The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secure and reliable communication is very important for a lot of different use cases. One major area of application is Network Enabled Capabilities (NEC). Security and reliability are even harder to achieve for the tactical domain, when different nations with a variety of communication technologies have to form a heterogeneous ad hoc network. CoNSIS (Coalition Networks for Secure Information Sharing)...
We investigate and implement the method of joining cycles of states generated by non-singular feedback shift registers to construct feedback Boolean functions which produce binary sequences of maximum period. The method is successfully used to obtain all registers of order 4 and 5 which output de Bruijn sequences.
A desired capability in military operations is the reliable and efficient sharing of Situational Awareness (SA) data at the tactical edge network. Many implementations of SA sharing in the literature use frequent broadcasts of SA messages in order to provide an up-to-date and comprehensive operating picture to all nodes. However, SA sharing may result in an increase in bandwidth requirements at the...
In this paper, we introduce an architectural concept for the adaption of SOA-technology (in particular Web services) in order to enable operational use in the tactical domain (typically featuring low-bandwidth communication links with high delays and frequent disruptions). For this purpose, an Enterprise Service Bus specially tailored for the tactical domain (a “tactical ESB”) is used as a technical...
The Cognitive Radio (CR) is able to adapt its operation to maximize an assumed utility function. It can be performed by appropriate resource management, according to the collected electromagnetic situation awareness. One of the most important features of the CR is the Dynamic Spectrum Access (DSA), where the CR have some autonomy to make decisions about the spectrum usage. First, the CR must know...
High Frequency (HF) communications are of vital importance for modern military operations. It has the potential to move voice and data communications around the world by bouncing signals off the ionosphere, and at a fraction of the cost of heavily burdened satellite communication frequencies. However, HF-channels are touchy, unpredictable and prone to noise, fading, jamming and interference. Therefore,...
Filter Bank MultiCarrier modulation (FBMC) is a promising waveform technology envisaged for future mobile communication networks. For many transmission scenarios, the combination of multiple non-contiguous spectrum bands is foreseen. Because of coexistence issues, very low Adjacent Channel Leakage is required making FBMC waveforms of particular interest. However the fair frequency localization of...
In this paper, we investigate the problem of detecting correlations among datasets containing malicious data concerned with various types of network attacks and related events of the infections taken from a numerous sources and organizations. We propose a graph based technique to depict relationships between malicious data based on values of attributes related both to attackers and victims, and referred...
In this paper, we study a consensus algorithm for distributed spectrum sensing (DSS) in cognitive radio networks (CRN) integrating a Goodness of Fit based spectrum sensing scheme. Existing work in this area often applies energy detector as a local spectrum sensing method for DSS, however in this case one needs to make the assumption that the noise level is the same at every node in the network, otherwise...
The paper presents the results of simulation verification of trust-based protection mechanism (TUBE) to attacks on a reputation systems. The authors give a short description of TUBE scheme and present a review of typical reputation attacks. The TUBE scheme supports the MANET nodes operations allowing assessment of the nodes surrounding and use of this information to increase the safety and efficiency...
Mobile Ad-Hoc networks (MANET) are widely used for data communication between mobile nodes on the digital battlefield. Clustering has evolved as an important research topic in military MANETs in reference to supporting the ability of C4I system reconfiguration in highly dynamic operation. Clustering is a process that divides the network nodes into groups according to the command system. Each cluster...
With the aim of achieving robust broadcasting, the paper explores how the terrain affects different MPR-based broadcast methods. As a reference we consider the MPR selection method in OLSR and investigate methods for increasing robustness by the using of physical layer information and additional MPRs. It is also important to consider the overhead of these methods. To assess how terrain properties...
The rapid uptake of smart mobile devices such as smartphones and the use of apps has been the great communication disruptor in civilian life in since 2007. This change has enabled always on and easy to use access to vast amounts of data and information, ranging from mapping via social media through to constant news updates and streaming media. This disruption is also rapidly spreading from the civilian...
In this paper the authors present an approach to the interpretation and distribution of geo-referenced information about road events for the purpose of road traffic shaping in the INSIGMA system. Particular focus was paid to the architecture and development of Registration, Distribution and Displaying Road Information on Variable Message Signs that implements the proposed mechanism. Created subsystem...
Cognitive Radio is often promoted to be a promising solution for the spectrum scarcity problem. Hence, a lot of research activities in both the civilian and the military world focus on introducing cognitive radio technology into modern networks. Besides the obvious changes in the radio architecture (sensing capability, cognitive engine), this combination of technologies also poses new challenges to...
Alternate clocking of linear feedback shift registers is the popular technique used to increase the linear complexity of binary sequences produced by keystream generators designed for stream ciphers. The analysis of the best known attacks on the alternating step generator led us to add nonlinear filtering functions and the nonlinear scrambler to the construction. In this paper we give complexities...
The Multilateral Interoperability Programme (MIP), comprising 26 nations and NATO, has developed the MIP Information Model (MIM) to support semantic interoperability across C2 systems. The MIM is a platform-independent model in UML that focuses on describing semantic concepts rather than mandating a specific technical implementation. In this paper, we give an overview of the objectives and the scope...
In tactical networks, the quality of service of flows which demand an assured data rate requires connection admission control, and this process can be strongly improved by coupling it with QoS-oriented routing. The TACOMS phase 2 intelligent routing solution does not only choose paths according to their ability to provide a specified data rate, it can also select the route of a flow as a function...
FMN and other programs for making joint information networks are important, valuable efforts for future military missions. The architectural views of FMN have so far mostly been concentrated around “higher level” views, like operational benefits and sharing of information services. In this paper, we briefly describe how the underlying communications infrastructure of an FMN network can be implemented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.