217 research outputs found

    Hastily Formed Networks (HFN) As an Enabler for the Emergency Response Community

    Get PDF
    The effects of natural or manmade disasters in communications infrastructures are so severe that immediately after the disaster the emergency responders are unable to use them. In addition, some areas do not have any useful infrastructure at all. To bridge this gap in communications, a need exists for a reliable technology not dependent on the existing infrastructure. This thesis focuses on first identifying the problem of communications gaps during natural or manmade disasters and reviewing the impact and potential benefit of implementing a solution based on the Hastily Formed Networks (HFN) model. The research explores the different technological solutions to solve this problem by evaluating documentation for commercial off-the-shelf technologies (COTS). Additionally, the thesis reviews the results of field experimentation conducted to evaluate the performance of these technologies in the field. The ultimate goal is to introduce the HFN concept as an enabler for the Emergency Response Community (ERC). Throughout this research, the focus revolves around testing COTS technologies. The research provides emergency responders with the background knowledge to make decisions on how to best bridge the gap of lack of communications under austere environments, and therefore enable them to provide better response.http://archive.org/details/hastilyformednet109456762Lieutenant Commander, United States Nav

    A Conceptual Model for Network Decision Support Systems

    Get PDF
    We introduce the concept of a network DSS (NWDSS) consisting of fluid, heterogeneous nodes of human and machine agents, connected by wireless technology, which may enter and leave the network at unpredictable times, yet must also cooperate in decision-making activities. We describe distinguishing properties of the NWDSS and propose a 3-tier conceptual model comprised of digital infrastructure, transactive memory systems and emergent collaborative decision-making. We suggest a decision loop of Sense-Analyze-Adapt-Memory leveraging TMS as a starting point for addressing the agile collaborative requirements of emergent decision-making. Several examples of innovative NWDSS services are presented from Naval Postgraduate School field experiments

    Fighting the network: MANET management in support of littoral operations

    Get PDF
    Advances in computer processing and communications capabilities have contributed to the recent explosion of mesh network technologies. These technologies’ operational benefits are of particular interest for those operating in the littorals. The dynamic complexities of the littorals force tactical decision-makers to adapt to a constantly changing battlespace in a constrained temporal and spatial environment. Ongoing research into the integration of unmanned systems and sensors as mobile ad-hoc network (MANET) nodes highlights the significant potential to improve situational awareness and force efficiency in the littoral environment. However, difficulties associated with tactical network operations and management make the littorals particularly challenging. There remains a need for a unified approach to managing these networks in a coherent and effective manner. The complexity of the littorals emphasizes the inherent interconnectedness of MANET management and command and control (C2). As a result, new and innovative approaches to C2 are also required. This thesis explores the value of modern network management systems as they contribute to the richness of the human-network interface, as well as the integration of network management and maneuver at the tactical level. The result is a proposal for a novel framework for littoral MANET management and C2 as a corollary of cyber-physical maneuver.http://archive.org/details/fightingnetworkm1094548561Outstanding ThesisLieutenant, United States NavyApproved for public release; distribution is unlimited

    Considerations on the Adoption of Named Data Networking (NDN) in Tactical Environments

    Get PDF
    Mobile military networks are uniquely challenging to build and maintain, because of their wireless nature and the unfriendliness of the environment, resulting in unreliable and capacity limited performance. Currently, most tactical networks implement TCP/IP, which was designed for fairly stable, infrastructure-based environments, and requires sophisticated and often application-specific extensions to address the challenges of the communication scenario. Information Centric Networking (ICN) is a clean slate networking approach that does not depend on stable connections to retrieve information and naturally provides support for node mobility and delay/disruption tolerant communications - as a result it is particularly interesting for tactical applications. However, despite ICN seems to offer some structural benefits for tactical environments over TCP/IP, a number of challenges including naming, security, performance tuning, etc., still need to be addressed for practical adoption. This document, prepared within NATO IST-161 RTG, evaluates the effectiveness of Named Data Networking (NDN), the de facto standard implementation of ICN, in the context of tactical edge networks and its potential for adoption

    INTEROPERABILITY FOR MODELING AND SIMULATION IN MARITIME EXTENDED FRAMEWORK

    Get PDF
    This thesis reports on the most relevant researches performed during the years of the Ph.D. at the Genova University and within the Simulation Team. The researches have been performed according to M&S well known recognized standards. The studies performed on interoperable simulation cover all the environments of the Extended Maritime Framework, namely Sea Surface, Underwater, Air, Coast & Land, Space and Cyber Space. The applications cover both the civil and defence domain. The aim is to demonstrate the potential of M&S applications for the Extended Maritime Framework, applied to innovative unmanned vehicles as well as to traditional assets, human personnel included. A variety of techniques and methodology have been fruitfully applied in the researches, ranging from interoperable simulation, discrete event simulation, stochastic simulation, artificial intelligence, decision support system and even human behaviour modelling

