59 research outputs found

    Considerations on the Adoption of Named Data Networking (NDN) in Tactical Environments

    Get PDF
    Mobile military networks are uniquely challenging to build and maintain, because of their wireless nature and the unfriendliness of the environment, resulting in unreliable and capacity limited performance. Currently, most tactical networks implement TCP/IP, which was designed for fairly stable, infrastructure-based environments, and requires sophisticated and often application-specific extensions to address the challenges of the communication scenario. Information Centric Networking (ICN) is a clean slate networking approach that does not depend on stable connections to retrieve information and naturally provides support for node mobility and delay/disruption tolerant communications - as a result it is particularly interesting for tactical applications. However, despite ICN seems to offer some structural benefits for tactical environments over TCP/IP, a number of challenges including naming, security, performance tuning, etc., still need to be addressed for practical adoption. This document, prepared within NATO IST-161 RTG, evaluates the effectiveness of Named Data Networking (NDN), the de facto standard implementation of ICN, in the context of tactical edge networks and its potential for adoption

    A framework and mathematical modeling for the vehicular delay tolerant network routing

    Get PDF
    Vehicular ad hoc networks (VANETs) are getting growing interest as they are expected to play crucial role in making safer, smarter, and more efficient transportation networks. Due to unique characteristics such as sparse topology and intermittent connectivity, Delay Tolerant Network (DTN) routing in VANET becomes an inherent choice and is challenging. However, most of the existing DTN protocols do not accurately discover potential neighbors and, hence, appropriate intermediate nodes for packet transmission. Moreover, these protocols cause unnecessary overhead due to excessive beacon messages. To cope with these challenges, this paper presents a novel framework and an Adaptive Geographical DTN Routing (AGDR) for vehicular DTNs. AGDR exploits node position, current direction, speed, and the predicted direction to carefully select an appropriate intermediate node. Direction indicator light is employed to accurately predict the vehicle future direction so that the forwarding node can relay packets to the desired destination. Simulation experiments confirm the performance supremacy of AGDR compared to contemporary schemes in terms of packet delivery ratio, overhead, and end-to-end delay. Simulation results demonstrate that AGDR improves the packet delivery ratio (5-7%), reduces the overhead (1-5%), and decreases the delay (up to 0.02 ms). Therefore, AGDR improves route stability by reducing the frequency of route failures. © 2016 Mostofa Kamal Nasir et al

    Topology-aware optimal task allocation framework for mission critical environment: Centralized and decentralized approaches

    Get PDF
    A Mission Critical Environment (MCE) consists of error-prone, highly variable, and highly rate limited communication channels. Paradoxically, this environment substantially increases the need to perform Optimal Task Allocation (OTA), while at the same time making it much harder to perform OTA efficiently. To perform OTA in MCE, in this thesis, I have proposed two novel automated algorithms. The first algorithm is called Centralized Optimal Task Allocation Algorithm (COTAA), where I consider OTA for publish/subscribe-based MCE since it has unique characteristics such as high level publish/subscribe node and task differentiation and high scalability. I also propose an architectural framework and communication protocols emphasizing the unique challenges of MCE. I adopt well known Hungarian Algorithm and Rectangular Assignment Algorithm to solve the OTA problem in polynomial time. The second algorithm is called Decentralized Optimal Task Allocation Algorithm (DOTAA) which exploits the concept of application-layer Distributed Hash Table (DHT) to perform OTA in MCE. Through simulations, I evaluate the performance of both COTAA and DOTAA for multiple mission critical scenarios. The results indicate that both COTAA and DOTAA achieve the goal of OTA in highly dynamic MCEs, with low processing time and communication overhead

    Cloudlet computing : recent advances, taxonomy, and challenges

    Get PDF
    A cloudlet is an emerging computing paradigm that is designed to meet the requirements and expectations of the Internet of things (IoT) and tackle the conventional limitations of a cloud (e.g., high latency). The idea is to bring computing resources (i.e., storage and processing) to the edge of a network. This article presents a taxonomy of cloudlet applications, outlines cloudlet utilities, and describes recent advances, challenges, and future research directions. Based on the literature, a unique taxonomy of cloudlet applications is designed. Moreover, a cloudlet computation offloading application for augmenting resource-constrained IoT devices, handling compute-intensive tasks, and minimizing the energy consumption of related devices is explored. This study also highlights the viability of cloudlets to support smart systems and applications, such as augmented reality, virtual reality, and applications that require high-quality service. Finally, the role of cloudlets in emergency situations, hostile conditions, and in the technological integration of future applications and services is elaborated in detail. © 2013 IEEE

    The Design of Secure Mobile Databases: An Evaluation of Alternative Secure Access Models

    Get PDF
    This research considers how mobile databases can be designed to be both secure and usable. A mobile database is one that is accessed and manipulated via mobile information devices over a wireless medium. A prototype mobile database was designed and then tested against secure access control models to determine if and how these models performed in securing a mobile database. The methodology in this research consisted of five steps. Initially, a preliminary analysis was done to delineate the environment the prototypical mobile database would be used in. Requirements definitions were established to gain a detailed understanding of the users and function of the database system. Conceptual database design was then employed to produce a database design model. In the physical database design step, the database was denormalized in order to reflect some unique computing requirements of the mobile environment. Finally, this mobile database design was tested against three secure access control models and observations made

