The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tools are necessary for the DoD to analyze their information system's security, reliability, and resilience against cyber attack. Today's security analysis utilize real systems such as computers, network routers and other network equipment, computer emulations (e.g., virtual machines) and simulation models separately to analyze interplay between threats and safeguards. In contrast, we are developing...
Military force structures are becoming increasingly complex and net-centric as new technologies are developed and deployed. As such, there is an ever increasing need to provide system-of-systems (SoS) analysis tools to assist in evaluating a military combat team's survivability, lethality, sustainment and logistics. Evaluation of networked communications as part of this analysis is often overlooked...
In this paper, we highlight the impact of variable Push-To-Talk (PTT) delays on performance of a heterogeneous Land Mobile Radio (LMR) network. We first present the PTT delay values and distributions observed for some commonly used LMR nodes. An analytical model is then developed to estimate the asymmetric throughput problem. The results obtained using this model and simulations show that a LMR node...
Owing to the extensive use of commercial wide-band SATCOM systems by the Department Of Navy (DON) and the Department of Defense (DOD) in general, designers and operators of such systems need to investigate and analyze the performance of a broad range of deployment options with respect to communications requirements under a given warfighting scenario, and show the effects of these alternatives on these...
With the growing reliance on net-centric warfare, understanding the effect of information operations (IO) on the overall mission becomes increasingly important. Traditional information assurance (IA) metrics quantify attributes of the underlying information system, such as the availability, confidentiality, and integrity of critical services and data, without providing mission-level perspective. Meanwhile,...
To support highly flexible network mobility in mobile communication systems, various types of movable network entities, especially mobile base stations (M-BSs), will appear in near future. In this environment, a scanning process to identify the availability of neighbor M-BSs for handoff should be newly designed, because a conventional method does not reflect the motion of base stations. Therefore,...
This work describes an analysis of applying different election heuristics to connected dominated set (CDS) algorithms within different topological graph taxonomies. Our initial motivation for this study was a general observation that a significant amount of research in mobile ad hoc network (MANET) algorithm design and related election heuristic evaluation is based upon geometric random or other types...
In large networks of nodes with mobility, such as certain tactical wireless networks, overall system behaviors can be difficult to predict given the number of interactions between nodes and the number of possible behavior outcomes. Agent-based modeling is seen as an attractive method for representing and analyzing tactical wireless networks. This paper investigates the use of agent-based models to...
In this paper, an analytical time-domain model is presented to analyze the radio over free space optical (RoFSO) systems under two turbulence channels, the log-normal and the exponential channel. This analytical model uses general cases of a dual-drive Mach-Zehnder modulator (DD-MZM) and photodetector (PD) for typical optical double sideband (ODSB) and single sideband (OSSB) signals under turbulence...
This paper describes an approach to root cause analysis and fault correlation that addresses the problems inherent in wireless military networks. Root cause analysis concerns itself with identifying and correcting problems in a network. The ultimate goal of root cause analysis is to diagnose the cause for network anomalies, towards the ultimate goal of ensuring that adequate communication functionality...
It is a well known fact that orthogonal frequency division multiplexing (OFDM) suffers from high peak to average power ratio (PAPR). The nonlinear distortion introduced by an OFDM signal through practical amplifiers can further degrade the system performance. Due to the limited bandwidth in the radio frequency spectrum, it is impossible that wireless communication systems can operate in an environment...
In proactive routing protocols (such as OLSR) nodes flood their neighborhood information to the entire network. Every node then constructs a topology map which represents its view of the network. This map is taken as a basis to compute the ??best?? path to the destination. Inaccurate topology information may result in one of the following: a) packets may be sent in a path that no longer exists; b)...
To fully utilize radio resources by intelligently filling in as much radio spectrum gaps as possible, the concept of cognitive radio network has been well accepted. A challenge inherent in this technology is how to build a mechanism that can allocate resource by learning and adapting to a specific radio transmission environment. In this paper, we propose a cognitive resource management scheme that...
This paper considers a two-way amplify-and-forward (AF) relay network, where two users communicate with each other through an intermediate relay over asymmetric Nakagami-m channels. The average bit-error rate (BER) performance is analyzed for the relay under average power scaling (APS) and instantaneous power scaling (IPS) constraints. We demonstrate that this network operating in two time slots not...
We consider the problem of clandestine communications, i.e., communications that are meant to be invisible to third-party eavesdroppers, in the context of wireless sensor networks. Although encryption and anonymous routing protocols can hide the content and the routing information, the transmission activities of sensors on the same route can still reveal the information flow. In this work, a perfectly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.