Military Communications and Information Technology: A Trusted ...
Military Communications and Information Technology: A Trusted ...
Military Communications and Information Technology: A Trusted ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Military</strong> <strong>Communications</strong><br />
<strong>and</strong> <strong>Information</strong> <strong>Technology</strong>:<br />
A <strong>Trusted</strong> Cooperation Enabler<br />
Volume 2<br />
Warsaw 2012
Reviewers:<br />
Prof. Milan Šnajder, LOM Praha, Czech Republic<br />
Prof. Andrzej Dąbrowski, Warsaw University of <strong>Technology</strong>, Pol<strong>and</strong><br />
Editor:<br />
Marek Amanowicz<br />
Co-editor:<br />
Peter Lenk<br />
© Copyright by Redakcja Wydawnictw Wojskowej Akademii Technicznej.<br />
Warsaw 2012<br />
ISBN 978-83-62954-31-5<br />
ISBN 978-83-62954-52-0<br />
Publication qualified for printing without editorial alterations made by the MUT<br />
Publishing House.<br />
DTP: Martyna Janus<br />
Cover design: Barbara Chruszczyk<br />
Publisher: <strong>Military</strong> University of <strong>Technology</strong><br />
Press: P.P.H. Remigraf Sp. z o.o., ul. Ratuszowa 11, 03-450 Warszawa<br />
Warsaw 2012
Contents<br />
Foreword ............................................................................ 5<br />
Chapter 5<br />
Tactical <strong>Communications</strong> <strong>and</strong> Networks ................................................ 7<br />
SOA over Disadvantaged Grids Experiment <strong>and</strong> Demonstrator ............................... 9<br />
Frank T. Johnsen, Trude H. Bloebaum, Léon Schenkels <strong>and</strong> team,<br />
Joanna Śliwa, Przemysław Caban<br />
GUWMANET – Multicast Routing in Underwater Acoustic Networks ........................ 27<br />
Michael Goetz, Ivor Nissen<br />
Network Routing by Artificial Neural Network ............................................ 45<br />
Michal Turčaník<br />
An Application of Chord Structure in Tactical Ad-hoc Network .............................. 55<br />
Jerzy Dołowski, Marek Amanowicz<br />
Revisiting the DARPA’s Idea of a Programmable Network ................................... 67<br />
Vladimir Aubrecht, Tomas Koutny<br />
Selection <strong>and</strong> Investigation of a Civil Wideb<strong>and</strong> Waveform for Potential <strong>Military</strong> Use ........... 81<br />
Ferdin<strong>and</strong> Liedtke, Matthias Tschauner, Sarvpreet Singh, Marc Adrat, Markus Antweiler<br />
Experimental Performance Evaluation of the Narrowb<strong>and</strong> VHF Tactical IP Radio<br />
in Test-Bed Environment .............................................................. 99<br />
Edward Golan, Adam Kraśniewski, Janusz Romanik, Paweł Skarżyński, Robert Urban<br />
Hybrid Error Detecting <strong>and</strong> Correcting System Using Hardware Associative Memories .......... 107<br />
Ion Tutănescu, Constantin Anton, Laurenţiu Ionescu, Gheorghe Şerban, Alin Mazăre<br />
Concurrent Error Detection Scheme for HaF Hardware .................................... 117<br />
Ewa Idzikowska<br />
Chapter 6<br />
Spectrum Management <strong>and</strong> Software Defined Radio Techniques ........................ 133<br />
A Realistic Roadmap for the Introduction of Dynamic Spectrum Management<br />
in <strong>Military</strong> Tactical Radio Communication .............................................. 135<br />
Bart Scheers, Austin Mahoney, Hans Åkermark<br />
Dynamic Spectrum Management in Legacy <strong>Military</strong> Communication Systems ................ 151<br />
Marek Suchański, Paweł Kaniewski, Robert Matyszkiel, Piotr Gajewski<br />
Spectrum Issues of NATO Narrowb<strong>and</strong> Waveform ........................................ 161<br />
Jan Leduc, Markus Antweiler, Torleiv Maseng
4 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Legacy Waveforms on Software Defined Radio: Can Hierarchical Modulation<br />
Offer an Added Value to SDR Operators ................................................ 171<br />
Marc Adrat, Tobias Osten, Jan Leduc, Markus Antweiler, Harald Elders-Boll<br />
Data Fusion Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networks .......... 187<br />
Djamel Teguig, Bart Scheers, Vincent Le Nir<br />
Implementation of an Adaptive OFDMA PHY/MAC on USRP Platforms for<br />
a Cognitive Tactical Radio Network .................................................... 201<br />
Vincent Le Nir, Bart Scheers<br />
Validation of the ITU 1546 L<strong>and</strong>-Sea Propagation Model for the 900 MHz B<strong>and</strong> .............. 215<br />
Krzysztof Bronk, Rafał Niski, Jerzy Żurek, Maciej J. Grzybkowski<br />
Chapter 7<br />
Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks ......................................... 227<br />
Algorithms for Channel <strong>and</strong> Power Allocation in Clustered Ad hoc Networks .................. 229<br />
Luca Rose, Christophe J. Le Martret, Mérouane Debbah<br />
High Spatial-Reuse Distributed Slot Assignment Protocol for Wireless Ad-hoc Networks ......... 247<br />
Muhammad Hafeez Chaudhary, Bart Scheers<br />
Hybrid Network Synchronization for MANETs ........................................... 265<br />
Harri Saarnisaari, Teemu Vanninen<br />
Application of Dezert-Smar<strong>and</strong>ache Theory for Tactical MANET Security Enhancement ........ 277<br />
Joanna Głowacka, Marek Amanowicz<br />
Mechanisms of Ad-hoc Networks Supporting Network Centric Warfare ...................... 289<br />
Rafał Bryś, Jacek Pszczółkowski, Mirosław Ruszkowski<br />
Using Network Coding in 6LoWPAN WSNs ............................................. 307<br />
Jarosław Krygier<br />
Testbed Implementation of Energy Aware Wireless Sensor Network .......................... 319<br />
Ewa Niewiadomska-Szynkiewicz, Michał Marks, Filip Nabrdalik<br />
An Energy Aware Self-Configured Wireless Sensor Network ................................ 333<br />
Marcin Wawryszczuk, Marek Amanowicz<br />
Chapter 8<br />
Localization Techniques ............................................................ 347<br />
Enhanced Location Tracking for Tactical MANETs Based on Particle Filters<br />
<strong>and</strong> Additional <strong>Information</strong> Sources .................................................... 349<br />
Peter Ebinger, Arjan Kuijper, Stephen D. Wolthusen<br />
Spatial Localisation of Radio Wave Emission Sources Using SDF <strong>Technology</strong> .................. 367<br />
Jan M. Kelner, Piotr Gajewski, Cezary Ziółkowski<br />
On the Effect of Tuner Phase Noise on TDOA Measurements ............................... 377<br />
Anders M. Johansson, Patrik Hedström<br />
Aircraft Tracking Using Mobile Devices ................................................. 387<br />
Michał Andrzejewski, Radosław Schoeneich<br />
Index ............................................................................. 397
Foreword<br />
Modern military operations are conducted in a complex, multidimensional<br />
<strong>and</strong> disruptive environment. The challenging political <strong>and</strong> social environment<br />
of the operations necessitates establishing coalitions, consisting of many different<br />
partners of differing levels of trust, e.g. partners from NATO nations, as well<br />
as non-NATO nations <strong>and</strong> others such as the local government bodies <strong>and</strong> local<br />
forces. Tight collaboration with these partners <strong>and</strong> the guarantee that the appropriate<br />
information is shared within the community is vital to the mission efficiency.<br />
This also requires underst<strong>and</strong>ing of these differences <strong>and</strong> greater trust as well as<br />
acceptance of the greater risk involved.<br />
Dynamic environmental changes <strong>and</strong> limitations of the technical infrastructure<br />
assets creates additional challenging issues for the effective collaboration<br />
of the coalition partners. The fragile nature of the communications infrastructure,<br />
especially at the tactical level, requires robust methods <strong>and</strong> mechanisms to<br />
deal with long delays, communication failures or disconnections <strong>and</strong> available<br />
b<strong>and</strong>width limitations.<br />
These all necessitate a better underst<strong>and</strong>ing of the environmental conditions<br />
<strong>and</strong> appropriate procedural actions, as well as strong technological support, to<br />
provide the required levels of interoperability, flexibility, security <strong>and</strong> trusted collaboration<br />
in connecting heterogeneous systems of all parties involved in the action.<br />
Many research efforts aimed at the elaboration <strong>and</strong> implementation of innovative<br />
communications <strong>and</strong> information technologies for military systems,<br />
enabling trusted information exchange <strong>and</strong> successful collaboration in disadvantaged<br />
environments, have been undertaken world-wide. The latest selected<br />
results of such activities that include novel concepts for military communications<br />
<strong>and</strong> information systems, as well as innovative technological solutions, are<br />
presented in this book.<br />
The book contains the papers originally submitted to the 14 th <strong>Military</strong> <strong>Communications</strong><br />
<strong>and</strong> <strong>Information</strong> Systems Conference (MCC) held on 8–9 October 2012<br />
in Gdansk, Pol<strong>and</strong>. The MCC is an annual event that brings together experts from<br />
research establishments, industry <strong>and</strong> academia, from around the world, as well<br />
as representatives of the military <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> Systems<br />
community. The conference provides a useful forum for exchanging ideas on the<br />
development <strong>and</strong> implementation of new technologies <strong>and</strong> military CIS services.
6<br />
<strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
It also creates a unique opportunity to discuss these issues from different points of<br />
view <strong>and</strong> share experiences amongst European Union <strong>and</strong> NATO CIS professionals.<br />
The papers included in this book are split into two volumes, each contains<br />
selected issues that correspond to the conference topics, <strong>and</strong> reflect the technology<br />
advances supporting trusted collaboration of all parties involved in joint<br />
operations. The first volume is focused on: Concepts <strong>and</strong> Solutions for <strong>Communications</strong><br />
<strong>and</strong> <strong>Information</strong> Systems, <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong><br />
for <strong>Trusted</strong> <strong>Information</strong> Sharing, <strong>Information</strong> <strong>Technology</strong> for Interoperability <strong>and</strong><br />
Decision Support Enhancement <strong>and</strong> <strong>Information</strong> Assurance & Cyber Defence, while<br />
the latter on the following: Tactical <strong>Communications</strong> <strong>and</strong> Networks, Spectrum<br />
Management <strong>and</strong> Software Defined Radio Techniques, Mobile Ad-hoc & Wireless<br />
Sensor Networks <strong>and</strong> Localization Techniques.<br />
The editors would like to take this opportunity to express their thanks to the<br />
authors <strong>and</strong> reviewers for their efforts in the preparation of this book. We trust<br />
that the book will contribute to a better underst<strong>and</strong>ing of the challenging issues in<br />
trusted collaboration in modern operations, scientific achievements <strong>and</strong> available<br />
solutions that mitigate the risk <strong>and</strong> increase the efficiency of information exchange<br />
in hostile <strong>and</strong> disruptive environments. We believe that the readers will find the<br />
content of the book both useful <strong>and</strong> interesting.<br />
Marek Amanowicz<br />
Peter Lenk
Chapter 5<br />
Tactical <strong>Communications</strong><br />
<strong>and</strong> Networks
SOA over Disadvantaged Grids Experiment<br />
<strong>and</strong> Demonstrator<br />
Frank T. Johnsen 2 , Trude H. Bloebaum 2 , Léon Schenkels <strong>and</strong> team 1, 3 ,<br />
Joanna Śliwa 4 , Przemysław Caban 4<br />
2 FFI, Norway,<br />
frank-trethan.johnsen@ffi.no, trude-hafsoe.bloebaum@ffi.no<br />
3 NC3A, Netherl<strong>and</strong>s, Leon.Schenkels@nc3a.nato.int<br />
4 <strong>Military</strong> Communication Institute, Zegrze, Pol<strong>and</strong>,<br />
{j.sliwa, p.caban}@wil.waw.pl<br />
Abstract: The objective of the IST-090 group is to investigate challenges of SOA applications in disadvantaged<br />
networks. The group studies possible solutions that can improve the overall efficiency<br />
of information dissemination when facing different disruptions. This paper presents lessons learned<br />
from the real-life experiment <strong>and</strong> demonstration that was carried out by IST-090 group members<br />
during the MCC 2011 conference. We evaluated several solutions, namely the WS-DDS interface,<br />
the DSProxy, the Mist protocol, <strong>and</strong> ESBs that were used as SOA solutions enabling efficient information<br />
exchange in a disadvantaged environment. The experiment was preceded by separate tests of each<br />
solution. However, in the combined scenario, the aim was to evaluate the interoperability of these<br />
solutions <strong>and</strong> define a long-term plan for either their application in operations or for further functionality<br />
development. The paper gives an overview of the solutions we investigated, presents a rough<br />
model of the network environment used, <strong>and</strong> discusses the results observed <strong>and</strong> the lessons learned.<br />
Keywords: component; Web services, publish-subscribe, DDS<br />
I. Introduction<br />
NATO is a strategic organization, <strong>and</strong>, as such, the vast majority of the communications<br />
infrastructure that is used <strong>and</strong> deployed by NATO is in the strategic<br />
realm of static headquarters <strong>and</strong> Forward Operating Bases (FOB). These tend to be<br />
served by high speed LAN <strong>and</strong> WAN communications, with low latency <strong>and</strong> high<br />
b<strong>and</strong>width. However, under the NATO Network Enabled Capability (NNEC) vision,<br />
the stovepipe systems of the past, offering services <strong>and</strong> applications to a limited, geographically<br />
co-located group of users will shift to a dynamic federation of systems,<br />
which will allow services previously only available within the strategic domain to be<br />
made available in the tactical domain. Likewise, situational awareness information<br />
1<br />
The NC3A team members: Rui Fiske, Marc van Selm, Vincenzo de Sortis, <strong>and</strong> Aad van der Z<strong>and</strong>en
10 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
needs to be fed from the tactical domain into the strategic domain to better inform<br />
planning <strong>and</strong> operational decision making. This necessarily involves increased<br />
transfer of data across tactical links with constrained communications pathways<br />
in both directions. There is no clear solution yet from industry that will support<br />
these requirements <strong>and</strong> so NATO <strong>and</strong> the member nations themselves need to devise<br />
suitable mechanisms. The experiment described in this paper is meant to discover<br />
how solutions may be applied in relation to the anticipated use of services in NNEC.<br />
Within the NATO <strong>and</strong> coalition enterprise, there are a wide range of network<br />
conditions <strong>and</strong> communications environments. The architects <strong>and</strong> developers<br />
of most Functional Area Services (FAS), <strong>and</strong> often those looking at Service-Oriented<br />
Architecture (SOA) in particular, tend to consider only high b<strong>and</strong>width, low latency<br />
local area networks. They find that their applications tend to work well in these<br />
static environments, with low response times, even for large messages. However,<br />
thought also needs to be given to the frontline staff; those connected only between<br />
themselves by Mobile Ad Hoc Networks (MANETs), or by satellite <strong>and</strong> radio connections<br />
back to their FOBs. For these users of systems, how does the NNEC SOA<br />
paradigm deliver the most significant <strong>and</strong> timely information to them without<br />
the provision of a “LAN to the man”<br />
The RTO Group, IST-090, has been tasked with looking at the challenges <strong>and</strong><br />
potential solutions that can be used for SOA over disadvantaged grids [1]. A number<br />
of NATO member nations were involved in the group, information was shared <strong>and</strong><br />
experiments were conducted together, in order to test the various approaches that<br />
had been suggested <strong>and</strong> developed. A number of IST-090 members were invited<br />
to speak at the <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> Systems Conference<br />
(MCC) in Amsterdam in October 2011. As part of the conference, IST-090 was assigned<br />
a special area of the conference venue in order to demonstrate the benefits<br />
of the various solutions that had been presented. As part of this, further experiments<br />
were conducted over a dynamic network, provided by Norwegian <strong>and</strong> NC3A-owned<br />
MANET components. This would provide a real, unreliable network environment<br />
to assess the actual value of the solutions, <strong>and</strong> allow further experimentation with<br />
the MANETs themselves.<br />
This paper gives a detailed description of the test environment, test plan <strong>and</strong> test<br />
results that were conducted <strong>and</strong> observed at the conference. It describes the network,<br />
<strong>and</strong> various SOA-supporting solutions that were deployed by the group members,<br />
<strong>and</strong> assesses how each of them provides lessons to consider when designing services<br />
<strong>and</strong> systems to be used over poor communications channels. Many different<br />
potential approaches were identified, many of which could be combined to offer<br />
a range of network-optimization techniques.<br />
The remainder of the paper is organized as follows: In Section II we present<br />
the motivation for pursuing a pervasive SOA in military networks. Related work<br />
