22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Military</strong> <strong>Communications</strong><br />

<strong>and</strong> <strong>Information</strong> <strong>Technology</strong>:<br />

A <strong>Trusted</strong> Cooperation Enabler<br />

Volume 2<br />

Warsaw 2012


Reviewers:<br />

Prof. Milan Šnajder, LOM Praha, Czech Republic<br />

Prof. Andrzej Dąbrowski, Warsaw University of <strong>Technology</strong>, Pol<strong>and</strong><br />

Editor:<br />

Marek Amanowicz<br />

Co-editor:<br />

Peter Lenk<br />

© Copyright by Redakcja Wydawnictw Wojskowej Akademii Technicznej.<br />

Warsaw 2012<br />

ISBN 978-83-62954-31-5<br />

ISBN 978-83-62954-52-0<br />

Publication qualified for printing without editorial alterations made by the MUT<br />

Publishing House.<br />

DTP: Martyna Janus<br />

Cover design: Barbara Chruszczyk<br />

Publisher: <strong>Military</strong> University of <strong>Technology</strong><br />

Press: P.P.H. Remigraf Sp. z o.o., ul. Ratuszowa 11, 03-450 Warszawa<br />

Warsaw 2012


Contents<br />

Foreword ............................................................................ 5<br />

Chapter 5<br />

Tactical <strong>Communications</strong> <strong>and</strong> Networks ................................................ 7<br />

SOA over Disadvantaged Grids Experiment <strong>and</strong> Demonstrator ............................... 9<br />

Frank T. Johnsen, Trude H. Bloebaum, Léon Schenkels <strong>and</strong> team,<br />

Joanna Śliwa, Przemysław Caban<br />

GUWMANET – Multicast Routing in Underwater Acoustic Networks ........................ 27<br />

Michael Goetz, Ivor Nissen<br />

Network Routing by Artificial Neural Network ............................................ 45<br />

Michal Turčaník<br />

An Application of Chord Structure in Tactical Ad-hoc Network .............................. 55<br />

Jerzy Dołowski, Marek Amanowicz<br />

Revisiting the DARPA’s Idea of a Programmable Network ................................... 67<br />

Vladimir Aubrecht, Tomas Koutny<br />

Selection <strong>and</strong> Investigation of a Civil Wideb<strong>and</strong> Waveform for Potential <strong>Military</strong> Use ........... 81<br />

Ferdin<strong>and</strong> Liedtke, Matthias Tschauner, Sarvpreet Singh, Marc Adrat, Markus Antweiler<br />

Experimental Performance Evaluation of the Narrowb<strong>and</strong> VHF Tactical IP Radio<br />

in Test-Bed Environment .............................................................. 99<br />

Edward Golan, Adam Kraśniewski, Janusz Romanik, Paweł Skarżyński, Robert Urban<br />

Hybrid Error Detecting <strong>and</strong> Correcting System Using Hardware Associative Memories .......... 107<br />

Ion Tutănescu, Constantin Anton, Laurenţiu Ionescu, Gheorghe Şerban, Alin Mazăre<br />

Concurrent Error Detection Scheme for HaF Hardware .................................... 117<br />

Ewa Idzikowska<br />

Chapter 6<br />

Spectrum Management <strong>and</strong> Software Defined Radio Techniques ........................ 133<br />

A Realistic Roadmap for the Introduction of Dynamic Spectrum Management<br />

in <strong>Military</strong> Tactical Radio Communication .............................................. 135<br />

Bart Scheers, Austin Mahoney, Hans Åkermark<br />

Dynamic Spectrum Management in Legacy <strong>Military</strong> Communication Systems ................ 151<br />

Marek Suchański, Paweł Kaniewski, Robert Matyszkiel, Piotr Gajewski<br />

Spectrum Issues of NATO Narrowb<strong>and</strong> Waveform ........................................ 161<br />

Jan Leduc, Markus Antweiler, Torleiv Maseng


4 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Legacy Waveforms on Software Defined Radio: Can Hierarchical Modulation<br />

Offer an Added Value to SDR Operators ................................................ 171<br />

Marc Adrat, Tobias Osten, Jan Leduc, Markus Antweiler, Harald Elders-Boll<br />

Data Fusion Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networks .......... 187<br />

Djamel Teguig, Bart Scheers, Vincent Le Nir<br />

Implementation of an Adaptive OFDMA PHY/MAC on USRP Platforms for<br />

a Cognitive Tactical Radio Network .................................................... 201<br />

Vincent Le Nir, Bart Scheers<br />

Validation of the ITU 1546 L<strong>and</strong>-Sea Propagation Model for the 900 MHz B<strong>and</strong> .............. 215<br />

Krzysztof Bronk, Rafał Niski, Jerzy Żurek, Maciej J. Grzybkowski<br />

Chapter 7<br />

Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks ......................................... 227<br />

Algorithms for Channel <strong>and</strong> Power Allocation in Clustered Ad hoc Networks .................. 229<br />

Luca Rose, Christophe J. Le Martret, Mérouane Debbah<br />

High Spatial-Reuse Distributed Slot Assignment Protocol for Wireless Ad-hoc Networks ......... 247<br />

Muhammad Hafeez Chaudhary, Bart Scheers<br />

Hybrid Network Synchronization for MANETs ........................................... 265<br />

Harri Saarnisaari, Teemu Vanninen<br />

Application of Dezert-Smar<strong>and</strong>ache Theory for Tactical MANET Security Enhancement ........ 277<br />

Joanna Głowacka, Marek Amanowicz<br />

Mechanisms of Ad-hoc Networks Supporting Network Centric Warfare ...................... 289<br />

Rafał Bryś, Jacek Pszczółkowski, Mirosław Ruszkowski<br />

Using Network Coding in 6LoWPAN WSNs ............................................. 307<br />

Jarosław Krygier<br />

Testbed Implementation of Energy Aware Wireless Sensor Network .......................... 319<br />

Ewa Niewiadomska-Szynkiewicz, Michał Marks, Filip Nabrdalik<br />

An Energy Aware Self-Configured Wireless Sensor Network ................................ 333<br />

Marcin Wawryszczuk, Marek Amanowicz<br />

Chapter 8<br />

Localization Techniques ............................................................ 347<br />

Enhanced Location Tracking for Tactical MANETs Based on Particle Filters<br />

<strong>and</strong> Additional <strong>Information</strong> Sources .................................................... 349<br />

Peter Ebinger, Arjan Kuijper, Stephen D. Wolthusen<br />

Spatial Localisation of Radio Wave Emission Sources Using SDF <strong>Technology</strong> .................. 367<br />

Jan M. Kelner, Piotr Gajewski, Cezary Ziółkowski<br />

On the Effect of Tuner Phase Noise on TDOA Measurements ............................... 377<br />

Anders M. Johansson, Patrik Hedström<br />

Aircraft Tracking Using Mobile Devices ................................................. 387<br />

Michał Andrzejewski, Radosław Schoeneich<br />

Index ............................................................................. 397


Foreword<br />

Modern military operations are conducted in a complex, multidimensional<br />

<strong>and</strong> disruptive environment. The challenging political <strong>and</strong> social environment<br />

of the operations necessitates establishing coalitions, consisting of many different<br />

partners of differing levels of trust, e.g. partners from NATO nations, as well<br />

as non-NATO nations <strong>and</strong> others such as the local government bodies <strong>and</strong> local<br />

forces. Tight collaboration with these partners <strong>and</strong> the guarantee that the appropriate<br />

information is shared within the community is vital to the mission efficiency.<br />

This also requires underst<strong>and</strong>ing of these differences <strong>and</strong> greater trust as well as<br />

acceptance of the greater risk involved.<br />

Dynamic environmental changes <strong>and</strong> limitations of the technical infrastructure<br />

assets creates additional challenging issues for the effective collaboration<br />

of the coalition partners. The fragile nature of the communications infrastructure,<br />

especially at the tactical level, requires robust methods <strong>and</strong> mechanisms to<br />

deal with long delays, communication failures or disconnections <strong>and</strong> available<br />

b<strong>and</strong>width limitations.<br />

These all necessitate a better underst<strong>and</strong>ing of the environmental conditions<br />

<strong>and</strong> appropriate procedural actions, as well as strong technological support, to<br />

provide the required levels of interoperability, flexibility, security <strong>and</strong> trusted collaboration<br />

in connecting heterogeneous systems of all parties involved in the action.<br />

Many research efforts aimed at the elaboration <strong>and</strong> implementation of innovative<br />

communications <strong>and</strong> information technologies for military systems,<br />

enabling trusted information exchange <strong>and</strong> successful collaboration in disadvantaged<br />

environments, have been undertaken world-wide. The latest selected<br />

results of such activities that include novel concepts for military communications<br />

<strong>and</strong> information systems, as well as innovative technological solutions, are<br />

presented in this book.<br />

The book contains the papers originally submitted to the 14 th <strong>Military</strong> <strong>Communications</strong><br />

<strong>and</strong> <strong>Information</strong> Systems Conference (MCC) held on 8–9 October 2012<br />

in Gdansk, Pol<strong>and</strong>. The MCC is an annual event that brings together experts from<br />

research establishments, industry <strong>and</strong> academia, from around the world, as well<br />

as representatives of the military <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> Systems<br />

community. The conference provides a useful forum for exchanging ideas on the<br />

development <strong>and</strong> implementation of new technologies <strong>and</strong> military CIS services.


6<br />

<strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

It also creates a unique opportunity to discuss these issues from different points of<br />

view <strong>and</strong> share experiences amongst European Union <strong>and</strong> NATO CIS professionals.<br />

The papers included in this book are split into two volumes, each contains<br />

selected issues that correspond to the conference topics, <strong>and</strong> reflect the technology<br />

advances supporting trusted collaboration of all parties involved in joint<br />

operations. The first volume is focused on: Concepts <strong>and</strong> Solutions for <strong>Communications</strong><br />

<strong>and</strong> <strong>Information</strong> Systems, <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong><br />

for <strong>Trusted</strong> <strong>Information</strong> Sharing, <strong>Information</strong> <strong>Technology</strong> for Interoperability <strong>and</strong><br />

Decision Support Enhancement <strong>and</strong> <strong>Information</strong> Assurance & Cyber Defence, while<br />

the latter on the following: Tactical <strong>Communications</strong> <strong>and</strong> Networks, Spectrum<br />

Management <strong>and</strong> Software Defined Radio Techniques, Mobile Ad-hoc & Wireless<br />

Sensor Networks <strong>and</strong> Localization Techniques.<br />

The editors would like to take this opportunity to express their thanks to the<br />

authors <strong>and</strong> reviewers for their efforts in the preparation of this book. We trust<br />

that the book will contribute to a better underst<strong>and</strong>ing of the challenging issues in<br />

trusted collaboration in modern operations, scientific achievements <strong>and</strong> available<br />

solutions that mitigate the risk <strong>and</strong> increase the efficiency of information exchange<br />

in hostile <strong>and</strong> disruptive environments. We believe that the readers will find the<br />

content of the book both useful <strong>and</strong> interesting.<br />

Marek Amanowicz<br />

Peter Lenk


Chapter 5<br />

Tactical <strong>Communications</strong><br />

<strong>and</strong> Networks


SOA over Disadvantaged Grids Experiment<br />

<strong>and</strong> Demonstrator<br />

Frank T. Johnsen 2 , Trude H. Bloebaum 2 , Léon Schenkels <strong>and</strong> team 1, 3 ,<br />

Joanna Śliwa 4 , Przemysław Caban 4<br />

2 FFI, Norway,<br />

frank-trethan.johnsen@ffi.no, trude-hafsoe.bloebaum@ffi.no<br />

3 NC3A, Netherl<strong>and</strong>s, Leon.Schenkels@nc3a.nato.int<br />

4 <strong>Military</strong> Communication Institute, Zegrze, Pol<strong>and</strong>,<br />

{j.sliwa, p.caban}@wil.waw.pl<br />

Abstract: The objective of the IST-090 group is to investigate challenges of SOA applications in disadvantaged<br />

networks. The group studies possible solutions that can improve the overall efficiency<br />

of information dissemination when facing different disruptions. This paper presents lessons learned<br />

from the real-life experiment <strong>and</strong> demonstration that was carried out by IST-090 group members<br />

during the MCC 2011 conference. We evaluated several solutions, namely the WS-DDS interface,<br />

the DSProxy, the Mist protocol, <strong>and</strong> ESBs that were used as SOA solutions enabling efficient information<br />

exchange in a disadvantaged environment. The experiment was preceded by separate tests of each<br />

solution. However, in the combined scenario, the aim was to evaluate the interoperability of these<br />

solutions <strong>and</strong> define a long-term plan for either their application in operations or for further functionality<br />

development. The paper gives an overview of the solutions we investigated, presents a rough<br />

model of the network environment used, <strong>and</strong> discusses the results observed <strong>and</strong> the lessons learned.<br />

Keywords: component; Web services, publish-subscribe, DDS<br />

I. Introduction<br />

NATO is a strategic organization, <strong>and</strong>, as such, the vast majority of the communications<br />

infrastructure that is used <strong>and</strong> deployed by NATO is in the strategic<br />

realm of static headquarters <strong>and</strong> Forward Operating Bases (FOB). These tend to be<br />

served by high speed LAN <strong>and</strong> WAN communications, with low latency <strong>and</strong> high<br />

b<strong>and</strong>width. However, under the NATO Network Enabled Capability (NNEC) vision,<br />

the stovepipe systems of the past, offering services <strong>and</strong> applications to a limited, geographically<br />

co-located group of users will shift to a dynamic federation of systems,<br />

which will allow services previously only available within the strategic domain to be<br />

made available in the tactical domain. Likewise, situational awareness information<br />

1<br />

The NC3A team members: Rui Fiske, Marc van Selm, Vincenzo de Sortis, <strong>and</strong> Aad van der Z<strong>and</strong>en


10 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

needs to be fed from the tactical domain into the strategic domain to better inform<br />

planning <strong>and</strong> operational decision making. This necessarily involves increased<br />

transfer of data across tactical links with constrained communications pathways<br />

in both directions. There is no clear solution yet from industry that will support<br />

these requirements <strong>and</strong> so NATO <strong>and</strong> the member nations themselves need to devise<br />

suitable mechanisms. The experiment described in this paper is meant to discover<br />

how solutions may be applied in relation to the anticipated use of services in NNEC.<br />

Within the NATO <strong>and</strong> coalition enterprise, there are a wide range of network<br />

conditions <strong>and</strong> communications environments. The architects <strong>and</strong> developers<br />

of most Functional Area Services (FAS), <strong>and</strong> often those looking at Service-Oriented<br />

Architecture (SOA) in particular, tend to consider only high b<strong>and</strong>width, low latency<br />

local area networks. They find that their applications tend to work well in these<br />

static environments, with low response times, even for large messages. However,<br />

thought also needs to be given to the frontline staff; those connected only between<br />

themselves by Mobile Ad Hoc Networks (MANETs), or by satellite <strong>and</strong> radio connections<br />

back to their FOBs. For these users of systems, how does the NNEC SOA<br />

paradigm deliver the most significant <strong>and</strong> timely information to them without<br />

the provision of a “LAN to the man”<br />

The RTO Group, IST-090, has been tasked with looking at the challenges <strong>and</strong><br />

potential solutions that can be used for SOA over disadvantaged grids [1]. A number<br />

of NATO member nations were involved in the group, information was shared <strong>and</strong><br />

experiments were conducted together, in order to test the various approaches that<br />

had been suggested <strong>and</strong> developed. A number of IST-090 members were invited<br />

to speak at the <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> Systems Conference<br />

(MCC) in Amsterdam in October 2011. As part of the conference, IST-090 was assigned<br />

a special area of the conference venue in order to demonstrate the benefits<br />

of the various solutions that had been presented. As part of this, further experiments<br />

were conducted over a dynamic network, provided by Norwegian <strong>and</strong> NC3A-owned<br />

MANET components. This would provide a real, unreliable network environment<br />

to assess the actual value of the solutions, <strong>and</strong> allow further experimentation with<br />

the MANETs themselves.<br />

This paper gives a detailed description of the test environment, test plan <strong>and</strong> test<br />

results that were conducted <strong>and</strong> observed at the conference. It describes the network,<br />

<strong>and</strong> various SOA-supporting solutions that were deployed by the group members,<br />

<strong>and</strong> assesses how each of them provides lessons to consider when designing services<br />

<strong>and</strong> systems to be used over poor communications channels. Many different<br />

potential approaches were identified, many of which could be combined to offer<br />

a range of network-optimization techniques.<br />

The remainder of the paper is organized as follows: In Section II we present<br />

the motivation for pursuing a pervasive SOA in military networks. Related work<br />

is discussed in Section III. Section IV covers our joint experiment – the setup,<br />

the execution, <strong>and</strong> the lessons learned. Finally, Section V concludes the paper.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

11<br />

II. SOA motivation<br />

SOA, realized by Web services technology, has been identified as the crucial<br />

NNEC enabler [2]. The advantage of SOA is that it provides seamless information<br />

exchange based on different policies <strong>and</strong> loose coupling of its components. In a military<br />

domain it enables making sensitive information resources available in the form<br />

of services, which can be discovered <strong>and</strong> used by all mission participants that do<br />

not need to be aware of these services in advance.<br />

The most mature technology for implementing SOA, recommended by NATO<br />

<strong>and</strong> widely applied in the commercial sector, is Web services. Web services are<br />

described by a wide range of st<strong>and</strong>ards that deal with different aspects of their<br />

realization, transport, orchestration, semantics, etc. They provide the means to<br />

build a very flexible environment that is able to dynamically link different system<br />

components to each other. These st<strong>and</strong>ards are based on the eXtensible Markup<br />

Language (XML) <strong>and</strong> have been designed to operate in high b<strong>and</strong>width links.<br />

XML gained wide acceptance <strong>and</strong> became very popular for the reason that it solves<br />

many interoperability problems, is human- <strong>and</strong> machine-readable <strong>and</strong> facilitates<br />

the development of frameworks for software integration, independent of the programming<br />

language. Nevertheless it undoubtedly adds significant overhead, both<br />

in terms of necessary computation power <strong>and</strong> consumption of network resources<br />

while being transported. This means that using SOA in tactical networks is challenging<br />

<strong>and</strong> requires optimizations [3], [4]. IST-090 is looking into techniques such<br />

as compression to mitigate some of the challenges [1].<br />

The utilization of Web services <strong>and</strong> other SOA implementations in a NNEC<br />

environment (e.g., Enterprise Service Buses (ESBs) <strong>and</strong> the Data Distribution Service<br />

(DDS)) has been addressed in many national <strong>and</strong> international experiments (e.g., Coalition<br />

Warrior Interoperability Demonstration (CWID) [5], [6], DDS demo [7],<br />

ESB experiment [8]). These experiments indicate that the technologies improve<br />

collaboration, interoperation <strong>and</strong> information sharing in the Federation of Systems<br />

(FoS). DDS is even perceived as real-time technology that can be tailored for the use<br />

in low – b<strong>and</strong>width tactical networks. However the idea of IP-based ubiquitous communications<br />

that is able to feed users with data based on the available communications<br />

media turns to be difficult to realize at the current stage of available technology<br />

maturity level. In order to achieve efficient information exchange between FoS users,<br />

SOA solutions need to work with different types of information <strong>and</strong> communication<br />

systems. Service interoperability must be provided among all comm<strong>and</strong> levels on<br />

an end-to-end basis. The challenge is therefore to apply SOA in low b<strong>and</strong>width tactical<br />

communications systems, which usually cope with high error rates <strong>and</strong> frequent<br />

disruptions. Such networks are usually referred to as disadvantaged grids.<br />

Previous initiatives have focused on information distribution over disadvantaged<br />

grids. In very low b<strong>and</strong>width environments it is considered to be the best<br />

solution to use asynchronous replication based middleware that provides static


12 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

information distribution between partners that have agreed to use a specific database<br />

format [9]. This solution is however not very convenient in highly dynamic operational<br />

scenarios. That is why there has been carried out research on SOA solutions<br />

that provide flexibility <strong>and</strong> interoperability <strong>and</strong> are well suited to work in a FoS.<br />

III. Related work<br />

Publish/subscribe, a paradigm for asynchronous communication, has been<br />

identified as particularly useful in MANETs, where it provides decoupling of provider<br />

<strong>and</strong> consumer [10]. In this paper we focus on MANETs, <strong>and</strong> thus the publish/<br />

subscribe paradigm. The NATO Core Enterprise Services (CES) Working Group [11]<br />

has identified WS-Notification as the st<strong>and</strong>ard to use for publish/subscribe in NATO.<br />

Thus, we employ that st<strong>and</strong>ard in our experiment in this paper.<br />

Net-Centric Tactical Services (NCTS) provide a gateway <strong>and</strong> software framework<br />

for tactical users to realize the benefits of information sharing across a SOA environment<br />

[12]. It is a software framework which resides in the tactical environment <strong>and</strong><br />

supports a set of services <strong>and</strong> functions to enable communications <strong>and</strong> messaging<br />

translation, data publishing, data subscription, <strong>and</strong> tactical device management. This<br />

is in key with the NNEC FS [2], which states that in order to apply SOA throughout<br />

a FoS in various network elements, special devices – so called edge proxies that are to<br />

support information distribution over disadvantaged grids – must be used. The problem<br />

is therefore identified <strong>and</strong> is considered valid for the whole NATO community.<br />

Those edge functionalities are to adapt service traffic to the capabilities of the tactical<br />

networks, sometimes in the form of technology gateways. As a consequence, we also<br />

pursue the gateway <strong>and</strong> proxy concept in our experiments in this paper.<br />

In [13] we describe a Web services infrastructure experiment performed during<br />

the summer of 2011. This experiment is a precursor to the Norwegian <strong>and</strong> NC3A parts<br />

of the experiment described in this paper. In 2011 we identified several shortcomings<br />

of the software we were using then, e.g., that the WS-Notification framework we used<br />

on the Norwegian side (WSMG from the University of Indiana) was not suitable for<br />

use in a military environment, since it did not h<strong>and</strong>le disruptions. In the IST-090<br />

experiment described in this paper we have replaced WSMG with Apache Service-<br />

Mix in an attempt to leverage a hopefully more mature <strong>and</strong> stable product. Also,<br />

we now focus mostly on the MANET aspect of communications, whereas the 2011<br />

experiment was more geared towards interconnecting infrastructure.<br />

The SOA over disadvantaged grids experiment <strong>and</strong> demonstrator discussed<br />

in this paper was linked to the other IST-090 presentations during the MCC 2011<br />

in Amsterdam:<br />

• An overview of the research <strong>and</strong> experimentation of IST-090 [1]<br />

• Mediation of network load over disadvantantaged grids using Enterprise<br />

Service Bus (ESB) technology [8]<br />

• DDS technology demonstrations related to IST-090 [7]


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

13<br />

• Dedicated WS-DDS interface for sharing information between civil <strong>and</strong><br />

military domains [14]<br />

• An Evaluation of Web Services Discovery Protocols for the Network-Centric<br />

Battlefield [15]<br />

• An independent evaluation of Web service reach solutions in disadvantaged<br />

grids [16]<br />

• Towards a middleware for tactical military networks – interim solutions<br />

for improving communication for legacy systems [17]<br />

• Semantic Description of Web Service QoS Profiles for Context-aware Web<br />

Service Provision [18]<br />

These papers give an overview of recent IST-090 related work by the member<br />

nations. The remainder of this paper focuses on the aspects of the experiment <strong>and</strong><br />

demo performed at MCC 2011.<br />

IV. Experiment<br />

The goal of the experiment was to evaluate the possibility of delivering information<br />

from service producers to service consumers in a disadvantaged environment.<br />

The networking environment was set up using equipment provided by the NC3A<br />

<strong>and</strong> FFI (see Figure 1). Further, technologies studied under the umbrella of IST-<br />

090 as promising for SOA application on the tactical level were employed: Web<br />

services, ESBs, <strong>and</strong> DDS. We built a heterogeneous networking infrastructure that<br />

modeled cooperation of users on different levels of comm<strong>and</strong>. <strong>Information</strong> was sent<br />

up <strong>and</strong> down the echelons of comm<strong>and</strong> through the MANET. Thus, we had aspects<br />

of both infrastructure <strong>and</strong> disadvantaged networks. We evaluated the interoperability<br />

of the proposed solutions, as well as their applicability to the scenario that<br />

was developed by the IST 090. For further information regarding the scenario,<br />

please refer to [1]. Moreover such real-life experiments always bring us lessons<br />

learned in terms of implementation correctness <strong>and</strong> incompatibility of technologies.<br />

A number of potential approaches have been identified by the participants<br />

in this experiment, which may improve communications between service providers<br />

<strong>and</strong> service consumers. This should lead to a concrete set of recommendations<br />

for FAS <strong>and</strong> Communities of Interest (CoI) when commissioning <strong>and</strong> developing<br />

their services. Specifically, these approaches are:<br />

• A DDS domain, which is interfaced to a Web services environment through<br />

a gateway (MCI’s contribution).<br />

• DSProxy for delay <strong>and</strong> disruption tolerant SOAP transport across disadvantaged<br />

networks (one of FFI’s contributions).<br />

• Decentralized chat using the experimental Mist protocol, coupled with<br />

a Mist/XMPP gateway for interoperability with infrastructure networks<br />

(one of FFI’s contributions).<br />

• The use of an ESB to optimize the use of b<strong>and</strong>width <strong>and</strong> manage limited<br />

connectivity (NC3A’s contribution).


14 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 1. Disadvantaged grid experiment <strong>and</strong> demonstrator communications network <br />

Figure 2.SOA infrastructure


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

15<br />

The disadvantaged grid networking infrastructure used was based on equipment<br />

provided by NC3A <strong>and</strong> Norway: Rajant breadcrumb MANET systems using<br />

the 2.4 <strong>and</strong> 5 GHz ISM b<strong>and</strong>s augmented by a simulated satellite link. The NC3A<br />

provided a complete infrastructure to execute SOA tests <strong>and</strong> to evaluate the results,<br />

<strong>and</strong> functioned as the connecting “hub” between Norway <strong>and</strong> Pol<strong>and</strong>. This infrastructure<br />

was built around two ESB instances in charge for the message routing <strong>and</strong><br />

transformation (see Figure 2). Here, the interfaces were used as follows:<br />

• SIP3 Engine – This is a processing engine for Friendly Force Tracks in NFFI<br />

V1.3 format that can simulate running tracks, store <strong>and</strong> filter them. During<br />

this test campaign it was used as track store, track simulator <strong>and</strong> SIP3<br />

interface. The SIP3 Engine is composed of: Track store, Track simulator,<br />

SIP3 message interface (NFFI over SOAP), IP1 message interface (NFFI<br />

over TCP/IP), IP2 message interface (NFFI over UDP), <strong>and</strong> SIP3/IP1/IP2<br />

interface adapter.<br />

• WSO2 ESB (version 3.0.1) – This is a COTS ESB based on Apache<br />

Synapse. During this test campaign it was used for protocol adaptation<br />

<strong>and</strong> message routing/conversion. The main services exposed were: a)<br />

SIP3 to KML converter, which was used to visualize on st<strong>and</strong>ard KML<br />

enabled map viewer the NFFI V1.3 tracks stored in the SIP3 track store;<br />

b) NVG to KML converter, which was used to visualize on st<strong>and</strong>ard<br />

KML enabled map viewer the NVG layer provided by JocWatch; c)<br />

WSNotification (notification consumer) to SIP3 (event sink) which<br />

was used to feed the SIP3 engine with the NFFI tracks published from<br />

the Norwegian pub/sub broker, <strong>and</strong> d) WS-DDS to SIP3 (event sink),<br />

which was used to feed the SIP3 engine with the NFFI tracks published<br />

from the WS-DDS interface.<br />

• ServiceMix ESB (version 3.5.0) – This is a COTS ESB that offers a WS-<br />

Notification v1.3 Pub/Sub interface. During this test campaign it was used<br />

to publish messages via the WS-Notification protocol.<br />

• Symbology server – An NC3A service used to graphically represent the units<br />

given their APP6 symbol.<br />

• JOCWatch – The Incident Reporting source systems.<br />

• Google Earth – COTS map viewer used to visualize the tracks produced<br />

<strong>and</strong> received from the NC3A systems.<br />

Figure 1 shows the network diagram that was used in the experiment <strong>and</strong><br />

demonstration.<br />

The experiment was aimed at connecting Web services <strong>and</strong> DDS domains,<br />

which are technologically different realizations of SOA. Web services support both<br />

publish/subscribe <strong>and</strong> request/response communications, as opposed to DDS which<br />

has only publish/subscribe support. On the other h<strong>and</strong>, DDS supports QoS features<br />

<strong>and</strong> real-time systems, which Web services do not. For a comparison, see Table I.<br />

More details about DDS can be found in [14].


16 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Table I. Web services <strong>and</strong> DDS comparison<br />

Property Web services DDS<br />

St<strong>and</strong>ardization W3C, OASIS, WS-I OMG<br />

Real-time <strong>and</strong> QoS support No Yes<br />

Request/response paradigm Yes No<br />

Publish/subscribe paradigm Yes Yes<br />

Current st<strong>and</strong>ard suitable for disavantaged grids No No<br />

Enabling support for disadvantaged grids<br />

Experimental<br />

optimizations<br />

Vendor specific<br />

tactical extensions<br />

Figure 3. Mist as a message ferry <br />

A. <strong>Technology</strong> components<br />

There is a combination of parameters at h<strong>and</strong> that will lead to specific use<br />

cases where the following conditions can be tested:<br />

• Different types of information (NFFI, incident reports)<br />

• Different solutions (DDS <strong>and</strong> DDS/WS gateway, DSProxy, ESB capabilities)<br />

• Different network conditions (mostly making use of the MANET but also<br />

having the possibility to simulate other types of networks).<br />

We evaluated each tested solution’s usability from an end user perspective, <strong>and</strong><br />

were able to show the viability of the solutions involved for effectively disseminating<br />

the necessary information. It should be noted that DDS was not actually used<br />

in the MANET, it was connected to the MANET using a Web services interoperability<br />

gateway. Further information regarding the separate demo components are<br />

discussed briefly below. The complete details of the demo are described in [19].


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

17<br />

1) Mist: The Mist protocol provides robustness <strong>and</strong> delay tolerance in dynamic<br />

wireless ad-hoc networks. We wanted to use two separate 802.11 ad-hoc networks<br />

with one gateway/relay node connected to 100BASE-TX for the Mist/<br />

XMPP experiments. FFI provided the necessary equipment for the mobile<br />

nodes – a mixture of laptops <strong>and</strong> Sony Ericsson Xperia mobile phones with<br />

WiFi enabled were used. One computer, the server in the national services LAN<br />

where the DSProxy resides, was running the XMPP/Mist gateway software.<br />

Figure 4. NC3A-NOR interconnection featuring ESBs <strong>and</strong> the DSProxy <br />

The XMPP server could be anywhere in the network, as long as it was reachable<br />

by TCP from the XMPP/Mist gateway node from time to time. In this demo<br />

the central server was hosted by the NC3A in the NATO LAN. Messages were<br />

relayed to XMPP when the connection was available <strong>and</strong> stored for future delivery<br />

when the link was down, using the ”message ferry” principle shown in Figure 3.<br />

The message ferry was a single wireless node (mobile phone) which was used<br />

to carry messages between the two networks. It did not need to be connected<br />

to both ad-hoc networks at the same time, but it did require the use of 802.11<br />

to connect in an ad-hoc manner. For in-depth information on using Mist for<br />

tactical chat, see [20].<br />

2) DSProxy: The use of proxy servers for adapting Web services to disadvantaged<br />

grids is a very promising approach. Through the use of proxies one<br />

can utilize unmodified Web services at the client <strong>and</strong> server machines, <strong>and</strong><br />

only the intermediate nodes in the network need to use the proxy software.<br />

This reduces complexity in the development of applications <strong>and</strong> servers, <strong>and</strong><br />

therefore also costs. Norway (FFI) has designed <strong>and</strong> developed the Delay <strong>and</strong><br />

disruption tolerant SOAP Proxy (DSProxy) system.<br />

The DSProxy is a prototype system implementing a range of concepts, ideas <strong>and</strong><br />

mechanisms which aim to tackle the challenges associated with utilizing web services<br />

in tactical environments <strong>and</strong> disadvantaged grids [21]. The DSProxy is a middleware<br />

component enabling delay <strong>and</strong> disruption tolerant web services for heterogeneous<br />

networks. The Java-based software uses acknowledged st<strong>and</strong>ards <strong>and</strong> is designed<br />

to work with existing COTS Web service clients <strong>and</strong> services.


18 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Functional tests where NC3A provided NFFI data on a WS-Notification interface<br />

were shown (see Figure 4). Here, the DSProxy was used to ensure disruption<br />

<strong>and</strong> delay tolerant SOAP transport across the unstable MANET <strong>and</strong> highdelay<br />

satellite link, whereas the exchange between the NC3A <strong>and</strong> NOR was conducted<br />

using ServiceMix to provide WSNotification.<br />

3) DDS/WS Gateway: DDS is a specification of a publish/subscribe middleware<br />

for distributed systems created in response to the need to st<strong>and</strong>ardize<br />

a data-centric publish/subscribe programming model for distributed systems.<br />

It has been suggested for use on the tactical level [7], but such usage requires<br />

vendor specific extensions. In this paper we focus on interoperability with DDS,<br />

<strong>and</strong> do not evaluate any tactical extensions. Pol<strong>and</strong> has developed a gateway<br />

to bridge the DDS environment to a Web services environment, focusing on<br />

one specific Web service – blue force tracking using NFFI. This gateway bridging<br />

the DDS domain with the rest of the infrastructure is shown in Figure 5.<br />

It enables DDS publishers to deliver NFFI tracks to Web services subscribers<br />

<strong>and</strong>, in the opposite direction, NFFI tracks published by Web services can be<br />

delivered to subscribers on the DDS side. It should be noted that, when using<br />

the DDS/WS Gateway, for every Web service that needs to be bridged to<br />

the DDS domain one needs to implement a special purpose message translator<br />

between the st<strong>and</strong>ardized Web services interface <strong>and</strong> a DDS interface.<br />

B. Results<br />

1) FFI infrastructure: ServiceMix was used to exchange NFFI tracks between<br />

Norway <strong>and</strong> NC3A. Tracks from Pol<strong>and</strong> were submitted to the NC3A, which<br />

re-distributed them to Norway. Once the system was up <strong>and</strong> running everything<br />

functioned as expected with WS-Notification, but there were some<br />

initial problems: The version of ServiceMix that was deployed (3.2.3) by FFI<br />

was not fully st<strong>and</strong>ards-compliant, leading to some trouble on NC3A’s side.<br />

The problems could be h<strong>and</strong>led by a work-around in the subscription message<br />

<strong>and</strong> some tuning of the WS-Notification client software. This version<br />

of ServiceMix supported only IPv4, meaning that notifications could not be<br />

used over IPv6, even if the communication stack was available. In the future,<br />

a newer version of ServiceMix, or another application entirely, should<br />

be considered to provide WS-Notification support.<br />

Mist functioned as it should by delivering chat messages in a disruption tolerant<br />

manner across both IPv4 <strong>and</strong> IPv6. Also, the message ferry principle functioned<br />

as expected, thereby showcasing one of the strengths of the Mist protocol.<br />

The DSProxy was used to ensure delay <strong>and</strong> disruption tolerant communication<br />

across the „troublesome” networks, i.e., the MANET <strong>and</strong> the satcom simulator.<br />

A bridge that had been developed in-house by FFI was used to interconnect<br />

ServiceMix with the DSProxy, so that notifications could be transported across


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

19<br />

the national network to <strong>and</strong> from the troops. This solution worked as expected<br />

— internally, instabilities were overcome in the network thanks to the DSProxy,<br />

while still retaining external compatibility with NC3A through WSNotification on<br />

the ServiceMix instance. The current implementation of DSProxy has previously<br />

only been used with IPv4, <strong>and</strong> at this testing event it was not able to run over IPv6.<br />

This is an important finding, <strong>and</strong> support for IPv6 should be sought for in the future.<br />

Figure 5. WS-DDS is a gateway between the Web services (WS) <strong>and</strong> Data distribution<br />

service domains <br />

2) MCI infrastructure: WS-DDS interface enabled the bidirectional exchange<br />

of information between the Polish DDS domain <strong>and</strong> NC3A’s WS domain.<br />

Additionally, the NFFI tracks from NC3A were sent to the Norwegian domain<br />

<strong>and</strong> back (from FFI through NC3A to POL DDS domain).<br />

Both the WS-DDS interface <strong>and</strong> the DDS domain emulator operated correctly.<br />

Initially there was a problem with interoperability between the WS-DDS<br />

interface <strong>and</strong> the SIP 3 service. The SIP3 client was created based on the WSDL<br />

1.1.0, whereas SIP3 service was based on WSDL 1.1.9. After recompilation, <strong>and</strong><br />

some additional modifications in the structure of the NFFI messages exchanged,<br />

the problem was solved.<br />

The WS-DDS interface version that was tested currently works in the request/<br />

response mode. It would be highly recommended to enhance it with pub-sub functionality<br />

based on WSNotification. This will improve the functionality of WS-DDS,<br />

since DDS generally implements a publish/subscribe message exchange pattern.<br />

Furthermore, this will also decrease the time of information transfer <strong>and</strong> traffic<br />

generated in the WS domain.<br />

3) NC3A infrastructure: The competitive approaches to optimizing traffic using<br />

the ESB involve two streams of messages being sent to different services<br />

through the ESB in parallel, a setup further discussed in [8]. One of the services<br />

is of a higher priority than the other, so it is given more resources in the ESB<br />

than the other. The number of successful messages to this service is then<br />

measured. Although the lower priority messages are considered less important,


20 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

the number of errors in this background stream (3000 messages over 30 secs)<br />

is still recorded to give an impression of the negative impact on this stream.<br />

Two competitive approaches were tested. Prioritization boosts the priority<br />

of the more important message stream, but does not limit the background<br />

messages. Throttling, on the other h<strong>and</strong>, limits the amount of b<strong>and</strong>width that<br />

a particular service can use, <strong>and</strong> caps the number of messages that can be<br />

passed to this service.<br />

Messages<br />

Table II. ESB Competetive Test Results<br />

Background<br />

errors<br />

Max Min Average<br />

Baseline 32 536 57.3 s 7.7 s 32.6 s<br />

Prioritization 36 601 38.9 s 2.2 s 20.5 s<br />

Throttling 40 2667 54.2 s 3.3 s 29.5 s<br />

Prioritization delivered a small but significant (12.5%) improvement on<br />

the balanced approach, without a massive impact on the background messages.<br />

Although throttling had a more noticeable effect on the higher priority messages<br />

(an improvement of 25%), the effect on the background messages was severe.<br />

The results are shown in Table II. A set of evaluations identifying uncompetitive<br />

approaches was also performed, these results are shown in [19].<br />

It is recommended that a balanced <strong>and</strong> judicious use of the two approaches<br />

should be considered for use in production. The relative prioritization <strong>and</strong> throttling<br />

parameters will be dependent on the level of service that is offered by the ESB.<br />

C. Lessons learned<br />

The use of SOAP over HTTP provides a number of challenges within an environment<br />

where b<strong>and</strong>width is limited. XML is a verbose data format, <strong>and</strong> the overhead<br />

of the SOAP messaging protocol adds additional bytes to the payload. As was seen<br />

in these experiments, within a MANET environment, where reasonably high<br />

b<strong>and</strong>width is available between the individual nodes on the MANET, this effect<br />

can be negligible.<br />

The use of HTTP can be problematic in case of disruptions due to node<br />

mobility or interference, though. Also, across radio or satellite communications<br />

channels, or even a combination of these, then the use of SOAP can cause<br />

timeouts <strong>and</strong> limit the number of messages that can be delivered. Therefore,<br />

mechanisms need to be defined that can provide any level of improvement<br />

across these network boundaries, <strong>and</strong> recommendations delivered to the projects<br />

responsible for the delivery of Functional Area <strong>and</strong> Core Enterprise Services.<br />

Even in simple request-response message exchanges between service providers


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

21<br />

<strong>and</strong> consumers, systems can benefit from the judicious use of disabling HTTP<br />

continue, increasing the number of sockets <strong>and</strong> lengthening the timeouts on<br />

the client. The suitability of these approaches should also be considered in addition<br />

to mediation through any kind of middleware or proxy. However, middleware<br />

such as ESBs <strong>and</strong> the DSProxy do help manage poor network communications.<br />

Further refinements, such as switching to other protocols like DDS or JMS,<br />

or even prototypes targeted at unreliable networks like Mist, may offer even<br />

more possibilities. Also, employing compression <strong>and</strong> other optimization techniques<br />

must be considered [1]. Any proposed approach should be considered<br />

on a case-by-case basis, <strong>and</strong> further research is needed to identify the optimum<br />

approaches for network optimization.<br />

1) Data distribution service: DDS is an emerging middleware that is explicitly<br />

targeted at providing publish/subscribe communications for real-time systems.<br />

It offers fine <strong>and</strong> extensive control of QoS parameters, including reliability,<br />

b<strong>and</strong>width, delivery deadlines, <strong>and</strong> resource limits that makes it a c<strong>and</strong>idate<br />

for use in disadvantaged grids. Note, however, that DDS requires vendor<br />

specific extensions to function in such environments [7].<br />

DDS defines a specific API for the messages <strong>and</strong> subscription h<strong>and</strong>ling but<br />

cannot natively interoperate with SOAP Web services. The WS-DDS gateway<br />

is filling this gap by building a SOAP web service interface on the top of the DDS<br />

API so that a st<strong>and</strong>ard SOAP data consumer/producer can directly use this interface.<br />

The experiment with the WS-DDS gateway was very successful, <strong>and</strong> future<br />

deployment of DDS could build upon the knowledge gained with this prototype.<br />

A possible option for future experimentation is to leverage an ESB as frontend<br />

for SOAP clients <strong>and</strong> to configure DDS as a transport protocol (as a substitute for<br />

HTTP). Such a setup could possibly:<br />

• Make use of the DDS strengths for content-centric message h<strong>and</strong>ling <strong>and</strong><br />

QoS definitions.<br />

• Be a beneficial approach to leveraging COTS middleware.<br />

• Offer the DDS API to a SOAP service.<br />

• Hide the complexity of the DDS protocol <strong>and</strong> the configuration details<br />

from the SOAP client.<br />

• Offer the possibility to centrally manage QoS parameters for topics <strong>and</strong><br />

messages.<br />

• Offer SOAP interfaces that are payload agnostic/independent.<br />

This approach is similar to a widely adopted solution where a SOAP frontend<br />

is using the Java Message Service (JMS) as unified transport protocol. The DDS-ESB<br />

approach must be tested <strong>and</strong> validated because of the differences between the JMS<br />

<strong>and</strong> DDS protocols [22]. A possible drawback of having a SOAP payload agnostic<br />

interface is that the content-aware DDS is a strong typed protocol, in order to improve<br />

performance. Extensive tests must be made to guarantee that using generic<br />

payloads will not negatively impact DDS performance.


22 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

2) Publish/subscribe, DSProxy, <strong>and</strong> Mist: The use of publish/subscribe mechanisms<br />

further offer a range of possible solutions to unreliable network communications.<br />

By exchanging messages only in response to clearly-defined<br />

events, the amount of network traffic can be reduced (through the elimination<br />

of unnecessary polling), <strong>and</strong> the effects of intermittent communications<br />

can be lessened. However, particularly in the coalition environment, with<br />

multiple heterogeneous systems, it is important to ensure that any solution<br />

is fully st<strong>and</strong>ards-compliant, otherwise there may be interoperability problems,<br />

as were observed with ServiceMix.<br />

It is likely in the future that NATO systems will migrate to an IPv6 infrastructure,<br />

<strong>and</strong> so it is encouraging that IPv6 functions correctly over the MANET.<br />

However, it is important that any applications that are developed or procured<br />

to be used within the NATO enterprise are also able to operate over IPv6.<br />

The version of ServiceMix used by FFI (3.2.3) supported only IPv4, meaning<br />

that notifications could not be used over IPv6, even if the communication stack<br />

was available. It was also an important discovery that the current implementation<br />

of DSProxy was only able to run over IPv4, <strong>and</strong> FFI will be looking to support<br />

IPv6 in the future.<br />

Mist functioned as expected, <strong>and</strong> was able to deliver the chat messages in a disruption<br />

tolerant manner across the networks. Mist supports both IPv4 <strong>and</strong> IPv6,<br />

<strong>and</strong> functioned fully using either protocol. The message ferry principle functioned<br />

adequately as well, showcasing one of the strengths of the Mist protocol.<br />

3) Enterprise service buses: The use of ESBs or other middleware offer a number<br />

of advantages when mediating communications across constrained communications<br />

channels. The first <strong>and</strong> most important of these is that it abstracts<br />

the optimization of the use of b<strong>and</strong>width away from the developers <strong>and</strong> administrators<br />

of the services themselves. To the service consumers <strong>and</strong> providers,<br />

the network itself should be transparent, <strong>and</strong> so with the messaging framework<br />

that is used across this network. By using ESBs to manage traffic optimization,<br />

the service consumer calls the ESB using SOAP over HTTP, without having to<br />

consider any other features. Management of the message bus becomes a separate<br />

concern, <strong>and</strong> additional optimization features can be deployed without<br />

the need to redevelop or recompile the applications themselves. In addition<br />

to this benefit, there are a number of features that are supported by ESBs that<br />

can greatly improve performance, <strong>and</strong> these are discussed in Section IV-B3<br />

above. The use of retries <strong>and</strong> reliable messaging adds marginal but significant<br />

improvements over a direct call from service consumer to provider. The most<br />

obvious benefit that can be delivered by ESBs is the use of compression for<br />

larger messages, where improvements of over 500 per cent were observed on<br />

a 111 KB message, using only the st<strong>and</strong>ard GZIP compression mechanism.<br />

Other XML-specific compression suites promise even higher compression<br />

ratios <strong>and</strong> therefore even greater improvements.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

23<br />

V. Conclusion<br />

No single solution stood out as the ”magic bullet” to solve all the requirements<br />

for high speed connectivity to the edge, but many of them do offer measurable<br />

improvements in messaging capability. A number of key success factors were<br />

identified, including the foundation on open st<strong>and</strong>ards, ease of management <strong>and</strong><br />

configuration, <strong>and</strong> transparency to the user.<br />

We have shown that the st<strong>and</strong>ards are important in delivering interoperability<br />

in heterogeneous FoS environment, but are not sufficient to be used in disadvantaged<br />

grids. The proposed DSProxy st<strong>and</strong>ing upon the st<strong>and</strong>ard SOAP communication<br />

enables compression of SOAP messages <strong>and</strong> provides store <strong>and</strong> forward functionalities<br />

if connectivity is lost. The WS-DDS interface creates unique possibility of connecting<br />

the WS <strong>and</strong> DDS architecturally different domains giving the possibility to<br />

exchange messages vertically between the echelons of comm<strong>and</strong>. The Mist protocol<br />

is a solution for the XMPP deficiencies enabling it to deliver the chat service on<br />

the tactical level. And finally, the ESBs tuned appropriately give benefits in terms<br />

of compression <strong>and</strong> priority of messages.<br />

In general, the messaging infrastructure should be optimized for the consumers<br />

of services without the need to incorporate proprietary, ad hoc solutions<br />

that will ensure tighter coupling between providers <strong>and</strong> consumers <strong>and</strong> therefore<br />

limit the range of potential partners. Where a protocol is not widely understood<br />

in another domain, then gateways should be used to translate from one st<strong>and</strong>ard<br />

or protocol to another.<br />

As a suggestion for future experiments, we recommend that the different<br />

potential solutions should be considered individually <strong>and</strong> collectively to provide<br />

optimized communications across the entire enterprise, from static HQs, with<br />

high speed communications to l<strong>and</strong> forces with intermittent <strong>and</strong> low quality links<br />

according to a well defined scenario. Each solution should be considered on a caseby-case<br />

basis, but once the best solution for the scenario has been identified, then<br />

it should be quick <strong>and</strong> easy for an administrator to apply, ensuring the best possible<br />

experience for front-line users.<br />

Acknowledgment<br />

The authors would like to thank the organizers of MCC 2011 for making<br />

the experiment <strong>and</strong> demo possible. Furthermore, we would like to acknowledge<br />

Magnus Skjegstad, who developed the Mist software as part of his ongoing Ph.D.<br />

thesis work, <strong>and</strong> supported the chat part of the experiment. He also provided us<br />

with Figure 3. Finally, we would like to thank Rolf Rasmussen <strong>and</strong> Johnny Johnsen<br />

for proofreading.


24 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

References<br />

[1] P.-P. Meiler et al., “An Overview of the Research <strong>and</strong> Experimentation of IST-090:<br />

SOA over Disadvantaged Grids,” in proceedings of the MCC 2011, Amsterdam,<br />

Netherl<strong>and</strong>s, October 2011.<br />

[2] M. Booth et al., “NATO Network Enabled Feasibility Study vol. II: Detailed Report<br />

Covering a Strategy <strong>and</strong> Roadmap for Realizing an NNEC Networking <strong>and</strong> <strong>Information</strong><br />

Infrastructure, version 2.0,” NATO C3 Agency, 2005.<br />

[3] D. Dragolov et al., “Service Oriented Architecture – concept of services,<br />

infrastructure components, implementation practices <strong>and</strong> military environment<br />

specifics,” in proceedings of the MCC 2009, Prague, Czech republic, September 2009.<br />

[4] F.T. Johnsen, “Pervasive web services discovery <strong>and</strong> invocation in military networks,”<br />

FFI report 2011/00257, http://rapporter.ffi.no/rapporter/2011/00257.pdf, January 2011.<br />

[5] J. Busch, “An investigation into deploying web services,” TN 1229, NC3A, December 2007.<br />

[6] G. Babakhani et al., “Web Trends And Technologies And NNEC Core Enterprise<br />

Services – Version 2.0,” NC3A Technical Note 1143 (draft), NC3A, The Hague,<br />

Netherl<strong>and</strong>s, December 2006.<br />

[7] I.H. Novo et al., “DDS technology demonstrations related to IST-090,” in proceedings<br />

of MCC 2011, Amsterdam, Netherl<strong>and</strong>s, October 2011.<br />

[8] R. Fiske et al., “Mediation of network load over disadvantaged grids using Enterprise<br />

Service Bus (ESB) technology,” in proceedings of the MCC 2011, Amsterdam,<br />

Netherl<strong>and</strong>s, October 2011.<br />

[9] P. Bartolomasi et al., “NATO Network Enabled Feasibility Study vol. I, ver. 2.0,”<br />

NATO C3 Agency, 2005.<br />

[10] P. Costa et al., “Socially-Aware Routing for Publish-Subscribe in Delay-<br />

Tolerant Mobile Ad Hoc Networks,” IEEE JOURNAL ON SELECTED AREAS<br />

IN COMMUNICATIONS, VOL. 26, NO. 5, JUNE 2008.<br />

[11] Consultation, Comm<strong>and</strong> <strong>and</strong> Control Board (C3B), “CORE ENTERPRISE<br />

SERVICES STANDARDS RECOMMENDATIONS: THE SOA BASELINE PROFILE<br />

VERSION 1.7,” Enclosure 1 to AC/322-N(2011)0205, NATO Unclassified releasable to<br />

EAPC/PFP, 11 November 2011.<br />

[12] S.D. Crane et al., “Bridging the digital divide with net-centric tactical services,”<br />

AFCEA-GMU C4I CENTER SYMPOSIUM ”CRITICAL ISSUES IN C4I”, George<br />

Mason University, Fairfax, Virginia Campus, USA, 20-21 May 2008.<br />

[13] F.T. Johnsen et al., “Towards operational agility using service oriented integration<br />

of prototype <strong>and</strong> legacy systems,” in proceedings of the 17th ICCRTS, Fairfax, VA,<br />

USA, June 19-21 2012.<br />

[14] P. Caban et al., “Dedicated WS-DDS Interface for Sharing <strong>Information</strong> Between<br />

Civil <strong>and</strong> <strong>Military</strong> Domains,” In proceedings of MCC 2011, Amsterdam, Netherl<strong>and</strong>s,<br />

October 2011.<br />

[15] M. Skjegstad et al., “An Evaluation ofWeb Services Discovery Protocols for<br />

the Network-Centric Battlefield,” in proceedings of the MCC 2011, Amsterdam,<br />

Netherl<strong>and</strong>s, October 2011.<br />

[16] A.H. L<strong>and</strong>a et al., “An Independent Evaluation of Web Service Reach Solutions<br />

in Disadvantaged Grids,” in proceedings of the MCC 2011, Amsterdam, Netherl<strong>and</strong>s,<br />

October 2011.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

25<br />

[17] C. Barz et al., “Towards a Middleware for Tactical <strong>Military</strong> Networks Interim Solutions<br />

for Improving Communication for Legacy Systems,” in proceedings of the MCC 2011,<br />

Amsterdam, Netherl<strong>and</strong>s, October 2011.<br />

[18] J. Sliwa et al., “Semantic Description of Web Service QoS Profiles for Context-aware<br />

Web Service Provision,” in proceedings of the MCC 2011, Amsterdam, Netherl<strong>and</strong>s,<br />

October 2011.<br />

[19] P. Caban et al., “SOA OVER DISADVANTAGED GRIDS EXPERIMENT AND<br />

DEMONSTRATOR,” NC3A Reference Document 3342, NATO Unclassified,<br />

The Hague, Netherl<strong>and</strong>s, December 2011.<br />

[20] M. Skjegstad et al., “Distributed Chat in Dynamic Networks,” in proceedings<br />

of the 30th IEEE <strong>Military</strong> <strong>Communications</strong> Conference (MILCOM2011), Baltimore,<br />

MA, USA, November 2011.<br />

[21] K. Lund et al., “Robust web services in heterogeneous military networks,” IEEE<br />

<strong>Communications</strong> Magazine, vol. 48, no. 10, pp. 78-83, October 2010.<br />

[22] Real-Time Innovations Inc., “A Comparison <strong>and</strong> Mapping of Data Distribution Service<br />

(DDS) <strong>and</strong> Java Message Service (JMS),” (on-line), http://www.omgwiki.org/dds/sites/<br />

default/files/Comparison of DDS <strong>and</strong> JMS.pdf, 2006.


GUWMANET – Multicast Routing in Underwater<br />

Acoustic Networks<br />

Michael Goetz 1 , Ivor Nissen 2<br />

1 Fraunhofer Institute for Communication, <strong>Information</strong> Processing <strong>and</strong> Ergonomics (FKIE),<br />

53343 Wachtberg, Germany, michael.goetz@fkie.fraunhofer.de<br />

2 Research Department for Underwater Acoustics <strong>and</strong> Marine Geophysics (FWG) – WTD 71,<br />

24148 Kiel, Germany, ivornissen@Bundeswehr.org<br />

Abstract: Underwater networks move more <strong>and</strong> more into the focus of the research community,<br />

especially for military purposes. They enable the full integration of underwater components like<br />

submarines or sensor platforms into maritime Network Centric Warfare (NCW). Nevertheless, most<br />

of the scientific work was done in physical layer methods <strong>and</strong> medium access protocols.<br />

In this paper we introduce a new network protocol called Gossiping in Underwater Acoustic Mobile<br />

Ad-hoc Networks (GUWMANET), which realizes medium access <strong>and</strong> routing functionality<br />

in a cross-layer design. In contrast to other routing approaches for underwater networks, we developed<br />

a network protocol from scratch, fitting the special needs of underwater communication,<br />

instead of adopting existing terrestrial protocols.<br />

We use multi-hop strategies to achieve a higher maximum transmission range than that of our<br />

physical layer method. Additionally, multicast addresses are used which allow an unlimited<br />

number of nodes. The routes between the nodes are build up automatically <strong>and</strong> need no preceding<br />

configuration, which allows a full ad-hoc capability including mobile nodes. In combination<br />

with the Generic Underwater Application Language (GUWAL), which has a 16 bit header<br />

with the multicast source <strong>and</strong> destination address, GUWMANET needs only 10 bits additional<br />

overhead. This is realized by using gossiping strategies, where each node itself decides whether<br />

it forwards the data or not.<br />

Keywords: multicast, multi-hop, gossiping, routing, underwater acoustic networks, mobile ad-hoc<br />

networks, emission control, implicit acknowledgment, clustering, bursts<br />

I. Introduction<br />

In the last years, underwater networks received more <strong>and</strong> more attention<br />

in scientific, industrial <strong>and</strong> particularly military areas. They enable the full integration<br />

of underwater components like submarines, Autonomous Underwater Vehicles<br />

(AUVs), gliders, or bottom sensors into maritime Network Centric Warfare (NCW)<br />

for example in Mine Counter-Measure (MCM) or Anti Submarine Warfare (ASW)<br />

operations. Especially, Underwater Wireless Networks (UWNs) moved into the focus<br />

of the research community to enable full flexibility of the platforms without


28 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

the need for any cables, which are not only expensive but also difficult to h<strong>and</strong>le<br />

<strong>and</strong> limiting the maneuverability of the moving nodes [1].<br />

The ocean is almost impervious to electro-magnetic waves which makes<br />

them useless for wireless underwater communication over distances greater<br />

than a hundred meters; wireless communication to submerged nodes can only<br />

be realized using sound. The network protocol GUWMANET presented in this<br />

paper, developed by Fraunhofer FKIE <strong>and</strong> FWG, is designed to establish a robust<br />

mobile ad-hoc UWN working in all-weather <strong>and</strong> sea conditions. Within this scope<br />

GUWMANET is a possible c<strong>and</strong>idate to fulfill delay tolerant scenarios defined by<br />

the project Robust Acoustic <strong>Communications</strong> in Underwater Networks (RACUN)<br />

under the European Defense Agency (EDA) [2], [3]. A detailed description of the scenarios<br />

follows in Chapter III.<br />

II. Physical layer restrictions<br />

In principle, sound waves can propagate several hundreds of kilometers<br />

in deep waters, nevertheless they underlie natural restrictions which make robust<br />

underwater communication challenging. Due to the fact that the absorption loss<br />

of sound waves increases with frequency, the available b<strong>and</strong>width stays in reciprocal<br />

relation to the maximum transmission range, as shown in Figure 1. In addition,<br />

the weather conditions influence the maximum transmission range, because breaking<br />

waves <strong>and</strong> rain increase the noise level. To overcome these b<strong>and</strong>width limitations,<br />

we introduce multi-hop strategies in our protocol, which are well-known from<br />

terrestrial Mobile Ad-hoc Networks (MANETs).<br />

Figure 1. Upper bound of the User Data Rate (UDR in bps) over transmission range (km) in deep<br />

<strong>and</strong> shallow waters <strong>and</strong> different weather conditions, simplified with homogeneous propagation<br />

conditions. The worse the weather condition, the lower is the expected transmission range


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

29<br />

GUWMANET is designed for a physical layer method based on impulse communication,<br />

the so called Transient Underwater Acoustic Communication System<br />

(TUWACS) [4]. It sends out short data bursts with a fixed length of 128 bit in 0.3 s<br />

plus 10 bits for a network header. This clarifies that there is no room for much protocol<br />

overhead <strong>and</strong> an underwater network protocol must be as efficient as possible.<br />

Another difference to terrestrial communications is the low <strong>and</strong> varying sound<br />

propagation speed between 1405 <strong>and</strong> 1560 meters per second. This does not only<br />

increase the Doppler compensation complexity significantly, but also the signal propagation<br />

delay. TUWACS is designed for a maximum internode distance of 10 km.<br />

This distance leads to an optimal frequency b<strong>and</strong> of 3.5−7.5 kHz. A transmission<br />

over a distance of 10 km needs 6−7 s, which must be considered in the protocol<br />

design. A basic assumption of terrestrial protocols is that the transmission time<br />

is much higher than the propagation time. Therefore, terrestrial network protocols<br />

cannot be easily adopted. Instead, a completely new one has to be developed from<br />

scratch to meet the requirements of underwater networks.<br />

III. Scenario<br />

With reference to Figure 2, in the scalable RACUN scenario [5] it is assumed<br />

that an underwater acoustic network is deployed in proximity of a harbor to be<br />

surveilled. All nodes are bottom-mounted <strong>and</strong> organized in subsequent barriers.<br />

These are sets of nodes arranged in a line topology: the first barrier is placed<br />

in front of the harbor, <strong>and</strong> is composed of the largest number of nodes in order to<br />

ensure the largest sensing coverage along the coast. The distance between nearest<br />

neighbors within a barrier is set to 3 km. The sensing range is assumed to be 2 km.<br />

Every 8 km comes another barrier which can sense movement as well as relay data<br />

towards the cooperating fleet at the sea base. Again, the nodes in the barrier are<br />

arranged in a line topology. While proceeding towards the sea base, the number<br />

of nodes per barrier is reduced from 5 (in the first barrier) to 2 (in the barrier farthest<br />

from the shore); in fact, the most important sensing task is carried out near<br />

the coast, whereas the barriers out at sea are key for relaying packets. Nevertheless,<br />

their sensed data are useful to confirm the detections of the first barrier <strong>and</strong> to give<br />

some further clue about the direction of movement of the boats exiting the harbor.<br />

The network covers a total area of 16 km × 32 km. We recall that the intended<br />

maximum transmission range of a node in our networks amounts to about 10 km,<br />

hence the barriers are typically in range of each other. In this paper, we assume<br />

that two nodes are deployed close to the last barriers: one buoy on the right<br />

side <strong>and</strong> one ship on the left side. These entities are part of the network, <strong>and</strong> act<br />

as seaborne sinks.<br />

Although the number of nodes is reduced after each barrier, our network topology<br />

features high connectivity, <strong>and</strong> multiple path alternatives exist. This makes<br />

the network robust against node failures as well as broken links (for example caused


30 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

by the noise of the boat propellers disturbing the communications). Additionally,<br />

the gateway buoy <strong>and</strong> the ship stationing at sea are equipped with both acoustic<br />

<strong>and</strong> radio communication hardware: therefore, as either receives data over acoustic<br />

links, such data is immediately relayed to all other sinks <strong>and</strong> the cooperating fleet<br />

using radio communications.<br />

Sea base with<br />

cooperating fleet<br />

Last barrier<br />

Ship<br />

Buoy<br />

8km<br />

3km<br />

First Barrier<br />

Surveilled harbor<br />

Figure 2. RACUN harbor surveillance network scenario, with 14 bottom nodes organized in 4 parallel<br />

barriers. Additionally, a ship <strong>and</strong> a gateway buoy act as sea-borne sinks, as they gather detection information<br />

from the network <strong>and</strong> relay it to the cooperating fleet stationing in the sea base area<br />

The traffic generation pattern in this scenario is inherently event-based, for<br />

example the detection of an intruder by a sensor node. Most of the time there is no<br />

communication in the network. Also the network protocol should work reactively<br />

instead of generating periodically control messages. This saves energy <strong>and</strong> keeps<br />

the network covert.<br />

IV. Application data<br />

Besides the physical layer restrictions, it is important to know which kind<br />

of data will be transmitted in the network in order to design an appropriate network<br />

protocol. Due to the low b<strong>and</strong>width the application data format must be as short <strong>and</strong><br />

efficient as possible. For this propose we specified the so called Generic Underwater


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

31<br />

Application Language (GUWAL) [6] which is suitable for any kind of underwater<br />

application. It is based on the following four parcel types:<br />

1. Data Request<br />

2. Data (sensor data, status, GPS position, ...)<br />

3. Comm<strong>and</strong> <strong>and</strong> Control (sleep, move, change mode, ...)<br />

4. Text Message (SMS)<br />

In GUWAL the basic parcel size is 128 bits; but it is also possible to use<br />

variable length if needed. All parcels include an operational header, a checksum<br />

of 16 bits each, <strong>and</strong> 96 bits payload with variable fields depending on the parcel<br />

type, as shown in Table 1. Among other fields, the header contains a source <strong>and</strong><br />

a destination address used for a cross-layer approach. An operational address<br />

is 6 bits long, whereby the first two bits define the type of the node. The following<br />

groups are defined:<br />

1. Gateway Node (buoy/ship with acoustic <strong>and</strong> radio link)<br />

2. Bottom Node (environment sensor or relay node)<br />

3. Mobile Node (submerged unit: diver, AUV, submarine)<br />

4. Surface <strong>and</strong> Air Nodes (node without acoustic link like ship, airplane or<br />

operation center via satellite).<br />

Table 1. Format of a GUWAL parcel with source, destination<br />

<strong>and</strong> priority field as header <strong>and</strong> a checksum<br />

Position Length Field<br />

1-2 2 Parcel Type<br />

3 1 End-to-End Acknowledgment<br />

4 1 Priority Flag<br />

5-10 6 Operational Source Address<br />

11-16 6 Operational Destination Address<br />

17-112 96 Payload<br />

113-128 16 Checksum<br />

The latter four bits are a node identifier to distinguish nodes of the same type,<br />

whereby zero is defined as broadcast to all nodes of the same type. The address<br />

with all bits set to one is reserved for broadcasting to all nodes in the network<br />

regardless of their type. As a result, there are 15 network addresses in groups<br />

1-3 <strong>and</strong> 14 in group 4, hence 59 in total. In order to allow more than 59 participants<br />

in the network, it is envisaged that multiple nodes can share the same<br />

address. For example, it is not m<strong>and</strong>atory from an operational point of view to<br />

distinguish bottom nodes in the same area, especially if they are only relay nodes.<br />

As a consequence, the network protocol may h<strong>and</strong>le nodes with the same address<br />

as multicast groups. How this is achieved by GUWMANET is explained in detail<br />

in the following chapter.


32 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

V. Protocol design<br />

In this chapter we introduce our new network protocol GUWMANET. In the first<br />

part, we introduce the Medium Access Control (MAC) <strong>and</strong> the Automatic Repeat re-<br />

Quest (ARQ) mechanisms which are used in GUWMANET. Furthermore, the details<br />

of the addressing problem resulting from shared multicast addresses are discussed.<br />

The introduction of a local nickname additional to the GUWAL network address<br />

is motivated. At the end we describe the initialization steps <strong>and</strong> the routing algorithm,<br />

followed by an extension for improvements based on network-coding strategies.<br />

A. Medium Access Control<br />

The MAC layer manages the access to the acoustic communication channel.<br />

This can be done in a contention-free manner like code, space, frequency or time<br />

division multiple access or r<strong>and</strong>omized, accepting possible collisions in the shared<br />

medium water. We decided to apply a time-based r<strong>and</strong>om access method, which<br />

is much more efficient than fixed divisions in networks with event based <strong>and</strong> bursty<br />

traffic <strong>and</strong> a physical layer using short impulses, as in underwater scenarios. A detailed<br />

survey of MAC mechanisms with regard to underwater acoustic networks<br />

can be found in [7].<br />

In r<strong>and</strong>om access methods every node can access the sound channel whenever<br />

it has data to send while regarding specific rules. The methods can be subdivided<br />

into two types, with previous channel reservation or direct data transmission.<br />

In our case channel reservation is inefficient, because the data packets consisting<br />

of 128 bits are already very short <strong>and</strong> a reservation would take a long time due to<br />

Round Trip Times (RTT) of up to 15 s having internode distances of 10 km. Moreover,<br />

the transmission times are with 0.3 s short compared to the long propagation delay.<br />

Most of the time, nodes wait for incoming data packets instead of transmitting.<br />

This is an important distinction to terrestrial networks.<br />

Another consideration is to apply carrier-sensing before transmitting data.<br />

However, sensing the medium prior to a transmission does not allow drawing<br />

conclusions about the channel state at the receiver side several seconds later when<br />

the signal arrives. Hence, we use a simple ALOHA [8] method without carriersensing<br />

in GUWMANET. Nevertheless, we point out that underwater acoustic<br />

communication is half-duplex. It is not possible to transmit data during a reception<br />

or vice versa.<br />

B. Automatic Repeat reQuest<br />

Using a r<strong>and</strong>om access method like ALOHA means that packet collisions may<br />

occur, even if the transmissions itself are very short. Additionally, bit errors due<br />

to high noise or low signal strength can result in packet losses. Therefore, ARQ


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

33<br />

methods have to be used to guarantee a successful reception. Typically, the receiver<br />

node sends an acknowledgment packet back to the transmitter to indicate a correct<br />

packet reception. If an acknowledgment stays out, the source node will automatically<br />

repeat the packet after a predefined period of time.<br />

The application language GUWAL already supports end-to-end acknowledgments,<br />

which are sent by the final destination node as operational notice of receipt.<br />

This acknowledgment is optional <strong>and</strong> is requested by setting the acknowledgment<br />

bit in the header.<br />

In multi-hop networks it is reasonable to add additional link layer packet<br />

repetition mechanisms, which will detect packet losses at each hop. In wired networks<br />

explicit packets have to be sent to inform the transmitter about a successful<br />

reception. In MANETs this can be done in an implicit way without additional<br />

transmissions due to the shared medium in wireless multi-hop networks. The source<br />

node is able to overhear if the next hop forwards the packet <strong>and</strong> therefore gets a so<br />

called implicit acknowledgment. If the packet will not be forwarded, the source<br />

node will automatically repeat the packet until it overhears a packet forwarding attempt.<br />

In consequence, the destination node must also repeat the packet to inform<br />

the previous hop about the successful reception.<br />

In GUWMANET this implicit acknowledgments are used with exponential<br />

backoff timers for packet error control as described later in Section G. Additionally,<br />

our network protocol is delay tolerant <strong>and</strong> supports so called Emission Control<br />

(EMCON), which means that nodes can decide to stay silent for an arbitrary time<br />

period. This is for example important for submarines, which do not want to get<br />

detected due to transmissions. Therefore, it is possible that acknowledgments stay<br />

out, even the transmission was successful. A packet is repeated with exponential<br />

backoff to attempt to deliver the packet successfully, but it cannot be guaranteed<br />

that the packet was received correctly. It is also not possible to make assumptions<br />

like a node is broken even if it did not reply for a longer period. Nevertheless, for<br />

this period where a node stays in EMCON state it is not available for packet forwarding<br />

<strong>and</strong> related routes have to be updated.<br />

C. Addressing<br />

As mentioned earlier, each network address can be used as multicast group<br />

including multiple nodes of the same type. From operational view, it is not m<strong>and</strong>atory<br />

to distinguish nodes inside this group, but for the network protocol it is<br />

m<strong>and</strong>atory to facilitate forwarding mechanisms. Therefore, we introduce a second<br />

local address of 5 bits in addition to the global 6 bit operational network address,<br />

which is independent from the network address <strong>and</strong> the node type. In the following<br />

this local address is called nickname.<br />

To allow full ad-hoc capability, the local nicknames are not predefined <strong>and</strong><br />

have to be chosen automatically after network deployment. In our MANET exists


34 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

no master node coordinating the address allocation, therefore each node has to<br />

choose its nickname by itself. These should be unique in the local 2-hop neighborhood<br />

to allow all nodes to distinguish between its neighbors. Typically, this<br />

is done making a neighborhood discovery, where the new node requests lists with<br />

neighborhood information from all its neighbors. We propose another algorithm to<br />

reduce the number of transmissions <strong>and</strong> thereby the energy consumption, because<br />

battery power is a limited resource in underwater scenarios.<br />

The idea is to overhear at first the network traffic for a listen period T L . If during<br />

this period communication takes place in the neighborhood, the node becomes<br />

acquainted with its neighbors <strong>and</strong> learns their nicknames passively. Additionally,<br />

it gets information about its 2-hop neighborhood, because the network header<br />

of GUWMANET includes beside the transmitter’s nickname also the nickname<br />

of the last hop, as described later. After T L the node knows a subset of its 2-hop<br />

neighborhood <strong>and</strong> chooses r<strong>and</strong>omly a presumably free local nickname. Now<br />

it transmits to its local neighborhood a nickname notification (NN) parcel to indicate<br />

its presence <strong>and</strong> nickname choice. The chosen nickname is included in the network<br />

header as source address. All other information is included inside a special GUWAL<br />

parcel. GUWAL has reserved a separate data type for such network control parcels<br />

where each network protocol can define up to eight individual control parcels.<br />

The network control parcel NN of GUWMANET includes the predefined<br />

multicast GUWAL address of the node, its unique 16 bit MAC address <strong>and</strong> a list<br />

with up to 10 local nicknames of its by now known 1-hop neighbors, as shown<br />

in Table 2. Typically, underwater networks are sparse; anyway, multiple NN packets<br />

are sent if there are more than 10 neighbors. The NN parcels are also used for<br />

network initialization described in the next section.<br />

Table 2. Format of a Nickname Notification (NN) parcel included in a GUWAL Data frame<br />

Position Length Field<br />

1-2 2 Parcel Type (Data)<br />

3 1 End-to-End Acknowledgment (no)<br />

4 1 Priority Flag (low)<br />

5-10 6 Source Address (own address)<br />

11-16 6 Destination Address (broadcast = 111111 2 )<br />

17-20 4 Data Type (Network Control)<br />

21-23 3 Network Control Type (NN)<br />

24-42 19 Timestamp<br />

43-92 50 Nicknames of 10x 1-hop Neighbors<br />

93-108 16 MAC (own address)<br />

109-111 3 unused<br />

113-128 16 Checksum


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

35<br />

If any of the neighbors receives a NN <strong>and</strong> has an objection, because it already<br />

has a neighbor with this nickname, it replies with a nickname collision notification<br />

(NCN) parcel which has the same fields as the NN parcel. But instead of using<br />

the own 16 bit MAC address the one of the discovering node is used which<br />

was included in the corresponding NN parcel. This allows the discovering node to<br />

extend its 2-hop neighborhood list <strong>and</strong> to choose another free nickname. Before<br />

transmitting a new updated NN parcel the node waits a period T C to collect further<br />

NCN parcels if such were send. In the case a node receives an NN parcel in which<br />

it is not included in the 1-hop neighborhood list, it automatically sends its own<br />

NN parcel to inform the other node about its presence, if it has not already sent<br />

an NCN parcel for that nickname notification.<br />

NCN parcels are repeated with a binary exponential backoff algorithm until<br />

a new NN parcel is received or a limit of L rep is reached. An exponential backoff<br />

is used to allow fast repetitions to correct simple packet errors at the beginning<br />

<strong>and</strong> late repetitions to h<strong>and</strong>le (temporally) asymmetric or broken links. NN parcels<br />

are not repeated automatically, only after the incoming of NN or NCN parcels<br />

of neighbor nodes.<br />

Although the probability is low, it is possible that nickname collisions stay<br />

undetected. This may occur due to packet losses, asymmetric or temporally broken<br />

links during the nickname allocation, or mobile nodes moving to other areas.<br />

Therefore, the network protocol is designed to tolerate double nickname occupancies.<br />

This only leads to redundancies during packet forwarding as will be shown<br />

later. If a nickname collision is detected later, the detecting node will try to fix this<br />

by sending an NCN parcel, followed by the same procedure as described above.<br />

D. Initialization<br />

In our network protocol each node among the nickname needs some initial<br />

network control information. This information is exchanged automatically with<br />

an initialization parcel after a node deployment to allow full ad-hoc capability.<br />

This parcel includes for example a 32 bit UNIX timestamp. The timestamp is used<br />

as reference time for a shortened 19 bit timestamp which is used in GUWAL, see<br />

Table 2. It allows date stamping inside a three month operating period with an accuracy<br />

of 15 s.<br />

Due to the limited battery power resulting in an operation period of three<br />

month, inaccurate clocks with a clock drift of one second per week <strong>and</strong> a lack of synchronization<br />

it is not necessary to have a longer timestamp with higher accuracy.<br />

Before a node can use this shortened GUWAL timestamp it must know the starting<br />

point regarding to the UNIX timestamp where the GUWAL timestamp is zero.<br />

The initialization parcel is send out as reply to parcels with a timestamp set<br />

to zero, here the NN parcel. After the node received the initialization parcel it is<br />

ready for use.


36 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

E. Routing<br />

In this section we describe the routing strategies of GUWMANET in detail.<br />

As mentioned before, multi-hop strategies <strong>and</strong> multicast addresses are used to<br />

fulfill the operational needs of an underwater network. Besides this, an important<br />

design aspect was to have as less overhead as possible due to fixed burst length<br />

of the underlying impulse communication.<br />

The basic idea behind GUWMANET is to leave the decision whether to forward<br />

a parcel to the nodes themselves, comparable to the behavior when gossiping.<br />

A node hears a parcel/gossip <strong>and</strong> decides if there are nodes in the neighborhood<br />

which may be interested in this information. If any node repeats everything we have<br />

simple flooding, but this is very inefficient <strong>and</strong> wastes a lot of energy. Therefore,<br />

the nodes in our network learn passively if they are on the direct route to the destination.<br />

As already mentioned, we need only 10 bits additional network protocol<br />

overhead for this purpose. The 5 bit local nickname of the transmitter <strong>and</strong> during<br />

route establishments the nickname of the last or next hop.<br />

In the beginning, the nodes have only information about the topology in the local<br />

two-hop neighborhood. To get global topology information, each node stores<br />

all incoming packets:<br />

P D × H × T × S<br />

whereby D represents the 128 bits GUWAL data packets, H the network headers,<br />

T the local receive times <strong>and</strong> S the estimated Signal-to-Noise Ratio (SNR).<br />

After a listen period T L plus an additional r<strong>and</strong>om backoff time T Backoff each<br />

node forwards the data packet d, even if it is addressed itself as destination, because<br />

there might exist more nodes in the network with the same operational network<br />

address (multicast). The forwarding node puts its own nickname into the source<br />

address field of the network header. For the last hop field all received parcels with<br />

data content d in M are considered:<br />

P d : ={(d', h', t', s') P | d' = d}<br />

In this subset all parcels with a SNR lower than a threshold SNR min are filtered<br />

out:<br />

P : {( d ', h', t ', s') P | s' SNR<br />

}<br />

d<br />

As last hop field the own nickname is chosen if the node is the first transmitter<br />

or the nickname of the transmitter of the first received parcel m in P * d or,<br />

if P * d is empty, the parcel with the highest SNR is chosen:<br />

<br />

* * *<br />

p' Pd : p" Pd : t' t", if Pd<br />

<br />

P <br />

<br />

p' P : p" P : s' s", else <br />

d<br />

d<br />

If a node overhears that it was elected as last hop inside a forwarded message<br />

of one of its neighbors, it generates a temporary routing entry with the two 6 bits<br />

d<br />

min


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

37<br />

source <strong>and</strong> destination addresses included in the data part <strong>and</strong> the physical addresses<br />

of the last <strong>and</strong> next hop.<br />

All addressed destination nodes receiving the packet have to reply with<br />

an acknowledgment parcel. With the help of the temporary routing entries<br />

the acknowledgment packet can be routed back to the source node. Each node<br />

that was elected as last hop knows that it is on the direct way back to the source<br />

node <strong>and</strong> responsible for data forwarding. All nodes being involved in the back<br />

routing process convert the temporary routing entries into permanent ones <strong>and</strong><br />

will now forward all data packets with the same GUWAL source <strong>and</strong> destination<br />

address tuple. We emphasize that after this process only the routes from<br />

the source node to the destination nodes are learned but not vice versa, because<br />

there might be more nodes with the same address like the source node which<br />

are not considered yet.<br />

After a route is established, all following data transmissions are sent with the last<br />

hop field set to zero. This indicates that there is a known route <strong>and</strong> all other nodes<br />

without permanent routing entries should not flood this message again. If the route<br />

gets broken due to node or link failures, the last hop field is reused again as before,<br />

which initiates a new route discovery with flooding.<br />

Mobile nodes like submarines <strong>and</strong> AUVs possess a special role during the route<br />

discovery process. Due to their mobility, they are bad c<strong>and</strong>idates for static routes.<br />

Therefore, they are only elected as last hops if there exist no alternatives after<br />

an additional waiting period of T mob . Also, the established routes to or from mobile<br />

nodes have a limited lifetime. If a node has not forwarded a message during<br />

a predefined time period T life the routing entries are discarded <strong>and</strong> a new routing<br />

process is started, because it is unlikely that this route still works. Mobile nodes<br />

can be easily identified by their operational address; they have the group number 3<br />

as defined in Chapter IV.<br />

We explain in the next section with a simple example how the above described<br />

route establishment works.<br />

F. Route establishment example<br />

Figure 3 shows an example topology whereby each dot represents a node<br />

<strong>and</strong> each line a connection between two nodes. The number above each node<br />

represents its local nickname, whereby the apostrophes are only for distinction<br />

in this description. In reality the nicknames 1 <strong>and</strong> 1’ are equal. The local nicknames<br />

should only be unique in the two-hop neighborhood if possible. In the following,<br />

we explain how the route establishment works; if node 1 with the GUWAL address<br />

A wants to transmit data to node 4’ with the GUWAL address B.


38 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 3. Example network topology with local nicknames<br />

First of all, node 1 broadcasts its data packet. Thereby, the source nickname<br />

<strong>and</strong> the last hop field inside the network header are set to 1:<br />

1 → [1,1] + [A → B: DATA]<br />

In the beginning, no nodes have routing information. Therefore, all neighbors<br />

of node 1 which receive this message forward the data. The parcel itself stays steady,<br />

whereby the source nickname of the network header is replaced by the nickname<br />

of the forwarding node. As last hop the nickname of node 1 is chosen, as shown<br />

in Figure 4.<br />

2 → [2,1] + [A → B: DATA]<br />

In this way, the message is flooded through the network.<br />

Figure 4. Node 2 rebroadcasts the data of node 1. Node 1 overhears that it was chosen as last hop<br />

<strong>and</strong> creates a temporally routing entry<br />

Figure 5. Temporally routes (see Table 3) used to send back the acknowledgment.<br />

On the way back, the routing entries get persistent<br />

During this flooding process each node overhearing a message with a last hop<br />

nickname equal to its own creates a routing entry in a temporally routing table,<br />

as shown in Table 3.<br />

Also the addressed node 4’ with the GUWAL address rebroadcasts the data parcel,<br />

because there might be more nodes with the GUWAL address B in the network:<br />

4’ → [4,3] + [A → B: DATA]


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

39<br />

After this, node 4’ sends out an acknowledgment parcel which is forwarded<br />

back to node 1 using the temporally routing tables. During the complete back<br />

forwarding the last hop field is set to zero:<br />

4’ → [4,0] + [B → A: ACK]<br />

Table 3. Temporally routing entries of all nodes<br />

Node From To Next Node From To Next<br />

1 A B 2 7 A B 8<br />

1 A B 3 8 A B 6’<br />

1 A B 4 3’ A B 4’<br />

1 A B 5 5’ A B 7’<br />

1 A B 6 6’ A B 2’<br />

1 A B 7 7’ A B 1’<br />

2 A B 3’ 4’ A B 8’<br />

3 A B 5’<br />

Due to the empty last hop field, the message is not flooded back. Instead,<br />

only node 3’ forwards the acknowledgment back, because it has a temporally<br />

routing entry after overhearing his election as last hop from node 4’ in the previous<br />

transmission. This is repeated until the acknowledgement reaches node<br />

1 <strong>and</strong> a complete persistent route is established. Even, if there is more than one<br />

destination node, all routes are learned simultaneously. Additionally, we point out<br />

that it is necessary to store the data parcel itself in each temporally routing entry,<br />

to distinguish parallel route discoveries. The acknowledgment parcel includes<br />

the 16 bit checksum of the data parcel which allows an association of the ACK<br />

with the temporary routing entry.<br />

As mentioned before, this route is valid for transmissions from A to B only<br />

<strong>and</strong> not vice versa, because the GUWAL address of A is not necessarily used<br />

as unicast address.<br />

G. Packet loss <strong>and</strong> broken link h<strong>and</strong>ling<br />

In general, the probability of collisions in the underwater channel is very low;<br />

even though flooding creates a lot of redundancy during the route establishment<br />

phase. That is because the transmission time is very low compared to the propagation<br />

time; in consequence the channel is idle most of the time <strong>and</strong> not occupied<br />

with an ongoing transmission. In our underlying impulse communication we have<br />

a transmission time of 0.3 s for a GUWAL parcel whereas the propagation time<br />

can be up to 6−7 s. This is a fundamental difference to terrestrial networks where<br />

the data rate is much higher <strong>and</strong> the signals propagate with light speed.


40 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

On the other side, the bit error rate of an underwater channel can be very<br />

high, depending on weather conditions <strong>and</strong> noise. Therefore, packet losses must be<br />

h<strong>and</strong>led. As mentioned in the previous chapter we use implicit acknowledgments<br />

to indicate successful transmissions from hop to hop. If a packet forwarding from<br />

a neighbor stays out, the message will be repeated. In GUWMANET a message<br />

is retransmitted up to 5 times with an exponential backoff. After this, the link<br />

is declared as broken <strong>and</strong> the neighbor is removed from the neighborhood list.<br />

If a link is broken during a forwarding process on an established route, the route<br />

has to be updated. As already mentioned, this is done by using the last hop field.<br />

The neighbor nodes will flood the message again, if the last hop field is nonzero.<br />

This results in a new route discovery process to renew the broken route.<br />

Nevertheless, these single routes without redundancy are very vulnerable to<br />

temporally link failures or asymmetric links. To overcome this problem, we introduce<br />

in the next section an enhancement of GUWMANET, which adds additional<br />

redundancy along a route if necessary.<br />

H. Corridor as route enhancement<br />

In this section we introduce a modification of GUWMANET to enhance<br />

the packet delivery ratio during bad weather conditions. Rain <strong>and</strong> breaking waves<br />

on the surface increase the channel noise significantly which leads to a much<br />

higher bit error rate. To overcome this problem, additional redundancy is generated<br />

by involving the neighbors along the direct route. We call this enlarged route<br />

corridor, which is illustrated in Figure 6.<br />

Figure 6. Corridor as route enhancement for a higher packet delivery ratio<br />

For this objective, the route discovery process is modified in the following<br />

way. If a data parcel reaches one of its addressed destination nodes it will send<br />

out an acknowledgement as usual. But this time, the last hop is not left empty<br />

anymore. Instead, it is used in acknowledgment parcels as next hop field, wherein<br />

the transmitter puts its elected previous hop. This node is intended to forward<br />

the acknowledgment back to the source node. Now, not only this elected next<br />

hop will forward the packet, but also all nodes having this elected node as direct<br />

neighbor. This is like gossiping in the real world; gossip is circulated if you know<br />

your neighbor is interested in it too.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

41<br />

Figure 7 shows an example. Node 4’ has elected node 3’ as next hop, whereby<br />

node 6’ <strong>and</strong> node 7’ knowing node 3’ <strong>and</strong> 4’ participate as corridor nodes in the forwarding<br />

process. Multiple receptions at node 3’ allow utilization of network-coding<br />

strategies, as described later in Chapter VII. This technique allows restoring messages,<br />

even if all single transmissions are error-prone.<br />

Figure 7. Adding next hop during back forwarding of an acknowledgment<br />

To avoid unnecessary transmissions, the additional corridor nodes only forward<br />

the data if the node on the direct route did not. For this purpose, we introduce<br />

an additional backoff T corridor to the normal backoff T backoff combined with the link<br />

quality L quality which is between 0 <strong>and</strong> 1:<br />

T forward = T backoff + T corridor . (2 − L quality )<br />

The timer is canceled if the node overhears a transmission of the node on<br />

the direct route or reset if the message was repeated first by another neighbor.<br />

During the back forwarding of the acknowledgment the nodes on direct node<br />

make their persistent routing entries as before. But this time, also the nodes on<br />

the corridor make persistent routing entries, which indicate that they are jointly<br />

responsible to forward data parcels. Note, during data forwarding the next/last<br />

hop is still not used <strong>and</strong> left empty as before. The packet forwarding will be only<br />

decided with the usage of the persistent routing entries.<br />

VI. Evaluation<br />

Sea trials are costly due to the need of expensive equipment <strong>and</strong> personal. Therefore,<br />

we developed an underwater acoustic emulation system to test GUWMANET<br />

in an environment as close as possible to real hardware. This emulation test bed<br />

uses a real acoustic channel with the same physical layer methods as underwater.<br />

The only difference is, that the communication takes place in air instead of water.<br />

Insulation material is used to model the absorption losses of sound waves, which<br />

allows the modulation of a scenario of 8 km × 30 km. Only the propagation delay<br />

is artificially created by delaying incoming transmissions.<br />

A cluster of 10 computers equipped with microphones <strong>and</strong> loudspeakers are<br />

used to emulate the network nodes. They are arranged in a topology similar to<br />

the RACUN scenario described in Chapter III with 4 barriers consisting of 9 bottom<br />

nodes <strong>and</strong> an additional mobile node.


42 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

We implemented GUWMANET inside this emulations system <strong>and</strong> made<br />

a concept study of the routing mechanisms <strong>and</strong> first performance analyses. The route<br />

establishment algorithms were tested with 3 hops <strong>and</strong> multicast addresses. These<br />

emulations are the first step of the evaluation <strong>and</strong> will be enlarged to additional<br />

simulations <strong>and</strong> sea trials.<br />

VII. Network-coding<br />

In underwater acoustic networks high bit error rates are common. Therefore,<br />

error detection <strong>and</strong> correction techniques have to be used to enable reliable communications.<br />

Common ways are the use in the form of so called checksums in combination<br />

with ARQ <strong>and</strong> Forward Error Correction (FEC) mechanisms in the physical<br />

layer methods. If a packet error is detected, the simplest way is to drop the packet<br />

<strong>and</strong> wait/ask for a retransmission. But retransmissions waste valuable energy, occupy<br />

the channel <strong>and</strong> increase the packet delay.<br />

A much more efficient way is to use a posteriori error correction techniques<br />

like clustering of all incoming short 128 bit parcels. The idea behind this is to merge<br />

multiple corrupted parcels <strong>and</strong> merge them into correct one. In real life gossiping<br />

messages contains lies; the gossip average results in true facts. The network-coding<br />

approach with clustering techniques was proposed in the RACUN project [9] <strong>and</strong><br />

is an essential part of gossiping.<br />

VIII. Conclusion<br />

In this paper we introduced a new network called Gossiping in Underwater<br />

Mobile Ad-Hoc Networks (GUWMANET). This protocol is designed from scratch<br />

fitting to the special needs of underwater communication. It is designed to fulfill<br />

the requirements of the scenarios defined in the RACUN project; an European project<br />

for robust underwater communication, supporting stationary as well as bottom nodes.<br />

GUWMANET is based on impulse communication as physical layer method,<br />

which sends out short data bursts with a fixed length of 128 bit. This makes it necessary,<br />

that our protocol gets along with only 10 bit additional protocol overhead.<br />

These 10 bits are used for two 5 bit local nicknames, identifying the transmitter<br />

node <strong>and</strong> the last hop. With the help of these two fields a persistent route can be<br />

found, even if there are multiple destinations. We also defined the Generic Underwater<br />

Application Language (GUWAL) to overcome the restrictions of 128 bits for<br />

application data.<br />

At least, we introduced a protocol enhancement using corridors for packet<br />

forwarding. These corridors generate additional redundancy if necessary <strong>and</strong> enable<br />

network-coding strategies to restore error-prone messages. This is done by using<br />

clustering algorithms, which can be used to the low message size of 128 bit <strong>and</strong><br />

the low number of packet transmissions in underwater networks.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

43<br />

IX. Future work<br />

As mentioned in the evaluation chapter, we already made first concept studies<br />

<strong>and</strong> analyses of GUWMANET. The next steps are simulations with the simulation<br />

framework DESERT Underwater, an NS-Miracle-based [11], [13] framework to<br />

DEsign, Simulate, Emulate <strong>and</strong> Realize Test-beds for underwater network protocols [10]<br />

developed by the University of Padova. This framework allows us to enlarge our<br />

studies to higher node numbers as were foreseen in the RACUN scenario. Beside<br />

this, GUWMANET can be compared with other network protocols which are<br />

already implemented in DESERT underwater.<br />

After detailed simulation <strong>and</strong> emulation studies sea trials are planned to<br />

demonstrate the capability of our network protocol to fulfill the requirements<br />

of the RACUN scenario.<br />

X. Acknowledgment<br />

We gratefully acknowledge the partners of the project Robust Acoustic <strong>Communications</strong><br />

in Underwater Networks (RACUN) for their helpful discussions <strong>and</strong><br />

advices. The RACUN project is part of the EDA UMS program (European Unmanned<br />

Maritime Systems for MCM <strong>and</strong> other naval applications), <strong>and</strong> is funded<br />

by the Ministries of Defence of the five participating nations Germany, Italy, Netherl<strong>and</strong>s,<br />

Norway, Sweden. Partners of this project are: Atlas Elektronik (Germany),<br />

WTD71-FWG (Germany), L-3 <strong>Communications</strong> ELAC Nautik (Germany), TNO<br />

(The Netherl<strong>and</strong>s), Kongsberg Maritime (Norway), FFI (Norway), FOI (Sweden),<br />

SAAB (Sweden), WASS (Italy) <strong>and</strong> CETENA (Italy).<br />

References<br />

[1] I.F. Akyildiz, D. Pompili, T. Melodia, “Underwater Acoustic Sensor Networks:<br />

Research Challenges”, Ad Hoc Networks, vol. 3, no. 3, pp. 257-279, May 2005.<br />

[2] European Defense Agency (EDA) Project Arrangement No. B0386, http://www.<br />

racun-project.eu<br />

[3] J. Kalwa, “The RACUN-project: Robust acoustic communications in underwater<br />

networks – An overview”, OCEANS, 2011 IEEE – Spain, pp. 1-6, 6-9 June 2011, DOI:<br />

10.1109/Oceans-Spain.2011.6003495.<br />

[4] I. Nissen, “Alternativ Ansatz zur verratsarmen Unterwasser-kommunikaton durch<br />

Verwendung eines Transienten im Kontext von IFS und JUWEL”, FWG Research Report<br />

IB 2009-3; Research Department for Underwater Acoustics <strong>and</strong> Marine Geophysics<br />

(FWG) – WTD 71, Kiel, 2009.<br />

[5] M. Goetz, S. Azad, P. Casari, I. Nissen, M. Zorzi, “Jamming-Resistant Multipath<br />

Routing for Reliable Intruder Detection in Underwater Networks”, Proceedings


44 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

of the Sixth ACM Inernational Workshop on Underwater Networks, WUWNet’11,<br />

Seattle, Washington, USA, Dec. 1-2, 2011. DOI: 10.1145/2076569.2076579.<br />

[6] I. Nissen, M. Goetz, “Generic Underwater Application Language (GUWAL) –<br />

A Specification Approach”, Research Report WTD71 – 0161/2010 FB, Kiel, Germany,<br />

20.12.2010.<br />

[7] R. Otnes, A. Asterjadhi, P. Casari, M. Goetz, T. Husøy, I. Nissen, K. Rimstad,<br />

P. van Walree, M. Zorzi, “Underwater Acoustic Networking Techniques”, SpringerBriefs<br />

in Electrical <strong>and</strong> Computer Engineering, DOI: 10.1007/978-3-642-25224-2_1, 2012.<br />

[8] N. Abramson, “Development of the ALOHANET”. IEEE Transactions on <strong>Information</strong><br />

Theory, 31(2):119-123, 1985.<br />

[9] I. Nissen, M. Goetz, T. Wiegmann, T. Schäl, “Clustering of tactical underwater<br />

messages”, Research Report WTD71-0065/2012, Kiel 2012. In Preparation.<br />

[10] R. Masiero, S. Azad, F. Favaro, M. Petrani, G. Toso, F. Guerr, P. Casari, M. Zorzi,<br />

“DESERT Underwater: an NS-Miracle-based framework to DEsign, Simulate, Emulate<br />

<strong>and</strong> Realize Test-beds for Underwater network protocols”, Oceans 2012, Yeosou, Republic<br />

of Korea, May 2012.<br />

[11] The Network Simulator – ns-2, Last time accessed: March 2012. Available:<br />

http://nsnam.isi.edu/nsnam/index.php/User_<strong>Information</strong><br />

[12] The DESERT Underwater libraries – DESERT, Last time accessed: March 2012.<br />

Available: http://nautilus.dei.unipd.it/desert-underwater<br />

[13] The Network Simulator – NS-Miracle, Last time accessed: March 2012. Available:<br />

http://dgt.dei.unipd.it/download


Network Routing by Artificial Neural Network<br />

Michal Turčaník<br />

Department of Informatics, Armed Forces Academy, Liptovský Mikuláš, Slovakia,<br />

michal.turcanik@aos.sk<br />

Abstract: Author presents a design of the artificial neural network for routing in the sensor network<br />

in this paper. The routing table is replaced by artificial neural network. The main aim is to realize this<br />

operation as fast as possible. Optimized neural network is implemented in the reconfigurable hardware.<br />

The paper concludes with possible future research areas.<br />

Keywords: artificial neural network, FPGA, network routing<br />

I. Introduction<br />

Sensor networks consist of small nodes with sensing, computation, <strong>and</strong> wireless<br />

communications capabilities. Many routing, power management, <strong>and</strong> data<br />

dissemination protocols have been specially designed for sensor network where<br />

saving energy is an essential design issue. The focus, however, has been given to<br />

the routing protocols which might differ depending on the application <strong>and</strong> network<br />

architecture.<br />

A new approach has been proposed for the routing problem in the sensor<br />

network in this paper. The routing table is replaced by artificial neural network<br />

in this approach. The main aim is to realize this operation as fast as possible.<br />

In this paper author used offline learning method. Offline training regards to<br />

learning procedure on a general-purpose computing platform before the trained<br />

system is implemented in hardware. The software that was chosen for offline training<br />

is MATLAB. Also was used Xilinx ISE to synthesize of VHDL code <strong>and</strong> simulate.<br />

This paper is organized as follows: part II introduces the sensor network topology.<br />

Part III presents artificial neural network (ANN). Using ANN for network<br />

routing <strong>and</strong> ANN optimization is presented in part IV. Part V presents the results<br />

<strong>and</strong> discussion about results, <strong>and</strong> finally part VI concludes the paper.<br />

II. Sensor network topology<br />

Networking unattended sensor nodes may have profound effect on the efficiency<br />

of many military <strong>and</strong> civil applications such as target field imaging, intru-


46 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

sion detection, weather monitoring, security <strong>and</strong> tactical surveillance, distributed<br />

computing, detecting ambient conditions such as temperature, movement, sound,<br />

light, or the presence of certain objects, inventory control, <strong>and</strong> disaster management.<br />

Deployment of a sensor network in these applications can be in r<strong>and</strong>om fashion<br />

(e.g., dropped from an airplane) or can be planted manually (e.g., fire alarm sensors<br />

in a facility). For example, in a disaster management application, a large number<br />

of sensors can be dropped from a helicopter. Networking these sensors can assist<br />

rescue operations by locating survivors, identifying risky areas, <strong>and</strong> making the rescue<br />

team more aware of the overall situation in the disaster area [1].<br />

Figure 1. Sensor network (R – router, S – sensor)<br />

In the past few years, an intensive research that addresses the potential of collaboration<br />

among sensors in data gathering <strong>and</strong> processing <strong>and</strong> in the coordination<br />

<strong>and</strong> management of the sensing activity were conducted. However, sensor nodes<br />

are constrained in energy supply <strong>and</strong> b<strong>and</strong>width. Thus, innovative techniques that<br />

eliminate energy inefficiencies that would shorten the lifetime of the network are<br />

highly required. Such constraints combined with a typical deployment of large<br />

number of sensor nodes pose many challenges to the design <strong>and</strong> management sensor<br />

networks <strong>and</strong> necessitate energy-awareness at all layers of the networking protocol<br />

stack. For example, at the network layer, it is highly desirable to find methods for<br />

energy-efficient route discovery <strong>and</strong> relaying of data from the sensor nodes so that<br />

the lifetime of the network is maximized [2].<br />

III. Artificial neural network<br />

Artificial neural networks have been trained to perform complex functions<br />

in various fields, including pattern recognition, identification, classification, speach,


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

47<br />

vision, <strong>and</strong> control systems [9, 10, 11]. Neural networks are composed of simple<br />

elements operating in parallel. These elements are inspired by biological nervous<br />

systems. As in the nature, the connections between elements largely determine<br />

the network function. A neural network can be trained to perform a particular<br />

function by adjusting the values of the connections (weights) between elements.<br />

Typically, neural networks are adjusted, or trained, so that a particular input leads<br />

to a specific target output. There, the network is adjusted, based on a comparison<br />

of the output <strong>and</strong> the target, until the network output matches the target. Typically,<br />

many such input/target pairs are needed to train a network [3].<br />

Many variations of the perceptron were created by Rosenblatt [4]. One of the simplest<br />

was a single-layer network whose weights <strong>and</strong> biases could be trained to produce<br />

a correct target vector when presented with the corresponding input vector.<br />

The training technique used is called the perceptron learning rule. The perceptron<br />

generated great interest due to its ability to generalize from its training vectors <strong>and</strong><br />

learn from initially r<strong>and</strong>omly distributed connections. Perceptrons are especially suited<br />

for simple problems in pattern classification. They are fast <strong>and</strong> reliable networks for<br />

the problems they can solve. Feedforward networks often have one or more hidden<br />

layers of sigmoid neurons followed by an output layer of linear neurons. Multiple layers<br />

of neurons with nonlinear transfer functions allow the network to learn nonlinear<br />

relationships between input <strong>and</strong> output vectors. The linear output layer is most often<br />

used for function fitting (or nonlinear regression) problems [7].<br />

A multi-layer perceptron (Fig. 2) consists of neurons <strong>and</strong> synapsies (connections).<br />

Each neuron has an input, activation <strong>and</strong> output function. Each synapsy between<br />

two neurons has a weight. The units are organized in layers. Three different types<br />

of neurons are distinguished: input neurons, hidden neurons <strong>and</strong> output neurons.<br />

The input units receive the input data, <strong>and</strong> the output units provide the output [8].<br />

Figure 2. Multilayer perceptron


48 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The calculation of the final output values proceeds layer by layer. First, the input<br />

signals are applied to the input layer, <strong>and</strong> each neuron of the input layer calculates<br />

its output value. Next, these values are propagated to the next layer; until the output<br />

layer is reached.<br />

IV. Using the artificial neural network for network routing<br />

A. Clasical table look-up aproach in the sensor network<br />

The primary role of routers is to forward data towards their final destination.<br />

A router must decide for each incoming packet where to send it next. More exactly,<br />

the forwarding decision consists in finding the address of the next-hop router as well<br />

as the egress interface through which the packet should be sent. This forwarding<br />

information is stored in a forwarding table that the router computes based on the information<br />

gathered by routing protocols. To consult the forwarding table, the router<br />

uses the packet’s destination address as a key; this operation is called address lookup.<br />

Specifically, the address lookup operation is a major bottleneck in the forwarding<br />

performance of today’s routers. This paper presents a proposal a new method<br />

to realize algorithm for efficient address lookup.<br />

B. Artificial neural network topology<br />

Neural networks map between a data set of numeric inputs <strong>and</strong> a set of numeric<br />

targets. To solve a problem of routing in the mash topology of the sensor<br />

network (Fig. 1) was used artificial neural network. A three layer feed-forward<br />

network with sigmoid hidden neurons <strong>and</strong> linear output neurons are used to solve<br />

multi-dimensional problems.<br />

Figure 3. The structure of the multilayer perceptron for network routing


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

49<br />

The structure of the multilayer perceptron is shown in Fig. 3. The input layer<br />

of the neural network receives input data for routing in the sensor network. Input<br />

data represent address (node ID) of the data packet that should be transferred<br />

through sensor network (Fig. 1). The interface status represents information<br />

about status of all interfaces for single router. All active interfaces can be used<br />

to route data. Data communications using inactive interfaces are rerouted to active<br />

interfaces. Some sensor nodes may fail or be blocked due to lack of power,<br />

physical damage, or environmental interference. The failure of sensor nodes<br />

should not affect the overall task of the sensor network. If many nodes fail, routing<br />

protocols must accommodate formation of new links <strong>and</strong> routes to the data<br />

collection base stations.<br />

The number of the input layer neurons corresponds to the input information<br />

for multilayer perceptron. The number of the neurons of the hidden layer is a target<br />

of the optimization. The number of the neurons of the output layer corresponds to<br />

the number of the interfaces of the router of the sensor network.<br />

The value of the output layer´s neurons represents index of the interface that<br />

will be used to send data packet to the destination. If the value of the output neuron<br />

is equal to 1, interface will be used. Otherwise, this interface will not be used. All<br />

layers are fully interconnected <strong>and</strong> there are not feedback connections between<br />

the hidden <strong>and</strong> input layers.<br />

C. ANN optimization<br />

To optimize neural network structure must be done analysis of the number<br />

of neurons in hidden layer from point of view of correct classification [5, 6].<br />

To solve this problem three training sets <strong>and</strong> several models of neural network<br />

were created.<br />

Number of neurons for input <strong>and</strong> output layer is equal to each other for all<br />

models of neural network. Number of neurons in hidden layer is variable <strong>and</strong><br />

it changes in interval from 10 to 100 neurons for training, validation <strong>and</strong> testing<br />

sets.<br />

Training, validation <strong>and</strong> testing sets were created on the base of topology<br />

of the sensor network shown in Fig. 1. The number of samples for neural network<br />

training depends on router, for which is ANN created. Each sample is represented<br />

by one rule of the routing table. There are two main routing rule groups. One group<br />

of rules represents situation when all interfaces are in active state. The second group<br />

of rules are applied when some interface is inactive <strong>and</strong> another interface must be<br />

used to forward data packet.<br />

Training set was used during network training to adjust error <strong>and</strong> it consists<br />

of 70% of samples. Validation set was used to measure network generalization<br />

<strong>and</strong> it consists of 15% of samples. Training is halted when generalization stops<br />

improving. Testing set have no effect on training phase <strong>and</strong> provide independent


50 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

measure of network performance during <strong>and</strong> after training. Testing set consists<br />

of 15% of samples.<br />

The results of Matlab simulation are shown in following tables <strong>and</strong> graphs.<br />

Number<br />

of hidden neurons<br />

Table I. Mean squared error for analyzed ann<br />

Mean Squared Error<br />

Training Validation Testing<br />

10 8.487e-3 2.453e-2 1.526e-1<br />

15 6.954e-2 7.843e-2 9.085e-2<br />

20 7.743e-17 1.081e-16 1.099e-16<br />

Mean squared error (MSE) is the average squared difference between outputs<br />

<strong>and</strong> targets. Lower values are better. Zero means no error. The lowest value of MSE<br />

is for ANN with 20 neurons in the hidden layer.<br />

Number<br />

of hidden neurons<br />

Table II. Regression for analyzed ann<br />

Regression<br />

Training Validation Testing<br />

10 9.690e-1 9.074e-2 4.225e-1<br />

15 7.458e-1 6.926e-1 6.661e-1<br />

20 9.999e-1 9.999e-1 9.999e-1<br />

Regression R values measure the correlation between outputs <strong>and</strong> target.<br />

An R value of 1 means a close relationship, 0 a r<strong>and</strong>om relationship. R values are<br />

again the best for ANN with 20 neurons in the hidden layer.<br />

ANNs with higher number of neurons in the hidden are not shown in the tables,<br />

because the value of MSE <strong>and</strong> R value are worse than ANN with 20 neurons.<br />

The following regression plots display the network outputs with respect to targets<br />

for training, validation, <strong>and</strong> test sets (Fig. 1, Fig. 2 <strong>and</strong> Fig. 3). For a perfect fit,<br />

the data should fall along a 45 degree line, where the network outputs are equal<br />

to the targets. For this problem, the fit is reasonably good for all data sets, with<br />

R values in each case of 0.93 or above. The ANN with 20 neurons in the hidden<br />

layer has the best results.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

51<br />

Figure 4. Regression R for ANN with 10 neurons in the hidden layer<br />

Figure 5. Regression R for ANN with 15 neurons in the hidden layer


52 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 6. Regression R for ANN with 20 neurons in the hidden layer<br />

V. Simulation <strong>and</strong> synthesis results<br />

VHDL (VHSIC hardware description language) is a hardware description<br />

language used in electronic design automation to describe digital <strong>and</strong><br />

mixed-signal systems such as field-programmable gate arrays <strong>and</strong> integrated<br />

circuits [7]. ANN was implemented by VHDL language <strong>and</strong> synthesized using<br />

Xilinx ISE 13.3.<br />

Weights <strong>and</strong> biases that are obtained from Matlab simulation after training<br />

phase are floating point. To be synthesis possible, weights <strong>and</strong> biases of the artificial<br />

neural network are expressed using fixed-point numbers (range scale<br />

was multiplied by 1000) in the FPGA-based implementation. There is no difference<br />

in results between FPGA-based implementation <strong>and</strong> simulation.<br />

The Virtex®-5 LXT ML505 is a general purpose FPGA <strong>and</strong> RocketIO<br />

GTP development board. Provides feature rich general purpose evaluation<br />

<strong>and</strong> development platform. Includes on-board memory <strong>and</strong> industry st<strong>and</strong>ard<br />

connectivity interfaces. It delivers a versatile development platform for embedded<br />

applications. Virtex®-5 LXT ML505 was used as a platform for realization<br />

of the analyzed ANN.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

53<br />

ANN<br />

Table III. Analysis of ann fpga realisation<br />

FPGA<br />

Delay Number of LUT Slices<br />

10 142 ns 1098 524<br />

15 149 ns 1527 714<br />

20 152 ns 1822 865<br />

The results of the practical realisation of the ANN are summarized in previous<br />

table. Main parameters to compare were delay, number of slices <strong>and</strong> number<br />

of 4-inputs LUTs. FPGA (Field Programmable Gate Array) is an integrated circuit<br />

containing a matrix of user-programmable logic cells, being able to implement<br />

complex digital circuitry. The elementary programmable logic block in Xilinx FPGAs<br />

is called slice. LUTs (Look-Up Tables) can implement any 4-input boolean function,<br />

used as combinational function generators. They are usually the number of LUTs<br />

<strong>and</strong> the number of slices (<strong>and</strong> not the number of registers) that are used to compare<br />

the size of FPGA designs.<br />

Delay for all ANN has almost the same value. The highest number of slices<br />

<strong>and</strong> 4-inputs LUTs has ANN with neurons in the hidden layer. The lowest requirement<br />

has ANN with 10 neurons in the hidden layer. The modern FPGA circuits<br />

(thanks to their size) can accommodate easily requirements of the proposed ANNs.<br />

VI. Conclusion<br />

In this paper, was presented a new method for sensor routing table realisation<br />

using neural networks. It was proposed artificial neural network topology<br />

<strong>and</strong> optimization criterions to solve a problem of routing in the mash topology<br />

of the sensor network. The main advantage of the using ANN for table look-up<br />

process is speed. The size of the look-up table in this approach could not influence<br />

the speed of decision where to send packet next as it is in other methods. Time to get<br />

decision from ANN is always the same. ANN could be trained to change the routes<br />

in case of topology changes that could be predicted in the training phase. Thanks<br />

to this ANN does not have to be retrained in the real environment after topology<br />

changes. Analyzed ANNs were practically realised in hardware platform. Execution<br />

of the training process in the hardware can improve this proposal. Future work<br />

can be oriented to realisation embedded system based on MicroBlaze processor<br />

to train ANN in FPGA architecture. This method can be executed in parallel on<br />

an FPGA chip.<br />

Another interesting issue for routing protocols is the consideration of node<br />

mobility. Most of the current protocols assume that the sensor nodes <strong>and</strong> the sink<br />

are stationary. However, there might be situations such as battle environments<br />

where the sink <strong>and</strong> possibly the sensors need to be mobile.


