Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2006
The emerging tactical networks represent complex network-centric systems, in which multiple sensors, unmanned vehicles, and geographically distributed units of highly mobile decision makers, transfer and analyze data while on the move. The network could easily scale up to hundreds of cooperating nodes, providing tactical extension to the system-of-systems environment of Global Information Grid [1]. The node mobility as well as ad hoc network topology reconfiguration becomes a powerful control option, which network operators or intelligent management agents could apply to provide for self-forming, self-healing behavior [2]. This in turn requires new techniques for adaptive remote management of mobile wireless nodes; their rapid remote or autonomous reconfiguration at both physical and application layers, subject to changing operational requirements. 12 19a. NAME OF RESPONSIBLE PERSON
2006
The emerging tactical networks represent complex network-centric systems, in which multiple sensors, unmanned vehicles, and geographically distributed units of highly mobile decision makers, transfer and analyze data while on the move. The network could easily scale up to hundreds of cooperating nodes, providing tactical extension to the system-of-systems environment of Global Information Grid [1]. The node mobility as well as ad hoc network topology reconfiguration becomes a powerful control option, which network operators or intelligent management agents could apply to provide for self-forming, self-healing behavior [2]. This in turn requires new techniques for adaptive remote management of mobile wireless nodes; their rapid remote or autonomous reconfiguration at both physical and application layers, subject to changing operational requirements. We name this new adaptive tactical networking management paradigm as Network-on-Target (NoT). It is assumed that the NoT process starts ...
International Journal of Communication Systems, 2006
This paper aims at introducing some emerging technologies and illustrating how they could be ported on both tactical and civil protection networks, allowing both functional and structural improvement. In the past years, 'ordinary' networking technologies have made dramatic progress in topics that were previously assumed as marginal, such as anonymity and data persistence. In this evolutionary perspective, an effort could be made to port this subset of civil technologies to more challenging networking environments. The peer-to-peer (p2p) networking paradigm offers interesting solutions for organizing both the applicationlevel interaction and the signalling/resource reservation phase, as well as the effective delivery of a service. Due to its intrinsic delocalization characteristic, it also offers a set of solutions for anonymous data exchange, and helps hiding the routing phase. In another respect, but even more consistent, zero configuration networks allow keeping up and running the infrastructure, by reducing the needs of skilled technicians or network administrators to the minimum. This technology allows performing configuration and maintenance in a semi-automatic way, avoiding waste of time during tactical operations and preventing the occurrence of mistakes in panic situations. The paper highlights the main aspects and discusses a specific example in the deployment of application-level service quality over an ad hoc network scenario.
2006
The emerging tactical networks represent complex network-centric systems, in which multiple sensors, unmanned vehicles, and geographically distributed units of highly mobile decision makers, transfer and analyze data while on the move. The network could easily scale up to hundreds of cooperating nodes, providing tactical extension to the system-of-systems environment of Global Information Grid [1].
International Journal of Research, 2017
In offensive military operations, the communication hubs move swiftly to provide multi-media communications to the fighting forces. As the fighting formations move forward with the progress of operations, the communication hubs also move forward. Existing dynamic routing algorithms update the configuration tables, but cannot converge quickly. In this paper, we present a dynamic and adaptive reconfiguration routing algorithm which would make the communication system transparent to the movement of fighting formations and improve the success rate of packet delivery.
2008
We present bio-inspired computation techniques, such as genetic algorithms, for real-time self-deployment of mobile agents to carry out tasks similar to military applications. Under the harsh and bandwidth limited conditions imposed by military applications, self-spreading of autonomous mobile nodes becomes much more challenging. In our approach, each mobile agent exchanges its genetic information, which is composed of speed and direction encoded in its chromosome (genome), with the neighboring nodes located in its communication range. A genetic algorithm run at the application layer as a software agent is used by each node to decide its next speed and direction among a large number of choices so that the unknown geographical area can be covered uniformly under conditions such as hostile attacks, natural (i.e., mountain, trees, lakes etc.) and man-made obstacles. We implemented a simulation software to quantify the effectiveness of the genetic algorithms under different military operational conditions (e.g., losing assets during an operation, the remaining agents should reposition themselves to compensate the lost in coverage and network connectivity). Metrics including normalized area coverage, deployment time, avoidance from obstacles over an unknown geographical area are used to demonstrate the efficiency of the self-deployment algorithm. The results show that genetic algorithms can be applied to autonomous mobile nodes and be performed as an effective tool for providing a robust solution for network area coverage under restrained communication conditions.