is discussed in Section III. Section IV covers our joint experiment – the setup,<br />
the execution, <strong>and</strong> the lessons learned. Finally, Section V concludes the paper.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
11<br />
II. SOA motivation<br />
SOA, realized by Web services technology, has been identified as the crucial<br />
NNEC enabler [2]. The advantage of SOA is that it provides seamless information<br />
exchange based on different policies <strong>and</strong> loose coupling of its components. In a military<br />
domain it enables making sensitive information resources available in the form<br />
of services, which can be discovered <strong>and</strong> used by all mission participants that do<br />
not need to be aware of these services in advance.<br />
The most mature technology for implementing SOA, recommended by NATO<br />
<strong>and</strong> widely applied in the commercial sector, is Web services. Web services are<br />
described by a wide range of st<strong>and</strong>ards that deal with different aspects of their<br />
realization, transport, orchestration, semantics, etc. They provide the means to<br />
build a very flexible environment that is able to dynamically link different system<br />
components to each other. These st<strong>and</strong>ards are based on the eXtensible Markup<br />
Language (XML) <strong>and</strong> have been designed to operate in high b<strong>and</strong>width links.<br />
XML gained wide acceptance <strong>and</strong> became very popular for the reason that it solves<br />
many interoperability problems, is human- <strong>and</strong> machine-readable <strong>and</strong> facilitates<br />
the development of frameworks for software integration, independent of the programming<br />
language. Nevertheless it undoubtedly adds significant overhead, both<br />
in terms of necessary computation power <strong>and</strong> consumption of network resources<br />
while being transported. This means that using SOA in tactical networks is challenging<br />
<strong>and</strong> requires optimizations [3], [4]. IST-090 is looking into techniques such<br />
as compression to mitigate some of the challenges [1].<br />
The utilization of Web services <strong>and</strong> other SOA implementations in a NNEC<br />
environment (e.g., Enterprise Service Buses (ESBs) <strong>and</strong> the Data Distribution Service<br />
(DDS)) has been addressed in many national <strong>and</strong> international experiments (e.g., Coalition<br />
Warrior Interoperability Demonstration (CWID) [5], [6], DDS demo [7],<br />
ESB experiment [8]). These experiments indicate that the technologies improve<br />
collaboration, interoperation <strong>and</strong> information sharing in the Federation of Systems<br />
(FoS). DDS is even perceived as real-time technology that can be tailored for the use<br />
in low – b<strong>and</strong>width tactical networks. However the idea of IP-based ubiquitous communications<br />
that is able to feed users with data based on the available communications<br />
media turns to be difficult to realize at the current stage of available technology<br />
maturity level. In order to achieve efficient information exchange between FoS users,<br />
SOA solutions need to work with different types of information <strong>and</strong> communication<br />
systems. Service interoperability must be provided among all comm<strong>and</strong> levels on<br />
an end-to-end basis. The challenge is therefore to apply SOA in low b<strong>and</strong>width tactical<br />
communications systems, which usually cope with high error rates <strong>and</strong> frequent<br />
disruptions. Such networks are usually referred to as disadvantaged grids.<br />
Previous initiatives have focused on information distribution over disadvantaged<br />
grids. In very low b<strong>and</strong>width environments it is considered to be the best<br />
solution to use asynchronous replication based middleware that provides static
12 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
information distribution between partners that have agreed to use a specific database<br />
format [9]. This solution is however not very convenient in highly dynamic operational<br />
scenarios. That is why there has been carried out research on SOA solutions<br />
that provide flexibility <strong>and</strong> interoperability <strong>and</strong> are well suited to work in a FoS.<br />
III. Related work<br />
Publish/subscribe, a paradigm for asynchronous communication, has been<br />
identified as particularly useful in MANETs, where it provides decoupling of provider<br />
<strong>and</strong> consumer [10]. In this paper we focus on MANETs, <strong>and</strong> thus the publish/<br />
subscribe paradigm. The NATO Core Enterprise Services (CES) Working Group [11]<br />
has identified WS-Notification as the st<strong>and</strong>ard to use for publish/subscribe in NATO.<br />
Thus, we employ that st<strong>and</strong>ard in our experiment in this paper.<br />
Net-Centric Tactical Services (NCTS) provide a gateway <strong>and</strong> software framework<br />
for tactical users to realize the benefits of information sharing across a SOA environment<br />
[12]. It is a software framework which resides in the tactical environment <strong>and</strong><br />
supports a set of services <strong>and</strong> functions to enable communications <strong>and</strong> messaging<br />
translation, data publishing, data subscription, <strong>and</strong> tactical device management. This<br />
is in key with the NNEC FS [2], which states that in order to apply SOA throughout<br />
a FoS in various network elements, special devices – so called edge proxies that are to<br />
support information distribution over disadvantaged grids – must be used. The problem<br />
is therefore identified <strong>and</strong> is considered valid for the whole NATO community.<br />
Those edge functionalities are to adapt service traffic to the capabilities of the tactical<br />
networks, sometimes in the form of technology gateways. As a consequence, we also<br />
pursue the gateway <strong>and</strong> proxy concept in our experiments in this paper.<br />
In [13] we describe a Web services infrastructure experiment performed during<br />
the summer of 2011. This experiment is a precursor to the Norwegian <strong>and</strong> NC3A parts<br />
of the experiment described in this paper. In 2011 we identified several shortcomings<br />
of the software we were using then, e.g., that the WS-Notification framework we used<br />
on the Norwegian side (WSMG from the University of Indiana) was not suitable for<br />
use in a military environment, since it did not h<strong>and</strong>le disruptions. In the IST-090<br />
experiment described in this paper we have replaced WSMG with Apache Service-<br />
Mix in an attempt to leverage a hopefully more mature <strong>and</strong> stable product. Also,<br />
we now focus mostly on the MANET aspect of communications, whereas the 2011<br />
experiment was more geared towards interconnecting infrastructure.<br />
The SOA over disadvantaged grids experiment <strong>and</strong> demonstrator discussed<br />
in this paper was linked to the other IST-090 presentations during the MCC 2011<br />
in Amsterdam:<br />
• An overview of the research <strong>and</strong> experimentation of IST-090 [1]<br />
• Mediation of network load over disadvantantaged grids using Enterprise<br />
Service Bus (ESB) technology [8]<br />
• DDS technology demonstrations related to IST-090 [7]
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
13<br />
• Dedicated WS-DDS interface for sharing information between civil <strong>and</strong><br />
military domains [14]<br />
• An Evaluation of Web Services Discovery Protocols for the Network-Centric<br />
Battlefield [15]<br />
• An independent evaluation of Web service reach solutions in disadvantaged<br />
grids [16]<br />
• Towards a middleware for tactical military networks – interim solutions<br />
for improving communication for legacy systems [17]<br />
• Semantic Description of Web Service QoS Profiles for Context-aware Web<br />
Service Provision [18]<br />
These papers give an overview of recent IST-090 related work by the member<br />
nations. The remainder of this paper focuses on the aspects of the experiment <strong>and</strong><br />
demo performed at MCC 2011.<br />
IV. Experiment<br />
The goal of the experiment was to evaluate the possibility of delivering information<br />
from service producers to service consumers in a disadvantaged environment.<br />
The networking environment was set up using equipment provided by the NC3A<br />
<strong>and</strong> FFI (see Figure 1). Further, technologies studied under the umbrella of IST-<br />
090 as promising for SOA application on the tactical level were employed: Web<br />
services, ESBs, <strong>and</strong> DDS. We built a heterogeneous networking infrastructure that<br />
modeled cooperation of users on different levels of comm<strong>and</strong>. <strong>Information</strong> was sent<br />
up <strong>and</strong> down the echelons of comm<strong>and</strong> through the MANET. Thus, we had aspects<br />
of both infrastructure <strong>and</strong> disadvantaged networks. We evaluated the interoperability<br />
of the proposed solutions, as well as their applicability to the scenario that<br />
was developed by the IST 090. For further information regarding the scenario,<br />
please refer to [1]. Moreover such real-life experiments always bring us lessons<br />
learned in terms of implementation correctness <strong>and</strong> incompatibility of technologies.<br />
A number of potential approaches have been identified by the participants<br />
in this experiment, which may improve communications between service providers<br />
<strong>and</strong> service consumers. This should lead to a concrete set of recommendations<br />
for FAS <strong>and</strong> Communities of Interest (CoI) when commissioning <strong>and</strong> developing<br />
their services. Specifically, these approaches are:<br />
• A DDS domain, which is interfaced to a Web services environment through<br />
a gateway (MCI’s contribution).<br />
• DSProxy for delay <strong>and</strong> disruption tolerant SOAP transport across disadvantaged<br />
networks (one of FFI’s contributions).<br />
• Decentralized chat using the experimental Mist protocol, coupled with<br />
a Mist/XMPP gateway for interoperability with infrastructure networks<br />
(one of FFI’s contributions).<br />
• The use of an ESB to optimize the use of b<strong>and</strong>width <strong>and</strong> manage limited<br />
connectivity (NC3A’s contribution).
14 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 1. Disadvantaged grid experiment <strong>and</strong> demonstrator communications network <br />
Figure 2.SOA infrastructure
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
15<br />
The disadvantaged grid networking infrastructure used was based on equipment<br />
provided by NC3A <strong>and</strong> Norway: Rajant breadcrumb MANET systems using<br />
the 2.4 <strong>and</strong> 5 GHz ISM b<strong>and</strong>s augmented by a simulated satellite link. The NC3A<br />
provided a complete infrastructure to execute SOA tests <strong>and</strong> to evaluate the results,<br />
<strong>and</strong> functioned as the connecting “hub” between Norway <strong>and</strong> Pol<strong>and</strong>. This infrastructure<br />
was built around two ESB instances in charge for the message routing <strong>and</strong><br />
transformation (see Figure 2). Here, the interfaces were used as follows:<br />
• SIP3 Engine – This is a processing engine for Friendly Force Tracks in NFFI<br />
V1.3 format that can simulate running tracks, store <strong>and</strong> filter them. During<br />
this test campaign it was used as track store, track simulator <strong>and</strong> SIP3<br />
interface. The SIP3 Engine is composed of: Track store, Track simulator,<br />
SIP3 message interface (NFFI over SOAP), IP1 message interface (NFFI<br />
over TCP/IP), IP2 message interface (NFFI over UDP), <strong>and</strong> SIP3/IP1/IP2<br />
interface adapter.<br />
• WSO2 ESB (version 3.0.1) – This is a COTS ESB based on Apache<br />
Synapse. During this test campaign it was used for protocol adaptation<br />
<strong>and</strong> message routing/conversion. The main services exposed were: a)<br />
SIP3 to KML converter, which was used to visualize on st<strong>and</strong>ard KML<br />
enabled map viewer the NFFI V1.3 tracks stored in the SIP3 track store;<br />
b) NVG to KML converter, which was used to visualize on st<strong>and</strong>ard<br />
KML enabled map viewer the NVG layer provided by JocWatch; c)<br />
WSNotification (notification consumer) to SIP3 (event sink) which<br />
was used to feed the SIP3 engine with the NFFI tracks published from<br />
the Norwegian pub/sub broker, <strong>and</strong> d) WS-DDS to SIP3 (event sink),<br />
which was used to feed the SIP3 engine with the NFFI tracks published<br />
from the WS-DDS interface.<br />
• ServiceMix ESB (version 3.5.0) – This is a COTS ESB that offers a WS-<br />
Notification v1.3 Pub/Sub interface. During this test campaign it was used<br />
to publish messages via the WS-Notification protocol.<br />
• Symbology server – An NC3A service used to graphically represent the units<br />
given their APP6 symbol.<br />
• JOCWatch – The Incident Reporting source systems.<br />
• Google Earth – COTS map viewer used to visualize the tracks produced<br />
<strong>and</strong> received from the NC3A systems.<br />
Figure 1 shows the network diagram that was used in the experiment <strong>and</strong><br />
demonstration.<br />
The experiment was aimed at connecting Web services <strong>and</strong> DDS domains,<br />
which are technologically different realizations of SOA. Web services support both<br />
publish/subscribe <strong>and</strong> request/response communications, as opposed to DDS which<br />
has only publish/subscribe support. On the other h<strong>and</strong>, DDS supports QoS features<br />
<strong>and</strong> real-time systems, which Web services do not. For a comparison, see Table I.<br />
More details about DDS can be found in [14].
16 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Table I. Web services <strong>and</strong> DDS comparison<br />
Property Web services DDS<br />
St<strong>and</strong>ardization W3C, OASIS, WS-I OMG<br />
Real-time <strong>and</strong> QoS support No Yes<br />
Request/response paradigm Yes No<br />
Publish/subscribe paradigm Yes Yes<br />
Current st<strong>and</strong>ard suitable for disavantaged grids No No<br />
Enabling support for disadvantaged grids<br />
Experimental<br />
optimizations<br />
Vendor specific<br />
tactical extensions<br />
Figure 3. Mist as a message ferry <br />
A. <strong>Technology</strong> components<br />
There is a combination of parameters at h<strong>and</strong> that will lead to specific use<br />
cases where the following conditions can be tested:<br />
• Different types of information (NFFI, incident reports)<br />
• Different solutions (DDS <strong>and</strong> DDS/WS gateway, DSProxy, ESB capabilities)<br />
• Different network conditions (mostly making use of the MANET but also<br />
having the possibility to simulate other types of networks).<br />
We evaluated each tested solution’s usability from an end user perspective, <strong>and</strong><br />
were able to show the viability of the solutions involved for effectively disseminating<br />
the necessary information. It should be noted that DDS was not actually used<br />
in the MANET, it was connected to the MANET using a Web services interoperability<br />
gateway. Further information regarding the separate demo components are<br />
discussed briefly below. The complete details of the demo are described in [19].
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
17<br />
1) Mist: The Mist protocol provides robustness <strong>and</strong> delay tolerance in dynamic<br />
wireless ad-hoc networks. We wanted to use two separate 802.11 ad-hoc networks<br />
with one gateway/relay node connected to 100BASE-TX for the Mist/<br />
XMPP experiments. FFI provided the necessary equipment for the mobile<br />
nodes – a mixture of laptops <strong>and</strong> Sony Ericsson Xperia mobile phones with<br />
WiFi enabled were used. One computer, the server in the national services LAN<br />
where the DSProxy resides, was running the XMPP/Mist gateway software.<br />
Figure 4. NC3A-NOR interconnection featuring ESBs <strong>and</strong> the DSProxy <br />
The XMPP server could be anywhere in the network, as long as it was reachable<br />
by TCP from the XMPP/Mist gateway node from time to time. In this demo<br />
the central server was hosted by the NC3A in the NATO LAN. Messages were<br />
relayed to XMPP when the connection was available <strong>and</strong> stored for future delivery<br />
when the link was down, using the ”message ferry” principle shown in Figure 3.<br />
The message ferry was a single wireless node (mobile phone) which was used<br />
to carry messages between the two networks. It did not need to be connected<br />
to both ad-hoc networks at the same time, but it did require the use of 802.11<br />
to connect in an ad-hoc manner. For in-depth information on using Mist for<br />
tactical chat, see [20].<br />
2) DSProxy: The use of proxy servers for adapting Web services to disadvantaged<br />
grids is a very promising approach. Through the use of proxies one<br />
can utilize unmodified Web services at the client <strong>and</strong> server machines, <strong>and</strong><br />
only the intermediate nodes in the network need to use the proxy software.<br />
This reduces complexity in the development of applications <strong>and</strong> servers, <strong>and</strong><br />
therefore also costs. Norway (FFI) has designed <strong>and</strong> developed the Delay <strong>and</strong><br />
disruption tolerant SOAP Proxy (DSProxy) system.<br />
The DSProxy is a prototype system implementing a range of concepts, ideas <strong>and</strong><br />
mechanisms which aim to tackle the challenges associated with utilizing web services<br />
in tactical environments <strong>and</strong> disadvantaged grids [21]. The DSProxy is a middleware<br />
component enabling delay <strong>and</strong> disruption tolerant web services for heterogeneous<br />
networks. The Java-based software uses acknowledged st<strong>and</strong>ards <strong>and</strong> is designed<br />
to work with existing COTS Web service clients <strong>and</strong> services.
