Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (12)

Search Parameters:
Keywords = military tactical communications

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
30 pages, 39684 KiB  
Article
Smart Medical Evacuation Support System for the Military
by Jaroslaw Krygier, Piotr Lubkowski, Krzysztof Maslanka, Andrzej P. Dobrowolski, Tomasz Mrozek, Wojciech Znaniecki and Pawel Oskwarek
Sensors 2024, 24(14), 4581; https://doi.org/10.3390/s24144581 - 15 Jul 2024
Viewed by 999
Abstract
Medical support in crisis situations is a major challenge. Efficient implementation of the medical evacuation process especially in operations with limited human resources that may occur during armed conflicts can limit the loss of these resources. Proper evacuation of wounded soldiers from the [...] Read more.
Medical support in crisis situations is a major challenge. Efficient implementation of the medical evacuation process especially in operations with limited human resources that may occur during armed conflicts can limit the loss of these resources. Proper evacuation of wounded soldiers from the battlefield can increase the chances of their survival and rapid return to further military operations. This paper presents the technical details of the decision support system for medical evacuation to support this process. The basis for the functioning of this system is the continuous measurement of vital signs of soldiers via a specialized measurement module with a set of medical sensors. Vital signs values are then transmitted via the communication module to the analysis and inference module, which automatically determines the color of medical triage and the soldier’s chance of survival. This paper presents the results of tests of our system to validate it, which were carried out using test vectors of soldiers’ vital signs, as well as the results of the system’s performance on a group of volunteers who performed typical activities of tactical operations. The results of this study showed the usefulness of the developed system for supporting military medical services in military operations. Full article
(This article belongs to the Section Biomedical Sensors)
Show Figures

Figure 1

Figure 1
<p>Functional architecture of the DSS-MEDEVAC system.</p>
Full article ">Figure 2
<p>Physical architecture of the DSS-MEDEVAC system (the colors indicate: gray—groups of equipment; also indicated by dashed lines, gold—hardware components, white—components of the data transmission network, green—components responsible for data collection and delivery, dark yellow—components responsible for data analysis, blue—components responsible for data visualization; solid lines connect the interfaces).</p>
Full article ">Figure 3
<p>Arrangement of the MM sensors and their integration with the personal equipment of the monitored soldier.</p>
Full article ">Figure 4
<p>Structure of DSS-MEDEVAC sensor.</p>
Full article ">Figure 5
<p>Block diagram of the Data Transmission Module (DTM).</p>
Full article ">Figure 6
<p>Graphical visualization of decimation of the recorded ECG signal.</p>
Full article ">Figure 7
<p>Volume of the data stream (in bits/s) of the ECG signal with selected decimations (triggered at successive moments in time).</p>
Full article ">Figure 8
<p>Chance of survival function when triage color is yellow (<b>top</b>) and red (<b>bottom</b>)—The colors indicate the outcome of the triage: green if the probability of survival is 100%, yellow if the probability of survival is between 50% and 100%, red if the probability of survival is between 1% and 50%.</p>
Full article ">Figure 9
<p>VM web portal—map view with the location of the monitored soldiers and the vital signs of the selected soldier (the light blue rectangle is a NATO tactical symbol depicting the location of a single soldier on the map; the colored rectangle under the soldier’s symbol indicates the triage colors: red, yellow and blue).</p>
Full article ">Figure 10
<p>VM web portal—Current values and historical values of vital signs registered for selected soldier (upper picture) and current and historical triage colors (bottom picture); the colors on the top graph are explained in the legend; in the “Triage results” column (bottom picture), the colors of the triage (red, yellow and blue) are placed; the computer icon in the “Source” column indicates that the triage result was determined by the DSS-MEDEVAC system.</p>
Full article ">Figure 11
<p>VM portal—graphical charts of ECG (<b>upper</b>) and PPG (<b>bottom</b>) signals recorded via sensors.</p>
Full article ">Figure 12
<p>Structure of the testing environment (colors in the figure mean: orange rectangles—measurement module devices, orange dotted lines—personal and local communication networks, dark green—tactical terminal, orange arrows—information flow between soldier’s equipment, light green dotted line—tactical radio network).</p>
Full article ">Figure 13
<p>DSS-MEDEVAC system testbed—prepared devices for the field tests (font colors indicate: black—description of the DSS-MEDEVAC system test bed components, blue—description of the system’s hardware equipment, yellow—description of the equipment of the volunteer being tested; green framed photos—photos of the selected field tests).</p>
Full article ">Figure 14
<p>Block diagram for determining triage and chance of survival via the AIM.</p>
Full article ">Figure 15
<p>Expected response of the analysis and inference module to reference values of vital signs.</p>
Full article ">Figure 16
<p>ECG signal recorded for a sample soldier under test.</p>
Full article ">Figure 17
<p>ECG signal recorded for a sample test soldier performing chest muscle contractions.</p>
Full article ">Figure 18
<p>PPG signal recorded for a sample soldier under test.</p>
Full article ">Figure 19
<p>Physical activity signal for a sample soldier.</p>
Full article ">
18 pages, 1884 KiB  
Review
Simple Chemical and Cholinesterase Methods for the Detection of Nerve Agents Using Optical Evaluation
by Aneta Břízová and Vladimír Pitschmann
Biosensors 2023, 13(12), 995; https://doi.org/10.3390/bios13120995 - 22 Nov 2023
Cited by 2 | Viewed by 1768
Abstract
The extreme toxicity of nerve agents and the broad spectrum of their physical and chemical properties, enabling the use of these agents in a variety of tactical situations, is a continuing challenge in maintaining the knowledge and capability to detect them, as well [...] Read more.
The extreme toxicity of nerve agents and the broad spectrum of their physical and chemical properties, enabling the use of these agents in a variety of tactical situations, is a continuing challenge in maintaining the knowledge and capability to detect them, as well as in finding new effective methods. Despite significant advances in the instrumentation of the analysis of nerve agents, relatively simple methods based on the evaluation of colour signals (absorption and fluorescence), in particular those using the cholinesterase reaction, continue to be of importance. This review provides a brief presentation of the current status of these simple methods, with an emphasis on military applications, and illustrates the high interest of the professional community in their further development. At the same time, it also contains some peculiarities (high reliability and durability, resistance to extreme climatic conditions, work in deployed means of protection, low purchase prices, economic availability especially in a state of war, etc.) that the authors believe research and development of simple methods and means for the detection of nerve agents should respect. Full article
(This article belongs to the Section Biosensor and Bioelectronic Devices)
Show Figures

