234 research outputs found

    Information Operations and the Conduct of Land Warfare

    Get PDF
    This paper focuses on the implications of information operations (IO) on the U.S. Army\u27s conduct of land warfare over the next decade. This transitional period from the experimental Force XXI to the digitized Army XXI offers many promises, potentials and even pitfalls for the world\u27s predominant land power force. BG James M. Dubik, USA, has recognized this in his earlier Institute of Land Warfare paper Creating Combat Power for the 21st Century

    Military Theory and Information Warfare

    Get PDF

    Joint topology design with routing and power control in ad hoc networks

    Get PDF
    Cataloged from PDF version of article.We discuss the problem of designing an ad hoc network topology by jointly using power control and routing. A well-designed topology in ad hoc networks provides several advantages: increasing the capacity, decreasing the complexity and reducing the power consumption. We formulate the topology design problem as an Integer Linear Programming (ILP) model. An optimal topology is designed subject to interference and connectivity constraints with three different objective functions and two power control approaches. Common transmit power (COMPOW) and the adaptive power (ADPOW) are the two different power control techniques used in this thesis. The objectives of the models that are used in the topology design are maximizing the number of established links, using shortest path routing strategy and minimizing the maximum traffic load over the most congested link by load balancing. Performance comparisons between two power control approaches with three different objectives in the topology design are achieved using numerical results on a sample network. Minimum end-to-end throughput, total throughput, total power consumption and the number of established links are used as the performance metrics. The numerical results show that selecting the optimal power for both power control approaches provides similar performance results. Therefore, simplicity of the COMPOW makes it more attractive than ADPOW in the topology design.Önal, AydoğanM.S

    Coalition Battle Management Language (C-BML) Study Group Final Report

    Get PDF
    Interoperability across Modeling and Simulation (M&S) and Command and Control (C2) systems continues to be a significant problem for today\u27s warfighters. M&S is well-established in military training, but it can be a valuable asset for planning and mission rehearsal if M&S and C2 systems were able to exchange information, plans, and orders more effectively. To better support the warfighter with M&S based capabilities, an open standards-based framework is needed that establishes operational and technical coherence between C2 and M&S systems

    Improving the performance of a dismounted Future Force Warrior by means of C4I2SR

    Get PDF
    This thesis comprises seven peer-reviewed articles and examines systems and applications suitable for increasing Future Force Warrior performance, minimizing collateral damage, improving situational awareness and Common Operational Picture. Based on a literature study, missing functionalities of Future Force Warrior were identified and new ideas, concepts and solutions were created as part of early stages of Systems of Systems creation. These introduced ideas have not yet been implemented or tested in combat and for this reason benefit analyses are excluded. The main results of this thesis include the following: A new networking concept, Wireless Polling Sensor Network, which is a swarm of a few Unmanned Aerial Vehicles forming an ad-hoc network and polling a large number of fixed sensor nodes. The system is more robust in a military environment than traditional Wireless Sensor Networks. A Business Process approach to Service Oriented Architecture in a tactical setting is a concept for scheduling and sharing limited resources. New components to military Service Oriented Architecture have been introduced in the thesis. Other results of the thesis include an investigation of the use of Free Space Optics in tactical communications, a proposal for tracking neutral forces, a system for upgrading simple collaboration tools for command, control and collaboration purposes, a three-level hierarchy of Future Force Warrior, and methods for reducing incidents of fratricide

    Factors Impacting Key Management Effectiveness in Secured Wireless Networks

    Get PDF
    The use of a Public Key Infrastructure (PKI) offers a cryptographic solution that can overcome many, but not all, of the MANET security problems. One of the most critical aspects of a PKI system is how well it implements Key Management. Key Management deals with key generation, key storage, key distribution, key updating, key revocation, and certificate service in accordance with security policies over the lifecycle of the cryptography. The approach supported by traditional PKI works well in fixed wired networks, but it may not appropriate for MANET due to the lack of fixed infrastructure to support the PKI. This research seeks to identify best practices in securing networks which may be applied to new network architectures
    corecore