    Arctic Domain Awareness Center DHS Center of Excellence (COE): Project Work Plan

    Get PDF
    As stated by the DHS Science &Technology Directorate, “The increased and diversified use of maritime spaces in the Arctic - including oil and gas exploration, commercial activities, mineral speculation, and recreational activities (tourism) - is generating new challenges and risks for the U.S. Coast Guard and other DHS maritime missions.” Therefore, DHS will look towards the new ADAC for research to identify better ways to create transparency in the maritime domain along coastal regions and inland waterways, while integrating information and intelligence among stakeholders. DHS expects the ADAC to develop new ideas to address these challenges, provide a scientific basis, and develop new approaches for U.S. Coast Guard and other DHS maritime missions. ADAC will also contribute towards the education of both university students and mid-career professionals engaged in maritime security. The US is an Arctic nation, and the Arctic environment is dynamic. We have less multi-year ice and more open water during the summer causing coastal villages to experience unprecedented storm surges and coastal erosion. Decreasing sea ice is also driving expanded oil exploration, bringing risks of oil spills. Tourism is growing rapidly, and our fishing fleet and commercial shipping activities are increasing as well. There continues to be anticipation of an economic pressure to open up a robust northwest passage for commercial shipping. To add to the stresses of these changes is the fact that these many varied activities are spread over an immense area with little connecting infrastructure. The related maritime security issues are many, and solutions demand increasing maritime situational awareness and improved crisis response capabilities, which are the focuses of our Work Plan. UAA understands the needs and concerns of the Arctic community. It is situated on Alaska’s Southcentral coast with the port facility through which 90% of goods for Alaska arrive. It is one of nineteen US National Strategic Seaports for the US DOD, and its airport is among the top five in the world for cargo throughput. However, maritime security is a national concern and although our focus is on the Arctic environment, we will expand our scope to include other areas in the Lower 48 states. In particular, we will develop sensor systems, decision support tools, ice and oil spill models that include oil in ice, and educational programs that are applicable to the Arctic as well as to the Great Lakes and Northeast. The planned work as detailed in this document addresses the DHS mission as detailed in the National Strategy for Maritime Security, in particular, the mission to Maximize Domain Awareness (pages 16 and 17.) This COE will produce systems to aid in accomplishing two of the objectives of this mission. They are: 1) Sensor Technology developing sensor packages for airborne, underwater, shore-based, and offshore platforms, and 2) Automated fusion and real-time simulation and modeling systems for decision support and planning. An integral part of our efforts will be to develop new methods for sharing of data between platforms, sensors, people, and communities.United States Department of Homeland SecurityCOE ADAC Objective/Purpose / Methodology / Center Management Team and Partners / Evaluation and Transition Plans / USCG Stakeholder Engagement / Workforce Development Strategy / Individual Work Plan by Projects Within a Theme / Appendix A / Appendix B / Appendix

    Applications of agent architectures to decision support in distributed simulation and training systems

    Get PDF
    This work develops the approach and presents the results of a new model for applying intelligent agents to complex distributed interactive simulation for command and control. In the framework of tactical command, control communications, computers and intelligence (C4I), software agents provide a novel approach for efficient decision support and distributed interactive mission training. An agent-based architecture for decision support is designed, implemented and is applied in a distributed interactive simulation to significantly enhance the command and control training during simulated exercises. The architecture is based on monitoring, evaluation, and advice agents, which cooperate to provide alternatives to the dec ision-maker in a time and resource constrained environment. The architecture is implemented and tested within the context of an AWACS Weapons Director trainer tool. The foundation of the work required a wide range of preliminary research topics to be covered, including real-time systems, resource allocation, agent-based computing, decision support systems, and distributed interactive simulations. The major contribution of our work is the construction of a multi-agent architecture and its application to an operational decision support system for command and control interactive simulation. The architectural design for the multi-agent system was drafted in the first stage of the work. In the next stage rules of engagement, objective and cost functions were determined in the AWACS (Airforce command and control) decision support domain. Finally, the multi-agent architecture was implemented and evaluated inside a distributed interactive simulation test-bed for AWACS Vv\u27Ds. The evaluation process combined individual and team use of the decision support system to improve the performance results of WD trainees. The decision support system is designed and implemented a distributed architecture for performance-oriented management of software agents. The approach provides new agent interaction protocols and utilizes agent performance monitoring and remote synchronization mechanisms. This multi-agent architecture enables direct and indirect agent communication as well as dynamic hierarchical agent coordination. Inter-agent communications use predefined interfaces, protocols, and open channels with specified ontology and semantics. Services can be requested and responses with results received over such communication modes. Both traditional (functional) parameters and nonfunctional (e.g. QoS, deadline, etc.) requirements and captured in service requests

    Cyber Security of Critical Infrastructures

    Get PDF
    Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods
    • …
    corecore