Figure 1

Figure 1
<p>Selected nerve agents: (<b>a</b>) tabun GA, (<b>b</b>) sarin GB, (<b>c</b>) soman GD, (<b>d</b>) VX, (<b>e</b>) A-232, and (<b>f</b>) A-234.</p>
Full article ">Figure 2
<p>Schoenemann reaction with luminol.</p>
Full article ">Figure 3
<p>Standard Czech devices work on the principle of cholinesterase reaction using Ellman’s reagent (from above): (<b>a</b>) detection tube DT-11; (<b>b</b>) personal detector/biosensor DETEHIT positive result; (<b>c</b>) personal detector/biosensor DETEHIT blank; (right) (<b>d</b>) the newly developed DAPH detection device of nerve agents.</p>
Full article ">Figure 4
<p>(<b>a</b>) Structure of Guinea Green B; (<b>b</b>) Guinea Green biosensor for nerve-agents detection: 1—blank, 2—presence of nerve agents. Reprinted from ref. [<a href="#B53-biosensors-13-00995" class="html-bibr">53</a>]; (<b>c</b>) the older Soviet GSA-12 automatic alarm, which works on a similar reaction principle.</p>
Full article ">Figure 5
<p>Examples of simpler chemical structures of reagents/chemosensors designed in recent years for the detection of cholinesterase inhibitors.</p>
Full article ">Figure 6
<p>Dependence of GD effect on exposure time.</p>
Full article ">
23 pages, 449 KiB  
Article
Harnessing the Potential of Emerging Technologies to Break down Barriers in Tactical Communications
by Laura Concha Salor and Victor Monzon Baeza
Telecom 2023, 4(4), 709-731; https://doi.org/10.3390/telecom4040032 - 16 Oct 2023
Cited by 2 | Viewed by 2788
Abstract
In the realm of military communications, the advent of new technologies like 5G and the future 6G networks holds promise. However, incorporating these technologies into tactical environments presents unique security challenges. This article delves into an analysis of these challenges by examining practical [...] Read more.
In the realm of military communications, the advent of new technologies like 5G and the future 6G networks holds promise. However, incorporating these technologies into tactical environments presents unique security challenges. This article delves into an analysis of these challenges by examining practical use cases for military communications, where emerging technologies can be applied. Our focus lies on identifying and presenting a range of emerging technologies associated with 5G and 6G, including the Internet of things (IoT), tactile internet, network virtualization and softwarization, artificial intelligence, network slicing, digital twins, neuromorphic processors, joint sensing and communications, and blockchain. We specifically explore their applicability in tactical environments by proposing where they can be potential use cases. Additionally, we provide an overview of legacy tactical radios so that they can be researched to address the challenges posed by these technologies. Full article
(This article belongs to the Topic Next Generation Intelligent Communications and Networks)
Show Figures

