26,904 Hits in 8.6 sec

Challenges for network aspects of Cognitive Radio

Stefan Couturier, Jaroslaw Krygier, Ole Ingar Bentstuen, Vincent Le Nir
2015 2015 International Conference on Military Communications and Information Systems (ICMCIS)  
The analysis is carried out in terms of specific requirements for military networks.  ...  We consider architectural features of infrastructure and ad hoc networks, and we analyse their influence on the control channel.  ...  The next problem with CRAHN routing is that the fixed common control channel (CCC) used in traditional routing protocols is infeasible.  ... 
doi:10.1109/icmcis.2015.7158680 fatcat:mvjcfcwhqvajdbooqc6mg54gnq

End-to-end optimization for tactical cognitive radio networks

Stefan Couturier, Timo Braysy, Boyd Buchin, Jaroslaw Krygier, Vincent Le Nir, Niels Smit, Topi Tuukkanen, Erik Verheul
2018 2018 International Conference on Military Communications and Information Systems (ICMCIS)  
Dynamic adaptations of the whole protocol stack are required, especially on the network layer.  ...  Cognitive Radio Networks go one step further, as they do not only consider the link to the next node but focus on end-to-end optimization.  ...  All of the above-listed routing protocols are standard MANET protocols (mostly reactive) with extended metric calculation that consider specific CRN behavior.  ... 
doi:10.1109/icmcis.2018.8398705 fatcat:eonrzh55gjchxch33b5d6sief4

Cyber Security Challenges in Future Military Battlefield Information Networks

Dulik, Dulik (jr.)
2019 Advances in Military Technology  
The article also shortly illustrates the development of electronic military warfare towards cyber military warfare.  ...  This paper explains the evolution of technology from obsolete military battlefield networks towards the global military battlefield information network from information and cyber security point of view  ...  access -the problem in this case is using standard user credentials with granted administrative privileges.  ... 
doi:10.3849/aimt.01248 fatcat:wmhodojkcrcmpfrfndcn7wbwbu

Cryptographic protection of classified information in military radio communication faced with threats from quantum computers

Robert Wicik, Mariusz Borowski, Piotr Kaniewski, Jan Matuszewski
2020 Radioelectronic Systems Conference 2019  
In the area of information security, cryptographic protocols and algorithms with their operating modes and profiles specifying the specifics of their use are standardized within NATO, including those dedicated  ...  These projects must take into account the specifics of radio transmission in poor propagation conditions and with intentional interferences.  ...  The Grover algorithm can be used to find collisions for cryptographic hash functions, with complexity being the square root of the complexity resulting from the length of the hash generated by the function  ... 
doi:10.1117/12.2565467 fatcat:kmwnhryvi5fwbk4py35d6xkkty

Testing Methods of Checking the Correctness of Information Processing in the Avionic systems Integrated Along the Digital Databus MIL-1553B

Sławomir Michalak, Andrzej Szelmanowski, Grzegorz Wudel
2007 Research Works of Air Force Institute of Technology  
In addition, standards procedures applicable to check correctness of data processing to the standard MIL-STD-1553B are also outlined.  ...  The general part of the study deals with basic properties of the MIL-1553B databus and typical methods that are used to protect it from possible damages.  ...  Tests of data transmission protocols are intended to check the protocol of a remote terminal and the protocol of the bus controller.  ... 
doi:10.2478/v10041-008-0006-2 fatcat:rjbkhvw5hnahzf7smb4akrsfci

Internetting tactical security sensor systems

Douglas W. Gage, W. D. Bryan, Hoa G. Nguyen, Raja Suresh
1998 Digitization of the Battlespace III  
In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control stations.  ...  The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols  ...  ACKNOWLEDGEMENTS This work has been performed under the Tactical Security Sensor Internetting and Integration (TSSII) Exploratory Development (6.2) project sponsored by the Defense Special Weapons Agency  ... 
doi:10.1117/12.317683 fatcat:vgvyvhp4pffplfauj57n6nrpca

Cursor on Target: Research for a Sensor Network

Greer Stevenson, Melissa Naiman, Andrew Boyd, Annette L. Valenta
2012 Online Journal of Public Health Informatics  
The "a" in the type line indicates the "atoms branch of the tree" defining detailed types given in Military Standards 2525B specification.  ...  The new protocol contains provisions for advanced encryption standards, multiple-in multiple-out channels, and quality of service standards during transmissions.  ... 
doi:10.5210/ojphi.v4i3.4275 pmid:23569647 pmcid:PMC3615829 fatcat:saqxkklasjg3hcaofpizkxqgsm

Security of communication in the special communications systems

Grzegorz Różański, Piotr Kaniewski, Jan Matuszewski
2020 Radioelectronic Systems Conference 2019  
Attention was drawn to various concepts and solutions of organization of communication systems in order to ensure the communication systems of the Armed Forces ready for the implementation of specific  ...  NATO strategies for secure communication in networks were presented, and the importance and role of SCIP (Secure Communications Interoperability Protocol) for End-to-End communication by heterogeneous  ...  the use of the SCIP protocol also for the transmission of multimedia services in military (but not only) communication systems in a heterogeneous environment.  ... 
doi:10.1117/12.2565307 fatcat:bv5flstzinbw5gqwgc4nas2vb4