54 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

In such cases, the frequent update of the position of the comm<strong>and</strong> node <strong>and</strong><br />

the sensor nodes <strong>and</strong> the propagation of that information through the network<br />

may excessively drain the energy of nodes. New routing algorithms are needed<br />

in order to h<strong>and</strong>le the overhead of mobility <strong>and</strong> topology changes in such energy<br />

constrained environment.<br />

Other possible future research for routing protocols includes the integration<br />

of sensor networks with wired networks (i.e. Internet). Most of the applications<br />

in security <strong>and</strong> environmental monitoring require the data collected from the sensor<br />

nodes to be transmitted to a server so that further analysis can be done. On<br />

the other h<strong>and</strong>, the requests from the user should be made to the sink through<br />

Internet. Since the routing requirements of each environment are different, further<br />

research is necessary for h<strong>and</strong>ling these kinds of situations.<br />

This work has been supported by the MOD of Slovak Republic grants No. 4/2011<br />

“Partial dynamic reconfiguration of the digital systems in military applications”.<br />

References<br />

[1] J.N. Al-Karaki <strong>and</strong> A.E. Kamal, “Routing Techniques in Wireless Sensor Networks:<br />

A Survey”, IEEE Wireless <strong>Communications</strong>, vol. 11, no. 6, Dec. 2004, pp. 6-28.<br />

[2] O. Al-Kofahi <strong>and</strong> A.E. Kamal, “Survivability Strategies in Multihop Wireless<br />

Networks”, IEEE Wireless <strong>Communications</strong>, vol. 17, no. 5, Oct. 2010, pp. 71-80.<br />

[3] J.L. Elman,”Finding structure in time, Cognitive Science,” vol. 14, 1990, pp. 179-211.<br />

[4] F. Rosenblatt, “Principles of Neurodynamics,” Washington D.C., Spartan Press,<br />

1961.<br />

[5] I. Mokriš <strong>and</strong> M. Turčaník, ”Contribution to the analysis of multilayer perceptrons<br />

for pattern recognition,” Neural Network World. vol. 10, no. 6 (2000), ISSN 1210-0552,<br />

p. 969-982.<br />

[6] M. Turčaník, I. Mokriš, Possible Approach to Optimization of Neural Network<br />

Structure. Proc. of Conf. SECON 97, Warsaw, pp. 326-335.<br />

[7] D. Pattreson, Artificial Neural networks – Theory <strong>and</strong> Applications, Prentice Hall,<br />

1996.<br />

[8] S. Melacci, L. Sarti, M. Maggini, M. Bianchini, “A Neural Network Approach to<br />

Similarity Learning,” Lecture Notes in Computer Science, Artificial Neural Networks<br />

in Pattern Recognition, June 30, 2008, pp. 133-136.<br />

[9] S. Ezzati, H.R. Naji, A. Chegini, P. Habibimehr, “Intelligent Firewall on<br />

Reconfigurable Hardware,“ European Journal of Scientific Research. ISSN 1450-<br />

-216X vol. 47 no. 4 (2010), pp. 509-516.<br />

[10] M. Harakaľ, J. Chmúrny, The Tesseral Processor for Image Processing Based on<br />

Hierarchical Data Structures, Radioengineering, vol. 6, no. 4, 1997, pp. 1-5. ISSN 1210-<br />

-2512.<br />

[11] M. Kuffová, Simulation of fatigue process. In: Mechanics. – ISSN 1734-8927. – vol. 27,<br />

no. 3 (2008), p. 110-112.


An Application of Chord Structure<br />

in Tactical Ad-hoc Network<br />

Jerzy Dołowski, Marek Amanowicz<br />

Institute of Telecommunications, Faculty of Electronics,<br />

<strong>Military</strong> University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong>,<br />

{jerzy.dolowski,marek.amanowicz}@wat.edu.pl<br />

Abstract: Mobile ad hoc network (MANET) is expected to become a prominent st<strong>and</strong>ard in a tactical<br />

environment. However, a tactical network requires a reliable mechanism of discovering resources.<br />

In this paper, we propose using a Peer-to-Peer structure to achieve this goal. The crucial aspects<br />

of the Chord structure’s implementing over MANET are pointed out. A cross-layer communication<br />

is proposed to improve the joining process. The results of simulations show that our solution is able to<br />

work in a fully autonomous way.<br />

Keywords: Peer-to-Peer, Chord, MANET<br />

I. Introduction<br />

Contemporary battlefield requires a deployable comm<strong>and</strong> <strong>and</strong> control system.<br />

A tactical system should cope with an increasing number of services <strong>and</strong> sensors.<br />

SOA (Services Oriented Architecture) is considered a method of tactical services’<br />

consolidation. An implementation of the SOA system requires a distributed register<br />

which would not be prone to damage in a tactical environment. We noticed that<br />

Peer-to-Peer system could be used for this purpose.<br />

The Peer-to-Peer system is a set of equal entities (nodes) that communicate<br />

with each other to share resources. The nodes form a self-organized overlay network.<br />

Among many Peer-to-Peer systems we have chosen the Chord structure. Attractive<br />

features of Chord include its simplicity, provable correctness <strong>and</strong> provable performance.<br />

However, the routing table of Chord is not based on topological feature.<br />

Thus, we propose modification of Chord in order to improve its distance awareness.<br />

A mobile ad hoc network (MANET) is a multi-hop wireless network operating<br />

without infrastructure. All nodes in the network have to cooperate in order to<br />

perform routing. An application of Chord in MANET requires a robust mechanism<br />

of bootstrap. We propose the use of discovering features of MANET.<br />

The rest of the paper is organized as follows: Section 2 presents the related<br />

work, section 3 provides a brief overview of the Chord, whereas in section 4


56 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

we describe, in more details, the crucial aspects of the Chord on top of a MANET<br />

as well as the proposed solutions. We demonstrate the effectiveness of our system<br />

in Section 5 <strong>and</strong> the paper is concluded in Section 6.<br />

II. Related work<br />

Various Peer-to-Peer systems have been proposed for MANET. Most of them<br />

are unstructured (e.g. [6]). Usually unstructured systems use some forms of flooding<br />

to find resources. Flooding-based look-up is rather inefficient <strong>and</strong> does not scale<br />

well. This makes them impractical in a tactical network where b<strong>and</strong>width is limited.<br />

Nevertheless, there are approaches to overcome this limitation, for instance [7].<br />

In the structured Peer-to-Peer systems, the topology is strictly controlled. They<br />

use a Distributed Hash Table (DHT) which allows an efficient <strong>and</strong> deterministic<br />

search for resources. Therefore, in our opinion only structured Peer-to-Peer systems<br />

should be taken into account.<br />

Chord overlay which matches to the underlay network is presented in [8].<br />

This feature is achieved using the minimum-spanning tree in each node. Additionally,<br />

the identifier space is divided among the nodes in a non-contiguous way.<br />

Another improvement of Chord over MANET, which is proposed in [5], consists<br />

in forwarding lookup queries via physically adjacent nodes. In order to make it possible,<br />

a node has to maintain its physically adjacent neighbors. As a consequence,<br />

it results in generating redundant routing traffic.<br />

A different approach is an integration of the DHT with ad hoc network routing.<br />

MAD Pastry [10] is an example of that manner. In this idea, the overlay is built<br />

on top of the AODV protocol <strong>and</strong> both protocols cooperate strictly.<br />

III. The Chord structure<br />

In the Chord [9], each node has a unique identifier ranging from 0 to 2 m −1.<br />

The nodes form a one-dimensional ring according to their identifiers. Each node<br />

maintains a pointer to its successor <strong>and</strong> predecessor node. A successor of the node<br />

is the first node whose identifier is higher than its own identifier. Moreover, each<br />

node maintains information about (at most) m other neighbors, called Fingers. They<br />

are collected in a Finger Table. The i-th row of this table indicates the successor for<br />

interval [n+2 i , n+2 i+1 ), where n is the identifier of the current node.<br />

The resources are mapped to nodes based on their keys (identifiers). In Chord,<br />

a resource is mapped to the first node whose identifier is equal to or follows its key.<br />

An example of a Chord overlay network formed by nine nodes arranged on a circle<br />

is shown in Figure 1.We present also an example of the Finger Table of node n = 24,<br />

<strong>and</strong> location of two resources.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

57<br />

Figure 1. Example of a Chord ring (m = 5)<br />

A message is forwarded toward a closer node in the Finger Table with the highest<br />

identifier value less than or equal to the identifier of the destination node.<br />

As a consequence, the key lookup mechanism in Chord takes O (log N) hops, where<br />

N is the total number of nodes [9].<br />

IV. Adaptation of Chord for MANET<br />

A. The key issues<br />

Considering the introduction of Chord in the MANET, we have to take into<br />

account several key issues. Firstly, a mechanism of bootstrapping is requested.<br />

A new node which intends to join an existing Peer-to-Peer structure has to communicate<br />

with at least one node of this structure. Therefore, a discovery method<br />

is m<strong>and</strong>atory. Secondly, the state machine of the Chord node has to be adjusted<br />

to the ad hoc environment. And thirdly, the routing in Chord is not based on<br />

an underlay network topology. If the node was aware of real distances to others,<br />

it could choose a closer node during a routing process. We suggest implementing<br />

an additional mechanism which will improve nodes’ awareness of distance.<br />

B. A cross-layer mechanism<br />

The MANET manager discovers <strong>and</strong> maintains routes to other nodes. We propose<br />

using these routes by the overlay layer during bootstrapping. The nodes that<br />

could be potentially used for bootstrap are stored in a Bootstrap List.


58 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

We assume that the MANET manager adds every discovered route to the Bootstrap<br />

List using a cross-layer communication – Figure 2.<br />

When the node intends to join a structure, it selects a r<strong>and</strong>om node from<br />

the Bootstrap List. Next, the node sends a request towards it. In case of no response<br />

this entry will be removed from the list. If the list is empty, the node will form<br />

a one-member ring.<br />

Figure 2. The node<br />

The process of adding entries by the MANET manager is independent from<br />

the Chord procedure.<br />

C. A state machine<br />

In Chord, the node maintains an internal state machine. When the node<br />

has successfully joined a ring or has formed a new one-member ring, it goes<br />

into the READY state. In this state, the node waits for incoming requests of joining,<br />

but it does not send these requests itself. The abovementioned behavior<br />

arises from the assumption that an accessibility of the node is invariable during<br />

its operation. However, the use of MANET as an underlay network results<br />

in dynamic changes of the topology. Thus, the internal state machine should<br />

be adapted to the nature of the ad hoc network. The proposed procedure is depicted<br />

in Figure 3.<br />

We propose to introduce a new state called READY_ALONE. The node goes<br />

into this state when it fails to join any member of the Chord ring. The node permanently<br />

tracks changes of its Bootstrap List in this state. Besides this, the node<br />

is ready to receive a request of joining from another node. Furthermore, we also<br />

propose extending the READY state. The node staying in this state should try


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

59<br />

to join the newly discovered nodes. It is essential for detecting nodes that are<br />

members of another ring (partition).<br />

Figure 3. The modified Chord procedure<br />

D. An improvement of the distance awareness<br />

The topology of an overlay network does not reflect the underlying (physical)<br />

topology. This may result in deterioration of the system effectiveness. In particular,<br />

the latency of a request may decrease. Therefore, we propose to use Vivaldi algorithm<br />

that is one of the Internet Coordinate Systems.<br />

Vivaldi [4] is a distributed technique to estimate the latency between nodes<br />

in the Internet. In Vivaldi, a new node computes its coordinates after collecting<br />

latency information from only a few other nodes. Each time a node makes a request<br />

to another node, it measures the network latency to the node. A response<br />

includes the answering node’s current coordinates. The requesting node refines its<br />

coordinates based on the latency measurement <strong>and</strong> the responding node’s informa-


60 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

tion. As Vivaldi is a decentralized procedure, no fixed infrastructure needs to be<br />

deployed. Furthermore, the node does not require any initial data. These features<br />

align well with the requirements of the Peer-to-Peer system.<br />

Figure 4. The pseudocode to find the successor node of an identifier k<br />

However, in order to take advantage of that algorithm it is necessary to modify<br />

the Chord procedures by extending the Finger Table.<br />

The main idea of this proposal is to prepare a set of nodes which potentially<br />

could be predecessors of an identifier k. Then, the node whose distance is the smallest<br />

one is selected.<br />

In the original Chord, a row of the Finger Table contains only one successor.<br />

In our modification, several successors are placed in each row. Moreover, the distance<br />

obtained owing to Vivaldi is associated with each successor. The procedure<br />

of finding the successor has to be modified too. The appropriate pseudocode<br />

is shown in Figure 4.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

61<br />

V. Evaluation<br />

We conducted experiments using a computer simulation technique in order<br />

to evaluate the proposed solution. We selected the OMNeT++ [11] simulation<br />

environment <strong>and</strong> OverSim model [2].<br />

The aim of the evaluation was to determine whether it is possible to effectively<br />

search for an identifier in the Chord structure built on top of MANET as well<br />

as what is the volume of the maintenance traffic.<br />

A. Model<br />

A model of mobile ad hoc network was prepared. We choose the DYMO<br />

(Dynamic MANET On-dem<strong>and</strong>) protocol [3]. The network consisted of a fixed<br />

number of nodes, ranged from 10 to 60. Each node acted as a Chord node. Moreover,<br />

the node was able to use the Vivaldi mechanism <strong>and</strong> extending Finger Table.<br />

This feature was controlled during experiments.<br />

We prepared three scenarios of our simulation investigations. In the first<br />

scenario, the nodes were placed in the simulation area <strong>and</strong> stayed in their position<br />

motionless during operation (a stationary network). In the second <strong>and</strong> third scenario,<br />

the nodes moved according to the R<strong>and</strong>om Way Point mobility model [1].<br />

In this model, the node chooses a r<strong>and</strong>om destination point, <strong>and</strong> next moves toward<br />

it at a constant speed. After reaching its destination, the node stays in it for<br />

a pause time. Then, it begins to move toward the next destination. In our experiments,<br />

the current value of the speed was chosen from the ranges: 1…5 m/s, <strong>and</strong><br />

1…10 m/s in the second <strong>and</strong> third scenario, respectively.<br />

B. Tests <strong>and</strong> performance metrics<br />

Each node that had become a member of a Chord ring started the test application.<br />

This application performed the following tests: One-way lookup, KBR lookup,<br />

<strong>and</strong> DHT lookup.<br />

During the One-way lookup test, the test application sends a message toward<br />

a r<strong>and</strong>om identifier. In the KBR lookup test, the application asks the Chord to look<br />

for a node that is responsible for the given identifier.<br />

In order to evaluate an impact of the Vivaldi mechanism on the process<br />

of obtaining a resource we prepared the DHT lookup test. We assumed that there<br />

are copies of the same resource shared in the Chord structure. In this test, the application<br />

that looks for the resource is eligible to select one of the nodes which<br />

possess that resource.<br />

We use the following metrics to analyze the protocol performance:<br />

– One-way Delivery Ratio – The total fraction of requests that reach the destination<br />

successfully.


62 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

– One-way Latency – The delay between reaching a destination by the message<br />

<strong>and</strong> sending it.<br />

– Lookup Success Ratio – The total fraction of requests for which the originator<br />

receives an answer successfully.<br />

– Lookup Success Latency – The delay between receiving answer <strong>and</strong> sending<br />

the request.<br />

– Get Latency – The cumulative delay between receiving a resource <strong>and</strong><br />

sending the request in DHT lookup test.<br />

Additionally, the total volume of the sent <strong>and</strong> received traffic essential for maintenance<br />

(i.e. refreshing successor, <strong>and</strong> predecessor; refreshing entries in the Finger<br />

Table) was written.<br />

C. Results<br />

The results of our evaluation are shown in Figures 5-11. The notation “ps = 1”<br />

means that the Vivaldi mechanism <strong>and</strong> extending Finger Table were active, whereas<br />

“ps = 0” denotes the original Chord structure.<br />

The delivery ratio for One-way lookup test (Figure 5) reflects the general<br />

efficiency of a node to communicate in the overlay network. Increasing the number<br />

of nodes diminishes the ability to successfully communicate in the overlay.<br />

We found out that the performance of the wireless network is the primary cause<br />

of that observation. The phenomena that are peculiar to mobile ad hoc network<br />

(especially the hidden station) hinder transmission. The improvement of the underlay<br />

network was not our goal.<br />

Figure 5. The one-way delivery ratio


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

63<br />

Nonetheless, the obtained results prove that our application of Chord enables<br />

fully autonomous work on top of MANET. Moreover, our modifications bring a slight<br />

increase in the delivery ratios (Figure 5 <strong>and</strong> Figure 7) as well as some improvement<br />

of the latencies (Figure 6 <strong>and</strong> Figure 8).<br />

Figure 6. The one-way latency<br />

Figure 7. The lookup success ratio


64 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 8. The lookup latency<br />

The knowledge about real distances between nodes may also be exploited<br />

to optimize a process of getting resources. Owing to our modification, the node<br />

is given a chance to choose the nearest node which possesses the requesting resource.<br />

As shown in the Figure 9, the latency is decreased.<br />

Figure 10 <strong>and</strong> Figure 11 depict the total sent <strong>and</strong> received maintenance traffic,<br />

respectively. The underlay network is not overloaded by this kind of traffic. However,<br />

it should be stressed that the frequency of refreshing has considerable impact on<br />

the value of the above-mentioned traffic.<br />

Figure 9. The Get latency


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

65<br />

Figure 10. Sent maintenance traffic<br />

Figure 11. Received maintenance traffic<br />

VI. Conclusion<br />

In this paper, we proved that the Chord structure is able to operate on top<br />

of MANET in a fully autonomous manner. The adaptations we proposed resolve<br />

the joining process as well as improve distance awareness of the node. Although<br />

the effectiveness of work is not perfect, the network is not degraded due to the maintenance<br />

traffic.<br />

During future work we intend to test our solution in a real ad hoc network.<br />

Therefore, we have started practical implementation of the modified Chord<br />

structure.


66 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

References<br />

[1] N. Aschenbruck, E. Gerhards-Padilla, <strong>and</strong> P. Martini, “A survey on mobility<br />

models for performance analysis in tactical mobile networks,” in: Proceedings<br />

of <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> Systems Conference (MCC 2007),<br />

Sep. 2007, Bonn, Germany, pp. 25-26.<br />

[2] I. Baumgart, B. Heep, <strong>and</strong> S. Krause, “OverSim: A scalable <strong>and</strong> flexible overlay<br />

framework for simulation <strong>and</strong> real network applications,” in: Proceedings<br />

of the International Conference on Peer-to-Peer Computing, Seattle, WA, USA,<br />

Sep. 2009, pp. 87-88.<br />

[3] I. Chakeres, <strong>and</strong> C. Perkins, “Dynamic MANET On-dem<strong>and</strong> (DYMO) Routing,”<br />

IETF Internet-Draft, draft-ietf-manet-dymo-21, 2011.<br />

[4] F. Dabek, R. Cox, F. Kaashoek, <strong>and</strong> R. Morris, “Vivaldi: A decentralized network<br />

coordinate system,” in: Proceedings of the ACM SIGCOMM, Portl<strong>and</strong>, Aug. 2004,<br />

pp. 15-26.<br />

[5] R. Kummer, P. Kropf, <strong>and</strong> P. Felber, “Distributed lookup in structured peer-topeer<br />

ad-hoc networks,” in: Proceeding of the on On the Move to Meaningful Internet<br />

Systems, 2006, pp. 1541-1554.<br />

[6] L.B. Oliveira, I.G. Siqueira, <strong>and</strong> A.A.F. Loureiro, “On the performance of ad hoc<br />

routing protocols under a peer-to-peer application,” Journal of Parallel <strong>and</strong> Distributed<br />

Computing, vol. 65, Issue 11, Nov. 2005.<br />

[7] N. Shah, <strong>and</strong> D. Qian, “An Efficient Unstructured P2P Overlay over MANET Using<br />

Underlying Proactive Routing,” in: Proceedings of Seventh International Conference<br />

on the Mobile Ad-hoc <strong>and</strong> Sensor Networks, 2011, pp. 248-255.<br />

[8] N. Shah, D. Qian, <strong>and</strong> Rui Wang, “MANET adaptive structured P2P overlay,” Peerto-Peer<br />

Networking <strong>and</strong> Applications, vol. 5, Number 2, 2012, pp. 143-160.<br />

[9] I. Stoica, R. Morris, D. Liben-Nowell, D.R. Karger, M.F. Kaashoek, F. Dabek,<br />

<strong>and</strong> H. Balakrishnan, “Chord: A Scalable Peer-to-Peer Lookup Protocol for<br />

Internet Applications,” IEEE/ACM Transactions on Networking, vol. 11(1), Feb. 2003,<br />

pp. 17-32.<br />

[10] T. Zahn, <strong>and</strong> J.H. Schiller, “DHT-based unicast for mobile ad hoc networks,”<br />

in: Proceedings of Fourth Annual IEEE International Conference on Pervasive<br />

Computing <strong>and</strong> <strong>Communications</strong> Workshops, 2006, pp. 179-183.<br />

[11] OMNeT++ discrete event simulation system, http://www.omnetpp.org


Revisiting the DARPA’s Idea<br />

of a Programmable Network<br />

Vladimir Aubrecht 1 , Tomas Koutny 2<br />

1 Faculty of Applied Sciences, University of West Bohemia, Pilsen, Czech Republic,<br />

aubrecht@kiv.zcu.cz<br />

2 Faculty of Applied Sciences, University of West Bohemia, Pilsen, Czech Republic,<br />

txkoutny@kiv.zcu.cz<br />

Abstract: In 1995, DARPA recognized the shortcomings of IP networks. As a response, the experts<br />

initiated a project that should become the cornerstone of new military communication architecture.<br />

The goal was a network that would be resistant to attack <strong>and</strong> to operate despite successful attacks,<br />

while allowing a secure sharing of data at all levels of comm<strong>and</strong>. The project was named Active<br />

Networks. However, it failed to meet performance <strong>and</strong> security criteria. We revisited this problem,<br />

identified performance <strong>and</strong> security bottlenecks so that we present an advance to fast, secure <strong>and</strong><br />

scalable active network server – Smart Active Node.<br />

Keywords: programmable network, active networking, smart active node<br />

I. Introduction<br />

In 1995, DARPA recognized the shortcomings of IP networks. As a response<br />

the experts initiated a project that should become the cornerstone of new military<br />

communication architecture. The goal was a network that would be resistant to<br />

attack <strong>and</strong> to operate despite successful attacks, while allowing a secure sharing<br />

of data at all levels of comm<strong>and</strong>. The project was named Active Networks.<br />

Initially, DARPA funded the research on active networks. A number of wellaccepted<br />

papers appeared to demonstrate the capability of the active-networking<br />

architecture to fulfill the desired goals. With a time, it has shown that these papers<br />

presented rather a proof of the concept than a real-world usable implementation<br />

of an active networking server. The existing active networking servers failed to<br />

widespread beyond the research activities. As DARPA ceased funding this research,<br />

the research stopped gradually. Active Networks failed to meet performance <strong>and</strong><br />

security criteria.<br />

The history of computer networks shows a periodic attempt to benefit from<br />

network programmability. For example, it is the Wormhole approach to loadsharing<br />

[1], the paradigm of mobile agents [2] <strong>and</strong> finally, the active networking.


68 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Therefore, we decided to revisit the idea of active networking. We identified performance<br />

<strong>and</strong> security bottlenecks so that we present an advance to fast, secure<br />

<strong>and</strong> scalable active network server – Smart Active Node.<br />

Our decision was based on a development of load-redistribution method<br />

that runs on a simple active networking server – Grade32 [3, 4]. Grade32 runs<br />

processor-native code, but provides no security. In a short, we added a security to<br />

the Grade32 approach.<br />

The paper is organized as follows. The second section describes the related<br />

work. The third section presents Smart Active Node’s (SAN) architecture <strong>and</strong><br />

server’s scalability. The fourth section describes the programming environment<br />

for the capsules <strong>and</strong> active applications. The fifth section presents the use of Ada’s<br />

rendez-vous to implement process isolation <strong>and</strong> making calls to the applicationprogramming<br />

interface (API). The sixth section describes the implementation<br />

of access rights. The seventh section describes capsule transmission. The eighth<br />

section presents results. The ninth section concludes the paper.<br />

II. Related work<br />

A. Active networks<br />

In active networks, a capsule supersedes the packet. The capsule is a packet<br />

associated with a program code. The capsule’s header contains a hash digest<br />

of the program code. This program code can h<strong>and</strong>le the data being transmitted.<br />

A network node can download the program code as needed.<br />

In general, a network protocol is associated with a program code that h<strong>and</strong>les<br />

its packets. In an IP network, the program code has to already run at the network<br />

node, prior the packets are received. Therefore, the services provided are rigid <strong>and</strong><br />

has to be st<strong>and</strong>ardized first. In an active network, the network node can download<br />

<strong>and</strong> execute the program code as needed. Therefore, only the program code notation<br />

<strong>and</strong> execution environment have to be st<strong>and</strong>ardized. As a result, the network<br />

can learn new protocols <strong>and</strong> functionality immediately.<br />

In IP networks, the destination node has to already run a program that<br />

can h<strong>and</strong>le the incoming packets of a given protocol. Active Networks do not have<br />

this restriction.<br />

B. Preceding concept<br />

Let us discuss the concept of active networking that precedes SAN. In the bottom,<br />

there is a so-called NodeOS. It is either a st<strong>and</strong>ard operating system such as Linux or<br />

Windows, or it is a specifically written operating system such as JanOS [5].<br />

On the top of the NodeOS, there are so-called execution environments. Each<br />

environment h<strong>and</strong>les a particular notation of program code. ANTS [6, 7], BEES [8]


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

69<br />

<strong>and</strong> Magician [9] use Java bytecode. Proof of the concept for load redistribution<br />

in Active Networks, called Grade32 [3, 4], uses native x86 code.<br />

A process running in the execution environment is either an active application,<br />

or a capsule. The application injects the capsule into the network. If network’s<br />

implementation allows it, the capsule can replicate itself by injecting another capsule<br />

into the network. Grade32 allow the capsule to run an active application at<br />

the node. This approach was necessary for Grade32 to implement process migration<br />

in a distributed environment. It is not found in preceding implementations such<br />

as ANTS <strong>and</strong> Magician.<br />

Initially, the capsule program code was either pre-installed at the node, or<br />

it was transmitted with the capsule. In later implementations of active networking<br />

servers, each capsule contains a hash digest of capsule’s program code [7]. Using<br />

code distribution protocol, node uses this digest to obtain the program code from<br />

other nodes. Only the capsules of a basic code distribution protocol have to use<br />

st<strong>and</strong>ardized code identifiers, in place of the hash digest, to identify particular<br />

requests. Otherwise, it would be impossible for any two nodes to exchange a program<br />

code. Active node caches recently used program code at a local repository.<br />

Projects like PLAN [10], RCANE [11], SANE [12] <strong>and</strong> SNAP [13] focused<br />

on security <strong>and</strong> performance. In contrast to the general-purpose Java bytecode,<br />

specialized languages appeared. Their goal was simplicity that would limit resource<br />

consumption <strong>and</strong> shorten a capsule’s execution time.<br />

Reference [14] gives an overview on CSANE active network concept, which<br />

aims for security <strong>and</strong> scalability. CSANE is based on cluster processing. It builds<br />

on ANTS, JanOS <strong>and</strong> Linux.<br />

C. Related work<br />

Taking a closer look on the concept of the Google Chrome [15] operating<br />

system, we see a resemblance with the active networks concept. There is a simple,<br />

underlying operating system that provides hard application isolation – s<strong>and</strong>boxing<br />

[16]. API <strong>and</strong> the definition of web services define the Execution Environment.<br />

Also, it features a security manager that prevents running a malware.<br />

Although the Native Client [17] is not primarily designed for a use in active<br />

networks, there are ideas valuable to a high performance execution environment.<br />

III. Architecture<br />

A. Smart Active Node<br />

For the Smart Active Node, we highlight this:<br />

• SAN runs on top of a st<strong>and</strong>ard operating system.<br />

• SAN uses st<strong>and</strong>ard Java Development Kit for programming the capsules<br />

<strong>and</strong> to achieve interoperability across different platforms.


70 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

• SAN does not execute capsules in a single process. Instead it takes advantage<br />

of process isolation that is provided by the underlying operating system.<br />

• SAN uses Ada’s rendez-vous <strong>and</strong> Remote Procedure Call to further isolate<br />

a capsule program code from accessing SAN’s internal data structures.<br />

• SAN runs without a virtual machine such as JVM. The capsule program<br />

code is compiled just once to the native instruction set for the target<br />

processor.<br />

• SAN applies security measures when compiling the bytecode to the native<br />

instruction set, thus eliminating this overhead from the capsule runtime.<br />

• To increase performance, SAN benefits from supporting a distributed<br />

memory model.<br />

• For SAN, we adopted a concept of roles for a fine-grain control over execution<br />

of different program codes of capsules.<br />

B. Farmer – worker model<br />

The SAN server is a farmer-worker model that allows network-node scalability<br />

using the distributed memory model. Furthermore, the client-server model let us<br />

to use the means of process isolation <strong>and</strong> resource-limits which are provided by<br />

the underlying operating system. The resources are the processor time, the memory<br />

<strong>and</strong> network b<strong>and</strong>width.<br />

The farmer manages incoming capsules <strong>and</strong> assigns them to particular workers<br />

for further processing. The SAN server can run on a cluster, i.e. the workers<br />

can be distributed physically. SAN server <strong>and</strong> SAN worker communicate using<br />

the remote procedure call (RPC) mechanism. Therefore, SAN uses RPC to assign<br />

a capsule to a particular worker.<br />

Existing implementations of RPC, e.g. Open Networking Computing RPC,<br />

rely on the TCP/IP stack. As active networks were supposed to supersede IP, SAN<br />

has a custom RPC implementation. The SAN RPC implementation uses SAN’s<br />

internal networking interfaces instead of relying on the presence of TCP/IP stack.<br />

SAN networking interface can encapsulate an ISO/OSI layer 2 protocol such<br />

as the Ethernet. Furthermore, SAN utilizes a proprietary data serialization to avoid<br />

performance penalties by eliminating unnecessary data conversions.<br />

C. Farmer<br />

In the current implementation, the farmer provides the main subsystems:<br />

• Network subsystem – a communication with other nodes<br />

• Security subsystem – monitoring the networking traffic <strong>and</strong> capsule execution,<br />

while enforcing the security measures<br />

• Repository – caching compiled program codes of capsules<br />

• API subsystem – providing an API to capsules via RPC


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

71<br />

As the SAN server development will progress, part of the subsystems will be<br />

moved to the workers. This will reduce an average time a capsule/worker needs to<br />

access a farmer’s subsystem.<br />

Figure 1. SAN’s Famer-Worker Model<br />

D. Worker<br />

In the current implementation, the worker is a s<strong>and</strong>box for an executing capsule.<br />

It takes an advantage of operating-system provided mechanisms for process<br />

isolation <strong>and</strong> enforcing limits on processor–time consumption, memory usage,<br />

network b<strong>and</strong>width usage, etc. To the running capsule, the worker provides the API.<br />

IV. Programming environment<br />

A. The server programming language<br />

Initially, we followed some of the well-accepted papers on active networking.<br />

The programming language was Java. Both, server <strong>and</strong> capsule codes were written<br />

in Java <strong>and</strong> compiled to bytecode.<br />

While the Java Virtual Machine (JVM) executed the server program code,<br />

we needed to execute the capsule program code separately in order to enforce<br />

the security measures. If we would let the JVM to execute the capsule program<br />

code, we would have no control over its execution.<br />

We needed to control processor-time consumption, memory usage, network<br />

b<strong>and</strong>width usage <strong>and</strong> method calls to prevent malicious actions as such calling<br />

System.exit.<br />

Java was designed to be architecture neutral. To follow this principle, we<br />

were left with one choice – to interpret the capsule bytecode in a JVM. Because<br />

of the incurred speed penalty, we decided to use C++ for the server development.


72 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

While the developments costs are higher with C++, we got a robust <strong>and</strong> efficient<br />

platform to execute the capsule program code, with security measures applied.<br />

B. The capsule programming language<br />

While Java is performance-inadequate for the server development, it has benefits<br />

for programming the capsules. Using a Java bytecode to C++ cross-compiler,<br />

<strong>and</strong> a C++ compiler, we compile the bytecode into the target-processor optimized<br />

machine code. In addition, the Java’s portability allows the SAN servers to run<br />

across several processor architectures.<br />

The Java’s simplicity provides an opportunity to analyze the bytecode for a possible<br />

security breach just once, to save the processor time later on. For example,<br />

the absence of pointers in Java greatly improves the security.<br />

Per a class, the bytecode to C++ cross-compiler generates the header file with<br />

class’ declaration <strong>and</strong> C++ file with class’ implementation. The header file includes<br />

header files of other required classes. The Java Runtime Environment is replaced<br />

with a C++ equivalent. In addition to st<strong>and</strong>ard packages, the SAN Java development<br />

kit (SAN JDK) provides classes to call SAN API. Finally, the capsule program<br />

is linked using the pre-compiled SAN JDK <strong>and</strong> compiled capsule’s cross-compiled<br />

C++ code. The linker generates a dynamically linked library that is saved for a later<br />

reuse, once another capsule of the same protocol arrives.<br />

Several JDK methods are security-unsafe. For example, letting a capsule to use<br />

reflection would be a security risk. In SAN JDK, such methods are not available at<br />

all. Such a malicious capsule will not even compile. Classes such as java.io.File,<br />

which access the server’s file system, have custom implementation which forbids<br />

the capsule to access the file system of the underlying operating system. The new<br />

operator is overloaded with a custom implementation that forbids memory allocation,<br />

if the capsule overcomes a given limit.<br />

To monitor processor-time consumption, a separate thread monitors execution<br />

times of capsule. It terminates a capsule, which exceeds the limit.<br />

V. Programming interface<br />

A. SAN programming interface<br />

The capsule program code is compiled into a dynamically linked library.<br />

The library exports a routine. SAN server calls this routine to execute the program<br />

code. The routine takes one parameter. This parameter is an object implementing<br />

a pre-defined interface to access SAN API. Capsule accesses SAN API in an objectoriented<br />

manner. The API offers these services:<br />

• Network service – capsule transmission<br />

• Routing service – accessing <strong>and</strong> updating the routing table


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

73<br />

• Storage service – an inter-process communication using the blackboard<br />

concept [18]<br />

• Diagnostic service – for debugging<br />

B. Calling SAN API<br />

St<strong>and</strong>ard Java compiler compiles the capsule program code. At this point, the SAN<br />

API interface is not implemented. Later on, the SAN server compiles the bytecode<br />

to C++ source code. This compiled source code is linked with an object that makes<br />

the actual calls to the SAN API interface. This object is a wrapper for Ada’s rendezvous<br />

synchronization mechanism.<br />

The Java synchronization model relies on a monitor construction. The monitor<br />

has its working data <strong>and</strong> synchronized methods. For an exclusive access, a thread calls<br />

a synchronized method to manipulate with the monitor’s data. The thread continues to<br />

receive processor-time quanta based on its priority. Also, its access rights are not elevated.<br />

With Ada’s rendez-vous, a thread makes an entry call to the server. Then,<br />

the calling thread is suspended until the server’s thread finishes execution of the call.<br />

Only the server thread accesses its data. Furthermore, the server’s thread priority<br />

<strong>and</strong> access rights are independent on the calling thread.<br />

The SAN server runs in a user-address space. The compiled capsule program<br />

code cannot issue an equivalent of x86 int <strong>and</strong> syscall instructions to isolate SAN’s<br />

kernel from the running capsule. Therefore, we use Ada’s rendez-vous to implement<br />

secure API calls.<br />

To a capsule programmer, the Java capsule program code makes a call to<br />

a Java interface.<br />

VI. Access rights<br />

A particular networking application may require additional access rights to<br />

complete its task. For example, a routing service requires an access right to modify<br />

the routing table. Similarly, time-synchronization service requires an access right to<br />

set the system time. In SAN, we implement the access rights with a concept of users<br />

<strong>and</strong> roles. In a principle, we follow the Windows NT security model of users,<br />

access rights <strong>and</strong> privileges.<br />

A role is a set of access rights. For example, the routing-service role includes<br />

all rights required to modify the routing table, but not to e.g. set the system time.<br />

In addition to the access rights, a role has resource-consumption limits defined.<br />

A user has authorization credentials <strong>and</strong> a set of roles. For the development,<br />

we have defined four roles:<br />

• Administrator – no restriction<br />

• Power User – There is no restriction on capsule’s code execution time.<br />

This is used for the routing service.


74 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

• Users – The execution time limit is increased against the anonymous users.<br />

• Anonymous – This applies to unknown capsule codes <strong>and</strong> unauthorized<br />

users. The code being executed has lowest priority <strong>and</strong> no access right<br />

is granted.<br />

The capsule code can elevate its default access rights. By using different credentials,<br />

it can re-authorize to the server.<br />

VII. Transmitting a capsule<br />

A. All-Nodes-Execute flag<br />

In the original concept, the capsule’s code executed on every node visited.<br />

This implied an additional overhead. For example, let us consider a frequently used<br />

protocol such as TCP. The intermediate nodes have no need to modify packets’<br />

payload. The packets need to be forwarded only. Therefore, we eliminate overhead<br />

of the original active-networking concept by introducing All-Nodes-Execution flag.<br />

When this flag is not set, the capsules’ code executes at the destination node only.<br />

As a result, the intermediate nodes do not need to create s<strong>and</strong>boxes, thus reducing<br />

the associated overhead to increase the node throughput.<br />

With this behavior, we maintain low costs of the TCP protocol, while offering<br />

an additional feature. When the capsule executes at the destination node, it attempts<br />

to deliver its payload. Instead of TCP/UDP ports, we will identify a listening process<br />

with a globally unique ID (GUID). This concept was used successfully in the loadredistribution<br />

method [3, 4]. If the listening process migrated to a different node,<br />

it left its new address using the black-board mechanism. Thus, the capsule’s code<br />

could lookup the new address <strong>and</strong> set it as the new destination address. This concept<br />

reduces the overhead of h<strong>and</strong>ling the error when the listening process is not<br />

present at the destination node.<br />

SAN provides the black-board concept with the Storage service. It is a keyvalue<br />

dictionary. The key is a GUID <strong>and</strong> the value is a sequence of bytes. Its size<br />

<strong>and</strong> persistency is given by respective resource limits. With the storage service, we<br />

implement an inter-process communication, when two communicating processes<br />

do not need to execute concurrently.<br />

With the All-Nodes-Execute flag set, the capsule’s code executes at every visited<br />

node. We use this flag for a routing protocol. To be specific, we use the AntNet<br />

routing protocol [19] to fill the routing table.<br />

B. Quality of Service <strong>and</strong> Type of Service<br />

To implement Quality of Service <strong>and</strong> Type of Service, we experiment with<br />

a concept of alternative routing table. SAN’s capsule has Time-Sensitive flag. With<br />

this flag set, the capsule is routed using the better routes in the sense of AntNet


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

75<br />

protocol routing metric. If this flag is not set, the capsule is routed to a worse<br />

route if the better route’s link is saturated. As a result, we prioritize the capsule<br />

transmission while attempting to reduce a capsule elimination due to an insufficient<br />

b<strong>and</strong>width.<br />

C. Delivering a payload<br />

When a capsule delivers its payload to a process, the SAN would invoke<br />

a registered callback to h<strong>and</strong>le the delivery. The callback executes as a separate<br />

process <strong>and</strong> asynchronously to the main process of the networking application.<br />

As a result, the main process does not need to be executing. The callback can h<strong>and</strong>le<br />

the capsule, while requiring fewer resources. Later, the main process can process<br />

the cumulative results, which were produced by the callback on receiving capsules’<br />

payloads. This way, we attempt to support mobile devices, where the power <strong>and</strong><br />

memory consumption is critical.<br />

When a capsule successfully delivers its payload, it would either forward itself<br />

to a new destination, or finish its execution.<br />

VIII. Results<br />

A. Testing software<br />

To test the performance of the SAN server, we used a custom implementation<br />

of the ping comm<strong>and</strong>. First, we implemented the ping comm<strong>and</strong> as the SAN<br />

active-networking application. Then, we re-implemented the same application using<br />

WinAPI <strong>and</strong> TCP/IP protocol. This guaranteed that we tested principally the same<br />

applications – the first one using IP, the second one using the active network.<br />

The testing ping application transmitted data for two minutes. We counted<br />

the total number of transmitted bytes in packet/capsule payloads. The payload size<br />

increased gradually.<br />

The operating system used was 64-bit Windows 7, version 6.1.7601. The server<br />

<strong>and</strong> cross-compiled bytecode were compiled with the Microsoft Optimizing<br />

Compiler, version 17.00.40825.2. The bytecode was cross-compiled to C++ using<br />

a proprietary compiler [20]. The generated images were 64-bit executables <strong>and</strong><br />

dynamically loaded libraries.<br />

To measure the time, we used QueryPerformanceCounter <strong>and</strong> QueryPerformanceFrequency<br />

WinAPI functions.<br />

B. Testing network<br />

The network nodes used were connected with 100 Mb/s link speed in a full<br />

duplex, using Ethernet. In the current implementation, SAN uses TCP/IP to trans-


76 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

mit the capsules. This implies that the IP-ping should have less overhead than the active-networking<br />

pings.<br />

Two servers ran on Intel64, family 6, model A, stepping 7. We tested the ping<br />

on the localhost <strong>and</strong> over the network. The localhost machine had 8 GB RAM <strong>and</strong><br />

3.4 GHz processor frequency. The other machine had 4 GB RAM <strong>and</strong> 2.3 GHz<br />

processor frequency.<br />

C. Discussion<br />

Table 1 gives achieved bit rate <strong>and</strong> latency for a ping over a network, i.e. when<br />

packets <strong>and</strong> capsules processed through the entire networking stack of the operating<br />

system. Table 2 gives the same, but for the localhost when the packets <strong>and</strong><br />

capsules are not processed by the lowest level of the networking stack of the operating<br />

system.<br />

Size<br />

[B]<br />

Bit rate<br />

[Mb/s]<br />

Table I. Network Ping<br />

SAN<br />

Latency<br />

[µs]<br />

Bit rate<br />

[Mb/s]<br />

IP<br />

Latency<br />

[µs]<br />

64 17.1 643 0.5 945<br />

128 18.3 734 1.0 942<br />

256 24.2 811 2.1 942<br />

512 15.2 923 16.3 239<br />

1024 18.0 1097 18.3 428<br />

2048 20.7 1395 22.6 693<br />

4096 20.1 1804 27.9 1121<br />

8192 21.9 2201 35.2 1777<br />

Size<br />

[B]<br />

Table II. Localhost Ping<br />

Bit rate<br />

[Mb/s]<br />

SAN<br />

Latency<br />

[µs]<br />

Bit rate<br />

[Mb/s]<br />

IP<br />

Latency<br />

[µs]<br />

64 5.1 218 17.4 28<br />

128 5.7 223 33.7 29<br />

256 18.3 232 65.1 30<br />

512 41.9 236 114.9 34<br />

1024 77.1 241 211.2 37<br />

2048 136.8 259 363.4 43<br />

4096 179.2 276 726.7 43<br />

8192 193.5 297 1275.5 49


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

77<br />

The tests were not designed to achieve the maximum bit rate possible, but<br />

to give the difference between the IP processing <strong>and</strong> the programmable network<br />

processing.<br />

Table 3 gives memory usage for the SAN ping over the network. The memory<br />

usage measured was the Peak Working Set, which is the largest working set that<br />

has been observed for the process.<br />

Table III. Memory Usage<br />

Size [B] Server [MB] Worker [MB]<br />

64 8.1 5.4<br />

128 8.2 5.4<br />

256 8.9 5.7<br />

512 10.5 6.1<br />

1024 12.0 6.9<br />

2048 16.8 8.5<br />

4096 25.0 11.8<br />

8192 39.3 14.3<br />

Looking at the measured quantities of the IP ping, we can see the effect<br />

of Nagle’s algorithm <strong>and</strong> that the operating system used a reduced processing for<br />

the localhost communication.<br />

Looking at the latencies of the SAN ping, we see an overhead implied by<br />

the s<strong>and</strong>box usage. Looking at the bit rates over the network, we see that SAN capsule<br />

suppresses the Nagle’s algorithm due to the capsule’s size overhead. With a payload<br />

size greater than 4096 B, we see that capsule serialization has to be improved.<br />

The localhost results confirm this conclusion. Particularly, Table II shows results<br />

above 200 Mb/s for IP, but less than 200 Mb/s for SAN. As the ping-mechanism<br />

is essentially the same for IP <strong>and</strong> SAN, the reason for the achieved bitrate difference<br />

must be related to the present implementation of capsule processing.<br />

Looking at the memory usage, we see that it increased with capsule’s payload<br />

size. However, the memory usage was stable. If it was not, the memory usage<br />

would increase at least to 328 MB for the 8192 B payload <strong>and</strong> at least to 77 MB<br />

for the 64 B payload.<br />

IX. Conclusion<br />

In this paper, we present an advance on the DARPA’s idea of a programmable<br />

network. We show that the implementation presented could provide a sufficient<br />

performance, while enforcing the security measures on the code being executed.<br />

We achieved these results by using a different approach than the initial implementations<br />

did.


78 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

With the All-Nodes-Execution flag not set, data flows are routed in same manner<br />

as in IP networks <strong>and</strong> no s<strong>and</strong>boxes are created at intermediate nodes. If we<br />

would consider rigid protocol hashes for frequently used protocols such as TCP<br />

<strong>and</strong> UDP, it would not be even necessary to create s<strong>and</strong>boxes at all. SAN network<br />

would behave as IP network in such a case, only the address:port-like data structure<br />

would have greater size than with IP protocol. In addition, the SAN network would<br />

still maintain its programmability for other protocols.<br />

If we would consider protocols at higher ISO/OSI level than TCP <strong>and</strong> UDP,<br />

programmable protocols could possibly provide an increased efficiency over IPbased<br />

protocols. For example, reference [22] presents an improved efficiency with<br />

a multi-cast algorithm.<br />

The node throughput depends on the packet buffer size. The node has to<br />

buffer the packet prior processing it. Regarding larger payloads <strong>and</strong> the All-Nodes-<br />

Execution flag set, SAN could provide a blocking access to the payload. The capsule’s<br />

execution would be suspended, if the capsule requires such a part of payload that<br />

has not been received yet. Such an optimization technique would further increase<br />

SAN’s throughput, as it processes a capsule ahead of receiving its complete payload.<br />

On the other h<strong>and</strong>, we still pay with processor time <strong>and</strong> memory consumption for<br />

the network programmability. Therefore, an improved efficiency of networking<br />

protocols at higher ISO/OSI levels should be given by their design. As demonstrated<br />

with e.g. [22], we consider this as possible.<br />

However, the SAN server is still under development [21]. There are a number<br />

of optimization opportunities, which should improve the node’s throughput<br />

furthermore.<br />

References<br />

[1] J.F. Shoch <strong>and</strong> J.A. Hupp, ”The ‘Worm’ Programs – Early Experience with a Distributed<br />

Computation”, <strong>Communications</strong> of the ACM, 1982.<br />

[2] C.G. Harrison, D.M. Chess <strong>and</strong> A. Kershenbaum, “Mobile Agents: Are they a good<br />

idea”, Technical Report, IBM Research Division, T.J. Watson Research Center, March<br />

1995.<br />

[3] T. Koutny <strong>and</strong> J. Safarik, “Load Redistribution in Heterogeneous Systems”,<br />

Proceedings of the Third International Conference on Autonomic <strong>and</strong> Autonomous<br />

Systems, Athens, Greece, 2007.<br />

[4] T. Koutny <strong>and</strong> J. Safarik, “Simulating Distributed Applications in an Active Network”,<br />

Proceedings of 6th Eurosim Congress, Ljubljana, Slovenia, 2007.<br />

[5] P. Tullmann, M. Hibler <strong>and</strong> J. Lepreau, “Janos: A Java-oriented OS for Active Networks”,<br />

IEEE Journal on Selected Areas of Communication, vol. 19, no. 3, March 2001.<br />

[6] D.J. Wetherall, “Developing Protocols with the ANTS Toolkit”, http://www.cs.utah.edu/<br />

flux/janos/ants-manual-2.0.2/papers/programming.ps Last Accessed on April 11, 2012.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

79<br />

[7] D.J. Wetherall, J. Guttag <strong>and</strong> D. Tennenhouse, “ANTS: A Toolkit for Building<br />

<strong>and</strong> Dynamically Deploying Network Protocols”, IEEE Open Architectures <strong>and</strong> Network<br />

Programming 1998, San Francisco, CA USA, 1998<br />

[8] T. Stack, E. Eide <strong>and</strong> J. Lepreau, “BEES: A Secure, Re-source-Controlled, Java Based<br />

Execution Environment”, IEEE Open Architectures <strong>and</strong> Network Programming 2003,<br />

San Francisco, CA, USA, 2003.<br />

[9] S.F. Bush <strong>and</strong> A.B. Kulkarni, “Active Networks <strong>and</strong> Active Network Management –<br />

A Proactive Manage-ment Framework”, Kluwer Academic/Plenum Publishers, 2001.<br />

[10] M. Hicks, J.T. Moore, D.S. Alex<strong>and</strong>er, C.A. Gunter <strong>and</strong> S.M. Nettles, “PLANet:<br />

an active internetwork”, Proceedings of Eighteenth Annual Joint Conference of the IEEE<br />

Computer <strong>and</strong> <strong>Communications</strong> Societies, New York, NY, USA, 1999.<br />

[11] P. Menage, “RCANE: A Resource Controlled Framework for Active Network Services”,<br />

Proceedings of the First International Working Conference on Active Networks,<br />

Berlin, Germany, 1999.<br />

[12] D.S. Alex<strong>and</strong>er, P.B. Menage, A.D. Keromytis, W.A. Arbaugh, K.G. Anagnostakis<br />

<strong>and</strong> J.M. Smith, “The Price of Safety in an Active Network”, Journal of <strong>Communications</strong><br />

<strong>and</strong> Networks, Special Issue on Programmable Switches <strong>and</strong> Routers, vol. 3, Number. 1,<br />

March 2001.<br />

[13] W. Eaves, L. Cheng, A. Galis, T. Becker, T. Suzuki, S. Denazis, C. Kitahara,<br />

“SNAP Based Resource Control for Active Networks”, Proceedings of IEEE Global<br />

Telecommunications Conference, Taipei, Taiwan, 2002.<br />

[14] C. Xiao-lin, Z. Jing-yang, D. Han, L. Sang-lu <strong>and</strong> C. Gui-hai, “A Cluster-Based<br />

Secure Active Network Environment”, In Wuhan University Journal of Natural Sciences,<br />

vol. 10, Number 1, 2005, pp. 142-146, doi: 10.1007/BF02828636.<br />

[15] J. Gray, “Google Chrome: The Making of a Cross-Platform Browser”, In Linux Journal,<br />

vol. 2009, 2009.<br />

[16] Ch. Reis, A. Barth <strong>and</strong> Ch. Pizano, “Browser Security: Lessons from Google Chrome”,<br />

In <strong>Communications</strong> of the ACM, vol. 52, 2009, pp. 45-49, doi: 10.1145/1536616.1536634.<br />

[17] B. Yee, D. Sehr, G. Dardyk, J.B. Chen, R. Muth, T. Orm<strong>and</strong>y, S. Okasaka,<br />

N. Narula, <strong>and</strong> N. Fullagar, “Native Client: A S<strong>and</strong>box for Portable, Untrusted<br />

x86 Native Code”, Proceedings of 2009 IEEE Symposium on Security <strong>and</strong> Privacy,<br />

Oakl<strong>and</strong>, California, USA, 2009.<br />

[18] R.S. Engelmore <strong>and</strong> A. Morgan, editors Blackboard Systems, Addison-Wesley, 1988.<br />

[19] G. di Caro <strong>and</strong> M. Dorigo, “An Adaptive Multi-Agent Routing Algorithm Inspired<br />

by Ants Behavior”, Proceedings of PART98 – Fifth Annual Australasian Conference<br />

on Parallel <strong>and</strong> Real-Time Systems, 1998.<br />

[20] T. Koutny, “Static Cross-Compilation of Java Bytecode”, Submitted to IEEE Transactions<br />

on Computers, March 2012.<br />

[21] T. Koutny <strong>and</strong> V. Aubrecht et al., “Smart Active Node”, http://www.san.zcu.cz/<br />

Last Accessed on April 11, 2012.<br />

[22] V. Ramakrishna, M. Robinson, K. Eustice <strong>and</strong> P. Reiher, “An Active Self-Optimizing<br />

Multiplayer Gaming Architecture”, Cluster Computing, vol. 9, Issue 2, 2006.


Selection <strong>and</strong> Investigation of a Civil Wideb<strong>and</strong><br />

Waveform for Potential <strong>Military</strong> Use<br />

Ferdin<strong>and</strong> Liedtke, Matthias Tschauner, Sarvpreet Singh,<br />

Marc Adrat, Markus Antweiler<br />

Communication Systems, Fraunhofer-FKIE, Wachtberg, Germany,<br />

ferdin<strong>and</strong>.liedtke@fkie.fraunhofer.de<br />

Abstract: This contribution presents the results of an ongoing study 1 evaluating civil wireless<br />

communication systems or Waveforms (WFs) for their potential military use. It is a continuation<br />

of the work presented in [1] where several civilian communication systems with their main strengths<br />

<strong>and</strong> weaknesses have been evaluated. The aim of the past <strong>and</strong> present activities is to examine which<br />

of these communication systems or WFs have valuable characteristics. In addition, it is analyzed which<br />

WFs can probably be modified <strong>and</strong> supplemented to fulfill military requirements. The focus is on<br />

Wide B<strong>and</strong> Waveforms (WBWFs) which could help to fill the capacity gap of the “last tactical mile”.<br />

The studies will contribute to the international activities of finding IP <strong>and</strong> network capable WBWFs<br />

for military Software Defined Radios.<br />

In this paper several fundamentals of tactical communications are sketched, followed by some remarks<br />

on modern civil WFs already in use or tested by military forces. After agreeing on several significant<br />

assessment criteria, three interesting civil systems are short listed before one of these systems is finally<br />

selected for further investigation. For the selected system, WLAN IEEE 802.11n, the first critical<br />

modules are identified <strong>and</strong> some ideas for their modification <strong>and</strong>/or enhancement are presented.<br />

Keywords: Wideb<strong>and</strong> Waveform; Software Defined Radio; Wireless <strong>Military</strong> <strong>Communications</strong>;<br />

Tactical <strong>Communications</strong><br />

I. Introduction<br />

The international defense forces stride ahead towards further development<br />

of the network enabled capabilities for the network centric warfare. Important elements<br />

of this research are the communication capabilities, especially the Software<br />

Defined Radio (SDR) technology. For this technology, appropriate hard- <strong>and</strong> software<br />

modules <strong>and</strong> new Waveforms (WFs) are needed. In addition to narrow b<strong>and</strong> WFs,<br />

the particular focus is on the development of new, so-called Wide b<strong>and</strong> WFs (WBWFs)<br />

with spectral channel b<strong>and</strong>widths ≥ 1 MHz for the transmission of payload data<br />

1<br />

This research project was performed under contract with the Federal Office of the Bundeswehr for <strong>Information</strong><br />

Management <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>, Germany.


82 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

rates > 1 Mbps (Megabits per second) per channel. Several military driven efforts<br />

are pursued in this area. Beside international activities, e.g. from NATO <strong>and</strong> from<br />

the consortium on Coalition Wideb<strong>and</strong> Networking Waveform (COALWNW) [2],<br />

several nations are thinking about designing additional WBWFs for national use. Keeping<br />

this background in mind, it will be interesting to look at civil used WBWFs, too.<br />

In the preceding work [1], the main strengths <strong>and</strong> weaknesses of four categories<br />

of modern communication systems have been examined: broadcast, cellular, wireless<br />

access networks <strong>and</strong> trunked radio systems. The results show that several of those<br />

systems have some military suitable characteristics, but further efforts will be required<br />

to get military usable WBWFs. Thus, it is appropriate to select at first a few or only one<br />

suitable modern communication system for further investigation. For the selection<br />

procedure, many military requirements, both of operational <strong>and</strong> of technical manner,<br />

can be collected, weighted <strong>and</strong> evaluated in a detailed way. But, it is recognized<br />

that only a few evaluation criteria are significant enough for the ongoing efforts that<br />

a comparatively pragmatic <strong>and</strong> short selection procedure is possible.<br />

This is accomplished in the second phase of our investigations which are discussed<br />

in this contribution. In this context, modern civil communication systems<br />

which are already in use or tested by military forces are searched. The recognition<br />

of the state of military deployment of civil WFs has to be kept in mind while deciding<br />

for a suited communication system for further investigation. In the following<br />

text “communication(s)” will be mostly abbreviated by COM(s).<br />

To get a better underst<strong>and</strong>ing of the different military COM requirements<br />

concerning b<strong>and</strong>width, data rate, range <strong>and</strong> mobility, a glimpse on tactical COMs<br />

<strong>and</strong> the necessity to fill the capacity gap of the “last tactical mile” is presented in Section<br />

II. Section III contains some remarks on <strong>and</strong> examples of modern civil COM<br />

systems already in use or tested by military forces. In Section IV, key requirements<br />

of a WBWF for military use are summarized. In Section V, at first, the extraction<br />

of three potentially suited civil COM systems is described. After having outlined<br />

several important strengths <strong>and</strong> weaknesses of these systems, finally, the WLAN<br />

system IEEE 802.11n is selected for further investigation (WLAN: Wireless Local<br />

Area Network). In Section VI, the first critical modules of this system are identified<br />

<strong>and</strong> ideas for their modification or enhancement are presented. Section VII<br />

gives a short overview of the initial steps for implementing the new WF with SCA<br />

(Software <strong>Communications</strong> Architecture) conformity on a simulation platform.<br />

II. Tactical communications <strong>and</strong> difficulties<br />

for the “last tactical mile”<br />

Generally, the military operations planned <strong>and</strong> executed at the divisional<br />

level or below are the tactical ones. In modern scenarios, planning <strong>and</strong> execution<br />

of actions are increasingly accomplished by military subordinated smaller groups,<br />

whereby they have to strive for the superior aims. To solve all the different tasks,


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

83<br />

powerful COM equipment is necessary. Important requirements for tactical COM<br />

systems are: IP <strong>and</strong> networking capability, sufficient transfer capacity, adequate range<br />

<strong>and</strong> fair mobility, also for relevant parts of the infrastructure. The aim is to fulfill<br />

the necessity for Comm<strong>and</strong>, Control (C2) <strong>and</strong> Communication/Coordination (C3)<br />

on the move. The main subsystems of the tactical COM system are pointed out<br />

in Fig. 1 with blue framed boxes. These are: the trunk network, the Combat Net<br />

Radio (CNR) <strong>and</strong> the data distribution subsystems [3].<br />

Figure 1. Main elements of a tactical COM system, derived from [3]<br />

The arrangement of these subsystems concerning their range-capacity-mobility<br />

trade-offs is depicted in Fig. 2.<br />

Figure 2. Range-capacity-mobility trade-off, similar to [3]<br />

The three blue framed circles designate the areas related to the trunk network<br />

(bottom left), the CNR (top) <strong>and</strong> the data distribution (bottom right) subsystems.<br />

The trunk network transfers large amounts of information with high data rates<br />

between the relevant headquarters <strong>and</strong> between the staff personnel <strong>and</strong> the control<br />

officers, traditionally down to brigade level. The connections are by satellite or<br />

other longer range wireless or lined connections. In general, the range is large <strong>and</strong><br />

the mobility is minor.<br />

The CNR in its traditional form is a complement of the trunk network; it has high<br />

mobility, small values for spectral b<strong>and</strong>width <strong>and</strong> data rate – traditionally 25 kHz


84 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

<strong>and</strong> around 20 kbps – <strong>and</strong> a medium range. The personnel communication system<br />

(PCS) is smaller <strong>and</strong>, in its traditional versions, less powerful than the CNR.<br />

The main purpose of both these radio types is to transfer voice <strong>and</strong> low rate data<br />

information, e.g. sensor-to-shooter information. Modern tactical radios offer higher<br />

throughput rates, e.g. 112.5 kbps like the SDR-7200 from Elbit/Tadiran [4].<br />

But, for filling the capacity gap between the trunk network <strong>and</strong> the CNRs or PCSs<br />

for the transfer of more capacity dem<strong>and</strong>ing information, e.g. situational awareness<br />

data, an additional tactical subsystem is necessary, which is the data distribution<br />

subsystem. This system has to transfer more information to <strong>and</strong> from the acting<br />

teams, <strong>and</strong> nowadays it is the “bottle neck” of the tactical COM system. This problem<br />

of the “last tactical mile” is similar to that of the last mile in civil environments.<br />

Although there exist several special solutions for filling this gap, e.g. the U.S. systems<br />

EPLRS (Enhanced Position Locating <strong>and</strong> Reporting System) <strong>and</strong> NTDR (Near Term<br />

Digital Radio), important enhancements can be gained by modern SDRs with different<br />

WFs. Modern narrow b<strong>and</strong> WFs will be used for CNR purposes <strong>and</strong> WBWFs<br />

will serve for (bidirectional) data distribution. For satisfying the different military<br />

requirements, it is necessary that the new WBWFs are scalable.<br />

III. Modern civil wireless COM systems already in use or tested<br />

by military forces<br />

Before going on to the evaluation of civil COM systems concerning their potential<br />

military use, a review of the present situation is necessary, i.e. a check, if <strong>and</strong><br />

where civil wireless COM technologies are already in use or tested by military forces.<br />

A. Broadcast systems<br />

An interesting wideb<strong>and</strong> system is the terrestrial Digital Video Broadcast system<br />

DVB-T/T2. It uses the modern <strong>and</strong> flexible modulation/multiplex type OFDM<br />

(Orthogonal Frequency Division Modulation/Multiplex). But, in its original form,<br />

it has no backward channel. One known modification is the Universal Multi-Media<br />

Link system from Thales Defense [5]. It is provided with a backward channel so<br />

that bidirectional COM is possible. The system is intended for use by safety forces<br />

in difficult scenarios like disasters.<br />

B. Cellular systems<br />

The well-known commercial cellular systems are eagerly used or tested by<br />

military forces though they seem to have some drawbacks like single points of failure<br />

(base stations) <strong>and</strong> limited mobility of the infrastructure. The cellular technologies<br />

of the third generation (3G) <strong>and</strong> beyond, i.e. UMTS, CDMA2000, HSDPA, HSPA<br />

<strong>and</strong> the 4G/LTE (fourth generation of civil cellular systems/Long Term Evolution)


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

85<br />

are in the focus. The literature about the military use mainly concerns activities<br />

from U.K. <strong>and</strong> U.S. [6]. On one h<strong>and</strong>, cellular systems are used in less dangerous<br />

scenarios, e.g. in comm<strong>and</strong> posts, logistical establishments, airports <strong>and</strong> separated<br />

areas. On the other h<strong>and</strong>, they are also used for more robust operations. For those<br />

cases, small <strong>and</strong> transportable base stations, also airborne ones are available with<br />

the aim to have one’s own infrastructure with non-traditional radio frequencies <strong>and</strong><br />

extended range <strong>and</strong> mobility. The currently used or tested h<strong>and</strong>helds are commercial<br />

smartphones or small tablet PCs, enlarged by ciphering <strong>and</strong> personnel identification<br />

circuits. In less peaceful scenarios, these h<strong>and</strong> helds are connected to the CNRs by<br />

wire or wireless, <strong>and</strong> the information transfer takes place through the CNRs. For<br />

future use, so-called sleeve modules are developed which can pick up the h<strong>and</strong>helds<br />

<strong>and</strong> provide the power supply, the crypto module <strong>and</strong> interfaces. For peacekeeping<br />

missions, the h<strong>and</strong> helds can also use the civil cellular infrastructure, if available.<br />

So, the military used cellular technology can fulfill particular tasks of the trunk<br />

network, the data distribution subsystem <strong>and</strong> the CNR, too.<br />

Examples of initiatives from U.K. <strong>and</strong> U.S. are: the Training <strong>and</strong> Doctrine Comm<strong>and</strong><br />

– Brigade Combat Team initiative, where smartphones are tested together with the JTRSs<br />

(Joint Tactical Radio Systems) AN/PRC-154 (so-called Rifleman Radio) <strong>and</strong> 155.<br />

In a DARPA (Defense Advanced Research Project Agency) project, the Harris radio<br />

AN/PRC-117G SDR is tested together with tablet PCs. Connections by WLAN are<br />

provided for the near surrounding. A third example is the Monax system from Lockheed<br />

Martin. The used RF is non-traditional, modules for ciphering are developed <strong>and</strong> IP<br />

connections up to the end-users are available. The developed mobile base stations can be<br />

integrated into l<strong>and</strong> <strong>and</strong> aerial vehicles. Some of the used WFs are tolerant against larger<br />

latencies, e.g. for GEO-SATCOM connections. A further U.S. development is FASTCOM,<br />

a pico cell system from Textron/Overwatch for robust missions. The base stations are<br />

mobile. The COM types are voice, data <strong>and</strong> streaming videos, e.g. from smartphone to<br />

an unmanned aerial vehicle <strong>and</strong> reverse. A high grade ciphering module will be developed.<br />

Up to 100 subscribers can be provided. In the U.K., Roke Manor Research is discussing<br />

ideas <strong>and</strong> concepts concerning the use of civil cellular technology, i.e. 3G/UMTS,<br />

4G/LTE <strong>and</strong> WiMAX, for military purposes (WiMAX: Wireless interoperability<br />

for Microwave Access). Another U.K. project is Roke’s Battlefield Connect, a femto<br />

cell system for a range up to 40 km with up to 7.2 Mbps for non-dem<strong>and</strong>ing IP<br />

connections, VoIP <strong>and</strong> near real-time video transfer. The h<strong>and</strong>helds would be usable<br />

up to 120 km/hr. The used technology is UMTS/HSDPA, HSPA, or, for the future,<br />

4G/LTE or WiMAX. In the final version, 24 subscribers will be provided in one cell,<br />

each with up to 14.4 Mbps for the downlink <strong>and</strong> up to 1.9 Mbps for the uplink.<br />

C. Wireless access networks<br />

The relevant access networks dealt with in [1] are the WLAN family IEEE<br />

802.11 <strong>and</strong> WiMAX IEEE 802.16. WiMAX in its mobile form, i.e. IEEE 802.16e,


86 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

is mainly a cellular system with base stations <strong>and</strong> the appropriate infrastructure.<br />

But, to preserve the same classification as in [1], it is dealt with in this section<br />

as access network. The ranges of WLAN <strong>and</strong> WiMAX in their st<strong>and</strong>ardized forms<br />

are very different. WLAN can provide connections in the near surrounding, while<br />

the range of the mobile WiMAX is up to 15 km.<br />

In the safety or military range of application, WiMAX is proposed for high data<br />

rate linking over medium ranges. In Norway, its use for rescue operations is proposed.<br />

WLAN is used for short range connections as it is known from civil applications.<br />

For example it is used in headquarters <strong>and</strong> comm<strong>and</strong> posts. A particular proposal<br />

is its supplemental use in comm<strong>and</strong> posts during the set-up <strong>and</strong> set-down periods,<br />

if the line connections are not yet or no longer established. A further WLAN application<br />

is the remote control of platforms like sensors, weapon systems or vehicle<br />

based COM nodes. Examples for remotely controlled COM nodes are: Tactical<br />

Cross Domain Solution from U.S. <strong>and</strong> C2UK C-Lite from U.K. [6].<br />

D. Trunked radios<br />

The well-known trunked radios TETRAPOL <strong>and</strong> TETRA are well proven <strong>and</strong><br />

broadly used for safety <strong>and</strong> military forces. The systems have a comparatively good<br />

physical <strong>and</strong> electronic robustness. But, they are designed only with comparably<br />

small channel b<strong>and</strong>widths for low or moderate data rates.<br />

IV. Requirements for a wideb<strong>and</strong> waveform in wireless military<br />

tactical use<br />

The term Waveform (WF) comprises of all components of a COM system<br />

in the seven ISO/OSI layers. The focus of the currently accomplished studies is on<br />

the lower layers, PHY <strong>and</strong> MAC (Physical <strong>and</strong> Medium Access Control layers).<br />

The requirements of a WBWF are orientated towards the necessity to fulfill mainly<br />

the tasks of a modern bidirectional data distribution subsystem, i.e. to find a WBWF<br />

with IP <strong>and</strong> flexible networking capability <strong>and</strong> with appropriate capacity, range<br />

<strong>and</strong> mobility. The new WF should be flexible in use, i.e. it should be scalable <strong>and</strong><br />

adaptable to different applications <strong>and</strong> transmission conditions. Certain robustness<br />

against disturbing influences, natural <strong>and</strong> intentional, is aspired.<br />

A. General requirements<br />

General requirements, which are resulting from the facts mentioned in the sections<br />

above, are compiled as follows:<br />

• comm<strong>and</strong>, control <strong>and</strong> coordination (C3), also on the move,<br />

• single points of failure should be avoided as far as possible, hence an adhoc<br />

capable system/WF would be advantageous,


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

87<br />

• shared situational awareness, thus a payload data rate > 1 Mbps seems<br />

advisable,<br />

• with a range of up to 40 km (as Roke’s Battlefield Connect System) for l<strong>and</strong><br />

based platforms,<br />

• with multi hop <strong>and</strong> multi cast capabilities,<br />

• for use within mobile platforms; also with participation of a slow airborne<br />

vehicle; hence, l<strong>and</strong> based: up to 100 km/hr <strong>and</strong> airborne: up to 400 km/hr,<br />

• secure <strong>and</strong> IP capable information transport,<br />

• Quality of Service (QoS), from low latency to best effort,<br />

• WF with inherent flexibility <strong>and</strong> scalability, thus a OFDM WF seems adequate,<br />

• providing a tactical mobile extension of the deployed Protocol Core Network,<br />

• for use within SDRs taking into account SCA conformity,<br />

• with resilience against noise <strong>and</strong> interference,<br />

• operation within the usual military spectral opportunities (RF b<strong>and</strong>s) <strong>and</strong><br />

constraints, <strong>and</strong><br />

• COM capability between military <strong>and</strong> civil forces.<br />

Further require ments like a certain protection against hostile detection, interception<br />

<strong>and</strong> jamming <strong>and</strong> the provision for the WF usage in high speed airplanes<br />

or for Radio Based Combat Identification will be desirable. But, the last mentioned<br />

requirements are secondary ones <strong>and</strong> can be fulfilled later.<br />

These requirements for military use have to be kept in mind while assessing<br />

civil WBWFs. But, it cannot be expected that the civil WFs in their original forms<br />

can fulfill many of the requirements because they have been developed with different,<br />

commercially driven goals.<br />

B. Further aspects<br />

Some factors proposed from our side are:<br />

• For the present, half-duplex traffic will be sufficient.<br />

• Multiple Input Multiple Output (MIMO) is not yet necessary, i.e. Single<br />

Input Single Output (SISO) will be sufficient.<br />

• The new WBWF shall be demonstrated on particular simulation <strong>and</strong> development<br />

platforms.<br />

If appropriate transceiver modules will be available later on, the possible<br />

WF characteristics concerning RF, transmitter power, range <strong>and</strong> mobility will be<br />

exploited.<br />

V. System evaluation <strong>and</strong> selection of one civil WBWF<br />

for further investigation<br />

As a first step, a pre-election of a few appropriate civil WBWF systems is accomplished.<br />

The result is a selection of three modern wireless COM systems with


88 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

large channel b<strong>and</strong>widths. Later on, as a second selection step, one of these systems<br />

is finally selected for further investigation. For the pre-election <strong>and</strong> the final selection<br />

comparable pragmatic evaluation criteria are used.<br />

A. Evaluation <strong>and</strong> pre-election<br />

For the pre-election, only three significant assessment criteria are employed:<br />

(1) modern wireless WBWF system with<br />

(2) bidirectional information transfer <strong>and</strong><br />

(3) easy scalability.<br />

All the newer systems mentioned in Section III are modern WBWF systems,<br />

except the trunked radios. The newer trunk radio versions (TETRA2/3) allow<br />

a maximum channel b<strong>and</strong>width of only 150 kHz. This fact, together with the comparatively<br />

low development speed of such radios, will result in the exclusion of this<br />

technology from further analysis for a suitable WBWF.<br />

In the second evaluation criterion, the requirement for bidirectional information<br />

transfer is not fulfilled from the broadcast system DVB-T/T2. Additionally,<br />

it has a structure with comparably long frames. Both facts would dem<strong>and</strong> a remarkable<br />

work load for modification or replacement of the modules in question.<br />

The consequence is the exclusion of the broadcast systems from further investigations<br />

as well.<br />

In the third evaluation criterion, the scalability can be easily fulfilled of OFDM<br />

WFs. Additionally, OFDM has significant advantages relating to robustness within<br />

multipath propagation <strong>and</strong> the flexibility of using its particular frequency channels.<br />

So, from the cellular <strong>and</strong> the wireless access network systems those WBWF<br />

systems with this modulation/multiplex type are the most favored ones for our<br />

further investigations: the newest cellular st<strong>and</strong>ard 4G/LTE, the WiMAX IEEE<br />

802.16e <strong>and</strong> the WLAN IEEE 802.11n.<br />

B. Final selection of one system/WF for further investigation<br />

For accomplishing the final selection, the relevant system characteristics<br />

of the three pre-elected systems are gathered in Table I, whereby the focus is essentially<br />

on those system characteristics which are different for the systems. The principally<br />

equal characteristics, like the OFDM WBWFs, the bidirectional information<br />

transfer, the use of IP protocols, the multicast capability <strong>and</strong> the variability of packet<br />

lengths are not picked up in the comparison because they do not contribute to discrimination.<br />

The table contents written in red or green colored text will be explained<br />

below. In addition to the technical characteristics noted in Table I, several other<br />

facts concerning the information gathering <strong>and</strong> the possibilities for modifications<br />

or enhancements are quite relevant for our final system selection. These facts are<br />

collected in Table II below.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

89<br />

Table I. Relevant characteristics of pre-elected COM systems (with focus on those<br />

characteristics which are different between the three systems under consideration)<br />

Characteristics<br />

4G/LTE<br />

WiMAX<br />

802.16e<br />

Max. channel 20 MHz 20 MHz 20 MHz<br />

b<strong>and</strong>width BW chmax (40 MHz)<br />

Max. link data rate<br />

in BW chmax<br />

for SISO operat.<br />

RF b<strong>and</strong>s<br />

B<strong>and</strong>width (data<br />

rate) scalability<br />

Modulation types<br />

DL: 75 Mbps<br />

UL: 18.75 Mbps<br />

0.8 <strong>and</strong> 2.6 GHz<br />

(Europe)<br />

Yes;<br />

1.25 … 20 MHz<br />

QPSK, 16-QAM<br />

<strong>and</strong> 64-QAM<br />

Multiplex method DL: TDMA /<br />

OFDMA;<br />

UL: TDMA /<br />

SC-FDMA<br />

Ad-hoc net work<br />

capabil.<br />

Multi hop relay<br />

capability<br />

Transmission of<br />

speech <strong>and</strong> data<br />

with QoS (priority,<br />

latency, etc.)<br />

Necessity of base<br />

stations<br />

Real time<br />

capability<br />

Range<br />

Mobility<br />

Remarks<br />

DL: 128 Mbps,<br />

UL: 56 Mbps,<br />

both with FDD<br />

2.3, 2.5 <strong>and</strong> 3.5 GHz<br />

for mobile operat.<br />

Yes;<br />

1.25 … 20 MHz<br />

QPSK, 16-QAM<br />

<strong>and</strong> 64-QAM<br />

TDMA/<br />

Scalable OFDMA<br />

(S-OFDMA)<br />

No No Yes<br />

No, but h<strong>and</strong>over<br />

capability<br />

Not yet; the necessary<br />

IP multimedia<br />

subsystem is not yet<br />

imple mented;<br />

Yes<br />

Yes<br />

WLAN<br />

802.11n<br />

75 Mbps (150 Mbps)<br />

2.4 <strong>and</strong> 5 GHz<br />

(in U.S. also < 1 GHz)<br />

Yes; frequency raster<br />

5, 10 <strong>and</strong> 20 MHz<br />

BPSK, QPSK, 16-QAM<br />

<strong>and</strong> 64-QAM<br />

CSMA/CA<br />

Yes<br />

In principle:<br />

Yes; the necessary wireless<br />

multi me dia module is still<br />

included;<br />

Yes Yes No (for the ad-hoc mode);<br />

Yes;<br />

smallest latency<br />

time 5 ms;<br />

Several kilometers;<br />

under spe cial<br />

condi tions up to<br />

100 km<br />

H<strong>and</strong>helds<br />

usable up tp<br />

350 km/hr<br />

comparatively<br />

autonomous base<br />

stations;<br />

very expen sive<br />

infra structure<br />

Yes;<br />

smallest latency<br />

time 1 ms<br />

Several hundred<br />

meters up to 50 km<br />

be tween fixed stations;<br />

up to 15 km<br />

between fixed<br />

<strong>and</strong> mobile stations<br />

H<strong>and</strong>helds<br />

usable up to<br />

120 km/hr<br />

802.16e st<strong>and</strong>ard<br />

for mobile<br />

operation;<br />

expensive infrastructure<br />

With restrictions because<br />

of CSMA/CA <strong>and</strong> relativly<br />

large frame <strong>and</strong> packet<br />

lengths;<br />

Typically: < 100 m indoor<br />

<strong>and</strong> ≤ 250 m outside;<br />

with more transmitter<br />

power: several kilometers;<br />

Restricted to walking pace<br />

Eco/sleep mode;<br />

frame aggregation<br />

<strong>and</strong> block acknoledgment;<br />

mature <strong>and</strong> broadly used<br />

technology;<br />

cheap in-frastructure


90 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Table II. <strong>Information</strong> gathering <strong>and</strong> possibilities for modifications <strong>and</strong> enhancements<br />

Inform. gathering,<br />

possib. for modific.<br />

<strong>and</strong> enhancements<br />

Access of source code<br />

<strong>and</strong> simulation models<br />

Possibilities for code generation<br />

from simulation tools<br />

like MATLAB/SIMULINK<br />

Possibilities for incremental<br />

modifications <strong>and</strong> enhancements<br />

Expenditure for modifications<br />

<strong>and</strong> enhancements<br />

4G/LTE WiMAX 802.16e WLAN 802.11n<br />

Strongly restricted<br />

because of property<br />

rights<br />

Not available<br />

Difficult because<br />

of concetanated<br />

PHY <strong>and</strong> MAC<br />

Restricted<br />

because<br />

of property rights<br />

Only simple PHY<br />

model available<br />

Difficult because<br />

of concetanated<br />

PHY <strong>and</strong> MAC<br />

PHY: Yes, but<br />

without time sync;<br />

MAC: No<br />

Complete PHY<br />

model available<br />

Promising because<br />

PHY <strong>and</strong> MAC<br />

are separable<br />

Very high High Moderate<br />

While the access of system specifications is good for all three systems, the availability<br />

of simulation tools <strong>and</strong> the possibilities for adaptations <strong>and</strong> enhancements are different.<br />

As can be acknowledged from Table II, there are clear advan tages for WLAN 802.11n,<br />

because of (partial) availability of source code <strong>and</strong> simulation tools <strong>and</strong> the possibility<br />

to separate the PHY <strong>and</strong> MAC layers. These advantages alleviate modifications <strong>and</strong><br />

replacements of critical modules <strong>and</strong> are the crucial factors in our decision to select<br />

the WLAN WF for further investigation. For the other two WFs, much work ought<br />

to be invested to reach comparable circumstances. In Table II, the advantageous facts<br />

of WLAN 802.11n are emphasized by using green colored text.<br />

As can be gathered from Table I, WLAN 802.11n has several further advantages<br />

(emphasized with green colored text): the ad-hoc network <strong>and</strong> multi-hop relay capabilities,<br />

the included multi-media module, the independence from base stations,<br />

the eco/sleep mode, the possibility for frame aggregation <strong>and</strong> block acknowledgment<br />

<strong>and</strong> the availability of cheap components. The eco/sleep mode can perhaps help<br />

to realize the military required “radio silence”. The frame aggregation <strong>and</strong> block<br />

acknowledgment reduce the overhead caused by control information.<br />

However, the WLAN WF not only has advantages but also disadvantages which<br />

are emphasized by using red colored text. The main disadvantage is the CSMA/<br />

CA (Carrier Sense Multiple Access/Collision Avoidance) multiplex method which<br />

impedes the required real time information transfer if more than only a few users<br />

are active. Furthermore, CSMA/CA does not efficiently exploit the possible channel<br />

capacity. But, this multiplex method can be replaced as it is discussed in the next<br />

section. The other two emphasized disadvantages, limited range <strong>and</strong> only pedestrian<br />

mobility, are not independent from the multiplex method <strong>and</strong> can also be<br />

improved concerning the military requirements. Furthermore, the topic of insufficient<br />

security has to be worked on in a later study phase.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

91<br />

VI. Ideas for modifications <strong>and</strong> enhancements of WLAN IEEE<br />

802.11n modules<br />

In this section some critical modules of WLAN 802.11n are discussed <strong>and</strong><br />

evaluated for necessary modifications <strong>and</strong> enhancements. Due to the military<br />

requirements on a data distribution subsystem, WLAN 802.11n (as described<br />

in the specifications) has some disadvantages, e.g. in multiplex method, range <strong>and</strong><br />

mobility. In the following subsections, initial ideas for the elimination of these<br />

disadvantages will be presented.<br />

A. Multiplex method<br />

1) Selection of an alternative multiplex method<br />

In WLAN 802.11n, the CSMA/CA multiplex method does not guarantee real<br />

time behaviour <strong>and</strong> cannot exploit the possible channel capacity due to the fact<br />

that a r<strong>and</strong>om based channel access is used. Therefore, multiplex methods with<br />

systematic channel access like Time Division Multiple Access (TDMA), Frequency<br />

Division Multiple Access (FDMA) or Code Division Multiple Access (CDMA)<br />

are better suited. However, CDMA needs an expensive power controller to realize<br />

non-discriminatory data transmission between all users, especially mobile<br />

ones. A realisation without fixed base stations would be very dem<strong>and</strong>ing. FDMA<br />

is normally reserved for the separation of different user groups. Therefore, at first,<br />

the focus is on TDMA. When replacing the existing multiplex method in WLAN<br />

802.11n, the following requirements need to be preserved or newly fulfilled:<br />

• support of many network nodes,<br />

• IP support <strong>and</strong> ad-hoc network capability,<br />

• QoS capability, i.e. appropriate latency <strong>and</strong> priority, based transmission<br />

between nodes, <strong>and</strong><br />

• b<strong>and</strong>width efficiency.<br />

As a possible solution, the use of the Unified Slot Assignment Protocol<br />

(USAP) [7, 8] is proposed. USAP is a TDMA based multiplex method with multichannel<br />

support. The channel access is managed due to distributed slot assignments,<br />

so that r<strong>and</strong>om based packet collisions are avoided. With a collision-free<br />

transmission the reliability rises <strong>and</strong> QoS constraints can be fulfilled more easily.<br />

2) Evaluation of the USAP multiplex method<br />

With the exchange of the multiplex method, an evaluation of the new WBWF<br />

based on the PHY layer scheme of WLAN 802.11n combined with the MAC layer<br />

scheme of USAP is necessary. Therefore, a few equations for estimating the data<br />

rate above the MAC layer are derived.<br />

To estimate the slot time duration T slot (B) dependent on the packet size B<br />

bytes in TDMA systems, several relevant parameters have to be known. Firstly,


92 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

an upper bound of the COM distance D max that should not be exceeded by any two<br />

node pairs in the existing network is needed. This strict constraint is important to<br />

prevent crossover collisions between neighbouring slots that have been assigned<br />

by the USAP for transmission. Secondly, an additional time period T add needs to<br />

be considered which includes time uncertainties on the half-duplex switching<br />

duration, the hard- <strong>and</strong> software processing delays <strong>and</strong> for having an additional<br />

spare time. Further, the transmission time for a PHY layer packet of size B needs<br />

to be known. From the WLAN 802.11n specification [9, 10], it is extracted that for<br />

a given channel b<strong>and</strong>width BW, the number of bytes B in the packet <strong>and</strong> the chosen<br />

modulation <strong>and</strong> coding schemes expressed in the data bits per OFDM symbol<br />

N dbps,k is sufficient to calculate the slot duration. The values for N dbps,k can be<br />

taken from Table III for different modulation <strong>and</strong> coding schemes, assigned by<br />

the index k. The slot duration T slot,k (B) for the USAP multiplex method can then<br />

be calculated by:<br />

Dmax<br />

80 22+8B<br />

<br />

T <br />

slot,k<br />

B =T<br />

add<br />

+ 6 <br />

.<br />

c0 BW Ndbps,k<br />

<br />

The parameter c 0 is the velocity of light. The first two terms of (1) stem from<br />

USAP part <strong>and</strong> the third term is the transmission time for a PHY layer packet<br />

with B bytes corresponding to the WLAN 802.11n specification. T slot,k is valid<br />

either for a payload or a control time slot. Equation (1) can be transformed such<br />

that the maximum number of transmittable bytes B k in a single data slot can be<br />

calculated:<br />

<br />

1 BW <br />

D <br />

max<br />

B<br />

k<br />

= Tdataslot Tadd 6 Ndbps,k<br />

22 .<br />

8 <br />

<br />

80 c<br />

(2)<br />

<br />

<br />

<br />

0 <br />

The next step is the estimation of T dataslot . USAP has a strict separation of payload<br />

<strong>and</strong> control data. A frame with duration T frame is divided by mini slots for USAP<br />

control information <strong>and</strong> by data slots for the payload. The number of available mini<br />

slots in a frame is given by N bootstrap,slot . Similarly, the number of data slots is given<br />

by the sum of broadcast slots N broadcast,slot <strong>and</strong> reservation/st<strong>and</strong>by slots N res/stby,slot .<br />

Thus, the duration of a single data slot T dataslot can be computed by:<br />

(1)<br />

Tframe N bootstrap,slot<br />

T slot,k0<br />

(B20)<br />

T<br />

dataslot<br />

= .<br />

N N<br />

broadcast,slot<br />

res/stby,slot<br />

(3)<br />

For USAP in each mini slot, B = 20 bytes with 16 bytes for USAP control<br />

<strong>and</strong> 4 bytes for the code redundancy check needs to be transmitted. T slot,k=0 can be<br />

calculated from (1).


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

93<br />

Table III. Number of data bits per symbol dependend on the WLAN 802.11n<br />

modulation <strong>and</strong> coding schemes [9, 10]<br />

Index k Modulation Coding N dbps,k<br />

0 BPSK 1/2 26<br />

1 BPSK 3/4 39<br />

2 QPSK 1/2 52<br />

3 QPSK 3/4 78<br />

4 16-QAM 1/2 104<br />

5 16-QAM 3/4 156<br />

6 64-QAM 2/3 208<br />

7 64-QAM 3/4 234<br />

8 64-QAM 5/6 260<br />

The data rate R above the MAC layer can then be computed by:<br />

Nbroadcast,slot<br />

Nres/stby,slot<br />

R 1 B<br />

mean,<br />

(4)<br />

T<br />

frame<br />

whereas ρ is the average slot utilization of the data slot assignment of USAP,<br />

ε is the packet error rate <strong>and</strong> B mean is the assumed mean number of bytes in a packet.<br />

As an example, the following parameter values are chosen for an initial estimation<br />

of the data rate: BW = 5 MHz, D max = 50 km, T add = 1 ms, ε = 0.05, ρ = 0.6<br />

<strong>and</strong> B mean = B k=1 . Corresponding to [7, 8] the further parameter values are chosen<br />

as: T frame = 0.125 sec, N bootstrap,slot = 13, N broadcast,slot = 2 <strong>and</strong> N res/stby,slot = 8. With<br />

the given parameter values T dataslot can be calculated from (3) together with (1)<br />

to 10.71 ms. From (2) <strong>and</strong> Table III B mean = B k=1 is calculated to 2873 bytes, <strong>and</strong>,<br />

together with (4), the data rate R is gained to 1.0235 Mbps. This data rate (above<br />

the MAC layer) can be seen as an initial value which could be adequate for a military<br />

WBWF. It should be emphasized that the corresponding payload data rate will be<br />

smaller <strong>and</strong> the corresponding link data rate will be remarkably higher.<br />

B. Range<br />

The original WLAN 802.11n system is not specified to reach high ranges.<br />

This disadvantage is part of restriction to the transmission power of at most<br />

100 mW in the 2.4 GHz RF B<strong>and</strong>, 200 mW in the 5.1 GHz to 5.3 GHz RF b<strong>and</strong> <strong>and</strong><br />

1000 mW in the 5.4 GHz to 5.7 GHz RF b<strong>and</strong> (European specification). However,<br />

this disadvantage could be eliminated by use of higher transmit power <strong>and</strong> by<br />

operating in the military RF b<strong>and</strong>s with lower center frequencies. Due to the fact<br />

that higher transmit power enlarges the total energy consumption of the system,<br />

further improvements of critical modules of the PHY layer, e.g. those for detection,


94 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

synchronization or modulation <strong>and</strong> coding will be helpful to compensate somewhat<br />

the higher energy consumption.<br />

As a first step, the well-known preamble coding <strong>and</strong> detection algorithm<br />

from Schmidl & Cox [11] is implemented <strong>and</strong> analyzed. This algorithm is applicable<br />

for WLAN 802.11n. But, in the meantime Minn-Zeng-Bhargava published<br />

a more powerful preamble coding scheme [12], with which better symbol timing<br />

estimations at the receiver side can be achieved. At present, this proposed method<br />

is adapted for use together with the new WBWF.<br />

As a second step, an alternative header coding scheme is analyzed. The WLAN<br />

802.11n uses a BPSK modulation <strong>and</strong> a convolutional code rate of 1/2 with generator<br />

polynomial G = [171 133] for header coding. With this configuration,<br />

the 42 header bits are mapped to two symbols with 48 subcarriers for each symbol.<br />

As an alternative, the use of a QPSK modulation <strong>and</strong> convolutional coding rate<br />

of 1/4 with generator polynomial G = [171 153 135 127] is considered. Both configurations<br />

produce the same total coding rate of 42/96. In an AWGN environment<br />

the new configuration outperforms the classical configuration by around 0.4 dB<br />

as shown in Fig. 3. The use of iteratively based channel coding schemes like turbo<br />

or low density parity check schemes would not result in performance improvements<br />

due to the very short block length of a header with only 42 bits.<br />

Figure 3. Bit Error Rate (BER) <strong>and</strong> Header Error Rate (HER) dependend on E b /N 0<br />

for two schemes for header modulation <strong>and</strong> coding; coding rate 42/96


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

95<br />

C. Mobility<br />

Another important goal in designing a military WBWF is the mobility capability.<br />

WLAN 802.11n is developed only for walking pace. Therefore, some modifications<br />

<strong>and</strong> enhancements, <strong>and</strong>, also for the simulations, the use of an appropriate<br />

channel model are required. It is decided to use the ITU models pedestrian A <strong>and</strong><br />

vehicular B [13] which were officially employed together with the WiMAX development.<br />

For taking in account high platform mobility, a channel response with<br />

remarkable values for delay spread, Doppler spread <strong>and</strong> Doppler shift has to be<br />

provided. Another designing aspect is the choice of the OFDM guard interval<br />

length. It has to be chosen in accordance to the largest expected path delay. WLAN<br />

802.11n uses short guard intervals in terms of 1/4 or 1/8 of a symbol length. For<br />

the case of 1/4 symbol length duration, the resulting time durations are 3.2 µs, 1.6 µs<br />

or 0.8 µs for transmission with those symbol rates which are related to the channel<br />

b<strong>and</strong>widths of 5, 10 or 20 MHz. But, since here ITU vehicular model B is used,<br />

in which a maximum delay of 20 µs is pre-determined, the guard interval length<br />

of the new WF has to be enlarged to that value.<br />

VII. SCA based implementation of WLAN IEEE 802.11n<br />

In parallel to reviewing the WF, its implementation on a simulation platform,<br />

according to the SCA st<strong>and</strong>ards, has to be prepared. Various SCA development<br />

tools are available in the market with which such implementations can be accomplished.<br />

For preparing the implementation of a newly designed WBWF, as a first<br />

step, the general SCA based implementation of WLAN 802.11n is accomplished.<br />

A. Modeling – building blocks<br />

The model we propose is depicted in Fig. 4 <strong>and</strong> contents the following modules.<br />

The four green framed boxes on the top are those of the WF in which signal<br />

processing functionality can be added. They are the SCA based resources. The blue<br />

framed boxes below represent the services offered by the SDR platform which a WF<br />

can use. They emulate all the SCA based devices, e.g. the serial port, the sound<br />

card (not shown in Fig. 4) etc. The red framed box in the bottom center represents<br />

the crypto module, which is bypassed in our current simulation environment.<br />

The boxes are individually described as:<br />

• DataReadService is responsible for reading <strong>and</strong> writing data to <strong>and</strong> from<br />

the SerialPort Device. It also contains the functionality of using push-totalk,<br />

i.e. the communication starts when a particular key is pressed.<br />

• RedPayloadProcessing (RPP) h<strong>and</strong>les the payload <strong>and</strong> control data on the red<br />

security side.<br />

• BlackPayloadProcessing (BPP) h<strong>and</strong>les the payload <strong>and</strong> control data on<br />

the black security side.


96 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

• Signal-in-Space (SIS) contains the actual PHY <strong>and</strong> MAC signal processing<br />

code of the waveform. The C++ code of the waveform which is compiled<br />

as a static library (e.g.: WLAN signal processing) is integrated within<br />

the C++ code of this SCA resource.<br />

• SCA Devices Platform (blue framed boxes at bottom) is a combination<br />

of all the SCA Devices used, see Fig. 4. It includes also further devices like<br />

the sound card etc.<br />

We focus on PHY <strong>and</strong> MAC which correspond to SIS Resource <strong>and</strong> BPP<br />

Resource, respectively. But for simplicity, we keep it together in the SIS Resource<br />

in the current implementation. In future, a separation between PHY <strong>and</strong> MAC will<br />

be accomplished. Also, a subdivision of SIS will be required to run parts of it on<br />

GPP, DSP <strong>and</strong> FPGA. But currently, everything is kept working on a GPP.<br />

B. Payload workflow<br />

Fig. 4 shows the workflow of the payload data going through the building<br />

blocks of the SCA based model of the WF. In the first step, the data to be<br />

transmitted is given to the arrangement using the SerialPort Device. Then it is<br />

read by the DataReadService Resource using the DataRead functionality implemented<br />

in it. Then the data is given to the RPP Resource from where it is given<br />

to the SecurityAdapterRed Device. The data from there is given to the crypto<br />

module. From the crypto module it is committed to the SecurityAdapterBlack<br />

Device. The BPP Resource then takes the data from the adapter <strong>and</strong> passes it on<br />

to the SIS Resource. The actual signal processing of the data takes place in this<br />

component. For the present, the WLAN signal processing functionality is added<br />

into this resource. The processed data are then given to the Transceiver (Trx)<br />

Device which transfers it out to the antenna. In the case of receiving information,<br />

the data flow in the reverse direction.<br />

Figure 4. Building blocks for SCA implementation


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

97<br />

C. Separation of red <strong>and</strong> black security sides <strong>and</strong> between payload<br />

<strong>and</strong> control data<br />

the implementation of the WF is done keeping in view the concept of red <strong>and</strong><br />

black security separation. This means that the system can be divided into two parts:<br />

• Red side: It h<strong>and</strong>les unencrypted information usually from devices like<br />

keyboard, audio card etc.<br />

• Black side: It h<strong>and</strong>les the information in encrypted form <strong>and</strong> uses it for<br />

signal processing.<br />

In addition to this concept it is also recommended that there should be a clear<br />

separation between the payload <strong>and</strong> control information.<br />

• Payload is also called user data. It is that part of the transmitted data which<br />

is the fundamental purpose of the transmission.<br />

• Control information provides the control data the network needs to process<br />

<strong>and</strong> deliver the user data.<br />

Keeping in view to the above mentioned separations, all the building blocks<br />

on the red side of the system are implemented with a clear payload <strong>and</strong> control<br />

separation.<br />

D. Defining the interfaces<br />

The interfaces between the SCA based resources <strong>and</strong> devices, which h<strong>and</strong>les<br />

the payload <strong>and</strong> control data, have to be defined beforeh<strong>and</strong>.<br />

VIII. Conclusions<br />

After a short glimpse on tactical communications, followed by remarks on<br />

modern civil WFs already in use or tested by military forces, several requirements<br />

on WBWFs for military use are outlined. With the help of only a few significant<br />

assessment criteria, three modern civil WBWF systems are short listed as c<strong>and</strong>idates<br />

for further investigations. In a second assessment step, WLAN IEEE 802.11n is finally<br />

selected, <strong>and</strong> first critical modules are pointed out for modifications or enhancements.<br />

These modules are: the CSMA/CA multiplex method, the preamble coding<br />

<strong>and</strong> the header coding. The most critical part, the CSMA/CA multiplex method,<br />

could be exchanged by a TDMA based method. Here, USAP is observed closely,<br />

<strong>and</strong> a first estimate for the expected data rate above the MAC layer is presented.<br />

Furthermore, an enhanced preamble coding with the aim to improve the detectability<br />

is considered. Finally, a modulation <strong>and</strong> coding configuration scheme to<br />

improve the header coding <strong>and</strong> therefore decrease the header error rate is proposed.<br />

In parallel to reviewing the new WF, its implementation on an appropriate simulation<br />

platform with SCA conformity is prepared.