18 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Functional tests where NC3A provided NFFI data on a WS-Notification interface<br />
were shown (see Figure 4). Here, the DSProxy was used to ensure disruption<br />
<strong>and</strong> delay tolerant SOAP transport across the unstable MANET <strong>and</strong> highdelay<br />
satellite link, whereas the exchange between the NC3A <strong>and</strong> NOR was conducted<br />
using ServiceMix to provide WSNotification.<br />
3) DDS/WS Gateway: DDS is a specification of a publish/subscribe middleware<br />
for distributed systems created in response to the need to st<strong>and</strong>ardize<br />
a data-centric publish/subscribe programming model for distributed systems.<br />
It has been suggested for use on the tactical level [7], but such usage requires<br />
vendor specific extensions. In this paper we focus on interoperability with DDS,<br />
<strong>and</strong> do not evaluate any tactical extensions. Pol<strong>and</strong> has developed a gateway<br />
to bridge the DDS environment to a Web services environment, focusing on<br />
one specific Web service – blue force tracking using NFFI. This gateway bridging<br />
the DDS domain with the rest of the infrastructure is shown in Figure 5.<br />
It enables DDS publishers to deliver NFFI tracks to Web services subscribers<br />
<strong>and</strong>, in the opposite direction, NFFI tracks published by Web services can be<br />
delivered to subscribers on the DDS side. It should be noted that, when using<br />
the DDS/WS Gateway, for every Web service that needs to be bridged to<br />
the DDS domain one needs to implement a special purpose message translator<br />
between the st<strong>and</strong>ardized Web services interface <strong>and</strong> a DDS interface.<br />
B. Results<br />
1) FFI infrastructure: ServiceMix was used to exchange NFFI tracks between<br />
Norway <strong>and</strong> NC3A. Tracks from Pol<strong>and</strong> were submitted to the NC3A, which<br />
re-distributed them to Norway. Once the system was up <strong>and</strong> running everything<br />
functioned as expected with WS-Notification, but there were some<br />
initial problems: The version of ServiceMix that was deployed (3.2.3) by FFI<br />
was not fully st<strong>and</strong>ards-compliant, leading to some trouble on NC3A’s side.<br />
The problems could be h<strong>and</strong>led by a work-around in the subscription message<br />
<strong>and</strong> some tuning of the WS-Notification client software. This version<br />
of ServiceMix supported only IPv4, meaning that notifications could not be<br />
used over IPv6, even if the communication stack was available. In the future,<br />
a newer version of ServiceMix, or another application entirely, should<br />
be considered to provide WS-Notification support.<br />
Mist functioned as it should by delivering chat messages in a disruption tolerant<br />
manner across both IPv4 <strong>and</strong> IPv6. Also, the message ferry principle functioned<br />
as expected, thereby showcasing one of the strengths of the Mist protocol.<br />
The DSProxy was used to ensure delay <strong>and</strong> disruption tolerant communication<br />
across the „troublesome” networks, i.e., the MANET <strong>and</strong> the satcom simulator.<br />
A bridge that had been developed in-house by FFI was used to interconnect<br />
ServiceMix with the DSProxy, so that notifications could be transported across
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
19<br />
the national network to <strong>and</strong> from the troops. This solution worked as expected<br />
— internally, instabilities were overcome in the network thanks to the DSProxy,<br />
while still retaining external compatibility with NC3A through WSNotification on<br />
the ServiceMix instance. The current implementation of DSProxy has previously<br />
only been used with IPv4, <strong>and</strong> at this testing event it was not able to run over IPv6.<br />
This is an important finding, <strong>and</strong> support for IPv6 should be sought for in the future.<br />
Figure 5. WS-DDS is a gateway between the Web services (WS) <strong>and</strong> Data distribution<br />
service domains <br />
2) MCI infrastructure: WS-DDS interface enabled the bidirectional exchange<br />
of information between the Polish DDS domain <strong>and</strong> NC3A’s WS domain.<br />
Additionally, the NFFI tracks from NC3A were sent to the Norwegian domain<br />
<strong>and</strong> back (from FFI through NC3A to POL DDS domain).<br />
Both the WS-DDS interface <strong>and</strong> the DDS domain emulator operated correctly.<br />
Initially there was a problem with interoperability between the WS-DDS<br />
interface <strong>and</strong> the SIP 3 service. The SIP3 client was created based on the WSDL<br />
1.1.0, whereas SIP3 service was based on WSDL 1.1.9. After recompilation, <strong>and</strong><br />
some additional modifications in the structure of the NFFI messages exchanged,<br />
the problem was solved.<br />
The WS-DDS interface version that was tested currently works in the request/<br />
response mode. It would be highly recommended to enhance it with pub-sub functionality<br />
based on WSNotification. This will improve the functionality of WS-DDS,<br />
since DDS generally implements a publish/subscribe message exchange pattern.<br />
Furthermore, this will also decrease the time of information transfer <strong>and</strong> traffic<br />
generated in the WS domain.<br />
3) NC3A infrastructure: The competitive approaches to optimizing traffic using<br />
the ESB involve two streams of messages being sent to different services<br />
through the ESB in parallel, a setup further discussed in [8]. One of the services<br />
is of a higher priority than the other, so it is given more resources in the ESB<br />
than the other. The number of successful messages to this service is then<br />
measured. Although the lower priority messages are considered less important,
20 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
the number of errors in this background stream (3000 messages over 30 secs)<br />
is still recorded to give an impression of the negative impact on this stream.<br />
Two competitive approaches were tested. Prioritization boosts the priority<br />
of the more important message stream, but does not limit the background<br />
messages. Throttling, on the other h<strong>and</strong>, limits the amount of b<strong>and</strong>width that<br />
a particular service can use, <strong>and</strong> caps the number of messages that can be<br />
passed to this service.<br />
Messages<br />
Table II. ESB Competetive Test Results<br />
Background<br />
errors<br />
Max Min Average<br />
Baseline 32 536 57.3 s 7.7 s 32.6 s<br />
Prioritization 36 601 38.9 s 2.2 s 20.5 s<br />
Throttling 40 2667 54.2 s 3.3 s 29.5 s<br />
Prioritization delivered a small but significant (12.5%) improvement on<br />
the balanced approach, without a massive impact on the background messages.<br />
Although throttling had a more noticeable effect on the higher priority messages<br />
(an improvement of 25%), the effect on the background messages was severe.<br />
The results are shown in Table II. A set of evaluations identifying uncompetitive<br />
approaches was also performed, these results are shown in [19].<br />
It is recommended that a balanced <strong>and</strong> judicious use of the two approaches<br />
should be considered for use in production. The relative prioritization <strong>and</strong> throttling<br />
parameters will be dependent on the level of service that is offered by the ESB.<br />
C. Lessons learned<br />
The use of SOAP over HTTP provides a number of challenges within an environment<br />
where b<strong>and</strong>width is limited. XML is a verbose data format, <strong>and</strong> the overhead<br />
of the SOAP messaging protocol adds additional bytes to the payload. As was seen<br />
in these experiments, within a MANET environment, where reasonably high<br />
b<strong>and</strong>width is available between the individual nodes on the MANET, this effect<br />
can be negligible.<br />
The use of HTTP can be problematic in case of disruptions due to node<br />
mobility or interference, though. Also, across radio or satellite communications<br />
channels, or even a combination of these, then the use of SOAP can cause<br />
timeouts <strong>and</strong> limit the number of messages that can be delivered. Therefore,<br />
mechanisms need to be defined that can provide any level of improvement<br />
across these network boundaries, <strong>and</strong> recommendations delivered to the projects<br />
responsible for the delivery of Functional Area <strong>and</strong> Core Enterprise Services.<br />
Even in simple request-response message exchanges between service providers
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
21<br />
<strong>and</strong> consumers, systems can benefit from the judicious use of disabling HTTP<br />
continue, increasing the number of sockets <strong>and</strong> lengthening the timeouts on<br />
the client. The suitability of these approaches should also be considered in addition<br />
to mediation through any kind of middleware or proxy. However, middleware<br />
such as ESBs <strong>and</strong> the DSProxy do help manage poor network communications.<br />
Further refinements, such as switching to other protocols like DDS or JMS,<br />
or even prototypes targeted at unreliable networks like Mist, may offer even<br />
more possibilities. Also, employing compression <strong>and</strong> other optimization techniques<br />
must be considered [1]. Any proposed approach should be considered<br />
on a case-by-case basis, <strong>and</strong> further research is needed to identify the optimum<br />
approaches for network optimization.<br />
1) Data distribution service: DDS is an emerging middleware that is explicitly<br />
targeted at providing publish/subscribe communications for real-time systems.<br />
It offers fine <strong>and</strong> extensive control of QoS parameters, including reliability,<br />
b<strong>and</strong>width, delivery deadlines, <strong>and</strong> resource limits that makes it a c<strong>and</strong>idate<br />
for use in disadvantaged grids. Note, however, that DDS requires vendor<br />
specific extensions to function in such environments [7].<br />
DDS defines a specific API for the messages <strong>and</strong> subscription h<strong>and</strong>ling but<br />
cannot natively interoperate with SOAP Web services. The WS-DDS gateway<br />
is filling this gap by building a SOAP web service interface on the top of the DDS<br />
API so that a st<strong>and</strong>ard SOAP data consumer/producer can directly use this interface.<br />
The experiment with the WS-DDS gateway was very successful, <strong>and</strong> future<br />
deployment of DDS could build upon the knowledge gained with this prototype.<br />
A possible option for future experimentation is to leverage an ESB as frontend<br />
for SOAP clients <strong>and</strong> to configure DDS as a transport protocol (as a substitute for<br />
HTTP). Such a setup could possibly:<br />
• Make use of the DDS strengths for content-centric message h<strong>and</strong>ling <strong>and</strong><br />
QoS definitions.<br />
• Be a beneficial approach to leveraging COTS middleware.<br />
• Offer the DDS API to a SOAP service.<br />
• Hide the complexity of the DDS protocol <strong>and</strong> the configuration details<br />
from the SOAP client.<br />
• Offer the possibility to centrally manage QoS parameters for topics <strong>and</strong><br />
messages.<br />
• Offer SOAP interfaces that are payload agnostic/independent.<br />
This approach is similar to a widely adopted solution where a SOAP frontend<br />
is using the Java Message Service (JMS) as unified transport protocol. The DDS-ESB<br />
approach must be tested <strong>and</strong> validated because of the differences between the JMS<br />
<strong>and</strong> DDS protocols [22]. A possible drawback of having a SOAP payload agnostic<br />
interface is that the content-aware DDS is a strong typed protocol, in order to improve<br />
performance. Extensive tests must be made to guarantee that using generic<br />
payloads will not negatively impact DDS performance.
22 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
2) Publish/subscribe, DSProxy, <strong>and</strong> Mist: The use of publish/subscribe mechanisms<br />
further offer a range of possible solutions to unreliable network communications.<br />
By exchanging messages only in response to clearly-defined<br />
events, the amount of network traffic can be reduced (through the elimination<br />
of unnecessary polling), <strong>and</strong> the effects of intermittent communications<br />
can be lessened. However, particularly in the coalition environment, with<br />
multiple heterogeneous systems, it is important to ensure that any solution<br />
is fully st<strong>and</strong>ards-compliant, otherwise there may be interoperability problems,<br />
as were observed with ServiceMix.<br />
It is likely in the future that NATO systems will migrate to an IPv6 infrastructure,<br />
<strong>and</strong> so it is encouraging that IPv6 functions correctly over the MANET.<br />
However, it is important that any applications that are developed or procured<br />
to be used within the NATO enterprise are also able to operate over IPv6.<br />
The version of ServiceMix used by FFI (3.2.3) supported only IPv4, meaning<br />
that notifications could not be used over IPv6, even if the communication stack<br />
was available. It was also an important discovery that the current implementation<br />
of DSProxy was only able to run over IPv4, <strong>and</strong> FFI will be looking to support<br />
IPv6 in the future.<br />
Mist functioned as expected, <strong>and</strong> was able to deliver the chat messages in a disruption<br />
tolerant manner across the networks. Mist supports both IPv4 <strong>and</strong> IPv6,<br />
<strong>and</strong> functioned fully using either protocol. The message ferry principle functioned<br />
adequately as well, showcasing one of the strengths of the Mist protocol.<br />
3) Enterprise service buses: The use of ESBs or other middleware offer a number<br />
of advantages when mediating communications across constrained communications<br />
channels. The first <strong>and</strong> most important of these is that it abstracts<br />
the optimization of the use of b<strong>and</strong>width away from the developers <strong>and</strong> administrators<br />
of the services themselves. To the service consumers <strong>and</strong> providers,<br />
the network itself should be transparent, <strong>and</strong> so with the messaging framework<br />
that is used across this network. By using ESBs to manage traffic optimization,<br />
the service consumer calls the ESB using SOAP over HTTP, without having to<br />
consider any other features. Management of the message bus becomes a separate<br />
concern, <strong>and</strong> additional optimization features can be deployed without<br />
the need to redevelop or recompile the applications themselves. In addition<br />
to this benefit, there are a number of features that are supported by ESBs that<br />
can greatly improve performance, <strong>and</strong> these are discussed in Section IV-B3<br />
above. The use of retries <strong>and</strong> reliable messaging adds marginal but significant<br />
improvements over a direct call from service consumer to provider. The most<br />
obvious benefit that can be delivered by ESBs is the use of compression for<br />
larger messages, where improvements of over 500 per cent were observed on<br />
a 111 KB message, using only the st<strong>and</strong>ard GZIP compression mechanism.<br />
Other XML-specific compression suites promise even higher compression<br />
ratios <strong>and</strong> therefore even greater improvements.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
23<br />
V. Conclusion<br />
No single solution stood out as the ”magic bullet” to solve all the requirements<br />
for high speed connectivity to the edge, but many of them do offer measurable<br />
improvements in messaging capability. A number of key success factors were<br />
identified, including the foundation on open st<strong>and</strong>ards, ease of management <strong>and</strong><br />
configuration, <strong>and</strong> transparency to the user.<br />
We have shown that the st<strong>and</strong>ards are important in delivering interoperability<br />
in heterogeneous FoS environment, but are not sufficient to be used in disadvantaged<br />
grids. The proposed DSProxy st<strong>and</strong>ing upon the st<strong>and</strong>ard SOAP communication<br />
enables compression of SOAP messages <strong>and</strong> provides store <strong>and</strong> forward functionalities<br />
if connectivity is lost. The WS-DDS interface creates unique possibility of connecting<br />
the WS <strong>and</strong> DDS architecturally different domains giving the possibility to<br />
exchange messages vertically between the echelons of comm<strong>and</strong>. The Mist protocol<br />
is a solution for the XMPP deficiencies enabling it to deliver the chat service on<br />
the tactical level. And finally, the ESBs tuned appropriately give benefits in terms<br />
of compression <strong>and</strong> priority of messages.<br />
In general, the messaging infrastructure should be optimized for the consumers<br />
of services without the need to incorporate proprietary, ad hoc solutions<br />
that will ensure tighter coupling between providers <strong>and</strong> consumers <strong>and</strong> therefore<br />
limit the range of potential partners. Where a protocol is not widely understood<br />
in another domain, then gateways should be used to translate from one st<strong>and</strong>ard<br />
or protocol to another.<br />
As a suggestion for future experiments, we recommend that the different<br />
potential solutions should be considered individually <strong>and</strong> collectively to provide<br />
optimized communications across the entire enterprise, from static HQs, with<br />
high speed communications to l<strong>and</strong> forces with intermittent <strong>and</strong> low quality links<br />
according to a well defined scenario. Each solution should be considered on a caseby-case<br />
basis, but once the best solution for the scenario has been identified, then<br />
it should be quick <strong>and</strong> easy for an administrator to apply, ensuring the best possible<br />
experience for front-line users.<br />
Acknowledgment<br />
The authors would like to thank the organizers of MCC 2011 for making<br />
the experiment <strong>and</strong> demo possible. Furthermore, we would like to acknowledge<br />
Magnus Skjegstad, who developed the Mist software as part of his ongoing Ph.D.<br />
thesis work, <strong>and</strong> supported the chat part of the experiment. He also provided us<br />
with Figure 3. Finally, we would like to thank Rolf Rasmussen <strong>and</strong> Johnny Johnsen<br />
for proofreading.
