{"title":"Barrier coverage for underwater sensor networks","authors":"S. Barr, Benyuan Liu, Jie Wang","doi":"10.1109/MILCOM.2008.4753077","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753077","url":null,"abstract":"Using sonar to detect submarines was an effective method. Current technologies, however, have made it possible for submarines to thwart standard (active or passive) sonar mechanisms [1]. Thus, finding alternatives to detect submarines becomes important and timely. One viable alternative is to use magnetic or acoustic sensors in close proximity of possible underwater pathways a submarine may pass through. This approach may require deploying large-scale underwater sensor networks to form strong barriers for coastline protection. In this paper we first derive the notion of 3-dimensional stealth distance to measure how far a submarine can travel in a sensor network before being detected by a sensor. Next we prove that there is no strong barrier coverage in a large 3-dimensional fixed emplacement sensor field where sensor locations follow a Poisson point process, i.e., there always exists a path by which an adversary informed of the locations of the sensors can move without being detected. Finally, we describe an energy conserving approach to constructing a strong 3-dimensional barrier using mobile nodes so that intruding submarines cannot pass through without being detected.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129936845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Picking the winners in large-scale ground-vehicle satcom-on-the-move deployments","authors":"J. Ortega, J. Debruin","doi":"10.1109/MILCOM.2008.4753469","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753469","url":null,"abstract":"United States military planners are making plans for large scale deployment of on-the-move satellite communication systems. Current thinking calls for broad capability at both commercial Ku bands as well as military Ka bands. How this will really play out depends on many factors in the satellite industry that are uncertain. These factors include installed satellite capacity and loading factors, final resolution of several sets of proposed regulation standards, the degree (or lack) of enforcement of those standards, and the size of future on-the-move budgets. Nobody really knows what will happen, but the stakes are high. As a result, there are many antenna hardware configurations now offered or on the drawing board that will be winners in some scenarios and losers in others. For the purposes of this investigation, on-the-move antennas are grouped by several major defining characteristics (such as height and cost). How these categories fair under different scenarios is then discussed.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128260972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimum schedule lengths with rate control in wireless networks","authors":"A. Pantelidou, A. Ephremides","doi":"10.1109/MILCOM.2008.4753591","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753591","url":null,"abstract":"In this paper, we study the problem of joint scheduling and rate control in wireless networks, when each transmitter has a finite amount of data traffic to deliver to its corresponding receiver. Our objective is to minimize the time required to deliver the total data traffic. The scheduling decisions take into account the constraints of the physical layer through the well-known physical interference model. First, we consider a time-slotted system. We provide an optimal solution through a graph-theoretic model, where the minimum-length scheduling problem is formulated as finding a shortest path on a single source directed acyclic graph. Next, due to the complexity of the discrete time problem, we simplify it in two dimensions: (i) we map it to a continuous time problem, and (ii) we restrict the set of feasible scheduling and rate control decisions that can be employed. We finally obtain an optimal scheduling and rate control policy of this simplified problem.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128640288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DoDAF analysis of the high bandwidth high throughput satellite terminal Government Reference Architecture","authors":"M. Monteleone, R. Paroline","doi":"10.1109/MILCOM.2008.4753483","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753483","url":null,"abstract":"The army high capacity communications capability (HC3) Project is leading the development of a government reference architecture (GRA) for future joint warfighter high bandwidth high throughput (HBHT) satellite communications (SATCOM) terminals in partnership with the Joint Services industry, and government research centers. This paper shows how the DoD architecture framework (DoDAF) can be applied to the GRA development effort.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"47 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130274348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing PKI related network load in bandwidth constrained environments","authors":"B. Fedorchak","doi":"10.1109/MILCOM.2008.4753317","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753317","url":null,"abstract":"When adding PKI to bandwidth constrained environments, it is necessary to optimize the information sent with any given message so as to consume the least amount of bandwidth possible. One of the components of a PKI transaction that increases the size of the message is the transmission of the X.509 certificate. This paper introduces a way to reduce the amount of network traffic due to PKI by proposing a methodology whereby the X.509 certificate does not need to be transmitted with every message, thereby reducing the size of the message that is transmitted.