A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Challenges for network aspects of Cognitive Radio
2015
2015 International Conference on Military Communications and Information Systems (ICMCIS)
The analysis is carried out in terms of specific requirements for military networks. ...
We consider architectural features of infrastructure and ad hoc networks, and we analyse their influence on the control channel. ...
The next problem with CRAHN routing is that the fixed common control channel (CCC) used in traditional routing protocols is infeasible. ...
doi:10.1109/icmcis.2015.7158680
fatcat:mvjcfcwhqvajdbooqc6mg54gnq
End-to-end optimization for tactical cognitive radio networks
2018
2018 International Conference on Military Communications and Information Systems (ICMCIS)
Dynamic adaptations of the whole protocol stack are required, especially on the network layer. ...
Cognitive Radio Networks go one step further, as they do not only consider the link to the next node but focus on end-to-end optimization. ...
All of the above-listed routing protocols are standard MANET protocols (mostly reactive) with extended metric calculation that consider specific CRN behavior. ...
doi:10.1109/icmcis.2018.8398705
fatcat:eonrzh55gjchxch33b5d6sief4
Cyber Security Challenges in Future Military Battlefield Information Networks
2019
Advances in Military Technology
The article also shortly illustrates the development of electronic military warfare towards cyber military warfare. ...
This paper explains the evolution of technology from obsolete military battlefield networks towards the global military battlefield information network from information and cyber security point of view ...
access -the problem in this case is using standard user credentials with granted administrative privileges. ...
doi:10.3849/aimt.01248
fatcat:wmhodojkcrcmpfrfndcn7wbwbu
Cryptographic protection of classified information in military radio communication faced with threats from quantum computers
2020
Radioelectronic Systems Conference 2019
In the area of information security, cryptographic protocols and algorithms with their operating modes and profiles specifying the specifics of their use are standardized within NATO, including those dedicated ...
These projects must take into account the specifics of radio transmission in poor propagation conditions and with intentional interferences. ...
The Grover algorithm can be used to find collisions for cryptographic hash functions, with complexity being the square root of the complexity resulting from the length of the hash generated by the function ...
doi:10.1117/12.2565467
fatcat:kmwnhryvi5fwbk4py35d6xkkty
Testing Methods of Checking the Correctness of Information Processing in the Avionic systems Integrated Along the Digital Databus MIL-1553B
2007
Research Works of Air Force Institute of Technology
In addition, standards procedures applicable to check correctness of data processing to the standard MIL-STD-1553B are also outlined. ...
The general part of the study deals with basic properties of the MIL-1553B databus and typical methods that are used to protect it from possible damages. ...
Tests of data transmission protocols are intended to check the protocol of a remote terminal and the protocol of the bus controller. ...
doi:10.2478/v10041-008-0006-2
fatcat:rjbkhvw5hnahzf7smb4akrsfci
Internetting tactical security sensor systems
1998
Digitization of the Battlespace III
In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control stations. ...
The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols ...
ACKNOWLEDGEMENTS This work has been performed under the Tactical Security Sensor Internetting and Integration (TSSII) Exploratory Development (6.2) project sponsored by the Defense Special Weapons Agency ...
doi:10.1117/12.317683
fatcat:vgvyvhp4pffplfauj57n6nrpca
Cursor on Target: Research for a Sensor Network
2012
Online Journal of Public Health Informatics
The "a" in the type line indicates the "atoms branch of the tree" defining detailed types given in Military Standards 2525B specification. ...
The new protocol contains provisions for advanced encryption standards, multiple-in multiple-out channels, and quality of service standards during transmissions. ...
doi:10.5210/ojphi.v4i3.4275
pmid:23569647
pmcid:PMC3615829
fatcat:saqxkklasjg3hcaofpizkxqgsm
Security of communication in the special communications systems
2020
Radioelectronic Systems Conference 2019
Attention was drawn to various concepts and solutions of organization of communication systems in order to ensure the communication systems of the Armed Forces ready for the implementation of specific ...
NATO strategies for secure communication in networks were presented, and the importance and role of SCIP (Secure Communications Interoperability Protocol) for End-to-End communication by heterogeneous ...
the use of the SCIP protocol also for the transmission of multimedia services in military (but not only) communication systems in a heterogeneous environment. ...
doi:10.1117/12.2565307
fatcat:bv5flstzinbw5gqwgc4nas2vb4
Centralized vs distributed communication scheme on Switched Ethernet for embedded military applications
2009
2009 IEEE International Symposium on Industrial Embedded Systems
The paper includes the functional description of each proposed communication network and a military avionic application to highlight proposals ability to support the required time constrained communications ...