98 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

In future, more critical modules will be investigated, <strong>and</strong>, if necessary, modified<br />

or enhanced. All modules, those taken unchanged from WLAN IEEE 802.11n<br />

<strong>and</strong> the modified or enhanced ones shall be integrated in appropriate simulation<br />

<strong>and</strong> development platforms to develop a new military usable WBWF.<br />

References<br />

[1] S. Couturier et al., “Evaluation of wireless civilian communication systems for<br />

military applications”, MCC 2011, Amsterdam, The Netherl<strong>and</strong>s, October 2011.<br />

[2] R. Pengelley, “UK strives for joined-up communic ations networks”, Jane’s International<br />

Defense Review, April 2011.<br />

[3] M.J. Ryan, M.R. Frater, “Tactical communications for the digitized battlefield”,<br />

Artech House, 2002.<br />

[4] “Armada compendium, tactical radios 2010”, Supplement to Armada INTERNATIONAL,<br />

issue no. 3 (volume 34), June/July 2010.<br />

[5] Universal Multi-Media Link, Data Sheet, Thales Defense Solutions <strong>and</strong> Services, 2009.<br />

[6] R. Pengelley, “Digital delights: Commercial wireless commu nications on<br />

the battlefield”, Jane’s International Defense Review, September 2011.<br />

[7] C.D. Young, “USAP: A Unifying dynamic distributed multichannel TDMA Slot<br />

Assignment Protocol”, Proc. of IEEE Milcom, vol. 1, October 1996.<br />

[8] C.D. Young, “USAP multiple access: Dynamic resource allocation for mobile multihop<br />

multichannel wireless networking”, Proc. of IEEE Milcom, November 1999.<br />

[9] IEEE St<strong>and</strong>ard for information technology – Telecommunications <strong>and</strong> information<br />

exchange between systems – Local <strong>and</strong> metropolitan area networks – Specific<br />

requirements, Part 11: “Wireless LAN Medium Access Control (MAC) <strong>and</strong> Physical<br />

layer (PHY) specifications”, 2007 (WLAN 802.11a/b/g).<br />

[10] IEEE St<strong>and</strong>ard for information technology – Telecommunications <strong>and</strong> information<br />

exchange between systems – Local <strong>and</strong> metropolitan area networks – Specific<br />

requirements, Part 11: “Wireless LAN Medium Access Control (MAC) <strong>and</strong> Physical<br />

layer (PHY) specifications”, Amendment 5: “Enhancements for higher throughput”,<br />

2009 (WLAN 802.11n).<br />

[11] T.M. Schmidl, D.C. Cox, “Robust frequency <strong>and</strong> timing synchro nization for OFDM”,<br />

IEEE Trans. on Com., vol. 45, no. 12, pp. 1613-1621, December 1997.<br />

[12] H. Minn, M. Zeng, V.K. Bhargava, “On timing offset estimation for OFDM systems”,<br />

IEEE Com. Let., vol. 4, no. 7, pp. 242-244, July 2000.<br />

[13] ITU-R M.1225, “Guidelines for evaluations of radio transmission technologies for<br />

IMT-2000”, 1997.


Experimental Performance Evaluation<br />

of the Narrowb<strong>and</strong> VHF Tactical IP Radio<br />

in Test-Bed Environment<br />

Edward Golan, Adam Kraśniewski, Janusz Romanik,<br />

Paweł Skarżyński, Robert Urban<br />

Radiocommunications Department, <strong>Military</strong> Communication Institute, Zegrze, Pol<strong>and</strong>,<br />

{e.golan, a.krasniewski, j.romanik, p.skarzynski, r.urban}@wil.waw.pl<br />

Abstract: This paper evaluates the efficiency of IP packets transmission in narrowb<strong>and</strong> networks<br />

based on the RRC 9210 tactical radios. Based on measurements performed in the laboratory test-bed<br />

environment, we examined the user throughput for selected length of UDP datagrams under AWGN<br />

channel. We determined BER characteristics vs. channel attenuation. We also found the thresholds<br />

of BER, when the data rate of the radio interface drops automatically as a result of the increased channel<br />

attenuation. We mapped the BER to the data rate of the radio interface. We found that the maximum<br />

throughput offered to the user amounts to 9,1 kbit/s. We also noticed, that the optimum size of UDP<br />

datagrams is equal to 512 bytes. Based on these results, we assessed the efficiency of the RRC 9210<br />

tactical radios in the IP-mode.<br />

Keywords: Tactical radio, tactical VHF communication, BER characteristics, user throughput<br />

I. Introduction<br />

The rapid growth of needs of the C4I systems for the information exchange<br />

enforced specific requirements for the tactical communications systems. As a result,<br />

military solutions within the scope of communications employ broadb<strong>and</strong> technologies,<br />

mostly based on the IP protocol. This trend also applies to mobile wireless<br />

systems, which are essential mean of communications in the changing <strong>and</strong> unpredictable<br />

battlefield environment. The effort of researchers <strong>and</strong> military engineers<br />

is heavily oriented towards IP radio at the tactical level (Tactical Internet) [1,2,3] <strong>and</strong><br />

also providing new services, e.g., BFT (Blue Force Tracking) <strong>and</strong> RFT (Red Force<br />

Tracking). Broadb<strong>and</strong> technology enables to get an increased network throughput,<br />

better reliability <strong>and</strong> to offer wide range of services. If the network efficiency is high<br />

enough, the set of provided services is almost the same as in the wire network.<br />

Finally, the end user can get full access to the network resources from any place,<br />

using cable connection or wirelessly. This leads to the unification of the interfaces<br />

<strong>and</strong> applications <strong>and</strong> thus enables to get high level of interoperability.


100 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

On the contrary, there are narrowb<strong>and</strong> radios that can operate in IP mode.<br />

For example, Polish L<strong>and</strong> Forces are equipped with tactical VHF radio RRC 9210,<br />

which offers throughput reaching up to 19,2 kbit/s under favorable propagation<br />

conditions [4,5,6,8]. RRC 9210 radios have Ethernet 10/100BaseTX interface.<br />

The latest firmware enables to operate in IP mode.<br />

The advantage of narrowb<strong>and</strong> radios is to get long-range links <strong>and</strong> stable connections.<br />

However, the question about the efficiency of the narrowb<strong>and</strong> IP packets<br />

transmission seems to be justifiable. Until now, this problem was not discussed<br />

widely in the literature. This may result from the fact, that manufacturers do not<br />

provide detailed information of the implemented mechanisms <strong>and</strong> network performance.<br />

Usually, the information is limited to the simple statement, that the Ethernet<br />

interface <strong>and</strong> IP protocol stack are built-in the radio. From the system designing<br />

point of view it is important to assess properly the network efficiency [7] <strong>and</strong> to<br />

plan deployment of stations as well as the set of provided services.<br />

In the literature, there are many papers dedicated to the efficiency of the broadb<strong>and</strong><br />

wireless systems. A lot of important issues have been recognized, which may<br />

have strong influence on the efficiency of the IP transmission in narrowb<strong>and</strong> wireless<br />

networks [9,10,11]. They include, e.g., the informational overhead resulting from<br />

the transfer of the data through the complete protocol stack. While transporting<br />

data from the application layer to the physical layer, headers coming from successive<br />

layers are added <strong>and</strong> consequently the size of the transmitted data increases<br />

significantly [8]. In the physical layer the management <strong>and</strong> control frames such<br />

as RTS, CTS or ACK are exchanged, which also limits the available b<strong>and</strong>width.<br />

Moreover, apart from the user data, additional information is transmitted, e.g., synchronization,<br />

link test.<br />

If the TCP transmission is considered, then the size of the packets amounts to<br />

several hundred of bytes. In the physical layer packets are fragmented <strong>and</strong> typically<br />

are send as a few frames. This process has a significant impact on the transmission<br />

delay, especially in case of errors <strong>and</strong> retransmissions. In addition, one of the critical<br />

parameters of the TCP protocol is Timeout. The value of the Timeout should be<br />

adjusted to the narrowb<strong>and</strong> channel characteristics.<br />

Taking into account issues mentioned above, the detailed test of VHF radio<br />

are strongly required. Such tests will help to assess the efficiency of IP packets<br />

transmission in destructive military environment. The test results will provide<br />

the necessary information about the rules of the radio configuration, the network<br />

capacity, recommended deployment of nodes <strong>and</strong> set of offered services. Moreover,<br />

it will be possible to determine the typical throughput offered to the user.<br />

The paper is organized as follows. In Section II the narrowb<strong>and</strong> VHF communication<br />

was characterized. Section III describes the IP modes of RRC 9210<br />

radio. In Section IV the test scenario <strong>and</strong> assumptions were presented, while<br />

in Section V test results are discussed. Section VI contains conclusions <strong>and</strong> Section<br />

VII future work.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

101<br />

II. Narrowb<strong>and</strong> VHF communication<br />

Fast development of technologies to support reliable data transmission through<br />

radio channels was caused by increasing dem<strong>and</strong>s on services quality offered by<br />

wireless communication systems. It is not easy to realize such expectations because<br />

of transmission channel, which is changeable in a r<strong>and</strong>om way. Signal sent from<br />

transmitter can reach receiver by multiple propagation paths at different delays<br />

as a result of reflection from terrain obstructions. It causes r<strong>and</strong>om fluctuations<br />

in the received signal’s amplitude <strong>and</strong> phase briefly called multipath fading, which<br />

results in burst errors in received signal [9]. This phenomenon depends on type<br />

of environment <strong>and</strong> radio mobility, thus location can have important influence on<br />

signal reception.<br />

Transmission channel of tactical system based on VHF radio is narrowb<strong>and</strong><br />

(usually 25 kHz) <strong>and</strong> is characterized by flat fading. Such fading occurs when coherence<br />

b<strong>and</strong>width is greater than signal b<strong>and</strong>width <strong>and</strong> causes signal suppression [10].<br />

VHF transmission is very suitable for short distance terrestrial communication,<br />

only slightly farther than the line of site from the transmitter to the receiver.<br />

The requirements that must be fulfilled by modern military communications<br />

systems indicate, that the development of such systems is focused on broadb<strong>and</strong><br />

technologies, mostly based on IP protocol. Classical tactical radio networks are<br />

organized with the use of narrowb<strong>and</strong> transceivers operating in the VHF <strong>and</strong> HF<br />

frequency range. In such case radio communications between multiple correspondents<br />

is provided in omni-directional mode <strong>and</strong> integration with wired systems<br />

is realized by means of Radio Access Points (RAPs).<br />

Implementation of TCP/IP protocol stack in tactical radios caused positive<br />

changes in operation of radio networks. Transmission reliability increases, because<br />

IP radio network can operate despite partial destruction or jamming <strong>and</strong> does not<br />

need integrating devices such as RAPs.<br />

III. IP modes of RRC 9210 tactical radio<br />

Polish L<strong>and</strong> Forces are equipped with tactical VHF F@stnet family radios,<br />

which includes the RRC 9210 manpack radios with maximum power of 10W <strong>and</strong><br />

vehicle version called RRC 9310AP with output power increased to 50W. These<br />

radios have Ethernet 10/100BaseTX interface <strong>and</strong> may operate IP mode if the latest<br />

firmware is used. From these reasons RRC 9210 manpack radios were selected to<br />

evaluate the performance of IP packets transmission in VHF channel.<br />

RRC 9210 tactical radio offers two IP modes:<br />

• IP-MUX (Simultaneous Voice & Data over IP mode).<br />

• IP PAS (data packet over IP mode).<br />

IP-MUX mode replaced older MUX mode, which was designed to transmit/<br />

broadcast voice <strong>and</strong> IP data on the same radio channel. It offers simplex data


102 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

transmission or transmission in TDMA triggering mode with the data rate up<br />

to 4,8 kbit/s. Synchronization of hopping is made by station, which play NCS<br />

role in the network. Though, core synchronization type assumes using GPS.<br />

Switching of the station to IP-MUX mode is initialized by an operator. Addition<br />

as well as removal of SUB stations can be comm<strong>and</strong>ed at any time via NCS station.<br />

The automatic selection of routing tracks is provided in the latest version<br />

of the firmware. To provide interoperability with previously delivered radios,<br />

a firmware update is necessary.<br />

IP PAS mode was designed only for data transmission with the data rate up to<br />

19,2 kbit/s. The hopping synchronization is triggered in distracted mode without<br />

NCS station (there is no primary station in the network). Retransmission of data<br />

can be done with maximum 5 hops, Fig. 1. In that case, one radio serves also as relaying<br />

node. Such functionalities provide significant extension of network coverage,<br />

although, it costs notable increase of the transmission delay. Therefore, this mode<br />

is dedicated to non-real time services only.<br />

Figure 1. RRC 9210 in IP PAS mode<br />

Figure 2. Test-bed configuration


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

103<br />

Network topology to which radio station belongs is updated automatically.<br />

As a result each station “knows” its surroundings. If there is lack of direct connection,<br />

then the most optimum neighboring node is selected automatically to play<br />

a role of a retransmitting station.<br />

IV. Test scenario <strong>and</strong> assumptions<br />

The aim of the tests was to assess the efficiency of IP packet transmission of RRC<br />

9210 radio in IP mode. The test-bed consisted of two radio terminals configured<br />

in a point-to-point connection, which is shown in Fig. 2. The first step in the test<br />

was to select one of two IP modes of the radio. After preliminary test the IP-PAS<br />

mode was chosen, as it allocates all of the available b<strong>and</strong>width for data transmission<br />

only. Therefore, this mode allows to measure the available b<strong>and</strong>width in a simple<br />

point-to-point connection, Fig. 2.<br />

Figure 3. BER vs. channel attenuation<br />

All tests were performed in laboratory environment, which guarantee repeatability<br />

<strong>and</strong> stability of experiments. AWGN channel was used as a simulator<br />

of transmission channel. It does not generate burst errors, typical for real VHF<br />

channel, but only errors distributed at a uniform rate. However, to determine BER<br />

characteristics, such test-bed configuration was acceptable. In the next step of tests,<br />

the model of VHF channel with multipath fading will be used.<br />

The channel attenuation was changed from 130 dB to 140 dB with the step<br />

of 1 dB. The output power was set to +27 dBm in each radio. Thus, the signal level<br />

on the receiver site was equal to:<br />

• –103 dBm – maximum signal level.<br />

• –113 dBm – the level of sensitivity.


104 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 4. User throughput<br />

Radio was configured in the IP-PAS mode with adaptive data rate <strong>and</strong> correction<br />

code. End-points were the terminals with specialized software to generate<br />

<strong>and</strong> analyze an IP traffic.<br />

Bit error rate (BER) parameter was chosen as a channel quality metric. Therefore,<br />

BER was measured for each value of attenuation level. Fig. 3 presents BER<br />

characteristics vs. channel attenuation.<br />

Next step of experiments was to determine the available b<strong>and</strong>width vs. the channel<br />

quality. To measure the maximum user throughput, UDP protocol was used,<br />

as it does not need acknowledgements <strong>and</strong> retransmissions [11]. If TCP protocol<br />

were chosen, measured throughput would not be easy to analyze, because of additional<br />

acknowledgements in transport layer.<br />

To sum up the scenario, the quality of VHF channel was changed by selection<br />

of the attenuation level. The source terminal generated UDP datagrams of 512 Bytes<br />

size to achieve the traffic of 12 kbit/s.<br />

V. Test results<br />

Fig. 4 shows the user throughput measured for different BER levels. For each<br />

period of 20 seconds the throughput was measured <strong>and</strong> then the average value<br />

was calculated. After each 10-minute period of measurement, the level of BER<br />

was changed by selection of the channel attenuation level. In Fig. 4 'n' denotes<br />

the number of consecutive 20-second periods. The maximum user data throughput<br />

amounts to 9,10 kbit/s on average. In that case, RRC 9210 operates with maximum<br />

data rate. Because the channel is of high quality (BER from 4,02*10 -7 to 8,45*10 -6 )


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

105<br />

the redundancy of correction codes is low. When the BER achieve the level of 8,18*10 -5 ,<br />

then the user data throughput drops to 3,59 kbit/s. This is a result of applying<br />

of correction codes with higher redundancy. When the channel quality is worsen<br />

again <strong>and</strong> BER achieves the level of 1,88 *10 -2 , then the user throughput drops to<br />

1,49 kbit/s. In such a situation, radios detect high level of errors <strong>and</strong> apply stronger<br />

correction code. Further increase of the channel attenuation makes that the transmission<br />

is impossible <strong>and</strong> finally connection between two radios is simply lost.<br />

VI. Summary<br />

In this paper the efficiency of IP packets transmission in narrowb<strong>and</strong> networks<br />

based on the RRC 9210 tactical radios was evaluated. Based on measurements<br />

performed in the laboratory test-bed environment, the user throughput was determined<br />

under AWGN channel. The maximum throughput offered to the user<br />

amounts to 9,10 kbit/s in point-to-point connection. The minimum throughput<br />

amounts roughly 1,5 kbit/s. The thresholds of BER when the data rate of the radio<br />

interface drops automatically were determined. These BER levels allow to estimate<br />

the network throughput in a given propagation conditions.<br />

These results will be helpful to assess the channel quality in a real environment<br />

<strong>and</strong> to predict user throughput. Finally it will enable to define the set of offered<br />

services. Results of experiments presented in this paper allow to presume, that<br />

the network will not be efficient for real time services. Only non-real time services<br />

will be offered, like chat, e-mail, short message transfer or FTP. However, the range<br />

of provided services in a real environment needs to be confirmed by additional<br />

experiments.<br />

VII. Future work<br />

For future work it would be interesting to examine the efficiency of the IP<br />

transmission in real environment. Based on the test results, we are going to investigate<br />

the network capacity, the set of offered services <strong>and</strong> also the rules of device<br />

configuration for IP-mode.<br />

Furthermore, we would like to devote attention to the aspect of the relaying<br />

<strong>and</strong> test the efficiency of the network, when nodes operate on large area.


106 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

References<br />

[1] Collective work edited by M. Amanowicz, “Zaawansowane metody i techniki<br />

tworzenia świadomości sytuacyjnej w działaniach sieciocentrycznych” (Advanced<br />

methods <strong>and</strong> techniques for creating situational awareness in the network centric<br />

activities).<br />

[2] B. Marczuk, “Radiostacje szerokopasmowe” (Broadb<strong>and</strong> radio stations), The L<strong>and</strong><br />

Forces Review 03/2006.<br />

[3] L. Stypik, “Cyfrowe wsparcie pola walki – przyszłość czy rzeczywistość” (Digital<br />

battlefield support – the future or reality), The L<strong>and</strong> Forces Review 10/2010.<br />

[4] M. Gruszka, “Taktyczny Internet w praktyce” (Tactical Internet in practice), The L<strong>and</strong><br />

Forces Review 01/2011.<br />

[5] E. Golan, A. Kraśniewski, J. Romanik <strong>and</strong> P. Skarżyński, “Ocena potrzeb<br />

i możliwości wykorzystania szerokopasmowych radiostacji osobistych i pokładowych<br />

na szczeblu taktycznym” (Assessment of needs <strong>and</strong> possibilities of using the broadb<strong>and</strong><br />

on-board <strong>and</strong> personal radio stations at the tactical level), Journal of KONBIN, Safety<br />

<strong>and</strong> reliability systems, Warsaw 2011.<br />

[6] D. Pawłocki, “ W stronę transmisji danych z protokołem IP” (Towards a data<br />

transmissions including the IP protocol) The New <strong>Military</strong> <strong>Technology</strong> 09/2011.<br />

[7] J. Dudczyk, “Optymalny dobór parametrów radiostacji szerokopasmowej żołnierza”<br />

(Optimal selection of parameters of the soldier’s broadb<strong>and</strong> radio station) NTV<br />

no. 9/2011.<br />

[8] J. Romanik, P. Gajewski <strong>and</strong> J. Jarmakiewicz, A Resource Management Strategy<br />

to Support VoIP across Ad hoc IEEE 802.11 Networks, ThinkMind Digital Library,<br />

Proceedings of The Fourth International Conference on Communication Theory,<br />

Reliability <strong>and</strong> Quality of Service, April 17-22, 2011, Budapest, Hungary, pp. 15-21,<br />

ISBN 978-1-61208-005-5.<br />

[9] R. Urban, “Metoda określania średniej długości paczek błędów w kanale UKF w oparciu<br />

o analizę zmian wartości BER” (The method of determining mean length of error<br />

bursts in VHF channel based on fluctuation analysis), Biuletyn WAT, Warszawa 2007,<br />

vol. LVI, s. 433-440.<br />

[10] B. Sklar, “Digital <strong>Communications</strong>: Fundamentals <strong>and</strong> Applications” (2nd Edition),<br />

Prentice-Hall, Upper Saddle River, New Jersey 2004.<br />

[11] W. Wysota <strong>and</strong> J. Wytrębowicz, “End to End QoS Measurements of TCP<br />

Connections”, PPAM’07 Proceedings of the 7th international conference on Parallel<br />

processing <strong>and</strong> applied mathematics, Springer-Verlag Berlin, Heidelberg 2008.


Hybrid Error Detecting <strong>and</strong> Correcting System<br />

Using Hardware Associative Memories<br />

Ion Tutănescu, Constantin Anton, Laurenţiu Ionescu,<br />

Gheorghe Şerban, Alin Mazăre<br />

Faculty of Electronics, <strong>Communications</strong> <strong>and</strong> Computers – University of Pitesti, Romania,<br />

{gheorghe.serban, constantin.anton, laurentiu.ionescu, ion.tutanescu, alin.mazare}@upit.ro<br />

Abstract: This paper presents a solution of design <strong>and</strong> implementation of a hardware error<br />

correction <strong>and</strong> detection system using associative memories. This type of memory allows search<br />

of a stored binary value, having as an input data a partial (or modified) amount of this value.<br />

This property can be used in communication, for detection <strong>and</strong> correction of errors. In our<br />

experiments the encoder just associate message with corresponded word code, which is sent<br />

to communication channel. The decoder can associate back the word code received from communication<br />

channel with the message, even if the received word code has errors. This is due<br />

to associative memory recognition ability. Experimental results obtained were compared with<br />

performances of other hardware systems.<br />

Keywords: associative memories, error detecting <strong>and</strong> correcting codes, Field Programmable Gates<br />

Array (FPGA), Hybrid Automatic Request (H-ARQ)<br />

I. Introduction<br />

Errors’ correction <strong>and</strong> detection is a very important feature in modern<br />

communications. There are several methods for error correction <strong>and</strong> detection.<br />

BCH codes (Bose, Chaudhuri, <strong>and</strong> Hocquenghem) are widely used in communication<br />

networks, computer networks, satellite communication, magnetic <strong>and</strong><br />

optic storage systems.<br />

In this paper we present a hybrid ARQ (Automatic Request) <strong>and</strong> FEC (Forward<br />

Error Correction) solution using hardware associative memory.<br />

BCH codes operate over finite fields or Galois fields. BCH codes can be defined<br />

by two parameters that are: length of code words, n, <strong>and</strong> the number of errors to<br />

be corrected, t.<br />

The BCH codes are a class of cyclic codes whose generator polynomial is a product<br />

of distinct minimal polynomials corresponding to<br />

α, α 2 , …, α 2t ,<br />

GF 2 m is a root of the primitive polynomial g(x)[1].<br />

where


108 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

An irreducible polynomial g(x) of degree m is said to be a primitive if only<br />

if it divides polynomial form of degree n, for no n less than 2 m 1. In fact,<br />

m<br />

2 1<br />

every binary primitive polynomial g(x) of degree m is a factor of x 1 [2].<br />

In our application we present two Hybrid ARQ solutions. First use a polynomial<br />

of 10 degree, which can be used to correct 2 erroneous bits <strong>and</strong> detect 5,<br />

in a word code of 20 bits size for 10 bits size message:<br />

10 7 6 4 2<br />

gx ( ) x xxxx 1<br />

(1)<br />

This polynomial is used to generate word codes with 5 Hamming distance.<br />

Secondary, we use a polynomial which generates word codes with 10 Hamming<br />

distance, which can correct 4 erroneous bits from 5-bits size messages <strong>and</strong><br />

20 bits size word code. This solution has a very high correction capacity (from<br />

5 bits message can correct 4 erroneous bits) <strong>and</strong> can detect all errors from message:<br />

15 14 13 12 10 8 5 4<br />

g( x) x x x x x x x x<br />

1<br />

(2)<br />

Field-Programmable Gate Arrays (FPGAs) have become one of the key digital<br />

circuit implementation media over the last decade [3]. One bit patterns will<br />

produce operational circuits <strong>and</strong> can be used in many areas like the communication<br />

systems. Our hardware scheme is based on polynomial generator for errors<br />

detection <strong>and</strong> correction.<br />

FPGA circuits represent a compromise between circuits with microprocessor<br />

<strong>and</strong> ASIC circuits (Application Specific Integrated Circuits) [4]. First, they<br />

present flexibility in programming, called here reconfiguration, which is a feature<br />

for microprocessors.<br />

Even if FPGA cannot be programmable while operation, they can be configured<br />

anytime is needed, having a structure based on RAM programmable machines, as we<br />

see in Figure 1. On the other h<strong>and</strong>, they allow parallel structures implementation,<br />

with response time less than a system with microprocessor.<br />

Figure 1. Communication system with hardware errors’ detection <strong>and</strong> correction<br />

The system proposed in this paper is based on the use of reconfigurable<br />

FPGA circuits for hardware implementation of error detection <strong>and</strong> correction<br />

algorithms.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

109<br />

Our new design system can be integrated inside a multilayer protocol communication.<br />

Thus, hardware module takes the tasks from others components<br />

of communication system (for example from the computers).<br />

In the next section we present the hardware circuits for encoder <strong>and</strong> decoder.<br />

The first presented solution is a simple binary decoder structure while the second<br />

is based on a hardware linear associative memory.<br />

Section 3 present experimental results obtained after implementations for<br />

both H-ARQ solutions. The implementation is done on a FPGA circuit.<br />

II. ENCoder <strong>and</strong> decoder<br />

We designed the encoder <strong>and</strong> decoder using dedicated binary circuits. Thus,<br />

the encoder will be attached as a physical device to any system which transmits<br />

dates to a communication channel while the decoder will be attached to the system<br />

which receives the dates.<br />

In this section we describe the operation of the two systems <strong>and</strong> our design<br />

method proposed for them.<br />

A. Encoder<br />

The operation of encoder is illustrated in Figure 2.<br />

Figure 2. Encoder operation flowchart<br />

According to the first solution, the message is received from the emitter system.<br />

The message can be received serially (Ethernet or USB) or in parallel if the emitter<br />

use a protocol defined by itself. The experiments were performed using 5-bits<br />

size message words (thus can be encoded letters from Latin alphabets) <strong>and</strong> 10-bits<br />

message words (which can contain extended ASCII charset).


110 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Each message has associated a word code. To 10 bits-size message word we<br />

have a Hamming distance 5, which means that we can correct 2 erroneous bits <strong>and</strong><br />

can detect 5 erroneous bits. We generate word codes for all 10-bits size combinations.<br />

Thus we have 2 10 locations in memories to encoder <strong>and</strong> decoder.<br />

In fact, the communication encoder is designed as a simple binary decoder.<br />

The messages are generated in a linear increasing manner <strong>and</strong> word code is obtained<br />

by multiplying message polynomial with generator matrix (see Figure 3).<br />

The word codes are equidistant in Hamming space (distance is 5). This orthogonally<br />

property is required in order to have the same error correction <strong>and</strong><br />

detection capacity to each received word code.<br />

Figure 3. Association between message <strong>and</strong> BCH word code to the encoder<br />

The second solution uses 5-bits size message, which are encoded with 20-bits<br />

size word code. The Hamming distance between word codes is 10 so we have a correction<br />

capacity of 4 erroneous bits.<br />

The encoder is designed in the same way as in previous solution <strong>and</strong> the number<br />

of location is 2 5 . Thus, in both cases, we have a very reduced hardware structure<br />

for encoder.<br />

B. Decoder<br />

Decoder, on the other h<strong>and</strong>, has a more complex structure. This is because<br />

it also has the error detection <strong>and</strong> correction function. The decoder can match<br />

received words with expected word codes but, in some cases, mistakenly received<br />

word is not found in any of the stored ones.<br />

Error correction would actually identify the correct word code. This involves<br />

finding the closest word in memory. Once identified, it will determine what message<br />

is received.<br />

Tasks to be performed at the receiver are presented in the following chart<br />

(see Figure 4).


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

111<br />

Figure 4. Decoder operation flowchart<br />

First, the word code is taken from the communication channel. In our<br />

experiments the word code is of 20 bits size, for both solutions. This word code<br />

is then compared with all stored words. It is a binary comparison. Finally, we<br />

find out which are the erroneous bits. Each memory cell counts the erroneous<br />

bits <strong>and</strong> we can determine minimal value from all locations. The location<br />

which contains an word code with minimum erroneous bits is associated with<br />

the correct message.<br />

The associative memory has a more complex structure that the encoder (see<br />

Figure 5). Thus, each location consists in a binary comparing circuit, as it is illustrated<br />

in Figure 4, <strong>and</strong> in a bits counter (compressor). This compressor count<br />

“1” bits from the comparator output. There’s also a register in which are stored<br />

word code <strong>and</strong> message.


112 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 5. Structure of location in associative memory to the decoder<br />

The message with erroneous bits will be transmitted as a 10 or 15 bits size<br />

data pair (5 or 10 bits message <strong>and</strong> 5 bits number of erroneous bits – from 20 bits<br />

of received word code). All these data pairs, at each location separately, will be<br />

compared to determine the minimum. For this operation we use a combinational<br />

network which gets the minimal value of number of erroneous bits, as is illustrated<br />

in Figure 6.<br />

Figure 6. Minimum computation circuit<br />

The data pairs from the associative memory are applied to left side (x axis).<br />

To y axis we find the data pairs with a minimal value of erroneous bits, which travel<br />

to bottom side of circuit.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

113<br />

The minimum cell (Min), which enters in the structure of the circuit, compares<br />

the number of erroneous bits from two data pairs <strong>and</strong> selects only the data pair<br />

with the minimum number of erroneous bits.<br />

III. Experminental results<br />

Since it’s a hardware system used to detect <strong>and</strong> correct errors in communication,<br />

items that are considered for performance analysis of this system are given<br />

by response time, area occupied on silicon surface <strong>and</strong> communication speed.<br />

In our experiments, we tested two different solutions. The first solution encodes<br />

large message package (10 bits) <strong>and</strong> can correct a small number of erroneous bits<br />

(2 errors). The second solution encodes a smaller message <strong>and</strong> has a greater error<br />

correction capacity. Implementation was performed to a FPGA Xilinx Spartan 3<br />

family, a low cost family circuit (3-20$ per chip inside the family). A complete<br />

communication system will integrate both encoder <strong>and</strong> decoder on the same chip.<br />

We will analyze them separately.<br />

In our analysis we take in account different members of Spartan 3 FPGA family.<br />

The logical cell (Look Up Table, LUT) <strong>and</strong> the logical-routing cell (Slice) are<br />

the same structure for all members inside the family. The differences come from<br />

the number of logical <strong>and</strong> routing cells integrated on chip.<br />

For example, XC3S50 FPGA has 1728 logic cells <strong>and</strong> 768 logical-routing cells,<br />

while XC3S1000 has 17280 logic cells <strong>and</strong> 7680 logic – routing cells. Of course,<br />

the price reflects this difference. For a minimum cost we implement the systems<br />

to the smallest <strong>and</strong> cheapest circuits inside family.<br />

Thus, the communication encoder consists in a simple binary decoder. Its<br />

structure is very simple, in terms of hardware, occupying approximately 1% of all<br />

chip resources for a XC3S50 chip. So we use, for encoder of both solution XC3S50<br />

circuit (3 $/chip).<br />

Table I. Results from encoder <strong>and</strong> decoder implementation – synthesis report<br />

Method Circuit Area on silicon (XC3S) Response time<br />

H-ARQ<br />

w = 20,<br />

m = 10<br />

H-ARQ<br />

w = 20,<br />

m = 5<br />

Encoder<br />

Decoder<br />

Encoder<br />

Decoder<br />

a) for 10 bits of message<br />

b) for 5 bits message<br />

Used slices 10 – 1.3% capacity of XC3S50<br />

Used LUTs 17 – 1.0% capacity of XC3S50<br />

Used slices 6550 – 84% capacity of XC3S1000<br />

Used LUTs 11494 – 66% capacity of XC3S1000<br />

Used slices 9 – 1.17% capacity of XC3S50<br />

Used LUTs 15 – 0.87% capacity of XC3S50<br />

Used slices 466 – 60.68% capacity of XC3S50<br />

Used LUTs 812 – 47% capacity of XC3S50<br />

10.926 ns a<br />

24.048 ns a<br />

9.280 ns b<br />

21.573 ns b


114 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The circuit simplicity implies a very small response time of 9.2 ns for each<br />

5-bits size message or 10.9 ns for each 10-bits size message (see Table I). So, when we<br />

use 5 bits communication means communication at 1 Gbps for encoder. The same<br />

speed is for 10 bits message.<br />

The decoder, more complex than the encoder, still has a simple structure<br />

consisting only of combinational circuits arranged in an array. Comparison operation<br />

between the input data into the associative memory (word code received from<br />

the communication channel) <strong>and</strong> the word code stored is performed in parallel<br />

for all locations.<br />

Therefore, circuit’s complexity is increased by the number of locations. To<br />

10 bits message solution we have a number of 1024 different location. This number<br />

is reflected in capacity of 84% allocated from XC3S1000 logical resources. The decoder<br />

implemented for second solution, with 5 bits per message but highest error<br />

correction capacity can be implemented in the smallest XC3S50.<br />

On the other h<strong>and</strong>, the response time for both decoders is approximately<br />

the same (24 ns – 10 bits, 22 ns – 5 bits). This happens because all the cells respond<br />

in parallel (this value doesn’t take in account the response time of minimum circuit).<br />

We have a communication speed for 10 bits message packets (encoded in 20 bits<br />

word code) of 416 Mbps <strong>and</strong> for 5 bits message (encoded in 20 bits word code)<br />

the speed is 227 Mbps. First solution makes correction for 2 erroneous bits <strong>and</strong><br />

the second solution makes correction for 4 erroneous bits.<br />

Because of coding it is a reduction in speed of communication with 1/4 (5-bits<br />

message is encoded with 15-bits word code) or ½ (5-bit size message is encoded<br />

with 20-bits word code). For example, if communication is to 1 Gbps the real communication<br />

speed is 333 Mbps. However, in our approach, this reduction is not<br />

presented because of parallel computation of entire message word.<br />

Our system can be integrated in Ethernet communications, as additional<br />

services added to physical layer (see Figure 7).<br />

Figure 7. Hardware correction layer services by using our BCH encoder-decoder<br />

Interposition of this circuit in Ethernet communication system will automatically<br />

corrected 2-4 error bit locally. Thus, it provides error correction services for


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

115<br />

protocols in the highest layer. The TCP services will be significantly relieved of task<br />

that, in other circumstances, would have their back. To increase the communication<br />

speed, we can use a “secured” UDP communication, because we have already,<br />

from physical layer, error correction services.<br />

Compared with other structures, based on hardware implementation of error<br />

correction circuit, performance has improved in this version (see Table II, where<br />

SR-ARQ means Selective Repeat Automatic Repeat Request).<br />

Table II. Comparison with other hardware implemented error correction circuits<br />

Method<br />

Parallel computing, classic<br />

Hardware BCH SR-ARQ<br />

Associative memory ARQ<br />

(w = 20, m = 10)<br />

Associative memory A RQ<br />

(w = 20, m = 5)<br />

Correction (t) <strong>and</strong> detection<br />

(f) capability<br />

t = 1 erroneous bit<br />

f = 0<br />

t = 3 erroneous bits<br />

f = 7 erroneous bits<br />

t = 2 erroneous bits<br />

f = 5 erroneous bits<br />

t = 4 erroneous bits<br />

f = 10 erroneous bits<br />

Communi-cation speed<br />

149 Mbps<br />

87 Mbps<br />

416 Mbps<br />

227 Mbps<br />

Thus, we have a parallel computing circuit which corrects 1 erroneous bit, with<br />

no detection, presented in [5]. Because of parallel computing structure we have<br />

here a 149 Mbps communication speed. Another circuit uses a hardware hybrid<br />

BCH SR-ARQ error correction <strong>and</strong> detection algorithms [6].<br />

IV. Conclusions<br />

Our solution presents a modern method concerning implementation of error<br />

correcting codes with associative memories. Associative memories allow a very easy<br />

design for error correcting codes <strong>and</strong> obtain good performances, both in detection<br />

<strong>and</strong> correction. Also, they provide a very high response speed because of parallel<br />

processing.<br />

Our method, presented in this paper, consist in storing a set of word codes<br />

<strong>and</strong> the message associated with them. The correction is achieved by comparing<br />

the received word code with all stored word codes <strong>and</strong> by selecting the nearest word<br />

code, in terms of Hamming distance. Also this method allows us detection of errors<br />

while the correction is performed, increasing computing speed. Our method<br />

improves the capacity of communication channel in Ethernet communication.<br />

In future works we will implement in FPGA error correcting codes with<br />

a higher power correction <strong>and</strong> detection. We will test these new error correcting<br />

systems in order to measure their throughput <strong>and</strong> to decide their capacity to work<br />

in real conditions.


116 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

References<br />

[1] M.Y. Rhee, “Error Correcting Coding Theory”, McGraw-Hill, Singapore, 1989.<br />

[2] S. Lin, <strong>and</strong> D.J. Costello Jr., “Error Control Coding”, Prentice-Hall, New Jersey, 1983.<br />

[3] J. Rose, S.D. Brown, R.J. Francis, “Field Programmable Gate Arrays”, Kluwer Academic<br />

Publishers, 1992.<br />

[4] T. Fogarty, J. Miller, <strong>and</strong> P. Thompson, “Evolving digital logic circuits on Xilinx<br />

6000 family FPGAs,” in Soft Computing in Engineering Design <strong>and</strong> Manufacturing,<br />

P. Chawdhry, R. Roy, <strong>and</strong> R. Pant (eds.), Springer: Berlin, 1998, pp. 299-305.<br />

[5] L. Ionescu, C. Anton, I. Tutănescu, A. Mazăre, G. Şerban, “Hardware<br />

implementation of BCH Error Correcting Codes on FPGA”, International Journal<br />

of Intelligent Computing Research (IJICR), vol. 1, Issue 3, ISSN 2042-4655, Published<br />

by Infonomics Society, p.148-153, September 2010.<br />

[6] G. Şerban, C. Anton, L. Ionescu, I. Tutănescu, A. Mazăre, “Implementation<br />

of a 64-bit hybrid SR-ARQ algorithm on FPGA”, Proceeding of International Conference<br />

on Applied Electronics, ISBN 978-80-7043-987-6, ISSN 1803-7232, IEEE Catalog<br />

Number CFP1169A-PRT, p. 337-340, Pilsen, 7-8 September 2011.


Concurrent Error Detection Scheme<br />

for HaF Hardware<br />

Ewa Idzikowska<br />

Poznań University of <strong>Technology</strong>,<br />

pl. M. Skłodowskiej-Curie 5, 60-965 Poznań, Pol<strong>and</strong>,<br />

ewa.idzikowska@put.poznan.pl<br />

Abstract: HaF (Hash Function) is a dedicated cryptographic hash function considered for verification<br />

of the integrity of data. It is suitable for both software <strong>and</strong> hardware implementation. HaF has an iterative<br />

structure. This implies that even a single transient error at any stage of the computation<br />

of hash value results in a large number of errors in the final hash value. Hence, detection of errors<br />

becomes a key design issue. In the hardware design of cryptographic algorithms, concurrent error<br />

detection (CED) techniques have been proposed not only to protect the encryption <strong>and</strong> decryption<br />

process from r<strong>and</strong>om faults but also from the intentionally injected faults by some attackers. In this<br />

paper, we show the propagation of errors in the VHDL model of HaF-256 <strong>and</strong> then we propose <strong>and</strong><br />

analyse some error detection schemes. In proposed CED scheme all the components are protected<br />

<strong>and</strong> all single <strong>and</strong> multiple, transient <strong>and</strong> permanent bit flip faults will be detected.<br />

Keywords: hash function, HaF, S-box, concurrent error detection, hardware redundancy, time redundancy,<br />

DWC<br />

I. Introduction<br />

A hash function H is a transformation that takes an input m <strong>and</strong> returns<br />

a fixed-size string, which is called the hash value h (that is, h = H(m)). Hash functions<br />

with just this property have a variety of general computational uses, but<br />

when employed in cryptography, the hash functions are usually chosen to have<br />

some additional properties, e.g. H(m) must be relatively easy to compute for any<br />

given m, one-way <strong>and</strong> collision-free [11]. Very important role of a cryptographic<br />

hash function is in the provision of message integrity checks, digital signatures,<br />

password storage <strong>and</strong> verification etc.<br />

Hash functions are computationally complex, <strong>and</strong> in order to satisfy the high<br />

throughput requirements of many applications, they are often implemented by<br />

means of VLSI (Very Large Scale Integration) devices. The high complexity of such<br />

imple mentations raises concerns regarding their reliability. There is a need to develop<br />

methodologies <strong>and</strong> techniques for designing robust cryptographic systems,<br />

<strong>and</strong> to protect them against both accidental faults <strong>and</strong> intentional intrusions <strong>and</strong>


118 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

attacks, in particular those based on the malicious injection of faults into the device<br />

for the purpose of extracting the secret information [3] <strong>and</strong> [4]. If an attacker<br />

deliberately generates a glitch attack, causing a flip-flop state to change or corrupt<br />

data values when they are transferred from one digest operation to another, even<br />

a single fault can result in multiple errors in the hash value computed. The severity<br />

of the problem necessitates detection of errors a key design issue. A digest round<br />

consists of several operations. Errors can creep in at any of these operations <strong>and</strong><br />

can affect one or several bits at any of the operations in a digest round. As HaF<br />

is considered for use in security services, concurrent error detection is very important.<br />

This necessitates an analysis on the propagation of error from the point<br />

of origin to the output.<br />

CED has certain associated penalties such as hardware cost <strong>and</strong> the performance<br />

degradation due to interaction between the circuit <strong>and</strong> the detection logic,<br />

which need to be considered while designing the error detection circuit. The design<br />

goal of the CED is to achieve 100% error detection with minimal penalty.<br />

CED techniques involve redundancy in the form of hardware, time or information.<br />

A CED circuit based on hardware redundancy can for example duplicate<br />

the complete circuit. It means that hardware overhead is more than 100%. In time<br />

redundancy, the same hardware is used to perform both the normal computation<br />

<strong>and</strong> re-computation using the same input data [9]. The advantage of this technique<br />

is that it uses minimum hardware. The drawbacks of this technique are that it entails<br />

≥100% time overhead <strong>and</strong> it can only detect transient faults. In information<br />

redundancy technique, data are appended with additional bits <strong>and</strong> a coding scheme<br />

is used to detect errors. Coding techniques marginally increase the hardware as well<br />

as performance overhead. Combinations of the above techniques are also employed<br />

to minimize the overhead for CED [1] <strong>and</strong> [5].<br />

In this paper the propagation of errors in HaF-256 is studied. We take into<br />

consideration single, transient as well as permanent faults injected at different<br />

stages of hash value computation. It is found that even a single error injected resulted<br />

in half the bits of hash value being in error <strong>and</strong> the errors are spread across<br />

the computed hash value. Next we focused on CED techniques <strong>and</strong> proposed error<br />

detection schemes to protect basic operations such as multiplication mod (2 n +1),<br />

addition modulo 2, addition modulo 2 n There is also presented schemes to protect<br />

S function, step function <strong>and</strong> round function of HaF-256. The proposed approaches<br />

are tested <strong>and</strong> the results are presented.<br />

This paper is organized as follows. Sec. II presents family HaF of hash functions.<br />

There is shown a method of one block processing, round function, operations<br />

of step function. In Sec. III error analysis is carried out to underst<strong>and</strong> the effect<br />

of an error injected into the hash computation circuit. Error detection schemes,<br />

possible faults <strong>and</strong> faults models are described in Sec. IV. Simulation results are<br />

presented in Sec. V. An error detection scheme for the HaF circuit is proposed<br />

in Sec. VI. Concluding remarks are in Sec. VII.


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

119<br />

II. Family HaF of hash functions<br />

The family HaF is formed of three hash functions: HaF-256, HaF-512 <strong>and</strong><br />

HaF-1024, producing hash values of the length equal to 256, 512 <strong>and</strong> 1024 bits,<br />

respectively. The general model for HaF is presented on Fig. 1 [2].<br />

The original message m has to be formatted before hash value computation<br />

begins. After formatting the message m we have the message M. This massage<br />

is divided on blocks M 0 , M 1 , …, M k–1 . Each block M i is processed with the salt s by<br />

the iterative compression function φ. After processing all blocks we receive the hash<br />

value h(m) = H k as the result.<br />

The length of formatted message M should be a multiple of 16n bits. It means,<br />

that the length of the input block equals 16n bits, where n is a parameter depending<br />

of the hash value we want to obtain. The parameter n equals 16, 32 <strong>and</strong> 64 bits<br />

for HaF-256, HaF-512 <strong>and</strong> HaF-1024 respectively. We consider HaF-256 function<br />

in this article. It means, that n = 16.<br />

Figure 1. Model for hash function HaF [2]<br />

The block M i is processed in two rounds. The method of one block processing<br />

is depicted on Fig. 2. M i , H i <strong>and</strong> s are inputs for compression function. The parameter<br />

n indicates the length of the working variable A r , rÎ{0, 1, …, 15}.<br />

The round function (Fig. 3) has two inputs N i , H i , (H 0 = IV is an initial value)<br />

<strong>and</strong> two outputs N i * , H i * . Before processing in round #1, the block M i is modified,


120 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

N i = M i Å s, where s is a salt, |s| = 16n (Fig. 2). In the round #l (lÎ{1, 2}) four least<br />

significant bits of N i indicate the number of bits the string N i is rotated to the left<br />

(


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

121<br />

Figure 4. Step function F j [2]<br />

In the Fig. 4. the following notations are used:<br />

a ⊙ b – multiplication mod (2 n +1) of n-bit non-zero integers a <strong>and</strong> b,<br />

v


122 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

III. Error propagation<br />

Error propagation analysis is carried out to underst<strong>and</strong> the effect of an error<br />

injected into the hash computation circuit. Error was injected in:<br />

• the inputs of a round function,<br />

• the inputs of step function.<br />

Experiments were conducted by injecting a single bit flip error in one of the inputs<br />

of round function or step function <strong>and</strong> obtaining the number of erroneous<br />

bits at the output of the same block. The errors were introduced at different bits<br />

r<strong>and</strong>omly in every step <strong>and</strong> the number of bits that were in error was computed.<br />

As an example we show the propagation of error injected in first step of round #1<br />

in subblock A 13 . Instead value F9DD is the faulty value F95D. Output values A 0 ,<br />

A 1 , …, A 15 after processing each of 16 steps of round function, are shown in Table I.<br />

The faulty values are depicted by bold, italic font.<br />

One faulty bit in the step #0 of round function causes about 43% faulty bits<br />

in the last, #15 step. Faulty bit in the input of round #1 of round function causes<br />

49% faulty bits in the output of round #2.<br />

This analysis helps us in choosing suitable error detection schemes.<br />

Table I. Error propagation in round function of HaF-256<br />

Faulty free input value A0, A1, …, A15; A13 = F9DD<br />

076A3663D2541F389E94CA4E1A759C92ED3282E55F31FC1514A6F9DDBA029ABE<br />

Faulty input value A0, A1, …, A15; A13 = F95D<br />

076A3663D2541F389E94CA4E1A759C92ED3282E55F31FC1514A6F95DBA029ABE<br />

Step<br />

Faulty outputs<br />

0 3663D2541F389E94CA4E1A759C92ED3282E598AFFC1514A6F95DBA029ABEDFA8<br />

1 D2541F389E94CA4E1A759C92ED3282E598AF0AFE14A6F95DBA029ABEDFA8C321<br />

2 1F389E94CA4E1A759C92ED3282E598AF0AFE530AF95DBA029ABEDFA8C3210741<br />

3 9E94CA4E1A759C92ED3282E598AF0AFE530AAEFCBA029ABEDFA8C3210741A47E<br />

4 CA4E1A759C92ED3282E598AF0AFE530AAEFC015D9ABEDFA8C3210741A47E1059<br />

5 1A759C92ED3282E598AF0AFE530AAEFC015D5F4DDFA8C3210741A47E105943F0<br />

6 9C92ED3282E598AF0AFE530AAEFC015D5F4DD46FC3210741A47E105943F0D7D2<br />

7 ED3282E598AF0AFE530AAEFC015D5F4DD46F90E10741A47E105943F0D7D2C084<br />

8 82E598AF0AFE530AAEFC015D5F4DD46F90E1A083A47E105943F0D7D2C084A3FF<br />

9 98AF0AFE530AAEFC015D5F4DD46F90E1A0833F52105943F0D7D2C084A3FF9977<br />

10 0AFE530AAEFC015D5F4DD46F90E1A0833F522C8843F0D7D2C084A3FF9977CA78<br />

11 530AAEFC015D5F4DD46F90E1A0833F522C88F821D7D2C084A3FF9977CA785AAE<br />

12 AEFC015D5F4DD46F90E1A0833F522C88F821E96BC084A3FF9977CA785AAE875B<br />

13 015D5F4DD46F90E1A0833F522C88F821E96B4260A3FF9977CA785AAE875B8AF7<br />

14 5F4DD46F90E1A0833F522C88F821E96B4260FFD19977CA785AAE875B8AF7D530<br />

15 D46F90E1A0833F522C88F821E96B4260FFD1BBCCCA785AAE875B8AF7D5307F1C


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

123<br />

IV. Error detection schemes<br />

Fault detection is achieved in a circuit by including redundancy in one form<br />

or the other. The selection of a suitable scheme depends on the type of errors to<br />

be covered, error models <strong>and</strong> the performance degradation acceptable in terms<br />

of hardware overhead <strong>and</strong> delay. The schemes based only on time redundancy are not<br />

capable of h<strong>and</strong>ling permanent faults. The simplest form of error detection scheme<br />

which can detect transient as well as permanent faults with hardware redundancy<br />

is the DWC scheme. The hardware overhead in this case is little >100% with very<br />

little additional delay, these can h<strong>and</strong>le unrestricted error models.<br />

The earliest error detecting scheme is the parity bit scheme. It is a well-known<br />

fact that parity codes can detect all single bit errors <strong>and</strong> all errors with multiple<br />

odd erroneous bits. To improve the error detection capability <strong>and</strong> detect also even<br />

erroneous bits, multiple parity bits are required [7] <strong>and</strong> [8]. In HaF-256 first of all<br />

DWC scheme will be used.<br />

A. Faults models<br />

In our considerations we use a fault model wherein either transient or permanent<br />

faults are induced r<strong>and</strong>omly into the device. We consider single <strong>and</strong> multiple<br />

faults. Faults are modelled as an 16-bit error vector E = {e 15 ,...,e i ,...,e 1 ,e 0 }, where<br />

e i Î{0,1} <strong>and</strong> e i = 1 indicates that bit i is faulty. The number of ones in this vector<br />

is equal to the number of inserted faults. Fault simulations were performed for two<br />

kinds of fault models. In one model a fault flips the bit, <strong>and</strong> in the other model<br />

(stuck-at-0/1) the bit takes a constant value 0 or 1.<br />

Let X = {x 15 ,...,x 1 ,x 0 } be an error-free vector of bits.<br />

Vector Xe = {xe 15 ,...,xe 1 ,xe 0 } is an erroneous vector [6] <strong>and</strong> [7]:<br />

• xe i = x i Å e i – if the fault flips the bit,<br />

• xe i = x i + e i – for stuck-at-1 fault,<br />

• xe i = x i × ē i – for stuck-at-0 fault,<br />

where: Å – xor, + – or, × – <strong>and</strong>.<br />

B. Error detection in basic operations<br />

To protect basic operations such as multiplication mod (2 n +1) (⊙), addition<br />

modulo 2 (Å) <strong>and</strong> addition modulo 2 n (⊞) in step function of HaF-256 (Fig. 3) we<br />

used DWC (Duplication With Comparison) scheme as it shown in Fig. 5.<br />

Step function F j with DWC scheme elements for one of addition modulo<br />

2 n (⊞) operation is presented in Fig. 6. In this figure gray boxes are an extra elements<br />

to detect errors in A 1 ⊞A 6 operation. The outputs of the addition block <strong>and</strong><br />

the duplicated addition block are compared (box errcheck) <strong>and</strong> if are different,<br />

an error signal is generated.


124 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 5. Duplication With Comparison scheme<br />

Figure 6. Step function F j with DWC for one of addition modulo 2 n (⊞) operation<br />

Experiments were conducted by injection errors into the inputs of an operation<br />

block <strong>and</strong> observe if the errors are detected. Capability of single <strong>and</strong> multiple,<br />

transient <strong>and</strong> permanent fault detection using this scheme of fault detection<br />

is presented in Sec. V.<br />

C. Error detection in S-boxes<br />

S-box is a substitution function <strong>and</strong> is used to obscure the relationship between<br />

the plaintext <strong>and</strong> the ciphertext. It is an important element of cryptographic


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

125<br />

algorithm <strong>and</strong> it should posses some properties, which make linear <strong>and</strong> differential<br />

cryptanalysis as difficult as possible.<br />

In each step of round function of HaF a substitution S j (n) depending on<br />

n <strong>and</strong> j is used. It consists of four S-boxes S 0 , S 1 , S 2 <strong>and</strong> S 3 each of dimension 16×16<br />

working in such a way that:<br />

• for n = 16, S j (16) = S (j) mod 4<br />

• for n = 32, S j (32) = S (j) mod 4 || S (j+1) mod 4 ,<br />

• for n = 64, S j (64) = S (j) mod 4 || S (j+1) mod 4 || S (j+2) mod 4 (x) || S (j+3) mod 4 .<br />

HaF S-box has been generated using the multiplicative inverse procedure<br />

similar to AES (Advanced Encryption St<strong>and</strong>ard) with a r<strong>and</strong>omly chosen primitive<br />

polynomial defining the Galois field. Nonlinearity of this S-box is 32510 <strong>and</strong> its<br />

nonlinear degree is 15. Sixteen Boolean functions that constitute this S-box have<br />

nonlinearities equal to 32510 or 32512 <strong>and</strong> are all of degree 15 [2].<br />

A 16×16 S-box can be stored as a table containing 65536 values indexed by<br />

an input of the S-box function, i.e., x 1 , x 2 , …, x 16 . The table stores S-box outputs<br />

(16 bits: f 1 (x 1 , x 2 , …, x 16 ), f 2 (x 1 , x 2 , …, x 16 ), …, f 16 (x 1 , x 2 , …, x 16 )).<br />

Concurrent Error Detection schemes for S-box are presented in [9] <strong>and</strong> [10].<br />

There are three different approaches to error detection. Two of these methods<br />

– parity based Concurrent Error Detection approach <strong>and</strong> DWC scheme – are<br />

the methods with hardware redundancy [10], the third one is time redundancy<br />

method <strong>and</strong> use involutional time redundancy CED to protect the S-boxes core<br />

of function HaF [9].<br />

Capabilities of detection single <strong>and</strong> multiple, transient <strong>and</strong> permanent fault<br />

using these schemes are presented in Sec. V.<br />

D. Error detection in step function<br />

The round function (Fig. 3.) consists of 16 steps. The step #j is indicated by<br />

the integer j Î {0, 1, …, 15} <strong>and</strong> is shown in Fig. 4. To protect this function we used<br />

DWC (Duplication With Comparison) scheme as it shown in Fig. 5.<br />

Round function with DWC scheme elements for step function F j is presented<br />

in Fig. 7. In this figure, gray box is an extra step function block. The outputs<br />

of these two blocks are compared (box errcheck) <strong>and</strong> if are different, an error<br />

signal is generated.<br />

Experiments were conducted by injection errors inside or into inputs of the step<br />

function block <strong>and</strong> observation if the errors are detected. Capability of single <strong>and</strong><br />

multiple, transient <strong>and</strong> permanent faults detection using this scheme of fault detection<br />

is presented in the Sec. V.


126 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 7. Round function with CED elements for step function F j protection<br />

E. Error detection in round function<br />

The message block M i is processed in two rounds. The method of one block<br />

processing is depicted in Fig. 2. Round function with DWC is presented in Fig. 8.<br />

The gray box is an extra Round function block. The outputs of Round #1 <strong>and</strong> Round<br />

#1b are compared (box errcheck) <strong>and</strong> if are different, an error signal is generated.<br />

Capability of single <strong>and</strong> multiple, transient <strong>and</strong> permanent faults detection<br />

using this DWC scheme is presented in Sec. V.<br />

V. Simulation results<br />

In order to measure the detection capability of the proposed in Sec. IV error<br />

detection schemas we used VHDL (Very High Speed Integrated Circuits Hardware<br />

Description Language) hardware description language <strong>and</strong> the VHDL simulator,<br />

Active-HDL by Aldec. In this section we provide simulation results related to<br />

the fault coverage of the proposed approaches. We present simulation results on


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

127<br />

the vulnerability of these schemes for fault models from Section IV.A. The faults<br />

were injected into inputs of an basic operation blocks or also inside the other blocks,<br />

<strong>and</strong> observed if the error is detected. We consider r<strong>and</strong>om faults, in the sense that<br />

the faulty value is assumed to be r<strong>and</strong>om <strong>and</strong> uniformly distributed. The VHDL<br />

model of the HaF-256 function has been modified by injected faults. The output<br />

signals have been compared to correct signals. In this way, the obtained fault coverage<br />

gives a measure of the error detection capability.<br />

Figure 8. DWC for round function<br />

A. CED in basic operations<br />

In this experiment we focused on transient <strong>and</strong> permanent, single <strong>and</strong> multiple<br />

stuck-at faults <strong>and</strong> bit flips faults. Errors were injected in the input of an operation block<br />

<strong>and</strong> observe if the error is detected. The obtained faults coverage for addition modulo<br />

2 n operation (⊞) is shown in Fig. 9 for permanent faults <strong>and</strong> in Fig. 10 for transient<br />

faults. Single permanent stuck-at-0/1 faults are detected by proposed CED in 57.9%,<br />

transient faults in 57.2%. All single bit flip faults, permanent <strong>and</strong> transient, are detected.<br />

Fig. 9. <strong>and</strong> Fig. 10. show also dependence of error detection probability on<br />

the number of injected faults. Not only single, but also multiple bit flip faults are<br />

detected always.


128 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Percentage of permanent stuck-0/1 error detection for other operations is presented<br />

in Table II. DWC scheme detects all bit flip errors.<br />

Figure 9. Probability of permanent error detection using DWC for addition modulo 2 n operation (⊞)<br />

Figure 10. Probability of transient error detection using DWC for addition modulo 2 n operation (⊞)


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

129<br />

Table II. Probability of permanent error detection for operations of step function of HaF-256<br />

Stuck-at-0/1<br />

Number of errors 1 2 3 4 5<br />

a ⊙ b 57.2 74.9 88.1 93.1 96.6<br />

v Å w 61.1 82.1 85.4 93.3 96.5<br />

v ⊞ w 57.9 80.3 90.3 95.3 96.8<br />

p 1 (x) Ä p 2 (x) 60.9 78.2 85.8 93.2 96.1<br />

B. CED in S-boxes<br />

In this paper Concurrent Error Detection schemes for S-boxes of the HaF<br />

algotithm was tested for transient <strong>and</strong> permanent, single <strong>and</strong> multiple stuck-at error<br />

<strong>and</strong> bit flips errors. The obtained detection percentage for differnet CED schemes<br />

for transient faults is shown in Table III. <strong>and</strong> for permanent faults in Table IV.<br />

The best detection percentage of errors is for DWC scheme, first for all for<br />

single stuck-at-0/1 errors. A difference between DWC <strong>and</strong> parity bit scheme reaches<br />

more than 25% however this difference is much smaller for multiple errors. There<br />

is no difference between detection percentage for these three error detection schemas<br />

for bit flip errors — all are detected.<br />

A study of concurrent error detection possibilities of these three CED schemas<br />

shows, that involutional time redundancy CED <strong>and</strong> also parity bit based scheme<br />

is a good choice. The hardware overhead is very small <strong>and</strong> detection percentage for<br />

bit flip errors is practically the same as for DWC.<br />

Table III. Probability of transient error detection in S-box<br />

Fault type Stuck-at-0/1 Bit flip fault<br />

No. of errors 1 2 3 4 5 1 2 3 4 5<br />

Parity bits 54.5 79.4 83.5 93.1 95.2 94.5 100 100 100 100<br />

DWC 72.6 86.6 92.9 96.7 99.4 100 100 100 100 100<br />

Involution 65.1 81.8 91.5 91.9 95.1 99.9 100 100 100 100<br />

Table IV. Probability of permanent error detection in S-box<br />

Fault type Stuck-at-0/1 Bit flip fault<br />

No. of errors 1 2 3 4 5 1 2 3 4 5<br />

Parity bits 56.3 82.3 85.5 94.9 97.0 100 100 100 100 100<br />

DWC 75.8 87.7 95.1 98.3 99.7 100 100 100 100 100<br />

Involution 69.2 85.9 95.7 95.9 98.9 100 100 100 100 100


130 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

CED in step function<br />

In this experiment we focused on transient <strong>and</strong> permanent, single <strong>and</strong><br />

multiple stuck-at faults <strong>and</strong> bit flip faults. Errors were injected in the input<br />

of step function block or inside the block <strong>and</strong> observed if the error is detected.<br />

Detection percentage of stuck-at-0/1 <strong>and</strong> bit flip errors, is shown in Table V. for<br />

transient errors <strong>and</strong> in Table VI. for permanent errors. Using this CED method<br />

we can detect all bit flip faults. The worse case is for single stuck-at faults. Only<br />

63.6% transient faults <strong>and</strong> 69.4% permanent faults is detected. Multiple stuck-at<br />

faults are detected in 80-95%.<br />

Table V. Probability of transient error detection in step function<br />

Fault type Stuck-at-0/1 Bit flip fault<br />

No. of errors 1 2 3 4 5 1 2 3 4 5<br />

DWC 63.6 79.6 84.3 90.3 95.6 100 100 100 100 100<br />

Table VI. Probability of permanent error detection in step function<br />

Fault type Stuck-at-0/1 Bit flip fault<br />

No. of errors 1 2 3 4 5 1 2 3 4 5<br />

DWC 69.4 82.8 85.3 93.1 95.9 100 100 100 100 100<br />

C. CED in round function<br />

CED in round function was tested also for stuck-at faults <strong>and</strong> for bit flip faults.<br />

There was considerate single <strong>and</strong> multiple faults, transient <strong>and</strong> permanent faults.<br />

The faults was inserted inside the function block or into the inputs. Probability<br />

of errors detection is presented in Table VII (transient error) <strong>and</strong> in Table VIII<br />

(permanent error). The obtained detection percentage for bit flip faults, single <strong>and</strong><br />

multiple, is 100%.<br />

Table VII. Probability of transient error detection in round function<br />

Fault type Stuck-at-0/1 Bit flip fault<br />

No. of errors 1 2 3 4 5 1 2 3 4 5<br />

DWC 66.5 82.6 85.3 92.1 96.5 100 100 100 100 100<br />

Table VIII. Probability of Permanent error detection in round function<br />

Fault type Stuck-at-0/1 Bit flip fault<br />

No. of errors 1 2 3 4 5 1 2 3 4 5<br />

DWC 70.6 83.9 86.7 94.2 96.7 100 100 100 100 100


Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />

131<br />

VI. CED for hash function HaF<br />

After analyzing the propagation of errors in HaF <strong>and</strong> the probability of error<br />

detection for elementary function of HaF using different CED schemes, to protect<br />

HaF circuit we used DWC scheme for step function protection <strong>and</strong> DWC for two<br />

basic operations – addition modulo 2 (Å) <strong>and</strong> addition modulo 2 n (⊞). Hardware<br />

redundancy for step function DWC protection is smaller than redundancy for<br />

round function protection, <strong>and</strong> probabilities of error detection are comparable.<br />

We take into consideration transient <strong>and</strong> permanent, single <strong>and</strong> multiple<br />

stuck-at faults <strong>and</strong> bit flip faults. Errors were injected into the input of HaF or inside<br />

this function <strong>and</strong> than we observed if the errors are detected. Detection percentage<br />

is presented in Table IX. <strong>and</strong> Table X. All, transient <strong>and</strong> permanent, bit flip faults<br />

are detected. Multiple stuck-at faults are detected in 79-95%. Single stuck-at fault<br />

are detected at approximately 60-65%.<br />

Table IX. Probability of transient error detection in HaF<br />

Fault type Stuck-at-0/1 Bit flip fault<br />

No. of errors 1 2 3 4 5 1 2 3 4 5<br />

DWC 58.6 78.7 84.1 89.4 94.1 100 100 100 100 100<br />

Table X. Probability of permanent error detection in HaF<br />

Fault type Stuck-at-0/1 Bit flip fault<br />

No. of errors 1 2 3 4 5 1 2 3 4 5<br />

DWC 65.4 81.9 85.0 91.9 95.5 100 100 100 100 100<br />

VII. Concluding remarks<br />

Fault attacks are becoming a serious threat to hardware implementations<br />

of cryptographic systems. Proper countermeasures must be adopted to foil them.<br />

In this paper first the propagation of errors in HaF-256 is studied. We take<br />

into consideration single, transient as well as permanent faults injected at different<br />

stages of hash value computation. It is found that even a single error injected<br />

resulted in half the bits of hash value being in error <strong>and</strong> the errors are spread across<br />

the computed hash value.<br />

We proposed also error detection schemes for basic operations <strong>and</strong> elementary<br />

functions of hash function HaF <strong>and</strong> finally for HaF-256 circuit. In order to<br />

measure the fault detection capability of these schemas we used VHDL models <strong>and</strong><br />

the VHDL simulator, Active-HDL by Aldec. We presented simulation results on<br />

the vulnerability of these schemes for single <strong>and</strong> multiple faults <strong>and</strong> for transient<br />

<strong>and</strong> permanent faults. These methods can provide high coverage for multiplebit<br />

errors, which are the most common fault attacks. The coverage depends heavily


132 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

also on the fault model. Simulation experiments conducted on a large number<br />

of test cases show that our schemes have 100% fault coverage in the case of bit flip<br />

errors. These solution can be useful for concurrent checking cryptographic chips,<br />

especially designed for platforms with limited resources<br />

Acknowledgment<br />

This research was partially supported by the Polish Ministry of Education <strong>and</strong><br />

Science as a 2010-2013 research project.<br />

References<br />

[1] G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, V. Piuri, “Error Analysis <strong>and</strong><br />

Detection Procedures for a Hardware Implementation of the Advanced Encryption<br />

St<strong>and</strong>ard”, IEEE Transactions on Computers, vol. 52, no. 4, pp. 492-505, 2003.<br />

[2] T. Bilski, K. Bucholc, A. Grocholewska-Czuryło, J. Stokłosa, „Hash Function<br />

Concept”, Report no. 596, Poznań University of <strong>Technology</strong>, Poznań, 2011.<br />

[3] D. Boneh, R. DeMillo, R. Lipton, “On the Importance of Eliminating Errors<br />

in Cryptographic Computations”, Journal of Cryptology, vol. 14, pp. 101-119, 2001.<br />

[4] D. Boneh, R. DeMillo, R. Lipton, On the importance of checking cryptographic<br />

protocols for faults. Proceedings of Eurocrypt, pp. 37-51. Springer-Verlag LNCS 1233,<br />

1997.<br />

[5] L. Breveglieri, I. Koren, P. Maistri, “An Operation-Centered Approach to Fault<br />

Detection in Symmetric Cryptography Ciphers”, IEEE Transactions on Computers,<br />

vol. 56, no. 5, 635-649, 2007.<br />

[6] E. Idzikowska, K. Bucholc, “Concurrent Error Detection in S-boxes”, International<br />

Journal of Computer Science & Applications, vol. 4, no. 1, pp. 27-32, 2007.<br />

[7] E. Idzikowska, K. Bucholc, “Error detection schemes for CED in block ciphers”,<br />

Proceedings of the 5th IEEE/IFIP International Conference on Embedded <strong>and</strong><br />

Ubiquitous Computing, pp. 22-27. Shanghai 2008.<br />

[8] E. Idzikowska, “CED for S-boxes of symmetric block ciphers”, Pomiary, Automatyka,<br />

Kontrola, vol. 56, no. 10, pp. 1179-1183 2010.<br />

[9] E. Idzikowska, “CED for involutional functions of PP-1 cipher”, Proceedings of the 5th<br />

International Conference on Future <strong>Information</strong> <strong>Technology</strong>. Busan 2010.<br />

[10] E. Idzikowska, “Errors detection in S-boxes of hash function HaF-256”, Borzemski L.,<br />

Grzech A., Świątek J., Wilimowska Z. (eds.), <strong>Information</strong> Systems Architecture <strong>and</strong><br />

<strong>Technology</strong> – Web <strong>Information</strong> Systems Engineering, Knowledge Discovery <strong>and</strong> Hybrid<br />

Computing, Wroclaw University of <strong>Technology</strong> Press, Wrocław, 2011, 231-240.<br />

[11] J. Stokłosa, T. Bilski, T. Pankowski, “Bezpieczeństwo danych w systemach informatycznych”,<br />

PWN, Warszawa-Poznań 2001.


Chapter 6<br />

Spectrum Management<br />

<strong>and</strong> Software Defined Radio Techniques


A Realistic Roadmap for the Introduction<br />

of Dynamic Spectrum Management in <strong>Military</strong><br />

Tactical Radio Communication<br />

Bart Scheers 1 , Austin Mahoney 2 , Hans Åkermark 2<br />

1 CISS Department, Royal <strong>Military</strong> Academy (RMA), Brussels, Belgium,<br />

bart.scheers@rma.ac.be<br />

2 <strong>Communications</strong> Development, Security <strong>and</strong> Defense Solutions, Saab AB, Linköping, Sweden,<br />

{austin.mahoney, hans.akermark}@saabgroup.com<br />

Abstract: Cognitive radio (CR) technology has to date not been adopted by the military even though<br />

more than a decade has passed since its inception. This paper describes how cognitive radio <strong>and</strong><br />

associated dynamic spectrum management (DSM) procedures can be introduced in military tactical<br />

radio communication. CR <strong>and</strong> DSM address key challenges that face future military tactical<br />

radio communication <strong>and</strong> their successful introduction can reduce or even overcome current<br />

spectrum scarcity <strong>and</strong> deployment difficulty. A DSM roadmap is introduced where military users<br />

develop trust in, <strong>and</strong> experience with, these novel technologies in manageable steps. The first step<br />

in this DSM roadmap involves the introduction of a military b<strong>and</strong> dedicated for CRs <strong>and</strong> subsequent<br />

steps gradually increase the spectrum that may be utilized for military cognitive operation.<br />

A high-level vision of how existing military spectrum management procedures will change in the future<br />

with the introduction of DSM is also presented resulting in a significant reduction in the workload<br />

of spectrum management personnel.<br />

Keywords: cognitive radio; dynamic spectrum management; military tactical communication;<br />

roadmap<br />

I. Introduction<br />

<strong>Military</strong> tactical networks are being required to support a greater number<br />

of services than ever before. In addition, the b<strong>and</strong>width requirements associated<br />

with many of the new services are also rapidly increasing. The combination<br />

of these two factors means that we are nearing a time when there will be insufficient<br />

b<strong>and</strong>width to support the services required for future military operations. Today’s<br />

military operations are also typically undertaken by multiple nations cooperating<br />

in a coalition force. The spectrum <strong>and</strong> frequency planning activities associated with<br />

This research work was carried out in the frame of the CORASMA – EDA Project B-0781-IAP4-GC.


136 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

the deployment of a large multi-national coalition force are extremely complex <strong>and</strong><br />

unacceptably long, <strong>and</strong> can even delay the start of an operation [1].<br />

Both of the aforementioned problems, spectrum scarcity <strong>and</strong> deployment burden,<br />

are to a large degree consequences of the centralized <strong>and</strong> static nature of current<br />

spectrum management [1]. Dynamic spectrum management <strong>and</strong> cognitive radios<br />

seek out <strong>and</strong> use a part of the electromagnetic spectrum in ways that are not predictable,<br />

so that it is not generally known which set of frequencies that a radio will use at<br />

any given time”. The DSM process may be seen as a harmonization of, <strong>and</strong> dynamic<br />

interaction between, both a human element in the form of spectrum regulators <strong>and</strong><br />

spectrum planners or managers <strong>and</strong> an autonomous element in the form of one or<br />

more cognitive radio networks. DSM represents a fundamental change from existing<br />

spectrum management procedures in the way that spectrum is allocated <strong>and</strong> used for<br />

both civilian <strong>and</strong> military domains.<br />

This paper aims to address two particular aspects of DSM, first:<br />

• how a new <strong>and</strong> unproven technology such as DSM can be introduced<br />

in military tactical radio communication, <strong>and</strong> second<br />

• how current spectrum management procedures would be affected by such<br />

a change.<br />

To address these two aspects, this paper starts in section 2 with an overview<br />

of current spectrum management procedures in the military tactical domain <strong>and</strong><br />

their inadequacy for future military operations. Section 3 highlights the key challenges<br />

for a proposed roadmap describing the gradual <strong>and</strong> systematic extension<br />

of current spectrum management procedures that is presented in section 4. Section<br />

5 relates the proposed roadmap to future spectrum management procedures<br />

to clarify possible DSM practices in a future setting where cognitive enabled radios<br />

will be the norm in military tactical radio communication. This paper ends in section<br />

6 with major conclusions.<br />

II. Current NATO spectrum management procedures<br />

at the operational level<br />

The worldwide use of the electromagnetic spectrum is regulated by the International<br />

Telecommunication Union (ITU). The ITU sets out the global radio<br />

regulations in the form of a global Frequency Allocation Table (FAT) from which<br />

each nation defines its own FAT covering many aspects of radio regulation, such<br />

as the generic type of radio service that is permitted within each frequency b<strong>and</strong><br />

<strong>and</strong> whether the b<strong>and</strong> is allocated for military, civil or shared use. In what follows,<br />

existing non-cognitive military spectrum management procedures are summarized<br />

for coalition operations as defined in ACP 190(C) [2]. ACP 190(C) defines three<br />

main phases to each operation: Planning, Deployment (also known as Implementation)<br />

<strong>and</strong> Recovery. The description provided is structured according to these<br />

three phases involving the elements introduced in Figure 1.


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

137<br />

Combined Task<br />

Force Comm<strong>and</strong>er<br />

(CTFC)<br />

Host Nation<br />

Administration<br />

Combined Spectrum<br />

Management Cell<br />

(CSMC)<br />

Component Spectrum<br />

Manager (CSM)<br />

Lead Nation<br />

National Spectrum<br />

Manager<br />

National Spectrum<br />

Manager<br />

National Spectrum<br />

Manager<br />

National<br />

Element<br />

- Networks<br />

- Radios<br />

National<br />

Element<br />

- Networks<br />

- Radios<br />

National<br />

Element<br />

- Networks<br />

- Radios<br />

Figure 1. Elements of a coalition deployment <strong>and</strong> their relationships<br />

A. Planning phase<br />

The primary purpose of the planning phase is to produce the Battlespace<br />

Spectrum Management Plan (BSMP). The BSMP is used to inform the coalition<br />

force entities of issues relating to the management <strong>and</strong> planned usage of the spectrum<br />

during the operation by providing a mapping between all radio <strong>and</strong> network<br />

systems <strong>and</strong> frequencies.<br />

In the planning phase, the Combined Task Force Comm<strong>and</strong>er (CTFC) assumes<br />

overall comm<strong>and</strong> of the forthcoming operation as part of a m<strong>and</strong>ate from<br />

a higher authority specifying the conditions under which the coalition force will<br />

operate. The CTFC establishes a Combined Spectrum Management Cell (CSMC)<br />

responsible for coordinating the spectrum requirement of the force, acquiring<br />

the necessary spectrum <strong>and</strong> assigning frequencies for the systems used by the forces<br />

within the operational area. The CSMC will normally delegate the authority to manage<br />

frequency allotments to one or more Component Spectrum Managers (CSMs),<br />

where maritime, l<strong>and</strong>, air, logistics <strong>and</strong> special forces are typical components. Each<br />

component may be composed of multiple National Elements (NEs).<br />

When a coalition is formed, a single nation is given the responsibility to act<br />

as the Lead Nation. The Lead Nation is responsible for providing <strong>and</strong> sustaining<br />

frequencies for the force through the spectrum management process <strong>and</strong> providing<br />

technical support to the CSMC. Each nation within the coalition force is obliged to<br />

set up its own spectrum management cell with a National Spectrum Manager (NSM)<br />

to coordinate spectrum processes for its national forces. Each NSM will identify<br />

all radio equipment to be deployed by the NEs, including equipment parameters


138 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

<strong>and</strong> operational (geographical) areas, <strong>and</strong> provide this information to the CSMC.<br />

The CSMC combines the spectrum requirements, operational areas <strong>and</strong> radio<br />

equipment characteristics provided by the individual NSMs into the Electronic<br />

Order of Battle (EOB). The EOB expresses the overall spectrum requirement for<br />

the operation.<br />

Depending on the tools available to the CSMC, it should be possible to model<br />

the overall spectrum requirement for the operation that is detailed in the EOB (i.e.<br />

frequency planning). This modeling activity makes use of the topographical data<br />

associated with the operational area to identify where frequency re-use is possible.<br />

It also takes into account any equipment frequency constraints, frequency hopping<br />

systems, airborne emitters, preferred frequency allotments <strong>and</strong> any protected<br />

frequencies. The CSMC uses the output of the modeling activity <strong>and</strong> the EOB to<br />

acquire the necessary spectrum to satisfy the operation requirement. Depending<br />

on whether or not the operation is conducted with the support of the host nation,<br />

the CSMC either establishes contact with the host nation spectrum administrators<br />

<strong>and</strong> submits a frequency request detailing the spectrum requirements or uses<br />

electronic surveillance to select the most favorable spectrum without regard for<br />

existing local users.<br />

When the available spectrum has either been allocated by the host nation or<br />

identified through observation, the CSMC (<strong>and</strong> CSMs) will produce the frequency<br />

assignment tables for all radio equipment associated with the coalition force <strong>and</strong><br />

incorporate them into the BSMP. These tables include any constraints on the use<br />

the frequencies including transmit power, antenna height <strong>and</strong> location.<br />

B. Deployment phase<br />

In the deployment phase, each NE implements the BSMP as received from<br />

the CSMC via their CSM prior to deployment. Interference may be encountered at<br />

any time due to host nation emitters, conflicting allied systems or enemy jamming.<br />

Each NE is responsible for investigating the interference that is encountered to try to<br />

determine the source <strong>and</strong>, if the source is local, endeavor to reduce the interference<br />

or eliminate it using appropriate action. If local action is impractical or unsuccessful,<br />

the interference <strong>and</strong> resultant loss of capability is reported to the CSM using<br />

a specified interference report format <strong>and</strong> procedure. Each CSM is responsible for<br />

the real-time control <strong>and</strong> management of the spectrum within its area of operation<br />

(i.e. the spectrum used by its NEs). The CSM responsibilities include the resolution<br />

of any frequency conflicts between its NEs <strong>and</strong> other interference issues by making<br />

appropriate frequency assignment changes or modifying allotments if other efforts<br />

to alleviate the interference are ineffective. The CSM will send any spectrum changes<br />

to the appropriate NEs where they are implemented.<br />

Whilst the CSMC may delegate responsibility for real-time spectrum management<br />

to the CSMs, it retains overall control <strong>and</strong> will become involved where


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

139<br />

coordination between components is required. The CSMC’s responsibilities include<br />

maintaining a close relationship with the host nation so that all interference reports<br />

associated with host nation emitters that are received from CSMs are sent to<br />

the host nation administration to be resolved. The CSMC will also act to resolve<br />

spectrum conflicts between components <strong>and</strong> other interference issues by making<br />

appropriate frequency assignment changes or modifying allotments if other efforts<br />

to alleviate the interference are ineffective.<br />

C. Recovery phase<br />

The recovery phase is a period of transition where each individual NE is responsible<br />

for informing the CSM of the time <strong>and</strong> date when the element will stop<br />

using their frequency assignments <strong>and</strong> h<strong>and</strong>ing back frequencies to the CSM for<br />

reassignment to another unit. Each CSM is responsible for reviewing <strong>and</strong> consolidating<br />

the spectrum in use by the force component, identifying any NE changes<br />

that need to be incorporated into a new BSMP. The CSMC is responsible for reviewing<br />

<strong>and</strong> consolidating the spectrum in use by the force as a whole, incorporate<br />

any changes into a new BSMP to meet the requirements of the new force which<br />

is passed on to an incoming force or the (newly established) civil administration.<br />

III. Key challenges for the introduction of DSM in military<br />

tactical environments<br />

The previous section shows that today’s military spectrum management procedures<br />

are, in the main, centralized <strong>and</strong> static. For example, the frequency b<strong>and</strong>s<br />

allocated for military use within the relevant FAT are typically not modified on<br />

a regular basis. The frequency planning procedures that are applied within these<br />

military b<strong>and</strong>s are also performed to meet the particular operational requirements<br />

of an operation including factors such as size, scope <strong>and</strong> composition of the deployed<br />

force. To a large extent, frequency management activities are typically performed<br />

prior to the operation in the planning phase <strong>and</strong> are often time consuming <strong>and</strong><br />

complex especially for large coalition operations. Hence, once the assignments are<br />

made, they are generally fixed for the duration of the operation. Cognitive radio<br />

<strong>and</strong> DSM technologies offer the potential to significantly enhance the operational<br />

effectiveness <strong>and</strong> management of military tactical radio communications.<br />

However, these new technologies are relatively complex <strong>and</strong> represent a paradigm<br />

shift in capability <strong>and</strong> operational procedure for military spectrum managers<br />

<strong>and</strong> end-users. Several hurdles must be overcome if cognitive radio technology is to<br />

be adopted by the military as the technology is currently not in use even though more<br />

than a decade has passed since its inception. Firstly, as with any novel technology,<br />

there is general mistrust in its capability <strong>and</strong> military users tend to be conservative<br />

<strong>and</strong> risk averse towards new <strong>and</strong> unproven technology. Secondly, if the cognitive


140 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

radio concept is adopted, it will be introduced into service in a gradual fashion<br />

where CRs must be able to safely coexist with existing legacy radio equipment <strong>and</strong><br />

existing procedures for the foreseeable future. These issues call for a carefully managed<br />

<strong>and</strong> incremental introduction of CR technology over time.<br />

Summarizing, the extension of current spectrum management procedures<br />

requires that:<br />

• DSM is introduced in a step-wise fashion gradually increasing military users’<br />

experience with <strong>and</strong> underst<strong>and</strong>ing of CR technology <strong>and</strong> equipment,<br />

<strong>and</strong> where<br />

• DSM procedures co-exist with legacy equipment <strong>and</strong> current spectrum<br />

management procedures taking on a gradually increasing role as more CR<br />

technology is coming into service.<br />

Following these two principles, the introduction of CR <strong>and</strong> DSM in military<br />

tactical radio communication should be regarded as a evolution <strong>and</strong> not<br />

a revolution enabling a more flexible <strong>and</strong> efficient use of the spectrum in future<br />

military operations, <strong>and</strong> to ease the burden of the pre-mission frequency planning<br />

procedures.<br />

IV. A relastic roadmap for the introduction of dynamic<br />

spectrum management<br />

This section proposes a realistic DSM roadmap that identifies how cognitive<br />

radio technology may be introduced into the military communications<br />

domain in discrete steps although no specific timeframe is proposed. This DSM<br />

roadmap starts from the present day, with no cognitive radios, <strong>and</strong> with each increment<br />

takes a step further into the future with an increasing exposure to DSM<br />

in terms of number of devices, spectrum access complexity <strong>and</strong> freedom in operating<br />

spectrum. The DSM roadmap is designed such that military users may develop trust<br />

in <strong>and</strong> experience with the technology in an incremental fashion, <strong>and</strong> limit risk to<br />

existing operational capabilities.<br />

A. The first step – a dedicated b<strong>and</strong> for CR systems<br />

As mentioned previously, it is imperative that this first step involves minimal<br />

risk to existing legacy operations <strong>and</strong> allows military end-users the opportunity to<br />

build trust in <strong>and</strong> evaluate CR technology. We propose the introduction of a b<strong>and</strong><br />

exclusively dedicated to CRs within the military allocation. All cognitive devices<br />

would operate within this b<strong>and</strong> <strong>and</strong> all existing legacy systems would operate outside<br />

this dedicated b<strong>and</strong> that is governed by current spectrum management procedures.<br />

Initially, we would expect only a limited number of CRs within a coalition force <strong>and</strong><br />

the b<strong>and</strong>width requirement for this CR-only b<strong>and</strong> would be small in comparison<br />

to that required to support the legacy systems of the coalition.


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

141<br />

Civilian<br />

B<strong>and</strong>s<br />

<strong>Military</strong><br />

B<strong>and</strong>s<br />

Today's spectrum<br />

management procedures<br />

Step 1: A dedicated b<strong>and</strong><br />

for CR cystems<br />

Step 2: Opportunistic military<br />

use of limited civilian b<strong>and</strong>s<br />

Time<br />

<strong>Military</strong> b<strong>and</strong>s<br />

(legacy radio only)<br />

Civilian b<strong>and</strong>s<br />

(no military users)<br />

CR as secondary users<br />

(military b<strong>and</strong>s)<br />

Step 3: Coexistence of CR<br />

with military legacy systems<br />

in military b<strong>and</strong>s<br />

Step 4: Flexible use of military<br />

b<strong>and</strong>s <strong>and</strong> wide scale opportunistic<br />

use of civilian b<strong>and</strong>s<br />

Dedicated CRonly<br />

b<strong>and</strong><br />

CR as secondary users<br />

(civilian b<strong>and</strong>s)<br />

Mostly CR (military<br />

b<strong>and</strong>s, flexible use)<br />

1) General considerations<br />

Figure 2. DSM roadmap representation<br />

We propose that the CR-only b<strong>and</strong> would be managed under a managed<br />

commons DSA model 1 where all CR users would be considered equal <strong>and</strong> no<br />

traditional spectrum management procedures, such as channel assignment, would<br />

be required leading to a reduced pre-operation preparation time. Separate CRNs 2<br />

would be able to coexist within the same b<strong>and</strong> by autonomously <strong>and</strong> cooperatively<br />

or non-cooperatively selecting different operating channels within the b<strong>and</strong><br />

(i.e. channels with the least interference). In the managed commons model case,<br />

all CR users/networks share spectrum using an agreed management protocol<br />

that encapsulates technology agnostic spectrum access rules. This CR-only b<strong>and</strong><br />

may be utilized by military users at all levels of the military hierarchy. However,<br />

it may be best to initially target the technology at the lower priority echelons <strong>and</strong><br />

for particular applications (see below). If CRs demonstrate success at this lower<br />

level, they are more likely to gain acceptance <strong>and</strong> be more widely adopted across<br />

all layers of the military hierarchy.<br />

1<br />

2<br />

A DSA model is here used as classification of a high-level Dynamic Spectrum Access (DSA) technique following<br />

the terms introduced in [3]-[5].<br />

A CRN is a network where a number of cognitive radios interoperate.


142 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The choice of a dedicated b<strong>and</strong> for CR systems as a first step in the road-map<br />

has some important advantages.<br />

a) No risk for interference with legacy systems<br />

<strong>Military</strong> end-users are generally conservative <strong>and</strong> risk averse. The use of a cognitive<br />

system in a shared-use spectrum access mode that could degrade a legacy<br />

communication system would not be acceptable. The use of a dedicated b<strong>and</strong> for<br />

cognitive systems eliminates this risk.<br />

b) Relaxation of system requirements<br />

From a technical point of view, a dedicated b<strong>and</strong> based on the managed commons<br />

model will relax system requirements for CR systems. The primary reason for<br />

this statement is that the cognitive b<strong>and</strong> will lack primary users, placing less severe<br />

constraints on CR sensing <strong>and</strong> decision making functions to gather <strong>and</strong> process<br />

spectrum information to adapt its behavior. Cognitive systems would thus only<br />

need to address interference from other cognitive systems <strong>and</strong> jammers, which<br />

can be expected to be less time-critical compared to more challenging channel<br />

evacuation requirements.<br />

c) Familiarity<br />

The concept of a license free b<strong>and</strong> such as the current 2.4 GHz ISM b<strong>and</strong>,<br />

is not new for most military end-users <strong>and</strong> the introduction of a license free military<br />

b<strong>and</strong> for CR is likely to be regarded not as a revolution, but as a case where military<br />

procedures catch up to the less restrictive procedures used in the civilian world.<br />

d) Compatibility with current NATO spectrum management procedures<br />

In NATO, the civil/military spectrum Capability Panel 3 (CAP3) is responsible<br />

for the harmonization of radio frequency use among NATO allies. CAP3 is placed<br />

under the new C3B sub-structure (Consultation, Comm<strong>and</strong> <strong>and</strong> Control Board).<br />

The military part of the CAP3 panel manages the harmonized military spectrum<br />

by allocating b<strong>and</strong>s to applications or services, such as wide-b<strong>and</strong> l<strong>and</strong> systems or<br />

satellite broadcast services. As such, the proposed first step would be compatible<br />

with established administrative spectrum management procedures where CAP3<br />

would allocate one or multiple b<strong>and</strong>s exclusively for CR systems. However, NATO<br />

currently considers CR as a technology rather than as a service or application.<br />

CAP3 has therefore refrained from making the proposed allocation necessitating<br />

further negotiations <strong>and</strong> lobbying to overcome this hurdle.<br />

e) Incentives for research <strong>and</strong> development<br />

One of the main obstacles in the technological development of military CR<br />

is the deadlock created by the general lack of confidence in the technology. As long<br />

as there is no clear sign from the military end-user showing an interest in the tech-


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

143<br />

nology <strong>and</strong> thus establishing a potential market, the military communications<br />

industry will be hesitant to invest in the development of military CR systems. On<br />

the other h<strong>and</strong>, as long as there are no military off-the-shelf CR products, which<br />

can prove the concept <strong>and</strong> clearly demonstrate key CR benefits, the military enduser<br />

will remain skeptical towards the technology. The creation of a dedicated<br />

b<strong>and</strong> for CR systems can end this deadlock <strong>and</strong> be an incentive for the industry to<br />

start investing <strong>and</strong> developing products, comparable to what happened in the civil<br />

2.4 GHz ISM b<strong>and</strong>.<br />

f) Extensibility<br />

As mentioned previously, an important motivation for this first step is gaining<br />

trust. Once the concept of CR proves to work in this dedicated b<strong>and</strong>, the b<strong>and</strong><br />

can be easily extended <strong>and</strong> integrate more complex spectrum access models with<br />

civilian <strong>and</strong>/or military primary users.<br />

In summary, in light of the advantages described above, the introduction <strong>and</strong><br />

use of a dedicated b<strong>and</strong> for CR is by far the most appropriate first step in the roadmap<br />

towards the introduction of cognitive radio in the military. If this first step<br />

proves to be successful, the following steps can be implemented to overcome<br />

spectrum scarcity <strong>and</strong> alleviate current deployment burdens.<br />

2) Spectrum suitability, rules <strong>and</strong> limitations<br />

Spectrum is a scarce resource, both civilian <strong>and</strong> military, <strong>and</strong> the introduction<br />

of a CR-only b<strong>and</strong> will require sacrifices. In our opinion, the most<br />

suitable option is to define multiple smaller b<strong>and</strong>s within different spectrum<br />

regions <strong>and</strong> use them as dedicated CR-b<strong>and</strong>s. It is obvious that the NATOharmonized<br />

b<strong>and</strong>s are the most appropriate. From a technical point of view,<br />

<strong>and</strong> taking into account the possible applications, we think that at least a b<strong>and</strong><br />

of 5 to 10 MHz should be defined in the NATO harmonized UHF b<strong>and</strong> I<br />

(225-400 MHz). Other possible c<strong>and</strong>idate frequency b<strong>and</strong>s are the military UHF b<strong>and</strong> II<br />

(790-960 MHz), the military UHF b<strong>and</strong> III (1350-2690 MHz) <strong>and</strong> the SHF b<strong>and</strong><br />

(4400-5000 MHz), where cognitive systems for short range wireless networks<br />

could be envisaged.<br />

An in-depth study of the rules <strong>and</strong> limitations for the use of this dedicated<br />

b<strong>and</strong> for CR systems is out of the scope of the paper. We will therefore only comment<br />

on three aspects of such rules <strong>and</strong> limitations:<br />

• The types of applications that are allowed <strong>and</strong> are forbidden to use this<br />

b<strong>and</strong> together should be defined. Some example of systems that could be<br />

allowed are wideb<strong>and</strong> l<strong>and</strong> systems, line-of-sight microwave links <strong>and</strong> tactical<br />

wireless local area networks whereas pulsed systems like surveillance<br />

radars <strong>and</strong> broadcast stations are likely to be excluded.<br />

• The technical elements of a set of restrictions need to be studied <strong>and</strong><br />

st<strong>and</strong>ardized in a future STANAG. Some possible restrictions are the use


144 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

of a spectrum mask, a radiated power bound per application <strong>and</strong> the duty<br />

cycle of the systems.<br />

• The need for a pre-defined channelization in the dedicated b<strong>and</strong> should<br />

also be studied <strong>and</strong> if necessary the choice of the channel b<strong>and</strong>width.<br />

B. The second step – opportunistic military use of limited civilian b<strong>and</strong>s<br />

A long-term driving factor is the increasing pressure felt by governments <strong>and</strong><br />

regulatory authorities to reallocate spectrum traditionally reserved for military<br />

use to support civilian wireless services. In the event that spectrum allocated for<br />

military operations diminishes on this basis, allowing the military to operate in civilian<br />

b<strong>and</strong>s as non-interfering secondary users offers a way to increase the total<br />

military spectrum pool. 3<br />

In this second step, we propose to extend the military CR footprint by allowing<br />

military CR systems to operate as secondary users within limited civilian b<strong>and</strong>s<br />

(taking advantage of white spaces in time <strong>and</strong> space). The terrestrial television<br />

<strong>and</strong> radio UHF/VHF b<strong>and</strong>s are likely first c<strong>and</strong>idates due to the ideal propagation<br />

characteristics for tactical radio systems, the relatively stable channel availability<br />

<strong>and</strong> the maturity of the commercial IEEE 802.22 st<strong>and</strong>ard which may be leveraged<br />

for military implementations.<br />

Within these television <strong>and</strong> radio b<strong>and</strong>s, the military CR systems would operate<br />

on a non-interfering secondary user basis under a spectrum overlay model.<br />

<strong>Military</strong> CRNs may or may not cooperate with each other <strong>and</strong>/or with the primary<br />

civilian users regarding spectrum access. As noted in step 1, the necessary avoidance<br />

of primary user transmissions under the overlay model represents an additional complexity<br />

over <strong>and</strong> above operations under a managed commons model (as in step 1).<br />

From a military perspective, a significant advantage of this step in the DSM roadmap<br />

is that whilst the military users will have acquired more operating spectrum, no interference<br />

risk is introduced for existing military operations using legacy systems. 4<br />

<strong>Military</strong> CRs would be operating within both the dedicated CR-only b<strong>and</strong> (as peers)<br />

<strong>and</strong> within limited civilian b<strong>and</strong>s (as secondary users). All legacy systems would<br />

be operating in remaining military allocations as today. This isolation in frequency<br />

maintains the CR <strong>and</strong> legacy system coexistence assurance provided in step 1. This<br />

step also allows military users to evaluate the more complex overlay spectrum access<br />

technique with no additional risk to military legacy operations.<br />

3<br />

4<br />

Here it is assumed that the military agree to be subservient to civil users (i.e. act as secondary users). This<br />

may be the case in training or humanitarian relief operations. In more aggressive operations (such as Defense<br />

of National Territory), military forces are unlikely to operate under this premise. They will more likely secure<br />

spectrum on an exclusive-use basis either through negotiation with the host nation or by force.<br />

There may be an interference risk to civilian primary users. Of course, the level of acceptability of risk depends<br />

on the importance of civilian services being supported in the specific b<strong>and</strong> <strong>and</strong> the context of the military<br />

operation. The risk may be deemed acceptable for TV <strong>and</strong> broadcast radio b<strong>and</strong>s but not so for civilian<br />

air traffic control b<strong>and</strong>s.


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

145<br />

C. The third step – coexistence of CR with military legacy systems<br />

in military b<strong>and</strong>s<br />

In this third step we propose to build on the experience developed in the second<br />

step where military CRs were allowed to operate as secondary users within limited<br />

civilian b<strong>and</strong>s. We propose that military CR systems would also be allowed to coexist<br />

with legacy systems in limited military b<strong>and</strong>s. The legacy systems would be<br />

designated as primary users. The CRs would operate on a non-interfering secondary<br />

user basis. This will allow military CR systems to take advantage of white spaces<br />

in time <strong>and</strong> space left fallow by military legacy systems.<br />

The proposed third step differs from the previous two steps in the proposed<br />

DSM roadmap in that CRs would be allowed to coexist in the same spectrum<br />

as legacy systems <strong>and</strong> thus represents the first step where there is an increase in risk<br />

of interference by CRs to existing military operations. However, with the experience<br />

of the previous steps in the roadmap <strong>and</strong> only allowing a limited spectrum<br />

overlap (between military legacy <strong>and</strong> CR systems), this risk may be easily managed.<br />

D. The fourth step – flexible use of military b<strong>and</strong>s <strong>and</strong> wide scale<br />

opportunistic use of civil b<strong>and</strong>s 5<br />

The previous steps have identified how CR <strong>and</strong> DSM technology may be<br />

evaluated <strong>and</strong> implemented in an incremental process. A fundamental component<br />

of these steps is the coexistence with existing civilian <strong>and</strong> military legacy systems<br />

as described in steps 2 <strong>and</strong> 3, respectively. For this final step we assume that most<br />

military legacy systems have been retired from service <strong>and</strong> that cognitive radios are<br />

the norm (i.e. a far future setting). 6 We also assume that military acquisition agencies<br />

<strong>and</strong> end-users have accepted, <strong>and</strong> are comfortable with, the new technology.<br />

These assumptions enable the exciting possibility for a significantly more flexible<br />

<strong>and</strong> effective use of spectrum within the military domain.<br />

In this final step we propose that military spectrum will be managed under<br />

a highly flexible <strong>and</strong> dynamically variable combination of the uncontrolled commons,<br />

managed commons, dynamic exclusive-use <strong>and</strong> overlay DSA model types<br />

controlled using DSM policies. We also propose the continual <strong>and</strong> extensive use<br />

of civil spectrum b<strong>and</strong>s on a secondary use basis. A CRN will be provided DSM<br />

policies which identify where in spectrum it will be allowed to operate <strong>and</strong> the associated<br />

operating conditions, which it must adhere to. Such allocations may include<br />

multiple b<strong>and</strong>s each managed under a different DSA model type. The DSM strategy<br />

implemented by the CRN management system will autonomously determine<br />

5<br />

6<br />

The first three steps may not be accompanied by the proposed fourth step as it is entirely possible that<br />

the third step is sufficient to overcome challenges with spectrum scarcity <strong>and</strong> deployment difficulty.<br />

Some portions of the spectrum may always need to be reserved for fixed frequency operations (e.g. GPS <strong>and</strong><br />

some safety critical applications) <strong>and</strong> for any remaining legacy radios. However, this may still be managed<br />

under the new DSM paradigm with the exclusive-use DSA model type.


146 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

the most favorable operating location within the allowed spectrum given the local<br />

time-variable environmental conditions.<br />

CRNs operating within b<strong>and</strong>s designated under either of the commons types<br />

or the overlay model type (as secondary users) will not require complex traditional<br />

frequency planning <strong>and</strong> should realize more efficient <strong>and</strong> effective use of the spectrum.<br />

However, systems operating under these conditions will not benefit from<br />

the preferential (<strong>and</strong> often sole) spectrum access rights enjoyed under existing<br />

military processes, which may have a detrimental impact on existing levels of quality<br />

of service (QoS) that need to be managed by planning efforts as well as more dynamic<br />

cognitive monitoring <strong>and</strong> control loops to better reflect the needs of an ongoing<br />

operation. These future spectrum management procedures are clarified in the following<br />

section.<br />

V. Future dynamic spectrum management procedures<br />

in the military tactical domain<br />

The introduction of CR technology <strong>and</strong> DSM will involve the modification<br />

of existing military spectrum management practices. It is anticipated that these<br />

changes will simplify <strong>and</strong> shorten the spectrum planning activity required prior to<br />

an operation. This section addresses these procedural changes using the same three<br />

phases of operation as in the current procedure with an emphasis on the planning<br />

phase. 7<br />

A. The DSM planning phase<br />

In a CRN future, CRs <strong>and</strong> CRNs will not, in general, need to be assigned<br />

specific operating frequencies. CRs will instead be allowed to dynamically <strong>and</strong><br />

autonomously select the best available operating spectrum within specific b<strong>and</strong>s<br />

according to certain rules. This means that future DSM planning processes will<br />

change from current spectrum management procedures as described in the following<br />

starting with an overview followed by a detailed example.<br />

1) Overview of DSM planning considerations<br />

CRs will not, in general, be assigned specific operating frequencies which<br />

is fundamental difference from current spectrum planning that result in the compilation<br />

of the BSMP that includes the (static) frequency assignments for all radio <strong>and</strong><br />

network equipment. CRs will instead be allowed to dynamically <strong>and</strong> autonomously<br />

select the best available operating frequency channel within specific b<strong>and</strong>s accord-<br />

7<br />

In the proposed roadmap, CR systems <strong>and</strong> legacy radio systems may coexist. It is proposed that legacy radio<br />

systems will continue to be managed using the principles described in section 2 whereas future CR systems<br />

managed as described in this section. The overall management procedure will therefore be a blend between<br />

static <strong>and</strong> dynamic processes.


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

147<br />

ing to certain rules formalized by the DSM policies. 8 This means that the contents<br />

of the BSMP will fundamentally change in the future <strong>and</strong> include DSM polices<br />

rather than today’s mapping between all radio <strong>and</strong> network systems to frequencies.<br />

The EOB can also be expected to undergo changes making DSM policy generation,<br />

refinement <strong>and</strong> distribution the key activities to be undertaken during planning<br />

phase of future operations.<br />

A future DSM hierarchy would in the planning phase define <strong>and</strong> refine the DSM<br />

policies for the underlying CRNs in preparation for deployment. Each decision<br />

making entity in the hierarchy is expected to use a computer-based DSM policy<br />

generation <strong>and</strong> management tool for this purpose. The host nation administration<br />

will define the highest level DSM policies. These mainly specify the frequency<br />

allocations <strong>and</strong> conditions of their use, which may be used by the CR systems<br />

of the coalition force in the forthcoming operation. These DSM policies may be<br />

updated <strong>and</strong> refined by each lower layer in the SM hierarchy prior to being downloaded<br />

into the policy repositories in the individual CRN management. DSM policy<br />

refinements made by the individual NESMs <strong>and</strong> CSMs are reported back up the SM<br />

hierarchy to the CSMC. These feedback paths ensure that the CSMC is completely<br />

aware of how the spectrum will be utilized during the mission. The CSMC would<br />

here not be permitted to change the DSA model type of a b<strong>and</strong> unless the b<strong>and</strong><br />

has been allocated to it by the host nation on an exclusive-use basis. This is true<br />

for all decision making entities in the SM hierarchy, which must respect the DSA<br />

model decisions made by the hierarchical level immediately above it.<br />

The CSMC will update the DSM policies provided to it by the host nation to<br />

reflect the decisions made. Where host nation allocations are split into sub-b<strong>and</strong>s,<br />

the DSM policy associated with each sub-b<strong>and</strong> inherits the access conditions<br />

of the parent allocation, together with any additional or replacement conditions<br />

specified by the CSMC. The relevant DSM policies are then distributed to the CSMs.<br />

Note that the particular decisions made by the CSMC depend on the requirements<br />

of the individual national elements supplied to it by the NSMs.<br />

2) A DSM planning example<br />

As an example to illustrate the DSM planning phase, we consider a military<br />

operation involving two battle groups, BG A <strong>and</strong> BG B, from two different nations.<br />

The host nation administration provides the military force with two frequency<br />

b<strong>and</strong>s, one in the VHF b<strong>and</strong> from 47-50 MHz <strong>and</strong> one in the UHF I b<strong>and</strong> from<br />

318-328 MHz, both on an exclusive use basis. The administration also allows the military<br />

force to make use of the civilian terrestrial television b<strong>and</strong> (470-830 MHz) on<br />

a secondary use basis. Figure 3 illustrates the allocations defined by the spectrum<br />

management hierarchy (line 1).<br />

8<br />

DSM policies are here used as a mechanism to guide, control <strong>and</strong> bound the autonomous behavior of CRs.