24 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
References<br />
[1] P.-P. Meiler et al., “An Overview of the Research <strong>and</strong> Experimentation of IST-090:<br />
SOA over Disadvantaged Grids,” in proceedings of the MCC 2011, Amsterdam,<br />
Netherl<strong>and</strong>s, October 2011.<br />
[2] M. Booth et al., “NATO Network Enabled Feasibility Study vol. II: Detailed Report<br />
Covering a Strategy <strong>and</strong> Roadmap for Realizing an NNEC Networking <strong>and</strong> <strong>Information</strong><br />
Infrastructure, version 2.0,” NATO C3 Agency, 2005.<br />
[3] D. Dragolov et al., “Service Oriented Architecture – concept of services,<br />
infrastructure components, implementation practices <strong>and</strong> military environment<br />
specifics,” in proceedings of the MCC 2009, Prague, Czech republic, September 2009.<br />
[4] F.T. Johnsen, “Pervasive web services discovery <strong>and</strong> invocation in military networks,”<br />
FFI report 2011/00257, http://rapporter.ffi.no/rapporter/2011/00257.pdf, January 2011.<br />
[5] J. Busch, “An investigation into deploying web services,” TN 1229, NC3A, December 2007.<br />
[6] G. Babakhani et al., “Web Trends And Technologies And NNEC Core Enterprise<br />
Services – Version 2.0,” NC3A Technical Note 1143 (draft), NC3A, The Hague,<br />
Netherl<strong>and</strong>s, December 2006.<br />
[7] I.H. Novo et al., “DDS technology demonstrations related to IST-090,” in proceedings<br />
of MCC 2011, Amsterdam, Netherl<strong>and</strong>s, October 2011.<br />
[8] R. Fiske et al., “Mediation of network load over disadvantaged grids using Enterprise<br />
Service Bus (ESB) technology,” in proceedings of the MCC 2011, Amsterdam,<br />
Netherl<strong>and</strong>s, October 2011.<br />
[9] P. Bartolomasi et al., “NATO Network Enabled Feasibility Study vol. I, ver. 2.0,”<br />
NATO C3 Agency, 2005.<br />
[10] P. Costa et al., “Socially-Aware Routing for Publish-Subscribe in Delay-<br />
Tolerant Mobile Ad Hoc Networks,” IEEE JOURNAL ON SELECTED AREAS<br />
IN COMMUNICATIONS, VOL. 26, NO. 5, JUNE 2008.<br />
[11] Consultation, Comm<strong>and</strong> <strong>and</strong> Control Board (C3B), “CORE ENTERPRISE<br />
SERVICES STANDARDS RECOMMENDATIONS: THE SOA BASELINE PROFILE<br />
VERSION 1.7,” Enclosure 1 to AC/322-N(2011)0205, NATO Unclassified releasable to<br />
EAPC/PFP, 11 November 2011.<br />
[12] S.D. Crane et al., “Bridging the digital divide with net-centric tactical services,”<br />
AFCEA-GMU C4I CENTER SYMPOSIUM ”CRITICAL ISSUES IN C4I”, George<br />
Mason University, Fairfax, Virginia Campus, USA, 20-21 May 2008.<br />
[13] F.T. Johnsen et al., “Towards operational agility using service oriented integration<br />
of prototype <strong>and</strong> legacy systems,” in proceedings of the 17th ICCRTS, Fairfax, VA,<br />
USA, June 19-21 2012.<br />
[14] P. Caban et al., “Dedicated WS-DDS Interface for Sharing <strong>Information</strong> Between<br />
Civil <strong>and</strong> <strong>Military</strong> Domains,” In proceedings of MCC 2011, Amsterdam, Netherl<strong>and</strong>s,<br />
October 2011.<br />
[15] M. Skjegstad et al., “An Evaluation ofWeb Services Discovery Protocols for<br />
the Network-Centric Battlefield,” in proceedings of the MCC 2011, Amsterdam,<br />
Netherl<strong>and</strong>s, October 2011.<br />
[16] A.H. L<strong>and</strong>a et al., “An Independent Evaluation of Web Service Reach Solutions<br />
in Disadvantaged Grids,” in proceedings of the MCC 2011, Amsterdam, Netherl<strong>and</strong>s,<br />
October 2011.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
25<br />
[17] C. Barz et al., “Towards a Middleware for Tactical <strong>Military</strong> Networks Interim Solutions<br />
for Improving Communication for Legacy Systems,” in proceedings of the MCC 2011,<br />
Amsterdam, Netherl<strong>and</strong>s, October 2011.<br />
[18] J. Sliwa et al., “Semantic Description of Web Service QoS Profiles for Context-aware<br />
Web Service Provision,” in proceedings of the MCC 2011, Amsterdam, Netherl<strong>and</strong>s,<br />
October 2011.<br />
[19] P. Caban et al., “SOA OVER DISADVANTAGED GRIDS EXPERIMENT AND<br />
DEMONSTRATOR,” NC3A Reference Document 3342, NATO Unclassified,<br />
The Hague, Netherl<strong>and</strong>s, December 2011.<br />
[20] M. Skjegstad et al., “Distributed Chat in Dynamic Networks,” in proceedings<br />
of the 30th IEEE <strong>Military</strong> <strong>Communications</strong> Conference (MILCOM2011), Baltimore,<br />
MA, USA, November 2011.<br />
[21] K. Lund et al., “Robust web services in heterogeneous military networks,” IEEE<br />
<strong>Communications</strong> Magazine, vol. 48, no. 10, pp. 78-83, October 2010.<br />
[22] Real-Time Innovations Inc., “A Comparison <strong>and</strong> Mapping of Data Distribution Service<br />
(DDS) <strong>and</strong> Java Message Service (JMS),” (on-line), http://www.omgwiki.org/dds/sites/<br />
default/files/Comparison of DDS <strong>and</strong> JMS.pdf, 2006.
GUWMANET – Multicast Routing in Underwater<br />
Acoustic Networks<br />
Michael Goetz 1 , Ivor Nissen 2<br />
1 Fraunhofer Institute for Communication, <strong>Information</strong> Processing <strong>and</strong> Ergonomics (FKIE),<br />
53343 Wachtberg, Germany, michael.goetz@fkie.fraunhofer.de<br />
2 Research Department for Underwater Acoustics <strong>and</strong> Marine Geophysics (FWG) – WTD 71,<br />
24148 Kiel, Germany, ivornissen@Bundeswehr.org<br />
Abstract: Underwater networks move more <strong>and</strong> more into the focus of the research community,<br />
especially for military purposes. They enable the full integration of underwater components like<br />
submarines or sensor platforms into maritime Network Centric Warfare (NCW). Nevertheless, most<br />
of the scientific work was done in physical layer methods <strong>and</strong> medium access protocols.<br />
In this paper we introduce a new network protocol called Gossiping in Underwater Acoustic Mobile<br />
Ad-hoc Networks (GUWMANET), which realizes medium access <strong>and</strong> routing functionality<br />
in a cross-layer design. In contrast to other routing approaches for underwater networks, we developed<br />
a network protocol from scratch, fitting the special needs of underwater communication,<br />
instead of adopting existing terrestrial protocols.<br />
We use multi-hop strategies to achieve a higher maximum transmission range than that of our<br />
physical layer method. Additionally, multicast addresses are used which allow an unlimited<br />
number of nodes. The routes between the nodes are build up automatically <strong>and</strong> need no preceding<br />
configuration, which allows a full ad-hoc capability including mobile nodes. In combination<br />
with the Generic Underwater Application Language (GUWAL), which has a 16 bit header<br />
with the multicast source <strong>and</strong> destination address, GUWMANET needs only 10 bits additional<br />
overhead. This is realized by using gossiping strategies, where each node itself decides whether<br />
it forwards the data or not.<br />
Keywords: multicast, multi-hop, gossiping, routing, underwater acoustic networks, mobile ad-hoc<br />
networks, emission control, implicit acknowledgment, clustering, bursts<br />
I. Introduction<br />
In the last years, underwater networks received more <strong>and</strong> more attention<br />
in scientific, industrial <strong>and</strong> particularly military areas. They enable the full integration<br />
of underwater components like submarines, Autonomous Underwater Vehicles<br />
(AUVs), gliders, or bottom sensors into maritime Network Centric Warfare (NCW)<br />
for example in Mine Counter-Measure (MCM) or Anti Submarine Warfare (ASW)<br />
operations. Especially, Underwater Wireless Networks (UWNs) moved into the focus<br />
of the research community to enable full flexibility of the platforms without
28 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
the need for any cables, which are not only expensive but also difficult to h<strong>and</strong>le<br />
<strong>and</strong> limiting the maneuverability of the moving nodes [1].<br />
The ocean is almost impervious to electro-magnetic waves which makes<br />
them useless for wireless underwater communication over distances greater<br />
than a hundred meters; wireless communication to submerged nodes can only<br />
be realized using sound. The network protocol GUWMANET presented in this<br />
paper, developed by Fraunhofer FKIE <strong>and</strong> FWG, is designed to establish a robust<br />
mobile ad-hoc UWN working in all-weather <strong>and</strong> sea conditions. Within this scope<br />
GUWMANET is a possible c<strong>and</strong>idate to fulfill delay tolerant scenarios defined by<br />
the project Robust Acoustic <strong>Communications</strong> in Underwater Networks (RACUN)<br />
under the European Defense Agency (EDA) [2], [3]. A detailed description of the scenarios<br />
follows in Chapter III.<br />
II. Physical layer restrictions<br />
In principle, sound waves can propagate several hundreds of kilometers<br />
in deep waters, nevertheless they underlie natural restrictions which make robust<br />
underwater communication challenging. Due to the fact that the absorption loss<br />
of sound waves increases with frequency, the available b<strong>and</strong>width stays in reciprocal<br />
relation to the maximum transmission range, as shown in Figure 1. In addition,<br />
the weather conditions influence the maximum transmission range, because breaking<br />
waves <strong>and</strong> rain increase the noise level. To overcome these b<strong>and</strong>width limitations,<br />
we introduce multi-hop strategies in our protocol, which are well-known from<br />
terrestrial Mobile Ad-hoc Networks (MANETs).<br />
Figure 1. Upper bound of the User Data Rate (UDR in bps) over transmission range (km) in deep<br />
<strong>and</strong> shallow waters <strong>and</strong> different weather conditions, simplified with homogeneous propagation<br />
conditions. The worse the weather condition, the lower is the expected transmission range
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
29<br />
GUWMANET is designed for a physical layer method based on impulse communication,<br />
the so called Transient Underwater Acoustic Communication System<br />
(TUWACS) [4]. It sends out short data bursts with a fixed length of 128 bit in 0.3 s<br />
plus 10 bits for a network header. This clarifies that there is no room for much protocol<br />
overhead <strong>and</strong> an underwater network protocol must be as efficient as possible.<br />
Another difference to terrestrial communications is the low <strong>and</strong> varying sound<br />
propagation speed between 1405 <strong>and</strong> 1560 meters per second. This does not only<br />
increase the Doppler compensation complexity significantly, but also the signal propagation<br />
delay. TUWACS is designed for a maximum internode distance of 10 km.<br />
This distance leads to an optimal frequency b<strong>and</strong> of 3.5−7.5 kHz. A transmission<br />
over a distance of 10 km needs 6−7 s, which must be considered in the protocol<br />
design. A basic assumption of terrestrial protocols is that the transmission time<br />
is much higher than the propagation time. Therefore, terrestrial network protocols<br />
cannot be easily adopted. Instead, a completely new one has to be developed from<br />
scratch to meet the requirements of underwater networks.<br />
III. Scenario<br />
With reference to Figure 2, in the scalable RACUN scenario [5] it is assumed<br />
that an underwater acoustic network is deployed in proximity of a harbor to be<br />
surveilled. All nodes are bottom-mounted <strong>and</strong> organized in subsequent barriers.<br />
These are sets of nodes arranged in a line topology: the first barrier is placed<br />
in front of the harbor, <strong>and</strong> is composed of the largest number of nodes in order to<br />
ensure the largest sensing coverage along the coast. The distance between nearest<br />
neighbors within a barrier is set to 3 km. The sensing range is assumed to be 2 km.<br />
Every 8 km comes another barrier which can sense movement as well as relay data<br />
towards the cooperating fleet at the sea base. Again, the nodes in the barrier are<br />
arranged in a line topology. While proceeding towards the sea base, the number<br />
of nodes per barrier is reduced from 5 (in the first barrier) to 2 (in the barrier farthest<br />
from the shore); in fact, the most important sensing task is carried out near<br />
the coast, whereas the barriers out at sea are key for relaying packets. Nevertheless,<br />
their sensed data are useful to confirm the detections of the first barrier <strong>and</strong> to give<br />
some further clue about the direction of movement of the boats exiting the harbor.<br />
The network covers a total area of 16 km × 32 km. We recall that the intended<br />
maximum transmission range of a node in our networks amounts to about 10 km,<br />
hence the barriers are typically in range of each other. In this paper, we assume<br />
that two nodes are deployed close to the last barriers: one buoy on the right<br />
side <strong>and</strong> one ship on the left side. These entities are part of the network, <strong>and</strong> act<br />
as seaborne sinks.<br />
Although the number of nodes is reduced after each barrier, our network topology<br />
features high connectivity, <strong>and</strong> multiple path alternatives exist. This makes<br />
the network robust against node failures as well as broken links (for example caused
30 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
by the noise of the boat propellers disturbing the communications). Additionally,<br />
the gateway buoy <strong>and</strong> the ship stationing at sea are equipped with both acoustic<br />
<strong>and</strong> radio communication hardware: therefore, as either receives data over acoustic<br />
links, such data is immediately relayed to all other sinks <strong>and</strong> the cooperating fleet<br />
using radio communications.<br />
Sea base with<br />
cooperating fleet<br />
Last barrier<br />
Ship<br />
Buoy<br />
8km<br />
3km<br />
First Barrier<br />
Surveilled harbor<br />
Figure 2. RACUN harbor surveillance network scenario, with 14 bottom nodes organized in 4 parallel<br />
barriers. Additionally, a ship <strong>and</strong> a gateway buoy act as sea-borne sinks, as they gather detection information<br />
from the network <strong>and</strong> relay it to the cooperating fleet stationing in the sea base area<br />
The traffic generation pattern in this scenario is inherently event-based, for<br />
example the detection of an intruder by a sensor node. Most of the time there is no<br />
communication in the network. Also the network protocol should work reactively<br />
instead of generating periodically control messages. This saves energy <strong>and</strong> keeps<br />
the network covert.<br />
IV. Application data<br />
Besides the physical layer restrictions, it is important to know which kind<br />
of data will be transmitted in the network in order to design an appropriate network<br />
protocol. Due to the low b<strong>and</strong>width the application data format must be as short <strong>and</strong><br />
efficient as possible. For this propose we specified the so called Generic Underwater
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
31<br />
Application Language (GUWAL) [6] which is suitable for any kind of underwater<br />
application. It is based on the following four parcel types:<br />
1. Data Request<br />
2. Data (sensor data, status, GPS position, ...)<br />
3. Comm<strong>and</strong> <strong>and</strong> Control (sleep, move, change mode, ...)<br />
4. Text Message (SMS)<br />
In GUWAL the basic parcel size is 128 bits; but it is also possible to use<br />
variable length if needed. All parcels include an operational header, a checksum<br />
of 16 bits each, <strong>and</strong> 96 bits payload with variable fields depending on the parcel<br />
type, as shown in Table 1. Among other fields, the header contains a source <strong>and</strong><br />
a destination address used for a cross-layer approach. An operational address<br />
is 6 bits long, whereby the first two bits define the type of the node. The following<br />
groups are defined:<br />
1. Gateway Node (buoy/ship with acoustic <strong>and</strong> radio link)<br />
2. Bottom Node (environment sensor or relay node)<br />
3. Mobile Node (submerged unit: diver, AUV, submarine)<br />
4. Surface <strong>and</strong> Air Nodes (node without acoustic link like ship, airplane or<br />
operation center via satellite).<br />
Table 1. Format of a GUWAL parcel with source, destination<br />
<strong>and</strong> priority field as header <strong>and</strong> a checksum<br />
Position Length Field<br />
1-2 2 Parcel Type<br />
3 1 End-to-End Acknowledgment<br />
4 1 Priority Flag<br />
5-10 6 Operational Source Address<br />
11-16 6 Operational Destination Address<br />
17-112 96 Payload<br />
113-128 16 Checksum<br />
The latter four bits are a node identifier to distinguish nodes of the same type,<br />
whereby zero is defined as broadcast to all nodes of the same type. The address<br />
with all bits set to one is reserved for broadcasting to all nodes in the network<br />
regardless of their type. As a result, there are 15 network addresses in groups<br />
1-3 <strong>and</strong> 14 in group 4, hence 59 in total. In order to allow more than 59 participants<br />
in the network, it is envisaged that multiple nodes can share the same<br />
address. For example, it is not m<strong>and</strong>atory from an operational point of view to<br />
distinguish bottom nodes in the same area, especially if they are only relay nodes.<br />
As a consequence, the network protocol may h<strong>and</strong>le nodes with the same address<br />
as multicast groups. How this is achieved by GUWMANET is explained in detail<br />
in the following chapter.
