The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the recently approved Information Security Doctrine (Dec 5, 2016) Russia openly aims “to deploy a national system of managing the Russian segment of the internet”. For some time, we have observed how Russia has been conducting intellectual, legislative and technical measures in order to create a purely domestic network disconnected from the global internet by 2020. In the Russian way of thinking,...
In-band full-duplex (FD) operation can be regarded as one of the greatest discoveries in civilian/commercial wireless communications so far in this century. The concept is significant because it can as much as double the spectral efficiency of wireless data transmission by exploiting the new-found capability for simultaneous transmission and reception (STAR) that is facilitated by advanced self-interference...
Cognitive radio is an emerging technology that has been under heavy research in the recent years, as it is considered to be a promising solution for the spectrum scarcity problem. In the European Defense Agency's project Cognitive Radio for Dynamic Spectrum Management (CORASMA) a high precision cognitive radio simulation environment was developed based on an artificial UHF waveform. Target of that...
Military wireless networks are used for exchange of constantly growing amount of data. The result is an increasing number of radio networks and required bandwidth both in civilian and military ones. It also causes a lot of interferences so coexistence between networks becomes a demand, because there is a lot of different sources of various interferences. Our radio systems are the mainly a source of...
This paper introduces a model to represent the information systems using a tactical service-oriented infrastructure (TSI) together with the orchestrations of core services providing the reactive/proactive connectivity mechanisms within TSIs in/out chains. The model was instantiated with services realizing an algorithm behaving differently under stable or unstable network conditions. A quantitative...
It is becoming more and more obvious that the challenges regarding tactical radio communication cannot be met by a single static radio waveform. Instead, waveforms with different properties regarding range, robustness, and throughput need to be orchestrated. In order to benefit from the advantages of each radio technology integrated into the transparent tactical radio network, traffic engineering,...
Emulation environments are an effective approach to experimenting with and evaluating network protocols, algorithms, and components. This paper describes a joint effort by the NATO Science & Technology Organization's IST-124 Research Task Group to evaluate the scalability of OLSRv1 and OLSRv2 in an emulation environment within a military scenario. The scenario includes detailed mobility patterns...
Nowadays, military land vehicles are equipped with various sensors and effectors. These subsystems are often either not connected or are only connected via manufacturer-specific interfaces. This situation complicates efficient changes and extensions of vehicle equipment since modifications are only possible with the help of the original manufacturer. In order to unify subsystem interfaces and to increase...
Reliable, ad hoc communication among multiple users is a crucial objective in complex tactical scenarios. A major challenge is that synchronization mechanisms (such as GPS) are intermittent and fixed centralized coordinators (e.g., base stations) are infeasible. Classical approaches to multiuser communications relying on tight time synchronization and/or power control are impractical in such scenarios...
Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based...
In the NATO enterprise architecture world, architectural elements and requirements of a project usually are managed separately. As architects have to connect both worlds, they struggle with using different tools, having little traceability and a lack of analysis options. In this paper, we present our extension to the NATO Architecture Framework (NAF) as well as a process for connecting and managing...
The battlefield scenarios are changing around the world presenting new challenges for the military. Battlefield environments have moved from the open to urban and constricted spaces forcing the military to adopt new doctrines and tactics for effective attack and defence. Whilst there have been many advances at the equipment level to support the ground forces i.e. the evolution of military vehicles...
Software Defined Networking (SDN) and analogous approaches to different domains like storage, compute and security have emerged as promising paradigms for controlling and managing many different types of distributed systems. In this paper, we examine the application of software defined concepts to coalition operations. Specifically, we propose the concept of Software Defined Coalitions (SDC), a mechanism...
Software-defined networking (SDN) is used commercially to improve network agility and traffic management capability. As deployed and tactical military systems are often constrained by network performance it is vital to quantify the performance impact of the SDN control plane if SDN is to be exploited in this environment. To assess this we identify the key types of messages used in OpenFlow and how...
Kings Eye is a platform independent situational awareness prototype for smart devices. Platform independence is important as there are more and more soldiers bringing their own devices, with different operating systems, into the field. The concept of Bring Your Own Device (BYOD) is a low-cost approach to equipping soldiers with situational awareness tools and by this it is important to facilitate...
Recent transition from mobile telephony to daily consumption of mobile data presents the challenge of adequate spectrum availability. Besides regulators and operators, this challenge faces both public safety authorities and military as well. This paper investigates how selected spectrum sharing concepts (namely, European Licensed Shared Access (LSA) and US Citizens Broadband Service (CBRS)) support...
In this paper, we describe our experiment and demonstration in applying Service Oriented Architecture (SOA) to mobile nodes in the tactical domain. Our scenario encompasses two convoys that exchange information using NATO standards in order to achieve Friendly Force Tracking between different nations. NATO has identified the WS-Notification standard for the publish/subscribe pattern, so we use that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.