The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since at any given frequency a linear filter affects both the noise and the signal of interest proportionally, when a linear filter is used to suppress the interference outside of the passband of interest the resulting signal quality is affected only by the total power and spectral composition, but not by the type of the amplitude distribution of the interfering signal. Thus a linear filter cannot...
As DoD SATCOM stakeholders and developers, it is vital to understand innovative technical trends and both leverage and influence them in order to best address our priorities. These SATCOM development priorities are growth, adoption of open commercial standards, systemic availability and simplification. Major innovative trends in SATCOM development are Digital IF, modem advances and geographical distribution...
Named Data Networking (NDN) is a clean state Internet paradigm that considers some security primitives in its original design, and one of the promising candidates for the future Internet architecture. However, it may suffer from the specific threats such as Interest Flooding Attacks (IFA). Most researches are focused on the defense against fake IFA, where the PIT resources in victim routers are exhausted...
Naval surface fleets of the United States and its allies rely on multiple satellite communication systems (SATCOM) for onboard communication with other entities such as ships, shore nodes and hosts from external networks. Current practice is for an onboard ship router to select a particular SATCOM link for each outgoing traffic flow based on a mission-specific routing policy. In this paper we propose...
This paper extends previous work for extended target detection via Multiple Input Multiple Output (MIMO) bistatic radar using a compressed sensing (CS) approach by considering the detection of multiple fluctuating targets in the presence of transmit waveform dependent clutter. Detection waveforms and receiver filter are designed jointly using an algorithm that minimizes the mutual coherence of the...
Previous work on machine learning for intrusion detection in mobile tactical networks using the extremely lightweight intrusion detection (ELIDe) system has shown that ELIDe can approximate signature-based intrusion detection using significantly less resources and power than the traditional intrusion detection system without significantly degrading accuracy. ELIDe also performs binary classification...
Empirical-based models for security technologies in the commercial and military domain, including those that focus on protection, detection, and broader risk analysis, leverage data captured from sensors on network-connected devices including gateways, routers, and host nodes. Lacking, however, are datasets that contain specific state observations and actions from the evaluator (red/blue teammer)...
In this paper, we propose a scheme in which a communication relay unmanned aerial vehicle (UAV) estimates the distribution of the terminals and selects the optimal relay position for autonomous maneuvering. In order to accomplish mission success, warfighters on the battlefield must communicate with their commander all the time. Autonomous maneuvering of a relay UAV using the proposed scheme will support...
Radio frequency identification (RFID) is a technology for automated identification of objects and people. RFID technology is expected to find extensive use in applications related to the Internet of Things, and in particular applications of Internet of Battlefield Things. Of particular interest are passive RFID tags due to a number of their salient advantages. Such tags, lacking energy sources of...
Increased demand for wireless services has spurred research into spectrum co-existence between radar and communication systems. The effect of an unaltered radar interference on an uncoded communication receiver has been investigated for constellations used in commercial systems. However, the constellation design — possible for a cognitive transmitter-receiver pair — that maximizes the transmission...
This paper presents the design for a prototype tactical dynamic spectrum access (DSA) mobile ad hoc network, where the network is organized into clusters operating on a single frequency. The frequency may be changed autonomously by the network in response to jamming or interference, after some frequency switching delay. The network node design is implementable on a software defined radio (SDR), such...
Standard applications are unable to perform well in delay- and disruption-tolerant networks (DTNs) due to frequent lack of end-to-end connectivity and long communication delays. Such applications must be thus adapted to be able to operate in disadvantageous network conditions. In a previous work on adapting standard tactical applications for DTN networks, we proposed how such an adaptation may be...
The main objective of this paper is to develop an efficient satellite digital beam-forming (BF) method that can provide user specific desirable signal-to-interference-plus-noise ratio (SINR) or data rate for each user in each zone. And a massive multiple-input multiple-output (MIMO) communications system model and its favorable channel propagation condition are assumed (i.e., channel independence...
Network intrusion detection systems are widely deployed to detect cyberattacks against computer networks. These systems generate large numbers of security alerts that require manual review by security analysts to determine the appropriate courses of action required. The review of these security alerts is time consuming and can cause fatigue for security analysts, especially during long work shifts...
This work presents distributed beamforming using three dimensional randomly distributed volumetric arrays. This work examines a statistical ensemble (mean-valued) of average beampattern behavior for canonical and non-canonical volumetrically bound distributed (random) antenna arrays. Cubical, cylindrical, and spherical topologies of isotropic elements are analyzed to show beamforming and scanning...
Despite widespread use of commercial anti-virus products, the number of malicious files detected on home and corporate computers continues to increase at a significant rate. Recently, anti-virus companies have started investing in machine learning solutions to augment signatures manually designed by analysts. A malicious file's determination is often represented as a hierarchical structure consisting...
Cognitive Radio has been widely researched, often to address perceived spectrum scarcity. However, the potential contribution the Cognitive Radio could offer to military capabilities has not been fully addressed. The concept of capability is used differently by different interest groups. We identify relationships between viewpoints and perspectives of various capability models. In this paper we test...
This paper describes and verifies a method of implementing bit error rate (BER) calculation for FPGA-based physical layer security techniques for Software Defined Radio (SDR). Specifically, we describe an independent source signal processing architecture for an efficient calculation of BER for wireless communication modules across the transmitter and receiver nodes. The source components at the transmitter...
In this paper, the problem of minimizing the damaging effect on the frequency hopping (FH) spread-spectrum satellite is formulated using the two-player asymmetric zero-sum game framework. The payoff is modeled as the channel capacity of the defender under white additive Gaussian noise. The defender and attacker are capable of spreading their signals over a pre-specified frequency band. Two scenarios...
Traditional cryptographic secret key establishment mechanisms are facing challenges with the fast growth of high-performance computing, and can be very costly in many settings, e.g. in wireless ad-hoc networks, since they consume scarce resources such as bandwidth and battery power. As an alternative, link-signature-based (LSB) secret key extraction techniques have received many interests in recent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.