{"title":"Resilient Leadership Delegation in Tactical Systems","authors":"Rishabh Dudheria, W. Trappe, N. Minsky","doi":"10.1109/MILCOM.2013.321","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.321","url":null,"abstract":"Transferring the role of leadership between members of a team is an important requirement in tactical operations as it allows an operation to continue in spite of unforeseen events. Delegation, at first glance, appears to be the simple act of giving someone else a right that one possesses. However, this basic function is challenging to implement electronically, and thus there is a need for mechanisms to enforce flexible delegation policies in distributed systems. It has been shown that Law Governed Interaction (LGI) can address these challenges based on the assumption of the trustworthiness of its own enforcement infrastructure. However, to meet the needs of tactical missions, the proposed mechanism should also be resilient to the Byzantine compromise of the infrastructure. Therefore, in this paper we extend the original LGI model to provide containment, guaranteeing that a single Byzantine agent cannot compromise the properties of the system and in general, our approach can withstand the presence of multiple Byzantine agents as long as a correlated pair of agents is not corrupt.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117130608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"JIM-Beam: Jamming-Resilient Wireless Flooding Based on Spatial Randomness","authors":"Jerry T. Chiang, Yih-Chun Hu","doi":"10.1109/MILCOM.2013.86","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.86","url":null,"abstract":"Many network operations rely on the flooding operation to provide long-term performance. Mitigating malicious interference in a flooding network is thus crucial in assuring availability. Recently, several protocols based on uncoordinated spread spectrum have been proposed for secure key establishment and jamming mitigation. In this paper, we present the JIM-Beam flooding protocol that randomizes the orientation of the main lobe of a node's directional antenna so that: (1) the attacker must jam in an inherently narrowband fashion, and (2) JIM-Beam is secure regardless of the attacker's computational and reaction abilities. We perform Monte Carlo simulations and show that JIM-Beam provides substantial performance improvements for packet flooding. We also discuss how combining JIM-Beam with existing antijamming schemes can provide substantial advantages to the combined system.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Approach for WLAN Channel Selection Based on Outage Capacity","authors":"Bahador Amiri, H. Sadjadpour","doi":"10.1109/MILCOM.2013.281","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.281","url":null,"abstract":"This paper introduces a new channel selection metric and its implementation for wireless networks. It is demonstrated that channel utilization and channel quality are two essential performance factors for wireless networks. Then, we define Non-Utilized Outage Capacity (NUOC) as a cross-layer channel metric which provides an intelligent adaptivity between these two performance factors. We also determine steps required for implementation of this new channel selection metric which includes measurement, decision and execution. The proposed mechanism in this paper is easy to implement in IEEE 802.11 standard which makes it very desirable and practical for these networks. Our simulation results show that our new scheme provides better performance compared to other well-known schemes.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121308226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yating Wang, I. Chen, Jin-Hee Cho, Kevin S. Chan, A. Swami
{"title":"Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives","authors":"Yating Wang, I. Chen, Jin-Hee Cho, Kevin S. Chan, A. Swami","doi":"10.1109/MILCOM.2013.314","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.314","url":null,"abstract":"Tactical networks must select service providers to meet service requirements of an operation while facing resource constraints and high security vulnerability. In such an environment nodes provide services to support various operations and/ may request services to support the operations as well. We formulate the problem of service composition and service binding as a multi-objective optimization (MOO) problem, minimizing the service cost, while maximizing the quality of service (QoS) and quality of information (QoI). The MOO problem is essentially a node-to-service assignment problem such that by dynamically formulating service composition, and selecting the right nodes to provide requested services, the network can support concurrent operations while achieving multiple system objectives. We develop a trust-based service composition and binding protocol. We demonstrate that the trust-based scheme outperforms the counterpart non-trust-based scheme. Furthermore, our trust-based scheme can effectively penalize malicious nodes performing self-promotion attacks, thus filtering out malicious nodes and can ultimately lead to high user satisfaction.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126315445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jaedon Park, Eunju Lee, G. Park, Bongsoo Roh, Gi-Wan Yoon
{"title":"Performance Analysis of Asymmetric RF/FSO Dual-Hop Relaying Systems for UAV Applications","authors":"Jaedon Park, Eunju Lee, G. Park, Bongsoo Roh, Gi-Wan Yoon","doi":"10.1109/MILCOM.2013.280","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.280","url":null,"abstract":"In this paper, we analyze the performance of a dual-hop relaying system composed of asymmetric radio frequency (RF) and free-space optics (FSO) (RF/FSO) links. We consider an asymmetric amplify-and-forward (AF) relay which converts the received RF signal into an optical signal using the subcarrier intensity modulation (SIM) scheme. The RF and FSO channels are assumed to experience Rayleigh and Gamma-Gamma fading distributions, respectively. Particularly, we derive the average probability of error as well as ergodic capacity upper bound of the asymmetric RF/FSO dual-hop relaying system, in closed-forms. As a result, the asymmetric RF/FSO relaying system shows slightly worse performance in average probability of error and ergodic capacity upper bound than the RF/RF relaying system in the low SNR. Over the SNR of 20 dB, however, the asymmetric RF/FSO relaying system shows very similar performance in average probability of error and ergodic capacity upper bound to the RF/RF relaying system. The derived mathematical expressions are verified by exactly matching Monte-Carlo simulation results.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127049577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samuel B. Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, M. Gerla, H. Sadjadpour, J. Garcia-Luna-Aceves
