{"title":"Utility Proportional Fairness Resource Allocation with Carrier Aggregation in 4G-LTE","authors":"Haya Shajaiah, A. Abdel-Hadi, T. Clancy","doi":"10.1109/MILCOM.2013.77","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.77","url":null,"abstract":"In this paper, we consider a resource allocation optimization problem with carrier aggregation in fourth generation long term evolution (4G-LTE). In our proposed model, each user equipment (UE) is assigned a utility function that represents the application type running on the UE. Our objective is to allocate the resources from two carriers to each user based on its application that is represented by the utility function assigned to that user. We consider two groups of users, one with elastic traffic and the other with inelastic traffic. Each user is guaranteed a minimum resource allocation. In addition, a priority resource allocation is given to the UEs running adaptive real time applications. We prove that the optimal rate allocated to each UE by the single carrier resource allocation optimization problem is equivalent to the aggregated optimal rates allocated to the same user by the primary and secondary carriers when their total resources is equivalent to the single carrier resources. Our goal is to guarantee a minimum quality of service (QoS) that varies based on the user application type. We present a carrier aggregation rate allocation algorithm to allocate two carriers resources optimally among users. Finally we present simulation results with the carrier aggregation rate allocation algorithm.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130755985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bear -- A Resilient Kernel for Tactical Missions","authors":"Colin Nichols, M. Kanter, Stephen Taylor","doi":"10.1109/MILCOM.2013.240","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.240","url":null,"abstract":"This paper describes Bear, a clean-slate, resilient operating system design intended to support military applications on scalable multi-processors and in embedded systems. The system combines a minimalist micro-kernel with an associated hypervisor, and presents only a 120Kbyte attack surface on 64-bit x86 blade servers. MULTICS-like protections are strictly enforced through extended page tables and Intel VTx extensions. The design utilizes multiple, overlapping, nondeterministic techniques to continually re-establish trust. This is achieved by dynamically regenerating core components of the system. The cumulative effect of this design style is to increase attacker workload by denying surveillance and persistence over time-scales consistent with tactical operations. Unlike traditional approaches to computer security, no attempt is made to detect intrusions: instead, we focus on continually validating, preserving, and re-establishing the ability of a mission to proceed.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116563483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Zeng, Hongmei Deng, Ke Meng, S. Luo, Xiang Yu, A. Mody, M. Sherman, Jude Muller, Zhenxin Wang
{"title":"From Spectrum Agility to Network Agility: Proactive and Adaptive Reconfiguration for Reliable Communication in Tactical Networks","authors":"H. Zeng, Hongmei Deng, Ke Meng, S. Luo, Xiang Yu, A. Mody, M. Sherman, Jude Muller, Zhenxin Wang","doi":"10.1109/MILCOM.2013.282","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.282","url":null,"abstract":"In tactical networks reliable communication is a vital military issue that needs to be resolved. A large number of research efforts are currently focused on providing radios with spectrum agility. However, in many cases, spectrum agility is not enough to achieve reliable communications in tactical networks. Instead, mission success often requires network agility -- cognition across the protocol layers for environmental awareness and autonomous reconfiguration -- which is still an unsolved challenge to our best knowledge, and needs to be addressed. Toward this, we have developed a proactive and adaptive cross-layer reconfiguration (PACR) framework for autonomous network adaptation through network monitoring, proactive prediction, network performance characterization, root-cause analysis, and cross-layer negotiation. Although PACR is generically applicable to any radio network, for validation it has been prototyped and demonstrated on two specific networks -- a commercial off-the-shelf (COTS) hardware testbed using IEEE 802.11 WiFi devices, and a military radio testbed using Warfighter Information Network-Tactical (WIN-T) Local Area Waveform (LAW) radios. Through tests and demonstrations, it has been shown that our solution provides cross-layer adaptation demonstrating spectrum as well as network agility, resulting in mission success through cognitive networking.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128163735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Belief Propagation Based Spectrum Sensing Subject to Dynamic Primary User Activities: Phantom of Quickest Detection","authors":"Yifan Wang, Husheng Li, Lijun Qian","doi":"10.1109/MILCOM.2013.204","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.204","url":null,"abstract":"Cognitive radio is one of the enabling technologies considered for the next generation communications systems for many mission-critical applications, such as in the Joint Tactical Radio System (JTRS) program and the DARPA xG program. In cognitive radio systems, cooperative spectrum sensing is one of the key techniques that can improve the reliability and agility. In this study, a framework integrating quickest detection with belief propagation (BP) is applied to the scenario of temporally and spatially varying primary user activities. Using numerical simulations, system performance measured by false alarm (FA) rate, missed detection (MD) rate and average detection delay is obtained for different setups. The results show that the proposed scheme achieves better detection error rate and detection delay tradeoff.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132952303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Melissa S Gresham, Josipa Pilipovic, E. Drucker, Larry Lafferty
{"title":"S-6 Associate: A Unified Approach to Building and Managing Network Operating Environment within the Context of Tactical Missions and Other Warfighting Functions","authors":"Melissa S Gresham, Josipa Pilipovic, E. Drucker, Larry Lafferty","doi":"10.1109/MILCOM.2013.257","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.257","url":null,"abstract":"A data fusion software capability called the S-6 Associate is being developed at Aberdeen Proving Ground inside the Space and Terrestrial Communications Directorate at the Communications-Electronics Research, Development and Engineering Center. This intelligent cognitive software will assist the battalion (BN) S-6 and his staff manage complex tactical communications networks while increasing the networks' agility, efficiency, and responsiveness, whether a unit is stationary or on the move. This intelligent tool leverages proven technology to help soldiers manage existing network resources more efficiently, including soldiers without in-depth network administration skills.1 Once fielded, the S-6 Associate will enable battalions to build a Network Common Operating Picture (N-COP) and perform NetOPS monitoring and management under conditions of rapid changes in tactical movement. In addition, it will cooperate with WIN-T NMS to ensure communications from division down to company/platoon level. N-COP will allow commanders to see how bandwidth is used for mission-critical information and how network failures affect the current mission.