157 research outputs found

    Wireless Sensor Networks and Real-Time Locating Systems to Fight against Maritime Piracy

    Get PDF
    There is a wide range of military and civil applications where Wireless Sensor Networks (WSNs) and Multi-Agent Systems (MASs) can be used for providing context-awareness for troops and special corps. On the one hand, WSNs comprise an ideal technology to develop Real-Time Locating Systems (RTLSs) aimed at indoor environments, where existing global navigation satellite systems do not work properly. On the other hand, agent-based architectures allow building autonomous and robust systems that are capable of working on highly dynamic scenarios. This paper presents two piracy scenarios where the n-Core platform can be applied. n-Core is a hardware and software platform intended for developing and deploying easily and quickly a wide variety of WSNs applications based on the ZigBee standard. In the first scenario a RTLS is deployed to support boarding and rescue operations. In the second scenario a multi-agent system is proposed to detect the unloading of illegal traffic of merchandise at ports

    A Maritime Piracy Scenario for the n-Core Polaris Real-Time Locating System

    Get PDF
    here is a wide range of applications where Wireless Sensor Networks (WSN) and Multi-Agent Systems (MAS) can be used to build context-aware systems. On the one hand, WSNs comprise an ideal technology to develop sensing systems, as well as Real-Time Locating Systems (RTLS) aimed at indoor environments, where existing global navigation satellite systems, such as GPS, do not work correctly. On the other hand, agent technology is an essential piece in the analysis of data from distributed sensors and gives them the ability to work together and analyze complex situations. In this sense, n-Core Polaris is an indoor and outdoor RTLS based on ZigBee WSNs and an innovative set of locating and automation engines. This paper describes the main components of the n-Core Polaris system, as well as a proposed scenario where n-Core Polaris can be used to support boarding and rescue operations in maritime piracy environments

    An analytic Study of the Key Factors Influencing the Design and Routing Techniques of a Wireless Sensor Network

    Get PDF
    A wireless sensor network contains various nodes having certain sensing, processing & communication capabilities. Actually they are multifunctional battery operated nodes called motes. These motes are small in size & battery constrained. They are operated by a power source. A wireless sensor network consists of a huge number of tiny sensor nodes which are deployed either randomly or according to some predefined distribution. The sensors nodes in a sensor network are cooperative among themselves having self-organizing ability. This ensures that a wireless network serves a wide variety of applications. Few of them are weather monitoring, health, security & military etc. As their applications are wide, this requires that sensors in a sensor network must play their role very efficiently. But, as discussed above, the sensor nodes have energy limitation. This limitation leads failure of nodes after certain round of communication. So, a sensor network suffers with sensors having energy limitations. Beside this, sensor nodes in a sensor network must fulfill connectivity & coverage requirements. In this paper, we have discussed various issues affecting the design of a wireless sensor network. This provides the readers various research issues in designing a wireless sensor network

    An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Full text link
    Mobile ad hoc network (MANET) is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay

    An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Get PDF
    Mobile ad hoc network (MANET) is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay

    WATER-BASED MITIGATION TECHNIQUES AND NETWORK INTEGRATION TO COUNTER DRONE SWARMS

    Get PDF
    Potential and current U.S. adversaries are purchasing and deploying commercial small Unmanned Aircraft Systems (sUAS) in networked swarms. These swarms can be used for intelligence collection and reconnaissance, and have the potential to be weaponized as well. Additionally, the unlawful, but probably not malicious, activity of civilian UAS (drone) operators is of increasing concern. More specifically, there is increased risk to naval assets while in constrained environments, such as harbor transit, where both navigation and weaponized responses are serious concerns. This thesis uses the scenario of protecting a U.S. Navy destroyer entering and exiting a harbor to develop a sUAS mitigation procedure based on existing firefighting and counter-piracy technologies. The proposed procedure includes a communications plan and can be implemented almost immediately using existing civilian and military assets. Additional recommendations to improve the performance of such procedures are provided.CRUSARRRTOLieutenant, United States NavyApproved for public release. Distribution is unlimited

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp

    Nineteenth International Seapower Symposium: Report of the Proceedings

    Get PDF
    https://digital-commons.usnwc.edu/iss/1003/thumbnail.jp

    Unmanned Vehicle Systems & Operations on Air, Sea, Land

    Get PDF
    Unmanned Vehicle Systems & Operations On Air, Sea, Land is our fourth textbook in a series covering the world of Unmanned Aircraft Systems (UAS) and Counter Unmanned Aircraft Systems (CUAS). (Nichols R. K., 2018) (Nichols R. K., et al., 2019) (Nichols R. , et al., 2020)The authors have expanded their purview beyond UAS / CUAS systems. Our title shows our concern for growth and unique cyber security unmanned vehicle technology and operations for unmanned vehicles in all theaters: Air, Sea and Land – especially maritime cybersecurity and China proliferation issues. Topics include: Information Advances, Remote ID, and Extreme Persistence ISR; Unmanned Aerial Vehicles & How They Can Augment Mesonet Weather Tower Data Collection; Tour de Drones for the Discerning Palate; Underwater Autonomous Navigation & other UUV Advances; Autonomous Maritime Asymmetric Systems; UUV Integrated Autonomous Missions & Drone Management; Principles of Naval Architecture Applied to UUV’s; Unmanned Logistics Operating Safely and Efficiently Across Multiple Domains; Chinese Advances in Stealth UAV Penetration Path Planning in Combat Environment; UAS, the Fourth Amendment and Privacy; UV & Disinformation / Misinformation Channels; Chinese UAS Proliferation along New Silk Road Sea / Land Routes; Automaton, AI, Law, Ethics, Crossing the Machine – Human Barrier and Maritime Cybersecurity.Unmanned Vehicle Systems are an integral part of the US national critical infrastructure The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. Unmanned Vehicle (UV) Systems & Operations On Air, Sea, Land discusses state-of-the-art technology / issues facing U.S. UV system researchers / designers / manufacturers / testers. We trust our newest look at Unmanned Vehicles in Air, Sea, and Land will enrich our students and readers understanding of the purview of this wonderful technology we call UV.https://newprairiepress.org/ebooks/1035/thumbnail.jp

    Design in Engineering: An Evaluation of Civilian and Military Unmanned Aerial Vehicle Platforms, Considering Smart Sensing with Ethical Design to Embody Mitigation Against Asymmetric Hostile Actor Exploitation

    Get PDF
    This report is written in part-fulfilment of personal output criteria for the Visiting Research Fellowship (Sir Richard Grenville Fellowship) at the Changing Character of War Centre, Pembroke College, Oxford, and the Centre for Sea Power and Strategy, Britannia Royal Naval College, Plymouth University at BRNC, Dartmouth. In this report I undertook an extensive analysis of the maritime UAV platform systems sector of a wide range of upstream manufacturing industry and downstream end user stakeholders. I consulted a global range of military and civilian users, to inform discussions around civilian UAV platforms which could be modified by hostile non-state actors, with emphasis on the littoral maritime region. This has strategic relevance to the United Kingdom, being an island-state with over 10,000 miles of coastline, c. 600 ports, and nearly 300 off-shore oil and gas platforms. In addition the UK has 14 dependencies together with a combined EEZ of 2.5 million square miles, the fifth largest in the world
    • …
    corecore