Article

Next-Generation Tactical Ad Hoc Mobile Wireless Networks

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Ad hoc mobile wireless networks are key to the U.S. Army's future combat support capability. Routing is a primary technical challenge in designing such a network. We developed a solution using associativity-based routing (ABR), a best-effort routing protocol licensed to Northrop Grumman. To meet tactical needs, we enhanced ABR with features such as quality-of-service guarantees, multiple routes, multiple flows, and multiple-level precedence and preemption. In addition, we provided interoperability between the enhanced ABR and the legacy open-shortest-path-first routing still used by many units. After analyzing the concept, we concluded that communication between the enhanced ABR and legacy systems would be operable and seamless. We then designed, implemented, and tested a prototype of six nodes that uses both off-the-shelf radio hardware and our innovative routing software. The field tests evaluated network topology, mobility, link breakage, and partial route repair. The test results show that the design transfers large files over four hops with minimal delay per hop. The test network was small, but analysis of results shows that we may use logical clustering to extend the concept to large-scale networks.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... The necessarily ad hoc nature of the battlefield network means that some units will be out of contact at some time: if they failed to acquire the necessary defenses before disconnection they would remain vulnerable. (Toh et. al, 2002). A decentralized system is necessary to ensure that the requisite defensive measures can reach as many systems as possible in a timely manner. ...
Conference Paper
Full-text available
The Objective Force will require the defense of many different information systems on which it will depend. Addressing software vulnerabilities in the field, i.e., patching, requires discovery of vulnerabilities, communication of repair software, and installation of patches. Patch installation must occur without forcing interrupts under fire, downtime during critical tasks, or creation of new systemic vulnerabilities. Peer patching enables the necessary rapid review and dissemination of vulnerability repair without creating additional risk vectors.
... To apply the technique proposed in this paper, the working environment of each node is assumed as follows. First, the network model uses the tactical ad-hoc network [15] [21], which is actively being studied in many countries, including in the United States. Contrary to general ad-hoc networks, the tactical ad-hoc network forms a hierarchical structure where the upper layer nodes are considered secure and have sufficient energy and stability. ...
... [8,9] ...
Article
Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.
Article
Full-text available
There is no one set definition for the phrase “ad hoc networks”. The term refers to the ability for members of a network to establish a network connection between devices. Ad hoc networks are relevant both in technical terms of certain network infrastructures, as well as in terms of the social, political and economic modes of self-organisation they enable. This requires people to combine software and hardware tools to set up peer-to-peer infrastructure that provides access to temporary information networks, as well as networking standards and policy frameworks. When long-standing, these can adapt to become local area networks. An example of an ad hoc network is a temporary cryptocurrency economy, such as a Decentralised Autonomous Organisation, which can connect people, information, and resources online and in person for a specific purpose.
Article
Ad-hoc network consists f mobile nodes, which they are together in the communication. However, if some misbehaving nodes are in network, it is faced to many threats. Therefore, detection and management of misbehaving node are necessary to make confident in Ad-hoc networks. To solve this problem, we use Node Weight Management Server(NWMS), which it manage each node's weight in local area. When NWMS detect misbehaving node, it adds the node's weight and if the node's weight exceeds threshold then NWMS broadcasts the node's information to isolate in network. These mechanisms show that they are highly effective and can reliably detect a multitude of misbehaving node.
Article
Full-text available
In this paper, we develop a neuroadaptive control architecture to control lung volume and minute ventilation with input pressure constraints that also accounts for spontaneous breathing by the patient. Specifically, we develop a pressure - and work-limited neuroadaptive controller for mechanical ventilation based on a nonlinear multicompartmental lung model. The control framework does not rely on any averaged data and is designed to automatically adjust the input pressure to the patient's physiological characteristics capturing lung resistance and compliance modeling uncertainty. Moreover, the controller accounts for input pressure constraints as well as work of breathing constraints. Finally, the effect of spontaneous breathing is incorporated within the lung model and the control framework.
Conference Paper
Full-text available
The a priori knowledge of time zero of radar antennae is essential for an accurate GPR data processing. Indeed, an overevaluation of this parameter can induce inaccuracies in the estimation of the physical and geometrical characteristics of auscultated media from delay picking. This paper proposes experimental methodologies to obtain a stable estimation of Time Zero position through a parametric study based on picking of time signals. The experimental processing results are used to evaluate the effect of antennae coupling and the effect of variations in dielectric parameters on the calculation accuracy of the Time Zero position for various configurations of antennae.
Conference Paper
Survivability has become a focal point of research. Simulation is a common method for experimental verification to identify the advantages and deficiencies of survivability models and architectures. This paper proposes a modeling approach of mobile ad hoc network survivability model which support the automatic transformation to a simulation instance. A new survivability model MARC based on the idea of ARC model is conducted. Within this model, the concepts of network services and events are analyzed and formally descript in details. Base on these works, we design MARCDL and outline the important EBNF in this paper. Use of this language is illustrated by a case study.
Conference Paper
The ATN (Army Tactical Network) system, which provides communications for mobile users, uses a flood search routing algorithm to locate a path from the caller to the called party, inherently providing alternate routing around outages, and thus providing a survivability. The network performance measures are are functions of reliabilities of the network elements. In this paper we analyze s-t reliability for wireless which uses a flood search routing algorithm with a frequently called list (FCL) to route calls and packets, under node or link outage. We evaluate connectivity and reliability of calls as performance measures. The flood search algorithm performs very well in routing traffic around disabled links and nodes.
