The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present the design, implementation, and evaluation of a custom-built wideband RF front-end for enabling dynamic spectrum access communications in software-defined radio platforms. The frontend is designed for wireless operation within the 50 MHz - 2.5 GHz frequency range, and is entirely software-controlled by the platform. Evaluation of the proposed design was conducted using the...
This research explores the feasibility of performing passive information capture on voice data in order to analyze and classify the contents of interpersonal communication. The general form of this problem is very difficult as fully automated speech understanding technology does not exist. This is further complicated by battlefield realities including: noise, jargon and unstructured speech. However,...
The rapid migration of system high information sharing to the tactical edge has made it imperative that the DoD reexamine tactical Cross Domain Solutions/Enterprise Services (CDS/ES). Prior to Operation Iraqi Freedom (OIF), information sharing requirements at the tactical edge were relatively few in number and nominal in terms of data throughput, data types, and users. Cross Domain Solutions (CDS)...
The U.S. Army has developed a modular architecture for the high bandwidth military tactical satellite communications terminal domain with flexible multiband and multimode capabilities. The architecture was validated and verified using modeling and simulation. The artifacts generated by the model can be used to develop the DoDAF views to obtain certifications for DoD enterprise interoperability, information...
In this paper we demonstrate an attack scenario in which Bluetooth enabled computers are remotely controlled by an attacker without any security software detecting the connection. We describe in detail the methods to deliver malware, evade detection, elevate permissions, and transport critical information out of the network via Bluetooth connections. A prototype system using state-of-the-art operating...
With the increasing size and complexity of emerging military communication networks, low footprint emulation methods are required to evaluate protocols, algorithms and user performance. In this paper we describe a new emulation architecture that is scalable, modular, and responds to real-time changes in topology and link characteristics. We use this scalable emulation testbed to evaluate system performance...
Testing of applications for tactical MANETs poses a special technical challenge due to the difficulty of conducting experiments in an ad hoc network environment at a scale larger than a few nodes. One approach is to conduct experiments in a testbed that can imitate a tactical MANET to the highest feasible level of fidelity. For applications, this is achieved by executing unmodified software under...
The platforms and gateways that compose the Airborne Network (AN) exhibit a high degree of heterogeneity, with a variety of IP and non-IP data links hosted on various terminals produced by multiple manufacturers. The lack of an accepted, mature network management architecture for the AN contributes to the risk that there will be a proliferation of separate, stovepiped tools deployed to monitor and...
A method is described that takes into account the investments done in the security and/or achieved security confidence in planning new security measures. The method uses new integral security metrics and the well-known graded security model. A precondition for the application of this method is the availability of expert knowledge or statistical data for the model in use that describes a class of situations...
In this work, we present SDR-ARI - a software defined radio (SDR) approach to an angle-of-arrival-assisted relative interferometric (ARI) RADAR transceiver. It has a number of desirable attributes including the ability to reduce the synchronization, network, and hardware requirements when operating as the sole RADAR modality and its ability to augment existing pulsed and CW RADAR algorithms. While,...
This paper presents the main results of the systems development and integration activities performed by the MIDS nations (US, France, Italy, Spain and Germany), with the support of the MIDS international program office (IPO), in order to effectively integrate the MIDS low volume terminal (LVT) into air, ground and sea platforms. Particular emphasis is devoted to the experimental work performed in...
This purpose of this paper is to document an architectural validation approach for the Government Reference Architecture (GRA) for SATCOM terminals. The approach integrates the Virginia Tech OSSIE SCA Core Framework with a UML model of the GRA, coupled with low-fidelity models of the SATCOM components. This approach uses the Rhapsody tool to implement the GRA-based testbed from documentation through...
Upgradeability and interoperability are main concerns of Software Defined Radio (SDR). But in the case of military applications, security is also a relevant aspect of SDR. The Secure Software Communication Architecture (SSCA) is a standardized solution to secure SDR. This architecture needs a cryptographic processor for security purposes. However, currently available SSCA compliant ASIC-based cryptoprocessors...
A handheld software defined tactical VHF/UHF radio used for AM/FM/PM line of sight communications is transformed into a single sideband HF band radio for HF 2G and 3G ALE networking. Military radio convergence presents real challenges to aggregation of widely variant narrowband waveforms. This paper discusses the hardware adaptations that allow a handheld VHF/UHF radio to act as the core radio of...
Integrity assessment plays a critical role in the security and regulatory certification of software-defined radio (SDR) and cognitive radio (CR). We propose a novel approach to assess the execution status of SDR and CR by monitoring their dynamic power consumption. The approach relies on extracting distinctive power consumption signatures, or fingerprints, and then using pattern recognition techniques...
Future military satellite communication systems will feature time-division multiple access (TDMA) uplinks in which uplink resources will be granted on demand to each terminal by a centralized resource controller. Due to the time-shared nature of the uplink, a terminal will not be constantly transmitting. It will only transmit in its assigned timeslots so as not to cause interference to other terminal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.