Current military communication network is a generation old and is no longer effective in meeting the emerging requirements imposed by the future embedded military applications. ...
This protocol presents significant interests compared to EtherCAT and EPL thanks to its optimized transmission control (MasterlMulti-slaves), its flexibility and its compatibility with 802.3 protocol. ...
doi:10.1109/sies.2009.5196216
dblp:conf/sies/MifdaouiFF09
fatcat:23uhbezlfnaknakbvvylxzg7we
Energy Efficient MANET Protocol Using Cross Layer Design for Military Applications
2016
Defence Science Journal
With this objective, a power efficient network layer routing protocol in the network for military application is designed and simulated using a new cross layer approach of design to increase reliability ...
Therefore there is a high demand of designing efficient routing protocols ensuring security and reliability for successful transmission of highly sensitive and confidential military information in defence ...
In the current study, technical review of the system in this research work and simulation approaches are suggested by him. ...
doi:10.14429/dsj.66.9705
fatcat:pqnjropupzccnkjm3j37pke43e
Network protocols for mobile robot systems
1998
Mobile Robots XII
The proliferation of Internet-like networks in military as well as civilian domains has motivated research to address some of the performance limitations TCP suffers when using RF and other media with ...
In addition, a Session layer protocol is planned to support the effective transfer of control of multiple platforms among multiple control stations. ...
ACKNOWLEDGEMENTS This work has been performed under the Tactical Security Sensor Internetting and Integration (TSSII) Exploratory Development (6.2) project sponsored by the Defense Special Weapons Agency ...
doi:10.1117/12.299558
dblp:conf/mr/Gage97
fatcat:7gs2snj7nfhydbtxdg4ofcfz3m
Communications middleware for tactical environments: Observations, experiences, and lessons learned
2009
IEEE Communications Magazine
the data needed, and completing and reviewing the collection of information. ...
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching data sources, gathering and maintaining ...
Researchers have also proposed new transport protocols such as the Stream Control Transport Protocol (SCTP) [2] , the Transport Protocol of the Space Communications Protocol Standards (SCPS-TP) [3] , ...
doi:10.1109/mcom.2009.5273809
fatcat:bp33wv52gvcxtlwnxrw3ybug6y
Algorithms for Adapting Communication Protocols of Fanet Networks
2020
Journal of Software
The directions of further work on the development of new adaptive protocols aimed at building FANET networks with improved characteristics are determined. Journal of Software Gleb S. ...
, failure of one or more control centers. ...
on adaptation of transmission mode parameters at different levels of network interaction" ...
doi:10.17706/jsw.15.4.114-122
fatcat:u4gs5gsqxveftoyappgsiy4yxa
A Study of WSN and Analysis of Packet Drop During Transmission
2021
International Journal of Innovative Research in Computer Science & Technology
Many protocols for WSN to extend the presence of the network have been established to solve this problem. ...
In the energy efficiency of WSN networks, routing protocols play an important role since they help minimize power usage and response time and provide sensor networks with high data density and service ...
densities were demonstrated. to mitigate this problem, the effectiveness of some of the prevalent approaches was applied and simulation conclusions were used to authenticate the study. compared with ad-hoc ...
doi:10.21276/ijircst.2021.9.2.11
fatcat:px2qhq4epfdoxbgshunhg2vocy
An Opportunistic Pervasive Networking Paradigm: Multi-Hop Cognitive Radio Networks
[chapter]
2011
Pervasive Computing and Networking
Finally, we point out open research issues with regard to the MAC design of these networks. 1 ...
However, the multi-hop nature of the network coupled with the varying spectrum availability owing to the opportunistic spectrum access introduce many design challenges. ...
Owing to this heterogeneity in the transmission range, the scalability and connectivity of the network is subject to change in accordance with the control channel since a channel with a shorter transmission ...
doi:10.1002/9781119970422.ch7
fatcat:ykxo4tdbf5c4zpawsq7ajj7taq
« Previous
Showing results 1 — 15 out of 26,904 results