Sujin Kim, N. Y. Kim, Joonhyuk Kang, Youngok Kim, K. Nam, Sang-Moo Lee
{"title":"Low complexity ranging algorithm based on TOA for IEEE 802.15.4a system","authors":"Sujin Kim, N. Y. Kim, Joonhyuk Kang, Youngok Kim, K. Nam, Sang-Moo Lee","doi":"10.1109/MILCOM.2008.4753445","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753445","url":null,"abstract":"A computationally efficient ranging scheme that estimates time of arrival (TOA) by a low complexity minimum mean square error (MMSE) and a matrix pencil techniques is proposed for IEEE 802.15.4a chirp spread spectrum system. In TOA estimation, it is known that accurate channel delay can be estimated by the MMSE technique. However, the major drawback of the MMSE is its high computational complexity, which grows with number of signal samples. In this paper, thus, a computational efficient MMSE technique based on the chirp spectrum characteristic is proposed for a low complexity ranging algorithm. The proposed TOA estimation method consists of two-step signal processing: proposed low complexity MMSE-based channel impulse response (CIR) estimation and the channel delay tracking by matrix pencil algorithm. The proposed TOA estimation method not only has low computational complexity, but also achieves small ranging error. The effectiveness of the proposed algorithm is demonstrated by simulation results.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116919670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Bag, Muhammad Taqi Raza, Hamid Mukhtar, Ali Hammad Akbar, S. Shams, Ki-hyung Kim, S. Yoo, Donghwan Kim
{"title":"Energy-aware and bandwidth-efficient mobility architecture for 6LoWPAN","authors":"G. Bag, Muhammad Taqi Raza, Hamid Mukhtar, Ali Hammad Akbar, S. Shams, Ki-hyung Kim, S. Yoo, Donghwan Kim","doi":"10.1109/MILCOM.2008.4753365","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753365","url":null,"abstract":"This paper proposes an energy aware and bandwidth efficient mobility support architecture which handles mobility of 6LoWPAN devices, such that the communication between it and its corresponding nodes remain undisrupted. As the 6LoWPAN devices are energy and resource constrained enabling mobility in these devices with the help of conventional host based protocols like MIPv6 is not suitable. Moreover, it may be possible in many scenarios that the mobile node (MN) moves far from the gateway (GW), while communicating with it. In this case the MN has to increase its transmission power, which may adversely affect its life time. In the proposed architecture static random deployed 6LoWPAN devices (SN) with same characteristics as the MNs, facilitate mobility such that the IP connectivity of the MN is maintained with minimum signaling at MNpsilas end. Thus this paper describes the link layer specific mechanisms needed between the SN and the MN to help it perform multi-hop communication with the GW. Moreover, it is designed keeping in mind the energy and resource constraint nature of SNs themselves. The signaling overhead for the SNs is determined through analytical modeling.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116236423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of position and orientation accuracy on targeting in see through head-mounted displays for soldier information systems","authors":"D. Yoo, A. Lastra, T. Jensen","doi":"10.1109/MILCOM.2008.4753067","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753067","url":null,"abstract":"A first-order statistical model was developed to estimate the impact of position and orientation error (e.g., due to inaccurate GPS/compass information) on the ability to accurately place markers on objects in see through head-mounted displays for soldier information systems. In addition, the impact of such errors on the exchange of marker information between soldier nodes was also studied. A closed-form analytical solution was derived and compared to numerical (Monte Carlo) solutions. To compensate for the identified limitations of current systems, dynamically sized target markers and proximity warnings are proposed.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117146737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectrum adaptive test terminal","authors":"P. Okrah, E.R. Christensen, C. Bergstrom","doi":"10.1109/MILCOM.2008.4753498","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753498","url":null,"abstract":"Mobile User Objective System (MUOS) spectrum requirements call for the notching of the MUOS waveform to prevent interference with other users of the MUOS band. This function will be achieved via static host nation agreements (HNA) and dynamic scanning to discover narrowband users of the MUOS band. HNA and scanning data are used to develop a notch mask that is applied to the MUOS waveform before transmission. This paper describes the successful development of a spectrum adaptive test terminal for the MUOS program. This terminal dynamically adapts a wideband spread spectrum waveform in order to cooperatively coexist with existing radio systems. The paper addresses the characteristics of a spectrum adaptive terminal and the modifications of a COTS waveform to enable operation in a spectrum adaptive mode. The interface between the communication waveform and spectrum scanning function is explained. The scanning algorithm, including radiometric integration, noise floor contour determination, and signal detection, is described in detail. The notching algorithm, and associated scanning interface, is also described. An example of a spectrum adaptive terminal, the General Dynamics U.S. Navy Digital Modular Radio (DMR) AN/USC-61 (C) is presented. In addition, methods of reducing the effects of narrowband interference upon the wideband waveform are described.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123991972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of Code-Spread OFDM with error control coding","authors":"M. Al-Mahmoud, M. Zoltowski","doi":"10.1109/MILCOM.2008.4753261","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753261","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is a popular technique used to combat frequency selective fading in multipath channels. When spectral nulls are present in the channel, they can severely degrade or cancel out OFDM tones, resulting in an irreducible error rate. To combat this, standards typically employ forward error correction (FEC) techniques. Code-Spread OFDM (CS-OFDM) combines the characteristics of OFDM and Code Division Multiple Access (CDMA) to create a more robust modulation scheme which provides substantial performance improvements relative to standard OFDM. In CS-OFDM, each sinewave carries a weighted sum of all the information symbols being transmitted in an OFDM block interval. In this paper, the MMSE estimator is derived for each symbol for a number of cases, including when the number of carriers is greater than the number of symbols. The performance of both OFDM and CS-OFDM are evaluated with and without error control coding using the FEC techniques typically employed in OFDM standards.