32 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
V. Protocol design<br />
In this chapter we introduce our new network protocol GUWMANET. In the first<br />
part, we introduce the Medium Access Control (MAC) <strong>and</strong> the Automatic Repeat re-<br />
Quest (ARQ) mechanisms which are used in GUWMANET. Furthermore, the details<br />
of the addressing problem resulting from shared multicast addresses are discussed.<br />
The introduction of a local nickname additional to the GUWAL network address<br />
is motivated. At the end we describe the initialization steps <strong>and</strong> the routing algorithm,<br />
followed by an extension for improvements based on network-coding strategies.<br />
A. Medium Access Control<br />
The MAC layer manages the access to the acoustic communication channel.<br />
This can be done in a contention-free manner like code, space, frequency or time<br />
division multiple access or r<strong>and</strong>omized, accepting possible collisions in the shared<br />
medium water. We decided to apply a time-based r<strong>and</strong>om access method, which<br />
is much more efficient than fixed divisions in networks with event based <strong>and</strong> bursty<br />
traffic <strong>and</strong> a physical layer using short impulses, as in underwater scenarios. A detailed<br />
survey of MAC mechanisms with regard to underwater acoustic networks<br />
can be found in [7].<br />
In r<strong>and</strong>om access methods every node can access the sound channel whenever<br />
it has data to send while regarding specific rules. The methods can be subdivided<br />
into two types, with previous channel reservation or direct data transmission.<br />
In our case channel reservation is inefficient, because the data packets consisting<br />
of 128 bits are already very short <strong>and</strong> a reservation would take a long time due to<br />
Round Trip Times (RTT) of up to 15 s having internode distances of 10 km. Moreover,<br />
the transmission times are with 0.3 s short compared to the long propagation delay.<br />
Most of the time, nodes wait for incoming data packets instead of transmitting.<br />
This is an important distinction to terrestrial networks.<br />
Another consideration is to apply carrier-sensing before transmitting data.<br />
However, sensing the medium prior to a transmission does not allow drawing<br />
conclusions about the channel state at the receiver side several seconds later when<br />
the signal arrives. Hence, we use a simple ALOHA [8] method without carriersensing<br />
in GUWMANET. Nevertheless, we point out that underwater acoustic<br />
communication is half-duplex. It is not possible to transmit data during a reception<br />
or vice versa.<br />
B. Automatic Repeat reQuest<br />
Using a r<strong>and</strong>om access method like ALOHA means that packet collisions may<br />
occur, even if the transmissions itself are very short. Additionally, bit errors due<br />
to high noise or low signal strength can result in packet losses. Therefore, ARQ
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
33<br />
methods have to be used to guarantee a successful reception. Typically, the receiver<br />
node sends an acknowledgment packet back to the transmitter to indicate a correct<br />
packet reception. If an acknowledgment stays out, the source node will automatically<br />
repeat the packet after a predefined period of time.<br />
The application language GUWAL already supports end-to-end acknowledgments,<br />
which are sent by the final destination node as operational notice of receipt.<br />
This acknowledgment is optional <strong>and</strong> is requested by setting the acknowledgment<br />
bit in the header.<br />
In multi-hop networks it is reasonable to add additional link layer packet<br />
repetition mechanisms, which will detect packet losses at each hop. In wired networks<br />
explicit packets have to be sent to inform the transmitter about a successful<br />
reception. In MANETs this can be done in an implicit way without additional<br />
transmissions due to the shared medium in wireless multi-hop networks. The source<br />
node is able to overhear if the next hop forwards the packet <strong>and</strong> therefore gets a so<br />
called implicit acknowledgment. If the packet will not be forwarded, the source<br />
node will automatically repeat the packet until it overhears a packet forwarding attempt.<br />
In consequence, the destination node must also repeat the packet to inform<br />
the previous hop about the successful reception.<br />
In GUWMANET this implicit acknowledgments are used with exponential<br />
backoff timers for packet error control as described later in Section G. Additionally,<br />
our network protocol is delay tolerant <strong>and</strong> supports so called Emission Control<br />
(EMCON), which means that nodes can decide to stay silent for an arbitrary time<br />
period. This is for example important for submarines, which do not want to get<br />
detected due to transmissions. Therefore, it is possible that acknowledgments stay<br />
out, even the transmission was successful. A packet is repeated with exponential<br />
backoff to attempt to deliver the packet successfully, but it cannot be guaranteed<br />
that the packet was received correctly. It is also not possible to make assumptions<br />
like a node is broken even if it did not reply for a longer period. Nevertheless, for<br />
this period where a node stays in EMCON state it is not available for packet forwarding<br />
<strong>and</strong> related routes have to be updated.<br />
C. Addressing<br />
As mentioned earlier, each network address can be used as multicast group<br />
including multiple nodes of the same type. From operational view, it is not m<strong>and</strong>atory<br />
to distinguish nodes inside this group, but for the network protocol it is<br />
m<strong>and</strong>atory to facilitate forwarding mechanisms. Therefore, we introduce a second<br />
local address of 5 bits in addition to the global 6 bit operational network address,<br />
which is independent from the network address <strong>and</strong> the node type. In the following<br />
this local address is called nickname.<br />
To allow full ad-hoc capability, the local nicknames are not predefined <strong>and</strong><br />
have to be chosen automatically after network deployment. In our MANET exists
34 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
no master node coordinating the address allocation, therefore each node has to<br />
choose its nickname by itself. These should be unique in the local 2-hop neighborhood<br />
to allow all nodes to distinguish between its neighbors. Typically, this<br />
is done making a neighborhood discovery, where the new node requests lists with<br />
neighborhood information from all its neighbors. We propose another algorithm to<br />
reduce the number of transmissions <strong>and</strong> thereby the energy consumption, because<br />
battery power is a limited resource in underwater scenarios.<br />
The idea is to overhear at first the network traffic for a listen period T L . If during<br />
this period communication takes place in the neighborhood, the node becomes<br />
acquainted with its neighbors <strong>and</strong> learns their nicknames passively. Additionally,<br />
it gets information about its 2-hop neighborhood, because the network header<br />
of GUWMANET includes beside the transmitter’s nickname also the nickname<br />
of the last hop, as described later. After T L the node knows a subset of its 2-hop<br />
neighborhood <strong>and</strong> chooses r<strong>and</strong>omly a presumably free local nickname. Now<br />
it transmits to its local neighborhood a nickname notification (NN) parcel to indicate<br />
its presence <strong>and</strong> nickname choice. The chosen nickname is included in the network<br />
header as source address. All other information is included inside a special GUWAL<br />
parcel. GUWAL has reserved a separate data type for such network control parcels<br />
where each network protocol can define up to eight individual control parcels.<br />
The network control parcel NN of GUWMANET includes the predefined<br />
multicast GUWAL address of the node, its unique 16 bit MAC address <strong>and</strong> a list<br />
with up to 10 local nicknames of its by now known 1-hop neighbors, as shown<br />
in Table 2. Typically, underwater networks are sparse; anyway, multiple NN packets<br />
are sent if there are more than 10 neighbors. The NN parcels are also used for<br />
network initialization described in the next section.<br />
Table 2. Format of a Nickname Notification (NN) parcel included in a GUWAL Data frame<br />
Position Length Field<br />
1-2 2 Parcel Type (Data)<br />
3 1 End-to-End Acknowledgment (no)<br />
4 1 Priority Flag (low)<br />
5-10 6 Source Address (own address)<br />
11-16 6 Destination Address (broadcast = 111111 2 )<br />
17-20 4 Data Type (Network Control)<br />
21-23 3 Network Control Type (NN)<br />
24-42 19 Timestamp<br />
43-92 50 Nicknames of 10x 1-hop Neighbors<br />
93-108 16 MAC (own address)<br />
109-111 3 unused<br />
113-128 16 Checksum
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
35<br />
If any of the neighbors receives a NN <strong>and</strong> has an objection, because it already<br />
has a neighbor with this nickname, it replies with a nickname collision notification<br />
(NCN) parcel which has the same fields as the NN parcel. But instead of using<br />
the own 16 bit MAC address the one of the discovering node is used which<br />
was included in the corresponding NN parcel. This allows the discovering node to<br />
extend its 2-hop neighborhood list <strong>and</strong> to choose another free nickname. Before<br />
transmitting a new updated NN parcel the node waits a period T C to collect further<br />
NCN parcels if such were send. In the case a node receives an NN parcel in which<br />
it is not included in the 1-hop neighborhood list, it automatically sends its own<br />
NN parcel to inform the other node about its presence, if it has not already sent<br />
an NCN parcel for that nickname notification.<br />
NCN parcels are repeated with a binary exponential backoff algorithm until<br />
a new NN parcel is received or a limit of L rep is reached. An exponential backoff<br />
is used to allow fast repetitions to correct simple packet errors at the beginning<br />
<strong>and</strong> late repetitions to h<strong>and</strong>le (temporally) asymmetric or broken links. NN parcels<br />
are not repeated automatically, only after the incoming of NN or NCN parcels<br />
of neighbor nodes.<br />
Although the probability is low, it is possible that nickname collisions stay<br />
undetected. This may occur due to packet losses, asymmetric or temporally broken<br />
links during the nickname allocation, or mobile nodes moving to other areas.<br />
Therefore, the network protocol is designed to tolerate double nickname occupancies.<br />
This only leads to redundancies during packet forwarding as will be shown<br />
later. If a nickname collision is detected later, the detecting node will try to fix this<br />
by sending an NCN parcel, followed by the same procedure as described above.<br />
D. Initialization<br />
In our network protocol each node among the nickname needs some initial<br />
network control information. This information is exchanged automatically with<br />
an initialization parcel after a node deployment to allow full ad-hoc capability.<br />
This parcel includes for example a 32 bit UNIX timestamp. The timestamp is used<br />
as reference time for a shortened 19 bit timestamp which is used in GUWAL, see<br />
Table 2. It allows date stamping inside a three month operating period with an accuracy<br />
of 15 s.<br />
Due to the limited battery power resulting in an operation period of three<br />
month, inaccurate clocks with a clock drift of one second per week <strong>and</strong> a lack of synchronization<br />
it is not necessary to have a longer timestamp with higher accuracy.<br />
Before a node can use this shortened GUWAL timestamp it must know the starting<br />
point regarding to the UNIX timestamp where the GUWAL timestamp is zero.<br />
The initialization parcel is send out as reply to parcels with a timestamp set<br />
to zero, here the NN parcel. After the node received the initialization parcel it is<br />
ready for use.
36 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
E. Routing<br />
In this section we describe the routing strategies of GUWMANET in detail.<br />
As mentioned before, multi-hop strategies <strong>and</strong> multicast addresses are used to<br />
fulfill the operational needs of an underwater network. Besides this, an important<br />
design aspect was to have as less overhead as possible due to fixed burst length<br />
of the underlying impulse communication.<br />
The basic idea behind GUWMANET is to leave the decision whether to forward<br />
a parcel to the nodes themselves, comparable to the behavior when gossiping.<br />
A node hears a parcel/gossip <strong>and</strong> decides if there are nodes in the neighborhood<br />
which may be interested in this information. If any node repeats everything we have<br />
simple flooding, but this is very inefficient <strong>and</strong> wastes a lot of energy. Therefore,<br />
the nodes in our network learn passively if they are on the direct route to the destination.<br />
As already mentioned, we need only 10 bits additional network protocol<br />
overhead for this purpose. The 5 bit local nickname of the transmitter <strong>and</strong> during<br />
route establishments the nickname of the last or next hop.<br />
In the beginning, the nodes have only information about the topology in the local<br />
two-hop neighborhood. To get global topology information, each node stores<br />
all incoming packets:<br />
P D × H × T × S<br />
whereby D represents the 128 bits GUWAL data packets, H the network headers,<br />
T the local receive times <strong>and</strong> S the estimated Signal-to-Noise Ratio (SNR).<br />
After a listen period T L plus an additional r<strong>and</strong>om backoff time T Backoff each<br />
node forwards the data packet d, even if it is addressed itself as destination, because<br />
there might exist more nodes in the network with the same operational network<br />
address (multicast). The forwarding node puts its own nickname into the source<br />
address field of the network header. For the last hop field all received parcels with<br />
data content d in M are considered:<br />
P d : ={(d', h', t', s') P | d' = d}<br />
In this subset all parcels with a SNR lower than a threshold SNR min are filtered<br />
out:<br />
P : {( d ', h', t ', s') P | s' SNR<br />
}<br />
d<br />
As last hop field the own nickname is chosen if the node is the first transmitter<br />
or the nickname of the transmitter of the first received parcel m in P * d or,<br />
if P * d is empty, the parcel with the highest SNR is chosen:<br />
<br />
* * *<br />
p' Pd : p" Pd : t' t", if Pd<br />
<br />
P <br />
<br />
p' P : p" P : s' s", else <br />
d<br />
d<br />
If a node overhears that it was elected as last hop inside a forwarded message<br />
of one of its neighbors, it generates a temporary routing entry with the two 6 bits<br />
d<br />
min
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
37<br />
source <strong>and</strong> destination addresses included in the data part <strong>and</strong> the physical addresses<br />
of the last <strong>and</strong> next hop.<br />
All addressed destination nodes receiving the packet have to reply with<br />
an acknowledgment parcel. With the help of the temporary routing entries<br />
the acknowledgment packet can be routed back to the source node. Each node<br />
that was elected as last hop knows that it is on the direct way back to the source<br />
node <strong>and</strong> responsible for data forwarding. All nodes being involved in the back<br />
routing process convert the temporary routing entries into permanent ones <strong>and</strong><br />
will now forward all data packets with the same GUWAL source <strong>and</strong> destination<br />
address tuple. We emphasize that after this process only the routes from<br />
the source node to the destination nodes are learned but not vice versa, because<br />
there might be more nodes with the same address like the source node which<br />
are not considered yet.<br />
After a route is established, all following data transmissions are sent with the last<br />
hop field set to zero. This indicates that there is a known route <strong>and</strong> all other nodes<br />
without permanent routing entries should not flood this message again. If the route<br />
gets broken due to node or link failures, the last hop field is reused again as before,<br />
which initiates a new route discovery with flooding.<br />
Mobile nodes like submarines <strong>and</strong> AUVs possess a special role during the route<br />
discovery process. Due to their mobility, they are bad c<strong>and</strong>idates for static routes.<br />
Therefore, they are only elected as last hops if there exist no alternatives after<br />
an additional waiting period of T mob . Also, the established routes to or from mobile<br />
nodes have a limited lifetime. If a node has not forwarded a message during<br />
a predefined time period T life the routing entries are discarded <strong>and</strong> a new routing<br />
process is started, because it is unlikely that this route still works. Mobile nodes<br />
can be easily identified by their operational address; they have the group number 3<br />
as defined in Chapter IV.<br />
We explain in the next section with a simple example how the above described<br />
route establishment works.<br />
F. Route establishment example<br />
Figure 3 shows an example topology whereby each dot represents a node<br />
<strong>and</strong> each line a connection between two nodes. The number above each node<br />
represents its local nickname, whereby the apostrophes are only for distinction<br />
in this description. In reality the nicknames 1 <strong>and</strong> 1’ are equal. The local nicknames<br />
should only be unique in the two-hop neighborhood if possible. In the following,<br />
we explain how the route establishment works; if node 1 with the GUWAL address<br />
A wants to transmit data to node 4’ with the GUWAL address B.
