems or attacks, missions would fail, our networks and C4ISR would be heavily disrupted, and command and control would be disabled. New cyber-defense doctrines and technologies are therefore required. Autonomous cyber defense (ACyD) is a new field of research and technology driven by the defense sector in anticipation of such threats to future military infrastructures, systems and operations. It will be implemented via swarms of autonomous intelligent cyber-defense agents (AICAs) that will fight AIM within our networks and systems. This paper presents this cyber-defense technology of the future, the current state of the art in this field and its main challenges. First, we review the rationale of the ACyD concept and its associated AICA technology. Then, we present the current research results from NATO's IST-152 Research Task Group on the AICA Reference Architecture. We then develop the 12 main technological challenges that must be resolved in the coming years, besides ethical and political issues.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116001486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Augmentation for Blind Signal Classification","authors":"Peng Wang, Manuel M. Vindiola","doi":"10.1109/MILCOM47813.2019.9020842","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020842","url":null,"abstract":"The Army Rapid Capabilities Office (RCO) sponsored a Blind Signal Classification Competition seeking Artificial Intelligence/Machine Learning (AI/ML) algorithms to automatically identify the modulation schemes of RF signal from complex-valued IQ (in-phase quadrature) symbols. Our team, dubbed “Deep Dreamers”, participated in the competition and placed 3rd out of 42 active teams across industry, academia, and government. Deep learning methods such as CNN, Residual Neural Network (ResNet), and Long Short-Term Memory (LSTM) are the fundamental neural network models we used to develop a multi-class classifier. The key to our success was to use ensemble learning to average the outputs of multiple diverse classifiers. In this following study, we apply Data Augmentation (DA) to the data set in order to further increase the performance of our models. The goal of data augmentation is to push the decision boundary learned from the data set toward a better decision boundary by adding more meaningful data points. An effective data augmentation method for RF signals is to add white Gaussian noise to the existing RF signals. Individual DL models and ensemble learning methods such as blending trained over the augmented data set significantly improve the prediction accuracies for weak RF signals and achieve comparable results to the two leading teams in the competition.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122384147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Very High Throughput Internet of Things Networks with $K$ access points and $K$ devices","authors":"Anil Kumar Yerrapragada, B. Kelley","doi":"10.1109/MILCOM47813.2019.9020725","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020725","url":null,"abstract":"This paper presents an Internet of Things (IoT) model with extremely high multi-user capacity. The IoT model has $K$ access points communicating with $K$ devices in an all-to-all configuration, generally referred to as $K$ -User MIMO. To the author's awareness, the combination of multi-user IoT within a $K$ -User MIMO framework has not been previously analyzed. The IoT $K$ -User MIMO networks described improve upon prior multi-user capacity results through the application of a new beamformer modality. This paper also derives a new theorem for the upper bound $K$ -user MIMO capacity as a function of $K$ and illustrates its application in realistic scenarios. The analytical results are compared with 5G Massive MIMO with an equivalent number of network antennas. Under this framework, an upper bound multi-user capacity of 2500 bits/sec/Hz for a $K$ = 7 IoT network in Rayleigh fading is illustrated. This represents a 10 $X$ higher upper bound capacity compared to 5G Massive MIMO. Finally, realistic $K$ = 3 network performance is analyzed in Rayleigh Fading environments with LTE Typical Urban power delay profiles. The cumulative distribution of the capacity is presented for 100, 500, and 1000 meter cell geometries.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122697471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phase Noise, SATCOM and MIL-STD-188-165B","authors":"L. Gonzalez, J. Rippon, J. Besse","doi":"10.1109/MILCOM47813.2019.9020818","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020818","url":null,"abstract":"The purpose of this paper is to describe how Phase Noise effects SHF Satellite Communications (SATCOM), and the consequences of the current specifications in MIL-STD-188-165B. This paper leverages the definitions codified in IEEE Std 1139™ − 2008 to show that the impact of Phase Noise on an M-ary phase shift key (PSK) carrier cannot be treated as additive white Gaussian Noise (AWGN) when SATCOM links have realistic energy- per-symbol to noise power spectral density ratio $E_{s}/N_{0}$.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127117528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}