Defense Transformation and Net-Centric Systems 2009, 2009
Mobile Ad-Hoc Networks enable communication in various dynamic environments, including military combat operations. Their open and shared communication medium enables new forms of attack that are not applicable for traditional wired networks. Traditional security mechanisms and defense techniques are not prepared to cope with the new attacks and the lack of central authorities make identity verifications difficult. This work extends our previous work in the Biologically Inspired Tactical Security Infrastructure to provide a reputation-based weighing mechanism for linkstate routing protocols to protect the network from attackers that are corrupting legitimate network traffic. Our results indicate that the approach is successful in routing network traffic around compromised computers.
First, I would like to thank my best friend, my greatest supporter, my inexhaustible source of strength, love and affection, my mother. I thank you for everything you have always done for me, without you none of this would have been possible. I also thank my boyfriend, Sherlon Almeida da Silva, you have always been one of my biggest supporters, my source of energy and strength. Words will never express the gratitude I have for everything you've always done for me, thank you. I would also like to thank all the teachers who contributed to my academic journey, from elementary school to graduate school. My eternal gratitude to all these warriors. I would like to thank my dear advisor Kalinka Regina Lucas Jaquie Castelo Branco, you are one of the most kind, competent and inspiring people I have ever met. Even before entering graduate school, I already wanted to work with you for your competence, but I was surprised by an example of a wonderful human being. Thank you for the guidance and for everything you have done for me, I admire you too much. Finally, I would like to thank all friends from USP and friends from the laboratory, you made my afternoons happier, they were essential to keep me on track and achieve my goals. This study was financed in part by the Coordenação de Aperfeiçoamento de Pessoal de Nível Superior-Brasil (CAPES)-Finance Code 001. "Quando se nasce pobre, ser estudioso é o maior ato de rebeldia contra o sistema-autor desconhecido" ABSTRACT FERRÃO, ISADORA GARCIA. Resilient architecture to dynamically manage unmanned aerial vehicle networks under attack. 2021. 136 p. Dissertação (Mestrado em Ciências
MILCOM 2008 - 2008 IEEE Military Communications Conference, 2008
The US Department of Defense (DoD) is developing a Network Centric Warfighting (NCW) capability. Key to the deployment of NCW capabilities is the development of scalable networks supporting end user mobility. Initial network deployments operate either At-The-Halt (ATH) or On-the-Move (OTM) with preplanned movements. This is consistent with current networking capabilities with respect to large scale mobile network capabilities and protocols. However, future architectures and capabilities should allow for more flexible mobility models allowing for more flexible and robust NCW capabilities. We investigate hierarchical network models which are comprised of a high bandwidth, planned mobile core network interconnecting subtending more mobile end user networks. Standard IP routing and name and location services are assumed within the core network. The subtending and mobile end user networks rely upon highly scalable (from a mobility perspective) Beacon-Based routing architecture. The interface between the core and subtending mobile networks relies upon network concepts being developed within the Internet Engineering Task Force (IETF), specifically from IPv6 mobility and the Host Identity Protocol (HIP) rendezvous service for mobile networks. We discuss the advantageous of this architecture in terms is mobility, scalability, current DoD network plans and commercial protocol development. * Robert Cole is supported by the following grant NSF-XXX-XXXXXXX. † Baruch Awerbuch is supported by the following grant NSF-XXX-XXXXXXX.
Situation management has traditionally been based on iterative planning activities that call for a high level of coordination between multiple stakeholders: first responders, citizens, volunteers, subject matter experts, scientists, technicians and managers with different yet important responsibilities. In a crisis event existing systems and communications infrastructures may not provide necessary information in a timely fashion due to damage, incompatible media, geographically limited coverage, fragmented technology or social and policy issues. The effective coordination of multiple response units/resources is stymied by incompatible communication technologies and social/policy incongruences. Crisis events are characterized by initial and ongoing uncertainty with regard to scale, location, direction and magnitude. More and better information sharing and cooperation is needed. The Intelligent Deployable Augmented Wireless Gateway (iDAWG) technology creates direct communication networks between remote coordinators, local response teams, volunteers and others on location by using or replacing existing communication or network infrastructures. Remotely sensed information and communications can be shared in real time via iDAWG-enabled devices that can be configured on the fly using edgeware (a new class of software developed for the wireless grid) applications. Existing web, cellular and radio communications network devices are bridged to build dynamically scalable heterogeneous wireless grids. Technical, social, governance and policy issues are addressed to facilitate this paradigm change in emergency response.