Conference Paper
The aim of this study is to explore potential routing protocol for software development of MANET (Mobile Ad-hoc Network) peer-to-peer system which can be used for battle field radio communications. MANET consists of a number of mobile devices which communicate over radio, and a MANET with cell phones (MANET-WCP) is the physical infrastructure of the underlined research. One of the biggest challenges of this type of network is to find a route between a source node to a destination node via intermediate nodes with mobility. In this paper, we present a routing protocol using swarm intelligent heuristic (SIH) for MANET-WCP. We refer to the protocol as the Swap Intelligent Heuristic Associate Based Routing, i.e., SIH-ABR. The protocol replaces the route selection mechanism with ant colony optimization heuristic. The main objectives of this approach are: 1). to test the adaptation of SIH-ABR; 2). to verify the efficiency of service; 3). to explore its scalability with a larger number of nodes in a land battle scenario.
Article
From the Publisher:The authoritative guide to the state of the art in ad hoc wireless networking. Reflects the field's latest breakthroughs Covers media access, routing, service discovery, multicasting, power conservation, transport protocol, and much more Includes a complete narration of prototype implementation with communication performance results from practical field trials Introduces key applications for home, business, auto, and defense"Ad hoc" wireless networks eliminate the complexities of infrastructure setup and administration, enabling devices to create and join networks "on the fly"-anywhere, anytime, for virtually any application. The field is rapidly coming of age, reflecting powerful advances in protocols, systems, and real-world implementation experience. In Ad Hoc Mobile Wireless Networks, one of the field's leading researchers brings together these advances in a single consolidated and comprehensive archive. C.K. Toh covers all this, and more: Key challenges: device heterogeneity, diverse traffic profiles, mobility, and power conservation Routing protocols for ad hoc networks, including Associativity Based Routing (ABR) and other IETF MANET protocols Real-world implementation issues-including a complete prototype implementation Ad hoc wireless network performance: results obtained from the latest field trials Leading approaches to service discovery Addressing TCP over an ad hoc wireless network environment Support for multicast communications The role of Bluetooth and WAPAd Hoc Mobile Wirelessapplication scenarios ranging from home and car to office and battlefield. C.K. Toh also introduces several of the field's leading projects, from Motorola's PIANO platform to UC Berkeley's "Smart Dust." Whether you're a researcher, scientist, implementer, consultant, technical manager, CTO, or student, you won't find a more authoritative and comprehensive guide to the new state of the art in ad hoc networking.
Article
This paper presents a new, simple and bandwidth-efficient distributed routing protocol to support mobile computing in a conference size ad-hoc mobile network environment. Unlike the conventional approaches such as link-state and distance-vector distributed routing algorithms, our protocol does not attempt to consistently maintain routing information in every node. In an ad-hoc mobile network where mobile hosts (MHs) are acting as routers and where routes are made inconsistent by MHs' movement, we employ an associativity-based routing scheme where a route is selected based on nodes having associativity states that imply periods of stability. In this manner, the routes selected are likely to be long-lived and hence there is no need to restart frequently, resulting in higher attainable throughput. Route requests are broadcast on a per need basis. The association property also allows the integration of ad-hoc routing into a BS-oriented Wireless LAN (WLAN) environment, providing the fault tolerance in times of base stations (BSs) failures. To discover shorter routes and to shorten the route recovery time when the association property is violated, the localised-query and quick-abort mechanisms are respectively incorporated into the protocol. To further increase cell capacity and lower transmission power requirements, a dynamic cell size adjustment scheme is introduced. The protocol is free from loops, deadlock and packet duplicates and has scalable memory requirements. Simulation results obtained reveal that shorter and better routes can be discovered during route re-constructions.
Multimedia Wireless Mobile Network 2003 Independent Research and Development Technical Plan, Northrop Grumman Mission Systems
  • F C Belz
  • Principal Investigator
F.C. Belz, Principal Investigator, " Multimedia Wireless Mobile Network, " 2003 Independent Research and Development Technical Plan, Northrop Grumman Mission Systems, Project 02552018, March 15, 2003, https://sitg.ms.northgrum.com/ technology/11YearTechPlans/Startup.pdf.
Long-lived Ad Hoc Routing Based on the Concept of Associativity Internet Engineering Task Force (IETF) Mobile Ad Hoc Networks (MANET) Working Group, Internet-Draft, work in progress
  • C K Toh
C.K. Toh, " Long-lived Ad Hoc Routing Based on the Concept of Associativity, " Internet Engineering Task Force (IETF) Mobile Ad Hoc Networks (MANET) Working Group, Internet-Draft, work in progress, 1999, http://www.ietf.org/proceedings/ 99nov/I-D/draft-ietf-manet-longlived-adhoc-routing-00.txt.
Multi-Level Precedence and Preemption
  • J M Polk Carlberg
  • R Desourdis
  • J M Jr
  • I Polk
  • Brown
J.M. Polk, " Multi-Level Precedence and Preemption, " Chap. 3 in K. Carlberg, R. Desourdis, Jr., J.M. Polk, and I. Brown, Preferential Emergency Communications: From Telecommunications to the Internet, Kluwer International Series in Engineering and Computer Science, Vol. 744, Kluwer Academic Publishers, Boston, 2003, pp. 21–38. jmpolk@cisco.com.
Technical Study and Investigation Documents
  • C K Toh
  • S J Wang
  • R S Tsumaki
  • A Ghanevati
  • E C Lee
  • D Molinelli
  • O S Wang
  • W A Holdrege
  • B R Askelid
C.K. Toh, S.J. Wang, R.S. Tsumaki, A. Ghanevati, E.C. Lee, D. Molinelli, O.S. Wang, W.A. Holdrege, and B.R. Askelid, " Technical Study and Investigation Documents, " Multimedia Wireless Mobile Network Independent Research and Development Project, Northrop Grumman Mission Systems, April 2002. liz.c.lee@ngc.com.