38 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 3. Example network topology with local nicknames<br />
First of all, node 1 broadcasts its data packet. Thereby, the source nickname<br />
<strong>and</strong> the last hop field inside the network header are set to 1:<br />
1 → [1,1] + [A → B: DATA]<br />
In the beginning, no nodes have routing information. Therefore, all neighbors<br />
of node 1 which receive this message forward the data. The parcel itself stays steady,<br />
whereby the source nickname of the network header is replaced by the nickname<br />
of the forwarding node. As last hop the nickname of node 1 is chosen, as shown<br />
in Figure 4.<br />
2 → [2,1] + [A → B: DATA]<br />
In this way, the message is flooded through the network.<br />
Figure 4. Node 2 rebroadcasts the data of node 1. Node 1 overhears that it was chosen as last hop<br />
<strong>and</strong> creates a temporally routing entry<br />
Figure 5. Temporally routes (see Table 3) used to send back the acknowledgment.<br />
On the way back, the routing entries get persistent<br />
During this flooding process each node overhearing a message with a last hop<br />
nickname equal to its own creates a routing entry in a temporally routing table,<br />
as shown in Table 3.<br />
Also the addressed node 4’ with the GUWAL address rebroadcasts the data parcel,<br />
because there might be more nodes with the GUWAL address B in the network:<br />
4’ → [4,3] + [A → B: DATA]
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
39<br />
After this, node 4’ sends out an acknowledgment parcel which is forwarded<br />
back to node 1 using the temporally routing tables. During the complete back<br />
forwarding the last hop field is set to zero:<br />
4’ → [4,0] + [B → A: ACK]<br />
Table 3. Temporally routing entries of all nodes<br />
Node From To Next Node From To Next<br />
1 A B 2 7 A B 8<br />
1 A B 3 8 A B 6’<br />
1 A B 4 3’ A B 4’<br />
1 A B 5 5’ A B 7’<br />
1 A B 6 6’ A B 2’<br />
1 A B 7 7’ A B 1’<br />
2 A B 3’ 4’ A B 8’<br />
3 A B 5’<br />
Due to the empty last hop field, the message is not flooded back. Instead,<br />
only node 3’ forwards the acknowledgment back, because it has a temporally<br />
routing entry after overhearing his election as last hop from node 4’ in the previous<br />
transmission. This is repeated until the acknowledgement reaches node<br />
1 <strong>and</strong> a complete persistent route is established. Even, if there is more than one<br />
destination node, all routes are learned simultaneously. Additionally, we point out<br />
that it is necessary to store the data parcel itself in each temporally routing entry,<br />
to distinguish parallel route discoveries. The acknowledgment parcel includes<br />
the 16 bit checksum of the data parcel which allows an association of the ACK<br />
with the temporary routing entry.<br />
As mentioned before, this route is valid for transmissions from A to B only<br />
<strong>and</strong> not vice versa, because the GUWAL address of A is not necessarily used<br />
as unicast address.<br />
G. Packet loss <strong>and</strong> broken link h<strong>and</strong>ling<br />
In general, the probability of collisions in the underwater channel is very low;<br />
even though flooding creates a lot of redundancy during the route establishment<br />
phase. That is because the transmission time is very low compared to the propagation<br />
time; in consequence the channel is idle most of the time <strong>and</strong> not occupied<br />
with an ongoing transmission. In our underlying impulse communication we have<br />
a transmission time of 0.3 s for a GUWAL parcel whereas the propagation time<br />
can be up to 6−7 s. This is a fundamental difference to terrestrial networks where<br />
the data rate is much higher <strong>and</strong> the signals propagate with light speed.
40 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
On the other side, the bit error rate of an underwater channel can be very<br />
high, depending on weather conditions <strong>and</strong> noise. Therefore, packet losses must be<br />
h<strong>and</strong>led. As mentioned in the previous chapter we use implicit acknowledgments<br />
to indicate successful transmissions from hop to hop. If a packet forwarding from<br />
a neighbor stays out, the message will be repeated. In GUWMANET a message<br />
is retransmitted up to 5 times with an exponential backoff. After this, the link<br />
is declared as broken <strong>and</strong> the neighbor is removed from the neighborhood list.<br />
If a link is broken during a forwarding process on an established route, the route<br />
has to be updated. As already mentioned, this is done by using the last hop field.<br />
The neighbor nodes will flood the message again, if the last hop field is nonzero.<br />
This results in a new route discovery process to renew the broken route.<br />
Nevertheless, these single routes without redundancy are very vulnerable to<br />
temporally link failures or asymmetric links. To overcome this problem, we introduce<br />
in the next section an enhancement of GUWMANET, which adds additional<br />
redundancy along a route if necessary.<br />
H. Corridor as route enhancement<br />
In this section we introduce a modification of GUWMANET to enhance<br />
the packet delivery ratio during bad weather conditions. Rain <strong>and</strong> breaking waves<br />
on the surface increase the channel noise significantly which leads to a much<br />
higher bit error rate. To overcome this problem, additional redundancy is generated<br />
by involving the neighbors along the direct route. We call this enlarged route<br />
corridor, which is illustrated in Figure 6.<br />
Figure 6. Corridor as route enhancement for a higher packet delivery ratio<br />
For this objective, the route discovery process is modified in the following<br />
way. If a data parcel reaches one of its addressed destination nodes it will send<br />
out an acknowledgement as usual. But this time, the last hop is not left empty<br />
anymore. Instead, it is used in acknowledgment parcels as next hop field, wherein<br />
the transmitter puts its elected previous hop. This node is intended to forward<br />
the acknowledgment back to the source node. Now, not only this elected next<br />
hop will forward the packet, but also all nodes having this elected node as direct<br />
neighbor. This is like gossiping in the real world; gossip is circulated if you know<br />
your neighbor is interested in it too.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
41<br />
Figure 7 shows an example. Node 4’ has elected node 3’ as next hop, whereby<br />
node 6’ <strong>and</strong> node 7’ knowing node 3’ <strong>and</strong> 4’ participate as corridor nodes in the forwarding<br />
process. Multiple receptions at node 3’ allow utilization of network-coding<br />
strategies, as described later in Chapter VII. This technique allows restoring messages,<br />
even if all single transmissions are error-prone.<br />
Figure 7. Adding next hop during back forwarding of an acknowledgment<br />
To avoid unnecessary transmissions, the additional corridor nodes only forward<br />
the data if the node on the direct route did not. For this purpose, we introduce<br />
an additional backoff T corridor to the normal backoff T backoff combined with the link<br />
quality L quality which is between 0 <strong>and</strong> 1:<br />
T forward = T backoff + T corridor . (2 − L quality )<br />
The timer is canceled if the node overhears a transmission of the node on<br />
the direct route or reset if the message was repeated first by another neighbor.<br />
During the back forwarding of the acknowledgment the nodes on direct node<br />
make their persistent routing entries as before. But this time, also the nodes on<br />
the corridor make persistent routing entries, which indicate that they are jointly<br />
responsible to forward data parcels. Note, during data forwarding the next/last<br />
hop is still not used <strong>and</strong> left empty as before. The packet forwarding will be only<br />
decided with the usage of the persistent routing entries.<br />
VI. Evaluation<br />
Sea trials are costly due to the need of expensive equipment <strong>and</strong> personal. Therefore,<br />
we developed an underwater acoustic emulation system to test GUWMANET<br />
in an environment as close as possible to real hardware. This emulation test bed<br />
uses a real acoustic channel with the same physical layer methods as underwater.<br />
The only difference is, that the communication takes place in air instead of water.<br />
Insulation material is used to model the absorption losses of sound waves, which<br />
allows the modulation of a scenario of 8 km × 30 km. Only the propagation delay<br />
is artificially created by delaying incoming transmissions.<br />
A cluster of 10 computers equipped with microphones <strong>and</strong> loudspeakers are<br />
used to emulate the network nodes. They are arranged in a topology similar to<br />
the RACUN scenario described in Chapter III with 4 barriers consisting of 9 bottom<br />
nodes <strong>and</strong> an additional mobile node.
42 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
We implemented GUWMANET inside this emulations system <strong>and</strong> made<br />
a concept study of the routing mechanisms <strong>and</strong> first performance analyses. The route<br />
establishment algorithms were tested with 3 hops <strong>and</strong> multicast addresses. These<br />
emulations are the first step of the evaluation <strong>and</strong> will be enlarged to additional<br />
simulations <strong>and</strong> sea trials.<br />
VII. Network-coding<br />
In underwater acoustic networks high bit error rates are common. Therefore,<br />
error detection <strong>and</strong> correction techniques have to be used to enable reliable communications.<br />
Common ways are the use in the form of so called checksums in combination<br />
with ARQ <strong>and</strong> Forward Error Correction (FEC) mechanisms in the physical<br />
layer methods. If a packet error is detected, the simplest way is to drop the packet<br />
<strong>and</strong> wait/ask for a retransmission. But retransmissions waste valuable energy, occupy<br />
the channel <strong>and</strong> increase the packet delay.<br />
A much more efficient way is to use a posteriori error correction techniques<br />
like clustering of all incoming short 128 bit parcels. The idea behind this is to merge<br />
multiple corrupted parcels <strong>and</strong> merge them into correct one. In real life gossiping<br />
messages contains lies; the gossip average results in true facts. The network-coding<br />
approach with clustering techniques was proposed in the RACUN project [9] <strong>and</strong><br />
is an essential part of gossiping.<br />
VIII. Conclusion<br />
In this paper we introduced a new network called Gossiping in Underwater<br />
Mobile Ad-Hoc Networks (GUWMANET). This protocol is designed from scratch<br />
fitting to the special needs of underwater communication. It is designed to fulfill<br />
the requirements of the scenarios defined in the RACUN project; an European project<br />
for robust underwater communication, supporting stationary as well as bottom nodes.<br />
GUWMANET is based on impulse communication as physical layer method,<br />
which sends out short data bursts with a fixed length of 128 bit. This makes it necessary,<br />
that our protocol gets along with only 10 bit additional protocol overhead.<br />
These 10 bits are used for two 5 bit local nicknames, identifying the transmitter<br />
node <strong>and</strong> the last hop. With the help of these two fields a persistent route can be<br />
found, even if there are multiple destinations. We also defined the Generic Underwater<br />
Application Language (GUWAL) to overcome the restrictions of 128 bits for<br />
application data.<br />
At least, we introduced a protocol enhancement using corridors for packet<br />
forwarding. These corridors generate additional redundancy if necessary <strong>and</strong> enable<br />
network-coding strategies to restore error-prone messages. This is done by using<br />
clustering algorithms, which can be used to the low message size of 128 bit <strong>and</strong><br />
the low number of packet transmissions in underwater networks.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
43<br />
IX. Future work<br />
As mentioned in the evaluation chapter, we already made first concept studies<br />
<strong>and</strong> analyses of GUWMANET. The next steps are simulations with the simulation<br />
framework DESERT Underwater, an NS-Miracle-based [11], [13] framework to<br />
DEsign, Simulate, Emulate <strong>and</strong> Realize Test-beds for underwater network protocols [10]<br />
developed by the University of Padova. This framework allows us to enlarge our<br />
studies to higher node numbers as were foreseen in the RACUN scenario. Beside<br />
this, GUWMANET can be compared with other network protocols which are<br />
already implemented in DESERT underwater.<br />
After detailed simulation <strong>and</strong> emulation studies sea trials are planned to<br />
demonstrate the capability of our network protocol to fulfill the requirements<br />
of the RACUN scenario.<br />
X. Acknowledgment<br />
We gratefully acknowledge the partners of the project Robust Acoustic <strong>Communications</strong><br />
in Underwater Networks (RACUN) for their helpful discussions <strong>and</strong><br />
advices. The RACUN project is part of the EDA UMS program (European Unmanned<br />
Maritime Systems for MCM <strong>and</strong> other naval applications), <strong>and</strong> is funded<br />
by the Ministries of Defence of the five participating nations Germany, Italy, Netherl<strong>and</strong>s,<br />
Norway, Sweden. Partners of this project are: Atlas Elektronik (Germany),<br />
WTD71-FWG (Germany), L-3 <strong>Communications</strong> ELAC Nautik (Germany), TNO<br />
(The Netherl<strong>and</strong>s), Kongsberg Maritime (Norway), FFI (Norway), FOI (Sweden),<br />
SAAB (Sweden), WASS (Italy) <strong>and</strong> CETENA (Italy).<br />
References<br />
[1] I.F. Akyildiz, D. Pompili, T. Melodia, “Underwater Acoustic Sensor Networks:<br />
Research Challenges”, Ad Hoc Networks, vol. 3, no. 3, pp. 257-279, May 2005.<br />
[2] European Defense Agency (EDA) Project Arrangement No. B0386, http://www.<br />
racun-project.eu<br />
[3] J. Kalwa, “The RACUN-project: Robust acoustic communications in underwater<br />
networks – An overview”, OCEANS, 2011 IEEE – Spain, pp. 1-6, 6-9 June 2011, DOI:<br />
10.1109/Oceans-Spain.2011.6003495.<br />
[4] I. Nissen, “Alternativ Ansatz zur verratsarmen Unterwasser-kommunikaton durch<br />
Verwendung eines Transienten im Kontext von IFS und JUWEL”, FWG Research Report<br />
IB 2009-3; Research Department for Underwater Acoustics <strong>and</strong> Marine Geophysics<br />
(FWG) – WTD 71, Kiel, 2009.<br />
[5] M. Goetz, S. Azad, P. Casari, I. Nissen, M. Zorzi, “Jamming-Resistant Multipath<br />
Routing for Reliable Intruder Detection in Underwater Networks”, Proceedings
44 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
of the Sixth ACM Inernational Workshop on Underwater Networks, WUWNet’11,<br />
Seattle, Washington, USA, Dec. 1-2, 2011. DOI: 10.1145/2076569.2076579.<br />
[6] I. Nissen, M. Goetz, “Generic Underwater Application Language (GUWAL) –<br />
A Specification Approach”, Research Report WTD71 – 0161/2010 FB, Kiel, Germany,<br />
20.12.2010.<br />
[7] R. Otnes, A. Asterjadhi, P. Casari, M. Goetz, T. Husøy, I. Nissen, K. Rimstad,<br />
P. van Walree, M. Zorzi, “Underwater Acoustic Networking Techniques”, SpringerBriefs<br />
in Electrical <strong>and</strong> Computer Engineering, DOI: 10.1007/978-3-642-25224-2_1, 2012.<br />
[8] N. Abramson, “Development of the ALOHANET”. IEEE Transactions on <strong>Information</strong><br />
Theory, 31(2):119-123, 1985.<br />
[9] I. Nissen, M. Goetz, T. Wiegmann, T. Schäl, “Clustering of tactical underwater<br />
messages”, Research Report WTD71-0065/2012, Kiel 2012. In Preparation.<br />
[10] R. Masiero, S. Azad, F. Favaro, M. Petrani, G. Toso, F. Guerr, P. Casari, M. Zorzi,<br />
“DESERT Underwater: an NS-Miracle-based framework to DEsign, Simulate, Emulate<br />
<strong>and</strong> Realize Test-beds for Underwater network protocols”, Oceans 2012, Yeosou, Republic<br />
of Korea, May 2012.<br />
[11] The Network Simulator – ns-2, Last time accessed: March 2012. Available:<br />
http://nsnam.isi.edu/nsnam/index.php/User_<strong>Information</strong><br />
[12] The DESERT Underwater libraries – DESERT, Last time accessed: March 2012.<br />
Available: http://nautilus.dei.unipd.it/desert-underwater<br />
[13] The Network Simulator – NS-Miracle, Last time accessed: March 2012. Available:<br />
http://dgt.dei.unipd.it/download
Network Routing by Artificial Neural Network<br />
Michal Turčaník<br />
Department of Informatics, Armed Forces Academy, Liptovský Mikuláš, Slovakia,<br />
michal.turcanik@aos.sk<br />
Abstract: Author presents a design of the artificial neural network for routing in the sensor network<br />
in this paper. The routing table is replaced by artificial neural network. The main aim is to realize this<br />
operation as fast as possible. Optimized neural network is implemented in the reconfigurable hardware.<br />
The paper concludes with possible future research areas.<br />
Keywords: artificial neural network, FPGA, network routing<br />
I. Introduction<br />
Sensor networks consist of small nodes with sensing, computation, <strong>and</strong> wireless<br />
communications capabilities. Many routing, power management, <strong>and</strong> data<br />
dissemination protocols have been specially designed for sensor network where<br />