MILCOM 2008 - 2008 IEEE Military Communications Conference, 2008
In Network based Operations (NbO), critical decisions can be optimised thanks to a better information sharing between commanders. The Phoenix 2007 experimentation applies the NbO concept to the platoon level. The experimentation introduces collaborative services for video sharing and decision making in order to cope with urban area, tactical mobility and uncertain environment. They open new spectrum of capabilities (short loops between actors, experts reachback, remote navigation for drones or robots. . . ), based on communication and information advantage. For the experimental purpose, these services rely on a system of tactical networks which involve remote sensors, soldiers, vehicles, robots, drones, and expert reachbacks. A Information Support Team (IST) is also introduced to filter and route the traffic flows towards end users. This team is also in charge of deploying and controlling sensors, robots and drones. The experimentation uses basic infantery missions to assess these capabilities, by measuring coordination between actors, traffic loads on the network as well as ergonomic factors. Results reveal that even if robotic sensors and drones do not slow down the pace of operations, good coordinations combined with a versatile IST commanding are required. At system level, network mobility and robustness are required to operate efficiently.
2006
Adding mobility to sensor networks can significantly increase the capability of the sensor network by making it resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors. Mobility in sensor networks may be controllable, and hence be used to help achieve the network's missions. That is, mobility may be "purposeful" instead of being treated as an uncontrollable external stimulus to which the ad-hoc networks must respond. To make use of the purposeful mobility, we propose techniques for mobility assisted sensing and routing considering the computation complexity, network connectivity, energy consumption of both communications and movement, and the network lifetime. We also define utility functions that can capture the benefits of the movement from the perspective of all missions, and maximize the capability of the network.
2014 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2014
Data acquisition is an important task to provide context awareness of a military operation scenario in order to support informed decisions. Wireless sensor networks (WSN) play a remarkable service in this context by collecting data on remote areas to support decision support systems in control centers. However, due to the nature of the locations where they are deployed, it is out of the question provision a conventional communication infrastructure to access them. Thus, alternative communications approaches have to be used, such as relay links via unmanned aerial vehicles (UAVs) flying over the sensor network deployed on the ground. However, solutions based on this approach often propose intermittent connectivity to the WSN and/or exclusive use of the UAVs to support this connectivity. In this paper the problem is tackled by a self-organizing approach to control a UAV-relay network that provides persistent communication between WSN and back-end systems while the UAVs are not exclusively used for communication, but also have other missions to accomplish. Experimental results show the effectiveness of the proposed approach, which increased the connectivity among UAVs nearly by a factor of three compared to the deployment without any relay algorithm.
2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277), 2001
Considering that management t constitutes one of the most important pieces of the overall military puzzle, this paper discusses various management approaches applied in tactical military networks. Specifically, the paper refers to 3G wireless military management systems presenting management/control operations, tasks and schemes that can guarantee battlefield supremacy. Also, the paper discusses several issues concerning the migration of current tactical management systems to open, flexible and modular systems, which cover current needs and can be readily adaptable to tomorrow's changing requirements.
Due to its self-configuring nature, the tactical mobile ad hoc network is used for communications between tactical units and the command and control center (CCC) in battlefields, where communication infrastructure is not available. However, when a tactical unit moves far away from the CCC or there are geographical constraints, the data link between two communicating nodes can be broken, which results in an invalid data route from the tactical units to CCC. In order to address this problem, in this paper we propose a hierarchical connectivity maintenance scheme, namely ADLCoM (Autonomous Data Link Connectivity Maintenance). In ADLCoM, each tactical unit has one or more GW (gateway), which checks the status of data links between tactical units. If there is a possibility of link breakage, GWs request ground or aerial unmanned vehicles to become a relay for the data link. The simulation results, based on tactical scenarios, show that the proposed scheme can significantly improve the net...