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emergency 101 - suicide bombers, crowd formations and blast waves","authors":"Zeeshan-ul-hassan Usmani, D. Kirk","doi":"10.1109/MILCOM.2008.4753519","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753519","url":null,"abstract":"Suicide bombing has become one of the most lethal and favorite modus-operandi of terrorist organizations around the world. While various attempts have been made to assess the impact of crowd density on suicide bomber effectiveness, the specifics of the actual crowd formation and orientation of the bomber with respect to the crowd has not been examined. A virtual simulation tool has been developed which is capable of assessing the impact of crowd formation patterns on the magnitude of injury and number of casualties during a suicide bombing attack. The tool examines variables such as the number and arrangement of people within a crowd for typical layouts, the number of suicide bombers, and the nature of the explosion including equivalent weight of TNT and the duration of the resulting blast wave pulse. The goals of the analysis are to determine optimal crowd formations to reduce the deaths and/or injuries of individuals in the crowd, to determine what architectural and geometric changes can reduce the number of casualties and injuries, and what is the correlation between variant crowd densities and formations with the weight and pulse duration of the explosives? Results indicated that the worst crowd formation is street (e.g. Zig-Zag) where 44% crowd can be dead and 71% can be injured (there is an overlap of injury and lethality), given typical explosive carrying capacity of a single suicide bomber. Bus and market crowd formations were found to be the best for reducing the effectiveness of an attack, with 24% and 26% crowd in lethal zone respectively and 58% and 54% in injury zones. Simulation results were compared and validated by the real-life incidents and found to be in good agreement. Line-of-sight with the attacker, rushing towards the exit, and stampede were found to be the most lethal choices both during the attack and post-explosion. These findings, although preliminary, may have implications for emergency response and counter terrorism. The paper also discusses additional capabilities that are being developed for the model.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124660444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LD2: A system for lightweight detection of denial-of-service attacks","authors":"S. Pukkawanna, P. Pongpaibool, V. Visoottiviseth","doi":"10.1109/MILCOM.2008.4753369","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753369","url":null,"abstract":"This paper proposes a system for lightweight detection of DoS attacks, called LD2. Our system detects attack activities by observing flow behaviors and matching them with graphlets for each attack type. The proposed system is lightweight because it does not analyze packet content nor packet statistics. We benchmark performance of LD2, in terms of detection accuracy and complexity against Snort, a popular open-source IDS software. Our evaluations focus on six types of DoS attacks, namely SYN flood, UDP flood, ICMP flood, Smurf, port scan, and host scan. Results show that LD2 can accurately identify all occurrences and all hosts associated with attack activities. Although LD2 uses higher CPU cycles than Snort, it consumes much less memory than Snort.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124713565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling & simulation to study the performance of hybrid free space optical/rf military communication networks","authors":"R. Raghavan, A. Kam, R. Y. Mannepalli","doi":"10.1109/MILCOM.2008.4753149","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753149","url":null,"abstract":"Data transmission using fiber optics offers significant improvements in network throughput rates. Although, optical fiber can transfer data at the rate of 1.6 Terabit/s per fiber - using Dense Wavelength Division Multiplexing (DWDM) technologies - the need for pre-laid infrastructure (optical fiber, network elements and significant network management) makes it more suitable for intercontinental backbones. Although Free Space Optical Communications (FSO) provides significant advantages for communication at the extremities of the network, the requirements of cloud-free line-of-sight (CFLOS) and perfect weather conditions prevent FSO alone from being a reliable military communications system. Hence, a hybrid system with FSO as the primary choice and RF as a fallback option has been proposed. The paper contains problem definition, details of the modeling and simulation (M&S) design and implementation, testing, verification and results of simple test cases.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125027951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference cancelation vs. interference suppression in ad hoc networks","authors":"A. Hasan, J. Andrews","doi":"10.1109/MILCOM.2008.4753293","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753293","url":null,"abstract":"DS-CDMA physical layer with MAC scheduling is an effective technique to combat interference in ad hoc networks. The reduction in SINR requirement due to spreading gain provides attractive robustness against aggregate interference of more distant interferers. However, nearby interferers that can still cause an outage are inhibited through MAC scheduling. An alternative to scheduling is to employ interference-aware receivers that exploit information in the interfering signal with the goal of negating its effect on the desired transmission. In this paper interference supersession using MAC scheduling is compared with interference cancelation by employing successive interference cancelation (SIC). The results show that under strict outage constraint, inhibiting nearby nodes through scheduling is a better option than to employ SIC with imperfect channel estimation.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129969740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network coding performance: An emulation experiment","authors":"G. Lauer, D. Morris","doi":"10.1109/MILCOM.2008.4753101","DOIUrl":"https://doi.org/10.1109/MILCOM.2008.4753101","url":null,"abstract":"This paper compares the performance of network coding to a baseline protocol that uses OLSR, SPF and NORM. The performance of each protocol suite is characterized in a three-hour militarily-relevant network topology using five (emulated) applications: video, voice, file transfer, situation awareness and messaging. Network coding provides comparable performance while using substantially less bandwidth. Simplified example scenarios are presented to provide insight into the reasons for network codingpsilas improved performance.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128926601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}