{"title":"ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge","authors":"Samuel B. Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, M. Gerla, H. Sadjadpour, J. Garcia-Luna-Aceves","doi":"10.1109/MILCOM.2013.255","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.255","url":null,"abstract":"Situational awareness applications in disaster response and tactical scenarios require efficient communication without a managed infrastructure. In principle, the performance, size, weight, and power of commercial off-the-shelf mobile phones and tablets are sufficient to support such applications, provided that efficient protocols and mechanisms are put in place for the efficient and secure sharing and storage of content among such devices. ICEMAN (Information CEntric Mobile Ad-hoc Networking) is a system that allows applications to request content objects by their attributes, and integrates its API with utility-based dissemination, caching, and network-coding mechanisms to deliver content. ICEMAN is implemented based on the Haggle architecture running in the Android operating system, and supports distributed situational-awareness applications operating in networks subject to severe disruption. Its functionality is described, and performance results of the ICEMAN implementation running in mobile phones and the CORE/EMANE network emulation are presented for several test scenarios.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122171905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of Multipath in Fiber-Wireless (FiWi) Access Network with Network Virtualization","authors":"Shan He, Guochu Shou, Yihong Hu, Zhigang Guo","doi":"10.1109/MILCOM.2013.161","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.161","url":null,"abstract":"Nowadays, multipath routing algorithms and resource distribution strategies of the homogeneous network are the research focus of the Fiber-Wireless (FiWi) network which is the combination of optical subnetwork and wireless subnetwork. However few studies concerned on the efficient way to set up multipath in FiWi network as the affiliation of heterogeneous networks and packet reordering are tangled problems. Separating the Internet service provider (ISP) into two independent sections, nfrastructure provider (InP) and service provider (SP), the proposal of network virtualization provides a potential method to solve this problem. As a starting point, in this paper we apply network virtualization to remove the differences between heterogeneous networks to take FiWi network as a whole. Moreover, we propose a viable way to establish multipath access in the FiWi network through the flexible use of virtual networks (VNs) which can be deployed in the virtual resource manager (VRM). Besides, we present the superior performance of multipath in the FiWi network with network virtualization based on the simulation results by using the multipath scheduling policy Weighted Round Robin (WRR).","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126869488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alex Blyskun, Mark Johnson, Sungill Kim, James Speros, G. Thatte, D. Williamson
{"title":"Improving the SRW Waveform via a Physical Layer Retrofit","authors":"Alex Blyskun, Mark Johnson, Sungill Kim, James Speros, G. Thatte, D. Williamson","doi":"10.1109/MILCOM.2013.74","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.74","url":null,"abstract":"In this paper we show that it is possible to improve performance and provide expanded CONOPS for an existing tactical waveform, namely the soldier radio waveform (SRW), via a physical layer retrofit. We integrated a new proof-of-concept physical layer into existing software defined radio (SDR) hardware and with the existing upper open systems interconnection (OSI) layers of SRW, and then demonstrated improvements with head-to-head field trials. To be specific, the new physical layer offers the following improvements over the baseline physical layer of SRW: (i) broadband throughputs above 6 Mbps, (ii) improved robustness to dynamic airborne and terrestrial multipath channels, and (iii) discontinuous spectra with carrier bandwidth flexibility (enabling operation even where continuous bandwidth is unavailable). The physical layer design is based on TrellisWare's universal air and ground (UAG) physical layer introduced in [1]. In that work, we discuss how the UAG's flexibility in terms of bandwidth usage and interface to upper layers could be leveraged to provide a physical layer retrofit to an existing waveforms. This paper covers the effort to target SRW, an effort which concluded in a demonstration of significant performance enhancements to SRW.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116218965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Grande, M. Sherman, Hua Zhu, M. Kokar, J. Stine
{"title":"IEEE DySPAN 1900.5 Efforts to Support Spectrum Access Standardization","authors":"L. Grande, M. Sherman, Hua Zhu, M. Kokar, J. Stine","doi":"10.1109/MILCOM.2013.296","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.296","url":null,"abstract":"The goal of IEEE DySPAN 1900.5 working group is to support the regulatory community and the wireless industry who rely on solutions for spectrum sharing. This group has created requirements and a flexible architecture for the proliferation of dynamic spectrum access policies. Current work is focused on defining a policy language and ontology as well as modeling spectrum consumption in an effort to create a suite of standards that support the formal representation of spectrum policy and usage in radio networks. Collaboration in standardizing solutions will improve the success and efficiency for all stakeholders in this ever changing environment. This paper will provide an overview of the current activities of the 1900.5 working group including its two current standards projects, P1900.5.1 and P1900.5.2 and interactions with regulatory bodies.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122764096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Scherber, P. Bidigare, Richard O'Donnell, M. Rebholz, M. Oyarzun, Charlie Obranovich, William Kulp, Daniel Chang, D. Brown
{"title":"Coherent Distributed Techniques for Tactical Radio Networks: Enabling Long Range Communications with Reduced Size, Weight, Power and Cost","authors":"D. Scherber, P. Bidigare, Richard O'Donnell, M. Rebholz, M. Oyarzun, Charlie Obranovich, William Kulp, Daniel Chang, D. Brown","doi":"10.1109/MILCOM.2013.117","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.117","url":null,"abstract":"This paper addresses the use of distributed coherent communication techniques across a wireless network of tactical radios to enable extended-range communications. Conventional tactical communication systems providing multi-kilometer terrestrial ranges utilize large and costly manpack or vehicular-mount radios. In this paper we discuss techniques for distributing the transmit functions coherently across a network of small, low-power squad radios to achieve similar ranges. We present a testbed implementation of these techniques and over-the-air demonstrations of coherent distributed transmit communications at 3.5 km standoff and 1.25Mbps data rates using radios operating with under 20dBm of transmit power each.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114492861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}