The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Certificate validation based on PKIX protocols does not work well under the particular conditions found in a MANET: Episodic connectivity and low bandwidth. We propose an overlay network of validation proxy servers which exploit cooperative caching of recent validation results. The proxy overlay improves the availability of the validation service and reduces the network traffic. The design employs...
Tactical networking environments demand reliable, robust, and efficient approaches to disseminating information that are tolerant to unreliable and bandwidth-constrained networks. This paper describes DisService, an Agile Computing approach to information dissemination that opportunistically discovers and exploits excess communications, storage, and processing capacity in a distributed network to...
In this paper we address the problem of supporting communication in partially connected military tactical radio networks. In such networks traditional multi-hop forwarding techniques cannot guarantee end-to-end communication. Alternative techniques must therefore be designed to compensate for connectivity disruption. We propose a communication model that relies on opportunistic disruption-tolerant...
In this paper, we present our work on designing a communication network for orbit access in future lunar exploration missions. We first discuss the characteristics of space communication for lunar missions that influence the network design, and then address some highlighted issues in the system framework which adopts both the delay-tolerant network (DTN)-based technologies and the mobile ad hoc network...
Disruption-tolerant networks (DTNs) provide a promising low-cost solution to transfer data in network environment where the connectivity is sporadic and unpredictable. Many existing methods for opportunistic data forwarding depend on the hypothesis that every node forwards messages regardless of the identities of the senders or receivers, however, the networks based on such methods are fragile under...
In this paper, we consider the reliable data fusion problem in a tactical environment in the presence of adversary. First, we characterize malicious behavior of compromised sensors assuming probabilistic models. Performance of the fusion process, in the presence of malicious sensors, is then quantified. The performance analysis shows that malicious sensors incur significant degradation on the fusion...
A recent feasibility study suggests that a Service Oriented Architecture (SOA) will be central within the NATO Network Enabled Capabilities information infrastructure. An important element of a SOA is the service discovery process, but existing solutions are not sufficient in military networks. We suggest to use a robust Peer-to-Peer (P2P) network as a complement. Unfortunately, available P2P search...
The FlexNet-Waveform (FN-WF) is a new, highly-configurable MANET waveform for the international ground-based SDR arena, designed for the new FlexNet-One and FlexNet-Four hardware platforms. To ensure maximum compatibility and interoperability, the FN-WF assumes an IP-based platform with standard COTS protocols on the wired, Ethernet connections, while the wireless links utilize the best practices...
Multiple antenna systems have been shown to provide significant performance improvements for network nodes; however, the vast majority of nodes in military networks will be limited to single channel devices due to mobility (size and power) and ease of use considerations. In this paper we apply a new joint synchronization-pilot sequence (JSPS) optimization design technique to multiple transmitter OFDM...
Tactical mobile ad hoc networks (MANETs) have a continued growth in bandwidth demand mainly driven by the introduction of new user services and applications. Everything over IP is one of the main requirements of the next generation tactical MANETs. As part of an initial investigation to provide enhanced tactical IP networking capabilities, an adaptive VHF/UHF system that attempts to satisfy the mobility,...
Conducting data fusion and Command and Control (C2) in large-scale systems requires more than the presently available Peer-to-Peer (P2P) technologies provide. Resource Clustered Chord (RC-Chord) is an extension to the Chord protocol that incorporates elements of a hierarchical peer-to-peer architecture to facilitate coalition formation algorithms in large-scale systems. Each cluster in this hierarchy...
Several concepts for more dynamic spectrum access have been suggested: 1. terminals making autonomous decisions without coordination 2. Networks cooperating in peer-to-peer (P2P) constellations without an infrastructure 3. Centralized spectrum server concepts which makes local decisions and coordinate through a broker hierarchy. In this paper we compare these three types of concepts in terms of spectrum...
This paper presents a joint network management approach being studied for interfacing network management of different US future force networks. The approach attempts to pass information between the cipher text network managers of the army, the navy and the air force networks such that intelligent decisions can be made as traffic flows between these networks. As the first straw man approach, the paper...
In this paper, we address the problem of collaborative video caching in mobile ad-hoc networks. We consider network portraying static video server with wired interface to gateway node that is equipped with wireless interfaces, other nodes are requiring access to the video streams that is stored at video server. In order to reduce the average access latency as well as enhance the video accessibility,...
In this paper we introduce a spectral-based method for validating sensor nodes in the field via clustering of sensors based on their measurement data. We formalize the notion of peer consistency in measurement data by introducing a notion called ??sensor indexing?? and model the problem of identifying bad sensors as a problem of detecting peer inconsistency. Suppose all sensors have peers. Then by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.