Centralized vs distributed communication scheme on Switched Ethernet for embedded military applications

Ahlem Mifdaoui, Fabrice Frances, Christian Fraboul
2009 2009 IEEE International Symposium on Industrial Embedded Systems  
The paper includes the functional description of each proposed communication network and a military avionic application to highlight proposals ability to support the required time constrained communications  ...  Current military communication network is a generation old and is no longer effective in meeting the emerging requirements imposed by the future embedded military applications.  ...  This protocol presents significant interests compared to EtherCAT and EPL thanks to its optimized transmission control (MasterlMulti-slaves), its flexibility and its compatibility with 802.3 protocol.  ... 
doi:10.1109/sies.2009.5196216 dblp:conf/sies/MifdaouiFF09 fatcat:23uhbezlfnaknakbvvylxzg7we

Energy Efficient MANET Protocol Using Cross Layer Design for Military Applications

Mamata Rath, Binod Kumar Pattanayak, Bibudhedu Pati
2016 Defence Science Journal  
With this objective, a power efficient network layer routing protocol in the network for military application is designed and simulated using a new cross layer approach of design to increase reliability  ...  Therefore there is a high demand of designing efficient routing protocols ensuring security and reliability for successful transmission of highly sensitive and confidential military information in defence  ...  In the current study, technical review of the system in this research work and simulation approaches are suggested by him.  ... 
doi:10.14429/dsj.66.9705 fatcat:pqnjropupzccnkjm3j37pke43e

Network protocols for mobile robot systems

Douglas W. Gage, Douglas W. Gage
1998 Mobile Robots XII  
The proliferation of Internet-like networks in military as well as civilian domains has motivated research to address some of the performance limitations TCP suffers when using RF and other media with  ...  In addition, a Session layer protocol is planned to support the effective transfer of control of multiple platforms among multiple control stations.  ...  ACKNOWLEDGEMENTS This work has been performed under the Tactical Security Sensor Internetting and Integration (TSSII) Exploratory Development (6.2) project sponsored by the Defense Special Weapons Agency  ... 
doi:10.1117/12.299558 dblp:conf/mr/Gage97 fatcat:7gs2snj7nfhydbtxdg4ofcfz3m

Communications middleware for tactical environments: Observations, experiences, and lessons learned

N. Suri, E. Benvegnu, M. Tortonesi, C. Stefanelli, J. Kovach, J. Hanna
2009 IEEE Communications Magazine  
the data needed, and completing and reviewing the collection of information.  ...  Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching data sources, gathering and maintaining  ...  Researchers have also proposed new transport protocols such as the Stream Control Transport Protocol (SCTP) [2] , the Transport Protocol of the Space Communications Protocol Standards (SCPS-TP) [3] ,  ... 
doi:10.1109/mcom.2009.5273809 fatcat:bp33wv52gvcxtlwnxrw3ybug6y

Algorithms for Adapting Communication Protocols of Fanet Networks

Gleb S. Vasilyev, Dmitry I. Surzhik, Oleg R. Kuzichkin, Igor A. Kurilov
2020 Journal of Software  
The directions of further work on the development of new adaptive protocols aimed at building FANET networks with improved characteristics are determined. Journal of Software Gleb S.  ...  , failure of one or more control centers.  ...  on adaptation of transmission mode parameters at different levels of network interaction"  ... 
doi:10.17706/jsw.15.4.114-122 fatcat:u4gs5gsqxveftoyappgsiy4yxa

A Study of WSN and Analysis of Packet Drop During Transmission

Nagma Shakeel, M.Tech Research Scholar, Department of Computer Science & Engineering, Integral University, Lucknow, India, Mohd Haroon, Faiyaz Ahmad, Associate Professor, Department of Computer Science & Engineering, Integral University, Lucknow, India, Assistant Professor, Department of Computer Science & Engineering, Integral University, Lucknow, India
2021 International Journal of Innovative Research in Computer Science & Technology  
Many protocols for WSN to extend the presence of the network have been established to solve this problem.  ...  In the energy efficiency of WSN networks, routing protocols play an important role since they help minimize power usage and response time and provide sensor networks with high data density and service  ...  densities were demonstrated. to mitigate this problem, the effectiveness of some of the prevalent approaches was applied and simulation conclusions were used to authenticate the study. compared with ad-hoc  ... 
doi:10.21276/ijircst.2021.9.2.11 fatcat:px2qhq4epfdoxbgshunhg2vocy

An Opportunistic Pervasive Networking Paradigm: Multi-Hop Cognitive Radio Networks [chapter]

Didem Gözüpek, Fatih Alagöz
2011 Pervasive Computing and Networking  
Finally, we point out open research issues with regard to the MAC design of these networks. 1  ...  However, the multi-hop nature of the network coupled with the varying spectrum availability owing to the opportunistic spectrum access introduce many design challenges.  ...  Owing to this heterogeneity in the transmission range, the scalability and connectivity of the network is subject to change in accordance with the control channel since a channel with a shorter transmission  ... 
doi:10.1002/9781119970422.ch7 fatcat:ykxo4tdbf5c4zpawsq7ajj7taq
« Previous Showing results 1 — 15 out of 26,904 results