Figure 1

Figure 1
<p>Waveforms used in tactical communications.</p>
Full article ">Figure 2
<p>List of emerging technologies for tactical communications.</p>
Full article ">
13 pages, 4776 KiB  
Article
Data Acquisition for Condition Monitoring in Tactical Vehicles: On-Board Computer Development
by Francisco Jose Ochando, Antonio Cantero, Juan Ignacio Guerrero and Carlos León
Sensors 2023, 23(12), 5645; https://doi.org/10.3390/s23125645 - 16 Jun 2023
Cited by 3 | Viewed by 2590
Abstract
This paper outlines the development of an onboard computer prototype for data registration, storage, transformation, and analysis. The system is intended for health and use monitoring systems in military tactical vehicles according to the North Atlantic Treaty Organization Standard Agreement for designing vehicle [...] Read more.
This paper outlines the development of an onboard computer prototype for data registration, storage, transformation, and analysis. The system is intended for health and use monitoring systems in military tactical vehicles according to the North Atlantic Treaty Organization Standard Agreement for designing vehicle systems using an open architecture. The processor includes a data processing pipeline with three main modules. The first module captures the data received from sensor sources and vehicle network buses, performs a data fusion, and saves the data in a local database or sends them to a remote system for further analysis and fleet management. The second module provides filtering, translation, and interpretation for fault detection; this module will be completed in the future with a condition analysis module. The third module is a communication module for web serving data and data distribution systems according to the standards for interoperability. This development will allow us to analyze the driving performance for efficiency, which helps us to know the vehicle’s condition; the development will also help us deliver information for better tactical decisions in mission systems. This development has been implemented using open software, allowing us to measure the amount of data registered and filter only the relevant data for mission systems, which avoids communication bottlenecks. The on-board pre-analysis will help to conduct condition-based maintenance approaches and fault forecasting using the on-board uploaded fault models, which are trained off-board using the collected data. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>NGVA infrastructure using LOSA perspective.</p>
Full article ">Figure 2
<p>Condition and prognostic-based maintenance using on-board computing data. Yellow modules are off-board processes.</p>
Full article ">Figure 3
<p>Proposed architecture for condition computing; red module not developed.</p>
Full article ">Figure 4
<p>Implemented data flow and process; green modules were implemented and red module has not yet been developed.</p>
Full article ">Figure 5
<p>(<b>a</b>) Installed ruggedized computer. (<b>b</b>) Computer data and power installation.</p>
Full article ">Figure 6
<p>Grouped frames by Electronic Control Unit emitter.</p>
Full article ">Figure 7
<p>Grouped frames by page group number and ECU.</p>
Full article ">Figure 8
<p>Graph of engine speed over time, using CAN Tools’ plot option.</p>
Full article ">Figure 9
<p>CAN dump frames with timestamp; decoded with J1939 CAN decoder module.</p>
Full article ">
22 pages, 470 KiB  
Article
Recent Advances in Artificial Intelligence and Tactical Autonomy: Current Status, Challenges, and Perspectives
by Desta Haileselassie Hagos and Danda B. Rawat
Sensors 2022, 22(24), 9916; https://doi.org/10.3390/s22249916 - 16 Dec 2022
Cited by 14 | Viewed by 7307
Abstract
This paper presents the findings of detailed and comprehensive technical literature aimed at identifying the current and future research challenges of tactical autonomy. It discusses in great detail the current state-of-the-art powerful artificial intelligence (AI), machine learning (ML), and robot technologies, and their [...] Read more.
This paper presents the findings of detailed and comprehensive technical literature aimed at identifying the current and future research challenges of tactical autonomy. It discusses in great detail the current state-of-the-art powerful artificial intelligence (AI), machine learning (ML), and robot technologies, and their potential for developing safe and robust autonomous systems in the context of future military and defense applications. Additionally, we discuss some of the technical and operational critical challenges that arise when attempting to practically build fully autonomous systems for advanced military and defense applications. Our paper provides the state-of-the-art advanced AI methods available for tactical autonomy. To the best of our knowledge, this is the first work that addresses the important current trends, strategies, critical challenges, tactical complexities, and future research directions of tactical autonomy. We believe this work will greatly interest researchers and scientists from academia and the industry working in the field of robotics and the autonomous systems community. We hope this work encourages researchers across multiple disciplines of AI to explore the broader tactical autonomy domain. We also hope that our work serves as an essential step toward designing advanced AI and ML models with practical implications for real-world military and defense settings. Full article
(This article belongs to the Special Issue Feature Papers in the Internet of Things Section 2022)
Show Figures

