F. T. Johnsen, Z. Zieliński, K. Wrona, Niranjan Suri, Christoph Fuchs, Manas Pradhan, J. Furtak, Bogdan Vasilache, V. Pellegrini, Michal Dyk, M. Marks, Mateusz Krzyszton
{"title":"Application of IoT in military operations in a smart city","authors":"F. T. Johnsen, Z. Zieliński, K. Wrona, Niranjan Suri, Christoph Fuchs, Manas Pradhan, J. Furtak, Bogdan Vasilache, V. Pellegrini, Michal Dyk, M. Marks, Mateusz Krzyszton","doi":"10.1109/ICMCIS.2018.8398690","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398690","url":null,"abstract":"This paper addresses a scenario where a medium sized smart city in an Alliance nation has been struck by disaster. A small, multi-national force is deployed for disaster relief. Situational awareness (SA) is important so that resources, including personnel and supplies, may be prioritized to have the most impact and help those in the most need. This SA can be significantly enhanced via information obtained from Internet of Things (IoT) devices, especially in a smart city environment. This paper, which presents work performed by the NATO IST-147 “Military Applications of Internet of Things” group, explores the potential to exploit smart city IoT capabilities in military operations.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124816900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salvador Llopis, Javier Hingant, I. Pérez, M. Esteve, Federico Carvajal, W. Mees, Thibault Debatty
{"title":"A comparative analysis of visualisation techniques to achieve cyber situational awareness in the military","authors":"Salvador Llopis, Javier Hingant, I. Pérez, M. Esteve, Federico Carvajal, W. Mees, Thibault Debatty","doi":"10.1109/ICMCIS.2018.8398693","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398693","url":null,"abstract":"Starting from a common fictional scenario, simulated data sources and a set of measurements will feed two different visualization techniques with the aim to make a comparative analysis. Both visualization techniques described in this paper use the operational picture concept, deemed as the most appropriate tool for military commanders and their staff to achieve cyber situational awareness and to understand the cyber defence implications in operations. Cyber Common Operational Picture (CyCOP) is a tool developed by Universitat Politècnica de València in collaboration with the Spanish Ministry of Defence whose objective is to generate the Cyber Hybrid Situational Awareness (CyHSA). Royal Military Academy in Belgium developed a 3D Operational Picture able to display mission critical elements intuitively using a priori defined domain-knowledge. A comparative analysis will assist researchers in their way to progress solutions and implementation aspects.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126024670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applicability of risk analysis methods to risk-aware routing in software-defined networks","authors":"Sebastian Szwaczyk, K. Wrona, M. Amanowicz","doi":"10.1109/ICMCIS.2018.8398688","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398688","url":null,"abstract":"Managing risk related to operation of Communication and Information Systems (CIS) is nowadays a very important objective of every organization. Incorrectly performed, risk assessment may lead to critical errors in the entire risk management process and expose an organization to unacceptable operational risk. Unfortunately, most of the currently adopted risk assessment approaches are only marginally applicable to modern IT systems. In this paper we evaluate suitability of various existing risk analysis approaches in support of risk management process for operation of Software Defined Network (SDN). Our objective is to identify risk analysis methods, which are most suitable for supporting risk-aware routing in SDN. From a large set of available risk analysis methods, we select methods that can be potentially used for risk-aware routing system in SDN and compare their suitability for this task. We conclude that the most suitable for our use case are risk assessment methods based on Bayesian networks.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125623308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep learning NATO document labels: A preliminary investigation","authors":"M. Richter, Michael Street, P. Lenk","doi":"10.1109/ICMCIS.2018.8398703","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398703","url":null,"abstract":"This paper provides an introductory, mostly nontechnical exposition of recent Deep Learning concepts, as relevant to NATO information processing requirements. A baseline case of learning confidentiality classification rules for NATO documents is described, originally performed by applying classical machine learning methods. In the course of the investigation described in this paper, the classical approaches have been complemented by Deep Learning experiments. These experiments shed some light on the potential advantages of using Deep Learning approaches for NATO document processing and beyond.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133260207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Full-duplex radio technology for simultaneously detecting and preventing improvised explosive device activation","authors":"T. Riihonen, D. Korpi, Matias Turunen, M. Valkama","doi":"10.1109/ICMCIS.2018.8398707","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398707","url":null,"abstract":"Originating from civilian/commercial wireless networks, the progressive concept of same frequency simultaneous transmission and reception (SF-STAR), a.k.a. in-band full-duplex operation, has high potential also at the future battlefield. The prospects of a military full-duplex radio (MFDR) are not limited to enhancing the spectral efficiency of tactical communications, which would already be a significant advancement considering the universal congestion of electromagnetic spectrum. Perhaps even more importantly, armed forces could gain a major technical advantage by employing multifunction MFDRs that are capable of jointly conducting signals intelligence, electronic warfare, and tactical communications owing to their SF-STAR capability. This study focuses on one specific promising application, where a radio transceiver performs spectrum monitoring and signal surveillance for potential hostile transmissions when simultaneously performing an electronic attack against opposing forces' receivers at the same frequency band. In particular, we demonstrate by experiments in a laboratory environment that the MFDR technology can be successfully used for detecting an attempt to control remotely an improvised explosive device while also preventing its activation by transmitting a jamming signal.