saving energy is an essential design issue. The focus, however, has been given to<br />
the routing protocols which might differ depending on the application <strong>and</strong> network<br />
architecture.<br />
A new approach has been proposed for the routing problem in the sensor<br />
network in this paper. The routing table is replaced by artificial neural network<br />
in this approach. The main aim is to realize this operation as fast as possible.<br />
In this paper author used offline learning method. Offline training regards to<br />
learning procedure on a general-purpose computing platform before the trained<br />
system is implemented in hardware. The software that was chosen for offline training<br />
is MATLAB. Also was used Xilinx ISE to synthesize of VHDL code <strong>and</strong> simulate.<br />
This paper is organized as follows: part II introduces the sensor network topology.<br />
Part III presents artificial neural network (ANN). Using ANN for network<br />
routing <strong>and</strong> ANN optimization is presented in part IV. Part V presents the results<br />
<strong>and</strong> discussion about results, <strong>and</strong> finally part VI concludes the paper.<br />
II. Sensor network topology<br />
Networking unattended sensor nodes may have profound effect on the efficiency<br />
of many military <strong>and</strong> civil applications such as target field imaging, intru-
46 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
sion detection, weather monitoring, security <strong>and</strong> tactical surveillance, distributed<br />
computing, detecting ambient conditions such as temperature, movement, sound,<br />
light, or the presence of certain objects, inventory control, <strong>and</strong> disaster management.<br />
Deployment of a sensor network in these applications can be in r<strong>and</strong>om fashion<br />
(e.g., dropped from an airplane) or can be planted manually (e.g., fire alarm sensors<br />
in a facility). For example, in a disaster management application, a large number<br />
of sensors can be dropped from a helicopter. Networking these sensors can assist<br />
rescue operations by locating survivors, identifying risky areas, <strong>and</strong> making the rescue<br />
team more aware of the overall situation in the disaster area [1].<br />
Figure 1. Sensor network (R – router, S – sensor)<br />
In the past few years, an intensive research that addresses the potential of collaboration<br />
among sensors in data gathering <strong>and</strong> processing <strong>and</strong> in the coordination<br />
<strong>and</strong> management of the sensing activity were conducted. However, sensor nodes<br />
are constrained in energy supply <strong>and</strong> b<strong>and</strong>width. Thus, innovative techniques that<br />
eliminate energy inefficiencies that would shorten the lifetime of the network are<br />
highly required. Such constraints combined with a typical deployment of large<br />
number of sensor nodes pose many challenges to the design <strong>and</strong> management sensor<br />
networks <strong>and</strong> necessitate energy-awareness at all layers of the networking protocol<br />
stack. For example, at the network layer, it is highly desirable to find methods for<br />
energy-efficient route discovery <strong>and</strong> relaying of data from the sensor nodes so that<br />
the lifetime of the network is maximized [2].<br />
III. Artificial neural network<br />
Artificial neural networks have been trained to perform complex functions<br />
in various fields, including pattern recognition, identification, classification, speach,
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
47<br />
vision, <strong>and</strong> control systems [9, 10, 11]. Neural networks are composed of simple<br />
elements operating in parallel. These elements are inspired by biological nervous<br />
systems. As in the nature, the connections between elements largely determine<br />
the network function. A neural network can be trained to perform a particular<br />
function by adjusting the values of the connections (weights) between elements.<br />
Typically, neural networks are adjusted, or trained, so that a particular input leads<br />
to a specific target output. There, the network is adjusted, based on a comparison<br />
of the output <strong>and</strong> the target, until the network output matches the target. Typically,<br />
many such input/target pairs are needed to train a network [3].<br />
Many variations of the perceptron were created by Rosenblatt [4]. One of the simplest<br />
was a single-layer network whose weights <strong>and</strong> biases could be trained to produce<br />
a correct target vector when presented with the corresponding input vector.<br />
The training technique used is called the perceptron learning rule. The perceptron<br />
generated great interest due to its ability to generalize from its training vectors <strong>and</strong><br />
learn from initially r<strong>and</strong>omly distributed connections. Perceptrons are especially suited<br />
for simple problems in pattern classification. They are fast <strong>and</strong> reliable networks for<br />
the problems they can solve. Feedforward networks often have one or more hidden<br />
layers of sigmoid neurons followed by an output layer of linear neurons. Multiple layers<br />
of neurons with nonlinear transfer functions allow the network to learn nonlinear<br />
relationships between input <strong>and</strong> output vectors. The linear output layer is most often<br />
used for function fitting (or nonlinear regression) problems [7].<br />
A multi-layer perceptron (Fig. 2) consists of neurons <strong>and</strong> synapsies (connections).<br />
Each neuron has an input, activation <strong>and</strong> output function. Each synapsy between<br />
two neurons has a weight. The units are organized in layers. Three different types<br />
of neurons are distinguished: input neurons, hidden neurons <strong>and</strong> output neurons.<br />
The input units receive the input data, <strong>and</strong> the output units provide the output [8].<br />
Figure 2. Multilayer perceptron
48 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
The calculation of the final output values proceeds layer by layer. First, the input<br />
signals are applied to the input layer, <strong>and</strong> each neuron of the input layer calculates<br />
its output value. Next, these values are propagated to the next layer; until the output<br />
layer is reached.<br />
IV. Using the artificial neural network for network routing<br />
A. Clasical table look-up aproach in the sensor network<br />
The primary role of routers is to forward data towards their final destination.<br />
A router must decide for each incoming packet where to send it next. More exactly,<br />
the forwarding decision consists in finding the address of the next-hop router as well<br />
as the egress interface through which the packet should be sent. This forwarding<br />
information is stored in a forwarding table that the router computes based on the information<br />
gathered by routing protocols. To consult the forwarding table, the router<br />
uses the packet’s destination address as a key; this operation is called address lookup.<br />
Specifically, the address lookup operation is a major bottleneck in the forwarding<br />
performance of today’s routers. This paper presents a proposal a new method<br />
to realize algorithm for efficient address lookup.<br />
B. Artificial neural network topology<br />
Neural networks map between a data set of numeric inputs <strong>and</strong> a set of numeric<br />
targets. To solve a problem of routing in the mash topology of the sensor<br />
network (Fig. 1) was used artificial neural network. A three layer feed-forward<br />
network with sigmoid hidden neurons <strong>and</strong> linear output neurons are used to solve<br />
multi-dimensional problems.<br />
Figure 3. The structure of the multilayer perceptron for network routing
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
49<br />
The structure of the multilayer perceptron is shown in Fig. 3. The input layer<br />
of the neural network receives input data for routing in the sensor network. Input<br />
data represent address (node ID) of the data packet that should be transferred<br />
through sensor network (Fig. 1). The interface status represents information<br />
about status of all interfaces for single router. All active interfaces can be used<br />
to route data. Data communications using inactive interfaces are rerouted to active<br />
interfaces. Some sensor nodes may fail or be blocked due to lack of power,<br />
physical damage, or environmental interference. The failure of sensor nodes<br />
should not affect the overall task of the sensor network. If many nodes fail, routing<br />
protocols must accommodate formation of new links <strong>and</strong> routes to the data<br />
collection base stations.<br />
The number of the input layer neurons corresponds to the input information<br />
for multilayer perceptron. The number of the neurons of the hidden layer is a target<br />
of the optimization. The number of the neurons of the output layer corresponds to<br />
the number of the interfaces of the router of the sensor network.<br />
The value of the output layer´s neurons represents index of the interface that<br />
will be used to send data packet to the destination. If the value of the output neuron<br />
is equal to 1, interface will be used. Otherwise, this interface will not be used. All<br />
layers are fully interconnected <strong>and</strong> there are not feedback connections between<br />
the hidden <strong>and</strong> input layers.<br />
C. ANN optimization<br />
To optimize neural network structure must be done analysis of the number<br />
of neurons in hidden layer from point of view of correct classification [5, 6].<br />
To solve this problem three training sets <strong>and</strong> several models of neural network<br />
were created.<br />
Number of neurons for input <strong>and</strong> output layer is equal to each other for all<br />
models of neural network. Number of neurons in hidden layer is variable <strong>and</strong><br />
it changes in interval from 10 to 100 neurons for training, validation <strong>and</strong> testing<br />
sets.<br />
Training, validation <strong>and</strong> testing sets were created on the base of topology<br />
of the sensor network shown in Fig. 1. The number of samples for neural network<br />
training depends on router, for which is ANN created. Each sample is represented<br />
by one rule of the routing table. There are two main routing rule groups. One group<br />
of rules represents situation when all interfaces are in active state. The second group<br />
of rules are applied when some interface is inactive <strong>and</strong> another interface must be<br />
used to forward data packet.<br />
Training set was used during network training to adjust error <strong>and</strong> it consists<br />
of 70% of samples. Validation set was used to measure network generalization<br />
<strong>and</strong> it consists of 15% of samples. Training is halted when generalization stops<br />
improving. Testing set have no effect on training phase <strong>and</strong> provide independent
50 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
measure of network performance during <strong>and</strong> after training. Testing set consists<br />
of 15% of samples.<br />
The results of Matlab simulation are shown in following tables <strong>and</strong> graphs.<br />
Number<br />
of hidden neurons<br />
Table I. Mean squared error for analyzed ann<br />
Mean Squared Error<br />
Training Validation Testing<br />
10 8.487e-3 2.453e-2 1.526e-1<br />
15 6.954e-2 7.843e-2 9.085e-2<br />
20 7.743e-17 1.081e-16 1.099e-16<br />
Mean squared error (MSE) is the average squared difference between outputs<br />
<strong>and</strong> targets. Lower values are better. Zero means no error. The lowest value of MSE<br />
is for ANN with 20 neurons in the hidden layer.<br />
Number<br />
of hidden neurons<br />
Table II. Regression for analyzed ann<br />
Regression<br />
Training Validation Testing<br />
10 9.690e-1 9.074e-2 4.225e-1<br />
15 7.458e-1 6.926e-1 6.661e-1<br />
20 9.999e-1 9.999e-1 9.999e-1<br />
Regression R values measure the correlation between outputs <strong>and</strong> target.<br />
An R value of 1 means a close relationship, 0 a r<strong>and</strong>om relationship. R values are<br />
again the best for ANN with 20 neurons in the hidden layer.<br />
ANNs with higher number of neurons in the hidden are not shown in the tables,<br />
because the value of MSE <strong>and</strong> R value are worse than ANN with 20 neurons.<br />
The following regression plots display the network outputs with respect to targets<br />
for training, validation, <strong>and</strong> test sets (Fig. 1, Fig. 2 <strong>and</strong> Fig. 3). For a perfect fit,<br />
the data should fall along a 45 degree line, where the network outputs are equal<br />
to the targets. For this problem, the fit is reasonably good for all data sets, with<br />
R values in each case of 0.93 or above. The ANN with 20 neurons in the hidden<br />
layer has the best results.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
51<br />
Figure 4. Regression R for ANN with 10 neurons in the hidden layer<br />
Figure 5. Regression R for ANN with 15 neurons in the hidden layer
52 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 6. Regression R for ANN with 20 neurons in the hidden layer<br />
V. Simulation <strong>and</strong> synthesis results<br />
VHDL (VHSIC hardware description language) is a hardware description<br />
language used in electronic design automation to describe digital <strong>and</strong><br />
mixed-signal systems such as field-programmable gate arrays <strong>and</strong> integrated<br />
circuits [7]. ANN was implemented by VHDL language <strong>and</strong> synthesized using<br />
Xilinx ISE 13.3.<br />
Weights <strong>and</strong> biases that are obtained from Matlab simulation after training<br />
phase are floating point. To be synthesis possible, weights <strong>and</strong> biases of the artificial<br />
neural network are expressed using fixed-point numbers (range scale<br />
was multiplied by 1000) in the FPGA-based implementation. There is no difference<br />
in results between FPGA-based implementation <strong>and</strong> simulation.<br />
The Virtex®-5 LXT ML505 is a general purpose FPGA <strong>and</strong> RocketIO<br />
GTP development board. Provides feature rich general purpose evaluation<br />
<strong>and</strong> development platform. Includes on-board memory <strong>and</strong> industry st<strong>and</strong>ard<br />
connectivity interfaces. It delivers a versatile development platform for embedded<br />
applications. Virtex®-5 LXT ML505 was used as a platform for realization<br />
of the analyzed ANN.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
53<br />
ANN<br />
Table III. Analysis of ann fpga realisation<br />
FPGA<br />
Delay Number of LUT Slices<br />
10 142 ns 1098 524<br />
15 149 ns 1527 714<br />
20 152 ns 1822 865<br />
The results of the practical realisation of the ANN are summarized in previous<br />
table. Main parameters to compare were delay, number of slices <strong>and</strong> number<br />
of 4-inputs LUTs. FPGA (Field Programmable Gate Array) is an integrated circuit<br />
containing a matrix of user-programmable logic cells, being able to implement<br />
complex digital circuitry. The elementary programmable logic block in Xilinx FPGAs<br />
is called slice. LUTs (Look-Up Tables) can implement any 4-input boolean function,<br />
used as combinational function generators. They are usually the number of LUTs<br />
<strong>and</strong> the number of slices (<strong>and</strong> not the number of registers) that are used to compare<br />
the size of FPGA designs.<br />
Delay for all ANN has almost the same value. The highest number of slices<br />
<strong>and</strong> 4-inputs LUTs has ANN with neurons in the hidden layer. The lowest requirement<br />
has ANN with 10 neurons in the hidden layer. The modern FPGA circuits<br />
(thanks to their size) can accommodate easily requirements of the proposed ANNs.<br />
VI. Conclusion<br />
In this paper, was presented a new method for sensor routing table realisation<br />
using neural networks. It was proposed artificial neural network topology<br />
<strong>and</strong> optimization criterions to solve a problem of routing in the mash topology<br />
of the sensor network. The main advantage of the using ANN for table look-up<br />
process is speed. The size of the look-up table in this approach could not influence<br />
the speed of decision where to send packet next as it is in other methods. Time to get<br />
decision from ANN is always the same. ANN could be trained to change the routes<br />
in case of topology changes that could be predicted in the training phase. Thanks<br />
to this ANN does not have to be retrained in the real environment after topology<br />
changes. Analyzed ANNs were practically realised in hardware platform. Execution<br />
of the training process in the hardware can improve this proposal. Future work<br />
can be oriented to realisation embedded system based on MicroBlaze processor<br />
to train ANN in FPGA architecture. This method can be executed in parallel on<br />
an FPGA chip.<br />
Another interesting issue for routing protocols is the consideration of node<br />
mobility. Most of the current protocols assume that the sensor nodes <strong>and</strong> the sink<br />
are stationary. However, there might be situations such as battle environments<br />
where the sink <strong>and</strong> possibly the sensors need to be mobile.