Figure 1

Figure 1
<p>Brief history and milestones of tactical autonomy.</p>
Full article ">Figure 2
<p>Explainable AI. As presented in <a href="#sec8-sensors-22-09916" class="html-sec">Section 8</a>, developing advanced ML techniques to produce explainable models is one direction of our future work. In addition to this, integrating state-of-the-art explanation interfaces that produce efficient explanations of the underlying models is a challenge we plan to explore in our future work.</p>
Full article ">Figure 3
<p>Requirements and elements of a trustworthy AI [<a href="#B108-sensors-22-09916" class="html-bibr">108</a>].</p>
Full article ">
26 pages, 2342 KiB  
Article
Introducing the CYSAS-S3 Dataset for Operationalizing a Mission-Oriented Cyber Situational Awareness
by Roumen Daton Medenou Choumanof, Salvador Llopis Sanchez, Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo Castrillo, Francisco José González Garrido, Alvaro Luis Martinez, David Nevado Catalán, Ao Hu, David Sandoval Rodríguez-Bermejo, Gerardo Ramis Pasqual de Riquelme, Marco Antonio Sotelo Monge, Antonio Berardi, Paolo De Santis, Francesco Torelli and Jorge Maestre Vidal
Sensors 2022, 22(14), 5104; https://doi.org/10.3390/s22145104 - 7 Jul 2022
Cited by 1 | Viewed by 2656
Abstract
The digital transformation of the defence sector is not exempt from innovative requirements and challenges, with the lack of availability of reliable, unbiased and consistent data for training automatisms (machine learning algorithms, decision-making, what-if recreation of operational conditions, support the human understanding of [...] Read more.
The digital transformation of the defence sector is not exempt from innovative requirements and challenges, with the lack of availability of reliable, unbiased and consistent data for training automatisms (machine learning algorithms, decision-making, what-if recreation of operational conditions, support the human understanding of the hybrid operational picture, personnel training/education, etc.) being one of the most relevant gaps. In the context of cyber defence, the state-of-the-art provides a plethora of data network collections that tend to lack presenting the information of all communication layers (physical to application). They are synthetically generated in scenarios far from the singularities of cyber defence operations. None of these data network collections took into consideration usage profiles and specific environments directly related to acquiring a cyber situational awareness, typically missing the relationship between incidents registered at the hardware/software level and their impact on the military mission assets and objectives, which consequently bypasses the entire chain of dependencies between strategic, operational, tactical and technical domains. In order to contribute to the mitigation of these gaps, this paper introduces CYSAS-S3, a novel dataset designed and created as a result of a joint research action that explores the principal needs for datasets by cyber defence centres, resulting in the generation of a collection of samples that correlate the impact of selected Advanced Persistent Threats (APT) with each phase of their cyber kill chain, regarding mission-level operations and goals. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>CYSAS-S3 research development methodology.</p>
Full article ">Figure 2
<p>Workflow for scenario Development.</p>
Full article ">Figure 3
<p>Logical representation of the deployed components.</p>
Full article ">Figure 4
<p>Generic topological view of the deployed infrastructure.</p>
Full article ">Figure 5
<p>Scenario 1—Cyber kill chain for Data Exfiltration.</p>
Full article ">Figure 6
<p>Scenario 2—Cyber kill chain for Webserver Denial of Service.</p>
Full article ">Figure 7
<p>Scenario 3—Cyber kill chain for Credential Steal.</p>
Full article ">Figure 8
<p>Convergence between cyberspace and missions.</p>
Full article ">Figure 9
<p>Evaluation Workflow Loop.</p>
Full article ">
20 pages, 10691 KiB  
Article
Propagation Attenuation Maps Based on Parabolic Equation Method
by Michał Kryk, Krzysztof Malon and Jan M. Kelner
Sensors 2022, 22(11), 4063; https://doi.org/10.3390/s22114063 - 27 May 2022
Cited by 8 | Viewed by 2503
Abstract
Modern wireless communication systems use various technological solutions to increase the efficiency of created radio networks. This efficiency also applies to radio resources. Currently, the utilization of a radio environment map (REM) is one of the directions allowing to improve radio resource management. [...] Read more.
Modern wireless communication systems use various technological solutions to increase the efficiency of created radio networks. This efficiency also applies to radio resources. Currently, the utilization of a radio environment map (REM) is one of the directions allowing to improve radio resource management. The REM is increasingly used in emerging mobile ad-hoc networks (MANETs), in particular military tactical networks. In this case, the use of new technologies such as software-defined radio and network, cognitive radio, radio sensing, and building electromagnetic situational awareness made it possible to implement REM in tactical MANETs. Propagation attenuation maps (PAMs) are crucial REM elements that allow for determining the ranges of radio network nodes. In this paper, we present a novel algorithm for PAM based on a parabolic equation method (PEM). The PEM allows determining the signal attenuation along the assumed propagation direction. In this case, we consider terrain topography to obtain a more realistic analysis. Then, we average the adjacent attenuation profiles defined for the selected directions in places where attenuation has not been calculated. To this aim, linear regression is applied. Finally, we define several metrics that allow for the accuracy assessment of determining the PAM as a function of its dimensions. Full article
Show Figures