148 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The CSMC decides how the host nation allocation should be used by the military<br />

force on a high level (line 2 in Figure 3). Whilst the focus here is for the BG A operation,<br />

the CSMC must also consider the spectrum needs for BG B, that is operating<br />

in another region of the same area of responsibility.<br />

47<br />

MHz<br />

VHF<br />

50<br />

MHz<br />

318<br />

MHz<br />

UHF I<br />

328<br />

MHz<br />

470<br />

MHz<br />

UHF II<br />

830<br />

MHz<br />

1<br />

Host Nation<br />

<strong>Military</strong> Use<br />

<strong>Military</strong> Use<br />

Terrestrial TV<br />

2<br />

CSMC<br />

Terrestrial TV<br />

3<br />

NESM A<br />

Terrestrial TV<br />

Company Waveforms<br />

Coalition Waveform<br />

B<strong>and</strong> Allocation Key<br />

Dynamic<br />

Exclusive Use<br />

Civil Overlay<br />

(<strong>Military</strong> as SU)<br />

Uncontrolled<br />

Commons<br />

<strong>Military</strong> Overlay<br />

(PU)<br />

<strong>Military</strong> Overlay<br />

(SU)<br />

Figure 3. Spectrum plan as output from DSM planning processes at different levels in the spectrum<br />

management hierarchy. Primary <strong>and</strong> secondary users are designated as PU <strong>and</strong> SU, respectively<br />

The CSMC assigns primary status to NESM A for BG A communications<br />

for the 48-49 MHz <strong>and</strong> 318-320.5 MHz b<strong>and</strong>s. These preferential assignments are<br />

intended for the higher priority waveforms associated with BG A. The CSMC also<br />

assigns primary status to NESM B for BG B communications for the 49-50 MHz<br />

<strong>and</strong> 320.5-323 MHz b<strong>and</strong>s. We assume that a coalition waveform is used for communication<br />

between elements in the two battle groups does not support DSM<br />

<strong>and</strong> is assigned exclusive-use access for the 47-48 MHz b<strong>and</strong>. The CSMC assigns<br />

the 323-328 MHz VHF b<strong>and</strong> as uncontrolled commons spectrum to be shared by<br />

all BG A <strong>and</strong> BG B cognitive systems (intended for squad or platoon level waveforms).<br />

The terrestrial television b<strong>and</strong> is assigned to be used equally by all systems<br />

in the military force on a secondary basis.<br />

Line 3 in Figure 3 illustrates the planning decisions made by NESM A as the next<br />

level below the CSMC in the SM hierarchy (the decisions made by NESM B are<br />

not shown as they are of no further interest in this example). NESM A decides that<br />

it has three different company waveforms that are high priority <strong>and</strong> are thus given<br />

primary status in separate b<strong>and</strong>s as shown. Underlying squad <strong>and</strong> platoon level<br />

waveforms are not provided dedicated allocations – they are required to find their<br />

own operating spectrum.<br />

B. The DSM deployment phase<br />

At the beginning of the deployment phase, all CRs should have downloaded<br />

the appropriate DSM policies <strong>and</strong> be able to initiate communication activities<br />

within their possible allocations, under the specific conditions defined in the planning<br />

process. During deployment all CRNs will regularly send performance <strong>and</strong>


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

149<br />

spectrum status reports back up to the relevant NESM provided resources are allocated<br />

for this purpose. The NESMs will send aggregate status reports to the relevant<br />

CSM, status reports that are further aggregated to the CSMC. These status reports<br />

allow spectrum managers at all levels of the SM hierarchy to continuously evaluate<br />

spectrum usage <strong>and</strong> network performance within their allocations throughout<br />

an operation. Spectrum managers at all levels will have the ability to update <strong>and</strong><br />

disseminate DSM policies at any time to ensure the coalition force communication<br />

needs are continuously met.<br />

Each CRN will be responsible for dynamically <strong>and</strong> autonomously selecting<br />

the best available operating frequency within its specific allocations defined by<br />

the active DSM policies <strong>and</strong> be transparent to the end-user. With this capability,<br />

many interference issues may be h<strong>and</strong>led directly by the CRNs themselves through<br />

the execution of the selected DSM strategy <strong>and</strong> spectrum mobility, with no involvement<br />

of any spectrum management personnel. Each NESM, in conjunction with<br />

a network manager, will be responsible for monitoring the status reports provided<br />

by their CRN management systems. During deployment, an NESM may make act<br />

to optimize the performance of the underlying CRNs by updating the active DSM<br />

policies associated with any allocations provided to it on an exclusive-use basis<br />

by the relevant CSM.<br />

C. The DSM recovery phase<br />

During the recovery phase, spectrum managers at all levels of the SM hierarchy<br />

will be responsible for reporting to their immediate superior manager that their<br />

units no longer require their spectrum allocations. The associated DSM polices<br />

may be modified to better reflect the needs of the remainder of the coalition force.<br />

The CSMC will be responsible for consolidating the master DSM policy database<br />

such that it may be used by an incoming / replacement force.<br />

VI. Conclusions<br />

<strong>Military</strong> DSM is <strong>and</strong> requires a fundamental shift in capability <strong>and</strong> spectrum<br />

management procedures. This paper has attempted to clarify the need for an incremental<br />

approach for implementing DSM into the military domain. We have outlined<br />

a DSM roadmap for this purpose. Through this roadmap we have described how<br />

novel CR technology with non-cognitive legacy radio systems can co-exist over<br />

the transitionary period towards an all CR future. This roadmap has also addressed<br />

how military users may develop trust in, <strong>and</strong> experience with, this novel technology<br />

in manageable steps. The first step in this DSM roadmap involves the introduction<br />

of a military b<strong>and</strong> dedicated for CRs. It has been proposed that this b<strong>and</strong> is managed<br />

under the managed commons models using multiple smaller b<strong>and</strong>s within different<br />

NATO-harmonized spectrum regions.


150 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

We have also presented a high-level vision of how existing military spectrum<br />

management procedures will change in the future with the introduction of DSM<br />

using ACP 190(C) as a baseline reference. With the application of secondary use<br />

<strong>and</strong> uncontrolled use of spectrum, we foresee a significant reduction in the workload<br />

of spectrum management personnel. We have focused on both the important<br />

planning <strong>and</strong> deployment phases of military operations. The decisions made by<br />

the spectrum management entities, both before <strong>and</strong> during an operation, will<br />

principally revolve around dynamically creating, updating, activating, deactivating<br />

<strong>and</strong> deleting DSM policies.<br />

References<br />

[1] XG Working Group, The XG Vision Request for Comments, v. 2.0, available through<br />

http://www.ir.bbn.com/~ramanath/pdf/rfc_vision.pdf<br />

[2] Combined <strong>Communications</strong> <strong>and</strong> Electronics Board, Guide to Spectrum Management<br />

in <strong>Military</strong> Operations, ACP 190(C), september 2007, available through http://jcs.<br />

dtic.mil/j6/cceb/acps/acp190/ACP190C.pdf<br />

[3] M. Buddhikot, “Dynamic spectrum access: models, taxonomy <strong>and</strong> challenges”, IEEE<br />

International Symposium on New Frontiers in Dynamic Spectrum Access Networks,<br />

2007, pp. 649-663.<br />

[4] Q. Zhao, A. Swami, “A survey of dynamic spectrum access: signal processing <strong>and</strong><br />

networking perspectives”, Proceedings from the IEEE International Conference on<br />

Acoustics, Speech <strong>and</strong> Signal Processing, 2007, pp. 1349-1352.<br />

[5] Q. Zhao, B.M. Sadler, “A survey of dynamic spectrum access: signal processing,<br />

networking <strong>and</strong> regulatory policy”, IEEE Signal Processing Magazine, vol. 24, May 2007,<br />

pp. 79-89.


Dynamic Spectrum Management<br />

in Legacy <strong>Military</strong> Communication Systems<br />

Marek Suchański 1 , Paweł Kaniewski 1 , Robert Matyszkiel 1 ,<br />

Piotr Gajewski 2<br />

1 <strong>Military</strong> Communication Institute, Zegrze, Pol<strong>and</strong>,<br />

{m.suchanski, p.kaniewski, r.matyszkiel}@wil.waw.pl<br />

2 <strong>Military</strong> University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong><br />

piotr.gajewski@wat.edu.pl<br />

Abstract: Increasing dem<strong>and</strong>s are being placed on dynamic spectrum access as a result of overload<br />

of the frequency spectrum. In this paper we present a concept of frequency broker as a crucial element<br />

of coordinated spectrum management system for battlefield communication network.<br />

Critical problem in such system is automation of the collision-free frequency planning <strong>and</strong> management.<br />

In this paper, the solution of this problem basing on the graph theory is described. The new<br />

model of electromagnetic waves attenuation prediction is also presented.<br />

Keywords: dynamic spectrum management, frequency broker, radio wave attenuation, frequency<br />

assignment, frequency planning<br />

I. Introduction<br />

The rapid development of the technical systems that use wireless technologies<br />

causes increasing of the spectrum shortage problem. The devices that are “dependent”<br />

on the spectrum appear – apart from the classic uses such as e.g. radio broadcasting<br />

– also as more <strong>and</strong> more complex systems such as the cellular telephony, WLAN<br />

802.11, 802.16 (WiMAX) wireless networks, the GPS systems as well as simple<br />

radio-devices e.g. wireless telephones <strong>and</strong> devices for home RTV equipment control,<br />

garage gates control etc. The saturation of such type of devices grows causing overload<br />

of the frequency spectrum <strong>and</strong> thus increase of the level of interference. An illustration<br />

of this phenomenon can be a forecast of use of the spectrum fragment intended for<br />

broadb<strong>and</strong> mobile systems that has been constructed by the USA national regulator<br />

(FCC – Federal Communication Commission) that foresees occurrence of significant<br />

spectrum deficiency for these systems already in 2014 year (see Figure 1) [1].<br />

The work is supported by Polish Ministry of Science <strong>and</strong> Higher Education funds under the project<br />

No. OR 00018712.


152 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The spectrum static management <strong>and</strong> methods that have been used so far,<br />

lead to drastically low effectiveness of spectrum usage. It was proved in many<br />

measurements that were made in various parts of the world [2]. It was found, on<br />

the basis of such experiments, that within the frequency below 3 GHz, an average<br />

level of the spectrum use does not exceed 10% [3].<br />

Such observations <strong>and</strong> experiments have caused growing of common awareness<br />

of a need of the spectrum use rationalization, among others, by application<br />

of more efficient management methods.<br />

Figure 1. Forecast of increasing use of spectrum intended for broadb<strong>and</strong> mobile systems<br />

That is why at the end of XX century appeared a concept of a dynamic access<br />

to the spectrum. The most advanced form of which is so called opportunistic access.<br />

This concept will find its embodiment in future solutions of the cognitive radio.<br />

A spectrum coordinated management system can be used to rationalize<br />

the spectrum efficiency of the communication systems that are built on the basis<br />

of currently operated radio equipment. In some cases to solve this problem, it is<br />

possible to use the frequency broker that operates in a quasi-real time. Such a possibility<br />

exists in the communication systems that are based on radio stations susceptible<br />

to radio data remote control. In polish army, VHF radio stations of the family<br />

of PR4G <strong>and</strong> HF type Harris RF-5800H have such possibilities.<br />

This article describes a concept of the spectrum coordinated management<br />

system in which the critical problem is to find an effective algorithm to provide<br />

<strong>and</strong> to modify the collision-free frequency plans. The presented below algorithm<br />

is based on the graph theory using a specific models to predict an electromagnetic<br />

waves attenuation of the path between a transmitter <strong>and</strong> a receiver.<br />

II. Frequency broker concept<br />

The main element of the spectrum coordinated management system is the frequency<br />

broker. The tasks of the frequency broker are generation <strong>and</strong> distribution


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

153<br />

of radio data for radio networks that are covered by such broker <strong>and</strong> that ensure<br />

a collision-free operation.<br />

To correctly generate the radio data that ensures a collision-free operation<br />

of the radio networks, the frequency broker must obtain the data that defines a set<br />

of accessible frequencies. Under Polish conditions the unit responsible for the frequency<br />

management in armed forces is the <strong>Military</strong> Office of Frequency Management<br />

– NARFA PL. To define the organizational structure of the radio communication<br />

system, the frequency broker should cooperate with automated comm<strong>and</strong><br />

systems from which it receives information about location <strong>and</strong> type of all radio<br />

equipment that is grouped in the radio network. Additionally, to currently verify<br />

the received frequency set, a close cooperation with the electronic warfare systems<br />

is recommended. Such cooperation enables an assessment of the electromagnetic<br />

environment real state in defined nodes of the radio communication system.<br />

Figure 2 shows a concept of the frequency broker usage that takes into account<br />

a hierarchic comm<strong>and</strong> system from an operational level to a subunit level.<br />

Figure 2. Concept of broker use in military forces<br />

Starting from the tactical level, the frequency broker is connected with the comm<strong>and</strong><br />

system section that is responsible for the communication (G6, J6). It exchanges<br />

data to execute frequency assessment procedures. The radio data from the broker<br />

is sent to a properly level of the radio networks that confirm their acceptance or<br />

generate dem<strong>and</strong> for spectrum resources in a reverse channel. The intermediate<br />

level broker is connected with a higher or lower level broker to distribute data<br />

about allocations of the spectrum resources to a lower level <strong>and</strong> data collection<br />

about electromagnetic situation in the area of the lower level broker responsibility.


154 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 3 shows a system diagram that takes into account structural connections<br />

between the NAFRA PL <strong>and</strong> local brokers <strong>and</strong> a block diagram of the frequency<br />

broker that illustrates its modular structure.<br />

The basic broker element is a planning module that enables generation of radio<br />

data on the basis of jamming measures <strong>and</strong> criteria defined earlier. The accepted<br />

measures <strong>and</strong> criteria of the jamming result directly from the radio equipment type<br />

that is used in the radio communication system. For correct assessment of a interfering<br />

signal <strong>and</strong> the level of a usable signal it is necessary to use reliable waves<br />

attenuation models <strong>and</strong> hence in the further part of the article is presented a radio<br />

waves attenuation model in an urban area (GUPL) complete with test results that<br />

verify this model.<br />

Figure 3. Broker architecture <strong>and</strong> its functional connections<br />

The collision-free radio plans is generated by broker taking into account a reliable<br />

waves attenuation model <strong>and</strong> some earlier defined data such as: a set of accessible<br />

frequencies, a structure of radio communication system, jamming measures<br />

<strong>and</strong> criteria, radio stations operating mode <strong>and</strong> parameters. To solve this problem<br />

an optimization method is used. An example of the greedy algorithm used in our<br />

broker is presented below.<br />

III. Concept of frequency planning<br />

The problem of frequency assignment, even in a simplest model is a NP-hard<br />

problem (it is a generalized problem of a graph colouring) <strong>and</strong> that is why a working<br />

out of a polynomial algorithm that finds an optimal solution is impossible at the present<br />

state of knowledge. The best known algorithms that bring optimal solutions<br />

of the NP-hard problems work in an exponential time what means that in practice<br />

they are suitably only to solve not too complex cases of very limited input data [5].


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

155<br />

The data sizes in practical use exceed considerably the ones suitable for solution<br />

in an exponential time <strong>and</strong> therefore the worked out algorithms should find<br />

a possibly best solution in the time assumed in advance what means a necessity<br />

of selection of one of suboptimal methods used in NP-hard problem solutions. Hence<br />

for the considered applications, the following types of algorithms can be helpful:<br />

• approximation <strong>and</strong> heuristic algorithms (e.g. a greedy algorithm);<br />

• branch & cut type algorithms that reduce the exponential complexity of indepth<br />

searching by suitably early elimination of ineffective searching paths;<br />

• artificial intelligence algorithms: genetic algorithms, ant colony algorithms,<br />

tabu search, simulated annealing.<br />

It seems that the simple <strong>and</strong> small time-consuming method to solve frequency<br />

assignment question is the greedy algorithm. The greedy algorithm executes always<br />

operation that is the most advantageous operation at a given moment. Thus, it selects<br />

a locally optimal solution expecting that it leads to a globally optimal solution.<br />

A separation matrix is an input element for the frequency assignment algorithm.<br />

The separation matrix elements determine a smallest possible distance expressed<br />

in the frequency field that ensures a collision-free operation of two radio networks.<br />

For co-site locations (the distance between two correspondents of two different<br />

radio networks is within 1,5-10 m), the radio station producers define<br />

separation as the percentages that determine the distance between the upper frequency<br />

of the lower b<strong>and</strong> <strong>and</strong> the lower frequency of the upper b<strong>and</strong> that ensures<br />

the networks compatibility.<br />

The formalized expression of such a state when two radio networks operating<br />

in the subb<strong>and</strong>s F min1 – F max1 <strong>and</strong> F min2 – F max2 (F min2 > F max1 ) do not interfere<br />

themselves has the form:<br />

B* F F F<br />

<br />

min 2 min 2 max1<br />

Where “B” is a coefficient of a co-site separation <strong>and</strong> in case of the above<br />

mentioned radio station of the PR4G family is 0,09.<br />

To determine the separation coefficients for other networks that are not cosite<br />

networks, it is assumed that the usable signal “S” reduced by the protection<br />

coefficient “O” must be greater than the interfering signal “Z”.<br />

SZO<br />

On the basis of literature <strong>and</strong> experimental tests the separation of 10 dB<br />

has been assumed.<br />

After correct construction of the separation matrix it is possible to approach<br />

frequency assignment for the defined radio networks. The input data for such<br />

an algorithm is:<br />

• a set of accessible frequencies for use in the frequency assignment process;<br />

• defined networks complete with the type of used radio stations (an operation<br />

frequency range, a transmitter power, a receiver selectivity characteristics);


156 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

• defined criteria of the co-site separation;<br />

• operation modes for particular radio networks (a FH frequency hopping<br />

mode, an operation mode at the DFF fixed frequency);<br />

• a defined protective coefficient;<br />

• a separation matrix;<br />

Moreover, if a given radio network is operating using of the FH mode, the minimum<br />

<strong>and</strong> maximum number of frequency subb<strong>and</strong>s should be defined for a given<br />

radio network as well as hops in the defined frequency subb<strong>and</strong>.<br />

Figure 4. Algorithm frequency assignment used in frequency broker<br />

Figure 4 presents a functional diagram of the frequencies assignment algorithm<br />

that uses the greedy algorithm. The defined structure of the radio communication<br />

system can be treated as a full graph in which the nodes are the vertexes<br />

whereas the graph edges are determined on the basis of the values contained<br />

in a separation matrix. The task of the algorithm of the frequency assignment<br />

is to solve the travelling salesman problem, it means finding the Hamilton path<br />

of minimum weights sum. The algorithm sums all edge weights in every node <strong>and</strong><br />

sorts the nodes depending on the obtained sum of the edge weights. In the first


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

157<br />

step, a frequency is assigned to the node of the highest sum of the edge weights that<br />

is treated as the graph starting node. Searching of next “unvisited” graph vertexes<br />

is done by selection of a lowest weight edge.<br />

After all vertexes are visited the total sum of the edge weights of the visited<br />

vertexes is saved.<br />

In the described algorithm every node is the starting node from which searching<br />

the Hamilton path is started.<br />

The result of the algorithm operation is a path of the edge weights smallest<br />

sum of the visited vertexes.<br />

In every case it is checked if the number of used frequencies does not exceed<br />

the set of the accessible frequencies. In a special case, when the algorithm can not<br />

determine any path that meets the above mentioned criterion, the assignment<br />

of radio frequencies is not possible.<br />

After the solution is selected that is the best solution (it requires the smallest<br />

number of accessible frequencies to allocate them to defined radio networks), there<br />

is carried out a selection of the radio frequencies that exist in the set of accessible<br />

frequencies <strong>and</strong> that are not used <strong>and</strong> a trial to assign successive frequency subb<strong>and</strong>s<br />

to co-site networks.<br />

IV. Prediction of electromagnetic waves attenuation<br />

To determine an usable signal level <strong>and</strong> an interfering signal level, waves<br />

attenuation prediction models are used in the planning module. A detailed<br />

analysis of such models leads to the conclusion that there is lack of suitable models<br />

that serve for prediction of radio waves attenuation in urban environments<br />

in which more <strong>and</strong> more military operations are carried out for the frequencies<br />

within 30-88 MHz <strong>and</strong> 225-400 MHz most often used by army <strong>and</strong> for the geometry<br />

of the systems that are characterized by low antennas hanging above ground<br />

(1-3 m) (see Table I). [1]<br />

Among the items specified in the Table I, the first three items (Okumura,<br />

Hata, COTS 231) are the most popular empiric models in the engineering practice<br />

that are used for prediction of waves attenuation in urban environments. Unfortunately,<br />

these models are useful only for highly hanged antennas because they are<br />

constructed for designing of conventional cellular systems in which the base station<br />

antennas are mounted at high altitudes. Other items presented in the Table 1 show<br />

the analysis results for frequencies other than for above mentioned Okumura, Hata<br />

<strong>and</strong> COST 231 models, even when they refer to parts of the military frequency<br />

ranges also always regards the situation when one of antennas is mounted at high<br />

altitude. A confirmation of such an observation are also results of the problem<br />

thorough analysis included in [2]. Wishing to fill the existing gap, the authors<br />

of this publication proposed an adaptation of the model given by Rappaport [3]<br />

that was constructed for the frequencies of 900 <strong>and</strong> 1800 MHz. Thus, they made


158 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

a linear extrapolation of the model coefficients <strong>and</strong> carried out its initial experimental<br />

verification. According to that model called the General Urban Path Loss (GUPL)<br />

the attenuation of waves for the frequency range of 30-88 MHz that propagate<br />

in an urban environment is expressed by the following formula:<br />

d<br />

L[ dB] 10lg( ) 10nlg( ) d FAF<br />

d<br />

d<br />

4<br />

o o<br />

Where:<br />

<br />

d o – reference distance in a close zone (m) d o<br />

(when the antenna<br />

2 <br />

largest dimension < λ, do @ 30 meters);<br />

λ – wave length (m);<br />

d – distance between transmitter <strong>and</strong> receiver (m);<br />

β – power component which indicates that received power decays with distance<br />

at a rate of 10β dB/decade;<br />

n – path loss exponent;<br />

α – attenuation constant (dB/m);<br />

FAF – floors attenuation coefficient (dB)<br />

Author<br />

Frequency<br />

(MHz)<br />

Table I<br />

Distance<br />

(km)<br />

HT<br />

(m)<br />

Y. Okumura 15-1920 1-100 30-1000<br />

HR<br />

(m)<br />

M. Hata 150-1500 ≥ 1 30-200 1-10<br />

COST 231 800-2000 0.02-5 4-50 1-3<br />

H. Xia 900, 1900 0.001-2 3.2, 8.7, 13.4 1.6<br />

V. Erceg 1956 0.01-0.5 3.3, 6.6 1.5<br />

D. Har 900, 1900 0.06-2 3.2, 8.7, 13.4 1.6<br />

A. Kanatas 1890 0.02-0.18 4 1.7<br />

H. Masui 3350, 8450, 15750 0.02-0.5 4 2.7<br />

Y. Oda 457-15450 ≥ 20<br />

T. Rao 200, 400, 450 0.5-10.5 ≥ 20 3<br />

N. Blaunstein 902-928 7 2-3<br />

W. Young 150, 450, 800, 3700 0.108-16.3 138 2<br />

In Table II are presented values of β, n <strong>and</strong> α coefficients for the following<br />

scenarios:<br />

Scenario 1: outdoor RF propagation in an urban canyon;<br />

Scenario 2: indoor propagation (same building, same/multiple floor(s));<br />

Scenario 3: indoor-to-indoor propagation (between two different buildings, same/<br />

multiple floor(s));<br />

(1)


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

159<br />

Scenario 4: indoor-to-outdoor propagation;<br />

Scenario 5: outdoor-in-indoor propagation.<br />

Scenario<br />

Power component<br />

β<br />

Table II<br />

Path loss<br />

exponent<br />

n<br />

Attenuation<br />

constant<br />

α (dB/m)<br />

1 2,2 1,8 0,06<br />

2 2,63 1,5 0,65<br />

3<br />

5 (if number of penetrated floors = 0),<br />

4 (if number of penetrated floors > 0)<br />

2 0,65<br />

4 3,6 4 0<br />

5 3,6 4 0<br />

The analysis of the GUPL model carried out by us shown a necessity of making<br />

corrects of FAF values given in [2] – in particular for higher than 4 number<br />

of floors. That is why experiments were carried out. The results of these experiments<br />

are discussed in [4] <strong>and</strong> the obtained corrected values of the FAF coefficient are<br />

presented in the Table III <strong>and</strong> Table IV.<br />

Table III<br />

Recommended FAF<br />

Number of floors 30 MHz 49 MHz 87,5 MHz<br />

1 1,9 3,44 1,76<br />

2 5,85 7,67 5,5<br />

3 9,1 15,7 10,26<br />

4 15,46 18,75 14,15<br />

5 21,25 25,15 19,8<br />

Table IV<br />

Recommended FAF<br />

Number of floors 230 MHz 320 MHz<br />

1 6,4 7,95<br />

2 11,8 10,75<br />

3 14,5 15<br />

4 21,9 18,15<br />

5 26,6 20,1<br />

These experiments enabled at the same time verify positively the GUPL model<br />

usability for signal attenuation prediction in urban areas – both inside buildings<br />

<strong>and</strong> in street “canyons”.


160 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

V. Summary<br />

The problems related to the frequency assignment were subject to wide analyses<br />

as regards use in the cellular telephony network planning. However, the results<br />

of these analyses are not useful for the frequency assignment in military radio<br />

networks what results from a different specificity of these systems.<br />

In commercial systems, the aim of frequency assignment is to minimize<br />

the number of used frequencies, what is motivated by the concession costs. In the battlefield<br />

radio networks it is desired to use maximum number of frequencies, what<br />

is motivated by the system resistance to intentional interference.<br />

In the presented article a way of solution of the problem of frequency assignment<br />

to radio networks has been discussed using the greedy algorithm. The greedy algorithm<br />

selects locally optimal solution assuming that such a strategy will lead to a globally<br />

optimal solution. It should be noted that it is one of possible solutions of the travelling<br />

salesman problem. Another way of optimal frequency assignment is use of the SAT<br />

solvers. The SAT-solver is a program that for a given formula written in a form CNF<br />

(Conjunction Normal Form) finds if there exists such a sentence variables substitution<br />

for which the formula is true. If such a substitution exists the program returns<br />

it as a result. At the moment, in the <strong>Military</strong> Communication Institute is conducted<br />

work on use of the SAT solvers in the frequency assignment.<br />

References<br />

[1] http://blogs.uco.edu/graduate/files/2012/02/chart_wireless_data_2.gif<br />

[2] J. Andrusenko, R.J. Miller, J.A. Abrahamson, N.M. Merheb Emanuelli, R.S.<br />

Pattay <strong>and</strong> R.M. Shuford, “VHF General Urban Path Loss Model for Short Range<br />

Ground-to-Ground <strong>Communications</strong>” IEEE Transaction on Antennas <strong>and</strong> Propagation,<br />

vol. 56, No. 10, 2008.<br />

[3] T.S. Rappaport, Wireless Communication: Principle <strong>and</strong> Practice, Upper Saddle<br />

River, NJ: Prentice Hall PTR, 2002 (second edition).<br />

[4] P. Gajewski, M. Suchański, P. Kaniewski, R. Matyszkiel, „Prediction of VHF <strong>and</strong><br />

UHF Wave Attenuation In Urban Environment” 19th International Conference on<br />

Microwave,Radar <strong>and</strong> Wireless <strong>Communications</strong> MIKON-2012, May 21-23.<br />

[5] T.C. Cormen, C.E. Leiserson, R. Rivest, “Introduction to Algorithms”, Massachusets<br />

Institute of <strong>Technology</strong>, Thirteenth priinting, 1994.


Spectrum Issues of NATO Narrowb<strong>and</strong> Waveform<br />

Jan Leduc 1 , Markus Antweiler 1 , Torleiv Maseng 2<br />

1 Fraunhofer Institute for Communication, <strong>Information</strong> Processing <strong>and</strong> Ergonomics FKIE,<br />

Wachtberg, Germany, jan.leduc@fkie.fraunhofer.de<br />

2 Forsvarets Forskningsinstitutt FFI, Kjeller, Norway, Torleiv.Maseng@ffi.no<br />

Abstract: In order to fulfill most of the military operational requirements, two kinds of waveforms<br />

are needed, a wideb<strong>and</strong> networking waveform, e.g. the Coalition Wideb<strong>and</strong> Networking<br />

waveform (COALWNW) with high data rates, enabling network centric warfare <strong>and</strong> a Narrow<br />

B<strong>and</strong> Waveform (NBWF) covering long ranges <strong>and</strong> enabling the parallel transmission of data <strong>and</strong><br />

voice. As a complement to COALWNW, the NATO Line of Sight <strong>Communications</strong> Capability<br />

Team is developing a new NBWF. Legacy versions of the NBWF exist as national waveforms only,<br />

operating historically in the VHF tactical communications b<strong>and</strong> ranging from 30 MHz to 88 MHz<br />

occupying a channel b<strong>and</strong>width of 25 kHz. The new NBWF is expected to operate in the same<br />

frequency range, employing the same channelization; furthermore, the NBWF should allow operation<br />

in the tactical UHF b<strong>and</strong> as well. The current waveform proposal is based on Continuous<br />

Phase Modulation (CPM), which is widely used in mobile communications, due to the constant<br />

envelope property of the modulation scheme.<br />

In this paper, we first introduce principles of the newly defined NBWF. Furthermore, we want to<br />

point out some unapparent spectrum usage issues of the current proposal.<br />

Keywords: Narrowb<strong>and</strong> Waveform; B<strong>and</strong>width; Continuous Phase Modulation; Spectral Efficiency<br />

I. Introduction<br />

In the NATO Technical Note 1246 [1], it was identified that two types of waveforms<br />

are needed to fulfill all operational requirements. The first kind of waveform<br />

is a wideb<strong>and</strong> networking waveform enabling high data rates for advanced network<br />

enabled capabilities. This kind of waveform is addressed in the COALWNW project<br />

in order to achieve interoperability. The second kind of waveform, a narrow<br />

b<strong>and</strong> waveform, enabling long range transmission employing the VHF 25 kHz<br />

channelization is currently defined at NATO within the NATO Line of Sight <strong>Communications</strong><br />

Capability Team. The focus of this paper is on the NBWF. The NBWF<br />

will be mainly used in Combat Net Radios (CNR) for interoperability on the lower<br />

comm<strong>and</strong> levels. Currently there is no secure <strong>and</strong> networking capable CNR<br />

This research project was performed under contract with the Federal Office of the Bundeswehr for <strong>Information</strong><br />

Management <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>, Germany.


162 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

waveform available as a NATO St<strong>and</strong>ard, since legacy versions of the NBWF are<br />

available as national waveforms only.<br />

There exist several solutions for the NBWF at present, but the one described<br />

in [2] is a CPM employing a scheme with joint iterative demodulation <strong>and</strong> decoding<br />

of convolutional codes. We appreciate, that the lead development was done<br />

at the <strong>Communications</strong> Research Centre (CRC), Canada [3], [4].<br />

The waveform is described by a variety of modes for a 25 kHz channelization.<br />

These modes are mainly distinguished by the provided data rates. The three lower<br />

rate modes, namely NR (R refers to robust), N1 <strong>and</strong> N2, offering 10 kbps, 20 kbps<br />

<strong>and</strong> 31.5 kbps respectively, can be considered as long range modes, while the modes<br />

N3 <strong>and</strong> N4, offering 64 kbps <strong>and</strong> 96 kbps respectively can be considered as high<br />

throughput modes. It is worth to mention that this CPM-waveform uses a very interesting<br />

approach to realize higher data rates, which will be described subsequently.<br />

There are two possibilities for increasing the data rate. The first one is to increase<br />

the amount of information within one symbol duration by transmitting e.g. 2 Bit/<br />

Symbol instead of 1 Bit/Symbol, which is the common way of increasing the data<br />

rate. The CPM waveform follows another, the second possible approach. While keeping<br />

the amount of information constant during one symbol duration, the symbol<br />

duration itself gets reduced, thus the symbol rate increases. When the symbol rate<br />

increases, it is known that the b<strong>and</strong>width occupation of the system increases as well,<br />

which is not desired, since the use of a 25 kHz channel is a m<strong>and</strong>atory requirement<br />

(Requirement 2.07.03, 2.07.04 <strong>and</strong> 2.07.08 in [5]). Thus, the maximum phase<br />

change within a symbol, h the modulation index, needs to be reduced to compensate<br />

the spectral growth. This technique is very ambitiously applied in the modes N3<br />

<strong>and</strong> N4, because the modulation indices become very small.<br />

In this paper, the modulation parameters of this particular waveform are<br />

investigated to see, whether the chosen approach for generating higher data rates<br />

is appropriate for CNR NBWF or not.<br />

The paper is organized as follows: In Section II, we give some more insights<br />

on the physical layer of the CPM NBWF as defined in [2]. In Section III, we describe<br />

the simulation environment. Simulations results are presented in Section IV.<br />

In Section V, the results <strong>and</strong> possible consequences are summarized.<br />

II. CPM NBWF<br />

CPM is a digital phase modulation of the same family as the Continuous-Phase<br />

Frequency-Shift Keying (CPFSK) used in many legacy VHF tactical <strong>and</strong> civilian<br />

waveforms. The most significant properties are, a constant envelope in the timedomain<br />

signal, a fundamental robustness to amplitude modulation distortion <strong>and</strong><br />

an efficient utilization of power in the transmit amplifiers since the power amplifier<br />

can work in saturation. A complete overview of CPM can be found in [7].<br />

The complex baseb<strong>and</strong> representation of the CPM waveform without filtering is


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

163<br />

2Es<br />

jt,<br />

<br />

st , e<br />

(1)<br />

T<br />

with E s denoting the symbol energy <strong>and</strong> T s representing one symbol period. The parameter<br />

denotes the bipolar represented information input values. The phase<br />

of the n th symbol of this CPM modulation can be computed by<br />

n<br />

, 2 ,<br />

t h qt iT <br />

s<br />

i<br />

s<br />

(2)<br />

i<br />

with nT t ( n 1) T . The accumulated phase is defined by<br />

s<br />

s<br />

nL<br />

i<br />

(3)<br />

i<br />

2h<br />

n<br />

K<br />

1<br />

where K is a given normalization constant (for the NBWF) <strong>and</strong> indicates<br />

2<br />

the kind of CPM modulation. In case of L = 1 a full response system is considered,<br />

if L > 1 there is a memory of length L in the system <strong>and</strong> adjacent symbols overlap.<br />

The phase shaping pulse is<br />

t<br />

qt gd<br />

(4)<br />

<br />

<strong>and</strong> g represents the – REC (Rectangular) partial response phase shaping<br />

pulse.<br />

As already mentioned the CPM-NBWF is described in modes, by employing<br />

different physical layer parameters, but for all modes there is no transmission<br />

filter defined [2] <strong>and</strong> the phase shaping is done with a rectangular pulse. Thus, two<br />

adjacent modulations symbols are connected by equally spaced samples. The list<br />

of important waveform parameters are given below in Table I.<br />

CPM-Mode<br />

Table I. CPM-Waveform-Modes <strong>and</strong> specific parameters<br />

User Data Rate<br />

[kbps]<br />

L M h Code Rate<br />

Symbol Rate<br />

[ksps]<br />

NR 10 2 2 1/2 1/3 30<br />

N1 20 2 2 1/2 2/3 30<br />

N2 31.5 2 2 1/4 3/4 42<br />

N3 64 3 2 1/6 4/5 80<br />

N4 96 3 2 1/11 3/4 128<br />

In the first columns of Table I, the five different modes are indicated with<br />

their respective user data rate in the second column. Furthermore, L is denoting<br />

the ratio of width of the phase shaping pulse <strong>and</strong> the symbol duration; thus


164 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

all specified modes use partial response modulation. The parameter M indicates<br />

the number of signal states, which is binary for all the different modes; h is representing<br />

the modulation index (max. phase change in a symbol duration), which<br />

the developers of the waveform are using to compensate the spectral growth due<br />

to the increasing symbol rates (<strong>and</strong> data rate).<br />

The Forward Error Correction (FEC) is realized with a convolutional mother<br />

code with code rate R = 1/3 <strong>and</strong> constraint length 4. The mother code is given by<br />

the octal generator polynomials G 13,15,17 8<br />

<strong>and</strong> is defined to be in a non-recursive<br />

form. For all modes except NR, the mother code is punctured by the puncturing<br />

matrices given in [2]. Convolutional codes are vulnerable to burst errors, where<br />

a contiguous sequence of bits or symbols gets corrupted. In order to break these burst<br />

errors in single bit errors; an interleaving scheme is employed between FEC <strong>and</strong><br />

modulator. The interleavers have been designed following the “S-R<strong>and</strong>om/Dithered<br />

Relative Prime (DRP)” approach [6] which ensures a minimum distance between<br />

adjacent input bits. Since, a joint iterative demodulation <strong>and</strong> decoding<br />

scheme is suggested by the inventors in the receiver, the interleaver has another<br />

important function besides enhancing the robustness against burst errors.<br />

The interleaver guarantees that the sources of reliability information in the generation<br />

of extrinsic information on the receiver side are independent, namely<br />

the independence between the inner code (the CPM modulator) <strong>and</strong> the outer<br />

convolutional code.<br />

A conclusive block diagram with the transmitter of the CPM-NBWF is given<br />

in Fig. 1.<br />

Figure 1. Block diagram of CPM-NBWF transmitter<br />

III. Simulation environment<br />

From a spectrum perspective, the modes given in Table 1 are following<br />

the design constraint, that 99% of the power is within 25 kHz b<strong>and</strong>width. As shown<br />

in [8], even this constraint is not completely fulfilled. The 99% power b<strong>and</strong>width<br />

is given by:<br />

• N1 = 25.89844 kHz<br />

• N2 = 23.78906 kHz<br />

• N3 = 27.10938 kHz<br />

• N4 = 28.50000 kHz


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

165<br />

However, another evident constraint tells, that all information of the waveform<br />

is embedded within 25 kHz. We have to bear in mind that the increase of data rate<br />

is achieved with an increase of the symbol rate <strong>and</strong> the symbol rate is somehow reciprocal<br />

to the b<strong>and</strong>width. Hence, we want to analyze, if the decrease of the modulation<br />

index h is able to compensate the spectral growth due to the increase of the symbol<br />

rate. Therefore, only the modulation scheme is under analysis, since the FEC shall<br />

only be used to increase the robustness to interferences <strong>and</strong> not to compensate<br />

shortcomings of the application of the modulation scheme. Furthermore, the FEC<br />

does not contribute to the spectral shaping of this waveform. The robustness to<br />

interferences is not considered in this paper.<br />

A block diagram of the simulation is given in Fig. 2. First, uniformly distributed<br />

r<strong>and</strong>om bits are generated <strong>and</strong> then CPM modulated using the parameters<br />

of Table I (excluding FEC). The system employs oversampling with factor 16. This<br />

means that after the modulator each bit (M = 2) for all modes) is represented by<br />

16 samples. The signal stream is then filtered by an equiripple Finite Impulse Response<br />

(FIR) low pass filter. The pass frequency f<br />

pass<br />

is variable <strong>and</strong> fstop<br />

1.2 fpass<br />

,<br />

is indicated in Fig. 2. Furthermore, the pass b<strong>and</strong> ripple is limited 0.1 dB <strong>and</strong><br />

the stop b<strong>and</strong> attenuation is given by A 60 dB .<br />

stop<br />

Figure 2. Block diagram of simulation chain<br />

The filtered signal is then demodulated by the respective CPM demodulator<br />

<strong>and</strong> the Bit Error Rate (BER) is measured.<br />

IV. Simulation results<br />

The previous described setup permits to measure the BER dependent on the (by<br />

f<br />

the FIR filter limited) one-sided b<strong>and</strong>width W 1.1fpass<br />

fpass<br />

<strong>and</strong> with<br />

2<br />

this, a possibility to verify, whether all information is contained within the 12.5 kHz<br />

one-sided (25 kHz two-sided) channel.


166 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

First, the generated results are presented in Fig. 3, where the BER is drawn<br />

over the one-sided b<strong>and</strong>width W in kHz.<br />

Figure 3. One-sided b<strong>and</strong>width W versus BER<br />

In Fig. 3, it is easy to observe that the mode N1 needs clearly less b<strong>and</strong>width<br />

than the maximum of 12.5 kHz. Also, the mode N2 can transmit all information<br />

within a b<strong>and</strong>width smaller than the 12.5 kHz one-sided (25 kHz two-sided) channel.<br />

One could assume that the symbol rate for those modes could be further increased<br />

in order to maximize the data rate, but we have to bear the 99% power b<strong>and</strong>width<br />

in mind. Thus, the long range modes are compliant to the spectral requirements.<br />

(NR is disregarded here, since NR <strong>and</strong> N1 have the same modulation parameters<br />

<strong>and</strong> only differ in the puncturing).<br />

The behavior under filtering is very different for the high throughput modes N3<br />

<strong>and</strong> N4, since they have a higher b<strong>and</strong>width dem<strong>and</strong> to transmit all the containing<br />

information. If the maximum b<strong>and</strong>width W=12.5 kHz (one-sided) is granted to<br />

the system, the mode N3 has a BER of approximately 6% <strong>and</strong> the mode N4 of approximately<br />

35%. Those are not tolerable values <strong>and</strong> to be able to transmit the bits<br />

at a BER of 10 -7 , the mode N3 would need two channels, thus 50 kHz (two sided)<br />

<strong>and</strong> the mode N4 three channels, thus 75 kHz (two sided), in order to be compliant<br />

to the current NATO channelization. This observation reduces the spectral<br />

efficiency of the system dramatically, if we assume that NATO will not change<br />

the 25 kHz channelization for this waveform. The results of the above section are<br />

summarized in Table II.<br />

All modes are advertised as occupying 25 kHz b<strong>and</strong>width; the respective<br />

spectral efficiencies are indicated in Table II. Simulations results show (Fig. 3)


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

167<br />

that the necessary b<strong>and</strong>width occupation for the modes N3 <strong>and</strong> N4 is higher;<br />

the realistic, corrected spectral efficiency of the high throughput modes N3 <strong>and</strong><br />

N4 is approximately as high as the spectral efficiency of the long range mode N2,<br />

as can be seen in Table II. Furthermore, the high throughput, low-h, modes are<br />

more sensitive to noise, as can be seen in Table III.<br />

CPM-Mode<br />

Table II. CPM-Waveform with realistic spectral efficiences<br />

Spectral Efficiency<br />

a)<br />

25<br />

Necessary b<strong>and</strong>width<br />

in NATO channels<br />

Spectral Efficiency<br />

b)<br />

real<br />

NR 0.4 1 channels (25 kHz) 0.4<br />

N1 0.8 1 channels (25 kHz) 0.8<br />

N2 1.26 1 channels (25 kHz) 1.26<br />

N3 2.65 2 channels (50 kHz) 1.28<br />

N4 3.84 3 channels (75 kHz) 1.28<br />

a) is defined as the user throughput divided by 25 kHz b<strong>and</strong> width<br />

b) is defined as the user throughput divided by necessary b<strong>and</strong> width<br />

Table III. Nosie sensitivity of low-h CPM (Oversampling 16)<br />

CPM-Scheme<br />

(Modulation parameters)<br />

M = 2; L = 2; h = 1/2<br />

(N1 without FEC)<br />

M = 2; L = 2; h = 1/4<br />

(N2 without FEC)<br />

M = 2; L = 3; h = 1/6<br />

(N3 without FEC)<br />

M = 2; L = 3; h = 1/11<br />

(N4 without FEC)<br />

Necessary E b / N 0<br />

to reach a BER of 10 -3 Necessary E b / N 0<br />

to reach BER of 10 -6<br />

7.5 dB 11.1 dB<br />

12.8 dB 16.5 dB<br />

17.7 dB 21.4 dB<br />

23 dB 26.4 dB<br />

Thus, combining two or respectively three channels to provide the necessary<br />

b<strong>and</strong>width to N3 respectively N4 is disadvantageous. It would be the same<br />

from a spectral occupation (see Table II) perspective <strong>and</strong> significantly better<br />

from a robustness (see Table III) perspective, if e.g. the N2 waveform would be<br />

employed with double or triple data rate <strong>and</strong> occupying the respective two or<br />

three frequency channels.<br />

However, we further want to verify, if the modulation index can be used to<br />

compensate the spectral growth of the waveform, due to the increase of the symbol<br />

rate. To do so, the results are normalized to the symbol rate <strong>and</strong> in Fig. 4<br />

B . T s (T s is the symbol duration; B = 2W) versus the BER is plotted.


168 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 4. B . T s (T s is the symbol duration; B = 2W) versus BER<br />

It can be observed that all modes have a different normalized b<strong>and</strong>width<br />

occupation. The higher the throughput, the lower the b<strong>and</strong>width needs. The valid<br />

question at this point is, if the normalized b<strong>and</strong>width gains of N3 <strong>and</strong> N4 are caused<br />

by the reduction of h, because the value of L (ratio phase pulse length / symbol time)<br />

also has an impact on the b<strong>and</strong>width [7] <strong>and</strong> L = 3 for the modes N3 <strong>and</strong> N4 <strong>and</strong><br />

L = 2 for the modes N1 <strong>and</strong> N2. To verify this, further simulations are conducted,<br />

with the modulation settings of N3 <strong>and</strong> N4 but employing a value of L = 2. These<br />

results are plotted using dashed lines in Fig. 4.<br />

As it can be seen, these “verification modes” perform normalized to the symbol<br />

rate very similar to the mode N2. Thus, if L = 2 is used for the low h modes<br />

(N3 <strong>and</strong> N4), they are almost as b<strong>and</strong>width efficient as N2. Thus, the observed<br />

b<strong>and</strong>width gains between the mode N2 <strong>and</strong> N3/N4 are due to the higher values<br />

of L. Hence, there are only negligible b<strong>and</strong>width gains from reducing h beyond ¼.<br />

V. Conclusions<br />

In this paper the upcoming NATO NBWF has been analyzed, regarding<br />

the necessary b<strong>and</strong>width occupation of the system. This particular waveform<br />

is keeping the amount of information constant during one symbol duration <strong>and</strong>


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

169<br />

to increase the data rate, the symbol duration itself gets reduced <strong>and</strong> the symbol<br />

rate increases. Thus the b<strong>and</strong>width occupation of the system increases as well,<br />

which is not desired, since the use of a 25 kHz channel (two-sided) is a m<strong>and</strong>atory<br />

requirement [5]. This increase of b<strong>and</strong>width is compensated with the reduction<br />

of the modulation in h of the CPM modulation scheme, which is the maximum<br />

phase change within a symbol duration. Therefore, while making the symbols<br />

duration shorter, the phase change within a symbol is also reduced. It is shown<br />

that the spectral growth cannot be compensated by a reduction of h. The modes<br />

N3 <strong>and</strong> N4 occupy (to function properly) two <strong>and</strong> respectively three 25 kHz<br />

channels, which does not meet [5], especially because military spectrum is a very<br />

scarce resource.<br />

On the other h<strong>and</strong> the modes N1 <strong>and</strong> N2 are very robust <strong>and</strong> well-defined<br />

waveforms fulfilling all requirements regarding spectral occupation [5]. Therefore,<br />

we propose the following two steps:<br />

1. Move on with N1 <strong>and</strong> N2 for a fast ratification <strong>and</strong> make these new waveforms<br />

available to the user<br />

2. Revisit higher data rate modes in the future for a possible annex <strong>and</strong> ensure<br />

usable modes fulfilling requirements of all nations.<br />

There are certain possible solutions for overcoming the issue pointed out<br />

in the paper within the second proposed step.<br />

The other waveform c<strong>and</strong>idates, which were submitted to the LOS Comms<br />

CaT could be taken into consideration for the high throughput modes or modifications<br />

would had to be made to the current waveform,<br />

If the CPM-waveform is kept also for the high throughput modes there are<br />

also certain modification possibilities.<br />

First, the modulation parameters of the mode N2 are kept, but the number<br />

of bits per symbol M = 1 would have to be increased to M = 2 respectively M = 3,<br />

which would double/triple the data rate (63 kbps resp. 94.5 kbps) on the expense<br />

of the demodulator complexity [7].<br />

Second, the symbol rate of N2 gets increased (doubled/tripled offering (63 kbps<br />

resp. 94.5 kbps); occupying two resp. three 25 kHz channels, while being fairly<br />

resistant to interference compared to the current modes N3 <strong>and</strong> N4.<br />

References<br />

[1] Technical Note 1246, ‘Wireless communication architecture (l<strong>and</strong> tactical): scenarios,<br />

requirements <strong>and</strong> operational view’, NC3A, The Hague, Netherl<strong>and</strong>s, 2007.<br />

[2] LOS Comms CaT (formaly known as: SC/6 AHWG/2), “Technical St<strong>and</strong>ards for Narrow<br />

B<strong>and</strong> Physical Layer of the NATO Network enabled <strong>Communications</strong> Waveform <strong>and</strong><br />

VHF Propagation Models (STANAG Draft 4),” 2010.


170 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

[3] C. Brown <strong>and</strong> P. Vigneron, “Spectrally Efficient CPM Waveforms for Narrowb<strong>and</strong><br />

Tactical <strong>Communications</strong> in Frequency Hopped Networks”, <strong>Military</strong> <strong>Communications</strong><br />

Conference, 2006. IEEE MILCOM 2006, 23-25 Oct. 2006.<br />

[4] C. Brown <strong>and</strong> P. Vigneron, “Equalisation <strong>and</strong> Iterative Reception for Spectrally<br />

Efficient CPM in Multipath Environments”, <strong>Military</strong> <strong>Communications</strong> Conference,<br />

2010. IEEE MILCOM 2010, Oct. 31-Nov. 3 2010.<br />

[5] NATO C3B, “Requirements for a Coalition Tactical Radio Waveform,” (AC/322-N<br />

(2011)0010-REV1), January 2011.<br />

[6] D. Divsalar, G. Montorsi, S. Benedetto <strong>and</strong> F. Pollara, “Serial concatenation<br />

of interleaved codes : Design <strong>and</strong> performance analysis,” in IEEE Trans. Inform.<br />

Theory (1998), April, pp. 409-429.<br />

[7] J.G. Proakis, “Digital <strong>Communications</strong>,” Mcgraw-Hill Publ.Comp., Edition: 4., August<br />

2000.<br />

[8] J. Nieto, “NBWF Investigations”, LOS Comms Cat Workshop, Rome, Italy, March 2011.


Legacy Waveforms on Software Defined Radio:<br />

Can Hierarchical Modulation Offer<br />

an Added Value to SDR Operators<br />

Marc Adrat 1 , Tobias Osten 1 , Jan Leduc 1 , Markus Antweiler 1 ,<br />

Harald Elders-Boll 2<br />

1 Fraunhofer Institute for Communication, <strong>Information</strong> Processing <strong>and</strong> Ergonomics FKIE,<br />

Wachtberg, Germany, marc.adrat@fkie.fraunhofer.de<br />

2 Cologne University of Applied Sciences, Cologne, Germany, harald.elders-boll@fh-koeln.de<br />

Abstract: <strong>Military</strong> tactical communications is taking the next step in its evolution. Many nations<br />

spend considerable efforts to bring the novel Software Defined Radio (SDR) technology into service.<br />

SDRs allow military radio operators to change waveforms on-the-fly according to the mission needs.<br />

New capabilities can be loaded as so-called Waveform Application (WFA). Before novel waveforms<br />

with wideb<strong>and</strong> networking capabilities will be available in the future, most nations have launched<br />

projects to port legacy waveforms to SDRs. These WFAs on the modern SDRs shall ensure interoperable<br />

communication to legacy radios in situations where both types of radio equipment are deployed<br />

at the same time in the same mission.<br />

In this paper, we present first results of our analysis if an added value can be provided to the operators<br />

at SDRs, e.g., in terms of a higher data throughput or robustness. As an example, we apply the concept<br />

of hierarchical modulations to a legacy waveform. The modulation scheme of the legacy waveform<br />

acts as the base-layer which ensures the over-the-air interoperability to legacy radios. Additional<br />

information can be transmitted between SDRs only utilizing some extra enhancement-layers.<br />

Keywords: Software Defined Radio, Waveform Application, Hierarchical Modulations, Bit Interleaved<br />

Coded Modulation with Iterative Decoding<br />

I. Introduction<br />

It is expected that the modern Software Defined Radio (SDR) technology will<br />

considerably extend the capabilities of future military tactical communications.<br />

Among many other advantages of SDR technology, one key benefit is that waveforms<br />

can be loaded onto the SDRs as so-called Waveform Applications (WFA)<br />

according to the mission needs. Another key benefit is that SDRs are expected to<br />

be powerful enough to host modern WFAs with wideb<strong>and</strong> networking capabilities.<br />

This research project was performed under contract with the Federal Office of the Bundeswehr for <strong>Information</strong> Management<br />

<strong>and</strong> <strong>Information</strong> <strong>Technology</strong>, Germany.


172 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Such Wideb<strong>and</strong> Networking Waveforms (WNW) typically set the most dem<strong>and</strong>ing<br />

requirements for the design of high capable heterogeneous SDR platforms.<br />

However, if WFAs with lower computational dem<strong>and</strong>s are deployed on SDRs, like<br />

legacy waveforms, some of the computational resources remain unused. These<br />

spare resources might probably be beneficially utilized by applying advanced signal<br />

processing algorithms. An example will be discussed later on in this paper.<br />

Moreover, it can be anticipated that SDR technology will be introduced to the<br />

military forces in a step-by-step process. There will be a significant period of time<br />

where legacy radios <strong>and</strong> modern SDRs hosting the corresponding legacy WFA will<br />

be deployed at the same time in the same mission. Guaranteeing interoperability<br />

between both types of radio equipment, legacy radios <strong>and</strong> modern SDR, is the<br />

utmost requirement in the Porting process. Porting in this context means that the<br />

waveform functionality which is known from the legacy radio is implemented<br />

as a piece of software which runs on the SDR platform. This piece of software is called<br />

Waveform Application. Usually, interoperability is guaranteed by reproducing the<br />

known functionality of the legacy radios one-to-one in the WFA for SDRs.<br />

However, as we have already proposed in [1], it might be of value to apply<br />

modern advancements in digital signal process ing at the receiving end of a communication<br />

link. While keeping interoperability on the air interface, the operator<br />

at the receiving SDR can experience a benefit if compared to the operator at the<br />

legacy radio thanks to the more sophisticated receiver signal processing. Such<br />

benefit can be, e.g. a reduced bit error rate or an extended communication range.<br />

In the example given in [1] the concept of Bit Interleaved Coded Modulation<br />

with Iterative Decoding (BICM-ID) [2] [3] has been applied at the receiver using<br />

some MIL-STD188-110B-like waveform modes [4]. It has been shown that some<br />

gains are achievable, but unfortunately that these gains have to be considered<br />

as negligibly small if the concept of BICM-ID is directly applied to the st<strong>and</strong>ardized<br />

configuration settings. It has also been shown that substantial gains can be<br />

realized if a change of a single line of software code at the transmitter is tolerable.<br />

Of course, this would violate the key requirement to guarantee interoperability to<br />

legacy radios.<br />

In this paper, we analyze if the concept of Hierarchical Modulation can beneficially<br />

be applied. Again we use some MIL-STD188-110B-like waveform modes<br />

as example. Our objective is to provide some extended services to the operators<br />

at the SDRs. Using the known configuration settings from the legacy waveform<br />

as a base-layer in the hierarchical modulation scheme, allows ensuring interoperability<br />

between legacy radios <strong>and</strong> SDRs. Thanks to some enhancement-layers in the<br />

hierarchical modulation scheme additional data becomes transferable within an<br />

SDR-to-SDR communication link.<br />

Important note: In this paper, we focus on presenting the basic idea, discussing<br />

some useful design guidelines as well as showing first simulation results. These<br />

simulation results focus on the analysis if an enhanced data throughput can be


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

173<br />

provided as added value to the operator at an SDR. In a second complementing<br />

paper, see [8], we discuss if a higher robust ness (<strong>and</strong> with this a higher range) can<br />

be realized.<br />

This paper is structured as follows. In Section II we explain the idea of hierarchical<br />

modulation in the context of legacy waveforms on SDRs in more detail.<br />

In Section III we describe the simulation environment. Simulations results are<br />

presented in Section IV. After having given a short outlook on the results in [8] <strong>and</strong><br />

having described some future steps of our analysis in Section V, we finally conclude<br />

our findings in Section VI.<br />

II. Hierarchical modulations in the context of legacy<br />

waveforms on SDRs<br />

Hierarchical modulation allows to multiplex <strong>and</strong> to modulate multiple streams<br />

of user data into a single stream of modulation symbols. It is sometimes also referred<br />

to as Layered Modulation because one of the input data streams determines<br />

the base-layer symbols <strong>and</strong> the other input data streams determine the extra<br />

enhancement-layer symbols.<br />

One prominent practical implementation of hierarchical modulation can<br />

be found in the area of digital video broadcasting where the base-layer carries<br />

the information of a robust, but typically low-resolution video stream. The extra<br />

enhancement-layers, which might only be decodable by receivers under very good<br />

channel conditions, allow to increase the resolution <strong>and</strong> therewith the quality<br />

of the video.<br />

Thus, our basic idea is to apply a similar technique in the porting process<br />

of legacy waveforms to modern software defined radios. In the ported counterpart<br />

of the legacy waveform, the information of the legacy waveform represents the<br />

base-layer guaranteeing interoperability. On top of that the operators at SDRs can<br />

transmit additional data using the extra enhancement-layers.<br />

A. Example base-layer <strong>and</strong> enhancement-layers<br />

To simplify matters, in the following we restrict our considerations to a comprehensible<br />

example using an 8-PSK signal constellation as base-layer. Such a digital<br />

modulation scheme is widely used in a couple of present military tactical communication<br />

schemes like in NATO STANAG 4285 [5] or MIL-STD188-110B<br />

Appendix C [4]. The extension of our considerations to other digital modulation<br />

schemes is straight forward.<br />

The left part of Figure 1 shows an 8-PSK signal constellation set with a Gray<br />

labeling for the individual symbols. This set shall serve as the base-layer for our<br />

hierarchical modulation schemes. Note, in this simple example the base-layer carries<br />

information solely in its phase.


174 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 1. Different Signal Constellation Sets with exemplary symbol labels; left: 8-PSK base-layer,<br />

center: 8-PSK base-layer plus 4-ASK enhancement layer (star);<br />

right: 8-PSK base-layer plus 4-QAM enhancement layer (diamonds)<br />

In order to provide an add-on to the operators at SDRs we are aiming for<br />

transmitting some additional data in so-called enhancement-layers. Two examples<br />

are shown in the center <strong>and</strong> in the right part of Figure 1.<br />

In the first example, we apply a 4-ASK enhancement-layer as an overlay to<br />

the 8-PSK base-layer. This results in an overall 32-QAM scheme which would<br />

allow the operator at the SDR to transmit two additional bits. Simply speaking,<br />

the base-layer selects one of the eight sectors in the I/Q-plane (inphase/<br />

quadrature) while the enhancement-layer selects one out of four magnitudes<br />

in each sector. Later on, this scheme will also be referred to as “star-shaped”<br />

32-QAM scheme.<br />

In the second example we again apply an enhancement-layer with 4 signal<br />

constellation points to the 8-PSK base-layer. However, inspired by [6] the slightly<br />

different placing of signal constellation points allows exploiting the I/Q-plane more<br />

effectively. In the rest of this paper, this scheme will be called “diamond-shaped”<br />

32-QAM scheme.<br />

Two categories of questions arise immediately:<br />

• How to design the enhancement-layer in detail How to place the signal<br />

constellation points How to label them<br />

• What are the beneficial/adverse consequences with respect to the performance,<br />

e.g. in terms of bit error rate behavior What are the consequences<br />

for the operators at the legacy radios resp. software defined radios<br />

Answers to the design aspects (first category) will be given in the next subsection.<br />

The consequences (second category) will be analyzed in Sections III <strong>and</strong> IV.<br />

B. Designing the enhancement-layer<br />

When designing the enhancement-layer we have to consider a couple of design<br />

rules. Among others, these are:


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

175<br />

1. The mean energy E S required per modulation symbol shall be the same for the<br />

original 8-PSK scheme <strong>and</strong> the extended star- resp. diamond-shaped 32-QAM.<br />

2. The Euclidean distance between any pair of signal constellation points shall<br />

be such that not a single pair exists which reveals a dedicated bottleneck<br />

with respect to the bit error rate performance.<br />

3. The symbol labels shall be optimized in view of a receiver using the<br />

concept of Bit-Interleaved Coded Modulation with Iterative Decoding<br />

(BICM-ID) [2][3].<br />

The first two design rules are related to the placing of signal constellation<br />

points in the I/Q-plane while the third design rule is dedicated to the labeling.<br />

Both aspects will be optimized separately from each other.<br />

1) Placing of signal constellation points for the star-shaped 32-QAM scheme: Figure<br />

2 shows an extract of the star-shaped 32-QAM scheme.<br />

Figure 2. Design of star-shaped 32-QAM scheme (extract)<br />

Let us assume that the four signal constellation points representing the 4-ASK<br />

enhancement-layer are equidistantly separated by the distance α. The 4-ASK scheme<br />

shall be centered around β. In order to make sure that the mean energy E s of the<br />

resulting star-shaped 32-QAM scheme is the same as for the original 8-PSK scheme<br />

(see first design rule), it can be shown that α <strong>and</strong> β have to satisfy the condition<br />

5 2<br />

.<br />

E S<br />

<br />

4<br />

(1)<br />

If the spacing between the four signal constellation points representing the<br />

4-ASK enhancement-layer tends towards zero, i.e. 0, the term .<br />

E S


176 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Thus, the star-shaped 32-QAM scheme degenerates to the original 8-PSK scheme<br />

(this fact can be considered as a consistency check). If we increase α, the term β starts<br />

to decrease. While doing so, we have to take into consideration that the Euclidean<br />

distance between the inner signal constellation points on radius r * 1 becomes smaller<br />

the larger α resp. the smaller β is. In order to satisfy the second design rule, we enforce<br />

*<br />

that the Euclidean distance between the inner signal constellation points on radius r 1<br />

is also α. It can be shown that in this case α <strong>and</strong> β have to satisfy the condition<br />

13sin 22.5<br />

<br />

.<br />

(2)<br />

2 sin 22.5<br />

Solving Eqs. (1) <strong>and</strong> (2) for E S = 1 yields α = 0.331 <strong>and</strong> β = 0.928999. From<br />

that we can easily determine the radii of the star-shaped 32-QAM scheme shown<br />

in the center of Figure 1<br />

r<br />

∗<br />

1<br />

r<br />

∗<br />

2<br />

r<br />

∗<br />

3<br />

r<br />

∗<br />

4<br />

= 0.<br />

432499<br />

= 0.<br />

763499<br />

= 1.<br />

094499<br />

= 1.<br />

425499<br />

with * 0.331.<br />

(3)<br />

2) Placing of signal constellation points for the diamond-shaped 32-QAM scheme:<br />

Figure 3 shows an extract of the diamond-shaped 32-QAM scheme.<br />

Figure 3. Design of diamond-shaped 32-QAM scheme (extract)<br />

In this scheme we assume that two of the signal constel lation points are placed<br />

with a fixed phase offset of 22.5° on a circle with radius r r r <br />

. 2<br />

<br />

3<br />

A third point<br />

is located at a larger radius r ◊ 4 , while the Euclidean distance α to the first two points


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

177<br />

on radius r shall be the same as in between the first mentioned two points. The<br />

fourth point is located at a smaller radius r 1 ◊ . Again, in order to make sure that the<br />

mean energy E s of the resulting diamond-shaped 32-QAM scheme is the same as for<br />

the original 8-PSK scheme (see first design rule), it can be shown that r <strong>and</strong> r 1<br />

◊<br />

have to satisfy the condition<br />

1<br />

<br />

<br />

2<br />

2<br />

4<br />

S<br />

2 cos11.25 3sin11.25 .<br />

r E r<br />

(4)<br />

Note, while doing the consistency check, whether the diamond-shaped 32-QAM<br />

scheme degenerates to the original 8-PSK scheme, e.g. by letting r<br />

1<br />

r 0 , we<br />

have to keep in mind that at the same time the phase offset of 11.25° disappears.<br />

With this in mind, the term in the inner parenthesis in (4) becomes 1.<br />

Again, in order to ensure that the Euclidean distance between the inner signal<br />

constellation points on radius r ◊ 1 is at least α, the terms r <strong>and</strong> r ◊ 1 have also to satisfy<br />

the condition<br />

sin11.25 <br />

r1<br />

r .<br />

(5)<br />

sin 22.5<br />

From (4) <strong>and</strong> (5) follows<br />

<br />

r 0.5098<br />

<br />

r2 r3<br />

1.0001 with 0.3902.<br />

<br />

r 1.31878<br />

4<br />

The minimum Euclidean distance between any combination of two signal constellation<br />

points in the diamond-shaped 32-QAM scheme is α ◊ = 0.3902. This is slightly<br />

higher than for the star-shaped 32-QAM scheme α* = 0.331. This offers the potential<br />

for a higher performance as it will be discussed in more detail in Section IV.<br />

3) Finding the optimal labels for the star-shaped resp. diamond-shaped 32-QAM<br />

scheme: The symbol labels for both 32-QAM schemes shall be chosen such<br />

that a receiver design based on the BICM-ID concept is optimally supported.<br />

The concept of BICM-ID was first described in [2] <strong>and</strong> is based on a serial<br />

concatenation of a Forward Error Correction (FEC) component, a bit-level interleaver<br />

<strong>and</strong> a digital modulation scheme. On the receiving end, there is a feedback loop<br />

between the BCJR-decoder [7] <strong>and</strong> the demodulator. So-called Extrinsic <strong>Information</strong><br />

generated by the BCJR-decoder is interleaved <strong>and</strong> then fed back to the demodulator<br />

as additional a priori information for the received channel symbols.<br />

It has already been shown in [3] that the BICM-ID concept is optimally<br />

supported if a so-called Semi Set Partitioning (SSP) symbol labeling is applied.<br />

For a given signal constel lation the SSP mapping ensures that the so-called<br />

Harmonic Mean d H [3] is maximized. Table I shows the Harmonic Means for all<br />

signal constellations under consideration in this paper.<br />

<br />

<br />

(6)


178 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Table I. Harmonic Means for different Signal Constellation Sets<br />

Restricted SSP<br />

Free-running SSP<br />

Signal Constellation Set<br />

Harmonic Mean d H<br />

8-PSK (Gray) 0.809<br />

Star-shaped 32-QAM 0.470<br />

Diamond-shaped 32 QAM 0.403<br />

8-PSK 2.877<br />

Star-shaped 32-QAM 2.501<br />

Diamond-shaped 32 QAM 2.520<br />

If we are totally free in designing the symbol labeling the maximum achievable<br />

values are given in the lower part of Table I (marked as free-running SSP). It can<br />

be seen that (besides the better α ◊ > α* mentioned above) the diamond-shaped<br />

32-QAM offers also a slightly higher Harmonic Mean d H if compared to the starshaped<br />

32-QAM. Note, a comparison to the optimal d H for the 8-PSK constellation<br />

with a free-running SSP is not fair because due to the higher number of signal<br />

constellation points in the 32-QAM schemes, the Euclidean distances (which are<br />

taken into account by the Harmonic Mean) are typically smaller.<br />

However, since our key objective is to ensure interopera bility to legacy radios<br />

we are not totally free in the design of the symbol labeling. We have to take into<br />

account the labeling of the original 8-PSK scheme. For instance, in case of the<br />

4.8 kbps mode of MIL-STD188-110B Appendix C [4] the original labeling is given<br />

by a Gray labeling. The left part of Figure 1 shows the corresponding example. In this<br />

paper, when designing the labelings for the 32-QAM schemes we restrict ourselves<br />

to the case in which the labeling of the base-layer is part of the overall labels. For<br />

the given example considered here that means that the Gray labeling of the 8-PSK<br />

scheme determines the three leftmost bits in the overall five bit long labels for the<br />

32-QAM schemes. Taking this restriction into account yields the Harmonic Mean<br />

values mentioned in the upper part of Table I. Obviously, the restriction results<br />

in significantly smaller Harmonic Mean d H values if compared to the free-running<br />

optimization approach. Consequently, the attainable performance gains will be<br />

significantly smaller. The corresponding SSP symbol labelings are shown in the<br />

center <strong>and</strong> in the right part of Figure 1.<br />

III. Simulation environment<br />

In the following, the pros <strong>and</strong> cons of considering hierarchical modulation<br />

in the porting process of legacy waveforms to SDRs shall be analyzed using a simulation<br />

example. For this purpose we use a simulation environment where the baselayer<br />

(i.e., the legacy system) resembles the 4.8 kbps mode of MIL-STD188-110B<br />

Appendix C [4].


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

179<br />

A block diagram for the simulation environment under consideration is shown<br />

in Figure 4.<br />

Figure 4. Block diagram of simulation environment with base-layer <strong>and</strong> enhancement-layer<br />

signal processing<br />

A. Base-layer<br />

In the 4.8 kbps mode of MIL-STD188-110B Appendix C the input data is at first<br />

encoded by a rate R = 1/2, constraint length L = 7 convolutional mother code with<br />

generator polynomial G = {171,133} 8 . Afterwards the codewords are punctured<br />

to R p = 3/4 using the puncturing pattern (1 1 1 0 0 1).<br />

The punctured codewords are block interleaved using one out of several possible<br />

interleaver sizes. The interleaver size is mainly determined by the maximum<br />

acceptable delay on the communication link <strong>and</strong> it must be a multiple i of 768 bits<br />

(with i = 1,3,9,18,36,72).<br />

In contrast to the original 4.8 kbps mode of MIL-STD188-110B Appendix C [4]<br />

in this paper we neglect aspects like scrambling or synchronization. We focus on<br />

an interleaver size of 6912 only, i.e. i = 9. Instead of a full tail-biting convolutional<br />

code we use a terminated convolutional code. Anyhow, we assume that none of these<br />

simplifications has a major impact on the relevance of our findings for an established<br />

real-world legacy system.<br />

B. Enhancement-layer<br />

Similar simulation settings are applied to the enhancement-layer. The only<br />

difference is that we have to take into account the lower number of bits which are<br />

transmitted on the enhancement-layer (only 2 bits instead of 3 bits are considered<br />

in the determination of modulation symbols). From that follows that the interleaver<br />

size in the enhancement-layer is 4608. It is designed as an S-r<strong>and</strong>om interleaver.<br />

C. Combination of base-layer <strong>and</strong> enhancement-layer<br />

After having determined the interleaved blocks of punctured codewords<br />

for the base-layer <strong>and</strong> the enhancement-layer, both data streams are multiplexed<br />

to a single data stream. As mentioned earlier, in this paper we restrict ourselves


180 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

to the case in which the 3 bits of the base-layer determine the three leftmost bits<br />

<strong>and</strong> in which the 2 bits of the enhancement-layer determine the two rightmost bits<br />

of the overall 5 bit long labels at each signal constellation point (see labeling<br />

in Figure 1).<br />

As transmission channel serves an Additive White Gaussian Noise (AWGN)<br />

channel with known E S /N O where E S determines the energy per modulation<br />

symbol <strong>and</strong> N O the power spectral density of the AWGN. At the receiving end<br />

of our simulation chain we apply the concept of BICM-ID independently to both,<br />

the base-layer <strong>and</strong> the enhancement-layer. Note, the behavior of a legacy radio<br />

is inherently included by decoding the base-layer without any BICM-ID iteration<br />

(i.e., no feedback loop in Figure 4).<br />

IV. Simulation results<br />

Table II summarizes all relevant cases which need to be considered during<br />

the evaluation.<br />

Table II. Relevant cases to be considered (TX: transmit; RX: Receive)<br />

Receiver<br />

Legacy Radio<br />

Software<br />

Defined Radio<br />

Legacy Radio<br />

TX: Base-Layer<br />

RX: Base-Layer<br />

TX: Base-Layer<br />

RX: Base- & Enhanc. Layer<br />

Transmitter<br />

Software Defined Radio<br />

TX: Base- & Enhancement-Layer<br />

RX: Base-Layer<br />

TX: Base- & Enhancement-Layer<br />

RX: Base- & Enhancement-Layer<br />

A. Legacy radio as receiver & arbitrary transmitter<br />

In a first experiment we want to analyze the performance for the cases in which<br />

a legacy radio acts as receiver. We can expect a reduced performance if we use an<br />

SDR as transmitter because of the adverse effects of the enhancement-layer.<br />

Figure 1 illustrates the reason for our expectation. The demodulator of a legacy<br />

system will make a decision for the most probable sector in the I/Q-plane. As an<br />

example the sector for the bit pattern 000 is highlighted in light-grey. This sector<br />

is exactly the same for all three cases, i.e. for a legacy radio transmitting the baselayer<br />

only (see leftmost plot in Figure 1) as well as for the star-shaped resp. diamondshaped<br />

SDR cases (see plots in the center <strong>and</strong> on the right of Figure 1). However,<br />

the Euclidean distance of the signal constellation points to the sector resp. decision<br />

boundaries becomes usually smaller for the SDR cases. Thus, a performance loss<br />

in terms of Bit Error Rate (BER) behavior has to be tolerated.<br />

Figure 5 shows the corresponding simulation results.


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

181<br />

Figure 5. Bit error rate performance of Legacy Receiver for Legacy resp. Software Defined<br />

Radio Transmitters<br />

As expected, it can be seen that the operator at the legacy radio will experience<br />

a performance loss of up to ~ 4 dB in E S /N O if a SDR with one of the 32-QAM<br />

schemes serves as transmitter. The star-shaped 32-QAM scheme behaves slightly<br />

better than the diamond-shaped 32-QAM scheme. One reason for this observation<br />

can be found in the fact that in the star-shaped 32-QAM scheme only the two<br />

signal constellation points on radii r * 1 <strong>and</strong> r * 2 exhibit a smaller distance to the sector<br />

resp. decision boundary than for the original 8-PSK scheme while in the diamondshaped<br />

32-QAM scheme these are three, namely the points on radii r ◊ <br />

1 <strong>and</strong> r 2<br />

r 3<br />

(cmp. to Figure 1).<br />

Notice, as mentioned earlier the behavior of a legacy receiver is inherently<br />

included in Figure 4 by decoding the base-layer without any BICM-ID iteration<br />

(i.e., no feedback loop). In addition, Figure 5 also shows for all three transmitters<br />

a second curve labeled Error-Free Feedback (EFF). These curves illustrate the best<br />

possible BER performance attainable in a BICM-ID system. For this purpose,<br />

during the simulation the values on the feedback loop are directly taken from the<br />

transmitter side. With this, they can be considered to be error-free. Obviously, due<br />

to the Gray labeling the perfor mance differences between the non-iterative legacy<br />

scheme as well as the error-free feedback bound are negligibly small.<br />

B. SDR as receiver & legacy radio as transmitter<br />

In this case the base-layer of the SDR receiver reveals a similar performance<br />

as the legacy receiver because the sector resp. decision boundaries are identical<br />

(cmp. to Figure 1). The only difference is that the additional interference/noise


182 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

being introduced by the enhancement-layer is not added at the transmitter of the<br />

communication link, but at the receiving end. The corresponding simulation results<br />

have already been presen ted in Figure 5. Since the transmitter was a legacy<br />

radio, there is no information on the enhancement-layer. Thus, decoding the<br />

enhancement-layer does not provide any benefit <strong>and</strong> can be skipped. The decision,<br />

if the enhancement-layer needs to be decoded, can be derived from the side information<br />

whether transmitter is a legacy radio or an SDR. We assume that this side<br />

information can be provided to all radio operators once in advance, e.g. during the<br />

network planning/management phase.<br />

C. SDR as receiver & SDR as transmitter<br />

Last but not least, we consider the case using an SDR on both ends of the<br />

communication link. Figure 6 shows the corresponding simulation results.<br />

Figure 6. BER performance of SDR receiver for SDR transmitter<br />

As a reference we also plotted a copy of the BER curve for the case where we<br />

have legacy systems on both ends. In order to allow a fair comparison between all<br />

curves they are plotted as a function of the mean energy E B per user data bit. As<br />

a consequence the BER curve for the legacy system shown in Figure 5 is shifted by<br />

10 • log 10 (4 / 3 • 1 / 3) = –3.52 dB to the left (w.r.t. the punctured code rate R p<br />

<strong>and</strong> number of bits per symbol). Since we transmit in total 5 bits per symbol<br />

using the SDR modes, all the other curves include a shift to the left by<br />

10 • log 10 (4 / 3 • 1 / 5) = –5.74 dB.<br />

Figure 6 shows two sets of simulation results, one for the star-shaped 32-QAM<br />

scheme <strong>and</strong> one for the diamond-shaped 32-QAM scheme. Each set contains BER


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

183<br />

curves for different numbers of iteration I = 0,1,5,10 <strong>and</strong> for error-free feedback.<br />

It can easily be seen that performance improvements are possible by iterations for<br />

both sets. In addition, the diamond-shaped 32-QAM scheme outperforms the starshaped<br />

32-QAM scheme thanks to the better properties mentioned in Section II.B.<br />

However, it can also be seen that due to the restrictions in the design of both<br />

schemes, there is still a considerable gap to the reference curve. The SDR modes<br />

perform even worse than the original 8.0 kbps mode of MIL-STD188-110B<br />

Appendix C [4] which also allows transmitting 5 bit per symbol.<br />

Note, the simulation results for both 32-QAM schemes reveal a plateau at a BER<br />

of 0.2. The reason for this plateau can be found in the fact that the plotted BER<br />

curves show the mean BER for the base-layer <strong>and</strong> the enhancement-layer. Since the<br />

base-layer is more robust than the enhancement-layer, the three bits transmitted<br />

on the base-layer exhibit a much better BER performance than the two bits on the<br />

enhancement-layer. Thus, in this range of E B /N 0, where the plateau appears, the<br />

mean BER can be approximated by 2 / 5 • 0.5 = 0.2.<br />

V. Next steps in our ongoing research activity<br />

In the preceding sections the basic idea, the design, <strong>and</strong> some first results of our<br />

ongoing research activity have been described. Unfortunately, these first results<br />

show that with the given restrictions in the design of the 32-QAM schemes no<br />

added value, in terms of data throughput, can be offered to the operator at the SDR.<br />

A. Improved robustness<br />

Anyways, in parallel we already started some investigations if an improved<br />

robustness (<strong>and</strong> with this maybe communication range) can be offered as added<br />

value, e.g., by transmitting extra error protection information on the enhancementlayer.<br />

For instance, we can transmit the parity check information which had been<br />

eliminated from the coded data stream by puncturing.<br />

Figure 7 shows a first exemplary simulation result where we use a rate 9/20<br />

FEC code in combination with the 32-QAM scheme instead of the rate 3/4 code<br />

<strong>and</strong> the 8-PSK scheme. The effective ratio of data bits carried in each modulation<br />

symbol remains the same, while at the same time interoperability to the legacy<br />

system remains preserved.<br />

The simulation results in Figure 7 show that thanks to the stronger error<br />

protection scheme an added value in terms of higher robustness can be provided<br />

to the SDR operator. A single iteration is sufficient to provide a gain if compared<br />

to the legacy 8-PSK scheme. After 5 Iterations gains of more than 3 dB in E S /N O<br />

can be realized.<br />

A more detailed analysis of this case is beyond the scope of this paper <strong>and</strong><br />

will be presented in [8].


184 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 7. BER performance of robust SDR schemes transmitting extra error protection<br />

information on the enhancement-layer<br />

B. Further potentials for improvement<br />

In addition, we see some aspects which offer the potential for improvement<br />

of both usages of the enhancement layer, either for the higher throughput or the<br />

higher robustness.<br />

Currently, the design of the Multiplexer resp. De-Multiplexer shown in Figure 4<br />

reveals some limiting restrictions. The Multiplexer combines the data streams of the<br />

base-layer <strong>and</strong> the enhancement-layer to a single data stream by simply combining<br />

the 3 bit resp. 2 bit patterns to a single 5 bit long label. As a consequence, the<br />

BICM-ID decoders for the base-layer as well as the enhancement-layer shown<br />

in Figure 4 run strictly in parallel <strong>and</strong> cannot benefit from each other. In addition,<br />

from the current Multiplexer design it follows that the Harmonic Mean d H of the<br />

restricted SSP optimization is substantially smaller than the d H of a free-running<br />

SSP optimization (see Table I). A more sophisticated Multiplexer/Combiner might<br />

provide higher Harmonic Mean d H values <strong>and</strong> it might support a joint decoding<br />

approach of both layers.<br />

Figure 8 shows a simulation using the free-running SSP labeling. This simulation<br />

can be considered as an upper practical performance bound for an alternative<br />

Multiplexer/ Combiner design. Obviously, significant performance gains can be<br />

realized if compared the preceding simulations using the restricted SSP labeling.<br />

As a next step of our ongoing research activity, we will analyze how to design<br />

an alternative Multiplexer/Combiner which comes closer to the practical bound.<br />

In addition, we will investigate how close this practical performance bound can<br />

be approached.


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

185<br />

Figure 8. BER performance of SDR Receiver for SDR transmitter with an optimal SSP<br />

symbol labeling<br />

VI. Conclusions<br />

In this paper, we analyzed if an added value can be provided to an SDR<br />

operator using an enhanced legacy waveform. For this purposes the concept<br />

of hierarchical modulations has been applied in the porting process. The original<br />

legacy waveform is represented as the base-layer. The focus of the present paper<br />

has been to present the basic idea, the major design considerations as well as some<br />

first simulation results. Unfortunately, these results have shown that due to some<br />

restrictions in the design process no gains in terms of data throughput can be<br />

realized. However, an outlook on an ongoing research activity has been given<br />

which allows providing a significant gain in terms of robustness. More details<br />

will follow in a complementing paper [8].<br />

Finally, with respect to the original question being raised in the title of this<br />

paper, we conclude: partially yes, applying hierarchical modulations in the<br />

porting process of legacy waveforms allows realizing an improved robustness.<br />

We also see a potential for providing a higher throughput, but, however, so far<br />

we have not been able to exploit the additional capacity of the enhancementlayer<br />

to realize this.


186 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

References<br />

[1] J. Leduc, M. Adrat, M. Antweiler, H. Elders-Boll, „Legacy Waveforms on Software<br />

Defined Radios: Benefits of Advanced Digital Signal Processing“, in Proc. of NATO<br />

RTO <strong>Information</strong> Systems <strong>Technology</strong> Panel Symposium (IST – 092 / RSY – 022),<br />

Breslau (Pol<strong>and</strong>), Sept. 2010.<br />

[2] X. Li <strong>and</strong> J.A. Ritcey, “Bit Interleaved Coded Modulation with Iterative Decoding”,<br />

IEEE <strong>Communications</strong> Letters, pages 169-171, May 1998.<br />

[3] X. Li, A. Chindapol <strong>and</strong> J.A. Ritcey, ”Bit-Interleaved Coded Modulation with<br />

Iterative Decoding <strong>and</strong> 8-PSK Signalling”, IEEE Transactions on <strong>Communications</strong>,<br />

pp. 1250-1257, August 2002.<br />

[4] U.S. DoD Interface St<strong>and</strong>ard MIL-STD-188-110B “Interoperability <strong>and</strong> Performance<br />

St<strong>and</strong>ards for Data Modems”, App. B, April 2000.<br />

[5] NATO <strong>Military</strong> Agency for St<strong>and</strong>ardization (MAS), “STANAG 4285: Characteristics<br />

of 1200/2400/3600 Bits Per Second Single Tone Modulators/Demodulators for HF<br />

Radio Links”.<br />

[6] A. Seeger, "A new Signal Constellation for the Hierarchical Transmission of Two<br />

equally sized data streams" in Proc. IEEE ISIT, p. 169, Ulm, Germany, June 1997.<br />

[7] L. Bahl, J. Cocke, F. Jelinek, <strong>and</strong> J. Raviv, ”Optimal decoding of linear codes for<br />

minimizing symbol error rate”, IEEE Transactions on <strong>Information</strong> Theory, vol. 20,<br />

no. 2, pp. 284-287, 1974.<br />

[8] M. Adrat, T. Osten, J. Leduc, M. Antweiler, H. Elders-Boll, “Can an Added Value<br />

be offered to SDR Operators in Scenarios where Interoperability to Legacy Radios<br />

is a Requirement” submitted to Technical Conference of the Wireless Innovation<br />

Forum SDR’12, Washington, Jan. 2013.


Data Fusion Schemes for Cooperative Spectrum<br />

Sensing in Cognitive Radio Networks<br />

Djamel Teguig 1, 2 , Bart Scheers 1 , Vincent Le Nir 1<br />

1 Royal <strong>Military</strong> Academy – Department CISS,<br />

2<br />

Polytechnic <strong>Military</strong> School-Algiers-Algeria,<br />

Renaissance Avenue 30-B1000 Brussels, Belgium,<br />

{djamel.teguig, bart.scheers}@rma.ac.be, vincent.lenir@elec.rma.ac.be<br />

Abstract: Cooperative spectrum sensing has proven its efficiency to detect spectrum holes in cognitive<br />

radio network (CRN) by combining sensing information of multiple cognitive radio users. In this<br />

paper, we study different fusion schemes that can be implemented in fusion center. Simulation comparison<br />

between these schemes based on hard, quantized <strong>and</strong> soft fusion rules are conducted. It is shown<br />

through computer simulation that the soft combination scheme outperforms the hard one at the cost<br />

of more complexity; the quantized combination scheme provides a good tradeoff between detection<br />

performance <strong>and</strong> complexity. In the paper, we also analyze a quantized combination scheme based on<br />

a tree-bit quantization <strong>and</strong> compare its performance with some hard <strong>and</strong> soft combination schemes.<br />

Keywords: Cooperative spectrum sensing, cognitive radio (CR), data fusion, soft, quantized <strong>and</strong><br />

hard fusion rules<br />

I. Introduction<br />

In recent years, the dem<strong>and</strong> of spectrum is rapidly increasing with the growth<br />

of wireless services. The scarcity of the spectrum resource becomes more serious.<br />

Cognitive radio provides a new way to better use the spectrum resource [1]. Therefore,<br />

a reliable spectrum sensing technique is needed. Energy detection exhibits<br />

simplicity <strong>and</strong> serves as a practical spectrum sensing scheme. As a key technique<br />

to improve the spectrum sensing for Cognitive Radio Network (CRN), cooperative<br />

sensing is proposed to combat some sensing problems such as fading, shadowing,<br />

<strong>and</strong> receiver uncertainty problems [2].<br />

The main idea of cooperation is to improve the detection performance by<br />

taking advantage of the spatial diversity, in order to better protect a primary user,<br />

<strong>and</strong> reduce false alarm to utilize the idle spectrum more efficiently.<br />

The three steps in the cooperative sensing process are [3]:<br />

1. The fusion center FC selects a channel or a frequency b<strong>and</strong> of interest for<br />

sensing <strong>and</strong> requests all cooperating CR users to individually perform local<br />

sensing.


188 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

2. All cooperating CR users report their sensing results via the control<br />

channel.<br />

3. Then the FC fuses the received local sensing information to decide about<br />

the presence or absence of signal <strong>and</strong> reports back to the CR users.<br />

As shown in Fig. 1, CR3 suffers from the receiver uncertainty problem because<br />

it is located outside the transmission range of primary transmitter <strong>and</strong> it is unaware<br />

of the existence of primary receivers. So, transmission from CR3 can interfere with<br />

the reception at a primary receiver. CR2 suffers from multipath <strong>and</strong> shadowing<br />

caused by building <strong>and</strong> trees. Cooperative spectrum sensing can help to solve these<br />

problems if secondary users cooperate by sharing their information.<br />

Figure 1. Sensing problems (receiver uncertainty, multipath <strong>and</strong> shadowing)<br />

To implement these three steps, seven elements of cooperative sensing are<br />

presented [4] as illustrated in Fig. 2.<br />

Figure 2. Elements of cooperative spectrum sensing [4]


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

189<br />

• Cooperation models: is concerned with how CR users cooperate to perform<br />

sensing.<br />

• Sensing techniques: this element is crucial in cooperative spectrum sensing<br />

to sense primary signals by using signal processing techniques.<br />

• Hypothesis testing: in order to decide on the presence or absence of a primary<br />

user (PU), a statistical test is performed to get a decision on the presence of PU.<br />

• Control channel <strong>and</strong> reporting: is used by CR users to report sensing result<br />

to the FC.<br />

• Data fusion: is a process of combining local sensing data to make cooperation<br />

decision.<br />

• User selection: in order to maximize the cooperative gain, this element provides<br />

us the way to optimally select the cooperating CR users.<br />

• Knowledge base: means a prior knowledge included PU <strong>and</strong> CR user location,<br />

PU activity, <strong>and</strong> models or other information in the aim to facilitate<br />

PU detection.<br />

In this paper, we will focus on the data fusion rules. The decision on the presence<br />

of PU is achieved by combining all individual sensing information of local CR<br />

users at a central (FC) using various fusion schemes. These schemes can be classified<br />

as hard decision fusion, soft decision fusion, or quantized (softened hard) decision.<br />

The hard decision is the one in which the CR users make a one-bit decision<br />

regarding the existence of the PU, this 1-bit decision will be forwarded to the FC<br />

for fusion. In [5], a logic OR fusion rule for hard-decision combining is presented<br />

for cooperative spectrum sensing. In [6], two simple schemes of hard decision combining<br />

are studied: the OR rule <strong>and</strong> the AND rule. In [7]-[8], another sub-optimal<br />

hard decision scheme is used called Counting Rule. In [9] that half-voting rule<br />

is shown as the optimal hard decision fusion rule in cooperative sensing based on<br />

energy detection. In the case of soft decision, CR users forward the entire sensing<br />

result to the center fusion without performing any local decision. In [10] a soft<br />

decision scheme is described by taking linear combination of the measurements<br />

of the various cognitive users to decide between the two hypotheses. However, in [11]<br />

collaborative detection of TV transmissions is studied while using soft decision<br />

using the likelihood ratio test. It is shown that soft decision combining for spectrum<br />

sensing achieves more precise detection than hard decision combining. This<br />

was confirmed in [12] when performing Soft decision combination for cooperative<br />

sensing based on energy detection. Some soft combining techniques are discussed<br />

in [13-14-15] as square-law combining (SLC), equal gain combining (EGC) <strong>and</strong><br />

square-law selection (SLS) over AWGN, Rayleigh <strong>and</strong> Nakagami-m channel.<br />

The paper is organized as follows. We present in Section II the system model<br />

related to cooperative spectrum sensing. In Section III, we describe different fusion<br />

rules for cooperative spectrum sensing; several hard, soft <strong>and</strong> quantized schemes<br />

are proposed <strong>and</strong> discussed. Simulation results in section IV are given to compare<br />

these fusion rules. We conclude this paper in Section V.


190 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

II. System model<br />

Consider a cognitive radio network, with K cognitive users (indexed by<br />

k = {1, 2 ... K}) to sense the spectrum in order to detect the existence of the PU.<br />

Suppose that each CR performs local spectrum sensing independently by using N<br />

samples of the received signal. The spectrum sensing problem can be formulated<br />

as a binary hypothesis testing problem with two possible hypothesis H 0 <strong>and</strong> H 1 .<br />

H : xk( n) wk( n)<br />

(1)<br />

H : x( n) hsn ( ) w ( n)<br />

k k k<br />

Where s(n) are samples of the transmitted signal (PU signal), wk<br />

( n ) is the receiver<br />

noise for the k th CR user, which is assumed to be an i.i.d. r<strong>and</strong>om process with zero<br />

mean <strong>and</strong> variance σ 2 n <strong>and</strong> h k is the complex gain of the channel between the PU <strong>and</strong><br />

the k th CR user. H 0 <strong>and</strong> H 1 represent whether the signal is absent or present respectively.<br />

Using energy detector, the k th CR user will calculate the received energy as [16]:<br />

N<br />

E x ( n)<br />

(2)<br />

k<br />

In the case of soft decision, each CR user forwards the entire energy result<br />

E k to the FC. However, for hard decision, the CR users make the one-bit decision<br />

given by Δ k, by comparing the received energy E k with a predefined threshold λ k .<br />

1,<br />

Ek<br />

k<br />

k<br />

<br />

(3)<br />

0, otherwise<br />

Detection probability P d,k <strong>and</strong> false alarm probability P f,k of the CR user k<br />

are defined as:<br />

P d,k = Pr {Δ k = 1|H 1 } = Pr {E k > λ k |H 1 }<br />

P f,k = Pr {Δ k = 1|H 0 } = Pr {E k > λ k |H 0 }<br />

Assuming that λ k = λ for all CR users, the detection probability, false alarm<br />

probability <strong>and</strong> miss detection P m,k over AWGN channels can be expressed as follows<br />

respectively [17]<br />

Pdk<br />

,<br />

Qm( 2 , )<br />

(4)<br />

( m, / 2)<br />

Pf , k ( m)<br />

(5)<br />

P<br />

k<br />

1 P<br />

(6)<br />

mk , dk ,<br />

where γ is the signal to noise ratio (SNR), m = TW is the time b<strong>and</strong>width product,<br />

Q N (.,.) is the generalized Marcum Q-function, Г(.) <strong>and</strong> Г(.,.) are complete <strong>and</strong><br />

incomplete gamma function respectively.


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

191<br />

III. Fusion rules<br />

This section describes the fusion rules that are used for the comparison.<br />

III.1. Hard decision fusion<br />

In this scheme, each user decides on the presence or absence of the primary<br />

user <strong>and</strong> sends a one bit decision to the data fusion center. The main advantage<br />

of this method is the easiness the fact that it needs limited b<strong>and</strong>width [12]. When<br />

binary decisions are reported to the common node, three rules of decision can be<br />

used, the “<strong>and</strong>”, “or”, <strong>and</strong> majority rule. Assume that the individual statistics Δ k<br />

are quantized to one bit with Δ k = 0, 1; is the hard decision from the k th CR user.<br />

1 means that the signal is present, <strong>and</strong> 0 means that the signal is absent.<br />

The AND rule decides that a signal is present if all users have detected a signal.<br />

The cooperative test using the AND rule can be formulated as follows:<br />

H<br />

H<br />

K<br />

<br />

otherwise<br />

(7)<br />

The OR rule decides that a signal is present if any of the users detect a signal.<br />

Hence, the cooperative test using the OR rule can be formulated as follows:<br />

K<br />

H : 1<br />

H<br />

k<br />

k<br />

: otherwise<br />

The third rule is the voting rule that decides on the signal presence if at<br />

least M of the K users have detected a signal with 1≤ M ≤ K. The test is formulated<br />

as:<br />

(8)<br />

H<br />

H<br />

M<br />

<br />

otherwise<br />

(9)<br />

A majority decision is a special case of the voting rule for M = K/2, the same<br />

as the AND <strong>and</strong> the OR rule which are also special cases of the voting rule for<br />

M = K <strong>and</strong> M = 1 respectively.


192 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Cooperative detection probability Q d <strong>and</strong> cooperative false alarm probability<br />

Q f are defined as:<br />

K<br />

<br />

<br />

Qd<br />

Pr1 H1Prk<br />

MH<br />

1<br />

<br />

i1<br />

<br />

(10)<br />

K<br />

<br />

Qf<br />

Pr<br />

1 H0<br />

Pr <br />

k MH0<br />

<br />

<br />

i1<br />

<br />

Where Δ is the final decision. Note that the OR rule corresponds to the case M = 1,<br />

hence<br />

K<br />

Qd , or<br />

1 (1 Pd , k<br />

)<br />

(11)<br />

Q<br />

k1<br />

1 (1 )<br />

(12)<br />

K<br />

f , or<br />

P<br />

k1<br />

f , k<br />

The AND rule can be evaluated by setting M = K.<br />

K<br />

Q P<br />

(13)<br />

Q<br />

d , <strong>and</strong><br />

k1<br />

d , k<br />

(14)<br />

K<br />

f , <strong>and</strong><br />

P<br />

k1<br />

f , k<br />

III.2. Soft data fusion<br />

In soft data fusion, CR users forward the entire sensing result E k to the center<br />

fusion without performing any local decision <strong>and</strong> the decision is made by combining<br />

these results at the fusion center by using appropriate combining rules such<br />

as square law combining (SLC), maximal ratio combining (MRC) <strong>and</strong> selection<br />

combining (SC). Soft combination provides better performance than hard combination,<br />

but it requires a larger b<strong>and</strong>width for the control channel [18]. It also<br />

generates more overhead than the hard combination scheme [12].<br />

Square Law Combining (SLC): SLC is one of the simplest linear soft combining<br />

schemes. In this method the estimated energy in each node is sent to the center<br />

fusion where they will be added together. Then this summation is compared to<br />

a threshold to decide on the existence or absence of the PU <strong>and</strong> a decision statistic<br />

is given by [19]:<br />

E E<br />

(15)<br />

slc<br />

where E k denotes the statistic from the k th CR user. The detection probability <strong>and</strong><br />

false alarm probability are formulated as follow [19]:<br />

k<br />

k


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

193<br />

Qd , SLC<br />

QmK ( 2 slc<br />

, )<br />

(16)<br />

Q<br />

f , SLC<br />

( mK, / 2)<br />

(17)<br />

( mK)<br />

Where slc k<br />

<strong>and</strong> γ k is the received SNR at k th CR user.<br />

k<br />

Maximum Ratio Combining (MRC): the difference between this method<br />

<strong>and</strong> the SLC is that in this method the energy received in the center fusion from<br />

each user is ponderated with a normalized weight <strong>and</strong> then added. The weight<br />

depends on the received SNR of the different CR user. The statistical test for this<br />

scheme is given by:<br />

E<br />

wE<br />

(18)<br />

mrc k k<br />

k<br />

Over AWGN channels, the probabilities of false alarm <strong>and</strong> detection under<br />

the MRC diversity scheme can be given by [21]:<br />

Qd , MRC<br />

Qm( 2 mrc<br />

, )<br />

(19)<br />

<br />

Where: mrc k<br />

k<br />

Q<br />

f , MRC<br />

( m, / 2)<br />

(20)<br />

( m)<br />

Selection Combining (SC): in the SC scheme, the fusion center selects<br />

the branch with highest SNR [20].<br />

max( , ,....., )<br />

sc<br />

Over AWGN channels, the probabilities of false alarm <strong>and</strong> detection under<br />

the SC diversity scheme can be written as [21]:<br />

Qd , SC<br />

Qm( 2 sc<br />

, )<br />

(21)<br />

Q<br />

f , SC<br />

1 2<br />

K<br />

( m, / 2)<br />

(22)<br />

( m)<br />

III.3. Quantized data fusion<br />

In this scheme, we try to realize a tradeoff between the overhead <strong>and</strong> the detection<br />

performance. Instead of one bit hard combining, where there is only one


194 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

threshold dividing the whole range of the detected energy into two regions, a better<br />

detection performance can be obtained if we increase the number of threshold to<br />

get more regions of observed energy.<br />

In [12], a two-bit hard combining scheme is proposed in order to divide<br />

the whole range of the detected energy into four regions. The presence of the signal<br />

of interest is decided at the FC by using the following equation:<br />

wn<br />

i i<br />

L<br />

(23)<br />

i<br />

where L is the threshold <strong>and</strong> it is equal to the weight of the upper region,<br />

n i is the number of observed energies falling in region i <strong>and</strong> w i is the weight value<br />

of region i with w 0 = 0 w 1 = 1, w 2 = 2 <strong>and</strong> w 3 = 4.<br />

In this paper, we extend the scheme of [12] to a three-bit combining scheme.<br />

In the three-bit scheme, seven threshold λ 1 , λ 2 … <strong>and</strong> λ 7 , divide the whole range<br />

of the statistic into 8 regions, as depicted in Fig. 3. Each CR user forwards 3 bit of information<br />

to point out the region of the observed energy. Nodes that observe higher<br />

energies in upper regions will forward a higher value than nodes observing lower<br />

energies in lower regions.<br />

The three-bits combining scheme is performed in four steps:<br />

1: Define a quantization threshold λ i (i = 1 ... 7) for each region according to<br />

the maximal received energy of the signal.<br />

Figure 3. Principle of three-bit hard combination scheme<br />

2: Each user makes a local decision by comparing the received energy with<br />

the thresholds predefined in 1, <strong>and</strong> sends 3-bits information to the FC.<br />

3: The FC sums the local decisions ponderated with weights w i (i = 0.., 7).<br />

In our case, we have taken: w 0 = 0, w 1 = 1, w 2 = 2, w 3 = 3, w 4 = 4, w 5 = 5,<br />

w 6 = 6, w 7 = 7.<br />

4: The final decision is made by comparing this sum with a threshold L.<br />

wik<br />

L<br />

(24)<br />

k


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

195<br />

IV. Simulations <strong>and</strong> results<br />

In this section we study the detection performance of our scheme through<br />

simulations, <strong>and</strong> compare its performances with soft <strong>and</strong> hard fusion schemes.<br />

First, we present the performance of the hard combining schemes as depicted<br />

in Fig. 4. Secondly, we will compare the performance of the different fusion rules<br />

in case of soft combining. Next, the two-bit <strong>and</strong> the three-bit quantized schemes<br />

are compared in term of detection performance.<br />

For the hard decision, we present in Fig. 4 the ROC curves of the ‘AND’ <strong>and</strong><br />

the ‘OR’ rule, <strong>and</strong> compare it to the detection performance of a single CR user. For<br />

the simulations, we consider 3 CR users. Each user has a SNR of –2 db. As shown<br />

in Fig. 4, the OR rule has better detection performance than the AND rule, which<br />

provides slightly better performance at low Pfa than the OR, because the data fusion<br />

center decide in favor of H1 when at least one CR user detects the PU signal.<br />

However in the AND rule, to decide of the presence of a primary user, all CR users<br />

must detect the PU signal.<br />

Figure 4. ROC for the hard fusion rules under AWGN channel, SNR = –2 dB, K = 3 users,<br />

<strong>and</strong> energy detection with N = 1000<br />

Fig. 5 shows the ROC curves of different soft combination schemes discussed<br />

in section III.2 under AWGN channel. For the simulations, each CR user sees a different<br />

SNR. We observe from this figure that the MRC scheme exhibits the best<br />

detection performance, but it requires channel state information. The SLC scheme<br />

does not require any channel state information <strong>and</strong> still present better performance<br />

than SC. When no channel information is available, the best scheme is SLC.


196 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 5. ROC for soft fusion rules under AWGN channel with K = 3 users,<br />

<strong>and</strong> energy detection with m = 5<br />

Fig. 6 shows the ROC curves for quantized data fusion with 2-bit <strong>and</strong><br />

3-bit quantized combination, the figure indicates that the proposed 3-bit combination<br />

scheme shows much better performance than the 2-bit combination scheme<br />

at the cost of one more bit of overhead for each CR user, this scheme can achieve<br />

a good tradeoff between detection performance <strong>and</strong> overhead.<br />

Figure 6. ROC curves for quantized data fusion under AWGN channel with SNR = –2 db,<br />

K = 4 users <strong>and</strong> N = 1000 samples


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

197<br />

For comparison, we show in Fig. 7 the ROC curves for the different fusion<br />

rules under AWGN channel. As the figure indicates, all fusions method outperform<br />

the single node sensing, the soft combining scheme based on SLC rule<br />

outperforms the hard <strong>and</strong> quantized combination at the cost of control channel<br />

overhead, the 3-bit quantized combination scheme shows a comparable detection<br />

performance with the SLC, with less overhead.<br />

Figure 7. ROC for combining fusion rules under AWGN channel with K = 3 users, SNR = –2 db<br />

<strong>and</strong> energy detection with N = 1000 samples<br />

V. Conclusion<br />

In this paper, the effect of fusion rules for cooperative spectrum sensing is investigated.<br />

It is shown that the soft fusion rules outperform the hard fusion rules.<br />

However, these benefits are obtained at the cost of a larger b<strong>and</strong>width for the control<br />

channel. The hard fusion rules occur with less complexity, but also with a lower<br />

detection performance than soft combination schemes. The proposed quantized<br />

three-bit combination scheme wins advantage of the soft <strong>and</strong> the hard decisions<br />

schemes with a tradeoff between overhead <strong>and</strong> detection performance. In practical<br />

application, we can select an appropriate method of data fusion <strong>and</strong> decision algorithms<br />

according to the requirement of detection performance <strong>and</strong> the requirement<br />

of the available b<strong>and</strong>width for the reporting channel.