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115294704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graph-based APT detection","authors":"Thibault Debatty, W. Mees, Thomas Gilon","doi":"10.1109/ICMCIS.2018.8398708","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398708","url":null,"abstract":"In this paper we propose a new algorithm to detect Advanced Persistent Threats (APT's) that relies on a graph model of HTTP traffic. We also implement a complete detection system with a web interface that allows to interactively analyze the data. We perform a complete parameter study and experimental evaluation using data collected on a real network. The results show that the performance of our system is comparable to currently available antiviruses, although antiviruses use signatures to detect known malwares while our algorithm solely uses behavior analysis to detect new undocumented attacks.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134087650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Couturier, Timo Bräysy, Boyd Buchin, J. Krygier, V. Le Nir, Niels Smit, T. Tuukkanen, E. Verheul
{"title":"End-to-end optimization for tactical cognitive radio networks","authors":"S. Couturier, Timo Bräysy, Boyd Buchin, J. Krygier, V. Le Nir, Niels Smit, T. Tuukkanen, E. Verheul","doi":"10.1109/ICMCIS.2018.8398705","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398705","url":null,"abstract":"Cognitive Radios are able to dynamically use free spectrum in their vicinity, avoiding interference and congestion and thus providing robust communication links. Cognitive Radio Networks go one step further, as they do not only consider the link to the next node but focus on end-to-end optimization. Dynamic adaptations of the whole protocol stack are required, especially on the network layer. This paper analyzes networking technologies regarding their support for end-to-end optimization in tactical environments and proposes enhancements. Based on the findings, an architecture framework for Cognitive Radio Networks is proposed.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Souradip Saha, M. Tschauner, M. Adrat, Tim Schmitz, P. Jax, P. Vary
{"title":"Bit-interleaved polar coded modulation with iterative decoding","authors":"Souradip Saha, M. Tschauner, M. Adrat, Tim Schmitz, P. Jax, P. Vary","doi":"10.1109/ICMCIS.2018.8398698","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398698","url":null,"abstract":"Polar Codes are a recently proposed class of linear block error correction codes. They are provably capacity achieving codes over Binary Discrete Memoryless Channels (B-DMC) and have hence garnered a lot of interest from the scientific community. It is also a proposed channel coding method for 5G technology. Bit-Interleaved Coded Modulation with Iterative Decoding (BICM-ID) is a well known design to improve the error correcting performance of underlying channel codes over continuous channels especially Additive White Gaussian Noise (AWGN) channels. The novel idea in this paper, is to combine these powerful error correcting techniques i.e. integrate Polar Codes in a BICM-ID design to produce a high performance Bit-Interleaved Polar Coded Modulation with Iterative Decoding (BIPCM-ID) system. The error correcting performance of such a BIPCM-ID system has been analyzed through simulations over AWGN channel and multiple modulation schemes. Additionally error floor removal has been implemented and system performance has been discussed.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114811421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Limiting the flooding of simplified multicast forwarding to a defined scope","authors":"M. Hauge, L. Landmark","doi":"10.1109/ICMCIS.2018.8398712","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398712","url":null,"abstract":"We discuss efficient methods for delivering traffic to a group of receivers that is expected to be in close proximity of each other. The methods are based on techniques for efficient flooding of the whole network. If the network covers a large military unit such as a battalion and the data is meant for one company, it is not resource efficient to flood the data to the whole battalion. Therefore, in this article we discuss improvements to Simplified Multicast Forwarding (SMF) that can limit SMF's flooding of a packet to a smaller segment of the network. We also propose a method where the new SMF techniques are used in conjunction with connectionless multicast (Xcast) to improve the flexibility and robustness of the forwarding method.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128082379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Diefenbach, R. Lopes, Thorsten Lampe, Christoph Prasse, J. Sliwa, R. Goniacz, Antti Viidanoja
{"title":"Realizing overlay Xcast in a tactical service infrastructure: An approach based on a service-oriented architecture","authors":"A. Diefenbach, R. Lopes, Thorsten Lampe, Christoph Prasse, J. Sliwa, R. Goniacz, Antti Viidanoja","doi":"10.1109/ICMCIS.2018.8398724","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398724","url":null,"abstract":"The service-oriented architecture (SOA) paradigm is increasingly applied to the armed forces' IT infrastructures. Previously, the tactical service infrastructure (TSI) developed in the TACTICS project by various European partners was proposed to overcome the challenges posed by the disadvantaged networks of the tactical battlefield. In this paper we focus on the realization of an overlay Xcast mechanism in this TSI to make good usage of the scarce bandwidth typically available in tactical military networks. The mechanism was implemented and its feasibility demonstrated in the TACTICS project.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129259922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}