Figure 1

Figure 1
<p>The idea of creating sparse PAM matrix.</p>
Full article ">Figure 2
<p>Interpolation method for creating full PAM matrix.</p>
Full article ">Figure 3
<p>DTED-based elevation maps for two selected TX locations in (<b>a</b>) lowland and (<b>b</b>) hilly areas for which terrain profiles are calculated.</p>
Full article ">Figure 4
<p>PEM-based electromagnetic field distributions for exemplary terrain profiles from (<b>a</b>) lowland and (<b>b</b>) hilly areas.</p>
Full article ">Figure 5
<p>(<b>a</b>) Level of receiving antenna height marked above exemplary lowland terrain profile and (<b>b</b>) path losses versus terrain profile radius for analyzed receiving antenna height and calculated field distributions from <a href="#sensors-22-04063-f004" class="html-fig">Figure 4</a>.</p>
Full article ">Figure 6
<p>PAMs for two selected Tx locations in (<b>a</b>) lowland and (<b>b</b>) hilly areas.</p>
Full article ">Figure 7
<p>Calculated points ratio <span class="html-italic">CPR</span> and computation time <span class="html-italic">CT</span> for different radius <span class="html-italic">R</span><sub>0</sub>.</p>
Full article ">Figure 8
<p>Redundancy <span class="html-italic">r</span> for points on sparse PAM matrix illustrated for (<b>a</b>) whole map area and (<b>b</b>) area with highest number of calculations.</p>
Full article ">Figure 9
<p>(<b>a</b>) Absolute and (<b>b</b>) normalized number of all calculations <span class="html-italic">CN</span> for different distances between TX and RX.</p>
Full article ">Figure 10
<p>Normalized number of points where calculations were made exactly <span class="html-italic">r</span> times for TX-RX distance equals to 1 km.</p>
Full article ">Figure 11
<p>(<b>a</b>) DTED-based elevation map for selected TX location, (<b>b</b>) reference PAM for angular resolution Δα = 1°.</p>
Full article ">Figure 12
<p>PAMs for selected angular resolutions (<b>a</b>) Δα = 2° and (<b>b</b>) Δα = 10°.</p>
Full article ">Figure 13
<p>Error maps for selected angular resolutions (<b>a</b>) Δα = 2° and (<b>b</b>) Δα = 10°.</p>
Full article ">Figure 14
<p>CDFs of (<b>a</b>) attenuation error and (<b>b</b>) attenuation error module for selected angular resolution of terrain profiles.</p>
Full article ">Figure 15
<p>RMSE of attenuation error for selected angular resolution of terrain profiles.</p>
Full article ">
26 pages, 7691 KiB  
Article
D-CEWS: DEVS-Based Cyber-Electronic Warfare M&S Framework for Enhanced Communication Effectiveness Analysis in Battlefield
by Sang Seo, Sangwoo Han and Dohoon Kim
Sensors 2022, 22(9), 3147; https://doi.org/10.3390/s22093147 - 20 Apr 2022
Cited by 7 | Viewed by 4573
Abstract
Currently, in the field of military modernization, tactical networks using advanced unmanned aerial vehicle systems, such as drones, place an emphasis on proactively preventing operational limiting factors produced by cyber-electronic warfare threats and responding to them. This characteristic has recently been highlighted as [...] Read more.
Currently, in the field of military modernization, tactical networks using advanced unmanned aerial vehicle systems, such as drones, place an emphasis on proactively preventing operational limiting factors produced by cyber-electronic warfare threats and responding to them. This characteristic has recently been highlighted as a key concern in the functioning of modern network-based combat systems in research on combat effect analysis. In this paper, a novel discrete-event-system-specification-based cyber-electronic warfare M&S (D-CEWS) was first proposed as an integrated framework for analyzing communication effects and engagement effects on cyber-electronic warfare threats and related countermeasures that may occur within drones. Accordingly, for the first time, based on communication metrics in tactical ad hoc networks, an analysis was conducted on the engagement effect of blue forces by major wireless threats, such as multi-layered jamming, routing attacks, and network worms. In addition, the correlations and response logics between competitive agents were also analyzed in order to recognize the efficiency of mutual engagements between them based on the communication system incapacitation scenarios for diverse wireless threats. As a result, the damage effect by the cyber-electronic warfare threat, which could not be considered in the existing military M&S, could be calculated according to the PDR (packet delivery ratio) and related malicious pool rate change in the combat area, and the relevance with various threats by a quantifiable mission attribute given to swarming drones could also be additionally secured. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Main overview of D-CEWS (DEVS-based cyber-electronic warfare) framework.</p>
