Nothing Special   »   [go: up one dir, main page]

Skip to main content

The Evolution of Ad Hoc Networks for Tactical Military Communications: Trends, Technologies, and Case Studies

  • Conference paper
  • First Online:
Proceedings of Third International Conference on Sustainable Expert Systems

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 587))

Abstract

Modern tactical military networks would rely heavily on Mobile Ad-Hoc Networks (MANETs). Combat operations in regions lacking connectivity to a conventional network infrastructure need tactical networks. Because of the high mobility of network nodes and inconsistent connectivity, such networks have frequent changes in the network structure. The ability of MANETs to self-organize and self-heal makes them ideal for tactical military networks. However, the common assumption is that the same methods and protocols that are used for conventional networks would also work for MANETs. Unfortunately, the traditional network protocols may not be well adapted to dealing with the dynamism of MANET networking. Many researchers have presented the study of design issues for MANETs, especially for military communications. However, there are still many open issues that need to be addressed to get the maximum benefit of the MANET characteristics to design and deploy efficient and improved army tactical networking scenarios. This paper presents the fundamental features, performance and security requirements, and security threats in the context of military mobile ad hoc networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Plesse T, Adjih C, Minet P, Laouiti A, Plakoo A, Badel M, Muhlethaler P, Jacquet P, Lecomte J (2005) OLSR performance measurement in a military mobile ad hoc network. Ad Hoc Netw 3(5):575–588

    Google Scholar 

  2. Papakostas D, Eshghi S, Katsaros D, Tassiulas L (2018) Energy-aware backbone formation in military multilayer ad hoc networks. Ad Hoc Netw 1(81):17–44

    Google Scholar 

  3. Lee S, Youn J, Jung BC (2020) A cooperative phase-steering technique in spectrum sharing-based military mobile ad hoc networks. ICT Express 6(2):83–86

    Google Scholar 

  4. Khanpara P (2014) A review on fuzzy logic-based routing in ad hoc networks. Int J Adv Res Eng Technol 5(5):75–81

    Google Scholar 

  5. Hegland AM, Winjum E (2008) Securing QoS signaling in IP-based military ad hoc networks. IEEE Commun Mag 46(11):42–48

    Google Scholar 

  6. Jiang H, Ma Y, Hong D, Li Z (2014) A new metric for routing in military wireless network. Int J Model, Simul, Sci Comput 5(02):1450001

    Google Scholar 

  7. Trivedi R, Khanpara P (2021) Robust and secure routing protocols for MANET-based internet of things systems—a survey. In: Emergence of cyber-physical system and IoT in smart automation and robotics. Springer, Cham, pp 175–188

    Google Scholar 

  8. Khanpara P, Valiveti S, Kotecha K (2010) Routing in ad hoc network using ant colony optimization. In: International conference on future generation communication and networking. Springer, Berlin, pp 393–404

    Google Scholar 

  9. Szajnfarber Z, McCabe L, Rohrbach A (2015) Architecting technology transition pathways: insights from the military tactical network upgrade. Syst Eng 18(4):377–395

    Google Scholar 

  10. Papakostas D, Basaras P, Katsaros D, Tassiulas L (2016) Backbone formation in military multi-layer ad hoc networks using complex network concepts. In: MILCOM 2016–2016 IEEE military communications conference. IEEE, pp 842–848

    Google Scholar 

  11. Shah M, Khanpara P (2019) Survey of techniques used for tolerance of flooding attacks in DTN. In: Information and communication technology for intelligent systems 2019. Springer, Singapore, pp 599–607

    Google Scholar 

  12. Amdouni I, Adjih C, Plesse T (2015) Network coding in military wireless ad hoc and sensor networks: experimentation with GardiNet. In: 2015 international conference on military communications and information systems (ICMCIS). IEEE, pp 1–9

    Google Scholar 

  13. Khanpara P, Trivedi B (2018) Survivability in MANETs. Int J Adv Res Comput Eng Technol (IJARCET) 7(1)

    Google Scholar 

  14. Cole RG, Benmohamed L, Cansever D, Doshi B, Awerbuch B (2008) Gateways for mobile routing in tactical network deployments. In: MILCOM 2008–2008 IEEE military communications. IEEE, pp 1–8

    Google Scholar 

  15. Morelli A, Provosty M, Fronteddu R, Suri N (2019) Performance evaluation of transport protocols in tactical network environments. In: MILCOM 2019–2019 IEEE military communications conference (MILCOM). IEEE, pp 30–36

    Google Scholar 

  16. Khanpara P, Trivedi B (2017) Security in mobile ad hoc networks. In: Proceedings of international conference on communication and networks 2017. Springer, Singapore, pp 501–511

    Google Scholar 

  17. Burbank JL, Chimento PF, Haberman BK, Kasch WT (2006) Key challenges of military tactical networking and the elusive promise of MANET technology. IEEE Commun Mag 44(11):39–45

    Google Scholar 

  18. Carter M (2005) A review of transport protocols as candidates for use in a tactical environment

    Google Scholar 

  19. Poltronieri F, Fronteddu R, Stefanelli C, Suri N, Tortonesi M, Paulini M, Milligan J (2018) A secure group communication approach for tactical network environments. In: 2018 international conference on military communications and information systems (ICMCIS). IEEE, pp 1–8

    Google Scholar 

  20. Kärkkäinen A (2015) Developing cyber security architecture for military networks using cognitive networking

    Google Scholar 

  21. Kim J, Biswas PK, Bohacek S, Mackey SJ, Samoohi S, Patel MP (2021) Advanced protocols for the mitigation of friendly jamming in mobile ad-hoc networks. J Netw Comput Appl 1(181):103037

    Google Scholar 

  22. Reynolds N (2021) Getting tactical communications for land forces right. RUSI J 14:1–2

    Google Scholar 

  23. Rahimunnisa K (2019) Hybrdized genetic-simulated annealing algorithm for performance optimization in wireless adhoc network. J Soft Comput Paradigm (JSCP) 1(01):1–13

    Google Scholar 

  24. Smys S, Raj JS (2019) Performance optimization of wireless adhoc networks with authentication. J Ubiquitous Comput Commun Technol (UCCT) 1(02):64–75

    Google Scholar 

  25. Khanpara P, Bhojak S (2022) Routing protocols and security ıssues in vehicular Ad hoc networks: a review. J Phys: Conf Ser 2325(1):012042. IOP Publishing

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pimal Khanpara .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patel, Z., Khanpara, P., Valiveti, S., Raval, G. (2023). The Evolution of Ad Hoc Networks for Tactical Military Communications: Trends, Technologies, and Case Studies. In: Shakya, S., Balas, V.E., Haoxiang, W. (eds) Proceedings of Third International Conference on Sustainable Expert Systems . Lecture Notes in Networks and Systems, vol 587. Springer, Singapore. https://doi.org/10.1007/978-981-19-7874-6_24

Download citation

Publish with us

Policies and ethics