2002
The paper describes development of a generic architecture for the intelligent reconfiguration of the wireless mobile networks within the EC funded Framework V CAST Project. The CAST demonstrator, currently being developed and integrated, is intended to evaluate some of the fundamental concepts of the proposed architecture, within the technological constraints presently available. Here, we present a generic distributed architecture and discuss problems associated with the organic-based intelligent support, network management, resource optimisation and control, and object orientated reconfiguration of resources.
2010
Upon completion of this Ph.D. dissertation, I found myself profoundly indebted to many people who had provided tremendous support and unconditional assistance along the way. First and foremost, I would like to express my deepest appreciation to both of my academic advisers, Professor David J. Lilja and Professor Tian He, for their guidance, encouragement, support, and patience throughout years of my graduate school career. I would like to express my gratitude to Professor Lilja for providing assistance ranging from fulfilling a simple administrative request to providing in-depth research advice throughout years in graduate school. My gratitude also goes to Professor He for accepting me into his research group and his willingness to collaborate independent research work with me. His continuous
IEEE Journal on Selected Areas in Communications, 1999
The Rapidly Deployable Radio Network (RDRN) is an architecture and experimental system to develop and evaluate hardware and software components suitable for implementing mobile, rapidly deployable, and adaptive wireless communications systems. The driving application for the RDRN is the need to quickly establish a communications infrastructure following a natural disaster, during a law enforcement activity, or rapid deployment of military force. The RDRN project incorporates digitally controlled antenna beams, programmable radios, adaptive protocols at the link layer, and mobile node management. This paper describes the architecture for the Rapidly Deployable Radio Network and a prototype system built to evaluate key system components.
MILCOM 2016 - 2016 IEEE Military Communications Conference, 2016
Tactical Edge Networks provide one of the most challenging communication environments. In order to cope with node mobility, constrained resources, and link unreliability, communication solutions designed for Tactical Edge Networks typically present highly configurable interfaces to be adaptable for various networking conditions. However, the extreme dynamicity and heterogeneity of tactical scenarios call for network-aware, adaptive communication systems that continuously re-tune their configuration parameters to match the ever-changing network conditions. This paper presents the Dynamic Detect and Adapt Mechanism (DDAM) of the Agile Communication Middleware, a distributed solution to perform network monitoring and communication adaptation specifically designed for Tactical Edge Networks. The present work focuses on two components of the DDAM: NetSensor, which provides efficient monitoring of the network status, and NetSupervisor, which is responsible for characterizing the network technology used to connect a pair of nodes in the network. The presented results show that our solution can accurately identify the technology used to establish links between nodes.
2009
ABSTRACT Net-Centric Information Management (IM) and sharing in tactical environments promises to revolutionize forward command and control capabilities by providing ubiquitous shared situational awareness to the warfighter. This vision can be realized by leveraging the tactical and Mobile Ad hoc Networks (MANET) which provide the underlying communications infrastructure, but, significant technical challenges remain.
Computer Communications, 2015
Nowadays, spontaneous wireless networks enabled by mobile end-user devices (e.g. smartphones or tablets) are receiving considerable interest due the possibility to offer a wide range of novel, highly pervasive and user-centric network services and applications. In this paper, we focus on emergency-related scenarios, and we investigate the potential of spontaneous networks for providing Internet connectivity over the emergency area through the sharing of resources owned by the end-user devices. Novel and extremely flexible network deployment strategies are required in order to cope with the user mobility, the limited communication capabilities of wireless devices, and the intrinsic dinamicity of traffic loads and QoS requirements. To this purpose, we propose here a novel approach toward the deployment of spontaneous networks composed by a new generation of wireless devices -called Stem Nodes (SNs) to emphasize their ability to cover multiple network roles (e.g. gateway, router). The self-organization of the spontaneous network is then achieved through the local reconfiguration of each SN. Two complementary research contributions are provided. First, we describe the software architecture of a SN (which can be implemented on top of existing end-user devices), and we detail how a SN can manage its role set, eventually extending it through cooperation with other SNs. Second, we propose distributed algorithms, based on swarm intelligence principles, through which each SN can autonously select its role, and self-elect to gateways or routers, so that end-to-end performance are maximized while the lifetime of the spontaneous emergency network is prolonged. The ability of the proposed algorithm to guarantee adaptive and self-organizing network behaviours is demostrated through extensive Omnet++ simulations, and through a prototype implementation of the SN architecture on a real testbed.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.