Full article ">Figure 2
<p>Detailed sub-overview of the zero-sum-based dynamic cyber-electronic warfare competition with PBNE (perfect Bayesian–Nash equilibrium) in jamming threat from D-CEWS.</p>
Full article ">Figure 3
<p>Sub-overview of swarming communication blue drones for reconnaissance in D-CEWS (DEVS-based cyber-electronic warfare).</p>
Full article ">Figure 4
<p>Sub-overview of cyber-electronic warfare for swarming drones in D-CEWS (DEVS-based cyber-electronic warfare).</p>
Full article ">Figure 5
<p>Detailed jammer types within the jammer component.</p>
Full article ">Figure 6
<p>A multi-layered jamming scenario for a reconnaissance report in a swarming communication drone maneuvering system.</p>
Full article ">Figure 7
<p>Anti-jamming scenarios for multi-layered jamming that interfere with reconnaissance reports within a swarming communication drones maneuvering system.</p>
Full article ">Figure 8
<p>MITM (man-in-the-middle) attack scenario for reconnaissance report in a swarming communication drones maneuvering system.</p>
Full article ">Figure 9
<p>ARP (address resolution protocol) spoofing scenario for reconnaissance report in a swarming communication drones maneuvering system.</p>
Full article ">Figure 10
<p>DDoS (distributed denial-of-service) scenario for reconnaissance report in a swarming communication drones maneuvering system.</p>
Full article ">Figure 11
<p>Blackhole attack scenario for reconnaissance report in swarming communication drones maneuvering system.</p>
Full article ">Figure 12
<p>Wormhole attack scenario for reconnaissance report in a swarming communication drones maneuvering system.</p>
Full article ">Figure 13
<p>Network worm propagation and infection scenario for reconnaissance report in a swarming communication drones maneuvering system.</p>
Full article ">Figure 14
<p>Main overview of D-CEWS (DEVS-based cyber-electronic warfare)-based modeling and simulation scenario for cyber-electronic warfare with reconnaissance report in a swarming communication drones maneuvering system.</p>
Full article ">Figure 15
<p>PDR (packet delivery ratio) and BRCR (blue remaining combat ratio)-based graph by reactive jammer-based multi-layered jammer attack.</p>
Full article ">Figure 16
<p>PDR (packet delivery ratio) and BRCR (blue remaining combat ratio)-based graph with channel hopping-based anti-jamming about attacker’s jammer.</p>
Full article ">Figure 17
<p>PDR (packet delivery ratio) and BRCR (blue remaining combat ratio)-based graph by MITM.</p>
Full article ">Figure 18
<p>PDR (packet delivery ratio) and BRCR (blue remaining combat ratio) graph by network worm propagation and infection. (<b>a</b>) Graph of infected drones according to network worm, (<b>b</b>) PDR (packet delivery ratio) and BRCR (blue remaining combat ratio) graphs according to the increase in infected drones.</p>
Full article ">Figure 19
<p>PDR (packet delivery ratio) and BRCR (blue remaining combat ratio) graph by ad hoc based routing attack with absorbing packet rate: (<b>a</b>) blackhole attack and (<b>b</b>) wormhole attack.</p>
Full article ">Figure 20
<p>PDR (packet delivery ratio) and BRCR (blue remaining combat ratio) graph by DDoS: (<b>a</b>) pulsing rate-based and (<b>b</b>) distributed zombie-based.</p>
Full article ">
11 pages, 273 KiB  
Article
Energy-Adjusted Dietary Intakes Are Associated with Perceived Barriers to Healthy Eating but Not Food Insecurity or Sports Nutrition Knowledge in a Pilot Study of ROTC Cadets
by Elizabeth Daniels and Jennifer Hanson
Nutrients 2021, 13(9), 3053; https://doi.org/10.3390/nu13093053 - 31 Aug 2021
Cited by 3 | Viewed by 3339
Abstract
Military service is inherently demanding and, due to the nature of these demands, the term “tactical athlete” has been coined to capture the physical requirements of the profession. Reserve Officers’ Training Corps (ROTC) cadets are a unique subset of the military service community, [...] Read more.