198 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

References<br />

[1] S. Haykin, “Cognitive radio: Brain-empowered wireless communications”, IEEE<br />

Journal Selected Areas in <strong>Communications</strong>, vol. 23, no. 2, Feb.2005, pp. 201-220.<br />

[2] T. Yucek & H. Arslan, A. Survey of Spectrum Sensing Algorithms for Cognitive<br />

Radio Application, IEEE <strong>Communications</strong> Surveys & Tutorials, 11(1), First Quarter<br />

2009.<br />

[3] D. Cabric, S. Mishra, R. Brodersen, Implementation issues in spectrum sensing<br />

for cognitive radios, in: Proc. of Asilomar Conf. on Signals, Systems, <strong>and</strong> Computers,<br />

vol. 1, 2004, pp. 772-776.<br />

[4] I.F. Akyildiz, B.F. Lo, <strong>and</strong> R. Balakrishnan, “Cooperative Spectrum Sensing<br />

in Cognitive Radio Networks: A Survey,” Physical Communication (Elsevier) Journal,<br />

vol. 4, no. 1, pp. 40-62, March 2011.<br />

[5] A. Ghasemi, E. Sousa, Collaborative Spectrum Sensing for Opportunistic Access<br />

in Fading Environments. DySPANn 2005, pp. 131-136, Nov. 2005.<br />

[6] E. Peh, Y.-Ch. Liang, Optimization for Cooperative Sensing in Cognitive Radio<br />

Networks, WCNC 11-15, pp. 27-32, March 2007.<br />

[7] Jayakrishnan Unnikrishnan <strong>and</strong> Venugopal V. Veeravalli, Cooperative Spectrum<br />

Sensing <strong>and</strong> Detection for Cognitive Radio, IEEE GLOBCOM 26-30 Nov. 2007,<br />

pp. 2972-2976.<br />

[8] T. Jiang, D. Qu, “On minimum sensing error with spectrum sensing using counting<br />

rule in cognitive radio networks,” in Proc. 4th Annual Int. Conf.Wireless Internet<br />

(WICON’08), Brussels, Belgium, 2008, pp. 1-9.<br />

[9] W. Zhang, R. Mallik, <strong>and</strong> K. Letaief, “Cooperative spectrum sensing optimization<br />

in cognitive radio networks,” in Proc. IEEE Int. Conf.Commun., 2008, pp. 3411-3415.<br />

[10] Zhi Quan, Shuguang Cui, <strong>and</strong> Ali H. Sayed, Optimal Linear Cooperation for Spectrum<br />

Sensing in Cognitive Radio Networks, IEEE Journal of Selected Topics in Signal.<br />

[11] E. Visotsky, S. Kuffner, <strong>and</strong> R. Peterson, “On collaborative detection of TV<br />

transmissions in support of dynamic spectrum sharing,” in Proc. 1st IEEE Int. Symp.<br />

New Frontiers in Dynamic Spectrum Access Netw. (DySPAN), pp. 338-345, 2005.<br />

[12] J. Ma <strong>and</strong> Y. Li, “Soft combination <strong>and</strong> detection for cooperative spectrum<br />

sensing in cognitive radio networks,” in Proc. IEEE Global Telecomm. Conf., 2007,<br />

pp. 3139-3143.<br />

[13] S.P. Herath, N. Rajatheva, C. Tellambura, “On the Energy Detection of Unknown<br />

Deterministic Signal over Nakagami Channel with Selection Combining,” Proc. IEEE<br />

Symp. CCECC ’09 Canadian conference on. pp. 745-749, 2009.<br />

[14] S.P. Herath, N. Rajatheva, “Analysis of equal gain combining in energy detection<br />

for cognitive radio over Nakagami channels,” IEEE. GLOBECOM 2008, pp. 1-5, 2008.<br />

[15] Yunxue Liu, Dongfeng Yuan, et al., “Analysis of square-law combining for<br />

cognitive radios over Nakagami channels,” WiCom’09 5th International Conference<br />

on, pp. 1-4, 2009.<br />

[16] V.I. Kostylev, Energy detection of a signal with r<strong>and</strong>om amplitude, In Proc. IEEE<br />

ICC, pp. 1606-1610, New York, Apr. 2002.<br />

[17] Fadel F. Digham, Mohamed-Slim Alouni, Marvin K. Simon, “On the energy<br />

detection of unknown signals over fading channels,” IEEE. Trans. Commun., vol. 55,<br />

pp. 21-24, Jan. 2007.


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

199<br />

[18] Zhi Quan, Shuguang Cui, H. Vincent Poor, <strong>and</strong> Ali H. Sayed, “Collaborative<br />

wideb<strong>and</strong> sensing for cognitive radios,” IEEE Signal Processing Magazine, vol. 25,<br />

no. 6, pp. 63-70, 2008.<br />

[19] Zhengquan Li, Peng Shi, Wanpei Chen, Yan Yan, “Square Law Combining Double<br />

threshold Energy Detection in Nakagami Channel”, Internation Journal of Digital<br />

Content <strong>Technology</strong> <strong>and</strong> its Application, vol. 5, Number 12, December 2011.<br />

[20] M.K. Simon <strong>and</strong> M.-S. Alouini, Digital communication over fading channels. John<br />

Wiley & Sons, Inc., 2 ed., Dec. 2004.<br />

[21] Hongjian Sun, Collaborative Spectrum Sensing in Cognitive Radio Networks.<br />

A doctoral thesis of Philosophy. The University of Edinburgh. January 2011.


Implementation of an Adaptive OFDMA PHY/MAC<br />

on USRP Platforms for a Cognitive Tactical<br />

Radio Network<br />

Vincent Le Nir, Bart Scheers<br />

Department Communication, <strong>Information</strong>, Systems <strong>and</strong> Sensors (CISS),<br />

Royal <strong>Military</strong> Academy (RMA), 30, Avenue de la Renaissance, B-1000 Brussels, Belgium,<br />

{vincent.lenir, bart.scheers}@rma.ac.be<br />

Abstract: Cognitive radio is envisioned to solve the problem of spectrum scarcity in military networks<br />

<strong>and</strong> to autonomously adapt to rapidly changing radio environment conditions <strong>and</strong> user needs.<br />

Dynamic spectrum management techniques are needed for the coexistence of multiple cognitive<br />

tactical radio networks. Previous work has investigated the iterative water-filling algorithm (IWFA)<br />

as a possible c<strong>and</strong>idate to improve the coexistence of such networks. It has been shown that adding<br />

a constraint on the number of transmitter’s sub-channels improves the convergence of IWFA. In this<br />

paper, we propose an adaptive orthogonal frequency division multiple access (OFDMA) physical<br />

(PHY) <strong>and</strong> medium access control (MAC) for the coexistence of multiple cognitive tactical radio networks.<br />

The proposed scheme is implemented on universal software radio peripheral (USRP) platforms<br />

using Qt4/IT++ <strong>and</strong> the USRP hardware driver (UHD) application programming interface (API).<br />

Keywords: Cognitive radio; adaptive OFDMA; distributed bit <strong>and</strong> power allocation; USRP<br />

I. Introduction<br />

Cognitive radio (CR) has been introduced by Mitola as an extension of software<br />

radio. In this technology, radio nodes are intelligent agents that search out<br />

ways to deliver services according to the user needs <strong>and</strong> the radio environment [1].<br />

CR has been an active topic of research since most regulatory bodies found that<br />

the spectrum is underutilized although most available spectrum is licensed, leaving<br />

small room for future wireless applications [2].<br />

CR can also solve the problem of spectrum scarcity for military networks.<br />

As the electro-magnetic environment in an operational theater can be very hostile,<br />

cognitive tactical radio networks can autonomously adapt to rapidly changing<br />

conditions <strong>and</strong> user needs [3].<br />

The coexistence of cognitive tactical radio networks requires dynamic spectrum<br />

management techniques in order to reduce the interference <strong>and</strong> to improve the performance<br />

in terms of throughput, power (longer battery life), <strong>and</strong> delay. Dynamic spectrum


202 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

management techniques can be centralized/distributed (decisions are made centrally/<br />

locally), cooperative/non-cooperative (some information is shared/not shared between<br />

networks), <strong>and</strong> can use a horizontal/vertical sharing model (all networks have equal/<br />

limited rights to access the spectrum) [4]. Our target application for the coexistence<br />

of cognitive tactical radio networks corresponds to a mission involving multiple coalition<br />

nations in a foreign country with no a priori frequency planning, meaning that<br />

there is no frequency management cell (FMC) to coordinate the different networks.<br />

Moreover, the networks can’t exchange information between each other’s <strong>and</strong> they<br />

have equal priority rights. Therefore, we are interested in a distributed non-cooperative<br />

technique in a horizontal spectrum sharing model.<br />

The iterative water-filling algorithm (IWFA) is an adequate dynamic spectrum<br />

management technique to meet these requirements [5]. Indeed, IWFA is an autonomous<br />

algorithm solving the distributed power control problem in a frequency selective<br />

interference channel. Robust versions of the IWFA have been designed to cope with<br />

dynamic wireless channels [6, 7, 8, 9, 10]. However, IWFA does not converge to a unique<br />

solution (multiple Nash equilibriums). This aspect is inherent to IWFA because at each<br />

iteration some power is poured in the best sub-channel regardless the interference<br />

caused to the other networks, while they have a better benefit avoiding each other by<br />

taking different sub-channels. The convergence of the IWFA can be improved by adding<br />

a constraint on the number of transmitter’s sub-channels [11, 12].<br />

R<strong>and</strong>om access multi-channel medium access control (MAC) protocols have<br />

been proposed for CR networks [13]. Multi-channel MAC protocols have also been<br />

designed for IWFA [6, 14]. These protocols use a dedicated control channel to coordinate<br />

the radios. It is unlikely that a dedicated control channel can be used in a military<br />

context since it is a single point of failure. A possible workaround is to use a rendezvous<br />

multi-channel MAC protocol; however the radios may beacon for a long time before<br />

establishing a rendezvous. Another alternative is to employ time division multiplexing<br />

access (TDMA) to obtain a collision-free transmission schedule or frequency division<br />

multiplexing access (FDMA) as described in [15]. In this paper, we propose an adaptive<br />

orthogonal frequency division multiple access (OFDMA) PHYsical/MAC to<br />

allow simultaneous collision-free transmissions in a cognitive tactical radio network.<br />

The adaptive OFDMA PHY/MAC has the following characteristics:<br />

• It is based on the IWFA with selection of a single sub-channel [11, 12].<br />

It consists of grouping several OFDM sub-carriers to form a sub-channel.<br />

In a first mode, it uses a fixed bit-loading per sub-carrier. In a second<br />

mode, it uses an adaptive bit-loading related to the spectrum sensing <strong>and</strong><br />

the channel estimation on each OFDM sub-carrier.<br />

• It is robust against multi-path due to the insertion of a cyclic prefix <strong>and</strong><br />

allows a single-tap equalizer due to the orthogonality of the sub-carriers.<br />

• It uses a blind demodulation chain, meaning that it uses the cyclic prefix to<br />

estimate blindly the timing offset <strong>and</strong> to detect the presence of an OFDM<br />

signal. The timing offset estimate is used to synchronize control packets


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

203<br />

<strong>and</strong> data packets, <strong>and</strong> to estimate blindly the frequency offset, transmission<br />

channel, phase offset <strong>and</strong> transmitted bits. The residual ambiguity<br />

given by the BPSK or the adaptive QAM modulation schemes is solved by<br />

transmitting a single sub-carrier pilot or by using differential encoding.<br />

The adaptive OFDMA PHY/MAC has been implemented on universal software<br />

radio peripheral (USRP) platforms using Qt4/IT++ <strong>and</strong> the USRP hardware<br />

driver (UHD) application programming interface (API). Qt is a cross-platform<br />

application framework that is widely used for developing application software with<br />

a graphical user interface (GUI) [16]. IT++ is a C++ library of mathematical, signal<br />

processing <strong>and</strong> communication classes <strong>and</strong> functions. Its main use is in simulation<br />

of communication systems <strong>and</strong> for performing research in the area of communications<br />

[17]. The goal of the UHD is to provide a host driver <strong>and</strong> API for current <strong>and</strong><br />

future USRP products. The UHD driver can be used st<strong>and</strong>alone or with 3rd party<br />

applications such as Gnuradio, Labview, or Simulink [18].<br />

This paper is organized as follows. First, the adaptive OFDMA MAC protocol<br />

is described in Section II. Second, the adaptive OFDMA PHysical layer functions<br />

are described in Section III. The implementation of the adaptive OFDMA PHY/<br />

MAC on USRP platforms using Qt4/IT++ <strong>and</strong> the UHD API is described in Section<br />

IV. Finally, Section V concludes the paper.<br />

II. Adaptive OFDMA MAC protocol<br />

In this Section, the adaptive OFDMA MAC protocol is described. It is assumed<br />

that the CRs have agreed on the same front-end parameters to transmit <strong>and</strong><br />

receive, i.e. carrier frequencies, sampling rates <strong>and</strong> b<strong>and</strong>widths. It is also assumed<br />

that the CRs have the same OFDM parameters, i.e. number of sub-carriers, cyclic<br />

prefix (CP) size, <strong>and</strong> number of sub-channels. The adaptive OFDMA MAC protocol<br />

uses control packets for the h<strong>and</strong>shaking between two CRs. These control<br />

packets are request-to-send (RTS) <strong>and</strong> clear-to-send (CTS) packets. In a first mode,<br />

the two control packets include source address, destination address <strong>and</strong> best subchannel<br />

sensed by the CR. In a second mode, control packets also include target<br />

rate constraint, bit <strong>and</strong> power allocation. Therefore, unlike carrier sense multiple<br />

access (CSMA) scheme <strong>and</strong> other r<strong>and</strong>om access multi-channel MAC protocols,<br />

the two control packets convey some information <strong>and</strong> need to be aligned with<br />

the timing of OFDM symbols transmitted in the same b<strong>and</strong>width of interest to<br />

keep the orthogonality between sub-carriers.<br />

A. First mode<br />

The first mode uses a fixed bit-loading, e.g. a fixed BPSK or QAM modulation<br />

over the different sub-carriers. In the following, we suppose a transmission from CR 1<br />

to CR 2. CR 1 <strong>and</strong> CR 2 perform spectrum sensing in the b<strong>and</strong>width of interest <strong>and</strong>


204 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

determine their best sub-channel based on an energy estimate. The RTS includes<br />

the source address CR 1, the destination address CR 2, <strong>and</strong> the best sub-channel<br />

of CR 1 given by spectrum sensing. CR 1 transmits the RTS on its best sub-channel.<br />

CR 2 demodulates all the sub-channels in parallel (see Section III.C) <strong>and</strong> discovers<br />

that a RTS is sent based on the destination address of CR 1. CR 2 gets the RTS source<br />

address <strong>and</strong> the best sub-channel of CR 1. The CTS includes the CR 2 source address,<br />

the CR 1 destination address, <strong>and</strong> the best sub-channel of CR 2 by spectrum sensing.<br />

CR 2 transmits the CTS on CR 1 best sub-channel. CR 1 knows to receive on its best<br />

sub-channel. CR 1 demodulates the CTS <strong>and</strong> gets CR 2 best sub-channel. Finally,<br />

CR 1 transmits the data on CR 2 best sub-channel.<br />

B. Second mode<br />

The second mode uses an adaptive QAM over the different sub-carriers. CR 1 <strong>and</strong><br />

CR 2 determine their best sub-channel based on an energy estimate. The RTS includes<br />

the CR 1 source address, the CR 2 destination address, the CR 1 best sub-channel,<br />

<strong>and</strong> the target rate constraint. CR 1 transmits the RTS on its best sub-channel. CR 2<br />

demodulates all the sub-channels in parallel <strong>and</strong> discovers that a RTS is sent based<br />

on the destination address of CR 1. CR 2 gets the RTS source address, the target rate<br />

constraint, <strong>and</strong> the best sub-channel of CR 1. If the CR 1 best sub-channel is the same<br />

as the CR 2 best sub-channel, the CTS includes the CR 2 source address, the CR 1<br />

destination address, the CR 2 best sub-channel, <strong>and</strong> the bit <strong>and</strong> power allocation for<br />

CR 1 target rate constraint. CR 2 transmits the CTS on CR 1 best sub-channels. CR 1<br />

knows to receive on its best sub-channel. CR 1 demodulates the CTS <strong>and</strong> gets CR 2<br />

best sub-channel, as well as the bit <strong>and</strong> power allocation for its target rate constraint.<br />

Finally, CR 1 transmits the data on their common best sub-channel with adaptive QAM.<br />

If the CR 1 best sub-channel is different from the CR 2 best sub-channels, CR 1 gets<br />

the best sub-channel of CR 2 by the CTS, <strong>and</strong> send a second RTS on CR 2 best subchannel<br />

to allow CR 2 to compute the bit <strong>and</strong> power allocation. CR 2 sends a second<br />

CTS with this information on CR 1 best sub-channel. Finally, CR 1 transmits the data<br />

on CR 2 best sub-channel with adaptive QAM.<br />

III. Adaptive OFDMA physical layer<br />

In this Section, the key functions of the adaptive OFDMA PHY are described,<br />

i.e. the spectrum sensing, the OFDM signal detection, the blind OFDM demodulation<br />

<strong>and</strong> the distributed bit <strong>and</strong> power allocation.<br />

A. Spectrum sensing<br />

A CR needs to determine its best sub-channel <strong>and</strong> communicate this information<br />

to another CR. The b<strong>and</strong>width of the signal of interest B is divided into


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

205<br />

a number of sub-channels S of width B/S. As there is no assumption about the type<br />

of the observed signals, a nonparametric method should be used. We propose<br />

to use the classical Barlett’s method for power spectrum estimation known also<br />

as the method of averaged periodograms [19]. We assume that the complex sampling<br />

rate equals the b<strong>and</strong>width of the signal of interest. The averaged periodograms for N<br />

sub-carriers of a complex baseb<strong>and</strong> signal with K blocks of N samples y = [y(kN),…<br />

,y((k+1)N-1)] with k = [0,…,K-1] is given by<br />

K1 N1 j2in<br />

1<br />

<br />

2<br />

<br />

N<br />

E i | y( kN n) e |<br />

(1)<br />

KN<br />

k0 n0<br />

with i = [0,…,N-1] bins. The best sub-channel selection consists of integrating<br />

the estimated power spectrum of the frequency bins corresponding to the width B/S<br />

for all sub-channels <strong>and</strong> determines the sub-channel which have the lowest energy<br />

( m1)<br />

N 1<br />

S<br />

opt<br />

S = min Ei ( )<br />

(2)<br />

m<br />

mN<br />

i<br />

S<br />

with m = [0,…,S-1]. This sensing procedure is used first by CR 1 for the selection<br />

of its best sub-channel for RTS transmission, <strong>and</strong> is further embedded in the RTS<br />

control packet. Secondly, this sensing procedure is used by CR 2 to communicate<br />

its best sub-channel to CR 1 in the CTS control packet via CR 1 best sub-channel.<br />

B. OFDM signal detection<br />

The CR also needs to detect within the b<strong>and</strong>width of interest B the presence<br />

of an OFDM signal even if the signal is sent over a single sub-channel. A survey<br />

of OFDM signal detection techniques can be found in [20, 21, 22, 23]. Some<br />

techniques require the knowledge of a pilot sequence, OFDM parameters, <strong>and</strong><br />

noise variance to determine the detection threshold. Detection techniques requiring<br />

the knowledge of a pilot sequence have better detection performance, but<br />

worse b<strong>and</strong>width/power/complexity efficiency. Detection techniques requiring<br />

the knowledge of the noise variance assume a white noise assumption <strong>and</strong> degrade<br />

severely in the presence of colored noise. Moreover, when the theoretical values<br />

of the threshold are not known, they have to be empirically computed by feeding<br />

the detector with pure noise signals <strong>and</strong> calculating the test statistic.<br />

In the proposed adaptive OFDMA MAC protocol, control <strong>and</strong> data packets<br />

are sent only over a subset of the available sub-carriers. Moreover, other unknown<br />

signals or colored noise can be present in the b<strong>and</strong>width of interest. We propose<br />

to use a modified version of the cyclic prefix based sliding window correlation detector<br />

to determine the presence of an OFDM signal in the b<strong>and</strong>width of interest.<br />

This detector does not require the knowledge of a pilot sequence but only requires


206 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

the knowledge of the OFDM parameters, i.e. number of subcarriers N, cyclic prefix<br />

size P. The detection threshold is based on the non-correlated part of the cyclic<br />

prefix sliding window correlation estimate instead of the noise variance. This allows<br />

detecting the presence of an OFDM signal even in the presence of an unknown<br />

signal in the b<strong>and</strong>width of interest. Moreover, this detector also gives an estimate<br />

of the OFDM timing offset when it is detected. Assuming a complex baseb<strong>and</strong><br />

signal with K blocks of N+P samples samples y = [y(k(N+P)),…,y((k+1)(N+P)-1)]<br />

with k = [0,…,K-1], the cyclic prefix sliding window correlation estimate is given by<br />

( ) <br />

K2 P1<br />

<br />

*<br />

| y( k( NP) j) y ( k( NP) jN)|<br />

k0<br />

j<br />

( K1)<br />

P<br />

2<br />

y<br />

(3)<br />

with σ 2 y the variance of the received complex baseb<strong>and</strong> signal. The absolute value<br />

of the correlation estimate is able to cope with frequency <strong>and</strong> phase offsets introduced<br />

by Doppler shifts <strong>and</strong> clock mismatches. The estimate of the timing offset<br />

is given by<br />

opt<br />

max ( )<br />

(4)<br />

{0,..., NP1}<br />

In order to determine the presence of an OFDM signal, the estimate of the timing<br />

offset is compared with the non-correlated part of the cyclic prefix sliding<br />

window correlation estimate. Assuming a channel delay spread spanning the entire<br />

cyclic prefix, the non-correlated part of the cyclic prefix sliding window correlation<br />

estimate is given by ρ(mod(θ opt + 2 P, N + P)). Assuming that the non-correlated<br />

part is a Gaussian distribution with mean m nc <strong>and</strong> variance σ 2 nc , the detection<br />

threshold η is given by<br />

m nc<br />

nc<br />

(5)<br />

with α an integer corresponding to the number of st<strong>and</strong>ard deviations necessary<br />

to discriminate between an OFDM signal <strong>and</strong> a non-OFDM signal using only<br />

the cyclic prefix sliding window correlation estimate ρ(θ). The detector scheme is<br />

opt<br />

( ) Presence of an OFDM signal<br />

(6)<br />

opt<br />

( ) Absence of an OFDM signal<br />

Using K = 50 blocks in the application, α has been set to 40, allowing very few<br />

false alarms <strong>and</strong> mis-detections.<br />

C. Blind OFDM demodulation<br />

The cyclic prefix sliding window correlation estimate can be used to estimate<br />

the frequency offset [24]


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

207<br />

opt 1<br />

opt<br />

( )<br />

2N<br />

After time <strong>and</strong> frequency offset corrections, the OFDM symbols are transformed<br />

to the frequency domain by the discrete Fourier transform (DFT) operation.<br />

As there is no interference between two consecutive OFDM symbols, we obtain independent<br />

sub-carriers with the following channel model<br />

Y ( kN i) H ( kN i) X ( kN i) N ( kN i)<br />

(8)<br />

with k = [0,…,K-1] <strong>and</strong> i = [0,…,N-1], in which Y(kN+i), H(kN+i), X(kN+i), <strong>and</strong><br />

N(kN+i) are respectively the demodulated data, the channel frequency response,<br />

the transmitted symbol <strong>and</strong> the noise for the block k <strong>and</strong> sub-carrier i. Assuming<br />

the channel invariant over the K blocks, a blind estimate of the channel amplitude<br />

is given by<br />

K1<br />

(7)<br />

opt 2 1<br />

2<br />

| H i<br />

| | Y ( kN i)|<br />

(9)<br />

K<br />

k0<br />

Assuming the channel invariant over the K blocks, a blind estimate of the phase<br />

offset can be obtained for M-PSK signals [25] by the following expression<br />

K1<br />

est 1<br />

M<br />

() i Y ( kN i)<br />

(10)<br />

K<br />

k0<br />

Modulation stripping has also been investigated for M-QAM signals in [26].<br />

Knowing the phase offset estimate for each sub-carrier, it is possible to correct<br />

linear shift of the phase in the frequency domain due to an incorrect timing offset<br />

estimate belonging to the ISI free region, as well as abrupt changes of the phase<br />

in the frequency domain due to the phase ambiguity introduced by the blind phase<br />

offset algorithm (phase unwrapping). The phase correction for M-PSK signals<br />

is performed using the Algorithm 1.


208 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

D. Distributed adaptive bit <strong>and</strong> power allocation<br />

The distributed bit <strong>and</strong> power allocation (adaptive QAM) can only be determined<br />

when a CR sends its control packet on the other CR best sub-channel. If CR 1<br />

best sub-channel is the same as CR 2 best<br />

sub-channel, then only one h<strong>and</strong>shake<br />

is necessary (RTS-CTS) to inform CR 1<br />

about CR 2 best sub-channel, bit <strong>and</strong><br />

power allocation. However, if CR 1 best<br />

sub-channel is different from CR 2 best<br />

sub-channel, two h<strong>and</strong>shakes are necessary<br />

(RTS-CTS-RTS-CTS) because CR 2<br />

informs CR 1 about its best sub-channel<br />

in the first CTS <strong>and</strong> the bit <strong>and</strong> power<br />

allocation in the second CTS. The distributed<br />

bit <strong>and</strong> power allocation is based on<br />

the waterfilling algorithm, in which an inner<br />

loop maximizes the bit allocation for<br />

a transmit power constraint, <strong>and</strong> an outer<br />

loop minimizes the transmit power for<br />

a target rate constraint. The algorithm<br />

for distributed bit <strong>and</strong> power allocation<br />

is described in Algorithm 2, in which<br />

λ is the Lagrangian parameter [27],<br />

Г is the SNR gap which measures the loss with respect to theoretically optimum<br />

performance [29], p = [p(0),…,p(N-1)] <strong>and</strong> p opt = [p(0) opt ,…, p(N-1) opt ] are the power<br />

allocation vectors, b opt = [b(0) opt ,…,b(N-1) opt ] is the bit allocation vector, P tot is the total<br />

power constraint, Δf is the sub-carrier b<strong>and</strong>width, R is the data rate <strong>and</strong> R target is the<br />

target rate constraint. As shown in [11, 12], when the number of sub-channels is lower<br />

than the number of concurrent links, CR users have to share the same sub-channels<br />

<strong>and</strong> iterative updates of bit <strong>and</strong> power allocation can lead to convergence problems<br />

due to multiple Nash equilibriums. To avoid this problem, the number of sub-channels<br />

is larger than the number of concurrent links to ensure the convergence to a single<br />

Nash equilibrium. This leads to a distributed adaptive OFDMA solution.<br />

IV. Implementation using QT4/IT++ <strong>and</strong> the UHD API<br />

In this Section, the implementation of the adaptive OFDMA PHY/MAC on<br />

USRP platforms using Qt4/IT++ <strong>and</strong> the UHD API is described. Several classes<br />

<strong>and</strong> procedures have been implemented for this application using QThread to enable<br />

multi-threading, Qwt to enable plotting, IT++ to enable mathematical operations,<br />

<strong>and</strong> Gstreamer to enable video/audio transmission <strong>and</strong> reception.


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

209<br />

A. Names <strong>and</strong> description of the implemented classes<br />

• Class BitWaterfilling. This class does the bit <strong>and</strong> power allocation according to<br />

spectrum sensed <strong>and</strong> estimated channel for a target rate constraint or a total<br />

power constraint.<br />

• Class BlindOFDM. This class gets a vector of bits from a named pipe (FIFO)<br />

coming from text, video, or audio in the application. It modulates this vector<br />

of bits into a fixed BPSK, QAM or an adaptive QAM OFDM vector according<br />

to its best group of subcarriers. It also performs a blind detection of a received<br />

OFDM vector based on the cyclic prefix, <strong>and</strong> blindly demodulates a received<br />

fixed BPSK, QAM or an adaptive QAM OFDM vector into a vector of bits<br />

according to its best group of subcarriers (blind time offset correction, blind<br />

frequency offset correction, blind phase offset estimation). Finally, it puts<br />

a vector of bits into a named pipe (FIFO) to be read by a text reader, video<br />

reader, audio reader in the application.<br />

• Class File. This class converts from/to characters to/from bits. It also reads/<br />

writes a vector of bits from/to a file.<br />

• Class MainWindow. This class is dedicated to the GUI thread. This class<br />

has a first push Button to Start/Stop Tx, a second push Button to Start/Stop<br />

Rx, <strong>and</strong> a third push Button to Start/Stop Video. It uses a lineEdit to take comm<strong>and</strong><br />

or to input text <strong>and</strong> textEdit to display some text. It also uses multiple<br />

lineEdits to control Tx rate, Tx frequency, Tx gain, Tx amplitude, Rx rate, Rx<br />

frequency, Rx gain, FFT size, CP size, <strong>and</strong> number of sub-channels.<br />

• Class Packets. This class does a conversion between vector of a double, float,<br />

integer <strong>and</strong> a vector of bits to include in the RTS/CTS packets. It encodes/<br />

decodes the RTS/CTS packets with necessary information (source address,<br />

destination address, best sub-channel, bit <strong>and</strong> power allocation).<br />

• Class Plot. This class plots some information (spectrum sensing, best group<br />

of sub-channels, target rate constraint, bit <strong>and</strong> power allocation).<br />

• Class Protocols. This class is dedicated to the worker thread (QThread).<br />

It can reinitialize the parameters as requested by the GUI (FFT size, CP size,<br />

number of sub-channels). This class implements a state machine for a Tx/Rx<br />

h<strong>and</strong>shaking adaptive OFDMA MAC protocol based on RTS sending/listening,<br />

CTS listening/sending <strong>and</strong> data sending/listening. It also performs a time offset<br />

estimation before RTS sending, CTS sending to avoid inter-carrier interference.<br />

• Class Sensing. This class estimates the spectrum based on averaged FFT. It takes<br />

a decision based on the mean spectrum estimated shifted by a fixed amount<br />

of dB, <strong>and</strong> selects the best group of sub-carriers according to the number<br />

of sub-channels.<br />

• Class Text. This class is implemented as a separate thread (QThread). It reads<br />

some input text in the GUI <strong>and</strong> put it in a named pipe (FIFO). It also displays<br />

some text in the GUI from a named pipe (FIFO).


210 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

• Class UHDDevice. This class reinitializes USRP parameters as requested<br />

in the GUI (Tx rate, Tx frequency, Tx gain, amplitude, Rx rate, Rx frequency,<br />

Rx gain). It reads a certain amount of samples at a particular time (timestamp).<br />

It writes a certain amount of samples at a particular time (timestamp).<br />

It also checks for errors after sending/receiving data. The procedures are<br />

implemented such that the received <strong>and</strong> transmitted samples are in a steady<br />

state for the USRP (first samples should be discarded because of the time to<br />

power up).<br />

• Class Video. This class is implemented as a separate thread (QThread). It uses<br />

a Gstreamer transmit pipeline showing the video transmitted on screen <strong>and</strong><br />

writing the same data in a named pipe (FIFO) which will be read by the OFDM<br />

modulator for transmission. It also uses a Gstreamer receive pipeline showing<br />

the video received on screen if a video container is detected.<br />

B. Description of the application<br />

Figure 1 shows the application window for spectrum sensing. The GUI parameters<br />

can be chosen during run-time. The transmission parameters are the Tx<br />

Rate in Msps, the Tx Frequency in MHz, the Tx Gain in dB, the Tx Amplitude<br />

corresponding to a linear multiplication factor. The reception parameters are the Rx<br />

rate in Msps, the Rx frequency in MHz, the Rx Gain in dB. The OFDM parameters<br />

are the FFT size, the CP size, <strong>and</strong> the number of sub-channels. There are two<br />

buttons to Start Tx <strong>and</strong> to Start Rx, which correspond to different state machines.<br />

The Tx state machine does a spectrum sensing, send RTS, receive CTS, <strong>and</strong> send<br />

data procedure, while the Rx state machine does a spectrum sensing, receive RTS,<br />

send CTS, <strong>and</strong> receive data procedure. The spectrum sensing is performed using<br />

the method of averaged periodograms (Barlett’s method) described in Section II.<br />

The red plot corresponds to the sub-carriers whose powers are larger than a decision<br />

threshold (in this case a mean decision threshold shifted by a fixed amount<br />

of dB). One can see a DC offset due to the USRP <strong>and</strong> some occupied sub-carriers<br />

between sub-carriers 320 <strong>and</strong> 340.<br />

Figure 2 shows one of the plots provided by the application. The different<br />

plots are the spectrum sensing <strong>and</strong> decision as shown in Figure 1 (Tab 1), the best<br />

sub-channel plot (Tab 2), the estimated channel amplitude plot (Tab 3), the power<br />

allocation plot (Tab 4), the bit allocation plot (Tab 5). For the system to work well,<br />

a good compromise should be taken between the FFT size, CP size, the expected<br />

frequency offset, <strong>and</strong> the number of OFDM symbols used for estimation of the channel.<br />

As shown on Figure 2, a good compromise has been found with an FFT<br />

size 512, CP size 128, <strong>and</strong> number of OFDM symbols 50 such that we get a very<br />

good estimate of the channel. This serves the bit <strong>and</strong> power allocation function to<br />

have accurate values since the spectrum sensing is based on average periodograms<br />

<strong>and</strong> the estimate of the channel is based on the average of multiple OFDM symbols.


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

211<br />

Figure 1. Application window for spectrum sensing<br />

Figure 2. Application window for channel estimation


212 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 3 shows the application window for text, video <strong>and</strong> audio (Tab 6). This<br />

tab is used to input some text, video or audio in a named pipe called ‘inputpipe’<br />

whenever the Tx state machine is launched. Once the enter comm<strong>and</strong> or the video<br />

button is pressed, the Tx state machine switches from a spectrum sensing state to<br />

a RTS sending state to initiate a communication. It is also used to output some text,<br />

video or audio from a named pipe called ‘outputpipe’ whenever the Rx state machine<br />

is launched. Once the enter comm<strong>and</strong> or the video button is pressed, the Rx state<br />

machine switches from a spectrum sensing state to a RTS listening state to receive<br />

a communication. After h<strong>and</strong>shaking between the two CRs, data can be received<br />

as shown on Figure 3.<br />

Figure 3. Application window for text, video <strong>and</strong> audio<br />

Future improvements of this application would be to implement other algorithms<br />

for spectrum estimates (Multitaper method, Welch, Hamming, Hanning...)<br />

<strong>and</strong> to implement decision algorithms based on noise estimation. However,<br />

a whitening approach might take a long time because of eigenvalue decomposition.<br />

Secondly, a comparison of the new OFDM signal detection algorithm with existing<br />

algorithms in the literature could also lead to an improvement of the application.<br />

Thirdly, it would be interesting to implement other algorithms for OFDM demodulation<br />

to compare different non-data-aided <strong>and</strong> data-aided approaches.


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

213<br />

V. Conclusion<br />

In this paper, we have proposed an adaptive OFDMA PHY/MAC on USRP platforms<br />

for a cognitive tactical radio network. In the first part of the paper, the adaptive<br />

OFDMA MAC protocol has been described, as well as the key function of the adaptive<br />

OFDMA PHY, i.e. the spectrum sensing, the OFDM signal detection, the blind<br />

OFDM demodulation <strong>and</strong> the distributed bit <strong>and</strong> power allocation. In the second part<br />

of the paper, the adaptive OFDMA PHY/MAC implementation on USRP platforms<br />

using Qt4/IT++ <strong>and</strong> the UHD API has been described. Several classes have been<br />

implemented, as well as support for text, video <strong>and</strong> audio transmission.<br />

References<br />

[1] J. Mitola III <strong>and</strong> G.Q. Maguire Jr., Cognitive Radio: Making Software Radios More<br />

Personal. IEEE Personal <strong>Communications</strong>, 6(4):13-18, 2009.<br />

[2] FCC. Spectrum Policy Task Force Report. ET Docket, (02-135), 2002.<br />

[3] O. Younis, L. Kant, A. McAuley, K. Manousakis, D. Shallcross, K. Sinkar,<br />

K. Chang, K. Young, C. Graff <strong>and</strong> M. Patel, Cognitive Tactical Network Models.<br />

IEEE <strong>Communications</strong> Magazine, 48(10):70-77, 2010.<br />

[4] E. Hossain <strong>and</strong> V. Bhargava, Eds., Cognitive Wireless Communication Networks.<br />

Springer, 2007.<br />

[5] W. Yu, G. Ginis <strong>and</strong> J. M. Cioffi, Distributed Multiuser Power Control for Digital<br />

Subscriber Lines. IEEE Journal on Selected Areas in <strong>Communications</strong>, 20(5):<br />

1105-1115, 2002.<br />

[6] F. Wang, M. Krunz <strong>and</strong> S.G. Cui, Price-based spectrum management in cognitive<br />

radio networks. IEEE Journal on Selected Areas in <strong>Communications</strong>, 2(1):74-87, 2008.<br />

[7] G. Scutari, D.P. Palomar <strong>and</strong> S. Barbarossa, Optimal linear precoding strategies<br />

for wideb<strong>and</strong> noncooperative systems based on game theory, part II: Algorithms.<br />

IEEE Transactions on Signal Processing, 56(3):1250-1267, 2008.<br />

[8] P. Setoodeh <strong>and</strong> S. Haykin, Robust Transmit Power Control for Cognitive Radio.<br />

Proceedings of the IEEE, 97(5):915-939, 2009.<br />

[9] R.H. Gohary <strong>and</strong> T.J. Willink, Robust IWFA for open-spectrum communications.<br />

IEEE Transactions on Signal Processing, 57(12):4964-4970, 2009.<br />

[10] M.i Hong <strong>and</strong> A. Garcia, Averaged Iterative Water-Filling Algorithm: Robustness<br />

<strong>and</strong> Convergence. IEEE Transactions on Signal Processing, 2011.<br />

[11] V. Le Nir <strong>and</strong> B. Scheers, Improved Coexistence between Multiple Cognitive<br />

Tactical Radio Networks by an Expert Rule based on Sub-channel Selection. Wireless<br />

Innovation Forum European Conference on <strong>Communications</strong> Technologies <strong>and</strong><br />

Software Defined Radio (SDR’11-WInnComm-Europe), Brussels, Belgium, 2011.<br />

[12] V. Le Nir <strong>and</strong> B. Scheers, Iterative Waterfilling Algorithm with Sub-channel<br />

Selection for the Coexistence of Multiple Cognitive Tactical Radio Networks. <strong>Military</strong><br />

<strong>Communications</strong> <strong>and</strong> <strong>Information</strong> Systems Conference (MCC’2011), Amsterdam,<br />

Nederl<strong>and</strong>s, 2011.


214 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

[13] J. Mo, H.W. So <strong>and</strong> J. Walr<strong>and</strong>, Comparison of Multichannel MAC Protocols. IEEE<br />

Transactions on Mobile Computing, 7(1):50-65, 2008.<br />

[14] Y. Lin, K. Liu <strong>and</strong> H. Hsieh, Design of Power Control Protocols for Spectrum Sharing<br />

in Cognitive Radio Networks: A Game-Theoretic Perspective. IEEE Conference on<br />

<strong>Communications</strong> (ICC’2010), Cape Town, South Africa, 2010.<br />

[15] L. Yang, W. Hou, L. Cao, B.Y. Zhao <strong>and</strong> H. Zheng, Supporting Dem<strong>and</strong>ing Wireless<br />

Applications with Frequency-agile Radios. Proceedings of the 7th USENIX Symposium<br />

on Networked Systems Design <strong>and</strong> Implementation, 2010.<br />

[16] J. Blanchette <strong>and</strong> M. Summerfiled, Eds., C++ GUI Programming with Qt 4,<br />

Second Edition. Prentice Hall, 2008.<br />

[17] IT++ project. http://itpp.sourceforge.net/current/index.html<br />

[18] “Universal Software Radio Peripheral” hardware driver. http://code.ettus.com/redmine/<br />

ettus/projects/uhd/wiki.<br />

[19] J.G. Proakis <strong>and</strong> D.G. Manolakis, Eds., Digital Signal Processing. Principles,<br />

Algorithms <strong>and</strong> Applications. 3rd Edition, Prentice Hall, 1996.<br />

[20] V. Le Nir, T. van Waterschoot, M. Moonen <strong>and</strong> J. Duplicy, Blind CP-OFDM <strong>and</strong><br />

ZP-OFDM parameter estimation in frequency selective channels. EURASIP Journal<br />

on Wireless <strong>Communications</strong> <strong>and</strong> Networking vol. 2009, Article ID 315765, 10 pages<br />

doi:10.1155/2009/315765, 2009.<br />

[21] S. Chaudhari, V. Koivunen <strong>and</strong> H.V. Poor Autocorrelation-Based Decentralized<br />

Sequential Detection of OFDM Signals in Cognitive Radios. IEEE Transactions on<br />

Signal Processing, 57(7):2690-2700, 2009.<br />

[22] D. Danev, On Signal Detection Techniques for the DVB-T St<strong>and</strong>ard. Proceedings<br />

of the 4th International Symposium on <strong>Communications</strong>, Control <strong>and</strong> Signal Processing<br />

(ISCCSP’2010), Limassol, Cyprus, 2010.<br />

[23] D. Danev, E. Axell <strong>and</strong> E.G. Larsson, Spectrum sensing methods for detection<br />

of DVB-T signals in AWGN <strong>and</strong> fading channels. Proceedings of the IEEE 21st<br />

International Symposium on Personal Indoor <strong>and</strong> Mobile Radio <strong>Communications</strong><br />

(PIMRC’2010, Istanbul, Turkey, 2010.<br />

[24] J. van de Beek, M. S<strong>and</strong>ell <strong>and</strong> P.O. Borjesson, ML Estimation of Time <strong>and</strong><br />

Frequency Offset in OFDM Systems. IEEE Transactions on Signal Processing,<br />

45(7):1800-1805, 1997.<br />

[25] H. Meyr, M. Moeneclaey, <strong>and</strong> S.A. Fechtek, Eds., Digital <strong>Communications</strong><br />

Receivers: Synchronization, Channel Estimation, <strong>and</strong> Signal Processing. John Wiley<br />

<strong>and</strong> Sons, 1998.<br />

[26] M. Rezki, L. Sabel <strong>and</strong> I. Kale, High Order Modulation Stripping for Use<br />

by Synchronisation Algorithms in Communication Systems. Proceedings<br />

of the Instrumentation <strong>and</strong> Measurement <strong>Technology</strong> Conference (IMTC’2003,<br />

Vail, USA, 2003.<br />

[27] S. Boyd <strong>and</strong> L. V<strong>and</strong>enberghe, Convex Optimization. Cambridge University Press,<br />

2004.<br />

[28] John M. Cioffi, A Multicarrier Primer. ANSI Contribution T1E1.4/91-157, 1991.


Validation of the ITU 1546 L<strong>and</strong>-Sea<br />

Propagation Model for the 900 MHz B<strong>and</strong><br />

Krzysztof Bronk 1 , Rafał Niski 1 , Jerzy Żurek 1 , Maciej J. Grzybkowski 2<br />

1 National Institute of Telecommunication,<br />

Wireless Systems <strong>and</strong> Networks Department, Gdansk, Pol<strong>and</strong>,<br />

{K.Bronk, R.Niski, J.Zurek}@itl.waw.pl<br />

2 National Institute of Telecommunication,<br />

Electromagnetic Compatibility Department, Wroclaw, Pol<strong>and</strong>, mag@il.wroc.pl<br />

Abstract: The article discusses the accuracy of the ITU-1546 l<strong>and</strong>-sea propagation model for<br />

the 900 MHz b<strong>and</strong>. This analysis is mainly based on the measurement results which were compared<br />

with the data resulting from the theoretical model. This paper is comprised of four sections. Firstly,<br />

the measurement methodology <strong>and</strong> scenarios are described. In the next section, the method of field<br />

strength calculations for the mixed paths, introduced by the ITU, is briefly explained. The next, <strong>and</strong><br />

most important, part is filled with the comparison (<strong>and</strong> statistical analysis) of the theoretical <strong>and</strong><br />

measured field strength values, which allows to evaluate the model. Finally, in the last section, a short<br />

conclusion is presented.<br />

Keywords: component; l<strong>and</strong>-sea propagation model, validation, measurements, GSM 900<br />

I. Introduction<br />

The following article presents the selected results of the extensive measurement<br />

campaign at the Baltic Sea waters conducted as a part of the EfficienSea project [5, 6].<br />

All the activities described in this paper were carried out by the National Institute<br />

of Telecommunications (NIT) in cooperation with other EfficienSea partners, i.e.:<br />

Maritime Office in Gdynia – MOG <strong>and</strong> Gdynia Maritime University – GMU.<br />

The campaign took place in the second half of 2011 <strong>and</strong> comprised four<br />

parts lasting from one to five days, during which a total of over 40 000 measurement<br />

points have been gathered. For the purpose of this campaign two ships have<br />

been utilised: MS “Tucana” (operated by the MOG) – during the 1st <strong>and</strong> 2nd part<br />

of the campaign <strong>and</strong> MS “Horyzont II” (operated by the GMU) – during the 3rd<br />

<strong>and</strong> 4th part respectively.<br />

The whole measurement campaign covered selected radiocommunications<br />

systems available at sea, including 2G/3G, TETRA, Telenor VHF Data, Iridium.<br />

In this paper the authors present some results for the GSM 900 system only.


216 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

In the subsequent part of this paper the measurement methodology <strong>and</strong> measurement<br />

devices set will be presented. After that, the method of propagation loss<br />

evaluation for the mixed propagation paths, based on the ITU 1546 recommendation,<br />

will be discussed. Finally, a comparative analysis of the measurement results <strong>and</strong><br />

the results of the predicted communication ranges, obtained from the computations<br />

(performed with the software tool created by the NIT) will be presented.<br />

II. Field strength measurements<br />

As the part of the EfficienSea project activities, the measurement campaigns<br />

at the Baltic Sea waters were conducted. The main goal of them was to analyse<br />

the coverage, availability, type <strong>and</strong> quality of the 2G/3G data transmission services<br />

offered by one of the Polish cellular providers at the Polish coastal waters (especially<br />

at the Bay of Gdansk <strong>and</strong> along the Polish coast line, see Fig. 7). The most<br />

important output of this measurements was an indication which data transmission<br />

services (EDGE, UMTS or HSPA) were available in the particular area of interest.<br />

Besides that, a big number of additional information have been obtained, such as:<br />

the actual achievable throughputs (for uplink <strong>and</strong> downlink), ping values, signal<br />

levels, Cell-IDs, etc.<br />

The measurement set for this part of the campaign can be schematically<br />

depicted as in Fig. 1.<br />

Figure 1. The measurement set for 2G/3G systems tests


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

217<br />

The central <strong>and</strong> most important element of the measurement set was an application<br />

module. This software tool (developed by the NIT for the purposes of this<br />

campaign) h<strong>and</strong>led all the functions connected with control over the equipment <strong>and</strong><br />

FTP client, triggered the subsequent steps of the measurement algorithm, performed<br />

the necessary calculations <strong>and</strong> stored the results. It also had a very strong capability<br />

of detecting <strong>and</strong> h<strong>and</strong>ling errors <strong>and</strong> unexpected situations, so consequently<br />

the whole measurement process was as automatic as possible.<br />

The user interface of this application is presented in Fig. 2. In this picture<br />

the main functions of each of the modules are indicated.<br />

Figure 2. User interface of measurement software tool


218 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The second part of the measurement set was the GSM/UMTS module, based<br />

on the Dev Kit platform by Sierra Wireless, which was originally manufactured for<br />

telecommunication devices testing. This platform was equipped with a card slot<br />

supporting both regular modems as well as professional ones for measurement<br />

purposes. On the Dev Kit platform, a GSM/UMTS MC-8795V card was installed,<br />

which supported HSPA data transmission with rates up to 7.2 Mb/s (downlink)<br />

<strong>and</strong> 5.76 Mb/s (uplink). The communication between the application module <strong>and</strong><br />

the GSM/UMTS module was based on the AT comm<strong>and</strong>s.<br />

The Dev Kit platform <strong>and</strong> the MC-8795V card are depicted in Fig. 3.<br />

Figure 3. The Dev Kit platform <strong>and</strong> the MC-8795V card<br />

Another part of the measurement set was the GPS module Holux M-215<br />

– a USB wired GPS receiver equipped with a MTK chipset, which supported the data<br />

transmission protocol NMEA0183 v.3.01. The module’s sensitivity was 159 dBm<br />

<strong>and</strong> the cold-start time was 36 seconds.<br />

The additional parts of the measurement set were the Anritsu MS2721B<br />

Spectrum Analyzer (high-performance h<strong>and</strong>held spectrum analyzer, operating<br />

in the frequency range of 9 kHz ÷ 7.1 GHz, suitable for a great variety of RF, microwave<br />

or cellular signal measurements, even in the harsh physical environment)<br />

<strong>and</strong> a highly-precise, calibrated antenna SAS-521F-7 by A.H. Systems.<br />

The methodology of the measurement was as follows. In the NIT premises<br />

in Gdansk, an external FTP server (connected to the Internet via a very fast fibre<br />

connection) has been activated, <strong>and</strong> 13 test files have been uploaded into it.<br />

Those files contained some r<strong>and</strong>om data <strong>and</strong> they varied in size (the possible sizes<br />

of the test files were: 10 kB, 25 kB, 50 kB, 100 kB, 250 kB, 500 kB, 1 MB, 2,5 MB,<br />

5 MB, 10 MB, 25 MB, 50 MB <strong>and</strong> 100 MB). The rest of the necessary measurement<br />

equipment was placed aboard the ship.<br />

Using the GSM/UMTS/HSPA Module, a radio link between the ship <strong>and</strong><br />

the External FTP server was established. The module was able to work in a few<br />

modes: preferred 2G or 3G or the best available service (EDGE/UMTS/HSPA),<br />

which gave an instant information about the services available in a given area.


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

219<br />

After establishing the connection, it was possible to start a bi-directional data<br />

transmission between FTP ship <strong>and</strong> to measure its duration. In order to test<br />

the downlink transmission, the application module started to download a file<br />

from the FTP server; to test the uplink transmission, the same file was uploaded<br />

into the FTP. The size of the file that was being transmitted in a given moment<br />

was not r<strong>and</strong>om, but selected by the application module according to the special<br />

algorithm. If the available throughput was low, the file size was gradually decreased,<br />

so that the duration of a single measurement was not excessively long;<br />

on the other h<strong>and</strong>, if the throughput increased, it was also possible to increase<br />

the size of a test file, so the file size was being changed adaptively. When the transmission<br />

was complete, the software calculated the real throughput (separately for<br />

downlink <strong>and</strong> uplink), which was done through dividing the (known) file size by<br />

the (measured) transmission duration. The GSM/UMTS/HSPA modem allowed<br />

to obtain some additional parameters as well, i.e.: signal level (in dBm), number<br />

of the utilized GSM/UMTS channel <strong>and</strong> Cell ID. Through the ICMP protocol,<br />

the value of the ping was also extracted.<br />

Additionally, the application module was connected with the Anritsu MS2721B<br />

programmable spectrum analyzer to enable the optional channel power measurements.<br />

An integral part of the measurement set was a GPS module which provided<br />

a precise location- <strong>and</strong> time-stamp for every single measurement record (additionally,<br />

the current speed in km/h, course in degrees <strong>and</strong> altitude in m AMSL were obtained).<br />

After finishing a complete set of a measurement, the application module created<br />

a record with the results. Every record comprised the following information:<br />

• Date <strong>and</strong> time of the measurement;<br />

• Geographic coordinates (longitude <strong>and</strong> latitude);<br />

• Direction of radio link (downlink/uplink);<br />

• Measured transmission throughput [in kb/s];<br />

• Measurement duration [in ms];<br />

• Amount of transmitted data [in bytes];<br />

• Ping [in ms];<br />

• Available service [EDGE/HSPA/UMTS];<br />

• Signal level [in dBm];<br />

• Speed [in km/h];<br />

• Course [in deg];<br />

• Altitude [in m AMSL];<br />

• Cell ID;<br />

• Nr of GSM/UMTS channel;<br />

• Channel power [in dBm].<br />

Since the spectrum analyzer made its own measurements as well, it also created<br />

a log file with the results. The analyzer was also equipped with an in-built GPS<br />

receiver, so every record in this log file was marked with a time-stamp <strong>and</strong> precise<br />

geographic coordinates of the point where the current measurement took place.


220 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

In some measurement campaigns it was not possible to use the spectrum<br />

analyser, therefore to obtain the same conditions of received signal lever measurements,<br />

the modem measurement method was chosen. Moreover, the modem<br />

provided additional parameters which were important part of the measurements.<br />

It should also be noted that all measurements were performed on the move,<br />

<strong>and</strong> the ship’s speed was not greater than 20 km/h.<br />

III. Method of mixed path field strength calculations<br />

The results of the radio wave field strength measurements in the 900 MHz<br />

b<strong>and</strong>, carried out for the mixture of l<strong>and</strong> <strong>and</strong> see paths, have been compared to<br />

the field strength calculations performed according to the method provided by<br />

the ITU-R P.1546-4 Recommendation [1]. In this Recommendation, the mixedpath<br />

method of calculations utilises the values of E l (d) <strong>and</strong> E s (d) to represent<br />

the field strength at a specific distance d from the transmitting antenna. The additional<br />

factor, i.e. the representative clutter height, R, for all-l<strong>and</strong> <strong>and</strong> all-sea paths<br />

respectively, interpolated for transmitting/base antenna height h 1 , as well as for<br />

frequency (900 MHz) <strong>and</strong> percentage time (50%), has been used as required.<br />

The receiving/mobile antenna height used for the purpose of the calculations<br />

was equal to the real height of the antenna mounted at the shipboard on the level<br />

of 10 meters over sea surface.<br />

The mixed path field strength, E [dB(μV/m)], has been evaluated in line<br />

of the ITU method [1] as:<br />

<br />

E 1A El dT A Es dT<br />

(1)<br />

where:<br />

d T – total distance between transmitter <strong>and</strong> receiver [km],<br />

E l – field strength calculated for l<strong>and</strong> path zone at the distance d T [dB(μV/m)],<br />

E s – field strength calculated for see path zone at the distance d T [dB(μV/m)],<br />

A – mixed path interpolation factor, given by formula:<br />

2/3<br />

where the fraction of path over sea, F sea , is given by:<br />

<strong>and</strong> the factor V is expressed by:<br />

A[1 1 F ] V<br />

sea<br />

(2)<br />

F<br />

d<br />

sT<br />

sea<br />

(3)<br />

dT<br />

<br />

V max1.0,1.0<br />

40.0<br />

<br />

(4)


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

221<br />

with:<br />

<br />

N<br />

d<br />

d<br />

M<br />

s<br />

l<br />

sn<br />

lm<br />

Esn dT Elm dT<br />

<br />

(5)<br />

n1 sT m1<br />

where:<br />

E sn (d T ) – field-strength value [dB(µV/m)] for distance d T , assumed to be all of sea<br />

or coastal-l<strong>and</strong> zone type n,<br />

E lm (d T ) – field-strength value [dB(µV/m)] for distance d T , assumed to be all of l<strong>and</strong><br />

zone type m.<br />

The length of total propagation path d T is equal to:<br />

d<br />

d<br />

dT dsT dlT<br />

(6)<br />

where:<br />

d d – total length of sea <strong>and</strong> coastal l<strong>and</strong> paths traversed by radio<br />

d<br />

sT<br />

lT<br />

n<br />

m<br />

sn<br />

lm<br />

wave [km]<br />

lT<br />

(7a)<br />

d – total length of l<strong>and</strong> paths traversed by radio wave [km] (7b)<br />

When the radio path consists of two parts of l<strong>and</strong> or sea zones, then N s =2<br />

<strong>and</strong> M s =2 respectively. When a mixed path includes only one l<strong>and</strong> <strong>and</strong> only one<br />

sea zone, then N s =M s =1. Only those types of paths (see Fig. 7) were taken into<br />

consideration during the mixed radio path field strength calculations. A detailed<br />

method to determine the particular field strength values E (E l or E s ), using the field<br />

strength versus distance curves, valid for the l<strong>and</strong> <strong>and</strong>/or see paths, is described<br />

in the ITU-R P.1546-4 Recommendation.<br />

The mixed path field strength calculations were conducted by means of the Digital<br />

Terrain Model (DTM) of Polish coast <strong>and</strong> Baltic Sea. DTM model SRTM-3 with<br />

the 3 seconds resolution, which means, for areas in Pol<strong>and</strong>, a rectangle of the size<br />

60x90 meters, has been used during these calculations.<br />

The comparison of the mixed path field strength calculations’ results obtained<br />

for the 900 MHz frequency b<strong>and</strong> at the distance up to 37 km from the transmitting<br />

antenna are illustrated in the next section. These results were necessary<br />

to validate the quality of the mixed path field strength prediction provided by<br />

the ITU 1546 method.<br />

IV. Comparison of results of measurements <strong>and</strong> field strength<br />

calculations<br />

All the presented measurements were carried out on board the MS Horizon II<br />

ship (see Fig. 4). The antennas of the measurement set were placed 10 m AMSL


222 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

<strong>and</strong> the measurement route was within the Bay of Gdansk <strong>and</strong> along the east part<br />

of the Polish coastline – measurement locations are depicted in Fig. 7. For the further<br />

analysis, eight GSM 900 base stations (for which the distance from the sea was at<br />

least 5 km) have been selected. The BTSs’ parameters obtained from the network<br />

operator are given in the Table 1. In the considered case, the measurement points<br />

for seven stations correspond to the path profile type 1 (l<strong>and</strong> – sea) <strong>and</strong> for one<br />

station the type 2 of the profile is more suitable (l<strong>and</strong> – sea – l<strong>and</strong> – sea). For all<br />

of the stations the statistical analysis of the obtained field strength measurements<br />

results has been conducted. The input parameter, i.e. the difference between the calculated<br />

<strong>and</strong> measured field strength values, ΔE, is given as follows:<br />

EE1546 E meas<br />

[dB]<br />

(8)<br />

where E 1546 denotes the median of the field strength calculated on the basis of the<br />

ITU 1546 model <strong>and</strong> E meas indicates the field strength value obtained in the measurements.<br />

The levels (values) of the electric field strength E were calculated on the basis<br />

of the parameters shown in table 1 (including BTS antenna’s characteristics),<br />

in the software tool developed by the NIT [2], in which the newest version of the<br />

ITU 1546-4 Recommendation was implemented.<br />

In Figs. 6 <strong>and</strong> 7 the values of ΔE as a function of distance for different<br />

types of the path profile were shown. It is noteworthy that the red line denotes<br />

the mean value <strong>and</strong> the green ones represent the st<strong>and</strong>ard deviation.<br />

Figure 4. Horyzont II – the ship utilized during the measurement campaign


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

223<br />

Figure 5. Dependence of ΔE on distance for propagation path type 1<br />

Figure 6. Dependence of ΔE on distance for propagation path type 2<br />

Figure 7. Measurement area


224 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Table I. BTS information obtained form the network operator<br />

BTS Name BTS1 BTS2 BTS3 BTS4 BTS5 BTS6 BTS7 BTS8<br />

Longitude [deg] 16,55 17,90 17,90 18,46 18,47 18,56 18,64 19,61<br />

Latitude [deg] 54,48 54,74 54,74 54,50 54,47 54,34 54,36 54,29<br />

Terrain height [m] AMSL 59 67 67 142 140 127 43 102<br />

GSM channel 66 59 49 65 50 65 56 65<br />

Antenna height [m] AGL 46 48 49 39 35 16 23 49<br />

Antenna azimuth [deg] 330 330 60 70 145 60 60 300<br />

Antenna type K 739650 K 739650 K 730691 K 739 685 K 742 272 K 739622 K 742264 K 730691<br />

EIRP [dBW] 27,5 26,9 27,2 27,1 27,9 26,3 25,2 26,8<br />

Table II. Detailed analysis results<br />

BTS Name BTS1 BTS2 BTS3 BTS4 BTS5 BTS6 BTS7 BTS8<br />

Measurements number 390 75 118 141 24 26 19 53<br />

Path type 1 1 1 1 1 1 1 2<br />

Min path length 29,8 15,7 16,4 26,9 26,6 19,7 16,9 28,1<br />

Max path length 36,7 16,4 30,2 35,6 33,4 23,5 34,1 33,2<br />

ΔE min [dB] -6,5 -11,5 -12,5 -10,5 -10,5 -11,5 -13,5 -6,5<br />

ΔE max [dB] 8,5 -0,5 -0,5 -5,5 0,5 -4,5 -0,5 8,5<br />

average of ΔE [dB] 2,3 -5,2 -7,1 -8,1 -4,4 -7,9 -4,6 -0,2<br />

RMSE [dB] 3,0 2,6 2,9 1,1 4,1 1,7 3,7 2,9


Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />

225<br />

Table 2 presents the results of the analysis, i.e.: number of measurements,<br />

minimum <strong>and</strong> maximum distance between measurement points <strong>and</strong> BTSs (length<br />

of the radio path), minimum <strong>and</strong> maximum ΔE values as well as the average value<br />

of the ΔE <strong>and</strong> RMSE.<br />

In the Table 3 the summary results of the measurement errors, for both types<br />

of the path profile as well as for all measurement points, are presented.<br />

Table III. Overall analysis results<br />

BTS Name BTS1-7 BTS8 All<br />

Measurements number 793 53 846<br />

Path type 1 2 1 & 2<br />

Min path length 15,7 28,1 15,7<br />

Max path length 36,7 33,2 36,7<br />

ΔE min [dB] –13,5 –6,5 –13,5<br />

ΔE max [dB] 8,5 8,5 8,5<br />

average of ΔE [dB] –2,4 –0,2 –2,2<br />

RMSE [dB] 5,4 2,9 5,3<br />

The obtained results show a very good agreement of the measurement data<br />

with the results obtained from the mathematical model introduced by the ITU<br />

in the recommendation 1546-4. It is proved by the small values of the average error<br />

ΔE, which amounts to –2,4 dB for the propagation paths of type 1 (l<strong>and</strong>-sea) <strong>and</strong><br />

–0,2 dB for the propagation paths of type 2 (l<strong>and</strong>-sea-l<strong>and</strong>-sea), as well as –2,2 dB<br />

on average. Negative values of the average ΔE mean that in most cases the measured<br />

level of the signal strength was higher than expected.<br />

Additionally, the relatively small values of the RMS error, which are respectively:<br />

5,4 dB for propagation path type 1, 2,9 dB for type 2 <strong>and</strong> 5,3 dB on average<br />

verify positively the correctness of the measurement method <strong>and</strong> reproducibility<br />

of the measurements. Both values (average <strong>and</strong> RMS errors) are smaller for<br />

the propagation paths type 2, which might suggest that for these type the correctness<br />

of the model is better. On the other h<strong>and</strong>, it must be mentioned that the number<br />

of the measurements for the propagation path type 1 was 793, whereas for type 2<br />

it was almost 15 times less, merely 53.<br />

V. Conclusions<br />

In the paper the comparative analysis of the ITU 1546 l<strong>and</strong>-sea propagation<br />

model for the 900 MHz b<strong>and</strong> <strong>and</strong> the actual field strength measurements results<br />

has been presented. An important part of this research was a statistical analysis,<br />

which allowed to validate the accuracy of the ITU 1546 model.


226 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The comparative research <strong>and</strong> measurement [3,4], which has been carried<br />

out earlier by the authors in the maritime VHF b<strong>and</strong>, showed that the measured<br />

signal level was higher than the level calculated according to the method described<br />

in the recommendation ITU 1546. In this case the differences were from several to<br />

dozen dBs. It proves, yet again, that for the l<strong>and</strong>-sea paths in the 900 MHz b<strong>and</strong>,<br />

the discussed model is slightly underestimated.<br />

To make the comparison more reliable it would be advisable to assess <strong>and</strong><br />

consider the type of the environment in which BTSs are located. This issue is addressed<br />

in the authors’ current research activities.<br />

Acknowledgment<br />

The measurement results utilised in this paper have been obtained as part<br />

of the EfficienSea project, partially financed by the EU Baltic Sea Region<br />

2007-2013 Programme.<br />

References<br />

[1] ITU-R, Method for Point-to-Area Predictions for Terrestrial Services in the Frequency<br />

Range 30 MHz to 3000 MHz, Recommendation ITU-R P.1546-4, Geneva, 10/2009.<br />

[2] R. Niski, K. Bronk, J. Stefański, Opracowanie narzędzia programowego do<br />

prognozowania zasięgów stacji brzegowych dla potrzeb radiokomunikacji morskiej<br />

(nr 08300047) Instytut Łączności – Państwowy Instytut Badawczy, 2007.<br />

[3] R. Niski, J. Żurek, New empirical model of propagation path loss for the Baltic Sea<br />

in the marine VHF frequency b<strong>and</strong> (Polish Journal of Environmental Studies) HARD,<br />

Olsztyn 2007, no. 4B, vol. 16, pp. 143-145.<br />

[4] R. Niski, J. Żurek, Empiryczna weryfikacja modeli propagacyjnych w strefie<br />

przybrzeżnej Morza Bałtyckiego (Zeszyty Naukowe Wydziału Elektroniki,<br />

Telekomunikacji i Informatyki Politechniki Gdańskiej. Radiokomunikacja, Radiofonia,<br />

Telewizja) Politechnika Gdańska, Gdańsk 2007, nr 1, s. 117-120.<br />

[5] Communication for e-Navigation – results of the tests <strong>and</strong> measurements, E-Navigation<br />

Underway 2012 Conference, 18-20 January 2012, Copenhagern – Oslo – Copenhagen.<br />

[6] A. Lipka, K. Bronk, R. Niski, Measurement campaign at the Baltic Sea, 2012,<br />

EfficienSea report.


Chapter 7<br />

Mobile Ad-hoc<br />

<strong>and</strong> Wireless Sensor Networks


Algorithms for Channel <strong>and</strong> Power Allocation<br />

in Clustered Ad hoc Networks<br />

Luca Rose 1 , Christophe J. Le Martret 1 , Mérouane Debbah 2<br />

1 Thales <strong>Communications</strong> <strong>and</strong> Security, France,<br />

{luca.rose, christophe.le_martret}@thalesgroup.com<br />

2 Alcatel – Lucent Chair in Flexible Radio, Supelec, France,<br />

merouane.debbah@supelec.fr<br />

Abstract: In the context of mobile clustered ad hoc networks, this paper proposes <strong>and</strong> studies a self-<br />

-configuring algorithm which is able to jointly set the channel frequency <strong>and</strong> power level of the transmitting<br />

nodes, by exploiting one bit of feedback per receiver. This algorithm is based upon a learning<br />

algorithm, namely trial <strong>and</strong> error, that is cast into a game theoretical framework in order to study its<br />

theoretical performance. We consider two different feedback solutions, one based on the SINR level<br />

estimation, <strong>and</strong> one based on the outcome of a CRC check. We analytically prove that this algorithm<br />

selects a suitable configuration for the network, <strong>and</strong> analyse its performance through numerical<br />

simulations under various scenarios.<br />

I. Introduction<br />

In recent times, the interest for technological solutions which allow communications<br />

to happen in difficult conditions, e.g. without the aid of a central controller,<br />

has gained much momentum. The development of cognitive radios (CR), devices<br />

able to sense their environment <strong>and</strong> to modify their configuration in accordance,<br />

has made this a reality.<br />

On operational theatres, the presence of a fixed central controller infrastructure,<br />

for instance a base station, configuring the whole network is difficult to implement<br />

<strong>and</strong> is not desirable for the weakness it presents against potential enemies. Moreover,<br />

one can expect future equipments on the battlefield to be able to exploit the free<br />

spectrum to communicate <strong>and</strong> to keep their transmit power as low as possible.<br />

The goal is both minimizing their spatial frequency footprint, avoiding to pollute<br />

transceivers from other networks, <strong>and</strong> reducing the battery drain while achieving<br />

a certain Quality of Service (QoS). The concept of cognitive, self-configuring ad hoc<br />

network, thus, is a c<strong>and</strong>idate solution to all of the above challenges.<br />

In our work, we consider clustered ad hoc networks where the nodes are grouped<br />

into subsets (clusters), each of which is led by a cluster head (CH). We assume


230 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

that all the clusters share the same frequency b<strong>and</strong>, each CH being in charge of allocating<br />

sub-channels of the common resource to the multiple transmitter-receiver<br />

links that need to be operated within its cluster.<br />

The CH, basically, fulfils two purposes: () i it selects a frequency-channel <strong>and</strong><br />

a power level to be employed by the devices within its control zone, ( ii ) it manages<br />

the intra-cluster communication by allocating logical sub-channels to each link.<br />

Thus we can consider our system as locally centralized, <strong>and</strong> globally distributed.<br />

In order to do so, we assume that the CH only relies on local information, without<br />

any form of cooperation or explicit coordination with the other CHs. This reduces<br />

the amount of signalling dem<strong>and</strong>ed <strong>and</strong> makes the network more resistant to jamming<br />

attacks. For the same reasons, we need to minimize the amount of feedback<br />

between the CH <strong>and</strong> the nodes under its control.<br />

The closest works to ours are [1-4]. In [1] an algorithm for interference avoidance<br />

is presented assuming an underlying clustered ad hoc network. The algorithm<br />

sets the frequency channel, leaving to the CH the duty to choose the power based<br />

on the needs of the cluster’s devices. The authors assume the clusters to be far<br />

apart from each other in such a way that the interference created form one cluster<br />

to another does not depend on the actual transmitters location. In [2], authors<br />

consider <strong>and</strong> present a trial <strong>and</strong> error (TE) algorithm, <strong>and</strong> analytically study its<br />

convergence properties. There, the scenario under analysis is composed of a group<br />

of communicating links, without considering the structure of a clustered network.<br />

In [3], authors suggest the use of iterative water filling (IWF) to allocate sub-channels<br />

<strong>and</strong> power in order to achieve a certain QoS, measured in terms of achievable rate.<br />

The authors assume a system with low interference, i.e., interferers very distant<br />

from each other, such that the convergence of the IWF could be insured. In [4],<br />

authors consider a clustered network where, in each cluster, a single transmitter<br />

broadcasts to the other nodes. In this work, each transmitter allocates its power<br />

using an IWF strategy aiming at maximizing the weighted mean of the throughputs.<br />

In a clustered network with many transmitters <strong>and</strong> only one decision maker, it is<br />

not practical to implement such a water-filling strategy. Indeed, this would require<br />

all the receivers to feedback to the decision maker their channel state information.<br />

Thus, this strategy requires a large amount of signalling to allow the CH to evaluate<br />

the correct power allocation. Moreover, there exists a sufficient literature, e.g. [4-6]<br />

showing that, in decentralized networks, the operating point achieved through<br />

IWF is often less efficient than the one achieved through spectrum segregation,<br />

i.e. forcing each link to operate only on a small fraction of the available b<strong>and</strong>width.<br />

In our paper, we present <strong>and</strong> detail an algorithm which, when employed by all<br />

the CHs, is able to set the network channel <strong>and</strong> power configuration by exploiting<br />

the information of only one bit feedback per receiver. This algorithm, namely trial<br />

<strong>and</strong> error learning algorithm, has been studied in [2] under the assumption of a static<br />

scenario (i.e., time invariant channel, fixed power gains <strong>and</strong> network topology),<br />

with the transceivers aiming at achieving a certain SINR to fulfil a given QoS.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

231<br />

In this paper, we study several scenarios taking into consideration cluster<br />

mobility as well as more realistic communication performance metrics. We show<br />

the capability of the proposed algorithm to statistically steer the network into a state<br />

where clusters next to each other employ different channels.<br />

Therefore, the main contributions of this paper are the following: () i we detail<br />

a self configuring algorithm by defining all its parameters; ( ii ) we study its behaviour<br />

under several scenarios; ( iii ) we compare two ways of measuring transmission<br />

success, either by comparing the estimated SINR to a target or by considering<br />

packet integrity through cyclic redundancy check (CRC) of the transmitted packet;<br />

( iv ) through numerical simulations, we estimate the optimal number of spectral<br />

resources, (i.e., channels) the network should be providing for the algorithm to well<br />

perform.<br />

The paper is organized as follows. In Sec. II we present the general model of an<br />

ad hoc network <strong>and</strong> provide its associated game-theoretical model in Sec. III. In Sec.<br />

IV we briefly describe the resource allocation algorithm <strong>and</strong> we show the test bench<br />

scenarios in Sec. V providing the results of the experiment in Sec. VI. Finally, we<br />

conclude our work in Sec. VII.<br />

II. System model<br />

In this work, we consider a network populated with<br />

of which composed by<br />

links (transmitter-receiver pairs), with<br />

clusters, each<br />

N<br />

N<br />

K<br />

N .<br />

k k k<br />

Let 1, 2, , K<br />

<br />

k<br />

1, 2, ,<br />

N<br />

the set<br />

k<br />

of links within an arbitrary cluster . The nodes communicate by sharing a common<br />

spectrum, thus creating mutual interference. The overall spectrum is divided<br />

into channels, <strong>and</strong> we denote by 1, 2, ,C<br />

the set of available channels.<br />

Each cluster, say , is managed by its CH, which selects its transmission setting,<br />

i.e., a channel <strong>and</strong> a power level , to be used by all the devices belonging<br />

to the cluster. The power level is chosen among a finite set of possible power<br />

levels 0, , P MAX<br />

, where P<br />

MAX<br />

is the maximum amount of power that can be<br />

used by a transmitter device. The CH divides the selected channel, , into N<br />

sc<br />

orthogonal logical sub-channels <strong>and</strong> assigns them to the links to avoid intra-cluster<br />

interference. Assuming a time division multiple access scheme (slotted frame),<br />

each CH allocates to each link a set of sub-channels per slot, as depicted in Fig. 1.<br />

We define by the set of sub-channels allocated to link <strong>and</strong> by an arbitrary<br />

element of . In every cluster we also assume that the transmit power on each<br />

sub-channel is constant for all the links.<br />

indicates the set of clusters <strong>and</strong> <br />

k<br />

k


232 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 1. Sub-channel assignment instance. Each different colour corresponds to a different link<br />

We consider flat <strong>and</strong> block fading channels, i.e., channels power gain is both<br />

time <strong>and</strong> frequency invariant for the whole duration of one transmission. As such,<br />

the level of multiple access interference (MAI) in each sub-channel suffered by<br />

a receiving node, for instance the receiving node of link , on the sub-channel<br />

is given by the sum of the interference created by all the transmitters which employ<br />

the same sub-channels at the same time, that is:<br />

N<br />

x<br />

k<br />

MAI k 1<br />

( , ) <br />

pxg( l, m)1 t<br />

<br />

.<br />

m s ckc<br />

<br />

(1)<br />

<br />

x<br />

s s<br />

N<br />

<br />

sc<br />

xk lx<br />

k<br />

In (1), gl (,<br />

m)<br />

indicates the channel power gain between the transmitting<br />

node of link <strong>and</strong> the receiving node of link , <strong>and</strong> 1 <br />

is the indicator function.<br />

Therefore, the level of the SINR experienced by the receiver of link on<br />

sub-channel is given by:<br />

N pg( , )<br />

SINR <br />

,<br />

( <br />

k , s)<br />

m N<br />

k k<br />

k k m m<br />

2<br />

sc<br />

MAI<br />

k<br />

( m , s)<br />

k k<br />

where g( m, <br />

m)<br />

indicates link power gain, which is modelled by the two-ray<br />

model [7], i.e.<br />

2 2<br />

k j k j<br />

m l m l<br />

<br />

4<br />

d k j<br />

( m , l )<br />

(2)<br />

G G h h<br />

k j<br />

g( , ) .<br />

(3)<br />

m<br />

l<br />

In (3), <strong>and</strong> represent the antenna gains, , the height of the antennas<br />

of nodes <strong>and</strong> respectively, <strong>and</strong> d<br />

( <br />

k j<br />

m , <br />

is the distance between the two<br />

l )<br />

nodes. In order to study the performance of the network, we assume the queue of each<br />

transmitter to be not empty, i.e., we analyse the system in a fully loaded situation.<br />

For the sake of simplicity, we consider an uncoded binary phase shift keying<br />

(BPSK) modulation scheme for each sub-channel transmission. Since the transmitters<br />

may use multiple sub-channels per link to perform their communication, we<br />

introduce an equivalent SINR that accounts for all the sub-channels in order to<br />

assess the link performance. We define our equivalent SINR based on a bit error


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

233<br />

rate (BER) point of view. Here, we consider the interference as Gaussian noise, thus,<br />

the equivalent SINR may be expressed, by applying uncoded BPSK BER formula, as:<br />

<br />

N<br />

<br />

SINR ( ) erfc erfcSINR <br />

<br />

,<br />

<br />

k<br />

1<br />

k<br />

eq m<br />

( <br />

k , s)<br />

N<br />

sc m<br />

s<br />

where erfc is the complementary error function.<br />

III. Game formulation<br />

In this section, we model the scenario presented in Sec. II under a normalform<br />

formulation [8].<br />

(4)<br />

A. Normal-form<br />

A game in a normal-form is defined by a triplet:<br />

<br />

<br />

<br />

<br />

<br />

, , uk (5)<br />

k<br />

where, represents the set of players, 12 ... K<br />

is the joint set of actions<br />

with , i.e., ak ( pk, ck)<br />

. Since the utility is a measure of the individual<br />

quality of the chosen action, its formulation strongly depends on the type<br />

of feedback chosen. Here, we formulate our utility function as<br />

1<br />

<br />

p<br />

<br />

k<br />

uk( a) 1 Feedback<br />

x( ) ,<br />

1 N <br />

a<br />

<br />

k<br />

P <br />

MAX x<br />

<br />

where Feedback<br />

x( a ) is a one bit value, which depends on the nature of the feedback<br />

chosen in the network, as described in the following section. This utility function<br />

is chosen to be monotonically decreasing with the power consumption<br />

<strong>and</strong> increasing with the number of successful transmission Feedback<br />

x( a ). The parameter<br />

tunes the interest we have in satisfying the constraints over the power<br />

consumption.<br />

Definition 1. (Interdependent game). The game is said to be interdependent<br />

if for every not empty subset <strong>and</strong> every action profile a<br />

( a , a )<br />

<br />

it holds that:<br />

'<br />

'<br />

i , a a : u ( a , a ) u<br />

( a , a ). (7)<br />

k<br />

i i <br />

<br />

(6)<br />

In the following, we assume that game is interdependent. This is a reasonable<br />

assumption, since, physically, this means that no cluster is electromagnetically<br />

isolated. Under a normal-form formulation, the solution concept used is the Nash<br />

equilibrium (NE), which we define as follows:


234 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Definition 2. (Nash equilibrium in pure strategies). An action profile <br />

is a NE of game if <strong>and</strong> a<br />

k<br />

k<br />

* * ' *<br />

u ( a , a ) u ( a , a ).<br />

(8)<br />

k k k k k k<br />

Generally speaking, a game can have an arbitrary number of NE, thus, to<br />

measure the efficiency of each one, we introduce the social welfare function, defined<br />

by the sum of all individual utilities: W( a) u ( a ).<br />

B. QoS <strong>and</strong> feedback strategies<br />

K<br />

<br />

In this work, we express the QoS constraints in terms of SINR, which means<br />

that we fix a given SINR target for each link. For simplicity sake, this value will be<br />

assumed here constant, i.e. equal to , for all links. As explained in the previous<br />

section, the utility function design (6) allows the system to take these constraints<br />

into account.<br />

We discuss now two different feedback strategies that can be applied in real<br />

systems.<br />

1) SINR-based feedback:<br />

This is the first strategy that naturally arises, given that the QoS is expressed<br />

in terms of SINR. Most of communication systems estimate the received SNR<br />

based on pilot sequences, <strong>and</strong> thus the SINR when MAI is present. Relying on this<br />

capability, we define the feedback as:<br />

Feedback a 1 .<br />

(9)<br />

x<br />

k<br />

k<br />

SINR<br />

a<br />

This formulation was proposed <strong>and</strong> studied in [9]. There, authors proved that<br />

with a utility function such as (6), the action profile which maximizes the social<br />

welfare is the one which () i maximizes the number of links which simultaneously<br />

satisfy the SINR condition, ( ii ) minimizes the network power consumption. Tuning<br />

the parameter allows to favour either the QoS constraints satisfaction for<br />

large values, or the consumed power for small values.<br />

2) CRC-based feedback:<br />

Usually, communication systems implement a CRC to check the integrity<br />

of the received packets. From this information, it is thus possible to infer the quality<br />

of the communication link, <strong>and</strong> this allows us to consider another kind of feedback<br />

defined as:<br />

Feedback ( a ) 1 .<br />

(10)<br />

x<br />

<br />

x<br />

<br />

CRC x ( a) 0<br />

Here, the receivers feedback a 1 if the packet is received without errors <strong>and</strong><br />

a 0 otherwise. Note that, in this case the result in [9] does not apply, especially since


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

235<br />

the CRC is a stochastic function of the action profile . In this case, the theoretical<br />

framework is not able to predict the exact point of convergence of the algorithm.<br />

However, simulation results, illustrated in Sec. VI, indicate that this way of evaluating<br />

the feedback results in better performance.<br />

IV. Trial <strong>and</strong> error<br />

In this section, we briefly summarize the TE algorithm, introduced in [10], [11],<br />

<strong>and</strong> applied to wireless networks in [2]. TE is a state machine which selects, in a fully<br />

decentralized way, a strategy for a player such that, when every player is using<br />

the same scheme, the system is at an optimal NE a large proportion of the time<br />

with high probability. A state of a player is defined as a triplet zk ( mk, ak, uk)<br />

,<br />

where mk, ak,<br />

u<br />

k<br />

represent, respectively, the mood, the benchmark action <strong>and</strong><br />

the benchmark utility of player . There are four possible moods, each implying<br />

a different behaviour <strong>and</strong> depending on different responses by the network.<br />

• Content<br />

If player is content, then it plays action a<br />

k<br />

with probability (1 ) , <strong>and</strong><br />

another action (chosen r<strong>and</strong>omly according to some probability distribution)<br />

with probability Here, 0 1, namely the experimentation probability,<br />

0.02<br />

is a parameter of the system. Numerical simulations suggest as a value<br />

K<br />

with a good trade off between stability <strong>and</strong> experimentation. At each iteration,<br />

each player compares the actual utility with the benchmark utility u<br />

k.<br />

There<br />

are four possible outcomes: () i if uk<br />

uk<br />

, <strong>and</strong> it did not experiment, i.e., ak<br />

ak<br />

,<br />

player mood becomes hopeful, ( ii ) if uk<br />

uk<br />

, <strong>and</strong> it experimented, i.e., ak<br />

ak<br />

,<br />

( ( k ( ) k ))<br />

then, with probability<br />

F u a <br />

u , becomes the new benchmark action, <strong>and</strong><br />

the new benchmark utility; ( iii ) if uk<br />

uk<br />

<strong>and</strong> ak bar ak<br />

then the player mood<br />

turns to watchful; ( iv ) if uk<br />

uk<br />

<strong>and</strong> ak<br />

ak<br />

, then nothing changes. Here F()<br />

,<br />

is a non increasing function as explained in [11].<br />

• Hopeful<br />

If player is hopeful it evaluates its utility <strong>and</strong> compares it with the benchmark<br />

utility u<br />

k<br />

. If uk<br />

uk<br />

, then the player mood becomes content <strong>and</strong> the benchmark<br />

becomes the new benchmark utility. If uk<br />

ruk,<br />

then the player becomes<br />

watchful.<br />

• Watchful<br />

If player is watchful it evaluates its utility <strong>and</strong> compares it with the benchmark<br />

utility u<br />

k.<br />

If uk<br />

uk, then the player mood becomes discontent. If uk<br />

uk,<br />

then the player becomes hopeful.


236 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

• Discontent<br />

If player is discontent, it experiments a r<strong>and</strong>om action <strong>and</strong> evaluates its<br />

G( u )<br />

corresponding utility . Then, with probability k<br />

the player mood becomes<br />

content, with <strong>and</strong> as new benchmark action <strong>and</strong> utility. Here, G( ), is a non<br />

increasing function as explained in [11].<br />

A. Trial <strong>and</strong> error properties<br />

The theoretical properties of TE have been thoroughly analysed in precedent<br />

works. In this section, we report two among the most relevant results with our<br />

notations.<br />

Theorem 1. Let be an interdependent game, <strong>and</strong> let it have at least one NE<br />

<strong>and</strong> let each player employ TE, then a NE that maximizes the social welfare among<br />

all equilibrium states is played a large proportion of the time.<br />

This theorem, shown in [11], states that the algorithm does not only look for<br />

individual optimality (the NE) but, among the states individually optimal, it searches<br />

the one which maximizes the global outcome.<br />

Theorem 2. Let <strong>and</strong> let game be interdependent with at least one NE.<br />

Then, TE converges to the NE where the number of links satisfied is maximized <strong>and</strong><br />

the power employed to obtain this result is minimized.<br />

This result, proven in [9], shows that TE is able to select among all the possibilities<br />

an optimal working point for the network under analysis, at least for a large<br />

proportion of the time.<br />

V. Scenario description<br />

The scope of this section is to present <strong>and</strong> describe the scenarios used to<br />

run the simulations <strong>and</strong> study the performance of TE. First, we consider a static<br />

dense scenario. Second, we consider a mobile scenario with one cluster moving<br />

around four static clusters. We aim at illustrating that TE is suitable for configuring<br />

networks even in mobility, where channels are, thus, no more time-invariant.<br />

In the following, we set K 1 , to comply with the conditions in Theorem 2.<br />

A. Static scenario<br />

In this scenario, we consider a square field of 5 km per side populated with<br />

K 16 equally dimensioned square clusters, each of which has a side of 5 km.<br />

4<br />

In each cluster, 8 nodes are r<strong>and</strong>omly positioned as in Fig. 2. The clusters are<br />

not overlapping, the nodes belonging to each cluster are coloured with different<br />

colours, <strong>and</strong> the role (transmitter or receiver) is decided once <strong>and</strong> for all. In this


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

237<br />

scenario, each cluster has N<br />

sc<br />

sub-channels, which are r<strong>and</strong>omly associated<br />

with the links. This means that, between two TE loops there will be three time slots,<br />

N<br />

sc<br />

<strong>and</strong> three feedbacks. For each of these packets 2 sub-channels are r<strong>and</strong>omly<br />

Nk<br />

assigned for each link.<br />

Figure 2. Square scenario setting with K = 16 clusters <strong>and</strong> N k = 4 pairs. Clusters <strong>and</strong> nodes<br />

are static with SINR-based feedback. CH, AVG PW, <strong>and</strong> AVG SAT indicate respectively the most<br />

frequently selected channel, the APC <strong>and</strong> the AS.<br />

B. Mobility scenario<br />

In this scenario, we evaluate the performance of TE in the presence of a moving<br />

cluster. We assume clusters to be aligned <strong>and</strong> sharing the spectrum<br />

while a fifth cluster is far enough to be creating little interference. An instance<br />

of this starting situation is depicted in Fig. 3. In this case the topology is such that,<br />

between the four static clusters, there exists an empty space for the fifth cluster to<br />

pass. Therefore, when all the five clusters are aligned, no cluster is overlapping with<br />

another. This happens after around 2250 iterations. Later, the cluster in mobility<br />

reaches the end of the field after 3000 iterations. Here, the number of available channels<br />

is restricted to .


238 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 3. Cluster positions at the beginning of the mobility scenario with K=5 clusters in a field<br />

of 1 km side. Four clusters are static <strong>and</strong> aligned, the cluster at the bottom is the one in mobility.<br />

VI. Simulation results<br />

In this section, we evaluate the performance of the TE for the scenarios<br />

introduced in Sec. II according to some metrics defined in the following section.<br />

A. Performance metrics<br />

In order to evaluate the performance <strong>and</strong> the behaviour of the proposed<br />

algorithm, we have selected the following metrics:<br />

• Average satisfaction (AS): defined as the average number of positive feedbacks<br />

the receivers send to their CH, for each iteration of the TE. It evaluates<br />

how much the algorithm enables to satisfy the criterion selected by<br />

the feedback (either SINR or CRC).<br />

• Average power consumption (APC): defined as the average amount of power<br />

used by the transmitters in a cluster to achieve the corresponding satisfaction<br />

level. It captures how much power is consumed per cluster.<br />

• Packet error rate (PER): defined as the average dropped packets, it helps<br />

evaluating the link quality <strong>and</strong> thus if the algorithm is correctly configuring<br />

the network.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

239<br />

• Channel switch per iteration (CSpI): defined as the average number of channels<br />

that have changed for each TE iteration <strong>and</strong> thus captures the channel<br />

allocation stability.<br />

B. Static scenario, SINR-based feedback<br />

In this section, we analyse the performance of TE, in terms of satisfaction <strong>and</strong><br />

power consumption, applied to the square scenario described in Sec. V-A. Here,<br />

receivers feedback their satisfaction based on the comparison between the received<br />

SINR <strong>and</strong> the threshold , fixed in the simulation equal to 10 dB.<br />

In Fig. 4, we plot AS in the network <strong>and</strong> the APC by the nodes as a function<br />

of the iteration number. As we can see, full satisfaction is not reached. This is due<br />

to the scarcity of resources in the network that does not permit full satisfaction.<br />

This can be understood intuitively since, in a network with K 16 clusters sharing<br />

channels, each cluster has on the average two neighbour clusters which<br />

employ the same channel.<br />

Figure 4. Achieved AS <strong>and</strong> APC as a function of the TE iterations for a square static scenario,<br />

with SINR-based feedback<br />

In Fig. 2, we show the node localizations on the field <strong>and</strong> the corresponding<br />

links with the AS <strong>and</strong> APC along with the most often chosen channel for each


240 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

cluster. Note that having the same channel as the most used ones does not imply<br />

a collision, since the channels might be used in different time slots. On the contrary,<br />

having two different channels as the most used one implies no interference<br />

for a large part of the simulation.<br />

C. Mobility scenario<br />

In this simulation, we refer to the scenario presented in Sec. V-B. First we<br />

consider the case where receivers feedback their satisfaction based on the comparison<br />

between the received SINR <strong>and</strong> the threshold 10 dB. Then, we consider<br />

the case where receivers send a CRC-based feedback.<br />

In Fig. 5, we plot the global performance of the system in terms of AS <strong>and</strong> APC.<br />

It is possible to see the drop down of the system performance after 2000 iterations.<br />

The algorithm reacts by increasing the power level <strong>and</strong> by modifying the channel<br />

configuration. The satisfaction level, then, increases when the algorithm rearranges<br />

the channel <strong>and</strong> power allocation scheme in order to suit the new topology. Note<br />

that, when the mutual interference is too high, TE turns off one cluster by selecting<br />

zero power. The rationale behind this is that, if the desired level of SINR is not reachable<br />

by the current topological configuration, then the algorithm prefers to stop one<br />

of the clusters to improve the individual utility. When the algorithm reaches a different<br />

channel assignation pattern it is, again, possible to achieve a higher level of satisfaction.<br />

Figure 5. Achieved AS <strong>and</strong> APC as a function of the TE iterations for a square static scenario,<br />

with SINR-based feedback


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

241<br />

In Fig. 6, we plot the AS <strong>and</strong> APC in a similar scenario, where the feedback<br />

is based on the evaluation of a CRC over a packet of 256 bytes. Note that,<br />

here, the reaction to the approach of the moving cluster appears to be a sudden<br />

increment in the power level. The power level increment is larger then when<br />

using an SINR-based feedback. Intuitively, this is due to the fact that the CRC<br />

test is more tolerant on the SINR decrement than the SINR test. Therefore,<br />

the transmission power increment is more effective to insure the compliance<br />

with the constraints when considering a CRC-based feedback than when considering<br />

a SINR-based one.<br />

Figure 6. Achieved AS <strong>and</strong> APC as a function of the TE iterations for a the mobility scenario,<br />

with SINR-based feedback<br />

In Fig. 7 we plot a summary of the simulation run. Here each colour represents<br />

one of the possible two channels, while the height of the bins represents the used<br />

power. The static clusters are indexed with numbers 1, 2, 4, <strong>and</strong> 5 <strong>and</strong> the moving<br />

cluster is indexed with the number 3. When the system reaches time instant () i<br />

the 3rd cluster is close enough to create interference to the other clusters. This forces<br />

the system to reorganize the power-channel pattern. When the moving cluster<br />

is completely aligned with the others ( ii ) the system starts working in an orthogonal<br />

way <strong>and</strong> the power starts decreasing. At ( iii ) the cluster is far enough to stop<br />

creating interference.


242 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 7. Channel-power allocation as a function of the TE iterations for the mobility scenario with<br />

two channels. Each colour represents a different channel, <strong>and</strong> the heights of the graph the transmit<br />

power level. Clusters 1, 2, 4, 5 are static, cluster 3 is in mobility. (i) beginning of the interference from<br />

the 3rd cluster, (ii) Five clusters are aligned, (iii) end of interference from the 3rd cluster. The blue<br />

solid lines represent P MAX = 50 W.<br />

D. Static scenario, CRC-based feedback<br />

In this section, we analyse the performance, in terms of satisfaction <strong>and</strong> power<br />

consumption when the TE is applied to the square scenario described in Sec. V-A.<br />

We recall that, in the following graphs, the upper curve measures the AS, where<br />

the feedbacks are calculated with a CRC on the received packets. We recall that in this<br />

simulation each packet is considered to be 256 bytes long. In Fig. 8, the performance<br />

of such a system is summarized. The upper curve represents the AS reached in the network,<br />

while the lower curve represents the APC. Note that, it is not possible to directly<br />

deduce the PER from the satisfaction. Especially, low levels of AS do not automatically<br />

translate into high levels of PER. This is because, when the transmitter is employing<br />

zero power, which may happen especially if the satisfaction level is low, the feedback<br />

is zero, but it cannot be considered as an unsuccessful transmission. Therefore, to<br />

evaluate the PER, we need to reduce the level of no-satisfaction by the amount<br />

of time the transmitters were using zero power. On the other h<strong>and</strong>, a high level<br />

of AS, can guarantee a high number of packets received correctly, which translates<br />

in a low PER. In this system, simulation results indicate an average PER = 2.8 10 -3 .<br />

Note that, when we employ an SINR-based feedback, we obtain PER = 0.23, which<br />

is much higher for equivalent average employed power.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

243<br />

Figure 8. AS <strong>and</strong> APC as a function of the TE iterations for a square static scenario,<br />

with CRC-based feedback<br />

In Fig. 9, the performance of the algorithm on a single node is reported. It is<br />

possible to see that, generally, most of the transmitted packets are correctly received.<br />

Moreover, it appears that packets errors increase during some particular time windows,<br />

i.e., errors appear in burst. This is probably due to a change in the network<br />

(for instance another cluster starts employing the same channel) which makes<br />

the power-channel pair chosen by the CH inappropriate for the transmission.<br />

Figure 9. Fraction of packet correctly received. Single node CRC outcome for scenario<br />

V-A CRC-based feedback


244 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

E. Channel switch per second<br />

The stability of a network configuration is an important parameter to evaluate<br />

the performance of a self configuring algorithm. TE attempts to steer the network<br />

to a NE, which is inherently stable point. Nonetheless, the stochastic nature of TE,<br />

the incompleteness of the information <strong>and</strong> the lack of CH cooperation leave<br />

space for interference <strong>and</strong> collisions. To evaluate this instability we have defined<br />

the CSpI metric in Sec. VI-A. To compute it, we run 20 simulations on the scenario<br />

described in Sec. V-A <strong>and</strong> we count the number of time a CH switches its channel.<br />

We performed this evaluation both in the case of a SINR-based feedback <strong>and</strong><br />

of a CRC-based feedback <strong>and</strong> found CSpI SINR = 4.5 10 -3 <strong>and</strong> CSpI CRC = 4.3 10 -3 .<br />

As we can see the results are very close one to each other. This is due to the fact that<br />

avoiding other clusters interference is important independently from the nature<br />

of the feedback. As a consequence, in both cases clusters try to employ good (low<br />

interference) channels.<br />

F. Average satisfaction versus available channels<br />

Here, we aim at evaluating the variation of TE’s performance as a function<br />

of the available channels. In this simulation we use the scenario depicted in Sec. V-A,<br />

where we set a CRC-based feedback. In this scenario, we have K 16 clusters <strong>and</strong><br />

we vary the number of available channels for the network from 4 to 18. For each<br />

Figure 10. Expected satisfaction versus available channels. This plot has been realized assuming<br />

a square field as the one described in V-A, assuming a SINR-based feedback


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

245<br />

of this values, we run 20 tests, each of which lasts 6000 TE iterations. We recall<br />

that, three packets are sent for each iteration, <strong>and</strong> each packet has 256 bytes length.<br />

The result is depicted in Fig. 10. It is possible to see that the curve does not reach<br />

the full satisfaction. This is due to the stochastic nature of the algorithm. Since<br />

clusters are experimenting, <strong>and</strong> the CH have no way of cooperating one with each<br />

other, a certain, even if low, level of unsatisfaction is unavoidable. From these<br />

results, it appears that the optimum number of channels should be 10. Here, we<br />

mean optimum as the minimum number of channels needed to keep the network<br />

satisfied at least 90% of the time.<br />

VII. Conclusion<br />

In this paper, we have presented <strong>and</strong> studied the performance of a resource<br />

allocation algorithm, namely the trial <strong>and</strong> error (TE) learning algorithm. We have<br />

shown that it is effectively capable of setting the transmission parameters (channel<br />

<strong>and</strong> power) of clustered ad hoc network, using only one bit feedback per receiver.<br />

This feedback must be an evaluation of the quality of the transmission link. In our<br />

settings, we have proposed two different types of feedback strategies: one based<br />

upon the measurement of the SINR at the receiver, the other reporting the CRC<br />

check status of the transmitted packet over the link.<br />

In a crowded network, when several clusters try to share a few spectral resources,<br />

TE is able to find a setting such that the largest part of the cluster fulfils its<br />

QoS constraints, employing a low level of power. The clusters which are not able to<br />

fulfil their QoS constraints are automatically turned off, saving battery power <strong>and</strong><br />

avoiding useless interference.<br />

When clusters are moving, the changes in the topology force the algorithm to<br />

react quickly <strong>and</strong> to find a different channel <strong>and</strong> power allocation scheme, such as to<br />

satisfy the new conditions. This may be done by a temporary increase in the power<br />

level, or by a reorganization of the channel assignment.<br />

Several paths could be followed to extend this contribution. Experimentation<br />

parameters which adapt on the satisfaction levels, for instance, could be used to let<br />

the algorithm discriminate between almost static or high mobility situations. Moreover,<br />

a study on a more effective probability distribution for the experimentation,<br />

<strong>and</strong> on the effect of the values of the parameters <strong>and</strong> could bring insight on<br />

ways to improve the performance. Finally, the case when an action profile depends<br />

upon stochastic parameters would need to be investigated to study convergence<br />

properties of the game when CRC-based feedback is used.<br />

VIII. Acknowledgment<br />

This research work was carried out in the framework of the CORASMA EDA<br />

Project B-0781-IAP4-GC.


246 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

References<br />

[1] B. Babadi <strong>and</strong> V. Tarokh, “GADIA: A greedy asynchronous distributed interference<br />

avoidance algorithm,” IEEE Transaction on <strong>Information</strong> Theory, vol. 56, pp. 6228-6252,<br />

Dec. 2010.<br />

[2] L. Rose, S.M. Perlaza, M. Debbah, <strong>and</strong> C.L. Martret, “Distributed power<br />

allocation with SINR constraints using trial <strong>and</strong> error learning,” in IEEE Wireless<br />

<strong>Communications</strong> <strong>and</strong> Networking Conference, WCNC, Paris, France, Apr. 2012.<br />

[3] J.S. Pang, G. Scutari, D.P. Palomar, <strong>and</strong> F. Facchinei, “Design of cognitive radio<br />

systems under temperature-interference constraints: A variational inequality approach,”<br />

IEEE Transaction on Signal Processing, vol. 58, no. 6, pp. 3251-3271, Jun. 2010.<br />

[4] V. Le Nir <strong>and</strong> B. Scheers, “Autonomous dynamic spectrum management for<br />

coexistence of multiple cognitive tactical radio networks,” in Proceedings of the Fifth<br />

International Conference on Cognitive Radio Oriented Wireless Networks<br />

<strong>Communications</strong> (CROWNCOM), Jun. 2010.<br />

[5] O. Popescu <strong>and</strong> C. Rose, “Water filling may not good neighbors make,” in IEEE<br />

Global Telecommunications Conference – GLOBECOM, San Francisco, CA, USA,<br />

Dec. 2003.<br />

[6] L. Rose, S.M. Perlaza, <strong>and</strong> M. Debbah, “On the Nash equilibria in decentralized<br />

parallel interference channels,” in IEEE Workshop on Game Theory <strong>and</strong> Resource<br />

Allocation for 4G, Kyoto, Japan, Jun. 2011.<br />

[7] T. Rappaport, Wireless <strong>Communications</strong>: Principles <strong>and</strong> Practice, 2nd ed. Upper<br />

Saddle River, NJ, USA: Prentice Hall PTR, 2001.<br />

[8] D. Fudenberg <strong>and</strong> J. Tirole, “Game theory,” MIT Press, 1991.<br />

[9] L. Rose, S.M. Perlaza, M. Debbah, <strong>and</strong> C.L. Martret, “Achieving Pareto optimal<br />

equilibria in energy efficient clustered ad hoc networks,” in <strong>Military</strong> Communication<br />

Conference, Milcom, Orl<strong>and</strong>o, FL, USA, 2012.<br />

[10] H.P. Young, “Learning by trial <strong>and</strong> error,” University of Oxford, Department<br />

of Economics, Economics Series Working Papers 384, 2008.<br />

[11] B.S. Pradelski <strong>and</strong> H.P. Young, “Efficiency <strong>and</strong> equilibrium in trial <strong>and</strong> error<br />

learning,” University of Oxford, Department of Economics, Economics Series Working<br />

Papers 480, 2010.