    Annual Report 2014

    Get PDF
    This report highlights salient features and activities across the spectrum of NPS research activities conducted on behalf of both Navy and Marine Corps topic sponsors during the 2014 fiscal year. Each of the 90 research projects’ executive summary included herein outlines key results. While most of the summaries detail final results, some projects have multi-year project lengths and, therefore, progress to date is reported

    Études des systèmes de communications sans-fil dans un environnement rural difficile

    Get PDF
    Les systèmes de communication sans fil, ayant de nombreux avantages pour les zones rurales, peuvent aider la population à bien s'y établir au lieu de déménager vers les centres urbains, accentuant ainsi les problèmes d’embouteillage, de pollution et d’habitation. Pour une planification et un déploiement efficace de ces systèmes, l'atténuation du signal radio et la réussite des liens d’accès doivent être envisagées. Ce travail s’intéresse à la provision d’accès Internet sans fil dans le contexte rural canadien caractérisé par sa végétation dense et ses variations climatiques extrêmes vu que les solutions existantes sont plus concentrées sur les zones urbaines. Pour cela, nous étudions plusieurs cas d’environnements difficiles affectant les performances des systèmes de communication. Ensuite, nous comparons les systèmes de communication sans fil les plus connus. Le réseau sans fil fixe utilisant le Wi-Fi ayant l’option de longue portée est choisi pour fournir les communications aux zones rurales. De plus, nous évaluons l'atténuation du signal radio, car les modèles existants sont conçus, en majorité, pour les technologies mobiles en zones urbaines. Puis, nous concevons un nouveau modèle empirique pour les pertes de propagation. Des approches utilisant l’apprentissage automatique sont ensuite proposées, afin de prédire le succès des liens sans fil, d’optimiser le choix des points d'accès et d’établir les limites de validité des paramètres des liens sans fil fiables. Les solutions proposées font preuve de précision (jusqu’à 94 % et 8 dB RMSE) et de simplicité, tout en considérant une multitude de paramètres difficiles à prendre en compte tous ensemble avec les solutions classiques existantes. Les approches proposées requièrent des données fiables qui sont généralement difficiles à acquérir. Dans notre cas, les données de DIGICOM, un fournisseur Internet sans fil en zone rurale canadien, sont utilisées. Wireless communication systems have many advantages for rural areas, as they can help people settle comfortably and conveniently in these regions instead of relocating to urban centers causing various overcrowding, habitation, and pollution problems. For effective planning and deployment of these technologies, the attenuation of the radio signal and the success of radio links must be precisely predicted. This work examines the provision of wireless internet access in the Canadian rural context, characterized by its dense vegetation and its extreme climatic variations, since existing solutions are more focused on urban areas. Hence, we study several cases of difficult environments affecting the performances of communication systems. Then, we compare the best-known wireless communication systems. The fixed wireless network using Wi-Fi, having the long-range option, is chosen to provide wireless access to rural areas. Moreover, we evaluate the attenuation of the radio signal, since the existing path loss models are generally designed for mobile technologies in urban areas. Then, we design a new path loss empirical model. Several approaches are then proposed by using machine learning to predict the success of wireless links, optimize the choice of access points and establish the validity limits for the pertinent parameters of reliable wireless connections. The proposed solutions are characterized by their accuracy (up to 94% and 8 dB RMSE) and simplicity while considering a wide range of parameters that are difficult to consider all together with conventional solutions. These approaches require reliable data, which is generally difficult to acquire. In our case, the dataset from DIGICOM, a rural Canadian wireless internet service provider, is used

    Satellite Networks: Architectures, Applications, and Technologies

    Get PDF
    Since global satellite networks are moving to the forefront in enhancing the national and global information infrastructures due to communication satellites' unique networking characteristics, a workshop was organized to assess the progress made to date and chart the future. This workshop provided the forum to assess the current state-of-the-art, identify key issues, and highlight the emerging trends in the next-generation architectures, data protocol development, communication interoperability, and applications. Presentations on overview, state-of-the-art in research, development, deployment and applications and future trends on satellite networks are assembled

    Protecting the Protector: Mapping the Key Terrain that Supports the Continuous Monitoring Mission of a Cloud Cybersecurity Service Provider

    Get PDF
    Key terrain is a concept that is relevant to warfare, military strategy, and tactics. A good general maps out terrain to identify key areas to protect in support of a mission (i.e., a bridge allowing for mobility of supplies and reinforcements). Effective ways to map terrain in Cyberspace (KT-C) has been an area of interest for researchers in Cybersecurity ever since the Department of Defense designated Cyberspace as a warfighting domain. The mapping of KT-C for a mission is accomplished by putting forth efforts to understand and document a mission\u27s dependence on Cyberspace and cyber assets. A cloud Cybersecurity Service Provider (CSSP) continuously monitors the network infrastructure of an information system in the cloud ensuring its security posture is within acceptable risk. This research is focused on mapping the key terrain that supports the continuous monitoring mission of a cloud CSSP. Traditional methods to map KT-C have been broad. Success has been difficult to achieve due to the unique nature of the Cyberspace domain when compared to traditional warfighting domains. This work focuses on a specific objective or mission within cyberspace. It is a contextual approach to identify and map key terrain in cyberspace. Mapping is accomplished through empirical surveys conducted on Cybersecurity professionals with various years of experience working in a cloud or CSSP environment. The background of the Cybersecurity professionals participating in the survey will include United States Government personnel/contractors, and other Cybersecurity practitioners in the private sector. This process provided an approach to identify and map key terrain in a contextual manner specific to the mission of a typical cloud CSSP. Practitioners can use it as a template for their specific cloud CSSP mission
    corecore