Military service is inherently demanding and, due to the nature of these demands, the term “tactical athlete” has been coined to capture the physical requirements of the profession. Reserve Officers’ Training Corps (ROTC) cadets are a unique subset of the military service community, and the complexity of their training and educational pursuits increases their susceptibility to unhealthy eating patterns. The purpose of this pilot study was to explore the relationship between the perceived barriers to healthy eating, food insecurity, sports nutrition knowledge, and dietary patterns among Army ROTC cadets. The usual dietary intake was gathered from (N = 37) cadets using the General Nutrition Assessment Food Frequency Questionnaire. The perceived barriers to healthy eating were measured using a set of scales consisting of social barriers (6 items, α = 0.86), access barriers (2 items, α = 0.95), and personal barriers (2 items, α = 0.67), with higher-scale scores indicating greater perceived barriers. Spearman correlation coefficients were used to measure the association between the energy-adjusted dietary intakes and the scores on the barriers scales. Energy-adjusted intakes of calcium (ρ = −0.47, p ≤ 0.01), fiber (ρ = −0.35, p = 0.03), vitamin A (ρ = −0.46, p ≤ 0.01), vitamin C (ρ = −0.43, p ≤ 0.01), fruit (ρ = −0.34, p = 0.04), and vegetables (ρ = −0.50, p ≤ 0.01) were negatively correlated with the perceived personal barrier scores. The energy-adjusted intakes of fiber (ρ = −0.36, p = 0.03), vitamin C (ρ = −0.37, p = 0.03), and vitamin E (ρ = −0.45, p ≤.01) were negatively correlated with perceived social barriers, while energy-adjusted vitamin C intake was negatively correlated with perceived access barriers (ρ = −0.40, p = 0.01). Although additional research is needed to better understand the dietary patterns of ROTC cadets, among the participants in this study, greater perceived personal, social, and access barriers were associated with less nutrient-dense eating patterns. Interventions aimed at addressing such barriers may prove beneficial for the improvement of diet quality among ROTC cadets. Full article
28 pages, 5506 KiB  
Article
A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard
by Dohoon Kim, Sang Seo, Heesang Kim, Won Gi Lim and Youn Kyu Lee
Appl. Sci. 2020, 10(24), 8999; https://doi.org/10.3390/app10248999 - 16 Dec 2020
Cited by 6 | Viewed by 3002
Abstract
Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current variable message format (VMF) military standard have numerous reliability-related limitations when applied to tactical data link (TDL) [...] Read more.
Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current variable message format (VMF) military standard have numerous reliability-related limitations when applied to tactical data link (TDL) and multi-TDL networks (MTN). This is because TDL and MTN require maximum tactical security, communication integrity, and low network overhead based on many protocol header bits for rapid communication with limited network resources. The application of such authentication algorithms to TDL and MTN in a rapidly changing battlefield environment without reinforcement measures will lead to functional weaknesses and vulnerabilities when high-level digital-covert activities and deception tactics are implemented. Consequently, the existing VMF authentication scheme must be improved to secure transmission integrity, lower network transaction, and receive authentication tactical information in VMF-based combat network radio (CNR) networks. Therefore, in this study, a tactical wireless ad hoc network topology, similar to that of the existing CNRs, is considered, and a lightweight multi-factor hash chain-based authentication scheme that includes a time-based one-time password (T-OTP) for network overhead reduction and terminal authentication is proposed, coupled with exception handling. The proposed method enhances the confidentiality of tactical message exchanges and reduces unnecessary network transactions and transmission bits for authentication flows between real-time military terminals owned by squads, while ensuring robustness in limited battlefields. Based on these approaches, in the future, we intend to increase the authentication reliability between wireless terminals in the Korean variable message format (KVMF)-based CNR networks based on the Korean Army Corps network scenarios. Full article
(This article belongs to the Special Issue Cyber Security of Critical Infrastructures)
Show Figures