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132136650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Sensor Network Energy Use While Tracking Secure Area Intrusions","authors":"R. Hartwell","doi":"10.1109/MILCOM.2013.287","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.287","url":null,"abstract":"Understanding energy use in a wireless sensor network is the most important aspect of these cheaply deployed sensor nets. This paper models and calculates the energy consumption of a network, as an intrusion into a secured area is tracked. The network is composed of a randomly distributed array of wireless sensors, which can simulate multiple protocols for relaying detection information. Increasing the number of cluster heads within the sensor distribution area as well as increasing the transmission range of individual nodes, directly reduces energy consumed while tracking an intrusion. However, increasing sensor fidelity increases the energy consumed while tracking an intrusion. The models created to simulate a network, its protocols and data transfers, and a penetrating agent, proved to be an effective toolset to test network conditions and determine energy costs.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Geographical Analysis of Highly Deployable Troposcatter Systems Performance","authors":"Luis Bastos, H. Wietgrefe","doi":"10.1109/MILCOM.2013.118","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.118","url":null,"abstract":"Transportable troposcatter systems are a valid beyond line-of-sight transmission medium in support of NATO Expeditionary Operations, particularly in providing augmentation and/or alternative in-theatre links between deployed headquarters. In cooperation with industry, NATO Communications and Information Agency (NCI Agency) has been conducting research and experimentation in highly deployable troposcatter systems. This activity has validated the suitability of these systems for military applications but also put in evidence the significant dependence of the performance of a given BLOS link with the applicable climate zone. In 2012, the Radiocommunication Bureau of the ITU (ITU-R) simultaneously issued a new version of the P.617 Recommendation (P.617-2) and a new recommendation, P.2001. Recommendation P.617-2 provides, inter alia, a reclassification of the climate zones applicable to troposcatter propagation analyses and, most notably and for the first time, a world map defining the geographical application of the various climate zones. P.2001 offers a general-purpose wide-range terrestrial propagation model in the frequency range 30 MHz to 50 GHz, with a troposcatter sub-method. This paper provides a comparative analysis of the new troposcatter propagation model and methods with the ones previously available. It then presents a theoretical geographical analysis of expected troposcatter link performance using previously identified reference troposcatter links and commercial implementations of deployable troposcatter systems. This paper provides the military communications community with an analysis of the new troposcatter model and a long-awaited geographical distribution of troposcatter link performance.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"19 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133847262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexibility and Extensibilty in the Design of Spacecraft Communications Systems","authors":"M. Koets, J. Alvarez","doi":"10.1109/MILCOM.2013.306","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.306","url":null,"abstract":"Southwest Research Institute® (SwRI®) has developed a wireless transceiver that incorporates a flexible and extensible design and implementation strategy, enabling deployment of the radio to numerous roles for space missions. The transceiver was architected such that the software and the hardware could be quickly repurposed based on mission need. The software is written in ANSI standard and object oriented C++, facilitating modularity and functional reuse. The control and processing hardware is reprogrammable, allowing for the same hardware to be used in numerous applications. Although the radio frequency hardware is inherently narrow band in its conversion architecture, careful consideration to the implementation allows for quick, low cost rework to migrate between frequency bands and bandwidths. While the transceiver was originally intended for CubeSat telemetry, tracking, and command, it has now been extended in design for micro-satellite space-ground communication at S-band, micro-satellite inter-satellite crosslink communication at S-band, and small-satellite inter-satellite crosslink at Ka-band. An example of rapid repurposing of the transceiver from a Ka-band crosslink to an S-band crosslink shows the benefits of modularity and hardware/software that is architected for extensibility.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122355828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Site-Specific MIMO Channel Simulator for Hilly and Mountainous Environments","authors":"Jonathan S. Lu, H. Bertoni","doi":"10.1109/MILCOM.2013.135","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.135","url":null,"abstract":"This paper presents a real-time site-specific MIMO channel simulator for communication links in rural environments. This simulator first predicts the delay, angle of arrival and departure, and amplitude of the individual multipath arrivals (direct, ground reflected, terrain diffracted, and terrain scattered) for a specified multiple antenna receiver and transmitter link. The predicted multipath characteristics are then used to compute the tapped delay line coefficients and/or frequency responses of the channel between each transmitter antenna and receiver antenna pair, which are the outputs of the simulator. To demonstrate the use of this simulator, Monte Carlo simulations of SISO and MIMO channel capacity for many databases are performed. Conclusions are drawn on the relationship between capacity, terrain roughness and other channel characteristics.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122373650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Scalability in Tactical Ground Radio Networks by Using Relay Nodes","authors":"Zachary Bunting, A. Narula-Tam, E. Modiano","doi":"10.1109/MILCOM.2013.222","DOIUrl":"https://doi.org/10.1109/MILCOM.2013.222","url":null,"abstract":"Scalability is an issue for ground tactical radio networks, as increasing numbers of nodes and flows compete for the capacity of each link. The introduction of a relay node allows additional routes for traffic flows. Greater benefit is achieved by fixing the relay node at a higher elevation to allow it to broadcast to all other nodes simultaneously, thereby reducing the number of hops packets must travel. We use a combination of linear programming (LP) and novel bounds on the achievable network performance to investigate the benefits of such a relay node. We show that a relay node provides moderate improvement under an all-to-all unicast traffic model and more substantial improvement for broadcast traffic patterns.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128649614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}