High Spatial-Reuse Distributed Slot Assignment<br />

Protocol for Wireless Ad-hoc Networks<br />

Muhammad Hafeez Chaudhary 1 , Bart Scheers 2<br />

1 Royal <strong>Military</strong> Academy, Belgium, mh.chaudhary@rma.ac.be<br />

2 Royal <strong>Military</strong> Academy, Belgium, bart.scheers@rma.ac.be<br />

Abstract: Application of ad hoc networks in mission-critical environments requires wireless connectivity<br />

that meets certain quality-of-service (QoS). In such networks mechanism to control access to<br />

the shared wireless channel is crucial to ensure efficient channel utilization <strong>and</strong> to provide the QoS.<br />

TDMA based MAC protocols are considered to be appropriate for this kind of applications; however,<br />

finding an efficient <strong>and</strong> distributed slot assignment protocol is crucial. In this paper, a distributed<br />

slot assignment protocol is developed which gives high spatial reuse of the channel. To assign slots,<br />

the protocol does not need global topology information: Each node assigns slots based on the local<br />

topology information. The protocol can find the conflict-free slot assignment with limited message<br />

overhead. We evaluate the performance of the proposed protocol <strong>and</strong> show that the protocol gives<br />

considerably better channel utilization efficiency than exiting distributed slot assignment protocols.<br />

I. Introduction<br />

The last decade has seen an explosive growth in applications of wireless communications<br />

<strong>and</strong> networking technology bringing ubiquitous mobile service into<br />

the everyday realm. A recent forecast by CISCO suggests that during the current<br />

year there will be more wirelessly connected devices than the total human population.<br />

Moreover, the dem<strong>and</strong> for high-speed wireless data transfer is increasing at<br />

astronomical rates. The phenomenal increase in the wirelessly connected devices<br />

<strong>and</strong> the applications running on them have put an extremely high premium on<br />

the communications spectrum, <strong>and</strong> thus placing great dem<strong>and</strong> on designing spectrum<br />

efficient communication <strong>and</strong> networking protocols to meet the requirements<br />

of the current <strong>and</strong> emerging applications in wireless networking. Currently, a key<br />

area of research is mobile ad hoc networking, which is driven by the requirement<br />

of having a technology that enables a disparate set of mobile devices/nodes create<br />

a network on dem<strong>and</strong>, as the need arises, to accomplish an assigned mission.<br />

In a wireless network, simultaneous transmissions of two or more nodes<br />

in the same channel may not be successful if their intended receivers are in the radio<br />

interference range of more than one transmitter. A mechanism to control access to


248 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

the shared wireless channel is crucial to ensure efficient channel utilization <strong>and</strong> to<br />

provide quality-of-service (QoS). Ad hoc networks for mission-critical applications<br />

<strong>and</strong> emergency response services require that the data be delivered to the destination<br />

node reliably <strong>and</strong> within certain time limits. To support such QoS, schedule based<br />

medium access control protocols using TDMA scheme are deemed suitable [1].<br />

There are numerous algorithms dealing with TDMA slot scheduling in ad hoc<br />

networks, whereby nodes can find conflict-free slot assignment. In [1], a TDMA<br />

slot scheduling protocol named GinMAC is presented; the protocol requires<br />

the network be arranged in a tree-like structure. Building on the GinMAC, in [2]<br />

the BurstProbe slot assignment protocol is proposed. These slot scheduling protocols<br />

require global topology information which may not be available in ad hoc<br />

networks that are inherently bereft of any central coordinating <strong>and</strong> controlling<br />

infrastructure. In [3, 4] a slot assignment protocol called USAP is proposed which<br />

allows nodes to get conflict-free slot assignment in a distributed way using local<br />

topology information. Kanzaki <strong>and</strong> his colleagues proposed a protocol named<br />

ASAP in [5, 6] which can be viewed as an extension of the USAP, adding details<br />

on dynamic frame-size selection <strong>and</strong> more detailed procedures about the nodes<br />

joining/leaving the network. Another related protocol named DRAND is proposed<br />

in [7], <strong>and</strong> later on extended to Z-MAC [8] which combines artifacts of both TDMA<br />

<strong>and</strong> CSMA medium access schemes. The main focus of these protocols (<strong>and</strong> others<br />

like in [9, 10]) is to find conflict-free slot assignment to nodes in a distributed<br />

way. The maximization of the channel utilization efficiency (i.e., the spatial reuse<br />

of the slots) is not explicitly considered. Thus from channel utilization viewpoint,<br />

these protocols may give suboptimal performance.<br />

In this paper, we propose a high spatial-reuse distributed slot assignment protocol<br />

(HUDSAP). In the protocol, the nodes find slot assignment using their local<br />

topology information. The protocol introduces a priority mechanism by which<br />

nodes having higher number of one-hop neighbors (NoNs) assign slots first. Each<br />

node computes its priority index independently using only the information form<br />

the nodes within its contention zone. We show that the protocol achieves substantially<br />

higher channel utilization efficiency than the DRAND <strong>and</strong> related protocols.<br />

The remainder of the paper is organized as follows: Section II gives preliminaries<br />

on slot assignment <strong>and</strong> the problem formulation; Section III presents details<br />

of the proposed slot assignment protocol; Section IV outlines an adaptive frame<br />

length selection scheme; Section V illustrates the performance of the protocol by<br />

simulation examples; <strong>and</strong> finally Section VI gives some concluding remarks.<br />

II. Preliminaries <strong>and</strong> problem formulation<br />

For the slot assignment we represent the network by a graph G =(ϑ, ξ), where<br />

ϑ is the set of vertices that correspond to the nodes in the network <strong>and</strong> ξ is the set<br />

of edges representing the wireless links between the nodes. We assume that for any


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

249<br />

two distinct vertices i, j Î ϑ, an edge (i, j) exits in ξ if <strong>and</strong> only if i <strong>and</strong> j can hear<br />

each other – that is, all edges are bidirectional.<br />

Given a graphical representation of the network, the TDMA slot assignment<br />

problem with the associated assignment constraints can be defined as an equivalent<br />

graph coloring optimization problem. The equivalence between the two problems<br />

is one-to-one; that is, two nodes receive different slots if <strong>and</strong> only if the corresponding<br />

vertices have received different colors. Moreover, the total number of slots is equal<br />

to the total number of colors used.<br />

The objective of the slot assignment optimization problem is to minimize<br />

the number of slots used to find the transmission schedule for all nodes in the network<br />

under the constraint that a node can only assign a slot that has not been used<br />

within the contention zone of the node. The contention zone of a node is assumed to<br />

be limited to its two-hop neighbors. As is often assumed in designing MAC protocols,<br />

such a definition of the contention zone is imposed to remove the hidden-terminal<br />

problem. The hidden-terminal problem arises when two nodes cannot hear transmissions<br />

of each other but a third node can hear transmissions of both of them.<br />

An optimal solution for slot scheduling problem is known to be NP-complete<br />

[11, 12]: That is, the computational complexity of finding the solution increases<br />

exponentially as the number of nodes increases; which means it becomes prohibitively<br />

time consuming to find the optimal slot schedule. That is why to solve the slot<br />

assignment problem, in literature heuristic-based suboptimal solutions are proposed<br />

that vary in their schedule length, the convergence time, <strong>and</strong> the message overhead.<br />

To this end, in [13], three greedy heuristic-based slot assignment procedures are<br />

proposed: namely, the RAND (r<strong>and</strong>om), the MNF (minimum neighbor first),<br />

<strong>and</strong> the PMNF (progressive minimum neighbor first), listed in increasing order<br />

of complexity. The basic principle underlying each of these schemes is essentially<br />

the following: first, give a unique label to each node, <strong>and</strong> then assign slots to nodes<br />

in decreasing order of their labels. In RAND, the nodes are labeled in a r<strong>and</strong>om<br />

way; in MNF, the node with minimum number of neighbors is labeled first; <strong>and</strong><br />

in PMNF, the nodes are labeled as in MNF with a difference that after labeling<br />

a node, the node <strong>and</strong> its edges are removed. Effectively that means, at each step<br />

among the nodes that have not been assigned slot yet, the RAND takes a node at<br />

r<strong>and</strong>om <strong>and</strong> allots time slot to it; the MNF takes the node with maximum number<br />

of neighbors <strong>and</strong> allots slot to it; <strong>and</strong> the PMNF first removes the nodes <strong>and</strong><br />

the associated edges that have already been assigned slots, then within the updated<br />

network assign slot to the node with maximum number of neighbors.<br />

It has been shown in [13] that the schedule length (SL) achieved with the three<br />

schemes is in the order SL PMNF ≤ SL MNF ≤ SL RAND . That is, from the spatial reuse<br />

point of view, the PMNF is the most efficient <strong>and</strong> the RAND the least efficient<br />

among the three labeling schemes. However, the problem with these schemes<br />

is that they require knowledge of the global network topology; that is, they are<br />

centralized schemes. For ad hoc networks, distributed slot assignment schemes


250 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

are sought because such networks are devoid of any central coordinating <strong>and</strong><br />

controlling infrastructure <strong>and</strong> the global topology knowledge is hard to come by<br />

at individual nodes.<br />

Recently a distributed implementation of RAND, known as DRAND, is proposed<br />

in [7] which can achieve the same channel utilization efficiency as the RAND.<br />

The RAND ordering can be viewed as archetype of the channel scheduling in wireless<br />

networks. The roots of many heuristics for slot scheduling algorithms in the literature<br />

can be found to be equivalent to the RAND [3, 5, 7, 8, 14]. The appeal<br />

of RAND lies in its simplicity <strong>and</strong> the ease with which its distributed version<br />

can be implemented. However, as shown in [13], the performance (in terms of SL)<br />

of the RAND can be significantly inferior to the MNF <strong>and</strong> PMNF. In this work, we<br />

present a distributed implementation of MNF, which we call as the HUDSAP that<br />

can achieve same channel utilization efficiency as the MNF by using only the local<br />

topology knowledge at individual nodes. Towards this end, the ensuing section<br />

gives details of the proposed protocol.<br />

III. Slot assignment protocol<br />

We assume that the time is divided into slots <strong>and</strong> the nodes are synchronized<br />

on the slot boundaries. The protocol operates in two main phases: the neighborhood<br />

discovery phase <strong>and</strong> the slot assignment phase. Fig. 1 shows the state diagram<br />

of the protocol, where the slot assignments phase is divided into four states: node classification,<br />

waiting slot assignment, active slot assignment, <strong>and</strong> completed slot assignment.<br />

In the neighborhood discovery phase, a node collects information about the nodes<br />

within its two-hop neighborhood, that is, one-hop neighbors (ONs) <strong>and</strong> two-hop<br />

neighbors (TNs), the NoNs of these nodes, <strong>and</strong> their assigned slots. The two-hop<br />

neighbors are strict two-hop neighbors, that is, it excludes the one-hop neighbors<br />

that can also be reached by another one-hop node. Based on that, the node constructs<br />

neighbor information table (NiT), an example of which is shown in Fig. 2. In the slot<br />

assignment phase, the nodes assign slots in a distributed way as explained next.<br />

Each node compares its NoNs with the NoNs of the nodes, in its NiT, which<br />

have not yet assigned slots, <strong>and</strong> based on that, the node classifies itself in one<br />

of the following three groups:<br />

1. In node group I (NG-I) if the NoNs of the node is greater than the NoNs<br />

of all nodes in its NiT that have not yet assigned slots; for instance, in Fig. 2<br />

initially nodes e <strong>and</strong> p will place themselves in this group.<br />

2. In NG-II if the NoNs of the node is equal to the NoNs of some (one or<br />

more) nodes in its NiT that have not yet assigned slots; for example, in Fig. 2,<br />

node b <strong>and</strong> l will initially place themselves in this node group.<br />

3. In NG-III if the NoNs of the node is less than the NoNs of some (one or more)<br />

nodes in its NiT that have not yet assigned slots; for instance, in Fig. 2, all nodes<br />

will initially place themselves in this node group except nodes b, e, l, <strong>and</strong> p.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

251<br />

Figure 1. State transition diagram of the HUDSAP<br />

The classification at each node is done independently solely based on the local<br />

topology information available at the node in the form of NiT. After the classification,<br />

the node assigns slot to itself <strong>and</strong> the procedure of which depends on<br />

its node group. The slot assignment is managed differently in the three groups,<br />

as shall be explained in the ensuing sections. During the slot assignment phase,<br />

following control messages are exchanged between the nodes: slot assignment<br />

request (SAR), slot assignment grant (SAG), slot assignment confirmation (SAC),<br />

slot assignment denial (SAD), <strong>and</strong> slot assignment failure (SAF). The SAR, SAF,<br />

<strong>and</strong> SAC messages are transmitted by the node that attempts to assign a slot, <strong>and</strong><br />

the SAG <strong>and</strong> SAD are response messages to the SAR message. These response<br />

messages are transmitted by the nodes within the contention area of the node that<br />

has sent out the SAR message.<br />

A. Slot assignment in NG-I<br />

All nodes in this group assign the first free slot that has not yet been assigned<br />

to any node within their two-hop neighborhood. For the network of Fig. 2, initially<br />

the nodes e <strong>and</strong> p are in this group <strong>and</strong> there is no slot assigned to any node<br />

in the network; so both of these nodes assign slot 0 to themselves. After assigning<br />

the slot, the nodes announce their slot assignment to their neighbors by sending<br />

the SAC message as shown in Fig. 3. In this case the nodes do not have to wait for<br />

any confirmation from their one-hop <strong>and</strong> two-hop neighbors about their slot<br />

assignment, because the nodes in this group are sure that there is no other node<br />

within their contention area currently assigning slot until their slot assignment


252 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

is complete; the other nodes in the contention area are prohibited from initializing<br />

slot assignment by the slot assignment procedures for NG-II <strong>and</strong> NG-III, as we<br />

shall see in the ensuing sections. Each one-hop neighbor after receiving the SAC<br />

announcement does the following things: updates its slot assignment information,<br />

forwards the SAC to its ONs, removes the node which transmitted the announcement<br />

from its NiT for further consideration during the classification step, <strong>and</strong><br />

changes its state accordingly as shown in Fig. 1. It is interesting to note that all nodes<br />

in this group can complete slot assignment in one time-slot, as no slot assignment<br />

permission is required from neighbors.<br />

Figure 2. Network topology with NoNs of each node within {.}. An example of NiT<br />

of node p is also shown


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

253<br />

Figure 3. Successful slot assignment to nodes e <strong>and</strong> p in NG-I<br />

Figure 4. Successful slot assignment to node b in NG-II<br />

Figure 5. Failed slot assignment to node b in NG-II<br />

B. Slot assignment in NG-II<br />

For slot assignment in NG-II, we propose two procedures: one based on<br />

an elaborate exchange of control messages, <strong>and</strong> the other based on a prioritization<br />

mechanism using node IDs.


254 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

1) Message exchange based slot assignment:<br />

Each node in this group has at least one or more nodes (that have not<br />

assigned slots yet) in its NiT with the same number of NoNs as that node itself.<br />

For node i, in this group, let N i be the number of nodes with the same<br />

NoNs as the node i that have not yet assigned slots. To assign slot, the node<br />

runs a lottery for which the probability of success is chosen as P (i) =1 / (N i +1).<br />

In case a node does not win the lottery, it will wait for certain time slots chosen<br />

at r<strong>and</strong>om before trying the lottery again. If the node wins the lottery, it assigns<br />

the minimum possible slot that has not been assigned to any node within its<br />

contention-zone <strong>and</strong> sends the SAR message to its neighbors. For the given network<br />

topology in Fig. 2, initially nodes b <strong>and</strong> l are in this group <strong>and</strong> the probability<br />

of winning the lottery for each of them is 1/3. The probability that only one of them<br />

wins the lottery in a given slot <strong>and</strong> thus avoid collision of their announcement<br />

messages is 2/9.<br />

For the slot assignment to be complete, the node has to wait for the SAG messages<br />

from nodes within its contention area. After the slot assignment is granted by<br />

the nodes in the contention area, the node i sends out a SAC message; an example<br />

of which is shown in Fig. 4. Similar to the NG-I, after receiving the confirmation<br />

message, the one- <strong>and</strong> two-hop nodes update their slot assignment information, <strong>and</strong><br />

remove node i from their NiTs for further consideration in the node classification<br />

step. Interestingly, the node i does not have to wait for response messages from<br />

nodes that have NoNs different than the node itself as well as from nodes having<br />

same NoNs that have completed slot assignment. For example, if node i has only<br />

one node with the same NoNs, then a confirmation from only that node is needed:<br />

if that node is a one-hop neighbor then the slot assignment can be completed<br />

in three slots – one to send SAR, second to receive SAG, <strong>and</strong> third to send SAC;<br />

if that node is a two-hop neighbor, then can be done in five slots – two additional<br />

slots are used by the one-hop node to relay SAR/SAG messages; <strong>and</strong> in either<br />

case, a unicast addressing can be employed. This can reduce the traffic overhead<br />

substantially, <strong>and</strong> thereby reduces the chances of collision of the slot assignment<br />

control messages in the network.<br />

When a node receives a SAR message of a one-hop node, the receiving node<br />

performs one of the following tasks:<br />

I. If the receiving node <strong>and</strong> all of its ONs have NoNs which are different<br />

than the NoNs of the SAR transmitter, then the receiving node neither<br />

forwards the SAR to its ONs nor sends a reply message (i.e., SAG/SAD).<br />

The receiving node simply waits for the SAC/SAF message form the transmitter<br />

of SAR.<br />

II. In case the receiving node has same NoNs as the transmitter of SAR but<br />

the NoNs of all of its ONs are different, the receiver node sends a SAG<br />

message to the transmitter. In this case also, the receiver does not forward<br />

the SAR to its ONs.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

255<br />

III. If the NoNs of the receiving node are different than the NoNs of the transmitter<br />

of the SAR message, but one (or more) of its ON(s) has (have)<br />

same NoNs, the receiver forwards the SAR to those ONs. In this case,<br />

the receiver has to relay back any reply message (i.e., SAG/SAD) from its<br />

ONs: The receiver node sends a SAG message if all of its ONs with same<br />

NoNs reply with SAG, <strong>and</strong> otherwise sends a SAD message.<br />

IV. If the receiving node <strong>and</strong> one (or more) of its on-hop nodes have same<br />

NoNs as the transmitter of the SAR message, the receiver node sends a SAD<br />

message to the transmitter if it has already sent a SAG for this particular<br />

slot to one of its ONs other than the transmitter of recently received SAR.<br />

Otherwise, the receiver first forwards the SAR to its ONs with the same<br />

NoNs as the transmitter of SAR <strong>and</strong> waits for their reply. Once the receiver<br />

receives responses of those nodes, it fuses them <strong>and</strong> replies with a SAG<br />

message if all those nodes send SAG, else it replies with a SAD message.<br />

When a node receives a forwarded SAR message of a two-hop node, the receiving<br />

node performs one of the following tasks:<br />

I. If the NoNs of the receiver are different than the NoNs of the originator<br />

of the SAR message, the receiver discards the SAR message <strong>and</strong> does<br />

nothing else.<br />

II. In case the NoNs of the receiver are same as the NoNs of the originator<br />

of the SAR message, the receiver replies with a SAD message if it has already<br />

sent its own SAR message to its neighbors for the same slot, otherwise<br />

it replies with a SAG message.<br />

When a node receives a SAF message originated from a one-hop node it executes<br />

one of the following tasks:<br />

I. If the NoNs of the receiver <strong>and</strong> all of its ONs are different than the transmitter<br />

of the SAF message, the receiver discards the message.<br />

II. In case the NoNs of the receiver are different than the NoNs of the transmitter<br />

but some (one or more) of its ONs have same NoNs as the transmitter,<br />

then the receiver forwards the SAF to those ONs.<br />

III. If the NoNs of the receiver are same as the transmitter, but the NoNs<br />

of all of its ONs are different than the transmitter, then the receiver frees<br />

the slot for which it has earlier sent the SAG message to the transmitter<br />

of SAF. After which, the receiver discards the SAF.<br />

IV. In case the receiver <strong>and</strong> some (one or more) of its ONs have same NoNs<br />

as the transmitter of SAF, the receiver releases the slot <strong>and</strong> forwards<br />

the SAF to those ONs having same NoNs.<br />

When a node receives SAF originated from a two-hop node, the receiver<br />

discards the SAF if its NoNs are different than the transmitter of the SAF, else<br />

it releases the slot related to the SAF.<br />

When a node receives a SAC message it updates its NiT; if the SAC is originated<br />

from a one-hop node, then the receiver also forwards the SAC to its ONs.


256 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Remark 1: The slot assignment in NG-II by the preceding dialog based mechanism<br />

though requires message exchange between a subset of nodes in the contention<br />

area of a node, however, despite this the control message overhead could be high.<br />

For instance, if multiple nodes in a contention area try to assign slots at the same<br />

time, then none of them will succeed <strong>and</strong> they have to try again after a r<strong>and</strong>om<br />

back-off time, which would slow down the convergence of the algorithm. In this<br />

regard, next we present an alternative slot assignment procedure for NG-II which<br />

avoids the preceding detailed message exchange routine when assigning slots to<br />

the nodes.<br />

Figure 6. For linear network topology all nodes except the two nodes at the extremities are in NG-II.<br />

When the number of nodes is large <strong>and</strong> the nodes in the network are in increasing (or decreasing)<br />

order of their IDs, for slot assignment, the nodes on the right (left) edge have to wait until all nodes<br />

on their left (right) side have completed slot assignment<br />

2) Alternative priority based slot assignment procedure:<br />

When all nodes have unique IDs, the slot assignment in NG-II can be h<strong>and</strong>led<br />

in a much simpler way, very much like in the NG-I. Let there be a one-to-one<br />

function Ψ i which could map a node ID i to a unique numeric number µ i , that is,<br />

Ψ i : i → µ i , µ i ≠ µ j , i, j Î J. (1)<br />

Now any node i in NG-II, instead of r<strong>and</strong>omly deciding about when to initiate<br />

slot assignment, compares its ID µ i with the IDs of the nodes (that have not yet<br />

assigned slots) having same NoNs in its NiT. If its ID is greater than these nodes,<br />

it assigns the minimum possible slot(s) to itself which is(are) not yet taken by<br />

the nodes in its contention area; otherwise, the node does not try to assign slot(s)<br />

unless the preceding condition is true. After assigning the slot(s), the node sends<br />

out the SAC message to neighboring nodes. Note that, like the nodes in NG-I, for<br />

slot assignment by this procedure the nodes in NG-II are not required to exchange<br />

messages SAR/SAG/SAD/SAF.<br />

Remark 2: The control message overhead of the alternative priority based slot<br />

assignment procedure is quite low compared to the message exchange based procedure.<br />

However, under the alternative slot assignment procedure, in certain cases,<br />

some nodes in NG-II may have to wait inordinate amount of time for slot assignment,<br />

for example, as shown in Fig. 6, the nodes in NG-II on the right (left) h<strong>and</strong><br />

side have to wait until all other nodes in the group have completed their slot assignment.<br />

In such scenarios where a node in NG-II has to wait excessively long time to<br />

initiate slot assignment, the message exchange based slot assignment mechanism<br />

could be employed. To be more specific, if a node in NG-II does not receive new<br />

slot assignment information, during a predefined time duration, about any node


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

257<br />

within its contention area having the same NoNs as the given node then the node<br />

initiates slot assignment according to the message exchange based procedure.<br />

In this regard, to avoid more than two nodes to initiate slot assignment at the same<br />

time, after expiration of the predefined time duration, the nodes employ r<strong>and</strong>om<br />

back-off mechanism whereby a node waits for r<strong>and</strong>omly chosen time-slots before<br />

starting slot allocation. If during this time, the node receives new slot assignment<br />

information, it will abort the message exchange based slot assignment procedure<br />

<strong>and</strong> will revert to the priority based slot assignment procedure.<br />

C. Slot assignment in NG-III<br />

The nodes in this group do not try to assign slots to themselves. They listen to<br />

the messages from their neighbors, assist in slot assignment of their neighbors by<br />

forwarding slot assignment control messages as discussed in the preceding sections,<br />

<strong>and</strong> update their slot assignment information. When a node, in this group, receives<br />

a SAC message about any node in its contention area, it removes that node from<br />

its NiT for further consideration in the node classification step.<br />

Each node, in NG-II <strong>and</strong> NG-III, that has not yet assigned a slot to itself,<br />

whenever updates its slot assignment information <strong>and</strong> removes any node from<br />

consideration in its NiT, it reruns the node classification test shown in Fig. 1. Note<br />

that after the classification test, a node in NG-II that has not yet assigned a slot to<br />

itself may find itself in NG-I, <strong>and</strong> a node in NG-III may find itself in either NG-II<br />

or NG-I (cannot be in both because the groups are mutually exclusive). For example,<br />

when nodes e <strong>and</strong> p (which were in NG-I) finish slot assignment, their neighbors<br />

d, j, i, <strong>and</strong> o (which were in NG-III) reclassify themselves in NG-II. Each node<br />

h<strong>and</strong>les the slot assignment according to the procedure specific to its current node<br />

group. It is interesting to note that the nodes can only upgrade their groups <strong>and</strong><br />

thus the slot assignment protocol is bound to converge within limited time; that is,<br />

the slot assignment to all nodes will be completed within a bounded time. We will<br />

analyze the convergence time <strong>and</strong> the message complexity of the protocol in more<br />

details in our future work.<br />

Proposition: The execution of the HUDSAP produces conflict-free slot assignment<br />

schedule.<br />

Proof: To show that the slot assignment schedule produced by the HUDSAP<br />

is conflict-free, it suffices to note the following: 1) At any given time only nodes<br />

in NG-I <strong>and</strong> NG-II are assigning slots <strong>and</strong> the two groups are mutually exclusive; 2)<br />

By definition, all neighboring nodes of each node in NG-I do not assign slots until<br />

slot assignment is completed for the nodes in NG-I; <strong>and</strong> 3) Each node in NG-II<br />

assign slot which is not assigned to any other node in its neighborhood by exchanging<br />

the control messages, or by the prioritization mechanism.


258 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

IV. Frame length selection<br />

With uniform frame size across the network, although the design <strong>and</strong> implementation<br />

of the MAC protocol will be simplified, however, the channel resources<br />

will remain underutilized. In the conventional TDMA slot assignment protocols,<br />

frame length is fixed based on the maximum expected number of nodes in the network,<br />

for instance, to ensure that each node gets at least one slot [8]. These protocols<br />

show poor channel utilization as they must leave enough unused slots for new<br />

coming nodes. Another possibility is to dynamically set the frame length for each<br />

node which is equal to the maximum slot number (MSN) assigned within the network.<br />

However, this would require each node to know the MSN. The propagation<br />

of the MSN within the entire network would not be adaptive to the local slot assignment<br />

changes – any change in the slot assignment may change the MSN <strong>and</strong><br />

the new value has to be propagated throughout the network. Although by setting<br />

the network-wide same frame length based on the MSN effectively removes the requirement<br />

of a priori fixing the number of slots in a frame, however, it would still<br />

give lower channel utilization efficiency.<br />

The channel utilization can be improved by variable frame length for each<br />

node depending on the slot assignment in its neighborhood, that is, to change<br />

the frame length dynamically according to the slot assignment to the nodes within its<br />

contention area. If the contention area of a node is limited to its two-hop neighborhood<br />

<strong>and</strong> reuse of slots is allowed outside this area, then each node can set its<br />

frame length which is a function of the MSN assigned within the contention area<br />

(instead of the entire network). Note that, the MSN allocated within the contention<br />

area cannot exceed the two-hop neighborhood size of the node. To have conflictfree<br />

transmission among nodes with different frame lengths, usually the lengths<br />

of frames are chosen as multiple of two [4-8].<br />

To set the frame length L i of node i according to the local MSN, the Z-MAC<br />

protocol in [8] proposed the following rule:<br />

L i = 2 k , (2)<br />

where k is a non-negative integer. The value of k is selected such that the following<br />

holds:<br />

2 k–1 ≤ A i ≤ 2 k –1, (3)<br />

where A i is the MSN within the two-hop contention area of the node i. This scheme<br />

although could achieve better channel reuse than the uniform frame length rule<br />

across the entire network, however this is not optimal from the point of view of channel<br />

utilization efficiency. In this regard, we propose an alternative scheme by which<br />

local framing rule varies depending on the node connectivity. Specifically, we classify<br />

nodes in two groups: leaf nodes <strong>and</strong> non-leaf nodes. For leaf nodes – a leaf node<br />

is a node which has only single one-hop neighbor; otherwise the node is a non-leaf<br />

node – the frame length is selected as in the Z-MAC. For non-leaf nodes, the framing


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

259<br />

rule is modified as follows. Let à i be the MSN within the one-hop neighborhood<br />

of the non-leaf node i. The frame length is set as in (2) <strong>and</strong> (3) with A i replaced by à i .<br />

An example of the heterogeneous frame length (Z-MAC <strong>and</strong> proposed) <strong>and</strong><br />

the uniform frame length across the network is given in Fig. 7. From the figure,<br />

we can observe increase in the channel reuse due to the variable length frame size.<br />

The increase in channel reuse directly translates into higher channel utilization<br />

efficiency as well decrease in the data transfer delays.<br />

Figure 7. An example of variable <strong>and</strong> fixed length TDMA frames for a given conflict-free slot assignment:<br />

In the case of uniform length frame, all nodes have 8-slot frame length; in the Z-MAC<br />

variable length frame strategy, node a has 4-slot frame length whereas all other nodes have 8-slot<br />

frame length; <strong>and</strong> in the HUDSAP variable length frame strategy, nodes a <strong>and</strong> b have 4-slot frame<br />

length whereas all other nodes have 8-slot frame length<br />

Once the nodes have decided their frame lengths, the information are exchanged<br />

with nodes within their respective contention areas. After which the nodes<br />

can start data transmission within their assigned time-slots. The Z-MAC framing rule


260 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

produces slot assignment which is always conflict-free. However, in the proposed<br />

framing scheme, there could be occasional conflicts in assigned slots. Such conflicts<br />

can be detected by the nodes once frame-length information is available. When<br />

a node detects a slot conflict due to frame size selection, it compares its assigned<br />

slot with the slot assigned to the node causing the conflict. If the slot of the given<br />

node is less than the conflicting node, then the given node selects its frame length<br />

according to the MSN within its two-hop area (instead of one-hop area); otherwise,<br />

it leaves the conflict resolution to the conflicting node which would use the same<br />

procedure to resolve the conflict.<br />

V. Simulation examples <strong>and</strong> discussion<br />

In this section, with some numerical experiments, we evaluate channel utilization<br />

efficiency (i.e., the spatial reuse of slots) of the proposed HUDSAP <strong>and</strong> compare<br />

it with the centralized schemes RAND <strong>and</strong> MNF of [13]. Note that the DRAND<br />

is proven to achieve the same channel utilization efficiency as RAND [7]; so the comparison<br />

of HUDSAP with DRAND is not performed here. For a given network,<br />

assuming uniform frame length, the channel utilization efficiency is measured<br />

in terms of the minimum number of slots used by the protocol to find the conflictfree<br />

slot assignment schedule. We deploy the nodes in a 400-by-400 planar region.<br />

We conduct two numerical experiments: In the first, we fix the transmission range<br />

of nodes to 40 <strong>and</strong> vary the number of nodes from 50 to 400; in the second, we fix<br />

the number of nodes to 300 <strong>and</strong> vary the transmission range from 10 to 50. Each<br />

point in the numerical results is obtained by averaging over 10 4 r<strong>and</strong>om deployments<br />

(uniform distribution) of the nodes in the region.<br />

The results are plotted in Fig. 8 <strong>and</strong> Fig. 9. The figures show that the HUDSAP<br />

gives conflict-free slot assignment schedule that requires substantially less number<br />

of slots than the RAND (<strong>and</strong> consequently of the DRAND). That means, the spatial<br />

reuse of the slots, <strong>and</strong> consequently the channel utilization efficiency, is higher<br />

in HUDSAP. It should be noted that we deployed the node in a planar region of fixed<br />

area. Therefore, when either the number of nodes is small or the transmission range<br />

is small, or both, the performance gap is negligibly small. This is because, in such<br />

scenarios, the network is divided into small sub-networks (each comprising a few<br />

nodes) that are disconnected from each other – here we do not impose the condition<br />

that the network is connected. The performance of slot allocation protocols<br />

from spatial reuse point of view in such small networks does not differ much.<br />

However, if we impose the condition that the network is always connected, that is,<br />

any node can be reached from any other node (via multi-hops), then there would<br />

be a noticeable performance gap between the HUDSAP <strong>and</strong> the RAND even for<br />

a network comprising 50 sensors or less, which we observed in simulations that are<br />

not included here due to space constraints. Regarding the topological information,<br />

in DRAND each node requires knowledge about the identities of the nodes within its


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

261<br />

two-hop contention area <strong>and</strong> their slot assignment. Compared to that, in HUDSAP,<br />

each node also requires knowledge about the NoNs of the two-hop neighbors. Note<br />

that, although the NoNs of the one-hop neighbors is available in DRAND but that<br />

knowledge is not employed in slot scheduling.<br />

Figure 8. Channel utilization efficiency comparison for fixed number of nodes<br />

Figure 9. Channel utilization efficiency comparison for fixed transmission range<br />

For MNF two labeling schemes are considered, one based on the the NoNs<br />

<strong>and</strong> the other based on the number of two-hop neighbors (NtN) which are, respectively,<br />

denoted as MNF-NoNs <strong>and</strong> MNF-NtNs. The figures show that there is no<br />

appreciable gap between the schedule length of the HUDSAP <strong>and</strong> the MNF-NoNs.


262 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

However, there is a marginal gap between the performance of the HUDSAP <strong>and</strong><br />

the MNF-NtNs. The reason for this performance gap is that the HUDSAP is designed<br />

for ordering based on NoNs whereas the MNF-NtNs is based on the NtNs.<br />

Even though the performance gap is not substantial, it is straightforward to extend<br />

the HUDSAP where prioritization of slot assignment is based on the NtNs,<br />

in which case it is expected that the performance of the HUDSAP <strong>and</strong> the MNF-<br />

NtNs will converge. However, that will require each node to know the NtNs of all<br />

nodes within its contention area, which would entail additional protocol overhead.<br />

Given that there is a marginal gain in channel utilization efficiency, the additional<br />

overhead may not justify the gain. Besides, it should be noted that the HUDSAP<br />

is a distributed slot assignment protocol which relies on local topology knowledge<br />

at each node, whereas the MNF is a centralized protocol which requires global<br />

topology information.<br />

Next we evaluate the impact of variable frame-length selection on the channel<br />

utilization efficiency. In this regard, for the preceding two network deployment<br />

scenarios, we compare the number of additional packets that can be<br />

transmitted within the frame length of Z-MAC when the frame-length is selected<br />

according to the proposed framing scheme. In Fig. 10 <strong>and</strong> Fig. 11 we<br />

plot the additional packets: average over 10 4 r<strong>and</strong>om deployments of the nodes<br />

<strong>and</strong> the maximum over the deployments. The figures show that with the proposed<br />

framing scheme, we could transmit more packets, which when seen for<br />

the network use over considerably longer time window could translate into<br />

substantially higher throughput.<br />

Figure 10. Number of additional packets (maximum <strong>and</strong> average over deployments of nodes)<br />

that can be transmitted within the frame length of Z-MAC under the proposed adaptive frame size<br />

selection scheme. Comparison is for fixed transmission range


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

263<br />

Figure 11. Number of additional packets (maximum <strong>and</strong> average over deployments of nodes) that<br />

can be transmitted within the frame length of Z-MAC under the proposed adaptive frame size<br />

selection scheme. Comparison is for fixed number of nodes<br />

VI. Concluding remarks<br />

In this work, we proposed a distributed TDMA slot assignment protocol to<br />

schedule access of the wireless nodes to the shared wireless channel. The nodes,<br />

by this protocol, can find conflict-free slot assignment using only the local topology<br />

information. The proposed medium access scheduling protocol is suitable for<br />

wireless ad hoc networks for mission-critical applications <strong>and</strong> emergency response<br />

services which require wireless connectivity be provided that meet certain QoS<br />

requirements. We showed that the protocol can achieve higher channel utilization<br />

efficiency compared to the existing protocols like RAND <strong>and</strong> DRAND. We also<br />

proposed an adaptive frame size selection scheme which gives higher channel<br />

utilization than the framing scheme proposed in Z-MAC protocol.<br />

In this work we give a qualitative description of our protocol <strong>and</strong> substantiate<br />

it with performance evaluation with a few numerical examples. In our planned ongoing<br />

work, to better underst<strong>and</strong> the behavior of the protocol, we would do further<br />

analysis based on analytical modeling <strong>and</strong> event driven simulations. We plan to<br />

compare the convergence time <strong>and</strong> the control message overhead of the protocol.<br />

We also plan to study the behavior of the algorithm for dynamic topology changes<br />

due to the nodes joining <strong>and</strong> leaving the network, <strong>and</strong> the movement of the nodes<br />

within the network.


264 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

References<br />

[1] P. Suriyachai, J. Brown, <strong>and</strong> U. Roedig, “Time-critical data delivery in wireless<br />

sensor networks,” Proc. of 6th IEEE Int. Conf. on Distributed Computing in Sensor<br />

Systems (DOCSS’10), pp. 216-229, June 2010.<br />

[2] J. Brown et al., “BurstProbe: debugging time-critical data delivery in WSNs,” Proc.<br />

of EU. Conf. on WSNs, pp. 195-210, Feb. 2011.<br />

[3] C.D. Young, “USAP: A unifying dynamic distributed multichannel TDMA slot<br />

assignment protocol,” Proc. of IEEE MILCOM, pp. 235-239, Oct. 1996.<br />

[4] C.D. Young, “USAP multiple access: dynamic resource allocation for mobile multihop<br />

multichannel wireless networking,” Proc. of IEEE MILCOM, pp. 271-275, Nov. 1996.<br />

[5] A. Kanzaki, T. Uemukai, T. Hara, <strong>and</strong> S. Nishio, “Dynamic TDMA slot assignment<br />

in ad hoc networks,” Proc. of 17th Int. Conf. on Advanced Inform. Net. <strong>and</strong> Applications<br />

(AINA ’03), pp. 330-335, Mar. 2003.<br />

[6] A. Kanzaki, T. Hara, <strong>and</strong> S. Nishio, “An efficient TDMA slot assignment protocol<br />

in mobile ad hoc networks,” Proc. of ACM Symp. on Applied Computing (SAC ’07),<br />

pp. 891-895, Mar. 2007.<br />

[7] I. Rhee, A. Warrier, J. Min, <strong>and</strong> L. Xu, “DRAND: Distributed r<strong>and</strong>omized TDMA<br />

scheduling for wireless ad hoc networks,” IEEE Trans. on Mobile Computing, vol. 8,<br />

no. 10, pp. 1384-1396, Oct. 2009.<br />

[8] I. Rhee et al., “Z-MAC: A hybrid MAC for wireless sensor networks,” IEEE/ACM<br />

Trans. on Net., vol. 16, no. 3, pp. 511-524, June 2008.<br />

[9] L. Bao, <strong>and</strong> J.J. Garcia-Luna-Aceves, “A new approach to channel access ccheduling<br />

for ad hoc networks,” Proc. of 7th ACM Int. Conf. on Mobile Comp. <strong>and</strong> Net.<br />

(SIGMOBILE’01), pp. 210-221, Jul. 2001.<br />

[10] A. Rao, <strong>and</strong> I. Stoica, “An overlay MAC layer for 802.11 networks,” Proc. of ACM<br />

Int. Conf. on Mobile Sys., Applications, <strong>and</strong> Services, pp. 135-148, 2005.<br />

[11] E.L. Lloyd, <strong>and</strong> S. Ramanathan, “On the complexity of link scheduling in multihop<br />

radio networks,” Proc. of 26th Conf. on Inform. Science <strong>and</strong> System, 1992.<br />

[12] S. Even et al., “On the NP-completeness of certain network testing problems,”<br />

Jr. on Networks, vol. 14, no. 1, pp. 1-24, 1984.<br />

[13] S. Ramanathan, “A unified framework <strong>and</strong> algorithm for (T/F/C)DMA channel<br />

assignment in wireless networks,” Proc. of 16th IEEE INFOCOM, pp. 900-907,<br />

Apr. 1997.<br />

[14] A. Ephremedis, <strong>and</strong> T. Truong, “Scheduling broadcasts in multihop radio networks,”<br />

IEEE Trans. on Commun., vol. COM-38, pp. 456-460, Apr. 1990.


Hybrid Network Synchronization for MANETs<br />

Harri Saarnisaari, Teemu Vanninen<br />

Centre for Wireless <strong>Communications</strong>, University of Oulu, Oulu, Finl<strong>and</strong><br />

harri.saarnisaari@ee.oulu.fi, teemu.vanninen@ee.oulu.fi<br />

Abstract: <strong>Military</strong> radio networks such as mobile ad hoc networks (MANETs) usually rely on global<br />

satellite navigation systems (GNSSs) for network time synchronization. However, in reality all nodes<br />

may not have a GNSS timing device or they do not have a direct link to a GNSS timed node. In addition,<br />

in some situations GNSSs may fail. Therefore, additional supporting mechanisms are needed<br />

for synchronization. This paper provides a hybrid algorithm that uses GNSS timed nodes as master<br />

time servers if they are available but automatically turns to a distributed mode if GNSS time is not<br />

available providing robustness <strong>and</strong> survivability. Furthermore, the distributed mode can be used also<br />

as a st<strong>and</strong>-alone synchronization mechanism, i.e., a GNSS time reference is not necessarily needed<br />

at all. Simulations show the behavior of the algorithm in different scenarios but as main conclusions<br />

it can be said that the availability of GNSS timed nodes speeds up the initial convergence, the convergence<br />

rate depends on the number of nodes <strong>and</strong> the number of hops <strong>and</strong> that if GNSS time is lost,<br />

the network still maintains synchronism but time is not necessarily GNSS time.<br />

Keywords: component; network; synchronization; hybrid<br />

I. Introduction<br />

All the pictures are created by the authors<br />

<strong>Military</strong> mobile ad hoc networks (MANETs) usually use time division multiple<br />

access (TDMA) as a channel access protocol <strong>and</strong> often frequency hopping to<br />

provide robustness. These operations require time synchronized nodes. There are<br />

several possible strategies for network time synchronization [1]. One option is to<br />

have full autonomy, where the clocks function independently without affecting<br />

to each other. This option requires frequent calibrations since clocks tend to drift<br />

from each other. Precise clocks that provide autonomy for a period [2] or external<br />

precise time source such as global satellite navigation system (GNSS) are also possibilities<br />

herein. A second option is the (centralized) master-slave structure. This<br />

is a hierarchical system where the lower level nodes synchronize with the higher<br />

level nodes but not vice versa. A drawback of this method is that a fault in a master<br />

(or sub-master) node affects the whole (rest of the) network. This makes the network<br />

vulnerable. The advantages of this method are its simplicity <strong>and</strong> that clock quality<br />

requirements are reduced to the higher hierarchy levels, which lowers the costs.<br />

The third alternative is the mutual (distributed, decentralized) synchronization


266 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

in which the nodes synchronize themselves based on mutual cooperation without<br />

a master. Naturally, there are also hybrid strategies where a master (or a group<br />

of masters) leads the game but the rest of the nodes cooperate in a mutual fashion.<br />

Possibly, there is a hierarchical structure <strong>and</strong> cooperation exists within a hierarchy<br />

level. Furthermore, the master could be one that is not permanent but it can be<br />

replaced by another node in the case of failure or if it is not available for some<br />

other reason.<br />

Inside the strategies are protocols, which describe how timing messages are<br />

distributed in a network <strong>and</strong> what <strong>and</strong> how many messages are needed. Several<br />

protocols have been proposed for network time synchronization (NTS) of wireless<br />

sensor <strong>and</strong> ad-hoc networks. References [3-9] provide a good snapshot of these<br />

protocols. They follow the above mentioned general strategies in a way or another.<br />

Actions one needs are not usually concentrated in a single spot (system). Instead,<br />

one may use information coming from different systems all around the globe.<br />

In order to keep different systems on the same time base it is natural to assume,<br />

or require, that if GNSS time is available it has to be used since it is a provider<br />

of the Universal Coordinated Time (UTC). This paper considers a novel hybrid<br />

synchronization approach proposing an algorithm which uses a GNSS timed<br />

node or nodes as a master or masters if they are available. If those are not available<br />

it uses a distributed approach. This increases robustness since lost of masters<br />

does not destroy synchronization. Both use of GNSS time whenever available <strong>and</strong><br />

robustness are features sought by military. It is also very possible that all nodes<br />

do not have a GNSS time source device or they are not direct neighbors of such<br />

a node. The proposed algorithm is able to synchronize nodes in a multi hop fashion.<br />

It uses nodes that have heard GNSS timed nodes or their nearest or further distant<br />

neighbors as masters if those are available. Furthermore, the algorithm distributes<br />

knowledge of existence of masters all over the network, <strong>and</strong> neglects this information<br />

if masters are lost. This information may be utilized in the merging case. The way<br />

how network time synchronization messages are delivered (which channel, how<br />

often, etc) is not proposed, neither there are special requirements on that meaning<br />

that the algorithm is very generic. Simulations demonstrate convergence speed for<br />

different network size, (normalized) network synchronization accuracy <strong>and</strong> effect<br />

of losing all the masters.<br />

II. Algorithm<br />

The principles of the proposed algorithm are simple. First, use GNSS time<br />

as a master time reference if it is available. Second, if GNSS time is not available<br />

in the network, use a distributed algorithm. A consequence of the first principle<br />

is that even if only one GNSS timed node is available, its existence must be distributed<br />

all over the network <strong>and</strong> its time must be used as a reference. In practice this<br />

is implemented by maintaining a heard master (HM) flag in the synchronization


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

267<br />

message. It is on if GNSS time is available <strong>and</strong> off otherwise. It is set on if a node<br />

receives message from a GNSS timed node (master) or from a node whose HM<br />

flag is on. A consequence of the second principle is that if a node is not a GNSS<br />

timed node or does not receive any time synchronization messages where the HM<br />

flag is on, it uses a distributed time synchronization algorithm.<br />

The state machine of the algorithm is shown in Fig. 1. The shown algorithm<br />

includes the integrity check not implemented in the simulation chain. The integrity<br />

check is essential to self-monitor the network for malfunctioning of GNSS timed<br />

nodes (or detect misleading GNSS timed nodes) <strong>and</strong> inform the operator if needed.<br />

Herein, this aspect was not considered <strong>and</strong> all GNSS timed nodes were assumed<br />

to perform properly, i.e., they all show the same time. Neither was inform-mycurrent-network<br />

feature implemented. That can ease <strong>and</strong> speed up merging cases<br />

that is discussed briefly later on.<br />

Figure 1. The state machine of the proposed network synchronization algorithm


268 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

A node initially listens a period for network synchronization messages<br />

(NETSYNC MSG). If it does not receive any it initiates its own message. Then it waits<br />

again. The waiting time may include some r<strong>and</strong>omness around an initial value or<br />

in an interval. It may also be shorter in the initialization phase than in the communications<br />

phase. It may be shorter for GNSS timed nodes than for other nodes<br />

since that would favor GNSS timed nodes that are anyway used as master nodes.<br />

If it receives a message its behavior depends on the contents of the message <strong>and</strong> its<br />

own state. If the node is a GNSS timed node (master) it does not adjust itself. If it is<br />

non GNSS timed node its behavior depends on contents of the message as clearly<br />

described on the state machine. However, some principles may be unclear from<br />

the machine. Therefore, some aspects are considered more detailed in what follows<br />

in this section.<br />

Time tuning at the receiver is based on time difference of the local clock<br />

reading <strong>and</strong> received time readings [10]. Time tuning is done at the every adjustment<br />

instant, i.e., discretely at certain points, not continuously after receiving any<br />

single message. This is because of robustness. If all messages would be used for<br />

time tuning after they arrive it may result a ping pong effect in time or between<br />

master-slave <strong>and</strong> distributed mode. In addition, if a receiver could receive several<br />

messages it can select the best ones for its own purpose. For example, it receives<br />

a few messages from HM-flag-off nodes <strong>and</strong> then finally at the end of the listening<br />

period a message from a HM-flag-on node. Then, it can be use the best time<br />

source on that period, i.e., the HM-flag-on node <strong>and</strong> ignore the HM-flag-off nodes.<br />

Observed time difference is used as such if the message is from a master node<br />

(node with a GNSS time device) or from a node with the HM lag on. If several<br />

masters are observed during a period, only one is used. This could be the one<br />

with the smallest time since that is closest to the receiver <strong>and</strong>, as a consequence,<br />

the bias from uncompensated propagation delay would be the smallest. In the simulations<br />

the first master was selected for simplicity. If several HM-flag-on nodes are<br />

observed, average of their time difference to the local time is used to set the time.<br />

In both the cases the observed (<strong>and</strong> selected) time differences are used in the masterslave<br />

fashion, i.e., directly to set the time. In the distributed mode the average time<br />

difference is weighted by a coefficient (0.5 herein) <strong>and</strong> then added to the previous<br />

time [10].<br />

An adjustment interval should be selected such that a new adjustment is done<br />

before clocks drift too far away from each other. Or, indeed, well before to leave<br />

some margin. What affects to this interval are the initial synchronization error after<br />

previous adjustment, discussed in the next subsection, <strong>and</strong> clock skew caused by<br />

frequency errors. For example, 1 ppm (part per million) clocks cause 1 µs error<br />

in every second. Since this may be in both directions, the total maximum error is 2 µs.<br />

One has to count how many seconds clocks could be without adjustment <strong>and</strong> select<br />

adjustment period based on this. At the initial phase the adjustment period, as well<br />

as listening period, could be shorter. In the communications phase, at least, these


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

269<br />

two coincide. It would also be advantageous if time information (NETSYNC MSG)<br />

could be transmitted more than once in the adjustment period since that increases<br />

robustness, e.g., since some messages may be lost. However, this may not be sensible<br />

since that increases overhead in the system. Therefore, final selection is a tradeoff<br />

between overhead <strong>and</strong> robustness.<br />

Time information is sent in a network synchronization message. The message<br />

includes a time stamp, a master flag <strong>and</strong> the HM flag information. The master flag<br />

informs that a node is a master (GNSS timed node). The synchronization messages<br />

are send in a control channel (either logical or physical), but in this paper we do<br />

not care how the control channel is actually implemented. It is just assumed that<br />

the network synchronization messages are send at certain intervals <strong>and</strong> that these<br />

messages can be heard by other nodes. This is a sensible assumption since otherwise<br />

synchronization is impossible.<br />

Possible difficult points in MANETs are late entry <strong>and</strong> merging. These should<br />

be made as automatic <strong>and</strong> fast as possible, i.e., the operator should not need to<br />

manage this <strong>and</strong> it should not take tens of minutes. As the network synchronization<br />

process is part of this, it should be fast too. It is obvious from the state machine that<br />

the GNSS timed node case is trivial. If two GNSS timed networks merge they are<br />

readily synchronized. If a non-GNSS timed node or network merges with a GNSS<br />

timed node or network it adapts GNSS time. However, if two non-GNSS timed<br />

networks merge the situation is more problematic since use of pure distributed<br />

algorithm would yield to very long convergence period. Therefore, the process<br />

should be speeded <strong>and</strong> that means, e.g., merging case detection <strong>and</strong> decision which<br />

of the networks has to change its time <strong>and</strong> which preserves its time.<br />

A. Performance of NTS<br />

It can be concluded from [10-13] that the accuracy of the algorithm depends<br />

on the accuracy of time delivery <strong>and</strong> biases caused by uncompensated delays <strong>and</strong><br />

clock frequency offsets (skew). Since the beating frequency of clocks is not usually<br />

controlled, skew occurs in every adjustment period. This term is mitigated by<br />

properly chosen the adjustment interval. Contrary, propagation delay could be<br />

compensated. In master-slave networks bias by uncompensated delays cumulates<br />

on each hop the master’s message has to jump whereas in distributed networks<br />

this effect is somewhat averaged away. Therefore, delay compensation might be<br />

a critical issue especially if the network synchronization requirements are high<br />

<strong>and</strong> also if distances (measured in seconds) between nodes are large, quite close to<br />

the synchronization requirement. There are several means for the compensation.<br />

In the master-slave scheme master <strong>and</strong> slave may interact pairwise to measure<br />

the propagation delay. This means that interaction has to be repeated for each pair.<br />

An example of this is the IEEE 1588 precise timing protocol. In two way schemes<br />

nodes send measured time differences back to the origin which use them to mitigate


270 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

the delay. If feedback fails this kind of system reduces to uncompensated systems,<br />

i.e., it still works but has bias. The system is robust in the sense that it does not rely<br />

on delay compensation (assuming that provided synchronization accuracy is sufficient).<br />

Node positions, if they are known, can be used to calculate propagation delays<br />

<strong>and</strong> used for delay compensation. In this sense use of situation awareness picture<br />

(concerning node positions) could be a valuable tool in network synchronization.<br />

Note that the positioning accuracy does not necessarily need to be extremely accurate<br />

since 1 µs corresponds to 300 m. If one or few µs is tolerable compensation<br />

accuracy, then 300 m to 1 km positioning accuracy would be sufficient.<br />

III. Simulations<br />

Simulations were implemented using MATLAB. The simulation area is a X<br />

by X square with N r<strong>and</strong>omly deployed nodes. The communication range is αX.<br />

There are M masters that could be switched off at the moment T. Results are shown<br />

as a function of adjustment intervals. All time errors <strong>and</strong> distances are normalized<br />

to time-of-arrival (TOA) measurement accuracy which is typically about one tenth<br />

of the inverse of the signal b<strong>and</strong>width or, equally, one tenth of the symbol duration.<br />

Therefore, 1 MHz signal provides (about) 0.1 µs TOA accuracy (or 30 m) <strong>and</strong> 5 MHz<br />

signal 0.02 µs (6 m) accuracy. With these numbers, if X is 500, it corresponds to<br />

15 000 m or 3000 m, respectively. Correspondingly one founds effects of skew <strong>and</strong><br />

distances. One counts the effect of skew in TOA accuracy units during the adjustment<br />

period. So, if β is the skew <strong>and</strong> T adj the adjustment period, then the effect of skew<br />

is βT adj /σ, where σ is the accuracy. For example, if the skew is 1 ppm <strong>and</strong> T adj is 1 s<br />

or 100 s, then for 1 MHz signal this corresponds to 10 <strong>and</strong> 1000, respectively, <strong>and</strong><br />

for 5 MHz signal these are five times larger.<br />

If required synchronization accuracy (worst case) in frequency hopping<br />

systems would be half the hop duration <strong>and</strong> hop rate would be 1000 hops/s, then<br />

the required worst case synchronization accuracy would be 5000 units or 25 000<br />

units, respectively using the above numerical values. This would be nice to remember<br />

when one interprets the simulation results. Even without reference to hopping systems<br />

one should calculate worst case accuracy related to delay estimation accuracy.<br />

Furthermore, we calculate clock time errors with respect a reference node since<br />

this is the meaningful way to do it [10]. If there are masters, a master is selected<br />

as a reference that is quite natural. In the other case node number 1 is selected.<br />

The former selection causes some harm when lost of GNSS nodes is investigated<br />

since error is still measured with respect to a master. However, most significant<br />

conclusions can be drawn even with this small inconvenience. Results are averaged<br />

over 100 runs with same node deployment. The initial time offsets, skews <strong>and</strong> TOA<br />

errors are altered.<br />

The first result shows ultimate accuracy limits since delays are perfectly compensated<br />

<strong>and</strong> skews are zero. There are 32 nodes including 5 masters <strong>and</strong> X = 500.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

271<br />

The initial offset (of non-masters) is from range ±3×10 8 . The communication range<br />

is 250. A r<strong>and</strong>om deployment is shown in Fig. 2 <strong>and</strong> resulting time errors at Fig. 3.<br />

Since the communication range is long <strong>and</strong> masters quite uniformly distributed<br />

over the area, convergence is fast, at the first round, i.e., all nodes are direct neighbors<br />

of masters. The not shown root means square error (RMSE) values are equal<br />

to one, i.e., equal to the time delivery accuracy as it should be. Therefore, the time<br />

delivery accuracy is the ultimate limit.<br />

500<br />

Connectivity plot. Masters are red diamonds.<br />

450<br />

400<br />

350<br />

300<br />

250<br />

200<br />

150<br />

100<br />

50<br />

0<br />

0 100 200 300 400 500<br />

Figure 2. Example r<strong>and</strong>om node deployment into area <strong>and</strong> existing connections.<br />

X = 500, N = 32, M = 5, α = 0.5<br />

10<br />

8<br />

6<br />

4<br />

time error term<br />

2<br />

0<br />

−2<br />

−4<br />

−6<br />

−8<br />

−10<br />

0 5 10 15 20<br />

adjustment instants<br />

Figure 3. Ultimate timing errors <strong>and</strong> convergence speed. X = 500, N = 32, M = 5, α = 0.5<br />

The results in Fig. 4 show the same setup but with uncompensated delays.<br />

The maximum bias is close to the maximum communication range as well as is<br />

RMSE, which value, indeed, is the limit in the single hop case. In the multiple hops<br />

case uncompensated delays would cumulate.


272 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

If the skew is from interval ±500 (for non masters) the total bias still increases<br />

as shown in Fig. 5 as well as RMSE, that goes up to level 400.<br />

300<br />

250<br />

200<br />

time error term<br />

150<br />

100<br />

50<br />

0<br />

0 5 10 15 20<br />

adjustment instants<br />

Figure 4. Timing errors when delays are uncompensated. X = 500, N = 32, M = 5, α = 0.5<br />

500<br />

450<br />

400<br />

350<br />

time error term<br />

300<br />

250<br />

200<br />

150<br />

100<br />

50<br />

0<br />

0 5 10 15 20<br />

adjustment instants<br />

Figure 5. Timing errors when delays are uncompensated <strong>and</strong> skews are present.<br />

X = 500, N = 32, M = 5, α = 0.5<br />

Shorter communications ranges often yield to separated subnets <strong>and</strong> are thus<br />

meaningless to study in this paper where the focus is in the behavior of the whole<br />

network. To study this shorter communication range effect we increase the number<br />

of nodes to 128 <strong>and</strong> kept the rest parameters. The results are in Fig. 6. It can be seen<br />

that some nodes are one hop <strong>and</strong> some two hop neighbors of masters. Then the range<br />

was decreased to 100, i.e., one fifth of the area size. Although not easily seen from<br />

the Fig. 7, the convergence rate decreases to four rounds (but depends naturally<br />

on the largest number of hops between a master <strong>and</strong> a node). After convergence<br />

the error is increased. It is believed that this is due to averaging in the algorithm


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

273<br />

since a node computes an average based on all received HM-flag-on messages. This<br />

averaging increases robustness. It would be possible to modify the algorithm to accept<br />

only one HM-flag-on message. It is expected that if this selection could be done<br />

wisely, the error would be smaller. However, this feature was not tested. The total<br />

bias is also increased due to this averaging <strong>and</strong> accumulated skew <strong>and</strong> delay terms.<br />

Figure 6. Timing errors when delays are uncompensated <strong>and</strong> skews are present.<br />

X = 500, N = 128, M = 5, α = 0.5<br />

Figure 7. Timing errors when delays are uncompensated <strong>and</strong> skews are present.<br />

X = 500, N = 128, M = 5, α = 0.2<br />

The effect of losing the masters at the adjustment point 100 is investigated<br />

when X = 500, N = 32, M = 5, α = 0.5. The results in Fig. 8 show that after the lost<br />

the nodes' times diverge from zero (that is the masters' time). However, the nodes'<br />

times stay very close together <strong>and</strong> their times go to the same direction. Therefore,<br />

they remain synchronized, but that is what is expected. The novelty was to include


274 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

an automated step from the master-slave mode into the distributed mode (<strong>and</strong><br />

back if needed).<br />

Finally, convergence speed <strong>and</strong> error without master nodes is investigated.<br />

The RMSE results in Fig. 9 show that convergence takes about 80 adjustment periods,<br />

i.e., much much more than in the master-slave mode. However, the timing<br />

error is at the same level.<br />

6000<br />

5000<br />

4000<br />

time error term<br />

3000<br />

2000<br />

1000<br />

0<br />

0 50 100 150 200<br />

adjustment instants<br />

Figure 8. Timing errors when delays are uncompensated <strong>and</strong> skews are present <strong>and</strong> masters<br />

are lost at point 100. X = 500, N = 32, M = 5, α = 0.5<br />

1000<br />

900<br />

800<br />

rmse of time error wrt ref<br />

700<br />

600<br />

500<br />

400<br />

300<br />

200<br />

100<br />

0<br />

0 50 100 150 200<br />

adjustment instants<br />

Figure 9. RMSE timing errors when delays are uncompensated <strong>and</strong> skews are present without<br />

master nodes. X = 500, N = 32, M = 5, α = 0.5<br />

IV. Conclusions<br />

This paper proposed a novel hybrid master-slave distributed network time<br />

synchronization algorithm that is robust to lost of masters. The algorithm uses GNSS


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

275<br />

timed nodes as masters if they are available <strong>and</strong> is in a robust distributed mode otherwise.<br />

The algorithm has flexibility for further developments. The basic properties<br />

of the algorithm were demonstrated by simulations. The ultimate synchronization<br />

accuracy depends on the time delivery accuracy, but in real life uncompensated<br />

delays or errors in delay compensation <strong>and</strong> unequal clock frequencies cause larger<br />

time errors. The convergence speed in terms of required adjustments depends on<br />

the number of hops between masters <strong>and</strong> slaves. The convergence speed in distributed<br />

mode may be much slower than in the master-slave mode. In addition, it is<br />

slower for larger networks. Therefore, some kind of master-slave structure would<br />

be beneficial in distributed networks at least in the initial phase. In addition, the adjustment<br />

period could be shorter in the initialization phase as usual.<br />

Acknowledgment<br />

This work was done for European Defence Agency (EDA) projects WOLF<br />

(Wireless Robust Link for Urban Force Operations) <strong>and</strong> ETARE (Enabling <strong>Technology</strong><br />

for Advanced Radio in Europe).<br />

References<br />

[1] W.C. Lindsey, F. Ghazvinian, W.C. Hagman, <strong>and</strong> K. Dessouky, “Network<br />

synchronization,” Proceedings of the IEEE, vol. 73, no. 10, pp. 1445-1467, October<br />

1985.<br />

[2] H.A. Stover, “Network Timing/Synchronization for defence communications,”<br />

IEEE Transactions on <strong>Communications</strong>, vol. 28, no. 8, pp. 1234-1244, August 1980,<br />

in a special issue of network synchronization.<br />

[3] K. Römer, P. Blum, <strong>and</strong> L. Meier, “Time synchronization <strong>and</strong> calibration in wireless<br />

sensor networks,” in H<strong>and</strong>book of Sensor Networks: Algorithms <strong>and</strong> Architectures,<br />

I. Stojmenovic, Ed. John Wiley & Sons, 2005.<br />

[4] B. Sundararaman, U. Buy, <strong>and</strong> A. Kshemkalyani, “Clock synchronization for<br />

wireless sensor networks: a survey,” Ad Hoc Networks, vol. 3, pp. 281-323, 2005.<br />

[5] C. Rentel, T. Kunz, “Network synchronization in wireless ad hoc networks,” Carleton<br />

University, Systems <strong>and</strong> Computer Engineering Department, Ottawa, Canada,<br />

Technical report SCE-04-08, 2004.<br />

[6] C. Rentel, T. Kunz, “A clock-sampling mutual network time-synchronization<br />

algorithm for wireless ad hoc networks,” in IEEE Wireless <strong>Communications</strong> <strong>and</strong><br />

Networking Conference (WCNC), vol. 1, 2004, pp. 638-644.<br />

[7] Q. Li, D. Rus, “Global clock synchronization in sensor networks,” IEEE Transactions<br />

on Computers, vol. 55, no. 2, pp. 214-226, February 2006.<br />

[8] D. Mills, “Improved algorithms for synchronizing computer network clocks,” IEEE<br />

Transactions on Networking, vol. 3, no. 3, pp. 245-254, June 1995.


276 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

[9] E. Serpedin, Q.M. Chaudhari, Synchronization in Wireless Sensor Networks:<br />

Parameter Estimation, performance Benchmarks <strong>and</strong> Protocols. Cambridge University<br />

Press, 2009.<br />

[10] H. Saarnisaari, “Analysis of a discrete network synchronization algorithm,”<br />

in Proceedings of the IEEE <strong>Military</strong> <strong>Communications</strong> Conference, Atlantic City, NJ,<br />

USA, 2005.<br />

[11] A. Fasano, G. Scutari, “The effect of additive noise on consensus achievement<br />

in wireless sensor networks,” in Proceedings of the IEEE International Conference<br />

on Acoustics, Speech, <strong>and</strong> Signal Processing, April 2008, pp. 2277-2280.<br />

[12] A. Davies, “Discrete-time synchronization of communications networks having<br />

variable delays,” IEEE Transactions on <strong>Communications</strong>, vol. 23, no. 7, pp. 782-785,<br />

July 1975.<br />

[13] G. Scurati, S. Barbarossa, <strong>and</strong> L. Pescosolido, “Distributed decision through selfsynchronizing<br />

sensor networks in the precence of propagation delays <strong>and</strong> asymmetric<br />

channels,” IEEE Transactions on Signal Processing, vol. 56, no. 4, pp. 1667-1684,<br />

April 2008.


Application of Dezert-Smar<strong>and</strong>ache Theory<br />

for Tactical MANET Security Enhancement<br />

Joanna Głowacka, Marek Amanowicz<br />

Faculty of Electronics, <strong>Military</strong> University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong>,<br />

{jglowacka, mamanowicz}@wat.edu.pl<br />

Abstract: The article presents a concept of Dezert-Smar<strong>and</strong>ache theory application for enhancing<br />

security in tactical mobile ad-hoc network. Tactical MANET, due to its specification, requires collection<br />

<strong>and</strong> processing of information from different sources of diverse security <strong>and</strong> trust metrics.<br />

The authors specify the needs for building a node’s situational awareness <strong>and</strong> identify data sources<br />

used for calculations of trust metrics. They provide some examples of related works <strong>and</strong> present their<br />

own conception of Dezert-Smar<strong>and</strong>ache theory applicability for trust evaluation in mobile hostile<br />

environment.<br />

Keywords: situational awareness, trust, inference methods, tactical MANET, security, Dezert-Smar<strong>and</strong>ache<br />

theory<br />

I. Introduction<br />

The mobile ad-hoc networks are collections of independent nodes that<br />

can communicate via radio channels. These networks are often developed in conditions<br />

of limited or total lack of access to fixed infrastructure.<br />

MANETs are characterized by high dynamic changes in the location of each<br />

node <strong>and</strong> the vulnerabilities of various types of attacks. Due to the open medium,<br />

ad-hoc networks are more susceptible to eavesdropping <strong>and</strong> data injections. A dynamic<br />

change of network topology contributes to the frequent connecting <strong>and</strong><br />

disconnecting nodes, <strong>and</strong> no central network monitoring makes it difficult to<br />

detect malicious behaviour of nodes. In addition, the network resource limitations<br />

contribute to the selfish attacks. They are aimed at consuming a large amount<br />

of b<strong>and</strong>width. One of the selfish behaviours is the failure to transfer the packages<br />

by a node to conserve its own energy.<br />

Security ensuring is particularly difficult for a tactical ad-hoc network, due to<br />

the necessity of dealing with a hostile environment, strict capacity constraints, the re-<br />

This article was written as a part of a scientific research project financed by polish government budget for<br />

science in 2010-2013 “An advanced methods <strong>and</strong> techniques of traffic control in tactical ad-hoc networks”<br />

No. O N517 274 839.


278 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

quirements for services, very rapid changes of network topology <strong>and</strong> dynamically<br />

forming groups of common interests, which cannot be pre-defined by trust relationships<br />

[1]. These networks are characterized by simple capability of adding new nodes,<br />

which may be of diverse nature, such as the allies, neutral or hostile nodes.<br />

Figure 1. A sample mobile ad-hoc network structure<br />

One method of ensuring the security is user authentication. Only the authorized<br />

nodes <strong>and</strong> those verified as allies can have access to the network. However,<br />

during the mission, a node can be taken over by the enemy, or change the nature<br />

of its behaviour – behaving to the detriment of the mission.<br />

Due to the lack of a central management system it is needed for nodes to<br />

cooperate. Each of them is in fact a router ensuring cooperation between subnets<br />

<strong>and</strong> nodes located at a distance greater than the radio range.<br />

Restrictions on ad-hoc networks contribute to the need of using other means<br />

than in wired networks to satisfy the safety requirements. In addition to authorization<br />

<strong>and</strong> authentication mechanisms, it is necessary for a node to have the knowledge<br />

on the behaviour of other nodes in the network, determining safety routes for data<br />

transfer <strong>and</strong> knowledge concerning the reaction manners in certain situations.<br />

The situational awareness building method will be complement of st<strong>and</strong>ard security<br />

mechanisms in mobile ad-hoc networks.<br />

II. Node’s situational awareness<br />

A. Definitions<br />

To identify opportunities of secure cooperation between nodes in ad-hoc<br />

networks, it is necessary to collect information about other nodes in the network.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

279<br />

The ability to have accurate information about the surrounding reality <strong>and</strong> interpretation<br />

of the current situation in terms of the performed tasks is defined as a node’s<br />

situational awareness.<br />

The main product of the node’s situational awareness mechanism is information<br />

on the node trust levels.<br />

Trust is an interdisciplinary concept, characterized by a variety of definitions.<br />

It is understood as relying on the integrity, strength <strong>and</strong> ability of a person or thing.<br />

In the case of ad-hoc network it is translated as a set of relationships between people<br />

who use similar communication protocols [1]. These relations are defined based on<br />

previous interactions of individuals. In [2], trust is treated as the degree of belief<br />

about the behaviour of other entities. Trust can also be understood as reputation,<br />

opinion, or the probability of correct behaviour [3].<br />

In MANET, trust is the level of faith, which can be assigned by the node to<br />

its surroundings on the basis of observations <strong>and</strong> opinions coming from the other<br />

nodes in the network [4].<br />

B. Benefits<br />

Building node’s awareness is essential to achieve the mission. In heterogeneous<br />

networks, the completion of the mission is dependent on the integrity of individuals.<br />

The knowledge gained from building node’s awareness can ensure cooperation<br />

only between trusted entities that do not behave suspiciously.<br />

Secure exchange of information between nodes requires proper selection<br />

of the route of data transfer. Sending data via routes that are not safe may contribute<br />

to the leak or acquisition of data by unauthorized persons. Lack of metrics<br />

allowing for choosing the path depending on the level of confidence in nodes <strong>and</strong><br />

the risk, that exists in choosing the path of data transfer <strong>and</strong> cooperation between<br />

the nodes, may contribute to the failure of the operation.<br />

Figure 2. The possibility of application of the knowledge from building node’s awareness<br />

in different OSI model layers


280 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The dynamic process of creating a current situational view of node can be<br />

the basis for decisions on how to control traffic.<br />

The knowledge about the surrounding environment gained through the mechanism<br />

of building node’s awareness can be applied in different layers in order to protect<br />

the communication between nodes. In the data link layer it can be used to define<br />

a parameter indicating the possibility of cooperation with the nodes or the need<br />

for failure to communicate with nodes characterizing a low level of confidence.<br />

In the third layer level of trust, it can be used as metric routing protocol that will<br />

allow you to safely share data. Specified nodes confidence level can be used also<br />

in the application layer, where the nodes of questionable confidence level will be<br />

forced to certain behaviour for performing its final assessment assignment.<br />

C. Data sources<br />

Node’s situational awareness in most cases is built based on direct interactions,<br />

indirect observations <strong>and</strong> recommendations.<br />

Trust determined by the node based on direct interaction <strong>and</strong> observation<br />

of behaviour of other nodes is called direct trust.<br />

Trust determined on the basis of indirect observations <strong>and</strong> recommendations<br />

is called indirect trust. Recommendations shall be understood as opinions of other<br />

nodes on the node for which the level of confidence is being specified.<br />

Figure 3. Direct <strong>and</strong> indirect trust<br />

In many cases information from various sources may be incomplete, inconsistent<br />

or conflicting. This requires the selection of appropriate methods of inference,<br />

which would allow clear <strong>and</strong> accurate assessment of the current environment<br />

in which network node operates.<br />

III. Related works<br />

The problem of gathering information about the surrounding node reality <strong>and</strong><br />

determining the nodes trust in ad-hoc networks has recently been very popular <strong>and</strong><br />

widely developed in the literature, which demonstrates the importance of this topic.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

281<br />

Probabilistic inference is the most frequently used method in the literature to<br />

determine the node trust level. The information about node behaviour is evaluated<br />

as 0 or 1, match or success.<br />

In [5], the theoretical concept was presented to assess the level of trust <strong>and</strong><br />

its propagation. Trust in this approach is considered as a measure of uncertainty<br />

expressed in a measure of entropy. In the case of entropy based trust model, promoted<br />

trust is calculated on the basis of individual trust values. In the trust model<br />

based on the probability, the value of propagated trust is calculated by the probability<br />

of trust relationships. In this model, the probability of correct relations<br />

assessment is also included. This concept also includes an assessment of trust on<br />

the basis of observation.<br />

In [6], new concept of the TMF (Trust Management Framework) was presented.<br />

TMF is used for nodes to obey protocol <strong>and</strong> cooperate with each other.<br />

There are two types of TMF:<br />

• reputation based – trust is assessed based on direct observations <strong>and</strong> information<br />

of the second h<strong>and</strong>, Bayesian approach based on the distribution<br />

of β is being used,<br />

• trust establishment – trust is assessed based on direct observation <strong>and</strong><br />

the relationship established between nodes without regard to previous<br />

opinions of intermediate nodes.<br />

Both types of TMF are immune to numerous attacks, therefore, OTMF (Objective<br />

TMF) has been proposed to prevent them. This solution is based on modified<br />

Bayesian approach, in which different weights are assigned to different information<br />

given at the time of their occurrence <strong>and</strong> that concerning their supplier. Influence<br />

of the previous observations decreases exponentially, <strong>and</strong> the trust is used as a weight<br />

for second-h<strong>and</strong> information. The two parameters – “trust value” <strong>and</strong> “confidence<br />

value” – are combined in OTMF into one metric called “trustworthiness”.<br />

The article [7] presents Hermes framework determination of node trust, which<br />

helps in ensuring the reliability of packet transmission. Framework ensures that<br />

the source sends packets only by the trusted intermediate nodes. In this solution,<br />

each node determines the reliability metric of neighbouring nodes based on direct<br />

observation of transmitted packets. Reliability is further extended with opinions<br />

from other nodes. The proposed solution uses a Bayesian approach to determine<br />

the value of trust. Trust is calculated on the basis of the beta probability distribution.<br />

Beta distribution parameters are determined from observations gathered<br />

during the packet forwarding behaviour. A new metric called trustworthiness,<br />

being a combination of trust <strong>and</strong> confidence metrics, is introduced.<br />

In [8], the trust model was created for the DSR protocol in order to take a decision<br />

on acceptance or rejection of the route. Decisions are made based on the estimated<br />

trust respectively. Trust is determined on the basis of the direct trust <strong>and</strong> recommendations<br />

from other nodes. Direct trust is determined by the sum of experiences<br />

on a given node <strong>and</strong> the recommendation trust is the sum of the recommendations


282 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

received from the nodes. In determining the total trust value both values are taken<br />

into account, but the direct trust has the higher weight. Direct trust is determined<br />

by observation of packets forwarded by the evaluated node. Collected observations<br />

are evaluated positively if they are not modified. The assessment is proportional to<br />

the type of transmitted packet (e.g. route request, data packet). If sent packages are<br />

modified, the observation is evaluated negatively. Negative evaluation is proportional<br />

to the type of packet transmitted <strong>and</strong> the type of modification (e.g. modification<br />

of information about the source, recipient, sequence number, route).<br />

The use of probabilistic inference provides an easy way to determine the node<br />

trust level but also has some disadvantages. Classical logic is based only on two<br />

values represented by 0 <strong>and</strong> 1 or true <strong>and</strong> false. The border between them is clearly<br />

defined <strong>and</strong> unchanging. In addition, classical probability theory does not allow<br />

for distinguishing uncertainty (expressed in terms of probability) from incomplete<br />

knowledge (lack of knowledge on the topic).<br />

The other inference method used to evaluate <strong>and</strong> combine knowledge about<br />

node behaviours is fuzzy logic.<br />

Trust model based on the recommendation similarities (RFSTrust) calculated<br />

with the use of fuzzy mathematics for MANET environment was presented in [9].<br />

The fuzzy trust model is proposed to quantify <strong>and</strong> evaluate the trustworthiness<br />

of nodes, which includes five types of fuzzy trust recommendation relationships.<br />

Theoretical analysis <strong>and</strong> the simulation results show that RFSTrust model can effectively<br />

prevent selfish nodes <strong>and</strong> improves the performance of the entire MANET.<br />

As in the case of inference based on classical logic, fuzzy inference does not<br />

allow separation of uncertain knowledge from lack of knowledge.<br />

Another method of enabling the representation of uncertainty is the mathematical<br />

theory of evidence.<br />

The use one of the mathematical evidence methods – the Dempster-Shafer<br />

theory (DST)[10] – for the determination of selfish behaviour of each node is presented<br />

in [11]. Node cooperation rating is based on the observation of correct packet<br />

delivery. If a source node receives the information about arrival of the package, it will<br />

mean that all nodes in the path behave correctly. In this case, the source node defines<br />

the m() function for each path node, which is named basic belief assignment, as:<br />

0 A{ SELFISH}<br />

mA ( ) <br />

. (1)<br />

1 A{ UNSELFISH}<br />

In the absence of proof of information delivery <strong>and</strong> the lack of error messages,<br />

the source node finds that a path includes not cooperating nodes. Unfortunately,<br />

a number of these nodes <strong>and</strong> information about which nodes are selfish is not<br />

known. The basic belief assignment is defined as:<br />

P A{ SELFISH}<br />

mA ( ) <br />

.<br />

(2)<br />

1 P A { UNSELFISH, SELFISH}


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

283<br />

Each of the nodes in the network is equipped with a dedicated component<br />

implementing an algorithm based on the Dempster-Shafer theory, which uses<br />

the received recommendations <strong>and</strong> results of nodes observation. The solution<br />

has defined two types of trust. The first determines the extent to which the source<br />

node trusts another node that it will send the package correctly. It was used to<br />

determine the belief function defined by the Dempster-Shafer theory. The second<br />

value indicates the degree of trust in which a node trusts that recommendations<br />

generated by another node are correct.<br />

IV. Concept description<br />

Dynamic evaluation of the environment surrounding the node is possible<br />

by continuously monitoring the node behaviour, their analysis <strong>and</strong> information<br />

inference.<br />

Figure 4. Node evaluation process<br />

In many cases, the knowledge acquired by a single node is insufficient to fully<br />

assess the current situation, therefore it must be able to exchange information about<br />

situational awareness built between nodes. Nodes can have different access to data<br />

about other nodes, so their passing information may be incomplete or uncertain.<br />

In the solutions described in section III, in most cases it is impossible to distinguish<br />

ignorance from uncertain knowledge, taking into account incomplete <strong>and</strong><br />

conflicted knowledge derived from various sources.<br />

The Dezert-Smar<strong>and</strong>ache theory [12-14] allows combining information from<br />

multiple sources. It focuses on the problems of combining uncertain, conflicted<br />

<strong>and</strong> inaccurate information [15]. DSmT overcomes the limitations of applying<br />

the inference methods used so far in the assessment of trust: probabilistic inference,<br />

fuzzy logic or DST. These methods enable the binary evaluation of nodes or<br />

creating hypotheses that cannot penetrate. By using DSmT it is possible to create<br />

any number of hypotheses that do not have to be exclusive, <strong>and</strong> thus more accurate<br />

assessment of the nodes. In addition, this method enables to distinguish the uncertain<br />

knowledge from ignorance.<br />

This theory rejects the main limitations of the Dempster-Shafer theory:<br />

• frame of discernment is a finite, exhausted <strong>and</strong> exclusive set of hypotheses,<br />

• the application of the excluded middle rule,<br />

• acceptance of the Dempster’s rule as a rule a combination of views,<br />

• acceptance of the Dempster’s conditioning rule.


284 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The DSmT distinguished two types of models:<br />

• free model – where frame of discernment (Θ) consists of extensive but not<br />

exclusive items, so components can be mutually overlapping. This model<br />

is called free because of the lack of assumptions imposed on the hypothesis.<br />

• hybrid model – it allows the modelling of imprecise-views <strong>and</strong> exclusivity<br />

constraints Θ elements. In this case, the elements may overlap, but they<br />

do not have to.<br />

The DSmT introduces the concept of hyper-power set, which is denoted by D Θ .<br />

This collection is understood as the set of all proposals that were created from elements<br />

of Θ with the use of operators <strong>and</strong> . For example:<br />

<br />

for D <br />

<br />

, , ,..., ,| D | 5<br />

1 2 0 1 4<br />

, , , , .<br />

0 1 1 2 1 3 1 2 4 1 2<br />

(3)<br />

A. Events monitoring<br />

Node assessment is made based on direct node observation <strong>and</strong> information<br />

from neighbouring nodes. Examples of observed events by which nodes can be<br />

evaluated are:<br />

• provision of information – some of the nodes in ad-hoc networks are<br />

characterized by self-interested behaviour in order to deprive other nodes<br />

of the shares, for example by failing to forward packets for selfish node<br />

to the other nodes. Validation of packet transmission is possible through<br />

the analysis of incoming acknowledgments, when transmission of acknowledgments<br />

is enabled in the network or by tracking the packages sent by<br />

the monitoring node.<br />

• compliance of safety rules – in tactical networks information may have different<br />

levels of sensitivity, for example: secret, confidential, non-confidential.<br />

Data on a certain level of sensitivity can be sent only to nodes that have<br />

access to information about a specific level or a higher level. Based on information<br />

collected on nodes access levels <strong>and</strong> data contained in the labels,<br />

it can be verified if a node observes the principles of safety, i.e. whether<br />

it has access only to data which is authorized <strong>and</strong> makes it available only<br />

to the authorized users.<br />

• recommendation correctness – in the case when trust level is determined<br />

by recommendations from other nodes in the network, it is necessary<br />

to provide protection against “liar” nodes. A “liar” shall construe nodes,<br />

which transmit incorrect recommendations on other nodes, the objective<br />

of re-routing packet forwarding, intercepting or preventing delivery to<br />

the destination node.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

285<br />

The observed events can be evaluated as 0, 1 – using the classical theory of probability.<br />

However, in many cases, the observed behaviour provides some indication<br />

of both hypotheses, which would require omitting the evaluation of the event or<br />

a need to assign two assessments – which would misrepresent the two behaviours.<br />

Each behaviour is treated equally <strong>and</strong> the designated level of trust makes it impossible<br />

to identify the appropriate response to behaviour.<br />

B. Nodes classification<br />

Application of the Dezert-Smar<strong>and</strong>ache theory provides for more hypotheses,<br />

which enable more accurate assessment of behaviour. Additionally, through the creation<br />

of secondary hypotheses using sum <strong>and</strong> product operators, it can constitute<br />

representation of imprecise <strong>and</strong> uncertain hypotheses.<br />

During the observation of nodes behaviour they can be evaluated as:<br />

• cooperating node (C) – the node transmitting information,<br />

• egoistic node (E) – the node is not transmitting information,<br />

• honest node (H) – the node transmitting the proper recommendations,<br />

• liar node (L) – the node transmitting incorrect recommendations,<br />

• secure node (S) – the node adhering to safety rules,<br />

• unsecure node (U) – the node is not adhering to safety rules.<br />

The set of basic assumptions in some cases may be insufficient for correct classification<br />

of nodes. Apart from the hypotheses, it is possible to determine the basal<br />

intermediate hypotheses developed from the basal hypothesis with the sum <strong>and</strong><br />

logical product operators. The secondary hypotheses can distinguish:<br />

• uncertain cooperating node (UC) – the node to which correctness of packet<br />

forwarding was tested, but it is not possible to take clear decision whether<br />

it is a cooperating or selfish node. This situation can occur if a node did<br />

not receive confirmation of the package transfer – for each of the nodes<br />

in the path the uncertain cooperating node hypothesis is taken.<br />

UC C E<br />

• suspect liar node (SL) – the node whose recommendations may be biased,<br />

the value reported earlier, recommendation differs from the accumulated<br />

knowledge <strong>and</strong> the other recommendations, however, this difference does<br />

not yet allow for finding that they are wrong <strong>and</strong> biased.<br />

SL H L<br />

• uncertain honest node (UH) – the node to which you cannot determine<br />

whether the recommendations forwarded by it are correct, because<br />

of the lack of previously accumulated knowledge.<br />

UH H L


286 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

• suspect unsecure node (SU) – the node whose behaviour indicates partial<br />

compliance with security rules, for example, a node has access to the resources<br />

which are not eligible, but only make them available to the authorized<br />

individuals.<br />

SU S U<br />

• uncertain secure node (US) – the node in the case of which you cannot<br />

determine if it complies with the security rules, due to lack of knowledge<br />

regarding the node's resource access level.<br />

US S U<br />

With such specific hypotheses, it is possible to refine the assessment of nodes<br />

indicating the possibility of exchanging data with the node, but it does not include an incoming<br />

recommendation <strong>and</strong> needs more detailed observation of node’s behaviour, for<br />

example by using an additional mechanism for including a node to certain behaviours.<br />

C. Sample evaluations<br />

<strong>Information</strong> fusion is done separately for each type of event – co-operation<br />

between the nodes- following the security rules <strong>and</strong> recommendation correctness.<br />

Each hypothesis is assigned with a value of m(), depending on the number of observed<br />

events, which were assigned to a particular hypothesis. The m() is described<br />

by conditions defined by the following formula (4):<br />

m( ) 0<br />

mA ( ) 1.<br />

(4)<br />

<br />

AD<br />

The set of hypotheses for each type of event allows using the DSm rule of combination<br />

for free-DSm models:<br />

m ( A) m ( X ).<br />

M( )<br />

i i<br />

<br />

X1, X2,...,<br />

Xk<br />

D<br />

i1<br />

( X1X2... Xk<br />

) A<br />

k<br />

(5)<br />

Tables 1 <strong>and</strong> 2 show some example values of the received recommendations<br />

on node’s cooperation observation <strong>and</strong> compliance with security policies.<br />

TABLE I. Recommendations about node cooperation<br />

cooperating egoistic uncertain cooperating suspect egoistic<br />

m 1 0,650 0,030 0,320 –<br />

m 2 0,720 0,050 0,230 –<br />

m 3 0,690 0,040 0,270 –<br />

m M(Θ) 0,865 0,011 0,020 0,105


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

287<br />

TABLE II. Recommendations about security policy compliance<br />

secure unsecure uncertain secure suspect unsecure<br />

m 1 0,230 0,265 0,150 0,350<br />

m 2 0,270 0,290 0,070 0,370<br />

m 3 0,320 0,280 0,100 0,300<br />

m M(Θ) 0,136 0,130 0,007 0,727<br />

It can be specified based on the collected recommendations, if the node is cooperating<br />

<strong>and</strong> suspect unsecure. This information allows a node to take a decision on further<br />

node observation. The node can forward low sensitivity information, whose transmission<br />

to unauthorized units will not contribute to the realization of carried out actions.<br />

V. Conclusion<br />

Ensuring security in tactical MANET requires gathering <strong>and</strong> processing information<br />

about the node surrounding reality. <strong>Information</strong> from various sources,<br />

however, is often uncertain, incomplete <strong>and</strong> even conflicting. The method ensuring<br />

coverage of all of this information is Dezert-Smar<strong>and</strong>ache theory, which allows<br />

representing of imprecise hypotheses. By applying the Dezert-Smar<strong>and</strong>ache theory<br />

it is possible to identify specific <strong>and</strong> general hypotheses, which can combine data<br />

from different sources with access to information on the behaviour of nodes. As part<br />

of further work a function that enables combining data including their update time<br />

<strong>and</strong> weight of data sources will be determined.<br />

References<br />

[1] K. Seshadri Ramana, A.A. Chari, N. Kasiviswanth, “A Survey on Trust Management<br />

for Mobile Ad Hoc Networks”, International Journal of Network Security & Its<br />

Applications (IJNSA), vol. 2, no. 2, April 2010.<br />

[2] L. Capra, “Towards a Human Trust Model for Mobile Ad-hoc Networks”, Dept.<br />

of Computer Science, University College London.<br />

[3] Z. Han, K.J.R. Liu, Y.L. Sun, W. Yu, “A Trust Evaluation Framework in Distributed<br />

Networks: Vulnerability Analysis <strong>and</strong> Defence Against Attacks”, INFOCOM 2006.<br />

25th IEEE International Conference on Computer <strong>Communications</strong>, April 2006.<br />

[4] J. Głowacka, “Procedures of building nodes’ awareness for security in tactical<br />

ad-hoc networks, KKRRiT 2011, Poznań 2011, Telecommunication Review<br />

– Telecommunication News 2011 [CD], no. 6, pp. 405-408 (in Polish).<br />

[5] Zhu Han, Yan Lindsay, K.J. Ray Liu, Wei Yu, “<strong>Information</strong> Theoretic Framework<br />

of Trust Modelling <strong>and</strong> Evaluation for Ad Hoc Networks”, IEEE Journal on Selected<br />

Areas in <strong>Communications</strong>, vol. 24, no. 2, February 2006.


288 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

[6] Jien Kato, Jie Li, Ruidong Li, “Future Trust Management Framework for Mobile<br />

Ad Hoc Networks”, IEEE <strong>Communications</strong> Magazine, April 2008, pp. 108-114.<br />

[7] C. Zouridaki, B.L. Mark, M. Hejmo, R.K. Thomas, “A Quantitative Trust<br />

Establishment Framework for Reliable Data Packet Delivery in MANETs”, In SASN ’05:<br />

Proceedings of the 3rd ACM workshop on Security of ad hoc <strong>and</strong> sensor networks,<br />

pp. 1-10, New York, NY, USA, 2005.<br />

[8] V. Balakrishnan, V. Varadharajan, U.K. Tupakula, P. Lucs, “Trust <strong>and</strong><br />

Recommendations in Mobile Ad hoc Networks”, Third International Conference on<br />

Networking <strong>and</strong> Services, IEEE 2007.<br />

[9] Junhai Luo, Xue Liu, Mingyu Fan, “A trust model based on fuzzy recommendation<br />

for mobile ad-hoc networks”, Computer Networks 53 (2009), pp. 2396-2407.<br />

[10] G. Shafer, “A mathematical theory of evidence”, Princeton U.P., Princeton, NJ, 1976.<br />

[11] J. Konorski, R. Orlikowski, “DST-Based Detection of Noncooperative Forwarding<br />

Behavior of MANET <strong>and</strong> WSN Nodes”, Proc. 2nd Joint IFIP WMNC., Gdansk,<br />

Pol<strong>and</strong>, 2009.<br />

[12] F. Smar<strong>and</strong>ache, J. Dezert, “Advances <strong>and</strong> Applications of DSmT for <strong>Information</strong><br />

Fusion”, vol. 1, American Research Press Rehoboth, 2004.<br />

[13] F. Smar<strong>and</strong>ache, J. Dezert, “Advances <strong>and</strong> Applications of DSmT for <strong>Information</strong><br />

Fusion”, vol. 2, American Research Press Rehoboth, 2006.<br />

[14] F. Smar<strong>and</strong>ache, J. Dezert, “Advances <strong>and</strong> Applications of DSmT for <strong>Information</strong><br />

Fusion”, vol. 3, American Research Press Rehoboth, 2009.<br />

[15] J. Głowacka, M. Amanowicz, „Situational awareness of a military MANET node<br />

– the basis” („Podstawy tworzenia świadomości sytuacyjnej węzła wojskowej sieci<br />

MANET”), Telecommunication Review – Telecommunication News 2012, no. 2-3,<br />

pp. 59-62 (in Polish).


Mechanisms of Ad-hoc Networks Supporting<br />

Network Centric Warfare<br />

Rafał Bryś, Jacek Pszczółkowski, Mirosław Ruszkowski<br />

Systems Elements Designing Section, <strong>Military</strong> Communication Institute,<br />

Zegrze Poludniowe, Pol<strong>and</strong>,<br />

{r.brys, j.pszczolkowski, m.ruszkowski}@wil.waw.pl<br />

Abstract: In this article are presented the results of Ad-hoc networks mechanisms analyzes (identification,<br />

authorization, autoconfiguration <strong>and</strong> data exchange). These mechanisms were analyzed taking into<br />

account specifications of Ad-hoc networks using in netcentric operations. After that, have been selected<br />

the most appropriate mechanisms specified to be used in the special conditions. The Ad-hoc networks<br />

mechanisms specifications will be helpful in designing <strong>and</strong> building of networks for netcentric operations.<br />

Keywords: ad-hoc networks; NCW; autoconfiguration; authorization<br />

I. Introduction<br />

The way of modern warfare is strongly focused on the informations of enemy<br />

status <strong>and</strong> activities. It prodeuces the need for new <strong>and</strong> more sophisticated communications<br />

systems, which will guarantee fast <strong>and</strong> secure way to exchange data<br />

during Network-Centric Warfare. The overall military systems architecture provides<br />

MANET (Mobile Ad-hoc NETwork) for a military communications networks,<br />

at the lowest levels of comm<strong>and</strong>.<br />

The essential features of Ad-hoc networks intended for use in netcentric<br />

environments are:<br />

• Network decentralization. Each node in Ad-hoc network can perform<br />

the services as well as participate in the data transfer to the recipient.<br />

• Ability for dynamic topology changes. Network nodes are independent<br />

from each other <strong>and</strong> can arbitrarily changes its location, <strong>and</strong> thereby in their<br />

mutual relations.<br />

• Radio links usage. It eliminates the need to develop telecommunications<br />

infrastructure.<br />

• High network reliability – in case of failure of any network components,<br />

others can automatically take over their functions.<br />

• Good scalability (ease of expantion). Nodes joining the network that fulfill<br />

certain safety requirements are able to realize services almost immediately.


290 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

According to given above Ad-hoc networks advantages <strong>and</strong> communications<br />

requirements for netcentric systems, it can be concluded that these networks can be<br />

used in military systems but must fulfill some additional requirements for special<br />

communication systems. Therefore, the Ad-hoc networks functions should be<br />

enhanced with additional mechanisms: adaptation, identification, authentication,<br />

auto-configuration, data exchange <strong>and</strong> routing.<br />

In next paragraph of this article is presented the specification of above mechanisms<br />

in terms of special use (netcentric operations) of Ad-hoc networks.<br />

II. Autoconfiguration mechanisms<br />

Addressing in Mobile Ad-Hoc networks can be classified in terms of nodes<br />

addresses managing, as follows:<br />

• state accumulation addressing (so-called: stateful),<br />

• stateless addressing.<br />

In statefull approach, addresses are accumulated in a network entity that<br />

has knowledge of assigned <strong>and</strong> not assigned IP addresses, so it can avoid duplication<br />

of addresses. In stateless approach, each node r<strong>and</strong>omly selects its own IP address<br />

<strong>and</strong> then executes duplicate address detection test to ensure that selected address<br />

is not yet in use on the network.<br />

The accumulation state approach seems to be the most optimal to prevent<br />

addresses duplication, but taking into account network vulnerability to destructive<br />

factors, this solution is not acceptable. Therefore, for the netcentric Ad-hoc networks<br />

it is recommended to use of stateless mechanisms with emphasis on the Ad-Hoc<br />

IP Address Autoconfiguration mechanism.<br />

A. Ad-Hoc IP Address Autoconfiguration<br />

The Ad-Hoc IP Address Autoconfiguration mechanism combines mechanisms<br />

SDAD (Strong Duplicate Address Detection) <strong>and</strong> WDAD (Weak Duplicate Address<br />

Detection). In this way, the duplicate address detection mechanism checks<br />

duplication occurence during the initialization of the node, <strong>and</strong> detect <strong>and</strong> solve<br />

duplicated addresses by analysis of routing messages in intermediary nodes.<br />

The combination of two mechanisms allows continuously operate for nodes during<br />

network splitting <strong>and</strong> merging. As in WDAD, each node selects the key of 128 bits<br />

length <strong>and</strong> appends it to the routing protocol control packets. Intermediary nodes<br />

must retain the key value for each address in the routing table or cache. Automatic<br />

configuration procedure is exactly the same as in the SDAD mechanism. When<br />

a node receives a routing packet, examines all the IP addresses <strong>and</strong> keys values<br />

(contained in this packet) <strong>and</strong> compares it with the addresses <strong>and</strong> keys contained<br />

in the address table or cache. If more than one key value will be found for the IP<br />

address, the conflict of addresses is stated. In this case the node sends the unicast


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

291<br />

error message to the address with lower value key. During normal operation,<br />

if the node receives information about the error of his address, it releases this address<br />

<strong>and</strong> starts reconfiguring procedure to obtain a new IP address. In the next<br />

subsections is presented idea of the WDAD <strong>and</strong> SDAD mechanisms.<br />

B. Strong Duplicate Address Detection (SDAD)<br />

SDAD mechanism is the basis for all stateless solutions. It consists of a simple<br />

mechanism that allows an Ad-Hoc node to select IP address <strong>and</strong> then check to<br />

if it is already used by another node. Although, SDAD produces some problems<br />

<strong>and</strong> limitations. Performing of duplicate address detection procedure is limited<br />

to the nodes initialization phase. So, for some reasons (such as temporary<br />

loss of connection to network), autoconfiguration process leads to duplication<br />

of addresses, <strong>and</strong> the network is not able to function properly. This protocol<br />

does not guarantee the uniqueness of the network addresses <strong>and</strong> the probability<br />

of address duplication increases with the size of the network. In addition,<br />

the protocol generates a lot of traffic – every joining node sends a few broadcast<br />

packets in flood mode.<br />

C. Weak Duplicate Address Detection (WDAD)<br />

The WDAD mechanism is intended to extend the mechanism for detecting<br />

duplicate addresses on whole life cycle of the network. The idea is that duplicate<br />

addresses can be tolerated as long as packets reach the destination node indicated<br />

by the sender, even if the destination address is used by another node. Therefore,<br />

each node selects an identification key using for the routing protocol to distinguish<br />

the potential duplicate IP addresses.<br />

The main disadvantage of WDAD mechanism is its dependence on routing<br />

protocol. The WDAD requires some changes in the routing layer to support the key<br />

identifier of the node. In the routing layer, each node is identified by a virtual address<br />

involving the combination of IP address <strong>and</strong> key value. In addition, WDAD<br />

duplicate addresses detection relies on local routing information, which makes<br />

it completely adaptable only to proactive routing (each node uses a full routing<br />

table). In case of reactive routing, the possibility of duplicate address detection<br />

in a realitvely short time is reduced – delays increase. WDAD does not generate<br />

additional traffic caused by the automatic configuration mechanism, but produces<br />

the overhead of routing protocol packets.<br />

III. Identification <strong>and</strong> authorization mechanisms<br />

The security issues are carried out in two phases: authentication of participants<br />

of data exchange session, data authentication, <strong>and</strong> integrity guarantee. This


292 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

article presents the mechanisms used in the first stage. There can be distinguished<br />

mechanisms for different functional purposes, as follow:<br />

• identification,<br />

• authentication,<br />

• authorization.<br />

The user authenticity checking process <strong>and</strong> giving the authority for a specific set<br />

of services is carried out by subsequent performing of the mechanisms mentioned<br />

above. First of all must be carried out user identification, what provides recognition<br />

of the unique features assigned to a person or object. This process allows to identify<br />

user or object of automated data processing system. The result of the identification<br />

process is so-called electronic identity. The next step is to carry out the authentication<br />

process, which aim is to provide a correlation of the electronic identity with<br />

real world. The aim of the authentication process is to ensure at least one of the two<br />

parties of data exchange about the identity of the other. After successfully authenticating<br />

the parties of data exchange session, the authorization process is executed.<br />

The aim is to give the user or program or process appropriate permissions (access<br />

<strong>and</strong> resource use rights) associated with the authenticated part.<br />

The following chapters are presented mechanisms used in the WLAN, WMAN<br />

<strong>and</strong> WPAN network techniques.<br />

A. IEEE 802.11<br />

The IEEE802.11 technique as the most often used, has a number of mechanisms<br />

proposals:<br />

• MAC filtration,<br />

• WEP (Wired Equivalent Privacy),<br />

• EAP (Extensible Authentication Protocol) <strong>and</strong> 802.1X,<br />

• WPA/WPA2 (WIFI Protected Access).<br />

The most powerful security mechanism used in the WLAN is WPA <strong>and</strong> WPA2<br />

(an upgraded version). It is also recommended to use in Ad-hoc networks dedicated to<br />

support netcentric operations. With regard to identification <strong>and</strong> authentication, both<br />

protocol versions use the same mechanisms. The difference is only in used to the encryption<br />

data protocol. The first version uses the TKIP protocol, while the second – AES.<br />

WPA (WiFi Protected Access) is the successive WEP mechanism <strong>and</strong> provides<br />

implementation of safety procedures at a higher level. It inherits from its predecessors<br />

some parts of properties <strong>and</strong> also introduces new, such as data encryption or<br />

integrity checking mechanisms. It is assumed that the WPA2 mechanism (IEEE<br />

802.11i) is a combination of: WPA2 = 802.1x + EAP + AES + CCMP.<br />

The EAP (Extensible Authentication Protocol), described in recommendation<br />

RFC2284, was intended to authenticate endpoints of PPP connection for remote<br />

access to network resources. The objective of this st<strong>and</strong>ard is to control network<br />

access, based on ports.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

293<br />

In terms of authentication, 802.11i mechanism implemented two policies,<br />

namely:<br />

• WPA Personal – often denoted as WPA-PSK (Pre-Shared Key), where<br />

both parties identify together <strong>and</strong> encrypt data using previously set key of<br />

256-bit length,<br />

• WPA-Enterprise – is dedicated to the larger networks, where the station<br />

authentication is carried out using the RADIUS server <strong>and</strong> mechanisms<br />

described in 802.1X recommendation.<br />

This st<strong>and</strong>ard also set a new security architecture – RSN (Robust Security<br />

Network). In this architecture the process of secure connection establishing is divided<br />

into four phases: agreeing of security policy, authentication, key generation<br />

<strong>and</strong> distribution, <strong>and</strong> safe data exchange ensuring data integrity <strong>and</strong> confidentiality.<br />

From the netcentric operations point of view, the WPA2-PSK mechanism seems<br />

to be optimal, because there is no need to use network authentication server. In case<br />

of WPA2-Enterprise mode, each new station that joining to network or disconnected<br />

<strong>and</strong> connected (due to changes in propagation) is obligated to authenticate with<br />

entity (authentication server), which can be inaccessible due to a server crash. For<br />

this reason, in 802.11 networks should be applied WPA2 Pre Shared Key mechanism,<br />

taking into account all the principles of key material distribution <strong>and</strong> protection.<br />

In this case, the PMK (Pairwise Master Key) used to determine the PTK (Pairwise<br />

Transient Key), during the 4-way h<strong>and</strong>shake, is determined on the basis of three<br />

values: SSID, SSID length <strong>and</strong> shared secrets – WPA password.<br />

B. IEEE 802.15 series<br />

1) IEEE 802.15.4<br />

The ZigBee system architecture developed by the ZigBee Alliance is based on<br />

the physical layer PHY <strong>and</strong> data link layer – MAC layer specification, as is described<br />

in Recommendation 802.15.4:2004 <strong>and</strong> the later version 802.15.4:2006. In the structure<br />

is the network coordinator. This entity has full functionality in the star structure<br />

taking part in relay of data between devices. In others, network coordinator functions<br />

are limited to determining the basic parameters of the network.<br />

In terms of secure communication, the ZigBee can operate in several modes:<br />

open mode without security mechanisms included, only authentication <strong>and</strong> integrity<br />

check – AES-CBC-MAC, only encryption – AES-CTR, <strong>and</strong> authentication, integrity<br />

check <strong>and</strong> encryption AES-CCM. The authorization is thus realized in two above<br />

modes, <strong>and</strong> is made in the data link layer MAC. This is performing by calculating<br />

a common secret (MIC – Media Integrity Code) using CBC-MAC mechanism<br />

basing on a common cryptographic key held by cooperating stations. This secret<br />

is calculated based on a symmetric key (known by two parties of data exchange<br />

session) <strong>and</strong> the bits in the entire data frame (including the header <strong>and</strong> data field).