Figure 1

Figure 1
<p>Proposed overall authentication scheme with multi-factor hash chain and T-OTP in VMF.</p>
Full article ">Figure 2
<p>Initialization and registration phases.</p>
Full article ">Figure 3
<p>Authentication and verification phases.</p>
Full article ">Figure 4
<p>Re-authentication and revocation phases.</p>
Full article ">Figure 5
<p>Scenario 1-based exception handling flows.</p>
Full article ">Figure 6
<p>Scenario 2-based exception handling flows.</p>
Full article ">Figure 7
<p>Scenario 3-based exception handling flows.</p>
Full article ">Figure 8
<p>Overview of VMF-based CNR testbed with ad hoc and static cell-planning concepts.</p>
Full article ">Figure 9
<p>VMF–CNR network architecture based on FM radio and All-IP next-generation radio.</p>
Full article ">Figure 10
<p>Overview of overall VMF-based CNR testbed architecture with hash chain authentication.</p>
Full article ">Figure 11
<p>Brief comparative result of LSH and SHA hash functions based on each QR code.</p>
Full article ">
22 pages, 1704 KiB  
Article
Applying Case-Based Reasoning to Tactical Cognitive Sensor Networks for Dynamic Frequency Allocation
by Jae Hoon Park, Won Cheol Lee, Joo Pyoung Choi, Jeung Won Choi and Soo Bin Um
Sensors 2018, 18(12), 4294; https://doi.org/10.3390/s18124294 - 6 Dec 2018
Cited by 6 | Viewed by 3313
Abstract
In this paper, a cognitive radio engine platform is proposed for exploiting available frequency channels for a tactical wireless sensor network while aiming to protect incumbent communication devices, known as the primary user (PU), from undesired harmful interference. In the field of tactical [...] Read more.
In this paper, a cognitive radio engine platform is proposed for exploiting available frequency channels for a tactical wireless sensor network while aiming to protect incumbent communication devices, known as the primary user (PU), from undesired harmful interference. In the field of tactical communication networks, there is an urgent need to identify available frequencies for opportunistic and dynamic access to channels on which the PU is active. This paper introduces a cognitive engine platform for determining the available channels on the basis of a case-based reasoning technique deployable as a core functionality on a cognitive radio engine to enable dynamic spectrum access (DSA) with high fidelity. To this end, a plausible learning engine to characterize the channel usage pattern is introduced to extract the best channel candidate for the tactical cognitive radio node (TCRN). The performance of the proposed cognitive engine was verified by simulation tests that confirmed the reliability of the functional aspect, which includes the learning engine, as well as the case-based reasoning engine. Moreover, the efficacy of the TCRN with regard to the avoidance of collision with the PU operation, considered the etiquette secondary user (SU), was demonstrated. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Spectrum utilization environment in the network-centric warfare [<a href="#B6-sensors-18-04294" class="html-bibr">6</a>].</p>
Full article ">Figure 2
<p>IEEE P1900.5-based cognitive radio engine processing diagram.</p>
Full article ">Figure 3
<p>Proposed cognitive radio engine structure.</p>
Full article ">Figure 4
<p>Conceptual diagram of changes in PU channel occupancy states.</p>
Full article ">Figure 5
<p>Off-state probability histogram of the primary user.</p>
Full article ">Figure 6
<p>State transitions for occupied and unoccupied states of each channel modeled as zero and one, respectively.</p>
Full article ">Figure 7
<p>Uniform sampling technique concept and process for the CB and RB methods.</p>
Full article ">Figure 8
<p>Simulation scenario environment. TCRN, tactical cognitive radio node.</p>
Full article ">Figure 9
<p>Simulation analysis flowchart.</p>
Full article ">Figure 10
<p>Definition of collision and an example of a periodic operation of the CR engine.</p>
Full article ">Figure 11
<p>Results of PU traffic model generation based on the exponential probability distribution <span class="html-italic">M</span> = 2700).</p>
Full article ">Figure 12
<p>Result of traffic model generation according to the average value of the channel occupancy probability of the PU.</p>
Full article ">Figure 13
<p>Comparison of collision probability for each sampling method according to changes in the traffic (reasoning period = 20 slots, number of samples = 20 slots, sample interval = 5 slots).</p>
Full article ">Figure 14
<p>Comparison of collision probability according to reasoning period (number of samples = 20 slots, sample interval = 5 slots).</p>
Full article ">Figure 15
<p>Comparison of collision probability according to the number of samples (reasoning period = 20, sample interval = 5).</p>
Full article ">
4836 KiB  
Review
A Review on Internet of Things for Defense and Public Safety
by Paula Fraga-Lamas, Tiago M. Fernández-Caramés, Manuel Suárez-Albela, Luis Castedo and Miguel González-López
Sensors 2016, 16(10), 1644; https://doi.org/10.3390/s16101644 - 5 Oct 2016
Cited by 167 | Viewed by 36557
Abstract
The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey [...] Read more.
The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS. Full article
Show Figures

Figure 1

Figure 1
<p>Proliferation of devices and applications in the Internet of Things (IoT).</p>
Full article ">Figure 2
<p>Private sector vs defense and public safety technology stack.</p>
Full article ">Figure 3
<p>Promising target scenarios for defense and public safety.</p>
Full article ">Figure 4
<p>Soldiers of today and the future.</p>
Full article ">Figure 5
<p>Operational Capabilities assessed to cover mission-critical scenarios.</p>
Full article ">Figure 6
<p>Requirements and application services for commanders.</p>
Full article ">Figure 7
<p>DoD Enterprise Mobile Devices Management (MDM) evolution.</p>
Full article ">Figure 8
<p>Main characteristics of DMCC-S R2.0.</p>
Full article ">Figure 9
<p>Mobility components and their security.</p>
Full article ">Figure 10
<p>IoT landscape.</p>
Full article ">Figure 11
<p>The IoT architecture. (<b>a</b>) Three-layer; (<b>b</b>) Middleware-based; (<b>c</b>) Service-Oriented Architecture (SOA)-based; (<b>d</b>) Six-layer.</p>
Full article ">Figure 12
<p>Example of military architecture with six layers.</p>
Full article ">Figure 13
<p>Cloud paradigms: security inheritance and risks.</p>
Full article ">Figure 14
<p>Fog computing paradigm.</p>
Full article ">
Back to TopTop