{"title":"Quality-of-service specific information retrieval for densely deployed sensor networks","authors":"Qing Zhao, L. Tong","doi":"10.1109/MILCOM.2003.1290170","DOIUrl":"https://doi.org/10.1109/MILCOM.2003.1290170","url":null,"abstract":"A new MAC protocol is proposed for the reachback operation in large scale, densely deployed sensor networks. Referred to as quality-of-service specific information retrieval (QUIRE), the proposed protocol aims to assure QoS requirement with a minimum amount of transmissions from sensors. By enabling only one sensor in a neighborhood to transmit, QUIRE ensures that the data access point receives no redundant information for reconstructing the sensed field within a given maximum distortion (QoS). It jointly minimizes system latency (the amount of time spent for data collection) and total energy consumption (the total number of transmissions from sensors).","PeriodicalId":435910,"journal":{"name":"IEEE Military Communications Conference, 2003. MILCOM 2003.","volume":"12 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127564849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Tran, B. Luu, B. Nguyen, H. Harrelson, G. Racine
{"title":"A mobile tactical experimentation test bed supporting the objective force","authors":"G. Tran, B. Luu, B. Nguyen, H. Harrelson, G. Racine","doi":"10.1109/MILCOM.2003.1290105","DOIUrl":"https://doi.org/10.1109/MILCOM.2003.1290105","url":null,"abstract":"The objective force is the ultimate goal of the U.S. Army to transform itself into a highly mobile ground force that will be the most rapidly deployable and tactically agile force capable of engaging \"full-spectrum\" operations. Advanced information and wireless communications capabilities are among key-enabling technologies that support a dominant feature of the objective force: rapid deployment. This paper describes and explain the technologies utilized in an experimental mobile test bed environment that has been deployed as a communications contingency during Y2K support to the Pentagon, although the main purpose of the test bed was to establish a platform for conducting research, development, and evaluation of emerging communications, networking, sensors, and information technologies that can improve strategic and tactical responsiveness of the U.S. ground force.","PeriodicalId":435910,"journal":{"name":"IEEE Military Communications Conference, 2003. MILCOM 2003.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127675231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An overview of hardware requirements for UWB systems: interference issues and transceiver design implications","authors":"L. Larson, D. Laney, J. I. Jamp","doi":"10.1109/MILCOM.2003.1290236","DOIUrl":"https://doi.org/10.1109/MILCOM.2003.1290236","url":null,"abstract":"The widespread adoption of UWB systems will require some fundamental rethinking of issues of dynamic range and frequency planning in the design of both the transmitters and receivers. In particular, the deployment of a robust receiver, capable of high performance in a multiuser/multistandard environment, remains a real challenge. A summary of UWB transceiver radio frequency interference mitigation techniques is presented.","PeriodicalId":435910,"journal":{"name":"IEEE Military Communications Conference, 2003. MILCOM 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128028140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient route update protocol for wireless sensor networks","authors":"Xuhui Hu, Y. Liu, M. Lee, T. Saadawi","doi":"10.1109/MILCOM.2003.1290163","DOIUrl":"https://doi.org/10.1109/MILCOM.2003.1290163","url":null,"abstract":"In larger-scale sensor networks, sink or target mobility brings new challenges in route maintenance and update. Conventional routing approaches suggest reconstructing a new route using flooding based protocols or simply repairing the old route locally. The flooding based scheme introduces lots of unnecessary control traffic, thus wasting sensor power and channel bandwidth. The local route repair leads to an excessively long route when the sink or the target keeps on moving. In this paper an efficient route update protocol (ERUP) is proposed to localize the flooding of route update messages within the neighborhood of the old route. By using this new scheme, route-wide renovation is assured to maintain the freshness and short length of the new route, and at the same time, greatly reduces the route update traffic with the help of the old route. Our simulations show that ERUP can always build a shorter and fresher route with very low control traffic compared with conventional approaches, which is beneficial to the energy conserving and balancing of the whole network.","PeriodicalId":435910,"journal":{"name":"IEEE Military Communications Conference, 2003. MILCOM 2003.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133261582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scale time offset robust modulation","authors":"P. S. Wyckoff, R. K. Young, D. McGregor","doi":"10.1109/MILCOM.2003.1290124","DOIUrl":"https://doi.org/10.1109/MILCOM.2003.1290124","url":null,"abstract":"Scale time offset robust modulation, or STORM, is a novel modulation technique that essentially adds time scaling to transmitted reference spread spectrum. STORM transmit signals are created using a pair of relatively offset signals. These signals are called the base and offset signals. The base signal may be random noise, colored noise, a PN sequence, or even a QAM signal. The offset signal is created from a copy of the base signal that is offset in time, time scale, phase, and/or amplitude. Summing the offset and base signal produces the transmit waveform. The transmit waveform is demodulated by estimating the cross-correlation between the received signal and a time scaled version of the received signal. This novel signal design delivers interesting features. First, the detection is robust when the base and offset signals maintain relative coherence. Second, using fixed bandwidth the multi-path delay resolution may be varied by changing the scale parameter. The demodulator non-coherently stacks multi-path energy without using the rake architecture or independently resolves multi-path depending on the scale parameter. Processing rates are time scale dependent and are typically orders of magnitude lower than a comparable bandwidth matched filter receiver when the scale parameter is known in advance.","PeriodicalId":435910,"journal":{"name":"IEEE Military Communications Conference, 2003. MILCOM 2003.