294 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Therefore, apart from the sender <strong>and</strong> recipient authentication, there is the frame<br />

integrity check performed. The MIC code is transmitted in each 802.15.4 frame<br />

except confirmations frames – ACK.<br />

2) IEEE 802.15.3<br />

The 802.15.3 networks are organized in a picocells (called piconet), are managed<br />

by the picocell supervisor PNC (PicoNet Controller). PNC is selected from<br />

the terminals located in the area of mutual radio range. PNC is responsible for<br />

synchronizing the piconet elements (using “beacon”), management of QoS parameters,<br />

power saving modes, <strong>and</strong> network access control. PNC also performs security<br />

functions relating to all piconet members. Secure relationships DEV-DEV can be<br />

created independently, without the use of PNC.<br />

The user’s identification, authentication <strong>and</strong> authorization are done in a similar<br />

way as for 802.15.4 networks, using CBC-MAC algorithm. It is realized based<br />

on knowledge of the symmetric key by both parties of exchanging data session<br />

<strong>and</strong> the “nonce” value, which carrying the identifiers of the sender <strong>and</strong> recipient.<br />

The last block of CBC-MAC algorithm result is a message integrity code calculated<br />

on the basis of identification data <strong>and</strong> common cryptographic key. In the 802.15.3<br />

networks, all the messages (including the beacon message) are authorized.<br />

3) IEEE 802.15.1<br />

IEEE 802.15.1 networks are organized in piconets, managed by the terminal<br />

selected as the Master, which oversees the complex piconet consist of up to 255 slave<br />

devices, where only up to 7 may have an active state. Communication between slave<br />

devices always takes place through the master device. Security (encryption <strong>and</strong> authentication)<br />

is done through a pairing process for secure communication between<br />

terminals, using a cryptographic key for the SAFER+ algorithm (algorithm E).<br />

In the first phase of the pairing, initial key K INIT (Initialization Key) is generated<br />

using the shared 128-bits pseudor<strong>and</strong>om string (IN_RAND) <strong>and</strong> PIN number (up<br />

to 128 bits of length). If the PIN is shorter, is completed with the hardware address<br />

of the master device (BD_ADDR). Figure 1 shows the key generation process.<br />

Figure 1. K INIT key negotiation from PIN number<br />

Than, the devices encrypts the data carrying in time slots <strong>and</strong> carry out negotiations<br />

of new 128-bits cryptographic key K LINK – Link Key. This key is stored


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

295<br />

by the devices <strong>and</strong> is used to encrypt the proper data exchange. The possession<br />

of this key by a pair of devices is equivalent to their logical association (pairing).<br />

The last stage is authentication of pairing devices – Figure 2.<br />

Figure 2. Authentication process.<br />

It involves the generation of SRES’ word, which is compared with the SRES<br />

recalculated locally (the original). The authentication process is as follows:<br />

1. Station A (authenticator), sends 128-bits pseudo-r<strong>and</strong>om sequence as a clear<br />

text to station B AU_RAND A (authenticated).<br />

2. Station B using the E1 algorithm calculates the 32-bits SRES’ word based<br />

on its hardware address (the remaining 96 bits (ACO) are used to calculate<br />

the encryption key), K LINK cryptographic key <strong>and</strong> the AU_RAND A word.<br />

3. Station B sends the SRES’ to station A.<br />

4. Station A calculates locally the SRES word <strong>and</strong> compares it with<br />

SRES’ – SRES=SRES’.<br />

5. The positive result of comparison indicates a positive result of authentication<br />

station B by station A.<br />

6. The process is repeated but station B is the authenticator.<br />

C. IEEE 802.16<br />

WiMAX (Worldwide Interoperability for Microwave Access – 802.16) is intended<br />

for the building of urban networks <strong>and</strong> MANs, were designed as part<br />

of the last mile users access. WiMAX security architecture includes elements <strong>and</strong><br />

mechanisms such as stations digital signature (X.509), the security associations (SA),<br />

encryption protocols, key management protocols (also responsible for confirming<br />

the identity of co-operating stations).<br />

Security Association is a logical link between two terminals (stations) <strong>and</strong><br />

consist of safety parameters, such as cryptographic keys, certificates, etc. Due to<br />

the three-phased secure data exchange process between stations, there are two<br />

basic types of association: authentication security association (Authorization<br />

Security Association) <strong>and</strong> the data exchange security association (Data Security


296 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Association). The phases of secure data exchange process are: authentication, negotiation<br />

of cryptographic keys <strong>and</strong> encryption.<br />

Authentication security associations are used during station authentication<br />

stage <strong>and</strong> includes security parameters used for this stage:<br />

• X.509 certificate used to identify the station,<br />

• authorization key (AK – Authorization Key) used to generate the KEK<br />

(Key Encryption Key) – KEK is a cryptographic key to encrypt the TEK<br />

negotiation process (Traffic Encryption Key),<br />

• hash – computed by HMAC-Digest function, used to data integrity check<br />

during the negotiation of cryptographic material,<br />

• sequence number of AK,<br />

• the period validity of AK,<br />

• association descriptor.<br />

The station authorization phase is performed in four steps:<br />

1. The connecting station sends authentication informations in AuthenticationInfMess,<br />

containing a manufacturer certificate, to verify its credibility.<br />

2. Simultaneously, the station sends an authentication request in a AuthorizationReqMess<br />

message, which contains a request of authentication key<br />

<strong>and</strong> security association descriptor. Also, there are send informations<br />

of supported cryptographic algorithms, data authentication mechanisms<br />

<strong>and</strong> connection identifier BCID (Basic Connection ID). BCID is assigned<br />

by the station B during the initial phase of connection establishing (Initial<br />

Ranging). Station A is authorized after its certificate confirmation.<br />

3. Station B sets security association descriptors (the initial association<br />

properties / Primary SA / <strong>and</strong> existing static association / Static SA /).<br />

Then activates the authentication key <strong>and</strong> sends the response to station<br />

A in the AuthorizationRepMess, containing :<br />

a. AK key (encrypted by public key of station A),<br />

b. 4-bits AK key number used to distinguish the following keys,<br />

c. validity period of AK key,<br />

d. SA descriptors – previously established<br />

4. In the last phase is calculated the cryptographic key KEK <strong>and</strong> message authentication<br />

keys (HMAC_Key_D <strong>and</strong> HMAC_Key_U) based on key AK.<br />

They will be used during the negotiation phase of TEK keys. Because the AK<br />

key has a limited period of validity than the station should periodically<br />

renew the authorization process by sending an AuthenticationReqMess,<br />

before the AK validity period expires.<br />

The figure 3 shows that the station identification <strong>and</strong> authentication process<br />

is carried out in two stages of the symmetric <strong>and</strong> asymmetric encryption, using<br />

PKM protocol version 2. This protocol is responsible for normal <strong>and</strong> cyclic station<br />

authentication processes <strong>and</strong> exchange of cryptographic material. This protocol<br />

operates in a client/server mode. The station identification is performed basing


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

297<br />

on X.509 certificates. Each WiMAX station has the X.509 certificate issued <strong>and</strong><br />

implemented by the equipment manufacturer.<br />

Figure 3. IEEE 802.16 authorization phase<br />

IV. Adaptative ad-hoc technologies<br />

Network centric operations requires such Ad-hoc networks organization that<br />

provide the conditions for data exchange as far as possible to guarantee reliable delivery<br />

of informations <strong>and</strong> ensure accuracy of the transmissions.<br />

In order to fulfill these conditions, technologies used for wireless networks<br />

must meet two fundamental conditions:<br />

– Support as far as possible creating <strong>and</strong> maintaining a Ad-hoc network<br />

topology;<br />

– Offer the mechanisms of adaptation to terrain conditions, propagation,<br />

the nature of the end-user services <strong>and</strong> quality requirements for<br />

these services <strong>and</strong> types of users of such networks (mobile, nomadic,<br />

stationary).<br />

With regard to the abovementioned factors was carried out analysis of network<br />

techniques enabling the building of Ad-hoc networks <strong>and</strong> adaptation to<br />

the changing conditions in a radio channel. The analysis concerned the network<br />

technologies st<strong>and</strong>ardized within the IEEE <strong>and</strong> covered st<strong>and</strong>ards for the Personal<br />

Area (WPAN), Local (LAN) <strong>and</strong> Metropolitan Network (WMAN).<br />

A. IEEE 802.11<br />

WLAN wireless technologies st<strong>and</strong>ardized within the IEEE 802.11 group is currently<br />

the most prevalent. WLANs based on IEEE 802.11 can be found in a number<br />

of private <strong>and</strong> commercial installations.


298 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Originally, it was developed version labeled as 802.11 operating in 2,4 GHz<br />

ISM b<strong>and</strong>. However, due to the growing needs of the telecommunications market<br />

<strong>and</strong> technological development have been designed subsequent versions of this<br />

technique. Currently, as WLAN solutions are used four base protocols prepared by<br />

IEEE 802.11 group (a, b, g, n) specifying the encoding of radio signals, the operating<br />

b<strong>and</strong>s <strong>and</strong> offered rate. Original version is currently not used.<br />

Name<br />

Max.<br />

bitrate<br />

[Mbit/s]<br />

B<strong>and</strong>width<br />

[GHz]<br />

Table I. IEEE 802.11 st<strong>and</strong>ards [3]<br />

Modulation<br />

Supported<br />

MIMO<br />

streams<br />

Range<br />

[m]<br />

Publication/<br />

comments<br />

802.11 2 2,4 FHSS, DSSS, IR 1 100 June 1997<br />

802.11a 54 5 OFDM 1 120 September 1999<br />

802.11b 11 2,4 HR-DSSS, CCK 1 140 September 1999<br />

802.11g 54 2,4<br />

HR-DSSS, CCK,<br />

OFDM<br />

1 140<br />

June 2003<br />

compatible downwards<br />

with 802.11b,<br />

802.11n 540 2,4 or 5 OFDM 4 250 November 2009<br />

Significant role for high transmission rate ensuring have OFDM modulation,<br />

which allows more efficient use of radio spectrum. The IEEE 802.11n extension<br />

allows obtaining higher speeds <strong>and</strong> transmission ranges by using MIMO technology<br />

(Multiple-Input Multiple-Output). For MIMO technology are used more<br />

than one antenna transmission or reception <strong>and</strong> a special encoding techniques.<br />

WLANs based on 802.11 can run in infrastructure mode, where users<br />

communicate with each other through the AP (Access Point) or independent,<br />

in Ad-hoc mode. The main directions of development of the 802.11 series<br />

of st<strong>and</strong>ards focused on solutions for network infrastructure, while working<br />

in Ad-hoc mode was not considered or undertaken works in this direction are<br />

on a limited scale.<br />

Prevalence of use cards compliant with the IEEE 802.11 st<strong>and</strong>ard for office<br />

<strong>and</strong> home has made the necessary research on the use of these technologies for<br />

building <strong>and</strong> organization of wireless networks in Ad-hoc mode.<br />

Comprehensive solution for this type of network is proposed in extension IEEE<br />

802.11s – “ESS – Extended Service Set Mesh Networking”. The solution assumes<br />

the possibility of creating a self-configuring 802.11 wireless network operating<br />

in Ad-hoc mode, where each device can have several interfaces. One of the basic<br />

assumptions of the developed solution was to provide extensibility <strong>and</strong> flexibility,<br />

consisting of applying a variety of mechanisms to fulfill the same functions in different<br />

nodes of the network.<br />

For IEEE 802.11s st<strong>and</strong>ard assumed use of the underlying mechanisms for<br />

the physical layer, the security of information <strong>and</strong> access to the transmission


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

299<br />

medium used in previous versions of IEEE 802.11. Additionally, assumes the use<br />

of new, additional solutions. The required functionality described by the IEEE<br />

802.11s includes:<br />

a) PHY – Physical Layer, based on the IEEE 802.11a /b/g/n.<br />

b) Medium Access Coordination – mechanisms for medium access control,<br />

based on st<strong>and</strong>ard solutions adopted for the network compatible with IEEE<br />

802.11 with QoS extensions described in the IEEE 802.11e. To further<br />

use are expected new features such as the ability to dynamically change<br />

the operating channel.<br />

c) Mesh Security – authentication of users, nodes <strong>and</strong> trunks cryptographic<br />

protection, in large part based on the extension of EEE 802.11i.<br />

d) Mesh Configuration & Management – mechanisms for automatic configuration<br />

of radio parameters (operating channel frequency selection,<br />

transmit power, etc.), QoS management policies.<br />

e) Discovery & Asscociation – mechanisms for detecting the presence of neighboring<br />

nodes <strong>and</strong> mesh networks <strong>and</strong> to identify parameters of mesh network,<br />

the procedures for connecting to the network nodes <strong>and</strong> the statement<br />

of logical links with its neighbors.<br />

f) Mesh Topology, Learning, Routing & Forwarding – a group of mechanisms<br />

<strong>and</strong> protocols for the control <strong>and</strong> the creation of the current topology, <strong>and</strong><br />

data forwarding, it is assumed the use the Hybrid Wireless Mesh Protocol<br />

(HWMPA) for routing, which is a combination of m<strong>and</strong>atory reactive<br />

protocol mechanisms Ad-hoc Radio Metric on-dem<strong>and</strong> Distance Vector<br />

(RM-AODV), <strong>and</strong> optional proactive mechanisms – Tree Based Routing<br />

(TBR). It is also assumed to use a proactive routing protocol Metric Radio<br />

Optimized Link State Routing (RM-OLSR).<br />

g) Internetworking – mechanisms for ensuring mesh network cooperation<br />

with external 802 series networks, including the wired networks.<br />

h) Mesh Measurement – mechanisms <strong>and</strong> procedures for monitoring the mesh<br />

network <strong>and</strong> radio environment, e.g. for setting routes in mesh network.<br />

In this st<strong>and</strong>ard was assumed using of several types of mesh network nodes,<br />

which can change operation mode during its functionality. They are:<br />

a) Mesh Point (MP) – this is the basic type of the node in the network 802.11s.<br />

It is used to carry out the procedures for establishing <strong>and</strong> maintaining<br />

networks. Arranges <strong>and</strong> maintains the logical links of detected neighbors<br />

<strong>and</strong> forward transit traffic.<br />

b) Mesh Access Point (MAP) – an extended version of the node MP, also<br />

supports the function of an access point (AP) to support st<strong>and</strong>ard WLAN<br />

client station (not supporting 802.11s st<strong>and</strong>ard).<br />

c) Mesh Portal Point (MPP) – used to work as node in mesh networks to<br />

the external networks compatible with the IEEE 802 (wired, wireless,<br />

<strong>and</strong> also compatible with the 802.11s). In addition to features for the MP


300 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

can perform the functions of the bridge (network bridge) <strong>and</strong> support<br />

a proactive routing within their own mesh network.<br />

d) Lightweight Mesh Point (LWMP) – nodes implementing the functionality<br />

of a Mesh Point node only in an environment of mutual audibility of nodes<br />

(as the classic WLAN nodes in Ad-hoc mode).<br />

e) Client Station (STA) – a classic client station designed to work with the AP<br />

<strong>and</strong> mechanisms not supporting 802.11s st<strong>and</strong>ard.<br />

For each of these nodes is assumed that it will work as terminal <strong>and</strong> offer users’<br />

access to services at the OSI application layer.<br />

B. IEEE 802.16<br />

St<strong>and</strong>ard for wireless metropolitan structures WMAN defined by a group<br />

of IEEE 802.16. Mobile WiMAX provides support for stationary equipment,<br />

nomadic <strong>and</strong> full mobility for the devices carried or transported at speeds up to<br />

120 km/h. This functionality of WiMAX technology is extremely important for<br />

dynamic operation conducted with the use of vehicles.<br />

Assuming the possibility of using battery-powered portable devices IEEE<br />

802.16e authors have developed the two modes operation of subscriber stations<br />

for energy conservation, that are: idle <strong>and</strong> sleep mode.<br />

IEEE 802.16e introduces the possibility of scalable b<strong>and</strong>width utilization<br />

of the radio channel from 1.25 MHz to 20 MHz, with modulation SOFDMA<br />

(Scalable Orthogonal Frequency Division Multiple Access), where the number<br />

of subcarriers varies with the width of the channel. This property, greatly increases<br />

the feasibility of efficient transmission with high speeds.<br />

Mobile WiMAX is ready to use multipath reception. For this purpose are<br />

used OFDM modulation <strong>and</strong> MIMO (Multiple Input – Multiple Output) solutions,<br />

involving the use of multiple antennas on the receiving <strong>and</strong> transmitting sites.<br />

It has a great importance in the case of communication systems in urban areas,<br />

where the multipath phenomenon is the most noticeable.<br />

In response to the possibility of variable propagation conditions experienced<br />

by mobile subscribers, the IEEE 802.16e introduces the hybrid automatic repeat<br />

request H-ARQ (Hybrid Automatic Repeat called Request), where the first correction<br />

coding is used, the detection coding (used for ARQ) can be used, if necessary,<br />

in the next step.<br />

IEEE 802.16e also implies the possibility of using smart antennas, where<br />

the adaptive gain control of selected direction of the transmission is used. It can increase<br />

the useful range <strong>and</strong> reduce interference.<br />

Current implementation of WiMAX technology in the great majority basing<br />

on the solutions with the use of base stations. The creators of the IEEE 802.16 st<strong>and</strong>ard<br />

established the possibility of network functioning without using base stations.<br />

Devices working in cooperation mode on the network (without the use of WiMAX


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

301<br />

base stations) has been identified as a “mesh” mode <strong>and</strong> presented in the extension of<br />

IEEE 802.16, <strong>and</strong> then included in the version IEEE 802.16-2004 (extension “a”<br />

has been incorporated into the version of 2004). Mesh mode can also be used in cooperation<br />

of base stations. In this mode, client stations are referred as MSS (mesh<br />

subscriber station), <strong>and</strong> base stations as MBS (mesh base station). In the mesh<br />

mode, unlike the communication mode managed by the base station, where<br />

in the transmission frame structure is distinguished direction from the base station<br />

(downlink) <strong>and</strong> up to her (uplink), transmission between mesh networks<br />

elements (MSS or BSS) is carried out as bi-directional which is established during<br />

initialization of the SS.<br />

These links are described by an 8-bits connection identifier (Link ID). If the data<br />

is transmitted in the direction to the MSS located closer to the MBS, traffic is treated<br />

as uplink traffic, otherwise it is seen as the downlink channel. The mesh mode uses<br />

three methods of data transmission known as a method of scheduling:<br />

• coordinated distributed scheduling;<br />

• uncoordinated distributed scheduling;<br />

• centralized scheduling.<br />

In the case of distributed scheduling, each node transmits the current <strong>and</strong><br />

proposed schedule of data transmission to neighboring nodes in one hop distance.<br />

If the destination node provides support for data transfer according to this schedule,<br />

it responds to the source node in the control subframe slot. Ultimately the source<br />

node sends to destination node acknowledgment of receipt of approval for transmission<br />

according to the desired schedule. For distributed coordinated scheduling,<br />

the scheduling messages are sent with using a scheme providing collision avoidance.<br />

Centralized scheduling method is similar to mode where the transmission<br />

is directly managed by the base station. In this mode, the MSS points are used only<br />

as relay stations to the nearest MBS.<br />

Described in IEEE 802.16-2004 mesh mode is not included in the extension<br />

known as the IEEE 802.16e. Due to the fact that the use of mobile WiMAX technology<br />

requires other devices than based on the IEEE 802.16d, mesh mode is not<br />

supported by network equipment manufacturers for the IEEE 802.16e. However,<br />

are created theoretical attempts to modify the IEEE 802.16e devices for mesh mode.<br />

One of the proposals to use mesh mode in a mobile version of WiMAX has been<br />

presented for the tactical communications networks in [4].<br />

The most recent proposal to improve the functionality of mobile WiMAX<br />

subscriber station is in extension IEEE 802.16j, which introduces the concept<br />

of a relay station – MRS (multihop relay station). MRS perform a similar function<br />

as the MSS in a centralized mode, passing data from other SS subscriber station to<br />

base station BS, in the case of absence of direct contact SS to BS. MRS is used also<br />

in the IEEE 802.16m version (Advanced Air Interface with data rates of 100 Mbit/s<br />

mobile & 1 Gbit/s fixed), known as WiMAX2 designed to provide transmission<br />

rates up to 1 Gbit/s.


302 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

C. IEEE 802.15<br />

Personal Area Networks (WPAN) are created to provide a wireless user access<br />

to facilities <strong>and</strong> services provided by them <strong>and</strong> co-operation devices in the network.<br />

Due to their use, a network device must be simple to use, characterized by small<br />

size <strong>and</strong> weight <strong>and</strong> low power consumption. The most popular st<strong>and</strong>ard for WPAN<br />

is defined in the IEEE 802.15 group. These are the techniques: Bluetooth (IEEE<br />

802.15.1). UWB (IEEE 802.15.3), ZigBee (802.15.4). In Table II, developed in [1],<br />

are presented the most important properties of these techniques.<br />

Table II. Properties of WPAN technologies<br />

Bluetooth<br />

802.15.3 802.15.4<br />

WiMedia UWB Forum st<strong>and</strong>ard ZigBee<br />

B<strong>and</strong>width 2,4 GHz 3,1-10,6 GHz<br />

3,1-4,85 GHz,<br />

6,2-9,7 GHz<br />

2,4 GHz <strong>and</strong> 868/915 MHz<br />

Modulation<br />

Channel<br />

Access<br />

Bitrate<br />

GFSK,<br />

π/4-DQPSK,<br />

8DPSK<br />

Polling, master-<br />

-slave, TDD (Time<br />

Division Duplex)<br />

21 kbit/s do<br />

40 Mbit/s<br />

QPSK, DQPSK, 16-QAM,<br />

32-QAM, 64-QAM<br />

CSMA-CA,<br />

OFDM,<br />

optionally TDD<br />

53,3, 80, 110,<br />

160, 200, 320,<br />

400, 480 Mbit/s<br />

No data<br />

DSSS with BPSK or MSK<br />

CSMA/CA <strong>and</strong> guaranteed<br />

time slots GTS in superframes<br />

< 2 Gbit/s 2-250 kbit/s<br />

Range [m] 0,1-100 < 10 1-100<br />

Transmiter<br />

Power<br />

Network<br />

topologies<br />

QoS<br />

Security<br />

Usability<br />

< 100 mW<br />

Piconet,<br />

scatternet, mesh<br />

SDP<br />

(Service Discovery<br />

Protocol)<br />

SAFER+,<br />

authentication,<br />

encryption<br />

Dedicated<br />

applications<br />

B<strong>and</strong>width depended<br />

1 mW<br />

Star,<br />

cluster, mesh<br />

Guaranteed time slots<br />

AES-128<br />

AES-128,<br />

authentication<br />

Sensor networks,<br />

automation systems<br />

1) UWB (IEEE 802.15.3)<br />

The IEEE 802.15.3 specification defines the physical layer <strong>and</strong> data link of high<br />

speed (high rate) WPANs (Wireless Personal Area Network), that offers above<br />

20 Mbit/s data rate.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

303<br />

The basic element of the IEEE 802.15.3 wireless network is piconet, defined<br />

as a wireless communication system, operating in Ad-hoc mode, which allows<br />

mutual communication of many independent devices. It is assumed that the size<br />

of a typical piconet covers an area with a radius of 10 m. The IEEE 802.15.3 st<strong>and</strong>ard<br />

defines several functional elements in piconet structure, shown in Figure 4.<br />

Figure 4. IEEE 802.15.3 piconet elements [11]<br />

The basic component of this structure is the data transfer object – DEV, which<br />

in general should be identified as a terminal. DEV can also be a group of devices<br />

in one location. In piconet, the one DEV element must act as PNC (Piconet Coordinator).<br />

PNC is responsible for synchronizing the piconet elements (using<br />

“beacon” messages), the management of QoS parameters, power saving modes,<br />

<strong>and</strong> network access control. PNC also performs security functions relating to all<br />

piconet members.<br />

Piconet is not a spatial structure, but rather logical. Crucial in the piconet<br />

creation have PNC. The precondition, which is adopted for the piconet existence<br />

is DEV act as PNC sending a messages “beacon” containing the information required<br />

to piconet maintain. The process of piconet creation is done by sending<br />

joining notification to the PNC, by the DEV in the surrounding area, interested<br />

in piconet membership. St<strong>and</strong>ard assumes dynamic piconet membership for DEV.<br />

DEV can attach <strong>and</strong> detach during the transmission. In situations where the device<br />

acts as a PNC leaves piconet, must be designated the new PNC.<br />

St<strong>and</strong>ard provides parallel operation of different piconets. DEV can belong<br />

to the parent piconet, where have guaranteed access to b<strong>and</strong>width, offspring<br />

piconet (where piconet is managed by the unit included in the home network),<br />

<strong>and</strong> the neighboring piconet when it is managed by the device, that there have no<br />

contact with home piconet.<br />

Messages between piconets are sent in superframe, in frames transmitted<br />

during the transmission time labeled CFP (Contention Free Period). As addresses<br />

in the so-constructed network are proposed to use the PNID (Piconet ID) identifiers,


304 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

<strong>and</strong> device IDs DevID (Device ID). To avoid ambiguity in the allocation of these<br />

addresses is assumed to use the parent element defined as MC (mesh PNC).<br />

2) Bluetooth (IEEE 802.15.1)<br />

Bluetooth is a st<strong>and</strong>ard for wireless networks described by the recommendation<br />

IEEE 802.15.1. To work using unlicensed 2.4 GHz ISM b<strong>and</strong>. Provides transmission<br />

range in open space defined by three transmit power classes respectively: 100, 10<br />

<strong>and</strong> 1 meter. Depending on the version of the st<strong>and</strong>ard offer bit rate of 21 kbit/s<br />

for 1.0 to 40 Mbit/s for version 3.1.<br />

The technique enables “point-to-point” <strong>and</strong> “point-to-multipoint” connection<br />

in Ad-hoc mode for devices on a small area. The 802.15.1 st<strong>and</strong>ard define Bluetooth<br />

profiles i.e. scenarios for the using Bluetooth technology. Profile supports h<strong>and</strong>ling<br />

application-layer data <strong>and</strong> voice, print data, access to local <strong>and</strong> global networks,<br />

in uniform way.<br />

The st<strong>and</strong>ard assumes that the communication between Bluetooth devices<br />

is carried out in the logical structure as for the IEEE 802.15.3 i.e. piconet. It is<br />

assumed that at the same time can be active seven slaves <strong>and</strong> one master. Status<br />

of the master unit performs machine that initiates the process of creating a network.<br />

Data exchange can take place only between the parent node (master) <strong>and</strong> slave<br />

(slave). Direct data exchange between slave devices is not possible.<br />

In addition, devices can participate in piconet in power save mode-Park, except<br />

seven active slaves. By enabling <strong>and</strong> disabling the device in this mode, the master<br />

can provide communication for multiple devices. To ensure cooperation between<br />

piconets the ability of working in bridge mode was adopted. Thus, piconets can be<br />

combined into larger structures called scatternet. The IEEE 802.15.1 st<strong>and</strong>ard does<br />

not define the principles of scatternet creation. There were designed only custom<br />

proposals including Bluetrees, Bluestar, Bluemesh.<br />

3) ZigBee (IEEE 802.15.4)<br />

IEEE 802.15.4 was developed for sensor networks. In relation to the Bluetooth<br />

<strong>and</strong> UWB offers a relatively low data rate (up to 250 kbit/s). The st<strong>and</strong>ards assumed<br />

the ability to create complex network topologies. IEEE 802.15.4 st<strong>and</strong>ard defines<br />

the format of the physical <strong>and</strong> data link layer. Based on these recommendations,<br />

the organization ZigBee Alliance (assembling more than 150 companies) extended<br />

the functionality of this solution by introducing a st<strong>and</strong>ard named ZigBee, which<br />

also includes recommendations for network <strong>and</strong> application layers.<br />

ZigBee defines three types of devices that can be used to create network connections.<br />

These include the following types:<br />

• The coordinator – the parent node of ZigBee network;<br />

• Router – a node that can be used to create network <strong>and</strong> realizing routing<br />

<strong>and</strong> transit data functions;<br />

• Terminal – devices that do not offer the data relay functionality.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

305<br />

The st<strong>and</strong>ard defines the following elements:<br />

• Application Object (APO) – endpoints (processes) that work together <strong>and</strong><br />

carrying out certain tasks utility. It was assumed ability to run up to 240<br />

objects in each of the nodes. APOs can work together within a single node,<br />

<strong>and</strong> through the network infrastructure;<br />

• ZigBee Default Object (ZDO) – the objects responsible for network maintaining.<br />

Determines the type of device (coordinator, router, terminal<br />

equipment), discovers the environment, network management, creates<br />

associations between the APO at different nodes;<br />

• Application Support Sublayer (APS) – responsible for APOs communication<br />

in the network <strong>and</strong> maintain established (using ZDO) network connections<br />

between the APOs;<br />

• Network Layer (NWK) – uses the functions provided by the data link<br />

layer. NWK is used in the processes for the network addresses allocation,<br />

routing, attaching <strong>and</strong> removal of network nodes.<br />

• Security Service Provider (SSP) – provides mechanisms for the cryptographic<br />

protection for APS <strong>and</strong> NWK layer;<br />

In the network, ZigBee addresses are determined hierarchically, from the coordinator.<br />

ZigBee network routes are designated in reactive manner. Source node<br />

sends request about the destination node to the nearest neighboring node. The request<br />

is advertised until it reaches the destination. Routing informations are stored<br />

in intermediate nodes, <strong>and</strong> can be used for future transmissions.<br />

It may be noted that the greatest support for the operation of wireless devices<br />

in a network organized in Ad-hoc mode are WPANs networks. Due to their short<br />

range <strong>and</strong> requirements to reduce the cost of specialized devices, do not use superior<br />

devices specialized in managing the wireless infrastructure.<br />

V. Conclusions<br />

In article are presented the mechanisms <strong>and</strong> communication technologies<br />

of Ad-hoc networks using for net centric operations. The analysis<br />

indicates that the most appropriate is IEEE802.11s technology with MIMO<br />

antennas <strong>and</strong> modern coding techniques. Taking into account the applications<br />

of this technique – NCW, it is necessary to use WPA2-PSK <strong>and</strong><br />

Ad-hoc IP Address Authoconfiguration mechanisms. The next step of our work is to<br />

perform simulations experiments <strong>and</strong> than build a technology demonstrator.


306 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

References<br />

[1] K. Gierłowski, T. Klajbor, J. Woźniak, “Analiza sieci bezprzewodowych serii IEEE<br />

802.15.x – Bluetooth (BT), UWB i ZigBee – z transmisją wieloetapową. Część I”,<br />

Przegląd Telekomunikacyjny. Wiadomości Telekomunikacyjne. 2008, nr 10.<br />

[2] K. Gierłowski, T. Klajbor, J. Woźniak, “Analiza sieci bezprzewodowych serii IEEE<br />

802.15.x – Bluetooth (BT), UWB i ZigBee – z transmisją wieloetapową. Część II”,<br />

Przegląd Telekomunikacyjny. Wiadomości Telekomunikacyjne. 2008, nr 11.<br />

[3] K. Gierłowski, J. Woźniak, “Analiza szerokopasmowych sieci bezprzewodowych<br />

serii IEEE 802.11 i 16 (WiFi i WiMAX) z transmisją wieloetapową”, Przegląd<br />

Telekomunikacyjny. Wiadomości Telekomunikacyjne. 2008, nr 8-9.<br />

[4] BRYON KEITH HARTZOG, “WiMAX potential commercial off – the – shelf solution<br />

for tactical mobile mesh communications”, <strong>Military</strong> <strong>Communications</strong> Conference,<br />

2006. MILCOM 2006.<br />

[5] Evren Eren, Kai-Oliver Detken, “WiMAX-Security – Assessment of the Security<br />

Mechanisms in IEEE 802.16d/e”, WMSCI 2008.<br />

[6] IEEE Std 802.15.3b-2005, “Wireless Medium Access Control (MAC) <strong>and</strong> Physical<br />

Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPANs)”.<br />

[7] Naveen Sastry, David Wagner, “Security Considerations for IEEE 802.15.4<br />

Networks”, University of California.<br />

[8] J. Jeong, J. Park, H. Kim <strong>and</strong> D. Kim, “Ad Hoc IP Address Autoconfiguration”,<br />

I-D draft-jeong-adhoc-ip-addr-autoconf-02.txt, February 2004.<br />

[9] P. Paakkonen, M. Rantonen <strong>and</strong> J. Latvakoski, “IPv6 addressing in a heterogeneous<br />

MANET-network”, I-D draft-paakkonen-addressing-htr-manet-00.txt, December<br />

2003.<br />

[10] C. Jelger, T. Noel, <strong>and</strong> A. Frey, “Gateway <strong>and</strong> address autoconfiguration for IPv6<br />

adhoc networks”, I-D draft-jelger-manet-gateway-autoconf-v6-02.txt, April 2004.<br />

[11] IEEE St<strong>and</strong>ards, “IEEE St<strong>and</strong>ard for <strong>Information</strong> technology – Telecommunications<br />

<strong>and</strong> information exchange between systems – Local <strong>and</strong> metropolitan area networks<br />

– Specific requirements. Part 15.3: Wireless Medium Access Control (MAC) <strong>and</strong><br />

Physical Layer (PHY). Specifications for High Rate Wireless Personal Area Networks<br />

(WPANs).”, IEEE Std 802.15.3-2003, 29 September 2003.


Using Network Coding in 6LoWPAN WSNs<br />

Jarosław Krygier<br />

<strong>Military</strong> University of <strong>Technology</strong>, Faculty of Electronics,<br />

Telecommunications Institute, Warsaw, Pol<strong>and</strong>, jkrygier@wat.edu.pl<br />

Abstract: The low power wireless sensor devices which usually uses the low power wireless private<br />

area network (IEEE 802.15.4) st<strong>and</strong>ard are being widely deployed for various purposes <strong>and</strong> in different<br />

scenarios both in civil <strong>and</strong> military world. IPv6 low power wireless private area network<br />

(6LoWPAN) was adopted as part of the IETF st<strong>and</strong>ard for the wireless sensor devices in order to<br />

decrease the IP overhead <strong>and</strong> to adapt big IPv6 packets to small maximum transmission unit (MTU)<br />

offered by the IEEE 802.15.4 st<strong>and</strong>ard. This paper is focused on the adoption of the network coding<br />

to 6LoWPAN/IEEE 802.15.4 network. The solution based on COPE mechanism is proposed <strong>and</strong><br />

described here. Also the implementation problems are discussed.<br />

Keywords: component; network codding, WSN, 6LoWPAN<br />

I. Introduction<br />

Tactical communication networks are evolving toward complex heterogeneous<br />

ad-hoc networks where mobile nodes can simultaneously embed very different kinds<br />

of communication technologies such as HF or VHF tactical radios (including legacy<br />

systems), UHF (microwave) ad-hoc radios, lightweight satellite ground stations <strong>and</strong><br />

also wireless sensor networks (WSNs) [1]. Considering the mobile <strong>and</strong> temporary<br />

nature of military missions, developing sensor networks that operate in wireless<br />

mode are a necessity. These conditions pose a number of challenges comprising<br />

sensor hardware platforms, communications <strong>and</strong> networks, <strong>and</strong> information management<br />

systems. In order to cope with a wide heterogeneity of hardware devices<br />

as well as to meet the requirements on the end-to-end communication (including<br />

sensor networks), the Internet Protocol (IP) should be applied in the network elements<br />

– also in highly mobile <strong>and</strong> sensor part of the network [9].<br />

WSNs are currently the most common type of so called Low-power Wireless<br />

Personal Area Network LoWPAN (LoWPAN), which are self-configuring ad-hoc<br />

networks composed of wirelessly connected, autonomous devices, usually characterized<br />

by constrained computational <strong>and</strong> memory resources <strong>and</strong> low consumption.<br />

On the other h<strong>and</strong>, the LoWPAN tiny nodes have to be equipped with the IP protocol.<br />

Unfortunately, the IP traffic causes significant overhead, which is especially


308 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

relevant in WSNs <strong>and</strong> military mobile ad-hoc networks (in low data rates modes).<br />

In order to adapt the IP to the LoWPANs some solutions are proposed, from which<br />

the most commonly used are: uIP (micro IP), nano IP <strong>and</strong> IPv6 low power wireless<br />

private area network (6LoWPAN). 6LoWPAN was adopted as the part of the IETF<br />

st<strong>and</strong>ard for the sensor devices [2]. Although the 6LoWPAN is not restricted to<br />

the IEEE 802.15.4-based devices, but it is commonly used with such st<strong>and</strong>ard. It is<br />

also proposed for tactical networks in [3].<br />

The 6LoWPAN significantly reduces the IPv6 overhead in the network using<br />

header compression mechanisms, but additional reduction is required in order<br />

to transfer high amount of data across the sensor network effectively. Meanwhile,<br />

network coding has recently emerged as an effective strategy to provide significant<br />

performance improvements in wireless networks. Many researchers have shown<br />

that by applying network coding in wireless networks we can improve the network<br />

throughput <strong>and</strong> reliability, minimize energy <strong>and</strong> decrease the network congestion<br />

[4] [5] [6]. Most of the network coding solutions have been verified using<br />

mathematical analysis <strong>and</strong> by the simulation experiments, while modest amount<br />

have been implemented <strong>and</strong> tested in limited network environment. Moreover,<br />

the network coding theory can be applied practically in each layer of the communications<br />

protocols stack. Also most of the solutions concern the physical (PHY),<br />

medium access control (MAC) <strong>and</strong> the application (APPL) layers. This paper<br />

is focused on application of the network coding theory in the 6LoWPAN-based<br />

system, taking into account the network (NET), 6LoWPAN adaptation (AL) <strong>and</strong><br />

MAC layers, while the wireless links are built using the IEEE 802.15.4 st<strong>and</strong>ard.<br />

Proposed solution is tailored to the Contiki 6LoWPAN <strong>and</strong> MAC implementation<br />

run on the AVR RAVEN sensor motes [10].<br />

The remainder of the paper is organized as follows. Section II presents the concept<br />

of the network coding mechanism for 6LoWPAN. Section III explains the implementation<br />

details. Description of the tests <strong>and</strong> the results discussion is performed<br />

in section IV. General conclusions <strong>and</strong> future work plans are given in section V.<br />

II. Concept of network coding for 6LoWPAN/IEEE 802.15.4<br />

network<br />

Network coding is known to improve network throughput by mixing information<br />

from different flows <strong>and</strong> conveying more information in each transmission.<br />

Though the idea of network coding is not new, in the past, it has been<br />

applied mainly in the context of multicasting in traditional wired networks. It is<br />

because the data packets are sent using multicast <strong>and</strong> broadcast addresses <strong>and</strong> they<br />

can visit many intermediate nodes in the same time, <strong>and</strong> than some streams often<br />

meet together <strong>and</strong> can be mixed (coded) <strong>and</strong> decoded in other nodes. Wireless<br />

networks are equipped with similar features, where sent frames can be received by<br />

many nodes simultaneously, because of the broadcast nature of the transmission


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

309<br />

medium. In order to shortly explain the idea of the network coding in a wireless<br />

multihop network let us assume simple scenario composed of three wireless<br />

nodes illustrated in Fig. 1 [8]. Nodes 1 <strong>and</strong> 3 have to send their packets (‘a’ <strong>and</strong> ‘b’<br />

respectively). Packet ‘a’ has to be delivered to node 3 <strong>and</strong> packet ‘b’ has to reach<br />

node 1. The left picture shows transfer of the packets without network coding. Each<br />

node performs st<strong>and</strong>ard packet transmission, know as store <strong>and</strong> forward. It means<br />

that to transfer those two packets from the source to the destination, four wireless<br />

transmissions are required. If the network coding is employed (right picture), after<br />

receiving both packets (‘a’ <strong>and</strong> ‘b’) by node 2, it can transmit a single coded packet<br />

(a Å b) in such a manner that both destination nodes can receive it. It is possible<br />

because of the broadcast nature of the wireless network. Two packets are coded<br />

using simple xor function. It means that in order to extract one native (original)<br />

packet from coded packet the receiver needs the second packet. For example,<br />

the node 3 is able to extract packet ‘a’ from packet ‘a Å b’ if it stores the packet ‘b’<br />

(a = aÅbÅb). This exchange reduces the total number of wireless transmission<br />

from 4 to 3. Generally, network coding can be based on linear composition of two<br />

or more native packets [7].<br />

Figure 1. An example of information exchange with network coding<br />

A practical scheme, referred to as COPE (Coding Opportunistically), based<br />

on the network coding for wireless networks is proposed in [6]. The solution tailored<br />

to the 6LoWPAN network presented in this paper is based on COPE. Each<br />

node in the network has to store transmitted <strong>and</strong> received packets during predefined<br />

time as shown at the network in Fig. 2. For example, node 2 should store transmitted<br />

packet P4 <strong>and</strong> received packets P3 <strong>and</strong> P5 (marked in rectangles).<br />

Figure 2. Collecting of sent <strong>and</strong> received packets


310 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

For simplicity, it was also assumed that packets will be coded using simple<br />

xor function <strong>and</strong> they can be extracted just in the next hope nodes. The native<br />

packets hidden in the coded packet can be extracted in each destination<br />

node if the node has stored n-1 packets (where n – number of native packets included<br />

in the coded packet). It means that each node has also to store the table with<br />

information about the packets stored in the neighboring nodes. Fig. 3. shows that<br />

node 1 keeps the neighbor table. The entries in this table are collected based on<br />

the packets identifiers constructed from the native packets source addresses <strong>and</strong><br />

sent in coded packets in additional header. If the data packets are not in the network<br />

during some time, signaling packets should be used to inform neighboring nodes<br />

about stored packets. If the sender sent a coded packet which is a composition of too<br />

many native packets, some receivers could not extract their missing native packet<br />

<strong>and</strong> they should be resent by the sender. Such operation increases the network load<br />

<strong>and</strong> decreases the network coding gain.<br />

Figure 3. Storing of network coding neighbor table in each node<br />

The network coding gain in opportunistic coding scheme is achievable due<br />

to, as it has been already mentioned, the broadcasting nature of the wireless network.<br />

Majority of MAC <strong>and</strong> PHY radio-based protocols make possible to transfer<br />

<strong>and</strong> receive the broadcast frames. The same, considered IEEE 802.15.4 st<strong>and</strong>ard<br />

gives an opportunity to broadcast traffic h<strong>and</strong>ling. Assuming that node 1 from<br />

Fig. 4 wants to transfer the coded packet P1ÅP2ÅP4ÅP5, it ought to broadcast<br />

the packet.<br />

Unfortunately, broadcast transmission is not confirmed by the receivers in MAC<br />

layer, than coded packet transmission is not reliable. Even if some mechanism<br />

was employed in the network layer that can confirm the coded packets, it would<br />

be significant, additional signaling traffic. If the transmission reliability is not rel-


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

311<br />

evant or ensured by the upper layer protocols the coded packets can be sent using<br />

broadcasting technique (as in Fig. 4).<br />

Figure 4. Sending coded packet in broadcasting mode<br />

As an alternative, the coded packet can be sent in unicast transmission to one<br />

of the next hope node which confirms its reception using MAC acknowledgment<br />

(MAC ACK) <strong>and</strong> the other nodes can receive the packet, interpret it but they cannot<br />

acknowledge its correct reception (as in Fig. 5).<br />

Figure 5. Sending coded packet in unicast mode with MAC ACK<br />

The third possibility is to confirm the coded packet on the fly. Fig. 6. shows<br />

that node 2 confirms the coded packet using MAC ACK, but nodes 3 <strong>and</strong> 4 confirm<br />

reception of given coded packet while transferring its native or other coded<br />

packets (NC_ACK).


312 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 6. Sending coded packet in unicast mode with mixed acknowledgment<br />

Tailoring the network coding scheme explained above to the 6LoWPAN/IEEE<br />

802.15.4 network some assumptions are taken. Since the solution is dedicated to<br />

sensor motes, it should not consume too much memory during implementation <strong>and</strong><br />

operation. It also should use both IEEE 802.15.4 MAC <strong>and</strong> network layer features<br />

(6LoWPAN, uIP6 – microIPv6, RPL – Routing for Low Power <strong>and</strong> Lossy Networks,<br />

IPv6 ND – Neighbor Discovery). Fig. 7 presents typical multihop transmission<br />

of 6LoWPAN datagrams (compressed or fragmented packets) between node 1<br />

<strong>and</strong> 3. Depending on the implementation, the 6LoWPAN packets are equipped with<br />

the addresses (‘Src’, ‘Dest’) which comes from the IPv6 layer <strong>and</strong> can be carried inline<br />

or can be extracted from the MAC addresses. Thus, from node 1 the 6LoWPAN<br />

packet is sent to the IP ‘Dest’ address of the node 3, but the IEEE 802.15.4 frames<br />

are equipped with the MAC ‘Src’ <strong>and</strong> ‘Dest’ addresses of node 1 <strong>and</strong> 2 respectively.<br />

Both the data <strong>and</strong> ACK frames are also overheard by the neighboring nodes.<br />

Figure 7. Typical multihop transmission in 6LoWPAN<br />

Also depending on the 6LoWPAN implementation, the packets can be routed<br />

in the IPv6 layer or forwarded in the 6LoWPAN layer. The first case is shown in Fig. 8,


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

313<br />

where three nodes are represented by the layered architecture similar to those used<br />

by the 6LoWPAN implementation in the Contiki operating system [10]. The application<br />

(Appl), routing (RPL) <strong>and</strong> neighbor discovery segments are sent using TCP/<br />

IPv6 protocol (uIP6 implementation) <strong>and</strong> routed in the intermediate node using<br />

tiny IPv6 routing table, collected by the RPL protocol. The 6LoWPAN layer is supported<br />

also by the IPv6 neighbor discovery which delivers the neighboring nodes<br />

MAC addresses <strong>and</strong> IPv6 addresses (string them in the ND cache).<br />

Figure 8. Routing over 6LoWPAN<br />

The 6LoWPAN defines also the mesh routing (Fig. 9.). It means that routing<br />

is performed using the 6LoWPAN mesh header. Moreover, if fragmentation is performed,<br />

each fragment is routed from source to the destination independently, what<br />

is different than during routing over the 6LoWPAN, where all fragments have to<br />

be collected in the intermediate node before subsequent forwarding.<br />

Figure 9. 6LoWPAN mesh routing<br />

The network coding operations in 6LoWPAN depends on the routing scheme.<br />

If the forwarding mechanism is located in the IPv6 layer the coding has to be


314 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

performed after header decompression <strong>and</strong> all fragments collection. This is because<br />

the 6LoWPAN fragments are not equipped with IP destination address (except the first<br />

one, if the address is carried inline). If the mesh forwarding is used, the coding operation<br />

can be located in 6LoWPAN layer before decompression <strong>and</strong> fragments collection.<br />

During network coding operation two or more native packets are mixed using<br />

linear combination. But the native packets can differ in lengths. It is confirmed<br />

in [6], that coding of native packets with significantly different lengths gives small<br />

gain. It means that it is required to collect the native packets with similar lengths.<br />

A format of the coded packet is shown in Fig. 10. Example two 6LoWPAN packets<br />

with header compression (IPHC – IP header compression) <strong>and</strong> IP addresses<br />

carried inline (s – source, d – destination) are xored to receive the coded packet<br />

with additional network coding header (NC Header). The coded packet is sent to<br />

an appropriate MAC address, depending on the transmission rule. The example<br />

in Fig. 10 shows that coded packet is sent to broadcast address. During network<br />

coding operation it is required to ensure an appropriate length of the native packets<br />

in order to do not exceed the MAX IEEE 802.15.4 MAC SDU.<br />

Figure 10. Format of coded packet<br />

Figure 11. Network coding header format (NCi – NC identifier ‘0001’, A – address type,<br />

N – number of MAC addresses, Pad L – Pad length)<br />

The network coding header format is presented in Fig. 11. It is composed<br />

of the Dispatch field <strong>and</strong> destination nodes identifiers (MAC addresses) which in-


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

315<br />

dicate the destination nodes responsible for decoding the native packets. Dispatch<br />

field begins from the NC identifier which is set to binary 000 <strong>and</strong> is allocated by<br />

the 6LoWPAN recommendation [2] to Non-IPv6 packets.<br />

III. Implementation<br />

The network coding proposal presented in section II was implemented in Contiki<br />

operating system (OS) [10]. The Contiki OS is an open source operating system<br />

for networked embedded systems in general, <strong>and</strong> wireless sensor nodes in particular.<br />

It is developed by a team of developers from the industry <strong>and</strong> academia.<br />

The Contiki system incorporates uIPv6 – the IPv6 protocols stack. Both the Contiki<br />

system <strong>and</strong> applications for the system are implemented in the C programming<br />

language. Contiki has been ported to a number of microcontroller architectures,<br />

including the Texas Instruments MSP430 <strong>and</strong> the Atmel AVR [11]. The network<br />

coding implementation was tested on the 8-bit Amtel AVR motes.<br />

Currently, the Contiki OS allows running the 6LoWPAN implementation<br />

working on the IEEE 802.15-based MAC, but with some limitations. The most<br />

important is that the 6LoWPAN implementation is limited to IP routing. It means<br />

that all fragments have to be collected in each node before transferring the packet to<br />

the next node. It is shown in Fig. 12. This limitation is very important from network<br />

coding point of view. Since the sensor motes have memory limitations, they cannot<br />

allocate to big memory for stored packets. It is because the remaining memory must<br />

be used to store the fragments before the node rebuild a full IPv6 packet.<br />

Figure 12. Collecting the fragmented packets in Contiki 6LoWPAN implementation<br />

The network coding functions (net_coding(), net_decoding()) are located<br />

in functions defined in sicslowpan.c file, <strong>and</strong> they allows the network coding before


316 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

the packets reach the uIP6 layer. A location of these functions is shown in Fig. 13<br />

against the other Contiki protocols stack functions.<br />

Figure 13. Location of the net_coding() <strong>and</strong> net_decoding() functions in contiki protocols stack<br />

(routing over 6LoWPAN)<br />

IV. Verification results discussion<br />

Implemented network coding mechanisms were verified in a simple testbed<br />

based on the Atmel evaluation <strong>and</strong> starter kit that includes two AVR Raven boards<br />

with a 2.4 GHz transceiver, on-board picoPower AVR application processors with<br />

LCD display, <strong>and</strong> one USB stick with a 2.4 GHz transceiver to allow USB connections<br />

to a PC. The maximum transmission power of the nodes were decreased<br />

<strong>and</strong> the nodes were deployed in such a way that using the RPL routing protocol<br />

the network were configured to the structure presented in Fig. 7, where node 1<br />

is the USB stick connected to a PC. Such configuration corresponds to the real sensor<br />

networks in which the nodes transmit the sensor data to the gateway (node 1).<br />

Instead of the real sensor data generated by the node 3, the IPv6 Ping streams<br />

(30 packets in each stream) with packet intervals from 0.4 to 0.45 s were transmitted<br />

between nodes 1 <strong>and</strong> 3. The length of the Ping packets were set up to 10 Bytes.<br />

The number of streams were changed from 1 to 7. Also a number of native pack-


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

317<br />

ets that can be buffered in each node were changed during verification experiments<br />

from 0 (without network coding) to 5. Each native packet were buffered<br />

in the node by 0.5 second. Fig. 14 shows the overall traffic captured in the air<br />

depending on the number of streams <strong>and</strong> number of buffered native packets<br />

in the node (0 – means without network coding).<br />

Figure 14. Overall traffic captured in the air<br />

For clarity, detailed values of overall traffic are presented for the network<br />

without network coding procedures <strong>and</strong> while 5 native packets can be buffered<br />

in the node for coding purposes. The results confirm that using network coding<br />

the overall traffic in the air is decreased. Additionally, the level of traffic decreasing<br />

is directly dependent on the traffic generated by the nodes <strong>and</strong> the network coding<br />

buffers capacity. The cost of the network coding in the network was the end-to-end<br />

packet delay increasing. In the case of presented network the end-to-end packet<br />

delay was increased by about 0.5 s (native packet buffering time). By increasing<br />

the number of buffered native packets in the node the we can attain additional<br />

gain but the limitation is a memory of the sensor motes.<br />

V. Conclusions <strong>and</strong> future work<br />

The paper described the possibility of using the network coding mechanisms<br />

in 6LoWPAN wireless sensor networks. The proposal is based on relatively simple<br />

mechanism relying on the linear combination of two or more 6LoWPAN packets<br />

<strong>and</strong> on transmission coded packet to one hop neighbours using broadcasted nature<br />

of WSN. The proposed mechanisms are tailored to the Contiki 6LoWPAN <strong>and</strong><br />

MAC implementation run on the AVR RAVEN sensor motes.<br />

The first verification results confirm that using network coding in presented<br />

network the overall traffic can be decreased. This endeavor would require more


318 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

work in the future, especially in terms of implementation of all described here routing<br />

cases <strong>and</strong> performing detailed tests in the wider network with more realistic<br />

traffic generated by the nodes.<br />

References<br />

[1] EDA IAP4 Raoadmap, “Future IAP4 European Defense stratEgic Research Agenda”,<br />

EDA Final Report, September 2011.<br />

[2] G. Montenegro, N. Kushalnagar, Intel Corp, J. Hui, D. Culler, “Transmission<br />

of IPv6 Packets over IEEE 802.15.4 Networks”, Request for Comments: 4944, September<br />

2007.<br />

[3] H. Song, S.H. Lee, S. Lee, H.S. Lee, “6LoWpan-based tactical wireless sensor network<br />

architecture for remote large-scale r<strong>and</strong>om deployment scenarios”, IEEE <strong>Military</strong><br />

<strong>Communications</strong> Conference, MILCOM, October 2009.<br />

[4] R. Ahlswede, N. Cai, S.-Y.R. Li, <strong>and</strong> R.W. Yeung, “Network information flow,”<br />

IEEE Transactions on <strong>Information</strong> Theory, vol. 46, no. 4, pp. 1204-1216, 2000.<br />

[5] Y. Chen, G. Feng, L. Zhou, “Using network coding to improve robustness <strong>and</strong><br />

persistence for data transmission in sensor networks”, 6th International ICST<br />

Conference on <strong>Communications</strong> <strong>and</strong> Networking in China, CINACOM, August 2011.<br />

[6] S. Katti, H. Rahul, H. Wenjun, D. Katabi, M. Medard, J. Crowcroft, “XORs<br />

in the Air: Practical Wireless Network Coding “, IEEE/ACM Transactions on<br />

Networking, vol. 16, Issue 3, pp. 497-510, June 2008.<br />

[7] S.-Y.R. Li, R.W. Yeung, <strong>and</strong> N. Cai, “Linear network coding”. IEEE Transactions on<br />

<strong>Information</strong> Theory, February, 2003.<br />

[8] B. Ni, N. Santhapuri, Z. Zhong, S. Nelakuditi, “Routing with opportunistically<br />

coded exchanges in wireless mesh networks”, Proceedings of the 2nd IEEE Workshop<br />

on Wireless Mesh Networks (WiMesh 2006) (2006), pp. 157-159.<br />

[9] J. Krygier, M. Bednarczyk, K. Maślanka, Integration of MAC Relaying <strong>and</strong><br />

IP Routing Protocols in Ad-Hoc Networks: Multimetric Approach, <strong>Military</strong> CIS<br />

Conference MCC’2010, Wroclaw, Pol<strong>and</strong>, September 2010.<br />

[10] A. Dunkels, B. Grönvall, T. Voigt, “Contiki – a lightweight <strong>and</strong> flexible operating<br />

system for tiny networked sensors”, Proceedings of the First IEEE Workshop on<br />

Embedded Networked Sensors (Emnets-I), Tampa, Florida, USA, November 2004.<br />

[11] Thang Vu Chien, Hung Nguyen Chan, <strong>and</strong> Thanh Nguyen Huu, “A Comparative<br />

Study on Operating System for Wireless Sensor Networks”, International Conference<br />

on Advance Computer Science <strong>and</strong> <strong>Information</strong> System, ICACSIS 2011, Jakarta 2011.


Testbed Implementation of Energy Aware Wireless<br />

Sensor Network<br />

Ewa Niewiadomska-Szynkiewicz 1, 2 , Michał Marks 1, 2 , Filip Nabrdalik 2<br />

1 Research <strong>and</strong> Academic Computer Network (NASK), Warsaw, Pol<strong>and</strong>,<br />

ewan@nask.pl, Michal.Marks@nask.pl<br />

2 Institute of Control <strong>and</strong> Computation Engineering,<br />

Warsaw University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong>,<br />

ens@ia.pw.edu.pl, mmarks@elka.pw.edu.pl, F.Nabrdalik@stud.elka.pw.edu.pl<br />

Abstract: Wireless sensor networks (WSNs) are autonomous ad hoc networks designed <strong>and</strong> developed<br />

for potential applications in monitoring, surveillance, security, etc. The sensor devices that are<br />

battery powered should have lifetime of months or years. Therefore, energy efficiency is a crucial<br />

design challenge in WSN. In this paper the energy efficient communication techniques, i.e., activity<br />

control <strong>and</strong> power control protocols are presented <strong>and</strong> discussed. We focus on the implementation<br />

of energy aware algorithm for WSN – Geographical Adaptive Fidelity (GAF) – in our testbed network<br />

formed by the Maxfor devices. The results of experiments confirm significant energy savings that<br />

lead to network lifetime increase.<br />

Keywords: wireless sensor networks; WSN; energy aware communication; activity protocols; power<br />

control protocols<br />

I. Introduction to WSN<br />

The last decade has seen tremendous interest in all aspects of wireless sensor<br />

networks (WSNs) – distributed systems composed of numerous smart, embedded <strong>and</strong><br />

inexpensive sensor devices deployed densely in a sensing area [1], [2], [15]. The nodes<br />

of a network equipped with CPU, battery, sensing units <strong>and</strong> radio transceiver, networked<br />

through wireless links can be used in applications, in which traditional networks are<br />

inadequate. The important property of WSN is the ability to operate in harsh <strong>and</strong> hostile<br />

environments, in which human monitoring is risky, <strong>and</strong> often impossible. The lack<br />

of fixed network infrastructure components allows creating unique topologies <strong>and</strong><br />

enables the dynamic adjustment of individual nodes to the current network structure<br />

in order to execute assigned tasks. Wireless sensor networks are deployed in various<br />

environments <strong>and</strong> are used in large number of practical applications concerned<br />

with monitoring, rescue missions <strong>and</strong> military actions. Ad hoc architecture of WSN<br />

has many benefits, however its flexibility come at a price. A number of complexities <strong>and</strong><br />

design constraints are concerned with the characteristics of wireless communication,


320 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

i.e., limited transmission range <strong>and</strong> throughput, limited QoS, limited resources, <strong>and</strong><br />

multihop nature of a network. Moreover, the quality of wireless transmission depends<br />

on numerous external factors, like weather conditions or l<strong>and</strong>form features. Most<br />

of these factors can change in time.<br />

For these reasons, WSNs need some special treatment. The most important<br />

constraint is concerned with limited power source. Nodes forming the network are<br />

often small battery-fed devices. Each device, participating in WSN needs to manage<br />

its power in order to perform duties as long <strong>and</strong> as effective as possible. Moreover,<br />

devices are often deployed in remote locations where replacing batteries is difficult<br />

or even impossible, <strong>and</strong> usually a high disparity between expected <strong>and</strong> real power<br />

drawn can be observed. Thus, power management is very important. A numerous<br />

energy aware communication methods <strong>and</strong> strategies have been developed, <strong>and</strong><br />

are presented in literature [2], [12], [14]. In general, power management is a topic<br />

that has been a subject of intensive research in ad hoc networking in recent years.<br />

In this paper we discuss the approaches to design energy aware WSN topologies.<br />

The main contribution of our work is to show the benefits of application<br />

of the energy aware communication protocol in real network system. We have<br />

implemented <strong>and</strong> verified the modified version of commonly known protocol GAF<br />

in our testbed network formed by the Maxfor devices. The results of tests in our<br />

laboratory were compared with simulation results presented by Xu et al. in [16].<br />

In section II, we describe the energy consumption characteristics in WSN. In section<br />

III, we investigate some energy aware methods <strong>and</strong> algorithms, in section IV,<br />

the GAF protocol is described. The results of the performance evaluation of GAF<br />

through testbed implementation are presented <strong>and</strong> discussed in section V.<br />

II. Energy consumption in WSN<br />

A lifetime of WSN is measured by the time interval before all devices have<br />

been drained out of their battery power or WSN is unserviceable – no longer<br />

provides an acceptable event detection ratio. To maximize the lifetime, all aspects<br />

such as architecture, circuits <strong>and</strong> communication protocols must be made energy<br />

efficient. Let us focus on the energy consumption characteristics of a sensor device<br />

(WSN node). Three main components that consume the energy are: microprocessor,<br />

sensing circuit <strong>and</strong> radio transceiver.<br />

The energy consumed by microprocessor is determined by the sum of dynamic P d<br />

<strong>and</strong> static P s power, i.e., P = P d + P s . Many techniques have been developed to<br />

minimize the energy consumption, such as: dynamic voltage scaling, modulation<br />

scaling, <strong>and</strong> energy aware embedded, event driven operating systems.<br />

The objective of a sensing unit is to translate physical measurements to electrical<br />

signals. Several sources of energy consumption can be listed: signal sampling,<br />

conversion of physical signals to electrical ones, analog to digital conversion, signal<br />

conditioning. The energy usage in this unit is relatively constant. In some applica-


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

321<br />

tions the detectors can work in the event driven mode, <strong>and</strong> can be switched off for<br />

some time to save energy.<br />

The communication system is the major energy consumer during wireless<br />

network operation. The radio transceiver unit can operate in one of four modes,<br />

which differ in the consumption of energy: transmission – signal is transmitted to<br />

other nodes (greatest power consumption), receiving – message from other nodes<br />

is received (medium power consumption), st<strong>and</strong>-by (idle) – inactive transceiver,<br />

turned on <strong>and</strong> ready to change to transmission or receiving mode (low power<br />

consumption) <strong>and</strong> sleep – transceiver is switched off. In order to extend the lifetime<br />

of a network, it is frequent practice that radio transceivers of some nodes are<br />

deactivated. The nodes remain inactive for most time <strong>and</strong> are activated only to<br />

transmit or receive messages from the network.<br />

The energy consumption strongly depends on the transmission range <strong>and</strong><br />

modulation parameters. Generally, short transmissions in a network are desired.<br />

They involve smaller power usage <strong>and</strong> cause less interference in a network, simultaneously<br />

effected transmissions, thus increasing the network throughput.<br />

III. Energy aware communication<br />

A. Methods <strong>and</strong> algorithms<br />

In this paper we focus on energy aware protocols for IEEE 802.15.4 (ZigBee)<br />

based networks. The protocol used by the node of WSN consists of the application,<br />

transport, network, data link <strong>and</strong> physical layers [1]. The energy management<br />

in WSN is emphasized in data link <strong>and</strong> network layers. The MAC protocol guarantees<br />

efficient access to the transmission media while carefully managing the energy<br />

allotted to the nodes. Typically, this objective is achieved by switching the radio to<br />

a low-power mode based on the current transmission schedule.<br />

Energy efficiency is considered mostly by protocols provided by network<br />

layer. Energy aware routing ensures the survivability of low energy networks.<br />

In commonly used wireless senor networks it is assumed that the receiver is not<br />

located within the transmitter’s range. The transmitter must transmit data to the receiver<br />

by means of intermediate nodes. Thus, the natural communication method<br />

in WSNs is a multi-hop routing. This is a certain limitation, but on the other h<strong>and</strong><br />

it enables the construction of network of greater capacity – a multi-hop network<br />

enables simultaneous transmission via many independent routes, <strong>and</strong> managing<br />

available energy. Moreover, each node of a network can attribute the level of power<br />

used to send a message to the other node in order to minimize the amount of energy<br />

received from the battery, while at the same time maintaining the coherence<br />

of the network. Due to a significant node redundancy (nodes are densely deployed),<br />

<strong>and</strong> the assumption that each node of WSN has impact on the power used to transmit<br />

a message numerous low energy consumption communication methods <strong>and</strong>


322 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

energy conservation techniques have been developed, <strong>and</strong> are described in literature.<br />

In general, two main approaches for power saving in WSN can be distinguished:<br />

• power control protocols,<br />

• activity control protocols.<br />

B. Power control protocols<br />

The popular approach to energy efficient communication is controlling a transmit<br />

power of each node in a network. In general, short transmissions involve smaller<br />

power consumption <strong>and</strong> cause less interference <strong>and</strong> latency. Power control protocols<br />

(PCs) are responsible for providing the routing protocols with the list of the nodes’<br />

neighbors, <strong>and</strong> making decisions about the ranges of transmission power utilized<br />

in each transmission. Therefore, the PC protocols are placed partially in the OSI<br />

network layer <strong>and</strong> the OSI data link layer [14]. A numerous PC protocols have<br />

been developed <strong>and</strong> are described in literature. They utilize various information<br />

about a network <strong>and</strong> network nodes, i.e., location of nodes <strong>and</strong> its neighbors or<br />

direction from which the signal was received. Based on these information power<br />

control techniques may be divided into following groups: location-based (nodes<br />

are able to determine their exact positions), direction-based (relay on the ability<br />

of all nodes to estimate relative directions of their neighbors) <strong>and</strong> neighbor-based<br />

(determine all neighbors within the maximal transmission range). The detailed<br />

survey of PC protocols can be found in [14]. The results of performance evaluation<br />

of selected techniques through simulation are presented in [12].<br />

C. Activity control protocols<br />

The other approach to energy efficient communication is controlling a number<br />

of active nodes in a network. Due to a significant node redundancy <strong>and</strong> multiple<br />

paths between nodes we can turn off selected intermediate nodes while still guarantee<br />

full connectivity <strong>and</strong> maximum link utilization constraints. Dynamic power<br />

management is an efficient approach to reduce system power consumption <strong>and</strong><br />

extend the lifetime of individual node without significantly degrading the network<br />

performance. The basic idea is to deactivate the radio transceiver of selected<br />

nodes when not needed <strong>and</strong> wake them up when necessary. Hence, radio devices<br />

remain inactive for most working time <strong>and</strong> are activated only to transmit or receive<br />

messages from other nodes. In general, dynamic power management is a complex<br />

problem. It can involve the limitation of accessible b<strong>and</strong>, <strong>and</strong> can also interrupt<br />

the data transfer in the network. Therefore, implementing the correct policy for<br />

radio switching <strong>and</strong> estimating the optimal value of radio transceiver’s switch-off<br />

time are critical for a network performance.<br />

The activity control protocols (AC) employ dynamic management of radio<br />

devices. The objective is to limit the power consumption while simultaneously


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

323<br />

minimizing the negative impact on the network throughput <strong>and</strong> on the efficiency<br />

of data transmission routing. Different types of AC protocols are presented<br />

in literature, <strong>and</strong> are applied to WSN systems. Similarly to PC protocols, they<br />

utilize various information about a network <strong>and</strong> network nodes, i.e., location<br />

of nodes in a network, nodes density, connectivity, etc. Many of them implement<br />

clustering techniques. It was observed that grouping nodes into clusters<br />

can reduce the overall energy usage in a network. Based on utilized information<br />

activity control techniques may be divided into several groups: locationbased<br />

(GAF [16], GeRaF [6]), connectivity-based (Span [7]), clustering-based<br />

([LEACH [9], HEED [17], PANEL [5], PRWST [3]) <strong>and</strong> hierarchical (EEHC [4],<br />

CGPS [12]).<br />

It should be pointed that activity control protocols should be capable of buffering<br />

traffic destined to the sleeping nodes <strong>and</strong> forwarding data in the partial network<br />

defined by the covering set. The covering set membership needs to be rotated between<br />

all nodes in the network in order to maximize the lifetime of the network.<br />

IV. GAF algorithm<br />

The Geographic Adaptive Fidelity (GAF) algorithm developed by Y. Xu et al.,<br />

<strong>and</strong> described in [16] selects nodes responsible for relaying traffic in the network<br />

based on their geographical position estimated using the GPS system or calculated<br />

using any other location system [2], [11]. GAF assumes covering the network deployment<br />

area with a virtual grid. The location information is employed to form clusters.<br />

The GAF protocol relies on the concept of ‘’node equivalence’’. Two nodes are<br />

equivalent when they are equally useful as relays in communication between other<br />

nodes. Problem of selecting equivalent nodes is nontrivial. It can be easily observed<br />

that network nodes equivalent in communication between a given pair of nodes do<br />

not have to be equivalent in communication between other pairs of nodes.<br />

To select equivalent nodes GAF divides a spatial domain, where nodes are<br />

distributed into cells that form a grid, see Fig. 1. The size d of each cell is calculated<br />

due to transmission ranges of nodes, i.e., d<br />

r/ 5 , where r denotes the maximal<br />

transmission range assigned to network nodes. It is assumed that each node in a cell<br />

is in transmission range of all other nodes within adjacent cell. The construction<br />

of such a grid allows to preserve the network connectivity. All nodes in a network<br />

may switch between one of three states: active, discovery <strong>and</strong> sleep. In the active<br />

state a node is responsible for relaying traffic on behalf of its cell. In the discovery<br />

state nodes exchange discovery messages, trying to detect other nodes with higher<br />

energy in the same cell. However, the overhead due to discovery messages is not<br />

very high. The following load balancing energy usage is proposed. After spending<br />

a fixed amount of time T A in the active state, a node switches to the discovery state,<br />

<strong>and</strong> another node from the same cell switches to the active state. After spending<br />

a fixed amount of time T D in the discovery state, the node backs to the active state.


324 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Whenever a node changes the state, it sends a message containing its identifier (ID)<br />

<strong>and</strong> its ranking value (RV). The ranking value is used to select the relay node to<br />

transmission a message. Several rules are proposed to determine a node’s RV. In general,<br />

a node that is in the active state has a higher rank than a node in the discovery<br />

state, <strong>and</strong> nodes with longer expected lifetimes (calculated with respect to energy<br />

consumption characteristics) have higher rank than the others.<br />

Figure 1. Communication using GAF. The data transmission from the source to the target<br />

is realized using different relay nodes for different time slots<br />

Nodes in the active <strong>and</strong> discovery states may switch to the sleep state whenever<br />

they find a node in the same cell with higher RV. When a node enters the sleep state,<br />

it cancels all pending timers, <strong>and</strong> powers down the radio. After spending the fixed<br />

amount of time T S in the sleep state the node turns on its radio <strong>and</strong> switches to<br />

the discovery state. The sole concept of GAF is to maintain only one node with its<br />

radio transceiver turned on per cell, see Fig. 1. The mentioned parameters, i.e., T A ,<br />

T D , T S , are used to tune the algorithm. In our improved version of GAF (GAF-M)<br />

the value of the interval T D is estimated independently for each cell, <strong>and</strong> depends<br />

on the number of nodes that form a given cell. The bigger the number of nodes<br />

the shorter T D time. Moreover, we prohibit switching between different states<br />

the nodes with very low battery level.<br />

The GAF algorithm was designed for IEEE 802.11 networks. It can run over<br />

any routing protocol for ad hoc networks. Y. Xu et al., discuss the performance<br />

of GAF combined with two reactive routing protocols AODV (Ad-hoc On-Dem<strong>and</strong><br />

Distance Vector) [13] <strong>and</strong> DSR (Dynamic Source Routing) [10]. We adopted GAF<br />

to work in 802.15.4 networks. In our implementation we used DYMO (Dynamic<br />

Manet On-dem<strong>and</strong>) [8] routing protocol that is a successor of AODV. DYMO<br />

shares many benefits of AODV but is slightly easier to implement.<br />

Y. Xu et al. claim that GAF provides longer lifetime of WSN with minimal loss<br />

in data delivery rates compared to pure AODV <strong>and</strong> DSR protocols. The simulation<br />

results presented in [16] confirm the good performance of the algorithm. It is<br />

worth to note that simulation results show that GAF extends the network lifetime<br />

proportionally to the increase of nodes density in the deployment area.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

325<br />

V. GAF performance in testbed network<br />

The main objective of our research was to implement <strong>and</strong> validate the GAF<br />

algorithm using testbed implementation in our laboratory formed by physical<br />

sensor devices.<br />

A. Testbed WSN – hardware <strong>and</strong> software<br />

The experiments in our WSN laboratory were performed using testbed implementation<br />

involving MTM-CM5000 motes (http://www.maxfor.co.kr/eng/<br />

en_sub5_1.html) manufactured by Maxfor (see Fig. 2).<br />

Figure 2. The MTM-CM5000 mote<br />

The MTM-CM5000 mote is IEEE 802.15.4 compliant wireless sensor node<br />

based on the original open-source “TelosB” platform design, developed <strong>and</strong> published<br />

by the University of California, Berkeley. The mote’s architecture is presented<br />

in Fig. 3 <strong>and</strong> the general specification is given in Table I.<br />

Figure 3. Architecture of the MTM-CM5000 mote<br />

The testbed networks were formed by three to eleven MTM-CM5000 motes <strong>and</strong><br />

one base station, all operating under TinyOS system. TinyOS (http://www.tinyos.net/)


326 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

is an open source, highly portable operating system that can be used to on-line<br />

operation of WSN formed of real low-power wireless devices. Our application<br />

was written in nesC (Network Embedded Systems C) language provided by TinyOS<br />

system. TYMO (http://tymo.sourceforge.net/) – the implementation of DYMO protocol<br />

on the TinyOS system was used to work with GAF. The preliminary version<br />

of our implementation was done in TOSSIM simulator, <strong>and</strong> next transformed into<br />

physical network. TOSSIM (http://docs.tinyos.net/tinywiki/ index.php/TOSSIM)<br />

is a discrete-events simulator for TinyOS wireless sensor networks. By exploiting<br />

the sensor network domain <strong>and</strong> TinyOS’s design, TOSSIM can capture network<br />

behavior at a high fidelity while scaling to thous<strong>and</strong>s of nodes. The same code<br />

can be used for simulation <strong>and</strong> real WSN operating in TinyOS.<br />

Table I. Specification of MTM-CM5000 Mote<br />

Processor<br />

RF chip<br />

RF power<br />

Power supply<br />

Antenna<br />

RF current draw<br />

Range<br />

Sensors<br />

TI MSP430F1611<br />

TI CC2420<br />

–25 dBm~0 dBm<br />

2.1 V~3.6 V – (AA or AAA battery)<br />

Dipole antenna / PCB antenna<br />

Receive mode: 18.8 mA<br />

Transmit mode: 17.4 mA<br />

Sleep mode: 1.0 μA<br />

~150 m (outdoor), 20~30 m (indoor)<br />

Light, humidity, temperature<br />

B. Results of experiments<br />

Multiple experiments were performed in our laboratory. The goal of the first<br />

series of experiments was to evaluate the performance of the GAF algorithm<br />

in a physical wireless network. The wireless sensor networks implementing GAF<br />

<strong>and</strong> DYMO protocols were compared with networks with no power capabilities at<br />

all (implementing pure DYMO). The key metric for evaluating examined networks<br />

was the lifetime of the network. To compare the performance of a given network<br />

we used the following characteristic:<br />

LTI = Lifetime GAF+DYMO / Lifetime DYMO (1)<br />

where Lifetime GAF+DYMO denotes the lifetime of a network implementing GAF <strong>and</strong><br />

DYMO protocols, <strong>and</strong> Lifetime DYMO is the lifetime of a network using only DYMO.<br />

The goal of the second series of experiments was to test the influence<br />

of the nodes density into a lifetime of a given network.<br />

In this paper the results of experiments performed for nine network configurations,<br />

i.e., examples E1-E9 describing different model size <strong>and</strong> topology are


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

327<br />

presented <strong>and</strong> discussed. The detailed description of examined networks is given<br />

in Table II. The variable N_cells denotes the number of cells that form a grid covering<br />

a deployment area, <strong>and</strong> S_cell the number of motes in each cell. Figures 4 <strong>and</strong> 5<br />

show the exampled network configurations.<br />

Table II. Specificatiojn of Eight Testbed Networks<br />

Testbed Networks (examples)<br />

E1 E2 E3 E4 E5 E6 E7 E8 E9<br />

N_cells 1 1 1 1 1 2 2 2 3<br />

S_cell 2 3 4 5 6 2 3 4 3<br />

Figure 4. Network E4 formed by 7 motes (source, sink <strong>and</strong> one cell of 5 nodes)<br />

Figure 5. Network E9 formed by 11 motes (source, sink <strong>and</strong> three cells of 3 nodes each)<br />

During the tests, we calculated the lifetime of a network measured by the time<br />

interval before WSN was unserviceable (all motes in one cell were drained out<br />

of their battery power). The performance of examined algorithms GAF+DYMO<br />

<strong>and</strong> pure DYMO for networks E4 <strong>and</strong> E9 are presented in Fig. 6 <strong>and</strong> 7. The summary<br />

of results – extensions of network lifetimes using GAF <strong>and</strong> DYMO over pure<br />

DYMO for eight experiments is presented in Table III.


328 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 6. Extension of WSN lifetime using GAF; network E4<br />

Figure 7. Extension of WSN lifetime using GAF; network E9<br />

Table III. Summary of Results (Values of LTI For All Testbed Networks)<br />

Method<br />

Testbed Networks (examples)<br />

E1 E2 E3 E4 E5 E6 E7 E8 E9<br />

DYMO 1 1 1 1 1 1 1 1 1<br />

GAF+DYMO 1.78 2.18 3.28 5.18 5.90 1.71 2.57 3.40 2.56<br />

The goal of the third series of experiments was to compare the performance<br />

of the original version of GAF with the modified version GAF-M implementing our<br />

scheme for T D time interval calculation. The performance of examined algorithms<br />

GAF-M <strong>and</strong> pure DYMO for network E4 is presented in Fig. 8.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

329<br />

Figure 8. Extension of WSN lifetime using GAF-M; network E4<br />

The summary of results for this case study are presented in Table IV <strong>and</strong> Fig. 9.<br />

The modified GAF-M allows to extend the network lifetime up to 30%.<br />

Table IV. Summary of Results (Values of LTI For 5 Testbed Networks)<br />

Method<br />

Testbed Networks (examples)<br />

E1 E2 E3 E4 E5<br />

DYMO 1 1 1 1 1<br />

GAF+DYMO 1.78 2.18 3.28 5.18 5.90<br />

GAF-M + DYMO 1.93 2.78 4.40 5.48 6.50<br />

Figure 9. Sensitivity to network density


330 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The results of experiments confirm the strength of the GAF algorithm. GAF<br />

provides longer lifetime compared to pure DYMO routing protocol. The results<br />

of tests performed in our testbed networks formed by the physical devices<br />

were not worse than simulation results described in [16]. We can even say that<br />

the combination of GAF <strong>and</strong> DYMO provides better results than the application<br />

that combines GAF <strong>and</strong> AODV. Similarly to the conclusions presented in [16],<br />

we could observe that GAF extends the network lifetime proportionally to<br />

the increase of nodes density in the deployment area. Tables III <strong>and</strong> IV, <strong>and</strong> Fig. 9<br />

show that time of accurate network operation strongly depends on the number<br />

of nodes that form each cell of a grid covering the deployment region. Moreover,<br />

our modifications of GAF improve the performance of the algorithm that leads<br />

to network lifetime increase.<br />

VI. Summary<br />

Many challenges arise from ad hoc networking <strong>and</strong> development of real life<br />

wireless sensor systems. In this paper we focused on energy aware networks. We<br />

described a functionality of the popular activity control protocol GAF for power<br />

saving in WSNs, <strong>and</strong> our testbed implementation that combines GAF <strong>and</strong> routing<br />

protocol DYMO. We evaluated the performance of our application in the laboratory,<br />

<strong>and</strong> improved the algorithm performance w.r.t. original version. The results<br />

of experiments confirm good performance of GAF in real life networks. In our<br />

future work we plan to make experiments with higher dimension networks <strong>and</strong><br />

compare GAF with other activity control protocols described in literature.<br />

As a final observation we can say that the design of wireless sensor networks<br />

should account for trade-offs between several attributes such energy consumption<br />

(due to mobility, sensing, <strong>and</strong> communication), reliability, fault-tolerance, data<br />

collection latency, <strong>and</strong> quality of information, <strong>and</strong> their impact on mission objectives.<br />

Therefore, strategies <strong>and</strong> techniques for energy efficient, reliable <strong>and</strong> secure<br />

communication in wireless sensor network has become a hot debate nowadays.<br />

Acknowledgment<br />

This work was partially supported by National Science Centre grant<br />

NN514 672940.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

331<br />

References<br />

[1] I.F. Akyildiz, W. Su, Y. Sankasubramaniam, <strong>and</strong> E. Cayirci, “Wireless sensor<br />

networks. A survey”, Computer Networks, vol. 38(4), pp. 393-422, 2002.<br />

[2] I. Akyildiz, <strong>and</strong> M. Vuran, “Wireless sensor networks”, John Wiley & Sons, Ltd,<br />

West, Sussex, UK, 2010.<br />

[3] N. Asiam, W. Philips, W. Robertson, <strong>and</strong> S. Sivakumar, “A multi-criterion<br />

optimization technique for energy efficient cluster formation in wireless sensor<br />

networks”, <strong>Information</strong> Fusion, vol. 12(3), pp. 202-212, 2011.<br />

[4] S. B<strong>and</strong>yopadhyay, <strong>and</strong> E. Coyle, “Minimizing communication costs in hierarchicallyclustered<br />

networks of wireless sensors”, Computer Networks, vol. 44(1), pp. 1-16, 2004.<br />

[5] L. Buttyan, <strong>and</strong> P. Schaer, “Position-based aggregator node election in wireless sensor<br />

networks”, International Journal of Distributed Sensor Networks, pp. 1-15, 2010.<br />

[6] M. Casari, A. Marcucci, M. Nati, C. Petrioli, <strong>and</strong> M. Zorzi, “A detailed simulation<br />

study of geographic r<strong>and</strong>om forwarding”, Proc. of <strong>Military</strong> <strong>Communications</strong> Conference<br />

MILCOM. vol. 1, pp. 59-68, 2005.<br />

[7] B. Chen, K. Jamieson, H. Balakrishnan, <strong>and</strong> R. Morris, “Span: An energy-efficient<br />

coordination algorithm for topology maintenance in ad hoc wireless networks”, ACM<br />

Wireless Networks, vol. 8(5), pp. 481-494, 2002.<br />

[8] I. Chakeres <strong>and</strong> C. Perkins, “Dynamic manet on-dem<strong>and</strong> (dymo) routing”, 2006,<br />

http://www.ietf.org/internet-drafts/draft-ietfmanet-dymo-05.txt.<br />

[9] W. Heinzelman, A. Ch<strong>and</strong>rakasan, <strong>and</strong> H. Balakrishnan, “Energy-efficiet<br />

communication protocol for wireless sensor networks”, Proc. of the 33rd Hawaii<br />

International Conference on System Sciences. pp. 1-10, 2000.<br />

[10] D.B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts”, Proc. of the IEEE<br />

Workshop on Mobile Computing Systems <strong>and</strong> Applications, pp. 158-163, 1994.<br />

[11] E. Niewiadomska-Szynkiewicz, <strong>and</strong> M. Marks, “Optimization schemes for wireless<br />

sensor network localization”, Journal of Applied Mathematics <strong>and</strong> Computer Science,<br />

vol. 19(2), pp. 291-302, 2009.<br />

[12] E. Niewiadomska-Szynkiewicz, P. Kwaśniewski, <strong>and</strong> I. Windyga, “Comparative<br />

study of wireless sensor networks energy-efficient topologies <strong>and</strong> power save protocols”,<br />

Journal of Telecommunications <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>, no. 3/2009. pp. 68-75,<br />

2009.<br />

[13] C.E. Perkins <strong>and</strong> E.M. Royer, “The ad hoc on-dem<strong>and</strong> distance vector protocol”<br />

in C. E. Perkins, editor, Ad hoc Networking, Addison-Wesley, pp. 173-219, 2000.<br />

[14] P. Santi, “Topology control in wireless ad hoc <strong>and</strong> sensor networks”, John Wiley<br />

& Sons, Ltd, West Sussex, UK, 2006.<br />

[15] R. Verdone, D. Dardari, G. Mazzini, <strong>and</strong> A. Conti, “Wireless sensor networks<br />

<strong>and</strong> actuator networks. Technologies, analysis <strong>and</strong> design”, Elsevier, USA, 2008.<br />

[16] Y. Xu, J. Heidemann, <strong>and</strong> D. Estrin, “Geography-informed energy conservation<br />

for ad hoc routing”, Proc. of the 7th Annual International Conference on Mobile<br />

Computing <strong>and</strong> Networking (MobiCom ’01). pp. 70-84, 2001.<br />

[17] O. Younis, <strong>and</strong> S. Fahmy, “Distributed clustering in ad-hoc sensor networks: A hybrid,<br />

energy-efficient approach”, Proc. of the IEEE INFOCOM, vol. 1, pp. 629-640, 2004.


An Energy Aware Self-Configured Wireless<br />

Sensor Network<br />

Marcin Wawryszczuk, Marek Amanowicz<br />

Electronics Faculty, <strong>Military</strong> University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong>,<br />

marcin.wawryszczuk@gmail.com, marek.amanowicz@wat.edu.pl<br />

Abstract: Recent years have shown that wireless communication are becoming more popular<br />

in professional, academic <strong>and</strong> every day applications. A wireless sensor node is usually autonomous,<br />

advanced device with limited power source. This limited power source makes the topology control<br />

a crucial technique, which allow the network to obtain energy efficiency without affecting the network’s<br />

connectivity <strong>and</strong> sensing coverage. The article demonstrates the energy efficient topology<br />

control mechanism, which allow a majority of network nodes stay in sleeping mode <strong>and</strong> do not affect<br />

the connectivity <strong>and</strong> sensing coverage. The result in energy consumption of the nodes <strong>and</strong> network<br />

lifetime are exposed <strong>and</strong> compared to different approaches.<br />

Keywords: wireless sensor network, topology control, energy efficiency<br />

I. Introduction<br />

Wireless sensor networks have become an emerging technology that represents<br />

the next evolutionary step in environment monitoring, traffic control, objects detection<br />

<strong>and</strong> tracking, etc. Typically, a network consists of a large number of nodes,<br />

distributed over some specific area <strong>and</strong> organized into multi hop system. A node<br />

of wireless sensor network is a simple device equipped with control, communication,<br />

sensing units as well as a power supply. The power supply is usually a small,<br />

low capacity battery which is very hard to replace. It makes the energy factor<br />

of the sensor node a critical one. As a result, topology control mechanisms of sensor<br />

network have to be equipped with efficient power management procedures.<br />

The network designer is responsible for these power management procedures to<br />

protect the energy resources what imply that the network lifetime is elongated. On<br />

the other h<strong>and</strong>, the network has to realize the primary objectives what is often out<br />

of whack with the energy conservation. The suitable compromise between both<br />

is called “topology control” (TC). It adjusts desired network’s parameters (like connectivity,<br />

coverage, etc.) while reducing energy consumption.<br />

There are two approaches to the topology control in wireless sensor networks.<br />

One of them is the nodes activity control, where only the small subgroup of nodes


334 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

is operative (active) <strong>and</strong> the rest of them run in sleep mode. The other method<br />

is called sleep/wake-up algorithms. The nodes with implemented sleep/wake-up<br />

algorithm stay active for a small period of time <strong>and</strong> then turn into sleep mode,<br />

where the communication, sensing <strong>and</strong> control units are deactivated. The active<br />

<strong>and</strong> inactive cycles are repeated during the whole node lifecycle. This approach<br />

minimize the energy consumption of every single node, but it does not guarantee<br />

the connectivity <strong>and</strong>/or coverage at any time of the network life. Obviously, these<br />

methods reduce the global energy consumption, as a result of all nodes energy conservation.<br />

Both methods are capable of elongating the network lifetime significantly.<br />

II. Related work<br />

Much of the related research are addressed to WSN that are dense, battery<br />

powered <strong>and</strong> self configured. Because of these requirements, most of the authors<br />

are concentrated on finding solution at various levels of the communication protocol,<br />

including extremely energy efficient aspects [1]. Some of the most popular<br />

solutions in energy efficient topology control are stated below.<br />

• GAF [2] (Geographical Adaptive Fidelity) is the nodes activity control<br />

method. This approach groups nodes in virtual grids. Each grid is defined<br />

such that, for any two adjacent grids A <strong>and</strong> B, all nodes in grid A are capable<br />

of communicating with any node in grid B, <strong>and</strong> vice-versa. The nodes<br />

in the same grid are equivalent in terms of routing, consequently just<br />

one node at a time needs to be active. The rest of the nodes can switch to<br />

the sleep mode <strong>and</strong> save the energy in this way.<br />

• GeRaF [3] (Geographic R<strong>and</strong>om Forwarding) is the nodes activity control<br />

method. In this method, each node posses the information about the neighborhood.<br />

Each node follows to the sleep/active pattern, starting from<br />

channel listening. The data transmission starts when the source node w s<br />

has any packet to send. The source node broadcasts the data with the location<br />

of itself <strong>and</strong> the location of the destination node w d . The node, which<br />

is inside the communication range of w s <strong>and</strong> is closest to the destination<br />

node w d simultaneously, continues the process of the data forwarding.<br />

The process is accomplished when the end point w d is reached. GeRaF<br />

protocol can cause a lot of collisions in a network [3][4].<br />

• SPAN [5] is the nodes activity control method. In the method, only a small<br />

group of coordinators stay active, while the rest of nodes switch into sleep<br />

mode <strong>and</strong> only periodically check if they are requested to wake up <strong>and</strong> become<br />

the coordinators. The coordinators are responsible for passing the data<br />

from a source node to a sink node. To guarantee a sufficient number of coordinators,<br />

SPAN uses so called coordinator eligibility rule: if two neighbors<br />

of a non-coordinator node cannot communicate with each other directly<br />

or via coordinators, it means that the node should become a coordinator.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

335<br />

However, it may happen that several nodes discover the lack of a coordinator<br />

at the same time <strong>and</strong>, thus, they all decide to become a coordinators.<br />

• ASCENT [6] (Adaptive Self Configuring Sensor Network Protocol)<br />

is the node activity control method. In ASCENT a node decides when to<br />

join the network or stay dormant. The decision is taken based on the connectivity<br />

<strong>and</strong> packet loss ratio measured locally.<br />

• STEM [7] (Sparse Topology <strong>and</strong> Energy Measurement) is the sleep/wakeup<br />

method. This approach exploits two different communication units: one for<br />

wakeup signaling <strong>and</strong> other for data transmission. The wakeup radio is not<br />

a low power consumption unit. Both radios work with the same communication<br />

range. Periodically each node turns its wakeup radio on for T active<br />

time, every T duration. When a source node wants to communicate with<br />

a neighboring node, it sends a stream of signals via the wakeup channel.<br />

As soon as the destination node receives the signal message, it acknowledges<br />

that fact <strong>and</strong> turns the data transmission unit on.<br />

• FSP [8] (Fully Synchronized Pattern) is the sleep/wakeup method. In this<br />

approach, all nodes in network wake up at the same time, following<br />

the pattern. It means that each node goes periodically into active mode<br />

for T active time, every T wakeup . After that, nodes switch to the sleep mode<br />

until the next T wakeup .<br />

• SWP [9] (Staggered Wakeup Pattern) is the sleep/wakeup method. In this<br />

approach nodes create the specific data acquisition tree structure. The nodes<br />

located at different levels of data gathering tree, wake up in a different time.<br />

Obviously, the active time T active of the adjacent tree levels must partially<br />

overlap to guarantee that children <strong>and</strong> parent nodes in the mentioned tree<br />

structure are able to communicate.<br />

Figure 1 shows the mechanism of SWP, where T active is the time the node stays<br />

active, T sleep is the time the node stays dormant, T is the sum of T active <strong>and</strong> T sleep .<br />

Figure 1. Staggered sleep/wakeup pattern<br />

• 802.11 PSM [10] is the sleep/wakeup method. In the approach, when two<br />

nodes want to communicate, their activity times T active , have to overlap.<br />

The method uses backoff mechanism for signaling <strong>and</strong> sampling the channel.<br />

When a node has a packet to send, it waits r<strong>and</strong>om period of time,<br />

assigned by backoff mechanism, before the action is performed.


336 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Comparing the methods described above, GAF <strong>and</strong> SPAN can reduce the energy<br />

consumption 3 times [11], GeRaF 2-3 times [4], ASCENT even more than 5 times [11].<br />

In group of sleep/wakeup methods, the energy conservation depends on<br />

the T active to T ratio. Therefore, it is difficult to estimate the exact energy conservation.<br />

Definitely STEM method is worse than the rest of the methods, because<br />

the method requires two communication units. For small T active /T ratio, the energy<br />

consumption is decreased to 1-2% of the regular energy consumption (without any<br />

method implemented).<br />

III. Assumptions<br />

In our work, we assume that the sensor network is dense <strong>and</strong> composed with<br />

MicaZ nodes, equipped with one communication module Chipcon CC2420. Nodes<br />

positions are known <strong>and</strong> every node is aware of its neighborhood in 2-hops distance.<br />

These information can be acquired through procedures introduced in [12].<br />

Communication <strong>and</strong> sensing ranges are modeled as a uniform disks. The radiuses<br />

of the disks are labeled as r c <strong>and</strong> r s respectively. The communication radius is not<br />

greater than the sensing radius. The nodes are placed on a flat area, so the network<br />

is considered in two dimensional perspective.<br />

IV. Problem statement<br />

We would like to consider the network purposed to detect ground moving<br />

objects <strong>and</strong> track them afterwards. In this case, it is necessary to monitor only<br />

the border layer of the network. Accordingly, the devices placed on the network<br />

edge have to maintain their sensing units active, while the rest of the devices<br />

can turn them off. They adhere to the set S E (external layer). The nodes localized<br />

on the network edge, can drowse communication units temporally to<br />

conserve the energy. The nodes placed inside the network are mainly inactive<br />

(all modules are switched off) <strong>and</strong> their control <strong>and</strong> communication units are<br />

active only for a short period of time. These nodes belong to the set S I (internal<br />

layer). The time when some node units are switched off is called T S . The time<br />

when the units are active <strong>and</strong> the device is capable of communicating with<br />

others is called T A . The sum of T A <strong>and</strong> T S is called cycle duration T. The T A to<br />

T ratio is called duty cycling:<br />

T<br />

DC = A<br />

100%<br />

(1)<br />

T<br />

It is obvious that the lower value of DC implies the lower energy consumption<br />

in particular node [12].


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

337<br />

The set of all nodes participating in the network structures S is defined as:<br />

S S S<br />

(2)<br />

E<br />

Obviously the nodes shaping the internal layer consume significantly less<br />

energy in comparison with the external layer nodes. What is more, it can exist k max<br />

disjoint sub-layers of environment at the same time. Each external layer node w E<br />

belongs to only one sub-layer:<br />

w S S : w S , i 1,..., k<br />

(3)<br />

E E Ei E Ei<br />

where: i is the sub-layer number, i=1,…,k max . Each layer has to follow the consistency<br />

rule:<br />

w S d( w , w ) r d( w , w ) r<br />

(4)<br />

z<br />

I<br />

max<br />

z Ei z j c z l c<br />

where: w z is a node, which belongs to the external layer, w j , w l are the closest<br />

nodes to the node w z , S Ei is the i-th sub-layer, i is the number of the sub-layer,<br />

i=1,…,k max . The consistency rule guarantees that the distance between any two<br />

nodes in a sub-layer is lower that the communication range (<strong>and</strong> the sensing<br />

range as well).<br />

The external sub-layers are active interchangeably. This approach allows<br />

the network to work longer in initial size of deployment.<br />

In the following chapters we answer the question how to assign the nodes to<br />

the proper layer <strong>and</strong> how to assure the consistency in external sub-layers during<br />

the whole network lifecycle in fully distributed manner.<br />

Figure 2. One of the sub-layers of external layers


338 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

V. Energy consumption<br />

The overall energy consumption is defined as temporal energy consumption<br />

of control unit E MC , communication unit E R <strong>and</strong> sensing unit E S in specified period<br />

of time Δt:<br />

te te te<br />

(5)<br />

E E dt <br />

E dt E dt<br />

t MC R S<br />

ts ts ts<br />

where: E Δt is the energy consumption in the analyzed period of time Δt,<br />

E MC is energy consumption of the control unit, E R is energy consumption of the communication<br />

unit, E S is the energy consumption of the sensing unit, t s is the start<br />

time, t k is the end time, Δt = t k -t s .<br />

The energy consumption of the control unit is defined as:<br />

EMC TMC IMC<br />

V<br />

(6)<br />

where: T MC is the time of measurement, I MC is a current supply, V is a voltage.<br />

Obviously, E MC consists of:<br />

E E E<br />

(7)<br />

A S<br />

MC MC MC<br />

where: E A MC is energy consumption in active mode <strong>and</strong> E S MC is energy consumption<br />

in sleep mode.<br />

The energy consumption of communication unit is defined as:<br />

ERTRIR V<br />

(8)<br />

where: T R is time of measurement, I R is current supply, V is voltage. On the other<br />

h<strong>and</strong>, E R consists of energy consumption in four different states of communication<br />

module: sleep E S R , listening EL R , transmission ETX R <strong>and</strong> reception ERX R :<br />

E E E E E<br />

(9)<br />

S L TX RX<br />

R R R R R<br />

The energy consumption of the sensing unit is defined as:<br />

EDTDID V<br />

(10)<br />

where: T D is the time, when the communication unit stays active, I D is a current<br />

supply, V is a voltage.<br />

VI. Procedures description<br />

To configure the network structures, self-configured algorithms were developed<br />

to classify the nodes to the internal layer or one of the external layers.<br />

Each node w in a startup phase of the network lifetime, checks if the conditions<br />

described by the equation (11) are met to determine whether the node belongs<br />

initially to the external layer:


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

<br />

<br />

<br />

<br />

w S : x x y y<br />

k s k k<br />

w S : x x y y<br />

k s k k<br />

w S : x x y y<br />

k s k k<br />

w S : x x y y<br />

k s k k<br />

<br />

<br />

<br />

<br />

339<br />

(11)<br />

where: S S is a set of neighborhood nodes in 2-hops distance, w k is a node in S S ,<br />

x is x coordinate of the node w, y is y coordinate of the node w, x k is x coordinate<br />

of the node w k , y k is y coordinate of the node w k . The procedure below demonstrates<br />

how the sub-layer number one is shaped. The procedure is performed by each node<br />

in the network.<br />

Shaping of sub-layer one of external layer<br />

1: If condition (11) is fulfilled then<br />

2: label as a sub-layer one node<br />

3: broadcast the information about sub-layer affiliation<br />

4: wait Δt wi<br />

5: If k max > 1 then<br />

6: broadcast the request for formation the next sub-layer<br />

7: End-if<br />

8: Else<br />

9: label as the internal layer node<br />

10:End-if<br />

In this way the first sub-layer of external layer is developed. It was mentioned<br />

that it can exist k max sub-layers because of the density of the network. The process<br />

of shaping the next sub-layer is always initiated by the previous sub-layer. The procedure<br />

of forming next sub-layers is described by the procedure below.<br />

Shaping of next sub-layer of the external layer<br />

1: If request for formation the sub-layer i received then<br />

2: wait Δt wi<br />

3: If the equation (11) is fulfilled then<br />

4: label as a sub-layer i node<br />

5: broadcast the information about sub-layer i affiliation<br />

6: wait Δt wj<br />

7: If i+1


340 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

In the procedures two timeouts: Δt wi <strong>and</strong> Δt wj Are used. The first one guarantees<br />

that the node is waiting long enough to receive the information from all nodes shaping<br />

previous sub-layer. The second timeout guarantees that the node will wait long<br />

enough to collect the information about the nodes at the same sub-layer.<br />

After the sub-layer is established, the correction procedure is performed. The correction<br />

procedure is responsible for securing the consistency in a sub-layer <strong>and</strong> switching<br />

redundant nodes off. The sub-layer consistency is assured by the consistency rule<br />

(eq. 4). Therefore, the local consistency of the sub-layer between any two nodes w j<br />

<strong>and</strong> w l is guaranteed. It means that the node evaluates the consistency rule <strong>and</strong> selects<br />

the set S d i of nodes among all neighboring nodes. It can exist several sets Sd i , satisfying<br />

the consistency rule requirement, but the desired one is with the lowest cardinality.<br />

To switch the redundant nodes off, the procedure exploits the redundancy rule:<br />

d( w , w ) r d( w , w ) r d( w , w ) r<br />

(12)<br />

z j c z l c j l c<br />

where: w z is the node checking whether it is redundant, w j <strong>and</strong> w l are the closest<br />

nodes to the node w z . The procedure is presented below.<br />

Sub-layer correction<br />

1: If the information about creation the sub-layer sent then<br />

2: wait Δt wj<br />

3: If the consistency rule is unfulfilled (eq. 4) then<br />

4: engage additional nodes<br />

5: End-if<br />

6: If the redundancy rule fulfilled (eq. 12) then<br />

7: label as the internal layer node<br />

8: broadcast the information about the internal layer affiliation<br />

9: End-if<br />

10: End-if<br />

The external layer is composed of one or several sub-layers. Among the sublayers,<br />

only the one is active (in case of sensing the environment). After certain time,<br />

the active sub-layer i activates the sub-layer i+1 (or sub-layer 1) <strong>and</strong> swaps to inactive<br />

state. After that, only the one sub-layer (number i+1) is still active.<br />

When the network structures are established, the sub-layer consistency procedures<br />

run. The procedures are responsible for sub-layers reconfiguration in case<br />

of the sub-layer inconsistency detection <strong>and</strong> when the inconsistency is at risk.<br />

In the first case each node exchange their neighborhood table S ng with the neighbors<br />

within the communication range r c . This neighborhood tables synchronization take<br />

place every Δt a . In case one of the closest nodes do not answer in synchronization<br />

process, <strong>and</strong> both of them belong to the same sub-layer, the node which has not<br />

received the information starts the sub-layer reconfiguration. The algorithm below<br />

describes this situation (from external sub-layer node perspective).


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

341<br />

Sub-layer reconfiguration in case of inconsistency detection<br />

1: If the consistency rule is not fulfilled (eq. 4) then<br />

2: engage the additional neighbor nodes to assure the consistency of the sub-layer<br />

3: End-if<br />

The second group of the reconfiguration procedures run when the inconsistency<br />

can appear. It can happen when the power source capacity of the sub-layer<br />

node is at risk. When the node discovers that:<br />

C t C<br />

(13)<br />

Z<br />

where: C Z (t) is the power source capacity, C G is the border power source capacity,<br />

it starts reconfiguration process. The algorithm above describes this situation.<br />

Sub-layer reconfiguration in case of inconsistency detection<br />

1: If the power source capacity is lower than the border power source<br />

capacity (eq. 13) then<br />

2: engage the additional neighbor nodes capable to replaceitself<br />

3: End-if<br />

VII. Simulation results<br />

We evaluated the performance of proposed solution. The model of node used<br />

in the simulation is previously mentioned MicaZ node, equipped with ZigBee<br />

protocols stack. The energy consumption parameters of micaZ node are shown<br />

in table 1<strong>and</strong> described in more details in [13] <strong>and</strong> [14].<br />

Table 1. The energy consumption of MicaZ node<br />

G<br />

Control unit<br />

Communication unit<br />

Sensing unit<br />

Active<br />

8 mA<br />

Sleep<br />

15 μA<br />

Memory write<br />

15 mA<br />

Memory read<br />

4 mA<br />

Receive (RX)<br />

19.7 mA<br />

Send (TX) (at 0 dBm) 17.4<br />

Sleep<br />

1 μA<br />

Active<br />

5,5 mA<br />

Sleep<br />

0 mA


342 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The simulation was run for three types of nodes deployment:<br />

A) Nodes with antennas put 7 cm above the ground covered by grass vegetation,<br />

r c = 10.5 m, the network size is equal 190 m × 190 m,<br />

B) Nodes with antennas put 30 cm above the ground covered by grass vegetation<br />

l, r c = 50 m, the network size is equal 730 m × 730 m,<br />

C) Nodes with antennas put 30 cm above the ground covered by forest vegetation<br />

l, r c = 30 m, the network size is equal 300 m × 300 m.<br />

The duty cycling (DC) is set differently for the external <strong>and</strong> internal layers<br />

nodes. External layer nodes work with DC = 25% <strong>and</strong> internal layer nodes work<br />

with DC = 10%. What is more, during the activity time T A , the external layer nodes,<br />

actively sensing the environment have control, communication <strong>and</strong> sensing units<br />

switched on. During the sleep time T U , the communication module of these nodes<br />

is switched off, but the sensing function is maintained. The external layer nodes,<br />

which are not responsible for sensing <strong>and</strong> the internal layer nodes, retain the control<br />

<strong>and</strong> communication units active at time T A . At the sleep time T S , both groups<br />

of nodes have all units switched off.<br />

Table 2 shows the number of nodes in the network with external layer consisting<br />

of three sub-layers in comparison with the number of all nodes in the network.<br />

The result is split by deployment type <strong>and</strong> the sub-layer number.<br />

Table 2. The reduction of active nodes<br />

Deployment type Sub-layer number # of sub-layer nodes # of all nodes<br />

A) 1 80<br />

B) 2 83<br />

1474<br />

C) 3 82<br />

A) 1 62<br />

B) 2 60<br />

920<br />

C) 3 63<br />

A) 1 41<br />

B) 2 43<br />

412<br />

C) 3 42<br />

The average energy consumption of the nodes is shown in table 3.<br />

As a result, the average lifetime of the external layer nodes is about 21 days<br />

(having three sub-layers switching every one hour) <strong>and</strong> internal layer nodes lifetime<br />

is about 100 days.<br />

Figure 3 depicts the lifetime of the networks: without any topology control<br />

mechanism implemented, one of the node activity control mechanism presented<br />

in section II <strong>and</strong> the topology control procedure introduced in the article. The approaches<br />

are evaluated according to two criterions: global lifetime <strong>and</strong> the time<br />

while the network consistency is guaranteed. In our approach the internal layer


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

343<br />

nodes consume significantly less energy in comparison with the external layer<br />

nodes. When the external layer nodes run out of the energy, they are replaced by<br />

the internal layer nodes. In the earlier mentioned methods, the active nodes cover<br />

the whole network. Therefore, after certain period of time some active nodes run<br />

out of energy. It means, it is possible that some uncovered areas inside the network<br />

will appear.<br />

Table 3. Average energy consumption in mWh<br />

Active sub-layer node Inactive sub-layer node Internal layer node<br />

25.2 5.1 2.15<br />

Figure 3. The comparison of networks lifetimes<br />

We also checked the reconfiguration procedures in the simulations (if do<br />

they work <strong>and</strong> how effective, from the reconfiguration time perspective, they are).<br />

The average times needed to reinstate the sub-layers t rec are evaluated for either:<br />

reconfiguration in case of inconsistency detection <strong>and</strong> when the inconsistency<br />

is jeopardized. The result is shown on picture 4.<br />

Figure 4. The time of a sublayer reconfiguration


344 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Maximal time the sub-layer can be inconsistent is equal to:<br />

t<br />

t sec<br />

(14)<br />

a<br />

rek<br />

where: Δt a is the time when the nodes exchange the information about their<br />

neighborhood (mentioned above), t rek is the time necessary to accomplish the reconfiguration.<br />

Assuming the Δt a time equal to 180 sec, the time of the sub-layer<br />

inconsistency is round 181.5 sec.<br />

Demonstrated layer configuration elongate the network lifetime in the initial<br />

size of deployment. The simulation experiment showed that the network shrinks<br />

to inside at the borders (due to higher energy consumption of the external layer<br />

nodes). As a result, after 100 days of work, the network size is reduced by r c meters<br />

at each border.<br />

VIII. Conclusion <strong>and</strong> future work<br />

The article demonstrates the self-configured, energy aware method of topology<br />

control. The procedures of network structures establishment <strong>and</strong> maintenance<br />

are provided <strong>and</strong> explained. The methods are evaluated in terms of energy consumption,<br />

the network lifetime <strong>and</strong> ability to guarantee the sub-layers consistency<br />

<strong>and</strong> repair. The network shaped in this way is capable of detecting object<br />

moving on the ground. It gives excellent basis for the creation of such a system,<br />

because the coverage consistency <strong>and</strong> maintenance are assured. What is more,<br />

the network lifetime is significantly improved, even 10 times, in comparison with<br />

a network without any topology control mechanism. The value of DC parameter<br />

is adjusted to the network purposes. The greater values of DC parameter used<br />

in the simulation has no serious impact on the communication effectiveness.<br />

Evidently, there is a possibility to use lower values for DC parameter, but it would<br />

degrade the communication performance <strong>and</strong> could have an impact on the detection<br />

operation.<br />

There exist still many areas to explore within this research engagement.<br />

It would be worth to check the network performance in different types of the nodes<br />

deployment <strong>and</strong> environments of deployment. Verification the ability of the network<br />

to objects tracking is another very desired research which we plan to practice<br />

in near future.


Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />

345<br />

References<br />

[1] C. Patel, S.M. Chai, S. Yalamanchili, <strong>and</strong> D.E. Schimmel, Power/Performance Tradeoffs<br />

for Direct Networks. In Parallel Computer Routing & CommunicationWorkshop,<br />

pages 193-206, July 1997.<br />

[2] Y. Xu, J. Heidemann, D. Estrin, Geography informed Energy Conservation for Ad Hoc.<br />

Proc. ACM MobiCom 2001, pp. 70-84. Rome, 2001.<br />

[3] P. Vasari, A. Marcucci, M. Nati, C. Petrioli, M. Zorzi, A Detailed Simulation<br />

Study of Geographic R<strong>and</strong>om Forwarding (GeRaF) in Wireless Sensor Networks. Proc.<br />

of <strong>Military</strong> <strong>Communications</strong> Conference 2005 (MILCOM 2005), vol. 1, pp. 59-68,<br />

17-20 Oct. 2005.<br />

[4] M. Zorzi, R.R. Rao, Geographic R<strong>and</strong>om Forwarding (GeRaF) for Ad Hoc <strong>and</strong> Sensor<br />

Networks: Multihop Performance. IEEE Transactions Mobile Computing, vol. 2, no. 4,<br />

pp. 337-348, 2003.<br />

[5] B. Chen, K. Jamieson, H. Balakrishnan, R. Morris, Span: An Energy-Efficient<br />

Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks. ACM<br />

Wireless Networks, vol. 8, no. 5, September 2002.<br />

[6] A. Cerpa, D. Estrin, Ascent: Adaptive Self-Configuring Sensor Network Topologies.<br />

Proc. IEEE INFOCOM 2002.<br />

[7] C. Schurgers, V. Tsiatsis, M.B. Srivastava, STEM: Topology Management for<br />

Energy Efficient Sensor Networks. IEEE Aerospace Conference ’02, Big Sky, MT,<br />

March 10-15, 2002.<br />

[8] J. Ansari, D. Pankin, P. Mähönen, Radio-Triggered Wake-ups with Addressing<br />

Capabilities for Extremely Low Power Sensor Network Applications. Proc. of the 5th<br />

European conference on Wireless Sensor Networks (EWSN 2008), Bologna (Italy),<br />

Jan. 30 – Feb. 1, 2008.<br />

[9] A. Keshavarzian, H. Lee, L. Venkatraman, Wakeup Scheduling in Wireless Sensor<br />

Networks. Proc. ACM MobiHoc 2006, pp. 322-333, Florence (Italy), May 2006.<br />

[10] IEEE 802.11, Part 11: Wireless LAN Medium Access Control (MAC) <strong>and</strong> Physical Layer<br />

(PHY) Specifications. [online], document dostępny na: http://st<strong>and</strong>ards.ieee.org/about/<br />

get/802/802.11.html<br />

[11] A. Arora, Topology Control. [online], dokument dostępny na: www.cse.ohio-state.<br />

edu/~anish/.../Lecture5.ppt<br />

[12] M. Wawryszczuk, The Method of Self-organizing Wireless Sensor Network<br />

Implementation with Extended Durability (in Polish). PhD thesis, <strong>Military</strong> University<br />

of <strong>Technology</strong>, September 2011.<br />

[13] MicaZ Datasheet, [online]. The article accessible on: https://www.eol.ucar.edu/rtf/<br />

facilities/isa/internal/CrossBow/Doc/MPR-MIB_Series_User_Manual_7430-0021-<br />

05_A.pdf<br />

[14] Xmesh User’s Manual, [online]. The article accessible on: http://www.memsic.<br />

com/support/documentation/wireless-sensor-networks/category/6-user-manuals.<br />

htmldownload=95%3Axmesh-user-s-manual


Chapter 8<br />

Localization Techniques


Enhanced Location Tracking<br />

for Tactical MANETs Based on Particle Filters<br />

<strong>and</strong> Additional <strong>Information</strong> Sources<br />

Peter Ebinger *1 , Arjan Kuijper 2 , Stephen D. Wolthusen 3<br />

1 AGT Group (R&D) GmbH, Darmstadt, Germany, pebinger@agtinternational.com<br />

2 Fraunhofer IGD, Darmstadt, Germany, arjan.kuijper@igd.fhg.de<br />

3 <strong>Information</strong> Security Group, Department of Mathematics, Royal Holloway, U. of London,<br />

Norwegian <strong>Information</strong> Security Lab., Gjøvik University College, Norway,<br />

stephen.wolthusen@rhul.ac.uk<br />

Abstract: The networking capabilities of tactical mobile ad-hoc networks (MANETs) provide the basis<br />

to enhance robustness <strong>and</strong> accuracy of Blue Force Tracking (BFT) where existing BFT mechanisms are<br />

unavailable, unreliable, or simply not sufficiently accurate (owing to factors such as update frequencies<br />

<strong>and</strong> the need for back-link availability). BFT is an essential element to any tactical environment given<br />

its ability to contribute to situational awareness at all levels.<br />

Tactical environments are characterized by spectrum contention, jamming <strong>and</strong> other factors limiting<br />

the ability of naïve approaches, e.g. in urban environments <strong>and</strong> broken terrain. Unlike previous work<br />

this paper aims to provide MANET-based BFT without the requirement of line-of-sight (LOS) links<br />

or back-end infrastructure which is robust against temporal disruption of network connectivity. These<br />

results are achieved by distributedly fusing sensor data <strong>and</strong> additional information sources across<br />

the tactical MANET using techniques also employed in robotics <strong>and</strong> object tracking.<br />

Our contribution is the provision of enhanced BFT mechanisms exploiting networking capabilities<br />

of tactical MANETs <strong>and</strong> data fusion mechanisms based on Sequential Monte Carlo methods, specifically<br />

particle filters, incorporating additional information such as mission information (e.g. mobility<br />

models) <strong>and</strong> topographic data. We demonstrate that the use of these techniques enhances both accuracy<br />

<strong>and</strong> robustness as compared to st<strong>and</strong>ard BFT by using a simulation environment with various<br />

mobility <strong>and</strong> radio propagation characteristics.<br />

Keywords: Mobile Ad hoc Networks, Location Tracking, Blue Force Tracking<br />

I. Introduction<br />

Blue Force Tracking (BFT) is a tactical term for a localization system based<br />

on Global Positioning System (GPS) sensors with the objective to provide location<br />

estimates of friendly military forces (blue forces). BFT is an essential element to<br />

*Work performed while working at Competence Center for Identification <strong>and</strong> Biometrics, Fraunhofer IGD,<br />

Darmstadt, Germany.


350 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

any tactical environment given its ability to contribute to situational awareness at<br />

all levels [1]. Decreasing the friction in complex geopolitical contexts, particularly<br />

in urban environments, may help to support decision-makers <strong>and</strong> lower the risk<br />

of errors [2]. This has not only been incorporated into the doctrine of modern<br />

forces’ in support of Comm<strong>and</strong> <strong>and</strong> Control (C2), but has also resulted in an overall<br />

reduction of causalities [3], [1].<br />

There are several challenges to BFT that render it a complex problem: Nodes<br />

(military units) are typically scattered on the operation area, the environment<br />

changes dynamically due to node mobility <strong>and</strong> operations need to be coordinated<br />

not only within the armed forced of a specific country, but also with allies. For<br />

rapidly evolving tactical situations in confined areas (such as those encountered<br />

in urban areas) existing mechanisms (e.g. satellite-based systems) are limited by<br />

several factors including update frequency, accuracy, <strong>and</strong> robustness to communication<br />

channel disruption (due to jamming or capacity limitations).<br />

Satellite-based BFT systems highly depend on the availability of a complex<br />

infrastructure <strong>and</strong> backend. They are therefore vulnerable to attacks on the global<br />

infrastructure, e.g. jamming or denial of service (DoS) attacks. BFT systems based<br />

on mobile ad hoc networks (MANETs) that are locally deployed reduce the dependencies<br />

<strong>and</strong> can improve this situation.<br />

MANETs in conjunction with sensors <strong>and</strong> information sources found<br />

in mobile computing components provide redundant, mutually supporting<br />

information on individual node locations. Data sources comprise geolocation<br />

(e.g. GPS) receivers, electronic compasses <strong>and</strong> gyroscopes, but also the ability<br />

to perform trilateration based on radio-frequency signals used for communication<br />

[4]. The types of terrain <strong>and</strong> radio frequency environments to be expected<br />

in tactical MANETs implies that one cannot assume continuous connectivity<br />

across the MANET, but rather that the MANET will be partitioned frequently<br />

in an arbitrary manner [5].<br />

Although MANET-based BFT systems have been proposed [6], [7], these are<br />

typically limited to basic communication mechanisms that do not provide additional<br />

means to increase the robustness <strong>and</strong> the accuracy of BFT <strong>and</strong> are therefore<br />

inappropriate for challenging environments, e.g. urban operations or similarly<br />

constrained terrain.<br />

In this paper we propose a mechanism which can be used as a supplement<br />

or even substitute for existing infrastructure-based BFT systems but which is robust<br />

against the aforementioned problems affecting naïve designs for MANETs or<br />

similar mesh-type networks. Robustness <strong>and</strong> accuracy of location estimation are<br />

increased within the proposed BFT system utilizing additional information sources<br />

such as mission information (group structure <strong>and</strong> tactical mobility patterns) <strong>and</strong><br />

topographic data. Employing a combination of mobility models adapted to the tactical<br />

domain, the interpolation of likely node positions in the absence of immediate<br />

updates becomes possible.


Chapter 8: Localization Techniques<br />

351<br />

It is important to note that a key requirement for robust BFT in the tactical<br />

domain is that each node should retain information on current <strong>and</strong> likely positions<br />

of other network nodes. Our proposal outlined in this paper employs Sequential<br />

Monte Carlo (SMC) methods in a distributed manner to achieve this purpose.<br />

In this environment Particle Filters (PF) are particularly suitable as they provide<br />

a natural, scalable mechanism for mutual updates of location <strong>and</strong> motion estimations<br />

which decay gracefully in cases of missing updates [8]. Equally important<br />

is their high tolerance level regarding faulty or deliberately incorrect data whilst<br />

permitting the inclusion of additional information.<br />

In the remainder of the paper we therefore briefly outline related work on BFT<br />

<strong>and</strong> geolocation tracking <strong>and</strong> review background terminology for particle filters.<br />

This provides the basis for discussion on several assumptions used in the design<br />

of the BFT algorithm. An elaboration of the proposed particle filter algorithm<br />

(SMC-BFT), first conceptually <strong>and</strong> then at the algorithmic level, precedes a discussion<br />

of a simulative evaluation of the algorithm based on the network simulator<br />

developed by [9]. A comparison to a naïve baseline algorithm <strong>and</strong> a global motion<br />

estimation algorithm concludes the paper, demonstrating significantly improved<br />

results of the outlined algorithm with respect to the average estimation error.<br />

II. Related work<br />

Riblett <strong>and</strong> Wiseman [6] present a MANET-based system for tactical environments<br />

named TacNet. They point out that a MANET-based communication<br />

approach provides the capabilities to the network to dynamically self-heal <strong>and</strong><br />

to overcome some line-of-sight constraints that are typical limitations of radio<br />

networks. The TacNet system provides secure access to critical data such as realtime<br />

maps of resource positions <strong>and</strong> could be used as an underlying communication<br />

network for Blue Force tracking. However, no enhanced data fusion <strong>and</strong><br />

location estimation mechanisms are proposed <strong>and</strong> no evaluation of the system<br />

performance is given [7].<br />

Suri et al. [1] describe how BFT can benefit from a distributed approach<br />

in comparison to centralized architectures due to the dynamic, geographically<br />

sensitive nature of most tactical situations. They present observations from several<br />

tactical networking experiments <strong>and</strong> discuss the requirements for <strong>and</strong> the advantages<br />

of peer-to-peer (P2P) approaches for tactical network environments. Even<br />

in cases where connectivity to a central BFT server is lost, nodes in close proximity<br />

continue to communicate in order to share critical location information.<br />

A number of research papers have been published about localization schemes<br />

for MANETs, in particular, for scenarios where no GPS sensors are available or where<br />

only a subset of (anchor) nodes are equipped with a GPS sensor. Biaz <strong>and</strong> Ji [10]<br />

present a survey <strong>and</strong> comparison on localization algorithms for wireless ad hoc networks,<br />

e.g. based on radio signal characteristics such as time of arrival (TOA), time


352 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

difference of arrival (TDOA), angle of arrival (AOA) <strong>and</strong> received signal strength<br />

indicator (RSSI). However, most of these approaches address a different scenario<br />

in comparison to BFT as in tactical MANETs it is typically assumed that all nodes are<br />

equipped with GPS sensors. The challenge of BFT is not to determine the location<br />

of a local node but to have accurate location estimations for all other network nodes.<br />

Some MANET localization approaches based on SMC are presented in the following,<br />

although they also address different scenarios in comparison to BFT. Hu<br />

<strong>and</strong> Evans [9] introduce a SMC localization method for a MANET setup where only<br />

a small number of seed nodes know their locations. The other nodes estimate their<br />

location based on location messages that they receive from seed nodes. The evaluation<br />

results of the SMC-based approach are promising, even in scenarios where<br />

network transmissions are highly irregular <strong>and</strong> severe computation <strong>and</strong> memory<br />

limits are in place. Huang et al. [11] present a MANET localization framework<br />

based on particle filters based on AoA <strong>and</strong> RSSI. They study how different types<br />

of sensor data can be incorporated into a common localization framework <strong>and</strong><br />

claim that they provide the first localization framework based on particle-filters<br />

that integrates heterogeneous sensor types.<br />

Ristic et al. [12] outline the concept of Terrain-Aided Tracking. They propose<br />

to exploit knowledge of the environment or limitations in the dynamic motion<br />

of the target to produce more accurate location estimation results. They show<br />

an example how additional information sources can be used in order to improve<br />

the accuracy of state estimation based on particle filters. However, they do not address<br />

the communication <strong>and</strong> distributed processing challenges of a MANET scenario.<br />

Rosencrantz et al. [13] present a decentralized state estimation architecture<br />

based on particle filters for a robotic system. They address the problem that<br />

arises in a distributed estimation systems if observation arrive that refer to a time<br />

in the past. They introduce the concept of re-simulation in order to reduce the variance<br />

of importance weights. In cases of re-simulation part of the history of an agent’s<br />

particle filter is erased <strong>and</strong> then re-simulated to the current time, incorporating all<br />

collected observations at appropriate time intervals.<br />

III. Background: Sequential Monte Carlo models / particle filters<br />

In this section we outline the mathematical background of state estimation<br />

using particle filters [8] – also known as sequential Monte Carlo (SMC) methods<br />

– <strong>and</strong> how they can be applied to our application scenario:<br />

A. System state<br />

Current properties <strong>and</strong> status of a tactical MANET can be described using<br />

a set of state variables. For simplicity the number of nodes in the MANET<br />

is assumed to be fixed <strong>and</strong> denoted as .


Chapter 8: Localization Techniques<br />

353<br />

Notation: The current state of a node at time is denoted as <br />

The state is (at least partially) not directly observable but can be inferred from<br />

sensor data. The measurements (related to target state) at time are denoted as<br />

. The sequence of all available measurements up to time is denoted<br />

as z1:k<br />

{ z<br />

t<br />

, t1, , k}<br />

.<br />

The posterior probability distribution function (pdf) regarding all available<br />

measurements up to time is denoted as p( xk| z<br />

1: k)<br />

<strong>and</strong> is also known<br />

as filtering distribution.<br />

State information including BFT tracking location <strong>and</strong> other information<br />

is collected, evaluated <strong>and</strong> transmitted to other network nodes. The current state<br />

pos<br />

vel<br />

information at time includes the location x<br />

k<br />

<strong>and</strong> the velocity x<br />

k<br />

of all other<br />

nodes. Sensors estimate the GPS coordinates of a node <strong>and</strong> the speed <strong>and</strong> direction<br />

of movement.<br />

B. State evolution <strong>and</strong> estimation problem<br />

Assumptions The target state evolves according to a discrete-time stochastic<br />

model defined by the following equation:<br />

x f ( x , v )<br />

(1)<br />

k k k1 k1<br />

nx n nx<br />

where f : <br />

k<br />

is a known, possibly nonlinear function of the state<br />

<strong>and</strong> <strong>and</strong> a process noise sequence.<br />

Objective: The overall objective of our architecture is to recursively estimate<br />

based on measurements that are related to the target state via the measurement<br />

equation:<br />

z ( , )<br />

k<br />

hk xk<br />

w<br />

k<br />

(2)<br />

nx n nz<br />

where hk : is a known, possibly nonlinear function of the state<br />

<strong>and</strong> the measurement noise sequence .<br />

From a Bayesian perspective the objective is to recursively quantify some<br />

degree of belief in the state at time given data z<br />

1:k<br />

up to time . Thus it is<br />

required to construct the posterior pdf p( xk| z<br />

1: k)<br />

which can be obtained recursively<br />

in two stages: prediction <strong>and</strong> update.<br />

C. Particle filters<br />

In the following a short overview of the basic concept of particle filters including<br />

importance (re-)sampling is given [14], [12]. The key concept of particle filters<br />

is to represent probability density functions by a set of samples (also referred to<br />

as particles) <strong>and</strong> their associated weights. The pdf p( xk| z<br />

1: k)<br />

is therefore approximated<br />

with an empirical density function:


354 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

N<br />

N<br />

i i<br />

i i<br />

k 1: k qk <br />

k k<br />

qk i qk<br />

i1 i1<br />

p( x | z ) x x , 1, : 0<br />

(3)<br />

where is the Dirac delta function <strong>and</strong> denotes the weight associated with<br />

particle .<br />

Monte Carlo Integration: Monte Carlo (MC) integration is the basis for SMC<br />

methods. Its objective is the numerical evaluation of a multidimensional integral:<br />

I g g x<br />

dx<br />

(4)<br />

where .<br />

Monte Carlo methods factorize gx<br />

f x x<br />

in such a way that x<br />

is interpreted as a probability density satisfying x 0 <strong>and</strong> x, dx1.<br />

i<br />

The assumptions is that it is possible to draw samples { x , i1, , N}<br />

distributed according to x<br />

. An approximation of the integral<br />

is the sample mean:<br />

I g f xxdx<br />

(5)<br />

N<br />

1<br />

I g f x .<br />

(6)<br />

N<br />

i<br />

<br />

N<br />

i 1<br />

Importance Sampling: Ideally we want to generate samples directly from x<br />

<strong>and</strong> estimate using equation (6). Suppose we can only generate samples from<br />

a density qx which is similar to x<br />

, then a correct weighting of samples<br />

makes SMC estimation still possible. The pdf qx is referred to as the importance<br />

or proposal density, where qx <strong>and</strong> x<br />

have the same support. Equation (5)<br />

can be rewritten as:<br />

x<br />

I gf xxdx f x<br />

qxdx<br />

(7)<br />

qx<br />

x<br />

provided that is upper bounded.<br />

qx<br />

A Monte Carlo estimate of can be computed by generating independent<br />

samples { x , i1, , N}<br />

distributed according to qx <strong>and</strong> forming<br />

i<br />

the weighted sum:<br />

are the importance weights.<br />

N<br />

i<br />

1<br />

{ x<br />

i i i<br />

I <br />

N<br />

g f { x q { x , q {<br />

x <br />

i<br />

(8)<br />

N q { x<br />

i1


Chapter 8: Localization Techniques<br />

355<br />

A problem for consideration – in particular for distributed <strong>and</strong> cooperative<br />

state estimation – is that measurements can only be combined if they refer<br />

to the same state, <strong>and</strong> therefore the same instance in time. Only simultaneously<br />

measured observations can be directly combined. In the following section we<br />

introduce our novel SMC-based BFT that overcomes these issues using resimulation<br />

whenever measurements need to be combined that refer to different<br />

moments in time.<br />

IV. SMC-Based BFT (SMC-BFT)<br />

In the following we describe some basic assumptions <strong>and</strong> present some examples<br />

of additional information that can be incorporated in order to enhance BFT<br />

in tactical MANETs. We show how re-simulation can be used to apply particle<br />

filters in distributed environments <strong>and</strong> finally present the concept of the proposed<br />

SMC-based BFT (SMC-BFT) in detail.<br />

A. Basic assumptions<br />

The overall objective of our proposed SMC-BFT approach is to derive a probabilistic<br />

estimation of a node’s location <strong>and</strong> velocity for enhanced BFT. The posterior<br />

distribution for is represented by a set of weighted samples { x , i 1, , N}<br />

which are periodically updated using importance sampling. Time is divided into<br />

discrete time units (as described in section III) where the current state of a node<br />

at time is denoted as . Node movement <strong>and</strong> messages exchange are modeled<br />

as discrete steps within each time unit.<br />

SMC-BFT State Evolution Model: Location <strong>and</strong> velocity state variables evolve<br />

according to a discrete-time stochastic model defined by equation (1) where the system<br />

state variable represents both node location x<br />

loc<br />

vel<br />

k<br />

<strong>and</strong> velocity x<br />

k<br />

.<br />

GPS Measurement Equation: Sensor measurements of GPS sensors are modeled<br />

according to equation (2) where the measurement represents both location<br />

loc<br />

vel<br />

measurement z<br />

k<br />

<strong>and</strong> velocity measurement z<br />

k<br />

of the GPS sensor. The measurements<br />

noise sequences are modeled as Gaussian white noise with<br />

mean zero <strong>and</strong> st<strong>and</strong>ard deviations <strong>and</strong> respectively.<br />

loc<br />

GPS<br />

vel<br />

GPS<br />

B. Incorporation of additional information sources<br />

An important tenet of the SMC-BFT concept is the inclusion of additional<br />

knowledge sources such as information about the tactical mission <strong>and</strong> a topographical<br />

model of the environment.<br />

Mission <strong>Information</strong>: Knowledge of mission objectives, participants <strong>and</strong> group<br />

structure of a specific mission are promising information sources for improving BFT.<br />

Typical formation patterns <strong>and</strong> typical (minimum, average <strong>and</strong> maximum) velocities


356 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

can be derived from this form of information. Such properties may either belong<br />

to specific nodes or reflect a specific tactical situation.<br />

In section V-C2 an example of how group structure <strong>and</strong> movement formation<br />

information can be used for enhanced BFT (Reference Point Group Mobility Model).<br />

Topographical Model: A topographical model of the environment can be used<br />

to improve estimation of node movement. The direction of movement is probabilistically<br />

dependent on properties of the area of movement [12]. There are areas with<br />

restricted movement (e.g. water, mountains), areas of free movement (e.g. open<br />

field) <strong>and</strong> areas which are characterized with a high likelihood of following specific<br />

paths (e.g. roads, pathways, or stairs).<br />

In section V-C2 an example of how such information can be used to significantly<br />

enhance BFT in a setup where nodes follow specific paths or streets (Manhattan<br />

Grid Model) is demonstrated.<br />

Additional information sources enable the preference of more likely state<br />

values <strong>and</strong> the exclusion of implausible estimations. For example, impossible<br />

locations can be removed from the set of potential locations based on node type<br />

<strong>and</strong> topography model, e.g. lakes or buildings for regular cars. Additionally impossible<br />

velocity values can be excluded based on node properties <strong>and</strong> physical laws,<br />

e.g. based on upper bounds for acceleration.<br />

C. Re-simulation<br />

An important aspect of distributed data fusion is their temporal <strong>and</strong> causal<br />

relationship: how can measurements that refer to different nodes be combined <strong>and</strong><br />

integrated if they were performed at different times<br />

The sequence of events must be considered in order to arrange measurements<br />

of different nodes in a distributed system. Observations retrieved from other nodes<br />

at a specific time may refer to a moment that is several steps in the past, each node<br />

therefore records current measurement values as well as a history of received <strong>and</strong><br />

local measurements. This allows node’s particle filter to periodically re-simulated<br />

when data arrives at time that refers to an earlier time t l<br />

t k<br />

(cf. [13]), which<br />

is more recent than previously received measurements.<br />

When this occurs a section of the filter’s history is erased <strong>and</strong> re-run to the current<br />

time , incorporating all collected observations at appropriate intervals. Measurements<br />

that refer to a moment in the past that are outside the history window<br />

( tk tl thistory<br />

) are discarded. This leads to improved re-sampling of particles<br />

<strong>and</strong> improved performance of the particle filter.<br />

D. SMC-BFT concept<br />

The basic concept of SMC-BFT is that each network node utilizes a set of particle<br />

filters to probabilistically model the location information of the other network


Chapter 8: Localization Techniques<br />

357<br />

nodes. Each particle filter is initialized when first measurement arrive <strong>and</strong> continuously<br />

updated afterwards.<br />

The following actions performed in each round, on each node for each<br />

of the other nodes:<br />

1) Initialization (when first measurements arrive)<br />

2) Prediction <strong>and</strong> Filtering<br />

An overview of these actions is shown in figure 1 <strong>and</strong> the individual steps<br />

of each action are described in more detail in the following sections.<br />

1) Initialization: The particle filter for BFT of another node is initialized at time<br />

when the first measurements (referring to some time ) of that specific<br />

node arrive:<br />

i<br />

• Generation of samples x<br />

l<br />

, i1, ,<br />

N<br />

equally distributed around newly<br />

available measurements , incorporating additional information sources, e.g.<br />

– topography model for deletion of invalid samples or alignment of samples,<br />

– mission information for group movement patterns.<br />

• If required ( t l<br />

t k<br />

): Re-simulation from time to current time for<br />

this node based on system evolution model (cf. equation (1)), incorporating<br />

additional information sources.<br />

Figure 1. Basic Concept of SMC-BFT


358 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

2) Prediction <strong>and</strong> Filtering: All newly arriving incoming location messages are<br />

preliminarily processed. The output of this process is a set of new measurements<br />

(referring to some time t<br />

l<br />

tk<br />

in the past). For some nodes new<br />

measurements are available in a specific round <strong>and</strong> for other nodes not.<br />

Based on the availability of new measurements for another network node<br />

in a specific round the BFT particle filter for a specific node is reset to a moment<br />

in time tl 1in the past or not. Subsequently the system state is updated according<br />

to the procedure described below. The basic input for the prediction <strong>and</strong> filtering<br />

i<br />

step is the set of samples x , 1, ,<br />

l1 i N<br />

representing a probabilistic estimation<br />

of the location <strong>and</strong> velocity of another node at a specific time tl tk<br />

(or if no new<br />

measurements are available is equal to ).<br />

• System update based on previous system state estimation x<br />

l1<br />

<strong>and</strong> system<br />

evolution model (cf. equation (1), incorporating additional information source<br />

(similar to “re-simulation” of one step).<br />

• If new measurements are available:<br />

1) Elimination of impossible system states: Remove all samples that are invalid<br />

due to newly arrived measurement , e.g. that are<br />

– too far away from the measured location,<br />

– in an invalid location according to a topography model or<br />

– too far away from the center of a group formation.<br />

2) If not enough samples are left: Generation of new samples x<br />

i<br />

l<br />

, i1, ,<br />

N<br />

equally distributed around the newly available measurement , incorporating<br />

additional information sources.<br />

3) If required ( t l<br />

t k<br />

): Re-Simulation from time to current time for this<br />

node based on system evolution model (cf. equation (1)), incorporating<br />

additional information source.<br />

The goal of re-simulation is to generate new samples for the current time<br />

x i<br />

, i k<br />

1, , N by probabilistically updating all previously calculated samples<br />

x j, l jki , 1, ,<br />

N<br />

stored in the history list up to estimation time ,<br />

i<br />

e.g. applying the mobility model <strong>and</strong> incorporating mission information <strong>and</strong><br />

topographical model.<br />

V. Evaluation<br />

The key metric of BFT is the accuracy of location estimation. Estimation errors<br />

should be minimized while limiting communication overhead to an acceptable level.<br />

In this section we evaluate how our proposed SMC-BFT mechanism performs<br />

<strong>and</strong> its robustness with respect to various network parameters in comparison to<br />

st<strong>and</strong>ard BFT approaches.


Chapter 8: Localization Techniques<br />

359<br />

A. Evaluation setup<br />

A MANET simulator developed in [9] is used as a basis for evaluation (also<br />

used <strong>and</strong> extended in [15]). The basic setup is that each mobile node contains<br />

a computing device, has GPS sensor capability <strong>and</strong> topography model <strong>and</strong> mission<br />

information are available on each node.<br />

Nodes regularly exchange data (geo-location, velocity) to direct neighbors<br />

via multi-hop flooding with all other nodes (e.g. piggyback with routing information).<br />

Location measurement <strong>and</strong> message processing are performed in discrete<br />

time steps (round based simulation) where the duration of each step was set to 1 s.<br />

B. St<strong>and</strong>ard BFT approaches<br />

We compare our newly proposed SMC-BFT method with two st<strong>and</strong>ard BFT<br />

mechanisms: A simple straight forward BFT mechanism, which simply takes<br />

a measurement “as is” <strong>and</strong> a more elaborate mechanism based on dead reckoning<br />

(cf. [16]) considering the progress in time between last measurements <strong>and</strong> current<br />

time as well as node velocity.<br />

a) St<strong>and</strong>ard BFT (STD-BFT): The most recently received measurement , (GPS<br />

coordinates <strong>and</strong> velocity) is taken as an estimate of current location <strong>and</strong> velocity<br />

of a node:<br />

x z<br />

k<br />

b) Velocity Based BFT (VEL-BFT): The location accuracy is improved by predicting<br />

the current location based on available measurement data (cf. [2],[17]).<br />

Previous node location, time difference t tk<br />

t between measurement<br />

time <strong>and</strong> current time as well as node velocity are considered:<br />

pos pos vel<br />

x z t<br />

z<br />

k l l<br />

x<br />

vel<br />

k<br />

z<br />

l<br />

vel<br />

l<br />

C. Experimental setup <strong>and</strong> simulation parameters<br />

In the following sections we describe the default parameter set used for our<br />

evaluation. It is explicitly mentioned in the description whenever default values<br />

are not used.<br />

1) Basic Parameters: The default setup contains 20 nodes that move within a simulation<br />

area of 1000 x 1000 m. Nodes locally determine their location <strong>and</strong><br />

velocity using the GPS sensor. The GPS measurement st<strong>and</strong>ard deviation for<br />

loc<br />

vel<br />

location is GPS<br />

3.0 m <strong>and</strong> for velocity <strong>and</strong> GPS<br />

1.0 m/s. Every 10 s each<br />

node generates a location message <strong>and</strong> forwards it to all its neighbor nodes.


360 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Each simulation is carried out for 250 s (i. e. 250 rounds) of which the first 50 s<br />

are left out as initialization <strong>and</strong> stabilization period <strong>and</strong> therefore are not considered<br />

for the evaluation. Each simulation setup is run in 50 iterations to determine<br />

stable average values. The number of particles for the SMC-BFT approach is 50.<br />

2) Mobility Model: For the evaluation we implemented a mobility model reflecting<br />

the topography of the environment <strong>and</strong> a group based model reflecting<br />

tactical formations.<br />

Manhattan Grid Model: The Manhattan Grid Model [18] is based on road<br />

topology. Roads are located in a grid structure <strong>and</strong> nodes move in horizontal or<br />

vertical directions on these roads. The model follows a probabilistic approach: each<br />

node probabilistically chooses at each intersection to keep moving in the same<br />

direction or to turn left or right.<br />

For the evaluation we implemented the Manhattan Grid Model based on<br />

the BonnMotion [19] algorithm. This model is used as default mobility model for<br />

the evaluation. There are 10 blocks in each direction (i. e. each block is 100 x 100 m)<br />

<strong>and</strong> the probability for mobile nodes to turn at a crossing is 0.5. The probability<br />

for a node to change its speed (in a simulation round) is 0.2. The minimum speed<br />

is 0.5 m/s, the mean 2.0 m/s <strong>and</strong> the st<strong>and</strong>ard deviation of a normally distributed<br />

r<strong>and</strong>om speed 2.0 m/s. The pause probability is zero.<br />

Reference Point Group Mobility (RPGM): The Reference Point Group Mobility<br />

(RPGM) Model [20], [21] can represent tactical relationships among a group<br />

of mobile nodes. Applications of the RPGM model include complex scenarios such<br />

as a military maneuver with joint aircraft, tank <strong>and</strong> infantry operations or two-level<br />

scenarios, e.g. infantry <strong>and</strong> helicopters, with slow <strong>and</strong> fast nodes.<br />

For the evaluation the following default parameter set is used. There is a group<br />

of 20 nodes that move with a common average speed. The minimum group speed<br />

is 4 m/s <strong>and</strong> the maximum 10 m/s. The overall group movement follows a r<strong>and</strong>om<br />

waypoint mobility model. Each node chooses a destination r<strong>and</strong>omly distributed around<br />

a group destination in a distance of up to 25 m from this specified location. In each<br />

step a node may also r<strong>and</strong>omly move up to 30 percent of this maximum distance.<br />

3) Radio Propagation Model: During evaluation a deterministic <strong>and</strong> a probabilistic<br />

radio propagation model are used.<br />

Free Space Model: The Free Space Model is a basic deterministic model where<br />

only line-of-sight radio transmissions through free space (without any obstacles,<br />

reflection or diffraction disturbances) are taken into account. For the evaluation<br />

we use the available simulator implementation [9].<br />

Shadowing Model: In reality radio propagation is a probabilistic process due<br />

to multipath propagation effects. The shadowing model consists of two distinct<br />

parts: a path loss model (which predicts the mean received power) <strong>and</strong> a second<br />

that reflects the variation of the received power at a certain distance.<br />

For the evaluation an implementation based on ns-2 [22] is used. This model<br />

is used as default radio propagation model with a radio transmission range of 250 m.


Chapter 8: Localization Techniques<br />

361<br />

The pathloss exponent is set to 4.0 (recommendation for outdoor environment/<br />

shadowed urban area: 2.7 to 5 [22]) <strong>and</strong> a shadowing deviation <br />

dB<br />

8.0 is used<br />

(recommendation for outdoor environments: 4 to 12 [22]).<br />

D. Accuracy of location estimation<br />

40<br />

Field Size (Node Number, Node Density)<br />

Estimation Error [m]<br />

30<br />

20<br />

10<br />

STD-BFT<br />

VEL-BFT<br />

SMC-BFT<br />

0<br />

250 500 750 1000 1250 1500<br />

Field Size [m]<br />

Figure 2. Average Estimation Error vs. Node Density for Manhattan Grid Model<br />

1) Field Size, Node Number <strong>and</strong> Node Density: In this evaluation setup we increase<br />

the field size (incrementally from 250 x 250 m to 1500 x 1500 m) proportional to<br />

the number of nodes (5 to 30). Therefore node density decreases with increasing<br />

field size <strong>and</strong> node numbers. Figure 2 shows that the estimation error stays on<br />

a similar level as long as node density provides some basic connectivity of all<br />

nodes, but decreases when network connectivity is disturbed. The SMC-BFT<br />

method outperforms other methods in all setups by 16 to 41 percent.<br />

2) Mobility Model Parameters: In figure 3 <strong>and</strong> figure 4 simulation results are<br />

shown for different speed settings for Manhattan Grid <strong>and</strong> RPGM models<br />

respectively. The results for both mobility models show that STD-BFT works<br />

well for scenarios with low mobility.<br />

40<br />

Node Speed<br />

Estimation Error [m]<br />

30<br />

20<br />

10<br />

STD-BFT<br />

VEL-BFT<br />

SMC-BFT<br />

0<br />

1 2 3 4<br />

Average Speed [m/s]<br />

Figure 3. Average Estimation Error vs. Node Speed for Manhattan Grid Model


362 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

40<br />

Group Speed<br />

Estimation Error [m]<br />

30<br />

20<br />

10<br />

STD-BFT<br />

VEL-BFT<br />

SMC-BFT<br />

0<br />

2 4 6 8<br />

Maximum Speed [m/s]<br />

Figure 4. Average Estimation Error vs. Group Speed for RPGM Model<br />

In figure 3 the minimum speed for the Manhattan Grid Model is set to 0.5 m/s<br />

for speeds below 3 m/s <strong>and</strong> to 1 m/s otherwise. Mean speed as well as the st<strong>and</strong>ard<br />

deviation are increased from 1 m/s to 4 m/s. Estimation errors grow relatively<br />

proportional to speed. Average estimation errors of SMC-BFT are 23 to 48 percent<br />

lower than for both st<strong>and</strong>ard BFT methods.<br />

In figure 4 maximum group speed of RPGM is increased from 2 m/s to 8 m/s,<br />

minimum group speed is increased proportionally from 0.5 m/s to 2 m/s. Average<br />

estimation errors of SMC-BFT are 12 to 55 percent lower than for the other methods.<br />

Estimation Error [m]<br />

150<br />

125<br />

100<br />

75<br />

50<br />

Radio Range <strong>and</strong> Radio Propagation Model<br />

STD-BFT: Free Space<br />

VEL-BFT: Free Space<br />

SMC-BFT: Free Space<br />

STD-BFT: Shadowing<br />

VEL-BFT: Shadowing<br />

SMC-BFT: Shadowing<br />

25<br />

0<br />

150 200 300 400<br />

Radio Range [m]<br />

Figure 5. Radio Propagation Model <strong>and</strong> Radio Range<br />

3) Radio Propagation Model Parameters: The following setup evaluates the radio<br />

propagation models influence on BFT performance. For these purposes two<br />

radio propagation models (Free Space <strong>and</strong> Shadowing) are used with varying<br />

radio ranges from 150 m to 400 m where radio range is the maximum transmission<br />

range for the Free Space model <strong>and</strong> the average transmission range for<br />

the Shadowing model. Figure 5 shows that error estimation is significantly lower


Chapter 8: Localization Techniques<br />

363<br />

for the Shadowing model. When even a few messages are transmitted beyond<br />

“normal” (Free Space) radio range it significantly improves location estimation<br />

due to an increase in valuable information that would otherwise not be available to<br />

that part of the network. The results show that the average estimation error is lower<br />

for SMC-BFT for all evaluated setups than for both st<strong>and</strong>ard BFT methods.<br />

20<br />

Accuracy of GPS Messearument<br />

Estimation Error [m]<br />

15<br />

10<br />

5<br />

STD-BFT<br />

VEL-BFT<br />

SMC-BFT<br />

0<br />

2 3 4 5<br />

St<strong>and</strong>ard Deviation of GPS Measurements [m]<br />

Figure 6. GPS Measurement Accuracy<br />

4) GPS Measurement Accuracy: Accuracy of sensor measurements has a direct<br />

impact on BFT performance. Figure 6 shows results for varying GPS precisions<br />

(GPS st<strong>and</strong>ard deviation 2 m to 5 m). Estimation error increases are relatively<br />

proportional to GPS accuracy where the estimation error of the proposed<br />

SMC-BFT is 25 to 38 percent than for the other methods.<br />

Table I. Number of Messages <strong>and</strong> Average Estimation Error vs. Message Generation Interval<br />

Message Generation Interval<br />

5 s 10 s 20 s<br />

Average Number of Generated Messages 481 240 120<br />

Average Number of Forwarded Mess. 33512 16576 8488<br />

Average Estimation Error<br />

STD-BFT 8.4 m 13.7 m 24.5 m<br />

VEL-BFT 6.7 m 10.9 m 20.9 m<br />

SMC-BFT 4.6 m 8.1 m 15.0 m<br />

E. Communication overhead<br />

In this section we evaluate BFT communication overhead <strong>and</strong> the resulting<br />

location estimation errors in dependency of message generation intervals. As message<br />

generation, forwarding <strong>and</strong> processing do not depend on the data fusion<br />

algorithm, the number of messages that are generated <strong>and</strong> exchanged are equivalent<br />

for all three methods.


364 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Table I shows that the quantity of messages significantly decreases when location<br />

message generation time intervals are increased. Similarly location estimation<br />

error increases proportionally to a decrease in message generation intervals where<br />

SMC-BFT outperforms the other approaches in all scenarios by 25 to 45 percent.<br />

VI. Conclusion <strong>and</strong> outlook<br />

In this paper we demonstrated how BFT can be significantly enhanced<br />

by using networking capabilities of tactical MANETs <strong>and</strong> data fusion based on<br />

particle filters. Using advanced data analysis <strong>and</strong> fusion mechanisms for multiple<br />

sensor <strong>and</strong> data sources based on techniques that are employed in robotics <strong>and</strong><br />

object tracking, we developed a model for enhanced BFT in tactical MANETs by<br />

incorporating additional information such as mission information (e.g. mobility<br />

models) <strong>and</strong> topographic data. As shown in the simulation environment using<br />

various mobility <strong>and</strong> radio propagation characteristics (cf. figure 2 to 6), our<br />

proposed SMC-BFT model enhanced both accuracy <strong>and</strong> robustness as compared<br />

to existing models.<br />

This paper has outlined mechanisms that can be used to implement more accurate<br />

<strong>and</strong> robust BFT systems for tactical MANETs. Our proposed model can be<br />

used as a replacement if no satellite infrastructure is available, or as a supplement<br />

to an existing backend system thereby improving local precision while maintaining<br />

a coarse global overview, e.g. using a satellite system.<br />

References<br />

[1] N. Suri, G. Benincasa, M. Tortonesi, C. Stefanelli, J. Kovach, R.Winkler,<br />

U.S. Kohler, J. Hanna, L. Pochet, <strong>and</strong> S. Watson, “Peer-to-Peer <strong>Communications</strong><br />

for Tactical Environments: Observations, Requirements, <strong>and</strong> Experiences,” IEEE<br />

<strong>Communications</strong> Magazine, vol. 48, pp. 60-69, 2010.<br />

[2] P. Labbe, L. Lamont, Y. Ge, <strong>and</strong> L. Li, “Creating a Dynamic Picture of Network<br />

Participant Geospatial <strong>Information</strong> in Complex Terrains,” in Proceedings of the Second<br />

International Conference on Internet Monitoring <strong>and</strong> Protection. Washington, DC,<br />

USA: IEEE Computer Society, 2007, pp. 39.<br />

[3] K.R. Chevli, P.Y. Kim, A.A. Kagel, D.W. Moy, R.S. Pattay, R.A. Nichols, <strong>and</strong><br />

A.D. Goldfinger, “Blue Force Tracking Network Modeling <strong>and</strong> Simulation,” in IEEE<br />

<strong>Military</strong> <strong>Communications</strong> Conference (MILCOM), 2006.<br />

[4] R. Filler, S. Ganop, P. Olson, <strong>and</strong> S. Sokolowski, “Positioning, Navigation <strong>and</strong><br />

Timing: The Foundation of Comm<strong>and</strong> <strong>and</strong> Control,” in Comm<strong>and</strong> <strong>and</strong> Control<br />

Research <strong>and</strong> <strong>Technology</strong> Symposium (CCRTS), 2004.<br />

[5] S. Reidt <strong>and</strong> S.D. Wolthusen, “Connectivity Augmentation in Tactical Mobile<br />

Ad hoc Networks,” in IEEE <strong>Military</strong> Communication Conference (MILCOM), 2008.


Chapter 8: Localization Techniques<br />

365<br />

[6] L. Riblett. <strong>and</strong> J. Wiseman, “TACNET: Mobile ad hoc Secure <strong>Communications</strong><br />

Network,” in 41st Annual IEEE International Carnahan Conference on Security<br />

<strong>Technology</strong>, 2007.<br />

[7] L. Riblett <strong>and</strong> J. Wiseman, “TacNet Tracker©: Built-in Capabilities for Situational<br />

Awareness,” in 42nd Annual IEEE International Carnahan Conference on Security<br />

<strong>Technology</strong>, 2008.<br />

[8] P. Ebinger <strong>and</strong> S. Wolthusen, “Efficient State Estimation <strong>and</strong> Byzantine Behavior<br />

Identification in Tactical MANETs,” in IEEE <strong>Military</strong> <strong>Communications</strong> Conference<br />

(MILCOM), 2009.<br />

[9] L. Hu <strong>and</strong> D. Evans, “Localization for Mobile Sensor Networks,” in 10th ACM Annual<br />

International Conference on Mobile Computing <strong>and</strong> Networking (MobiCom), 2004.<br />

[10] S. Biaz <strong>and</strong> Y. Ji, “A Survey <strong>and</strong> Comparison on Localisation Algorithms for Wireless<br />

Ad Hoc Networks,” Int. J. Mob. Commun., vol. 3, pp. 374-410, May 2005.<br />

[11] R. Huang <strong>and</strong> G.V. Zaruba, “Incorporating Data from Multiple Sensors for Localizing<br />

Nodes in Mobile Ad Hoc Networks,” IEEE Transactions on Mobile Computing, vol. 6,<br />

pp. 1090-1104, September 2007.<br />

[12] B. Ristic, S. Arulampalam, <strong>and</strong> N. Gordon, Beyond the Kalman Filter: Particle<br />

Filters for Tracking Applications. Artech House, 2004.<br />

[13] M. Rosencrantz, G. Gordon, <strong>and</strong> S. Thrun, “Decentralized Sensor Fusion with<br />

Distributed Particle Filters,” in 19th Conference on Uncertainty in Artificial Intelligence<br />

(UAI), 2003.<br />

[14] A. Doucet, N.D. Freitas, <strong>and</strong> N. Gordon, Eds., Sequential Monte Carlo Methods<br />

in Practice. Springer, 2001.<br />

[15] A. Baggio <strong>and</strong> K. Langendoen, “Monte Carlo Localization for Mobile Wireless<br />

Sensor Networks,” Ad Hoc Networks, vol. 6, no. 5, pp. 718-733, Jul. 2008.<br />

[16] A. Agarwal <strong>and</strong> S.R. Das, “Dead Reckoning in Mobile Ad Hoc Networks,” in IEEE<br />

Wireless <strong>Communications</strong> <strong>and</strong> Networking (WCNC), vol. 3, 2003, pp. 1838-1843.<br />

[17] E. Amar <strong>and</strong> S. Boumerdassi, “Enhancing Location Services with Prediction,”<br />

in Proceedings of the 2009 International Conference on Wireless <strong>Communications</strong><br />

<strong>and</strong> Mobile Computing: Connecting the World Wirelessly, ser. IWCMC ’09. New<br />

York, NY, USA: ACM, 2009, pp. 1025-1029.<br />

[18] Special Mobile Group (SMG), “Universal Mobile Telecommunicatios System (UMTS) –<br />

Selection Procedures for the Choice of Radio Transmission Technologies of the UMTS,”<br />

European Telecommunications St<strong>and</strong>ards Institute (ETSI), Tech. Rep., 1998.<br />

[19] N. Aschenbruck, R. Ernst, E. Gerhards-Padilla, <strong>and</strong> M. Schwamborn,<br />

“BonnMotion: A Mobility Scenario Generation <strong>and</strong> Analysis Tool,” in 3rd International<br />

ICST Conference on Simulation Tools <strong>and</strong> Techniques, 2010.<br />

[20] X. Hong, M. Gerla, G. Pei, <strong>and</strong> C.-C. Chiang, “A Group Mobility Model for Ad Hoc<br />

Wireless Networks,” in 2nd ACM International Conference on Modeling, Analysis<br />

<strong>and</strong> Simulation of Wireless <strong>and</strong> Mobile Systems (MSWiM ’99), 1999.<br />

[21] T. Camp, J. Boleng, <strong>and</strong> V. Davies, “A Survey of Mobility Models for Ad Hoc<br />

Network Research,” Wireless <strong>Communications</strong> <strong>and</strong> Mobile Computing, vol. 2, no. 5,<br />

pp. 483-502, 2002.<br />

[22] K. Fall <strong>and</strong> K. Varadhan, The ns Manual, May 2010, available online at<br />

http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf; accessed 2012-07-26.


Spatial Localization of Radio Wave Emission Sources<br />

Using SDF <strong>Technology</strong><br />

Jan M. Kelner, Piotr Gajewski, Cezary Ziółkowski<br />

<strong>Military</strong> University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong>,<br />

{jkelner, pgajewski, cziolkowski}@wat.edu.pl<br />

Abstract: The paper is devoted to the question of locating of radio wave emission sources by using<br />

of SDF technology. The generalized algorithm to estimate the radio transmitter coordinates has been<br />

presented. The Doppler characteristics are the basis to determine the location coordinates of a source.<br />

They are obtained as the result of measuring of instantaneous frequency of a signal received on<br />

board of an airplane.<br />

Keywords: location techniques, Doppler shift, Signal Doppler Frequency (SDF), 3D localization<br />

I. Introduction<br />

The localization of mobile radio waves transmitters is more <strong>and</strong> more interesting<br />

service both for networks users of <strong>and</strong> for operators of Electronic Warfare<br />

(EW) systems. Many location techniques have been already studied <strong>and</strong> described,<br />

mainly [6]-[12]: CoO (Cell of Origin), AoA (Angle of Arrival), RSS (Received Signal<br />

Strength), TOA (Time of Arrival), TDoA (Time Difference of Arrival), GPS/A-GPS<br />

(Assisted GPS), FDoA (Frequency Difference of Arrival) as well as the so-called<br />

hybrid methods.<br />

Above methods have some advantages <strong>and</strong> disadvantages for using in practical<br />

systems. Mostly, the location in two dimensions (2D) is these methods main limitation.<br />

The article presents an idea of the method for location in 3D that use<br />

the values of signal Doppler shift which is measured on the mobile flying platform<br />

(helicopters, planes, drones).<br />

The SDF (Signal Doppler Frequency) technology [2] is based on the analytical<br />

description of the Doppler effect [1]. It uses the distinctive nature of Doppler curves<br />

resulting from the reciprocal location of signal sources <strong>and</strong> receiver in relation to<br />

the movement of the objects trajectory.<br />

Because of using the Doppler effect, the SDF method is compared to FDoA<br />

one. However, the SDF <strong>and</strong> FDoA methods present considerably different approaches<br />

to the location techniques. The possibility of object spatial 3D localizations<br />

is a main advantage of the SDF technology, which is presented below.


368 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Moreover, the main propriety of SDF method is its high precision as well as independency<br />

for the time-frequency structure of signals emitted by objects being<br />

localised. It gives the possibility to use the method universally <strong>and</strong> autonomously<br />

in numerous practical applications. Several applications of the SDF technology have<br />

been presented till now, among others in the area of: reconnaissance <strong>and</strong> electronic<br />

warfare, spectrum monitoring, sea <strong>and</strong> l<strong>and</strong> rescue, <strong>and</strong> navigation.<br />

II. Characteristic of SDF method<br />

The SDF technology bases on the analytical description of the Doppler frequency<br />

[1]. The expression describing the variability of the Doppler frequency<br />

has the following form [1]:<br />

k<br />

<br />

xvt<br />

<br />

f <br />

D<br />

x , t <br />

2<br />

k<br />

2<br />

f<br />

2 2 2 0<br />

1k xvt 1k y z<br />

<br />

, (1)<br />

<br />

<br />

where: k vc, – the difference of velocity between a signal source <strong>and</strong> the receiver,<br />

– the electromagnetic wave propagation speed in the medium, – the<br />

carrier frequency of the emitted signal, x xyz<br />

, , – coordinates of the signal<br />

source location.<br />

Above formula shows that the value of the Doppler frequency shift is a function<br />

of signal source location coordinates. This fact has become the essence of elaborated<br />

method is a measurement of the instantaneous value of the signal frequency<br />

by a moving measurement receiver. Basing on (1), particular coordinates x, y, z<br />

of the transmitter location can be determined as the functions of the Doppler<br />

frequency shift measured in various time moments. In the case, when the receiver<br />

is moving on a fixed height above the flat terrain, the coordinates are known <strong>and</strong><br />

fixed values. Making elementary transformations of the equation (1) we achieve<br />

formulas describing the coordinates x <strong>and</strong> y of the signal source [2]-[5]:<br />

<br />

<br />

x v tAt<br />

At<br />

<br />

<br />

tAt<br />

1 1 2 2<br />

At<br />

1 2<br />

, (2)<br />

y<br />

1<br />

1<br />

v<br />

t t At At <br />

<br />

<br />

1 2 1 2 2<br />

2<br />

<br />

k At1 At2<br />

<br />

2<br />

<br />

z<br />

, (3)<br />

where:<br />

2<br />

2<br />

1<br />

F t<br />

f <br />

D<br />

t 1k<br />

At , Ft k . (4)<br />

Ft<br />

f k<br />

So, in order to determine coordinates of signal source, it is necessary to measure<br />

the Doppler frequency value in two moments <strong>and</strong> . Therefore, it is<br />

0


Chapter 8: Localization Techniques<br />

369<br />

possible to determine locations of emitting radio wave sources during the receiver<br />

movement, basing on the measurement of the Doppler frequency shift.<br />

The idea of SDF 3D method is described below.<br />

III. SDF spatial localization method<br />

The algorithm of localization procedure is presented in the Fig. 1. The following<br />

simplifications were assumed in the analysed scenario [2]:<br />

• the signal generated by the localised transmitter is received at any point<br />

of the space where the localization st<strong>and</strong> (LS) is placed;<br />

• the localised signal source is immovable <strong>and</strong> it is placed on the flat Earth<br />

surface;<br />

• the LS is moving at a defined height over the Earth, what means that only<br />

the direct component is taken into account in the signal coming from<br />

the source to the receiver;<br />

• the operator of the LS knows the frequency of the signal transmitted<br />

by the localised source.<br />

Figure 1. Algorithm of the SDF spatial localization procedure


370 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Here, the several possible situations of localization using an aircraft are taken<br />

into account. They depend on the knowledge of an approximated direction for<br />

the transmitter. So, Algorithm contents three blocks. Block (A) corresponds to<br />

the situation, when the LS operator knows the approximated direction to the signal<br />

source. Block (B) is using if the LS operator does not know the approximated<br />

direction to the signal source, <strong>and</strong> the st<strong>and</strong> is moving in the direction, for which<br />

is not possible the coordination determining. And finally block (C) corresponds<br />

to the situation where the LS operator does not know the approximate direction<br />

to signal source, but he is able to determine transmitter coordinates x <strong>and</strong> y on<br />

the flying route.<br />

The task of part B is to define the precise coordinates of the transmitter using<br />

procedure Z, presented in the Fig. 2 [2].<br />

Figure 2. Illustration of Z-procedure<br />

The Z procedure is brought to define 3-phase flight route of LS between<br />

the points (1)→(2)→(3)→(4). In the first phase between the points (1)→(2), the ap-


Chapter 8: Localization Techniques<br />

371<br />

proximate transmitter’s coordinations can be determined. Knowing the approximated<br />

direction to the localised transmitter, it is possible to select a suitable flight<br />

direction within the first phase of the procedure Z. This direction should be established<br />

so that the Doppler frequency shift changed [2]. In the point (2), the change<br />

of the movement direction takes place in the OXY plane by the angle (Fig. 2)<br />

defined by the formula [2]:<br />

y<br />

s<br />

1 xy<br />

s<br />

arctg arccos<br />

xvt D<br />

xvt s<br />

arccos arccos ,<br />

D D<br />

xy<br />

where: 2 2<br />

D xvt y , s – the length of the route segment between point (2)<br />

xy<br />

<strong>and</strong> point (X) (Fig. 2), where the Doppler frequency is equal to zero.<br />

This phase of the Z procedure allows to achieve the coordinate values<br />

of the transmitter position with high accuracy. It is resulted from the suitable selection<br />

of the route where almost symmetrical part of the Doppler curve is achieved<br />

around the value of . The point (X) in the Fig. 2 is called the Point of the Closest<br />

Approach – PCA [12]. The selection of the length 2s of the route segment between<br />

the points (2)→(3) depends on the distance of the localization st<strong>and</strong> to the signal<br />

source. The question of selection of the measurement segment 2s is presented<br />

in the references [2,13]. In the point (3) the next change in the movement direction<br />

takes place in the plane OXY by the angle of (Fig. 2) described by formula [2]:<br />

xy<br />

xy<br />

(5)<br />

y ' <br />

vt ' x'<br />

<br />

2<br />

arctg<br />

<br />

y' 2 y'<br />

, (6)<br />

where: x',<br />

y', z ' – coordinates of the signal source position determined in the second<br />

phase of the procedure Z, – the time measured from the moment of changing<br />

the movement direction in the point (2), y' y ' – a factor responsible for the sign<br />

of the angle <strong>and</strong> providing the proper change of the direction (to the right or<br />

to the left) in the point (3).<br />

Within the third phase of the procedure Z the plane flights in the direction<br />

to the transmitter. The change in the direction for the route (3)→(5) (Fig. 2) is executed<br />

similarly to the point (2) of the procedure Z. The precise coordinate values<br />

of the source position are determined in this way.<br />

When the direction to the transmitter is not known <strong>and</strong> Doppler shift does not<br />

changed, the block (B) is worked out. Here, three situations can be distinguished:<br />

a) the st<strong>and</strong> moves away from the transmitter that is in a large distant from<br />

the receiver ( f <br />

D<br />

t fDmax<br />

),<br />

b) the st<strong>and</strong> moves closer to the transmitter, but is in a large distant from it<br />

( f <br />

D<br />

t fDmax<br />

),


372 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

c) the st<strong>and</strong> moves (closer or away) in small distant of the source, but the flight<br />

direction overlaps (with a margin) the direction to the signal source<br />

( f <br />

D<br />

t fDmax<br />

).<br />

The Fig. 2 presents an example of such situation by moving the LS between<br />

the points (6)→(7). Then, the diametrical change in the movement direction is required<br />

in the plane OXY by the angle of ±90° related to the present movement<br />

direction. Next, the procedure Z is executed. The segment (7)→(2) corresponds to<br />

the (1)→(2) one in the procedure Z as for the situation (A).<br />

The last block (C) corresponds to the situation where the LS operator does<br />

not know the approximate direction to signal source, but he is able to determine<br />

coordinates x <strong>and</strong> y of the source position on the route of his movement (the segment<br />

(1)→(2) in the Fig. 2. The coordinate y is then defined ambiguously. It is not<br />

known if the signal source is on the right or on the left side of the LS movement<br />

trajectory (the segment (1)→(2) in the Fig. 2). Therefore, the LS direction change<br />

in the point (2) can be done in the incorrect direction. In such a case, the movement<br />

of the receiver in the direction (2)→(8) will cause that f <br />

D<br />

t fDmax<br />

. The return<br />

(8)→(2) <strong>and</strong> further continuation of the flight according to the procedure Z is required<br />

in such situation.<br />

IV. Simulation results<br />

The SDF method was verified by simulations <strong>and</strong> measurements for 2D localization.<br />

Some results have been presented in [4],[5]. The procedure Z has been<br />

positively verified by simulation tests for the rescue action scenario [14]. Some<br />

simulation results are presented below.<br />

Figure 3. Simulation scenario


Chapter 8: Localization Techniques<br />

373<br />

Fig. 3 shows the simulation scenario <strong>and</strong> the flight trajectory in 2D. The aircraft<br />

position is in geographical UMT st<strong>and</strong>ard. At the top, the positioning accuracy<br />

results obtained for the point F is shown. This is the point with the best accuracy<br />

of location because of the most distinguish change of Doppler frequency (Fig. 4).<br />

Figure 4. Doppler frequency courses<br />

Figure 5. Localization accuracy<br />

The r localization accuracy is shown in Fig. 5. The best results are obtained<br />

during the flight in sector EF, after few changes of flight route.<br />

V. Summary<br />

The paper shows the possibility of using the space platform to spatial localization<br />

of the radio emission sources (both stationary <strong>and</strong> movable).<br />

The SDF method in the spatial localization can find wide applications in air <strong>and</strong><br />

sea rescue systems as well as in national security agencies. Installing the localization


374 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

st<strong>and</strong> on helicopters <strong>and</strong> aircrafts increases the range <strong>and</strong> accuracy of the method<br />

in relation to the ground localization.<br />

The exact characteristics of this method, the many experiments should be<br />

worked out. At present, the preparations are in progress to develop the new research<br />

project. Within this grant it is expected to carry out researches <strong>and</strong> the attempt<br />

to implement the SDF technology on an aircraft from the Navy Sea Rescue Unit.<br />

The expected better precision of the Doppler localization method in the case<br />

of placing the localization st<strong>and</strong> on aircraft than placed on l<strong>and</strong> vehicles allows<br />

to infer of high capacities of the method, which can be also used for air navigation,<br />

particularly within aircraft l<strong>and</strong>ing systems in reduced visibility conditions.<br />

The possibility to use the SDF method to navigation purposes is presented, among<br />

others, in [2],[13].<br />

References<br />

[1] J. Rafa, C. Ziółkowski, “Influence of transmitter motion on received signal parameters<br />

– Analysis of the Doppler effect”, Wave Motion, vol. 45, no. 3, pp. 178-190, January<br />

2008.<br />

[2] J.M. Kelner, Analiza dopplerowskiej method lokalizacji źródeł emisji fal radiowych<br />

(Analysis of the Doppler location method of the radio waves emission source),<br />

Ph.D. thesis, <strong>Military</strong> University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong>, 2010, (in Polish).<br />

[3] P. Gajewski, J.M. Kelner, C. Ziółkowski, “Subscriber location in radio communication<br />

nets”, Journal of Telecommunications <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>, no. 2, pp. 88-92,<br />

2008.<br />

[4] J.M. Kelner, C. Ziółkowski, L. Kachel, “The empirical verification of the location<br />

method based on the Doppler effect”, 17th International Conference on Microwaves,<br />

Radar <strong>and</strong> Wireless <strong>Communications</strong> MIKON 2008, Wroclaw, Pol<strong>and</strong>, vol. 3, pp. 755-758,<br />

May 2008.<br />

[5] P. Gajewski, C. Ziółkowski, J.M. Kelner, “Mobile location method of radio wave<br />

emission sources”, Progress in Electromagnetics Research Symposium PIERS 2009,<br />

Moscow, Russia, August 2009.<br />

[6] A. Amar, A.J. Weiss, “Localization of narrowb<strong>and</strong> radio emitters based on<br />

Doppler frequency shifts”, IEEE Transactions on Signal Processing, vol. 56, no. 11,<br />

pp. 5500-5508, 2008.<br />

[7] Y. Zhao, “St<strong>and</strong>ardization of mobile phone positioning for 3G systems”, IEEE<br />

<strong>Communications</strong> Magazine, vol. 40, no. 7, pp. 108-116, 2002.<br />

[8] M. Vossiek, L. Wiebking, P. Gulden, J. Wieghardt, C. Hoffmann, P. Heide,<br />

“Wireless local positioning”, IEEE Microwave Magazine, vol. 4, no. 4, pp. 77-86, 2003.<br />

[9] I.J. Gupta, “Stray signal source location in far-field antenna/RCS ranges”, IEEE<br />

Antennas <strong>and</strong> Propagation Magazine, vol. 46, no. 3, pp. 20-29, 2004.<br />

[10] A. Küpper, Location-based services. Fundamentals <strong>and</strong> operation, John Wiley & Sons,<br />

Chichester, UK, 2005.


Chapter 8: Localization Techniques<br />

375<br />

[11] K.W. Kołodziej, J. Hjelm, Local positioning system. LBS applications <strong>and</strong> services,<br />

CRC Press, Boca Raton, FL, USA, 2006.<br />

[12] N. Levanon, M. Ben-Zaken, “R<strong>and</strong>om error in ARGOS <strong>and</strong> SARSAT satellite<br />

positioning systems”, IEEE Transaction on Aerospace <strong>and</strong> Electronic System, vol. AES-21,<br />

no. 6, pp. 783 790, 1985.<br />

[13] P. Gajewski, C. Ziółkowski, J.M. Kelner, “Influence of length <strong>and</strong> location<br />

of the measurement route on location accuracy of the radio waves sources using<br />

the SDF method”, Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne,<br />

vol. LXXXIII, no. 8-9, pp. 1360-1369, August-September 2010 (in Polish).<br />

[14] C. Ziółkowski, J.M. Kelner, “Using the Doppler methodology for object location<br />

estimation in lifeboat service”, 6th International Conference on: Perspectives <strong>and</strong><br />

Development of Rescue, Safety <strong>and</strong> Defence Systems in the 21st Century RSDS 2008,<br />

Gdansk, Pol<strong>and</strong>, June 2008.


On the Effect of Tuner Phase Noise<br />

on TDOA Measurements<br />

Anders M. Johansson, Patrik Hedström<br />

Swedish Defence Research Agency, Linköping, Sweden,<br />

{ajh, pathed}@foi.se<br />

Abstract: Radio geolocation of unknown signals using time difference of arrival techniques is dependent<br />

on signal measurements that are recorded using a time <strong>and</strong> frequency coherent measurement<br />

system. This paper investigates what effect the phase noise in the reference oscillator inside the tuner<br />

has on the geolocation accuracy, <strong>and</strong> proposes a model for the phase noise in addition to a method<br />

for counteracting its effect. The results include both real world measurements <strong>and</strong> computer simulations.<br />

Results from a field experiment indicate that the proposed method outperforms traditional<br />

time difference of arrival techniques by a factor between 3 <strong>and</strong> 5.8 depending on SNR.<br />

1. Introduction<br />

Time difference of arrival (TDOA) techniques for geolocation of unknown<br />

signals has been researched within acoustics since the First World War [1]. In later<br />

years systems for measuring the TDOA on radio signals has been developed <strong>and</strong><br />

a few military systems based on TDOA techniques are in use today. One problem<br />

when dealing with narrow b<strong>and</strong> signals or signals with poor signal to noise ratio<br />

(SNR) is that long measurement times are required to reach sufficient TDOA<br />

accuracy. This can easily be seen by studying the Cramer-Rao Bound (CRB),<br />

for details see [2]. In particular, narrow b<strong>and</strong> signals with poor SNR requires<br />

measurement times exceeding one second in order to reach sufficient accuracy.<br />

In this paper we show that phase noise in the reference oscillator used in the radio<br />

receivers impacts negatively on the accuracy of TDOA estimation. Furthermore,<br />

we present a method for modeling the phase noise, <strong>and</strong> results from a real world<br />

field trial. The results are presented using both real measurements <strong>and</strong> computer<br />

simulations. A method for counteracting the problems arising from the phase<br />

noise is also presented.<br />

Section 2 presents a signal model <strong>and</strong> an oscillator model, followed by a description<br />

of the TDOA algorithm including modifications to counteract the phase<br />

noise in Section 3. Measurements <strong>and</strong> simulations are presented in Section 4, <strong>and</strong><br />

conclusions in Section 5.


378 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

2. Signal models<br />

Assume a b<strong>and</strong> limited signal st (), where denotes time, transmitted from<br />

a position in space, impinge on a group of receivers placed in the positions<br />

, m{1, 2, , M}<br />

, see Figure 1. By comparing the received base b<strong>and</strong> signals x m()<br />

t ,<br />

the TDOA algorithm can be used to form an estimate ˆ of the transmitter position.<br />

Figure 1. System model<br />

The propagation channel from to is denoted hm<br />

() t <strong>and</strong> is considered to<br />

be stationary over the measurement time . At each receiver, the received signal<br />

is corrupted by noise denoted vm()<br />

t , which is considered spectrally white, time<br />

invariant <strong>and</strong> uncorrelated between the receivers. The modulation frequency is denoted<br />

<strong>and</strong> the signal b<strong>and</strong>width . The local oscillator of the receiver is assumed<br />

to be unstable with the phase noise m()<br />

t . The signal chain from the transmitter<br />

to receiver is depicted in Figure 2. The received signal is:<br />

<br />

( ( ))<br />

() () j c<br />

t m<br />

t<br />

m m<br />

* ()<br />

Bm<br />

(),<br />

<br />

x t h te st v t<br />

(1)<br />

where denotes convolution. The above equation shows that the output signal,<br />

x () m<br />

t , from the receiver is a demodulated version of the system impulse response<br />

convolved with the transmitted base b<strong>and</strong> signal.<br />

The base b<strong>and</strong> noise term, vBm()<br />

t , in Equation (1) is [3]:<br />

<br />

v t v jH v<br />

(2)<br />

<br />

<br />

( c m( ))<br />

() e j t t<br />

Bm m m<br />

,<br />

where H () denotes the Hilbert transform.


Chapter 8: Localization Techniques<br />

379<br />

Figure 2. Signal model<br />

2.1. Free space propagation<br />

Assuming free space propagation without attenuation, the propagation channel<br />

simplifies to a pure delay hm() t ( t m)<br />

, where is the propagation delay<br />

in seconds between the transmitter <strong>and</strong> receiver , <strong>and</strong> is calculated according to:<br />

<br />

m<br />

m<br />

q<br />

p ,<br />

(3)<br />

c<br />

where denotes vector norm, <strong>and</strong><br />

the speed of light.<br />

2.2. Oscillator phase noise<br />

The model for phase noise is here defined as flicker noise denoted m()<br />

t<br />

added to the centre frequency of the reference oscillator. Typically this noise is what<br />

causes Allan variation [4].<br />

() t t (), t<br />

(4)<br />

where<br />

m f m<br />

is the noise power. The power spectral density (PSD) of the flicker noise<br />

m()<br />

t 1N<br />

f<br />

. Both <strong>and</strong> are oscillator specific constants,<br />

where oscillators with high precision typically have a low value of <strong>and</strong> a high<br />

value of <strong>and</strong> vice versa. Several numerical methods for simulating flicker noise<br />

have been presented in the literature, the method used here is a fast Fourier transform<br />

(FFT) based method called “the discrete spectrum method”, <strong>and</strong> is described<br />

in [5]. Section 4.1 presents a method for estimating the constants <strong>and</strong> for<br />

a real oscillator.<br />

As the power of the flicker noise is concentrated at very low frequencies, it is<br />

possible to model the oscillator as stable with a phase offset for short measurement<br />

times. A simplified model for the noise for short measurement times is<br />

() t (), t<br />

(5)<br />

m<br />

where <br />

m( t ) is a constant over tTs<br />

/2 t t Ts<br />

/2for small values of the measurement<br />

time . Note that due to the phase noise, the phase offset can be assumed<br />

to vary between measurements.<br />

m


380 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

3. The TDOA algorithm<br />

The TDOA algorithm estimates the position of the transmitter by identifying<br />

the time difference of arrival between all receiver pairs. This can be done either in the time<br />

domain or in the frequency domain, by analysing the cross correlation or the cross<br />

spectral density (CSD) between the received signals. To study the effect of phase noise,<br />

we have here chosen the frequency domain approach described in [6].<br />

Using Equation (1) the CSD between the receivers <strong>and</strong> for free space<br />

propagation is derived as<br />

R ( , t) E x *<br />

tx()<br />

t<br />

(6)<br />

xm, n 0<br />

m n<br />

<br />

*<br />

j( m( t0) n( t0))<br />

Hm( c) Hn( c) Rs( )e <br />

R ( ) vm n<br />

(7)<br />

( )( ) ( ( 0 ) ( 0<br />

( )e j c mn m n<br />

e j t <br />

R<br />

t ))<br />

s<br />

Rvm,<br />

n( ),<br />

(8)<br />

for short measurement times. In the above equation, <br />

denotes Fourier transform<br />

<strong>and</strong> E <br />

is the expected value operator, () denotes complex conjugate,<br />

Hm( ) hm()<br />

t , Rs<br />

( ) is the PSD of the transmitted signal st () <strong>and</strong> Rvm n( )<br />

is the CSD between the noise in xm()<br />

t <strong>and</strong> xn()<br />

t .<br />

To estimate the TDOA we remove the influence of constant phase terms according<br />

to<br />

R<br />

( , t )<br />

xm, n 0<br />

xm, n<br />

( , t0)<br />

<br />

Rxm, n<br />

(0, t0)<br />

(9)<br />

R<br />

<br />

j( mn)<br />

e ,<br />

(10)<br />

where we have made the assumption that Rs( ) / Rs(0) 1without loss of generality,<br />

<strong>and</strong> the measurement time is sufficient such that the approximation Rvm n( ) 0<br />

can be made. The above equation shows that the phase reveals the TDOA:<br />

mnm n. By calculating estimates ˆ mn of the TDOA for multiple receiver<br />

pairs it is possible to solve for the transmitter position using Equation (3). Estimating<br />

is however not the focus of this paper, the rest of the paper will therefore<br />

concentrate on the two receiver case to highlight the effect of oscillator instability.<br />

In a practical application the CSD is estimated by sampling the time signals<br />

at the sample frequency , xm() t xm( n/ Fs)<br />

where , <strong>and</strong> splitting them<br />

into element segments<br />

L<br />

xm n k k<br />

<br />

R ( ) X ( , m) X ( , n),<br />

(11)<br />

where X ( k<br />

, m ) is the th FFT bin of sensor <strong>and</strong> signal segment .


Chapter 8: Localization Techniques<br />

381<br />

TF<br />

s s<br />

By studying Equation (11), we find that for low values of , i.e. when L ,<br />

K<br />

the approximation made in Equation (5) holds, <strong>and</strong> the phase is stable over the<br />

segments. A problem does however arise when the SNR is poor or when very<br />

high SNR levels are required. In these cases the value of must be large to reduce<br />

the impact of the noise on the TDOA estimate. From Equation (8) we can see that<br />

by adding components with different phase ( m( t) n( t ) will be different for different<br />

values of ) the effective SNR will drop as increases. As a result the TDOA<br />

estimation accuracy also drops as the measurement time increases.<br />

The solution to the problem is simply to estimate the TDOA mn()<br />

t over<br />

multiple short time samples whereby a simple incoherent data fusion (IDF) can be<br />

performed using time averaging:<br />

T<br />

ˆ 1<br />

<br />

() t<br />

(12)<br />

mn , mn ,<br />

T<br />

t 1<br />

The measurement time used to calculate each TDOA estimate, mn()<br />

t , is less<br />

than . The resulting algorithm is here denoted IDF-TDOA.<br />

4. Measurements<br />

4.1. Oscillator modeling<br />

The oscillator parameters <strong>and</strong> were estimated using the experimental<br />

setup depicted in Figure 3. The experiment was designed to make it possible to<br />

measure oscillator parameters without using a stable frequency reference. The input<br />

for the experimental setup was a signal generator <strong>and</strong> the signal was received <strong>and</strong><br />

saved to mass storage using a custom built data acquisition system. The signal<br />

generator was adjusted to a frequency 1 kHz above the tuning frequency for<br />

the two tuners.<br />

A simulation of the measurement setup was made in order to determine<br />

the flicker noise parameters. The PSD of the output signal yn ( ) for the measurement<br />

<strong>and</strong> the simulation setup is depicted in Figure 4. The measurement time was 30 s.<br />

The oscillator parameters were experimentally determined to be <br />

f<br />

0.0008<br />

<strong>and</strong> N = 3.8. The figure clearly show the low frequency characteristic of the flicker<br />

noise in the oscillator.


382 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 3. Experimental setup for evaluating oscillator stability<br />

Figure 4. PSD for simulation <strong>and</strong> experiment setup


Chapter 8: Localization Techniques<br />

383<br />

4.2. TDOA accuracy<br />

In order to investigate the effect of oscillator instability on TDOA estimation<br />

for varying measurement times the signal generator in Figure 3 was replaced by<br />

a vector signal generator generating a 10 kHz wide 8-PSK signal. In the experiment,<br />

independent white noise was added to the signal in the digital domain to study<br />

the effect of varying SNR. In Figure 5, the st<strong>and</strong>ard deviation in micro seconds<br />

is displayed as a function of measurement time for SNR levels of 65 dB, 25 dB <strong>and</strong><br />

5 dB, along with the CRB <strong>and</strong> the measurement system accuracy for TDOA <strong>and</strong><br />

IDF-TDOA. The constants <strong>and</strong> L 32 . The CRB is displayed for 5 dB <strong>and</strong><br />

25 dB SNR levels only. The st<strong>and</strong>ard deviation is estimated by calculating an estimate<br />

of the TDOA on 490 data segments drawn from 400 seconds of recorded data.<br />

The figure shows that the oscillator noise reduces the accuracy for long measurement<br />

times for traditional TDOA while the proposed IDF-TDOA is unaffected by<br />

the oscillator instability for long measurement times.<br />

Figure 5. St<strong>and</strong>ard deviation in micro seconds versus measurement time for TDOA <strong>and</strong> IDF-TDOA<br />

on measured signals. The red line shows the measured accuracy inherent to the system, <strong>and</strong> the black<br />

dotted lines the CRB. Note that the CRB is only displayed for 5 dB <strong>and</strong> 25 dB SNR<br />

The experiment described above was repeated in a simulated environment<br />

where the oscillator phase noise parameters estimated in Section 4.1 were used.<br />

The results are displayed in Figure 6. By comparing the results presented in Figure 5<br />

<strong>and</strong> 6 it becomes obvious that it is the phase noise that is causing the observed<br />

errors, <strong>and</strong> no other tuner parameter such as linearity or noise.


384 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

4.3. Results from a field experiment<br />

A field experiment was conducted in order to test the IDF-TDOA under real<br />

world conditions. A transmitter emitting a 10 kHz wide 8-PSK modulated pseudo<br />

r<strong>and</strong>om sequence centered at 306 MHz was recorded for 15.9 s. The transmitter<br />

output power was varied to achieve four different signal to noise ratios at the receivers.<br />

The distance between the receivers <strong>and</strong> the transmitter was around 5 km,<br />

<strong>and</strong> the experiment was conducted in an urban environment. The result for TDOA<br />

<strong>and</strong> IDF-TDOA is tabulated in Table 1 along with the CRB. The table shows that<br />

IDF-TDOA improves the accuracy by a factor of 3 to 5.8 depending on the SNR.<br />

The table also shows that the error is far above the CRB. The reason for this will<br />

however require further scrutiny <strong>and</strong> is beyond the scope of this paper.<br />

Table 1. TDOA st<strong>and</strong>ard deviation in micro seconds versus SNR<br />

SNR TDOA IDF-TDOA CRB<br />

30 0.6 0.2 0.002<br />

20 0.7 0.2 0.005<br />

10 1.5 0.3 0.02<br />

0 8.7 1.5 0.06<br />

5. Conclusions<br />

This paper investigates the effect of oscillators phase noise in tuners used for<br />

TDOA based radio geolocation of unknown signals. The presented theoretical<br />

study shows that the phase noise causes an effective decrease in the SNR if the rate<br />

of frequency change caused by the phase noise exceeds the measurement time. These<br />

results are used to propose a modification to the TDOA algorithm, <strong>and</strong> the final<br />

algorithm is denoted IDF-TDOA.<br />

Measurements on a tone using two tuners are used to estimate the spectral<br />

contents of the phase noise. The measured spectrogram is used to calibrate an FFT<br />

based phase noise model.<br />

Measurements on noise using the two tuners are used to investigate the effect<br />

of phase noise on TDOA estimation. The measurements are compared to the simulations<br />

<strong>and</strong> to the CRB. A comparison between the simulations <strong>and</strong> the measurements<br />

shows that it is the phase noise causing performance degradations.<br />

The paper is concluded with results from a field trial showing the effectiveness<br />

of the proposed new IDF-TDOA algorithm under real world conditions. The new<br />

algorithm outperforms traditional TDOA with respect to accuracy by a factor<br />

of 3 to 5.8 depending on the SNR.


Chapter 8: Localization Techniques<br />

385<br />

Figure 6. St<strong>and</strong>ard deviation in micro seconds versus measurement time for TDOA<br />

<strong>and</strong> IDF-TDOA on simulated signals. The black dotted lines shows the CRB. Note that the CRB<br />

is only displayed for 5 dB <strong>and</strong> 25 dB SNR<br />

References<br />

[1] D.H. a. D.D.E. Johnsson, Array Signal Processing: Concepts <strong>and</strong> Techniques, Upper<br />

Saddle River, New Jersey 07458: Prentice-Hall Inc., 1993.<br />

[2] W.R. a. T.S.A. Hahn, ”Optimum Processing for Delay-Vector Estimation in Passive<br />

Signal Arrays,” IEEE Transactions on <strong>Information</strong> THeory, vol. 19, nr 5, pp. 608-614,<br />

1973.<br />

[3] A. a. C.P.B. a. R.J.C. Carlson, Communication Systems, An introductions to signal<br />

<strong>and</strong> noise in electrical communication, Fourth edition, Mc Graw Hill, 2002.<br />

[4] W.J. Riley, H<strong>and</strong>book of frequency stability analysis, Boulder, COlorado U.S.<br />

Department of Commerce: National Institute od St<strong>and</strong>ards <strong>and</strong> <strong>Technology</strong>, 2008.<br />

[5] C.A. Greenhall, ”FFT-Based Methods for Simulatin Flicker (FM),” 34th Annual<br />

Precise Time <strong>and</strong> Time Interval (PTTI) Meeting, pp. 481-491, November 2002.<br />

[6] C.K. a. G. Carter, ”The generalized correlation method for estimation of time<br />

delay,” IEEE Transactions on Acoustics, Speech <strong>and</strong> Signal Processing, vol. 24, nr 4,<br />

pp. 320-327, 2003.


Aircraft Tracking Using Mobile Devices<br />

Michał Andrzejewski 1 , Radosław Schoeneich 2<br />

1<br />

Institute of Control <strong>and</strong> Computation Engineering, 2 Institute of Telecommunications,<br />

Warsaw University of <strong>Technology</strong>,<br />

M.Andrzejewski@stud.elka.pw.edu.pl, R.Schoeneich@tele.pw.edu.pl<br />

Abstract: The following article presents an overview of airship tracking system using mobile devices<br />

equipped with GPS receiver, running under Android operating system. It describes general approach,<br />

usage of store, carry <strong>and</strong> forward paradigm in delay <strong>and</strong> disruption tolerant networking <strong>and</strong><br />

elements of architecture <strong>and</strong> implementation of presented applications. Shown results represent tests<br />

run in real environment.<br />

Keywords: tracking, monitoring, general aviation, aircraft, disruption tolerant network, DTN<br />

I. Introduction<br />

The dynamic development of mobile devices <strong>and</strong> navigation systems in recent<br />

years has introduced many new everyday services. Among the most commonly<br />

used are location <strong>and</strong> remote monitoring. Their potential was quickly spotted by<br />

industries related to the transport <strong>and</strong> logistics, where knowledge about the current<br />

position <strong>and</strong> status of objects such as vehicles <strong>and</strong> packages is often a key factor<br />

in the success of the operation.<br />

The main task of the monitoring system is to provide reliable information<br />

about the position of tracked objects. This information can be interpreted <strong>and</strong><br />

used in different ways, depending on current needs. In general, however, it serves<br />

two basic purposes: to increase safety <strong>and</strong> to improve efficiency. Location data<br />

are widely used in planning <strong>and</strong> decision support systems, fleet management <strong>and</strong><br />

emergency assistance.<br />

Unfortunately, despite the continuous development of systems of various<br />

complexity, there is still no good solution that could be used to monitor general<br />

aviation aircraft. For commercial <strong>and</strong> military aviation, there are several extensive<br />

technical capabilities, such as primary or secondary surveilance radars or satellite<br />

systems capable to track objects in real time with very high accuracy. However,<br />

the cost of such solutions disqualifies them from usage in general aviation flying<br />

clubs, flight schools <strong>and</strong> by private users.


388 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Key idea of this article is to consider popular mobile devices (such as smartphones,<br />

tablets, Personal Digital Assistants) as a reliable source of location data<br />

<strong>and</strong> their usage in real application.<br />

II. Environment<br />

General aviation aircraft are moving in the sky at various altitudes <strong>and</strong> with<br />

different speeds, depending on the type of an airship, airspace category or purpose<br />

of the flight. However, assumption can be made that the vast majority of flights take<br />

place at an altitude up to 1000 m above the ground level at speeds not exceeding<br />

250 km/h. Flight paths at such altitude can be set freely, but near the airports some<br />

constraints <strong>and</strong> obligations to accurately proceed between specified points exist.<br />

General aviation flights may run across areas with different levels of urbanization,<br />

<strong>and</strong> at potentially large scale of height above ground level. This means that<br />

the use of GSM mobile network to monitor the aircraft may be inefficient or even<br />

impossible. This is due to cellular antennas settings. Additionally, the level of noise<br />

<strong>and</strong> interference caused by signals from nearby stations raises with the altitude.<br />

In practice, however, very often even at the height of up to 1500 meters mobile<br />

network is available, <strong>and</strong> quality of connection allows data transmission. Making<br />

a voice call is however not possible at this altitude. This makes an opportunity<br />

of creating simple tracking system based on GSM-capable devices <strong>and</strong> data transmission<br />

provided by mobile telephony operators. Results obtained in this field are<br />

presented later in this article.<br />

The environment in which flights are made, is a challenge for active position<br />

monitoring systems. Continuity <strong>and</strong> quality of data transmission becomes a major<br />

issue. Direct use of GSM network as a way to transmit information related to<br />

the location may not give expected results in terms of reliability <strong>and</strong> availability.<br />

This is an area where algorithms developed for use in incoherent networks may be<br />

applied. Their essence is to enable operation in the harsh environment of unknown<br />

characteristics.<br />

III. Subject of research<br />

The main task <strong>and</strong> also the source of the biggest problems of active monitoring<br />

systems is to develop a suitable method for data transmission. Such method,<br />

consisting of software <strong>and</strong> technology, should provide high availability <strong>and</strong> reliability.<br />

In the perfect case, monitored object should always have the possibility<br />

of an effective data transmission.<br />

The research, which became the basis for this article was focused on:<br />

• exploring the possibilities of using mobile devices <strong>and</strong> GSM networks to<br />

keep track of general aviation aircraft,


Chapter 8: Localization Techniques<br />

389<br />

• testing <strong>and</strong> evaluating prototype of aircraft tracking system in a real environment,<br />

• identification of advantages <strong>and</strong> disadvantages of the proposed solution,<br />

• proposing possible directions of development <strong>and</strong> improvement of the system.<br />

During the developement of an aircraft monitoring system, the natural<br />

choice was to provide transmission using wireless communications. The concept<br />

of the satellite communication solutions was rejected because of their high cost.<br />

Emphasis has been placed on technologies directly offered by mobile devices with<br />

data transmission over GSM network in particular. Fig. 1 presents the basic scenario<br />

where proposed system, in addition to direct communication between the aircraft<br />

<strong>and</strong> data collection server, uses also the paradigm of data storage <strong>and</strong> forwarding.<br />

This approach, commonly referred to as a store-carry-forward paradigm, is specific<br />

to delay <strong>and</strong> disruption tolerant networks. The aircraft marked as SP1 is out<br />

of GSM coverage, so it can not send data on the position in a direct way. Using<br />

a wireless network, it communicates <strong>and</strong> exchanges all necessary information<br />

with the aircraft marked as SP2. The aircraft SP2 can then forward information<br />

regarding both objects to the server collecting data. The system has information<br />

about the positions of both vessels despite the fact that SP1 is not in a GSM range<br />

to establish a direct connection.<br />

Figure 1. Wireless data transmission scenario<br />

Wireless communication channel between objects must meet the following<br />

conditions for its use in the proposed system to be possible:<br />

• time required to estabilish two-way communication channel <strong>and</strong> its effective<br />

range should allow data exchange between aircraft flying in opposite<br />

directions at speeds of around 150 km/h,<br />

• each pair of nodes using appropriate software should be able to connect<br />

automatically in the same way,<br />

• estabilishing the connection shouldn't require any additional operations<br />

from the user.


390 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Lack of any of these features reduces the area of application of wireless communication<br />

between the aircraft <strong>and</strong> makes it difficult to achieve given functionality.<br />

A. Architecture of aircraft tracking system<br />

The system this research has been based on is divided into two parts, performing<br />

distinct functions <strong>and</strong> embedded in different environments, as shown<br />

in the Fig. 2. It separates two basic areas of functionality – one related to the collection<br />

<strong>and</strong> transmission of data carried by the mobile application, <strong>and</strong> the other responsible<br />

for their analysis <strong>and</strong> visualization using an application server. It was a natural approach,<br />

given the purpose <strong>and</strong> the use of both items supplied in two applications.<br />

Figure 2. Aircraft tracking system architecture<br />

Mobile devices transmit files to an FTP server using the best currently available<br />

mean of communication. This can be a 2G/3G mobile network, Wi-Fi or another,<br />

depending on the particular device. If estabilishment of a direct connection<br />

to a remote server hosting the data is impossible due to lack of network coverage,<br />

high levels of noise, latency, or other actual problems, the application uses the storecarry-forward<br />

paradigm <strong>and</strong> gathers data locally. At a time when it is again possible<br />

to transfer data to another node, the device acts as discussed before.<br />

An attempt to transfer data to the server is controlled by an event timer –<br />

the expiration of the specified period of time since the last attempt to send or other<br />

parameters associated with the flight.<br />

Before a file is put on the FTP server, its validity is checked, <strong>and</strong> the transmission<br />

is performed only when attempting to send a file containing more data<br />

than the former. This allows nodes that are willing to send data less accurate<br />

than those already stored on the server not to overwrite <strong>and</strong> lose them.


Chapter 8: Localization Techniques<br />

391<br />

In order to simplify whole process <strong>and</strong> increase the reliability of data exchange<br />

between system elements, it was decided to use one common data model. This allows<br />

the system architecture as a whole to remain open, since all it requires is that<br />

the source data have a specific format.<br />

Usage of database management systems was rejected <strong>and</strong> flat text files in a specified<br />

comma separated values format were used instead. This reduces the requirements<br />

for the server, simplifies the implementation <strong>and</strong> developement of the solution <strong>and</strong><br />

allows further analysis using common tools. Text files can still be imported <strong>and</strong><br />

stored in a database when necessary.<br />

B. Technical limitations<br />

Available methods for wireless connectivity between mobile devices are limited<br />

to two common st<strong>and</strong>ards: IEEE 802.15.1 (Bluetooth) <strong>and</strong> Wi-Fi.<br />

The first one has too short range in order to be used for communication between<br />

aircraft in flight. For this purpose it is necessary to estabilish an effective connection<br />

between the devices in a distance of at least 300 meters, while Bluetooth allows<br />

efficient transmission at a distance several times smaller. In addition, the process<br />

of finding neighboring nodes using this method can take tens of seconds. The use<br />

of Bluetooth in incoherent networks is possible, but requires distances between<br />

nodes to be small, as well as their relative speeds [1].<br />

Use of Wi-Fi networking was a natural choice. Despite the low power of transmitters<br />

mounted in mobile devices, it was possible to connect two nodes within a distance<br />

of about 200 meters apart in the open area. One of the devices, the Samsung<br />

Galaxy tablet, worked as an access point, while the second – LG-GT540 mobile<br />

phone – as a client. This combination allowed a stable exchange of data at speeds<br />

of about 100 kbps. Unfortunately, the long time needed to set up an access point <strong>and</strong><br />

then to connect the other device (in this particular case – a total of more than 45<br />

seconds) <strong>and</strong> the need for manual adjustment of connection parameters prevented<br />

this method from the application in the system.<br />

In the course of the work it was discovered that the mobile device platform<br />

capabilities are insufficient to meet all the required functionality. The main limitation<br />

was the lack of ability to automatically establish a wireless connection in adhoc<br />

mode between devices without user intervention. This feature is essential<br />

for establishing a connection in an incoherent network <strong>and</strong> the exchange of data<br />

between nodes. Application Programming Interface of Android operating system<br />

used in experiments does not support such mechanism, nor is it possible to emulate.<br />

There is also no documentation on this issue available.<br />

Further studies show that the mechanism for supporting automatic wireless<br />

connections between mobile devices is not available on any other of the popular<br />

platforms.


392 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Therefore, it was impossible to verify <strong>and</strong> evaluate inconsistent network<br />

performance in practice. The actual implementation required from the operating<br />

system <strong>and</strong> the mobile device functionality, which it was not able to provide. Perhaps<br />

in the future, with the development in this field of technology, this will become<br />

possible. After examining the possibility to connect the devices during the flight<br />

(discussed further in the next section) it was decided to ab<strong>and</strong>on the functionality<br />

associated with the use of incoherent network in the proposed system.<br />

IV. Tests <strong>and</strong> results<br />

An important element of the work was to conduct several series of tests, not<br />

only to check the correctness of the implemented system, but also its usefulness<br />

in proposed applications. Results were used to verify presented concepts <strong>and</strong> theoretical<br />

considerations in actual, real environment.<br />

Tests in the target environment were divided into three stages. In the first,<br />

a prototype of mobile application was used. It was able to collect environmental<br />

data, such as the GSM signal strength, network mode, the height <strong>and</strong> position<br />

of the airship, etc. In addition, the aircraft was equipped with a second instrument<br />

– Garreht Volkslogger – which is a logger device certified by the International Air<br />

Sports Federation used to record position in gliding competitions. At this stage,<br />

the ability to perform data transmission using the GSM network at different heights<br />

was verified. Another income was the examination of GPS receiver accuracy by<br />

reference to the indications presented by the certified device. This part of the test<br />

was conducted in May <strong>and</strong> June 2011.<br />

The second step was to test the basic, working implementation of aircraft<br />

monitoring system between July <strong>and</strong> October 2011. The system was used to monitor<br />

the position of student pilots <strong>and</strong> pilots during training in the area of Warsaw-<br />

Babice airfield.<br />

The last stage completed in November 2011 was to test the operation of the system<br />

in the mountainous region. Differences in system’s behavior were identified <strong>and</strong><br />

investigated basing on analysis of data collected during the flights in the vicinity<br />

of Bezmiechowa. Some additional opportunities for air-to-ground communications<br />

were diagnosed.<br />

A. Collecting data about environment<br />

Fig. 3 shows the altitude above mean sea level <strong>and</strong> GSM signal strength<br />

during one of the flights. The value of the signal strength equal to -113 dBm<br />

is identified as the inability to connect to the network. Data were sampled with<br />

a period of 30 seconds.<br />

Obtained results differed significantly from what was expected. It was anticipated<br />

that the range of the GSM network will be unavailable for much of the flight because


Chapter 8: Localization Techniques<br />

393<br />

of the altitude <strong>and</strong> its characteristics. Data collected during the first test flights, however,<br />

revealed that GSM network was available up to a height of about 1400 meters<br />

above terrain at urban areas throughout the duration of the flight. This is the result<br />

of reflection <strong>and</strong> reinforcement of radio waves from the ground, buildings, etc.<br />

Figure 3. Altitude <strong>and</strong> GSM signal strength correlation<br />

Position samples collected by the mobile device does not differ significantly<br />

from those provided by a professional logger. The maximum absolute error<br />

was 8 meters for static measurement <strong>and</strong> 25 meters for the measurement of motion<br />

on average. Errors associated with determining the height were greater, however<br />

they did not exceed 75 meters.<br />

During one of the flights, an attempt to establish a wireless connection using<br />

Wi-Fi network between two parallel flying aircraft was made. They were flying<br />

at an altitude of 500 meters at speeds of 120 km/h. The distance between objects<br />

was 150 meters. On board one of the aircrafts was a device which acted as an access<br />

point, while the second tried to connect to that network. An access point was seen<br />

by the other device, but the connection could not been established. Performed test<br />

showed that in given conditions it is not possible to create <strong>and</strong> use Wi-Fi networking.<br />

Results confirmed however, that the use of mobile devices for determining<br />

the position is sufficiently accurate for use in most of the monitoring applications.<br />

The quality of connections over the GSM network was sufficient for efficient transmission<br />

of data text files within a given height of 0-1000 meters.<br />

B. Tests in lowl<strong>and</strong> area<br />

Most of the testing was made in the lowl<strong>and</strong>s, because it is an environment<br />

in which the highest number of general aviation flights are performed. The mobile<br />

device was installed on board several aircrafts operating various types of flights<br />

in the northern area of Mazovia region. Position of the aircraft was observed<br />

in visualisation system <strong>and</strong> verified with reports collected via VHF radio. Between<br />

July <strong>and</strong> November 2011, 28 such flights were made. Below analysis in Tab. I shows<br />

12 flights selected of them.


394 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Flight #<br />

Table I. Results of tests in lowl<strong>and</strong> area<br />

Time in seconds [s]<br />

Flight duration MTBT a ATBT b<br />

1 3716 231 218<br />

2 6642 212 201<br />

3 823 180 164<br />

4 9144 288 234<br />

5 5323 222 190<br />

6 6006 265 207<br />

7 4571 303 253<br />

8 5701 281 219<br />

9 3122 201 183<br />

10 6717 568 305<br />

11 1559 180 173<br />

12 1287 180 160<br />

a) Maximum Time Between air-to-ground Transmissions<br />

b) Average Time Between air-to-ground Transmissions<br />

The most important parameter of such system is the location data refresh<br />

rate, understood as time between air-to-ground communication. <strong>Information</strong><br />

about the successful upload to the server are recorded in the logs, so it is possible<br />

to calculate the time between successive transmissions. During the test, the interval<br />

of 180 seconds was set up to make updates of the data as frequent as possible,<br />

but not to excessively exhaust the battery. Tab. I shows a summary of flight time,<br />

the value of the maximum interval between transmissions of data <strong>and</strong> the average.<br />

Both of these times directly translate to the refresh rate of position data, therefore<br />

it is desired to minimize both of them.<br />

Each of the flights presented in a table has taken place in different weather<br />

conditions, using a different route <strong>and</strong> at different heights. For this reason it is<br />

impossible to directly compare obtained results. Obtained average values for each<br />

flight lead to the conclusion that despite initial concerns related to the use of GSM<br />

network for data transmission, the frequency of updating information about<br />

the position of the aircraft is sufficient for the intended application.<br />

C. Tests in mountainous area<br />

The usefulness of the system to monitor flights taking place in a mountainous<br />

environment, due to potential differences in performance, was also tested. The research<br />

was focused on the influence of the location of GSM network base stations<br />

on the system effectiveness, compared to the results collected before. In the moun-


Chapter 8: Localization Techniques<br />

395<br />

tainous terrain antennas are placed on the tops of hills to embrace the largest area<br />

lying below. It was expected that due to the smaller than in the lowl<strong>and</strong>s height<br />

difference between GSM transmitter <strong>and</strong> the aircraft, the average interval between<br />

transmissions would be smaller. Because of the weather conditions, only 3 flights<br />

were made, as shown below.<br />

Flight #<br />

Table II. Results of tests in mountainous area<br />

Flight duration<br />

Time in seconds [s]<br />

c<br />

MTBT<br />

ATBT d<br />

1 1232 180 176<br />

2 747 180 172<br />

3 1338 191 186<br />

c) Maximum Time Between Transmissions<br />

d) Average Time Between Transmissions<br />

During the first flight, it turned out that in close proximity to one of the mountain<br />

ranges it is possible to connect to public Wi-Fi network. Its access point<br />

was located near one of the hotels <strong>and</strong> its range included a substantial portion<br />

of the ridge. The results of the flights are shown in Tab. II taking both transmission<br />

methods into account.<br />

The achieved results confirmed that the air-to-ground communication using<br />

the Wi-Fi st<strong>and</strong>ard during the flight is possible, though available only in specific<br />

conditions. Shortening the average interval between transmissions is the result<br />

of virtually uninterrupted stay of the aircraft in a GSM network <strong>and</strong> usage of availible<br />

Wi-Fi for data transmission.<br />

V. Conclusions<br />

The results of the analyzed system, based on data collected during test flights,<br />

were better than expected. It was possible to obtain better average refresh interval<br />

of location data then initially planned. Value of 300 seconds was thought as satisfactory,<br />

while the average value for 12 flights in a lowl<strong>and</strong> area was 209 seconds.<br />

Increasing the frequency of data transmissions could further improve this value,<br />

however, this would be associated with an increased resource consumption.<br />

Area of testing had a significant impact on the results. Analyzed flights were<br />

made up of several dozen kilometers from Warsaw agglomeration <strong>and</strong> mostly<br />

ran above the urban areas. Execution of test flights over areas characterized by poor<br />

coverage of GSM network is likely to lead to a deterioration of results.<br />

Analysis of the system in mountainous terrain allowed the discovery of additional<br />

options – usage of Wi-Fi networks for data transmission. Thanks to this observation,<br />

capabilities of mobile applications were increased <strong>and</strong> results could be improved.


396 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The biggest obstacle in the development of the system is lack of possibility to<br />

create automatic connections between devices on an ad-hoc basis. This prevents<br />

direct application of the store-carry-forward paradigm, which could significantly<br />

improve performance.<br />

References<br />

[1] M. Liberatore, B.N. Levine, <strong>and</strong> C. Barakat, “Maximizing transfer opportunities<br />

in bluetooth DTNs”, Proc. CoNEXT, 2006.


Index


A<br />

Adrat Marc 81, 171<br />

Åkermark Hans 135<br />

Amanowicz Marek 55, 277, 333<br />

Andrzejewski Michał 387<br />

Anton Constantin 107<br />

Antweiler Markus 81, 161, 171<br />

Aubrecht Vladimir 67<br />

B<br />

Bloebaum Trude H. 9<br />

Bronk Krzysztof 215<br />

Bryś Rafał 289<br />

C<br />

Caban Przemysław 9<br />

Chaudhary Muhammad Hafeez 247<br />

D<br />

Debbah Mérouane 229<br />

Dołowski Jerzy 55<br />

E<br />

Ebinger Peter 349<br />

Elders-Boll Harald 171<br />

G<br />

Gajewski Piotr 151, 367<br />

Głowacka Joanna 277<br />

Goetz Michael 27<br />

Golan Edward 99<br />

Grzybkowski Maciej J. 215<br />

H<br />

Hedström Patrik 377<br />

I<br />

Idzikowska Ewa 117<br />

Ionescu Laurenţiu 107<br />

J<br />

Johansson Anders M. 377<br />

Johnsen Frank T. 9<br />

K<br />

Kaniewski Paweł 151<br />

Kelner Jan M. 367<br />

Koutny Tomas 67<br />

Kraśniewski Adam 99<br />

Krygier Jarosław 307<br />

Kuijper Arjan 349<br />

L<br />

Leduc Jan 161, 171<br />

Le Martret Christophe J. 229<br />

Le Nir Vincent 187, 201<br />

Liedtke Ferdin<strong>and</strong> 81<br />

M<br />

Mahoney Austin 135<br />

Marks Michał 319<br />

Maseng Torleiv 161<br />

Matyszkiel Robert 151<br />

Mazăre Alin 107<br />

N<br />

Nabrdalik Filip 319<br />

Niewiadomska-Szynkiewicz Ewa 319<br />

Niski Rafał 215<br />

Nissen Ivor 27<br />

O<br />

Osten Tobias 171<br />

P<br />

Pszczółkowski Jacek 289<br />

R<br />

Romanik Janusz 99


400 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Rose Luca 229<br />

Ruszkowski Mirosław 289<br />

S<br />

Saarnisaari Harri 265<br />

Scheers Bart 135, 187, 201, 247<br />

Schenkels Léon 9<br />

Schoeneich Radosław 387<br />

Şerban Gheorghe 107<br />

Singh Sarvpreet 81<br />

Skarżyński Paweł 99<br />

Suchański Marek 151<br />

Ś<br />

Śliwa Joanna 9<br />

T<br />

Teguig Djamel 187<br />

Tschauner Matthias 81<br />

Turčaník Michal 45<br />

Tutănescu Ion 107<br />

U<br />

Urban Robert 99<br />

V<br />

Vanninen Teemu 265<br />

W<br />

Wawryszczuk Marcin 333<br />

Wolthusen Stephen D. 349<br />

Z<br />

Ziółkowski Cezary 367<br />

Ż<br />

Żurek Jerzy 215

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!