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126764882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A semiblind adaptive beamformer using a parallel pilot signal for WCDMA systems","authors":"Sheng-Luen Wei, J. Shynk","doi":"10.1109/MILCOM.2008.4753285","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753285","url":null,"abstract":"A semiblind beamformer using a parallel pilot signal in the adaptive algorithm is investigated for wideband code-division multiple-access (WCDMA) systems. Although the pilot signal and traffic channels are designed to be transmitted using orthogonal codes in the downlink direction, time dispersion and frequency-selective fading in the transmission channel severely degrade this orthogonality at the receiver. As a result, the traffic signal of a target base station appears as interference coming from the same direction as the pilot signal, and causes poor performance of a pilot-only training-based beamformer. In order to mitigate this effect, we propose a semiblind beamforming algorithm that jointly exploits the pilot signal and the traffic channel signals. A modified version of the semiblind beamformer simultaneously suppresses self-interference and cochannel interference from other base stations. The proposed semiblind techniques outperform the conventional pilot-only approach as demonstrated via computer simulations.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123322080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active user cooperation in fading multiple-access channels","authors":"D. Chatterjee, T. Wong","doi":"10.1109/MILCOM.2008.4753070","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753070","url":null,"abstract":"Consider a two-user fading cooperative multiple-access channel (CMAC), where each user, along with transmitting its own information to the destination, helps the other user by forwarding the latterpsilas information. It is assumed that the transceivers (nodes) are capable of half-duplex communication and that full channel state information (CSI) is available at all the nodes. Cooperative transmission strategies based on a flow-theoretic approach are proposed. The proposed strategies include a sub-optimal but simple orthogonal relaying strategy for the CMAC (OR-CMAC), and a flow-optimized strategy for the CMAC (FO-CMAC). The proposed protocols are evaluated in terms of achievable rate regions and outage performances, for different scenarios. The boundaries of the achievable rate regions for the proposed strategies are characterized by convex optimization formulations, and FO-CMAC is shown to provide improved achievable rate regions as compared to the conventional multiple-access channel (MAC), and a previously proposed strategy based on the decode-and-forward (DF) approach. Although sub-optimal in terms of the achievable rate region, OR-CMAC is shown to provide outage performance close to FO-CMAC for the scenarios considered. Moreover, by comparing to a lower bound on the outage probability, both the proposed strategies are shown to achieve the optimal diversity order of two for the required rate region of interest.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123652171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple multidimensional knapsack problem and its applications in cognitive radio networks","authors":"Yang Song, Chi Zhang, Yuguang Fang","doi":"10.1109/MILCOM.2008.4753629","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753629","url":null,"abstract":"In this paper, a new variant of the standard knapsack problem is investigated and applied in cognitive radio networks. More specifically, the centralized spectrum allocation in cognitive radio networks is formulated as a multiple multidimensional knapsack problem. We propose an exact solution and a heuristic algorithm with guaranteed performance. The performance of the proposed algorithms are compared numerically.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116160728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Song Luo, Jason H. Li, R. Levy, Subir Das, T. McAuley, M. Gerla
{"title":"Cross-layer design for reliable communication in Airborne Networks","authors":"Song Luo, Jason H. Li, R. Levy, Subir Das, T. McAuley, M. Gerla","doi":"10.1109/MILCOM.2008.4753391","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753391","url":null,"abstract":"The future airborne network (AN) has to operate with lossy and intermittent data links, and other harsh technical challenges. However, current network protocols cannot perform well in AN, because they were originally developed for terrestrial-based Internet. Although some protocols were modified to adapt to space links, there is little research so far on reliable transmission mechanisms in AN environment. In this paper, we propose a cross-layer approach to achieve the goal of reliable data transmission in AN. The key components of the approach include a cross-layer framework to improve information sharing between different protocol layers, and adaptation/optimization function at link and transport layers. Preliminary simulation results on lossy and intermittent wireless links show that our approach is more superior to traditional terrestrial-based protocols.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121639902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On systematic cross-layer design for ad hoc networks","authors":"J.H. Li, W. Peng, R. Levy, A. Staikos, M. Chiang","doi":"10.1109/MILCOM.2008.4753392","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753392","url":null,"abstract":"There exist a large amount of research efforts that claim cross-layer design in multi-hop wireless networks. However, almost all of such works use the idea of cross-layering in some ad hoc manner, and different cross-layer designs generally do not work together. To this end, we argue that cross-layer design in such networks should follow some systematic approach, in order to provide a common ground for alternative comparison and integration. In this position paper, we identify two key components toward achieving this ultimate goal of systematic cross-layer design. First, a rigorous mathematical framework is needed to provide the unifying approach for cross-layering, and in this work we choose the well-recognized Generalized Network Utility Maximization (GNUM) approach. Second, with the components availed by the mathematical framework, a composable software ldquoworkbenchrdquo is needed to ldquogluerdquo the various components into some prototype alternatives for inspection. We will discuss how such composability may be achieved via our unique ontology-based modeling and simulation approach.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126296311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}