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133757131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bit-interleaved space-frequency coded modulation with iterative decoding for OFDM systems","authors":"D. Rende, Xin Li, T. Wong","doi":"10.1109/MILCOM.2003.1290096","DOIUrl":"https://doi.org/10.1109/MILCOM.2003.1290096","url":null,"abstract":"We present a bit-interleaved space-frequency coded modulation (BI-SFCM) scheme with iterative decoding for orthogonal frequency-division multiplexing (OFDM) systems over frequency-selective channels. BI-SFCM is a space-frequency trellis coding method, based on bit-interleaved coded modulation (BICM) and multiple transmit and receive antennas. OFDM is used to transform a frequency-selective fading channel into multiple flat fading channels, and space-frequency trellis coding combined with bit-interleaving is used to exploit space and frequency diversity. BI-SFCM can provide increased data rates and improved performance. BI-SFCM with iterative decoding (BI-SFCM-ID) is proposed to further improve performance by means of increased coding gain by employing iterative decoding between the outer convolutional code and the inner space-frequency modulation. Analytical bounds and simulations are used to evaluate the performance of BI-SFCM-ID.","PeriodicalId":435910,"journal":{"name":"IEEE Military Communications Conference, 2003. MILCOM 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131920898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel estimation for OFDM systems with transmitter diversity for a quasi-static fading channel","authors":"Sugbong Kang, J. Lehnert","doi":"10.1109/MILCOM.2003.1290120","DOIUrl":"https://doi.org/10.1109/MILCOM.2003.1290120","url":null,"abstract":"A simple channel estimation scheme for OFDM systems with transmitter diversity and a quasi-static fading channel is proposed. It is based on the assumption that the channel is highly correlated at nearby subcarriers. For channel estimation, the pilot sequence is given a different circular time shift at each transmitter antenna, which is equivalent to phase modulation in the frequency domain. Then, nearby subcarriers are used to provide an orthogonal subspace to separate channel frequency responses between transmitter antennas and the receiver antenna. The channel estimator is a simple linear filter whose weight vectors can be precalculated. Using this scheme, the system with transmitter diversity can be implemented with a minimal change in structure from the single antenna implementation. The transmitter diversity gain using the proposed channel estimation scheme is demonstrated in the typical WLAN (wireless LAN) environment. Significant improvement in error performance is achieved using a larger number of transmitter antennas when channel frequency coherence between nearby subcarriers is large.","PeriodicalId":435910,"journal":{"name":"IEEE Military Communications Conference, 2003. MILCOM 2003.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134210763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic adaptation of access control policies","authors":"Vijay G. Bharadwaj, J. Baras","doi":"10.1109/MILCOM.2003.1290208","DOIUrl":"https://doi.org/10.1109/MILCOM.2003.1290208","url":null,"abstract":"An architecture and algorithms for deriving an access control policy by composing access control requirements specified at multiple levels in a command hierarchy is described. Our method can detect conflicts in requirements, and find a policy that maximally satisfies the requirements, by satisfying higher priority requirements at the expense of lower priority ones. It also allows for easy verification of the final policy by an administrator. The architecture allows quick adaptation of policies to changing situations, by providing for delegation of authority while ensuring that high priority requirements will always be satisfied.","PeriodicalId":435910,"journal":{"name":"IEEE Military Communications Conference, 2003. MILCOM 2003.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134274093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OFDM-MIMO communication systems in a Rayleigh faded environment with imperfect channel estimates","authors":"S. Gifford, J. Kleider, S. Chuprun","doi":"10.1109/MILCOM.2003.1290177","DOIUrl":"https://doi.org/10.1109/MILCOM.2003.1290177","url":null,"abstract":"This paper presents the performance of mobile orthogonal frequency division multiplexing (OFDM) multiple-input multiple-output (MIMO) communication systems with imperfect knowledge of the channel matrix. MIMO systems typically require a channel matrix, which can be determined initially from a training sequence. However, mobile communication systems exhibit a time-varying channel matrix and have time and frequency selective fades which result in performance degradation of the MlMO system. Channel tracking methods can be used to estimate the time-varying channel matrix but cannot in practice be error free. This paper presents results of V-BLAST (vertical Bell Laboratories layered space-time) MlMO simulations using the geometric wideband time-varying channel model (GWTCM) with Rayleigh faded environments and imperfect channel matrix knowledge. Flat fading is assumed for each OFDM subcarrier. OFDM-MIMO architectures such as OFDM coupled with V-BLAST can be easily implemented by exploiting the built-in and flexible multi-channel architectures of advanced software defined radios (SDR).","PeriodicalId":435910,"journal":{"name":"IEEE Military Communications Conference, 2003. MILCOM 2003.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115653139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new set of passive routing attacks in mobile ad hoc networks","authors":"J. Kong, X. Hong, M. Gerla","doi":"10.1109/MILCOM.2003.1290214","DOIUrl":"https://doi.org/10.1109/MILCOM.2003.1290214","url":null,"abstract":"In hostile environments, adversaries can launch passive attacks against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to trace network routes and infer the motion pattern of nodes at the end of those routes may pose a serious threat to covert operations. In this paper we propose a feasible adversary model of such attacks, then present several instantiations and study the principles of designing corresponding countermeasures. We demonstrate that existing ad hoc routing protocols are vulnerable to passive attacks: in the feasible adversary model, (a) the location and motion patterns of mobile nodes can be traced, while (b) proactive and reactive/on-demand ad hoc routes across multiple mobile nodes can be visualized by the adversary. We conclude that ad hoc networks deployed in hostile environments need new countermeasures to resist such passive attacks.","PeriodicalId":435910,"journal":{"name":"IEEE Military Communications Conference, 2003. MILCOM 2003.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116238802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}