54 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
In such cases, the frequent update of the position of the comm<strong>and</strong> node <strong>and</strong><br />
the sensor nodes <strong>and</strong> the propagation of that information through the network<br />
may excessively drain the energy of nodes. New routing algorithms are needed<br />
in order to h<strong>and</strong>le the overhead of mobility <strong>and</strong> topology changes in such energy<br />
constrained environment.<br />
Other possible future research for routing protocols includes the integration<br />
of sensor networks with wired networks (i.e. Internet). Most of the applications<br />
in security <strong>and</strong> environmental monitoring require the data collected from the sensor<br />
nodes to be transmitted to a server so that further analysis can be done. On<br />
the other h<strong>and</strong>, the requests from the user should be made to the sink through<br />
Internet. Since the routing requirements of each environment are different, further<br />
research is necessary for h<strong>and</strong>ling these kinds of situations.<br />
This work has been supported by the MOD of Slovak Republic grants No. 4/2011<br />
“Partial dynamic reconfiguration of the digital systems in military applications”.<br />
References<br />
[1] J.N. Al-Karaki <strong>and</strong> A.E. Kamal, “Routing Techniques in Wireless Sensor Networks:<br />
A Survey”, IEEE Wireless <strong>Communications</strong>, vol. 11, no. 6, Dec. 2004, pp. 6-28.<br />
[2] O. Al-Kofahi <strong>and</strong> A.E. Kamal, “Survivability Strategies in Multihop Wireless<br />
Networks”, IEEE Wireless <strong>Communications</strong>, vol. 17, no. 5, Oct. 2010, pp. 71-80.<br />
[3] J.L. Elman,”Finding structure in time, Cognitive Science,” vol. 14, 1990, pp. 179-211.<br />
[4] F. Rosenblatt, “Principles of Neurodynamics,” Washington D.C., Spartan Press,<br />
1961.<br />
[5] I. Mokriš <strong>and</strong> M. Turčaník, ”Contribution to the analysis of multilayer perceptrons<br />
for pattern recognition,” Neural Network World. vol. 10, no. 6 (2000), ISSN 1210-0552,<br />
p. 969-982.<br />
[6] M. Turčaník, I. Mokriš, Possible Approach to Optimization of Neural Network<br />
Structure. Proc. of Conf. SECON 97, Warsaw, pp. 326-335.<br />
[7] D. Pattreson, Artificial Neural networks – Theory <strong>and</strong> Applications, Prentice Hall,<br />
1996.<br />
[8] S. Melacci, L. Sarti, M. Maggini, M. Bianchini, “A Neural Network Approach to<br />
Similarity Learning,” Lecture Notes in Computer Science, Artificial Neural Networks<br />
in Pattern Recognition, June 30, 2008, pp. 133-136.<br />
[9] S. Ezzati, H.R. Naji, A. Chegini, P. Habibimehr, “Intelligent Firewall on<br />
Reconfigurable Hardware,“ European Journal of Scientific Research. ISSN 1450-<br />
-216X vol. 47 no. 4 (2010), pp. 509-516.<br />
[10] M. Harakaľ, J. Chmúrny, The Tesseral Processor for Image Processing Based on<br />
Hierarchical Data Structures, Radioengineering, vol. 6, no. 4, 1997, pp. 1-5. ISSN 1210-<br />
-2512.<br />
[11] M. Kuffová, Simulation of fatigue process. In: Mechanics. – ISSN 1734-8927. – vol. 27,<br />
no. 3 (2008), p. 110-112.
An Application of Chord Structure<br />
in Tactical Ad-hoc Network<br />
Jerzy Dołowski, Marek Amanowicz<br />
Institute of Telecommunications, Faculty of Electronics,<br />
<strong>Military</strong> University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong>,<br />
{jerzy.dolowski,marek.amanowicz}@wat.edu.pl<br />
Abstract: Mobile ad hoc network (MANET) is expected to become a prominent st<strong>and</strong>ard in a tactical<br />
environment. However, a tactical network requires a reliable mechanism of discovering resources.<br />
In this paper, we propose using a Peer-to-Peer structure to achieve this goal. The crucial aspects<br />
of the Chord structure’s implementing over MANET are pointed out. A cross-layer communication<br />
is proposed to improve the joining process. The results of simulations show that our solution is able to<br />
work in a fully autonomous way.<br />
Keywords: Peer-to-Peer, Chord, MANET<br />
I. Introduction<br />
Contemporary battlefield requires a deployable comm<strong>and</strong> <strong>and</strong> control system.<br />
A tactical system should cope with an increasing number of services <strong>and</strong> sensors.<br />
SOA (Services Oriented Architecture) is considered a method of tactical services’<br />
consolidation. An implementation of the SOA system requires a distributed register<br />
which would not be prone to damage in a tactical environment. We noticed that<br />
Peer-to-Peer system could be used for this purpose.<br />
The Peer-to-Peer system is a set of equal entities (nodes) that communicate<br />
with each other to share resources. The nodes form a self-organized overlay network.<br />
Among many Peer-to-Peer systems we have chosen the Chord structure. Attractive<br />
features of Chord include its simplicity, provable correctness <strong>and</strong> provable performance.<br />
However, the routing table of Chord is not based on topological feature.<br />
Thus, we propose modification of Chord in order to improve its distance awareness.<br />
A mobile ad hoc network (MANET) is a multi-hop wireless network operating<br />
without infrastructure. All nodes in the network have to cooperate in order to<br />
perform routing. An application of Chord in MANET requires a robust mechanism<br />
of bootstrap. We propose the use of discovering features of MANET.<br />
The rest of the paper is organized as follows: Section 2 presents the related<br />
work, section 3 provides a brief overview of the Chord, whereas in section 4
56 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
we describe, in more details, the crucial aspects of the Chord on top of a MANET<br />
as well as the proposed solutions. We demonstrate the effectiveness of our system<br />
in Section 5 <strong>and</strong> the paper is concluded in Section 6.<br />
II. Related work<br />
Various Peer-to-Peer systems have been proposed for MANET. Most of them<br />
are unstructured (e.g. [6]). Usually unstructured systems use some forms of flooding<br />
to find resources. Flooding-based look-up is rather inefficient <strong>and</strong> does not scale<br />
well. This makes them impractical in a tactical network where b<strong>and</strong>width is limited.<br />
Nevertheless, there are approaches to overcome this limitation, for instance [7].<br />
In the structured Peer-to-Peer systems, the topology is strictly controlled. They<br />
use a Distributed Hash Table (DHT) which allows an efficient <strong>and</strong> deterministic<br />
search for resources. Therefore, in our opinion only structured Peer-to-Peer systems<br />
should be taken into account.<br />
Chord overlay which matches to the underlay network is presented in [8].<br />
This feature is achieved using the minimum-spanning tree in each node. Additionally,<br />
the identifier space is divided among the nodes in a non-contiguous way.<br />
Another improvement of Chord over MANET, which is proposed in [5], consists<br />
in forwarding lookup queries via physically adjacent nodes. In order to make it possible,<br />
a node has to maintain its physically adjacent neighbors. As a consequence,<br />
it results in generating redundant routing traffic.<br />
A different approach is an integration of the DHT with ad hoc network routing.<br />
MAD Pastry [10] is an example of that manner. In this idea, the overlay is built<br />
on top of the AODV protocol <strong>and</strong> both protocols cooperate strictly.<br />
III. The Chord structure<br />
In the Chord [9], each node has a unique identifier ranging from 0 to 2 m −1.<br />
The nodes form a one-dimensional ring according to their identifiers. Each node<br />
maintains a pointer to its successor <strong>and</strong> predecessor node. A successor of the node<br />
is the first node whose identifier is higher than its own identifier. Moreover, each<br />
node maintains information about (at most) m other neighbors, called Fingers. They<br />
are collected in a Finger Table. The i-th row of this table indicates the successor for<br />
interval [n+2 i , n+2 i+1 ), where n is the identifier of the current node.<br />
The resources are mapped to nodes based on their keys (identifiers). In Chord,<br />
a resource is mapped to the first node whose identifier is equal to or follows its key.<br />
An example of a Chord overlay network formed by nine nodes arranged on a circle<br />
is shown in Figure 1.We present also an example of the Finger Table of node n = 24,<br />
<strong>and</strong> location of two resources.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
57<br />
Figure 1. Example of a Chord ring (m = 5)<br />
A message is forwarded toward a closer node in the Finger Table with the highest<br />
identifier value less than or equal to the identifier of the destination node.<br />
As a consequence, the key lookup mechanism in Chord takes O (log N) hops, where<br />
N is the total number of nodes [9].<br />
IV. Adaptation of Chord for MANET<br />
A. The key issues<br />
Considering the introduction of Chord in the MANET, we have to take into<br />
account several key issues. Firstly, a mechanism of bootstrapping is requested.<br />
A new node which intends to join an existing Peer-to-Peer structure has to communicate<br />
with at least one node of this structure. Therefore, a discovery method<br />
is m<strong>and</strong>atory. Secondly, the state machine of the Chord node has to be adjusted<br />
to the ad hoc environment. And thirdly, the routing in Chord is not based on<br />
an underlay network topology. If the node was aware of real distances to others,<br />
it could choose a closer node during a routing process. We suggest implementing<br />
an additional mechanism which will improve nodes’ awareness of distance.<br />
B. A cross-layer mechanism<br />
The MANET manager discovers <strong>and</strong> maintains routes to other nodes. We propose<br />
using these routes by the overlay layer during bootstrapping. The nodes that<br />
could be potentially used for bootstrap are stored in a Bootstrap List.
58 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
We assume that the MANET manager adds every discovered route to the Bootstrap<br />
List using a cross-layer communication – Figure 2.<br />
When the node intends to join a structure, it selects a r<strong>and</strong>om node from<br />
the Bootstrap List. Next, the node sends a request towards it. In case of no response<br />
this entry will be removed from the list. If the list is empty, the node will form<br />
a one-member ring.<br />
Figure 2. The node<br />
The process of adding entries by the MANET manager is independent from<br />
the Chord procedure.<br />
C. A state machine<br />
In Chord, the node maintains an internal state machine. When the node<br />
has successfully joined a ring or has formed a new one-member ring, it goes<br />
into the READY state. In this state, the node waits for incoming requests of joining,<br />
but it does not send these requests itself. The abovementioned behavior<br />
arises from the assumption that an accessibility of the node is invariable during<br />
its operation. However, the use of MANET as an underlay network results<br />
in dynamic changes of the topology. Thus, the internal state machine should<br />
be adapted to the nature of the ad hoc network. The proposed procedure is depicted<br />
in Figure 3.<br />
We propose to introduce a new state called READY_ALONE. The node goes<br />
into this state when it fails to join any member of the Chord ring. The node permanently<br />
tracks changes of its Bootstrap List in this state. Besides this, the node<br />
is ready to receive a request of joining from another node. Furthermore, we also<br />
propose extending the READY state. The node staying in this state should try
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
59<br />
to join the newly discovered nodes. It is essential for detecting nodes that are<br />
members of another ring (partition).<br />
Figure 3. The modified Chord procedure<br />
D. An improvement of the distance awareness<br />
The topology of an overlay network does not reflect the underlying (physical)<br />
topology. This may result in deterioration of the system effectiveness. In particular,<br />
the latency of a request may decrease. Therefore, we propose to use Vivaldi algorithm<br />
that is one of the Internet Coordinate Systems.<br />
Vivaldi [4] is a distributed technique to estimate the latency between nodes<br />
in the Internet. In Vivaldi, a new node computes its coordinates after collecting<br />
latency information from only a few other nodes. Each time a node makes a request<br />
to another node, it measures the network latency to the node. A response<br />
includes the answering node’s current coordinates. The requesting node refines its<br />
coordinates based on the latency measurement <strong>and</strong> the responding node’s informa-
60 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
tion. As Vivaldi is a decentralized procedure, no fixed infrastructure needs to be<br />
deployed. Furthermore, the node does not require any initial data. These features<br />
align well with the requirements of the Peer-to-Peer system.<br />
Figure 4. The pseudocode to find the successor node of an identifier k<br />
However, in order to take advantage of that algorithm it is necessary to modify<br />
the Chord procedures by extending the Finger Table.<br />
The main idea of this proposal is to prepare a set of nodes which potentially<br />
could be predecessors of an identifier k. Then, the node whose distance is the smallest<br />
one is selected.<br />
In the original Chord, a row of the Finger Table contains only one successor.<br />
In our modification, several successors are placed in each row. Moreover, the distance<br />
obtained owing to Vivaldi is associated with each successor. The procedure<br />
of finding the successor has to be modified too. The appropriate pseudocode<br />
is shown in Figure 4.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
61<br />
V. Evaluation<br />
We conducted experiments using a computer simulation technique in order<br />
to evaluate the proposed solution. We selected the OMNeT++ [11] simulation<br />
environment <strong>and</strong> OverSim model [2].<br />
The aim of the evaluation was to determine whether it is possible to effectively<br />
search for an identifier in the Chord structure built on top of MANET as well<br />
as what is the volume of the maintenance traffic.<br />
A. Model<br />
A model of mobile ad hoc network was prepared. We choose the DYMO<br />
(Dynamic MANET On-dem<strong>and</strong>) protocol [3]. The network consisted of a fixed<br />
number of nodes, ranged from 10 to 60. Each node acted as a Chord node. Moreover,<br />
the node was able to use the Vivaldi mechanism <strong>and</strong> extending Finger Table.<br />
This feature was controlled during experiments.<br />
We prepared three scenarios of our simulation investigations. In the first<br />
scenario, the nodes were placed in the simulation area <strong>and</strong> stayed in their position<br />
motionless during operation (a stationary network). In the second <strong>and</strong> third scenario,<br />
the nodes moved according to the R<strong>and</strong>om Way Point mobility model [1].<br />
In this model, the node chooses a r<strong>and</strong>om destination point, <strong>and</strong> next moves toward<br />
it at a constant speed. After reaching its destination, the node stays in it for<br />
a pause time. Then, it begins to move toward the next destination. In our experiments,<br />
the current value of the speed was chosen from the ranges: 1…5 m/s, <strong>and</strong><br />
1…10 m/s in the second <strong>and</strong> third scenario, respectively.<br />
B. Tests <strong>and</strong> performance metrics<br />
Each node that had become a member of a Chord ring started the test application.<br />
This application performed the following tests: One-way lookup, KBR lookup,<br />
<strong>and</strong> DHT lookup.<br />
During the One-way lookup test, the test application sends a message toward<br />
a r<strong>and</strong>om identifier. In the KBR lookup test, the application asks the Chord to look<br />
for a node that is responsible for the given identifier.<br />
In order to evaluate an impact of the Vivaldi mechanism on the process<br />
of obtaining a resource we prepared the DHT lookup test. We assumed that there<br />
are copies of the same resource shared in the Chord structure. In this test, the application<br />
that looks for the resource is eligible to select one of the nodes which<br />
possess that resource.<br />
We use the following metrics to analyze the protocol performance:<br />
– One-way Delivery Ratio – The total fraction of requests that reach the destination<br />
successfully.
62 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
– One-way Latency – The delay between reaching a destination by the message<br />
<strong>and</strong> sending it.<br />
– Lookup Success Ratio – The total fraction of requests for which the originator<br />
receives an answer successfully.<br />
– Lookup Success Latency – The delay between receiving answer <strong>and</strong> sending<br />
the request.<br />
– Get Latency – The cumulative delay between receiving a resource <strong>and</strong><br />
sending the request in DHT lookup test.<br />
Additionally, the total volume of the sent <strong>and</strong> received traffic essential for maintenance<br />
(i.e. refreshing successor, <strong>and</strong> predecessor; refreshing entries in the Finger<br />
Table) was written.<br />
C. Results<br />
The results of our evaluation are shown in Figures 5-11. The notation “ps = 1”<br />
means that the Vivaldi mechanism <strong>and</strong> extending Finger Table were active, whereas<br />
“ps = 0” denotes the original Chord structure.<br />
The delivery ratio for One-way lookup test (Figure 5) reflects the general<br />
efficiency of a node to communicate in the overlay network. Increasing the number<br />
of nodes diminishes the ability to successfully communicate in the overlay.<br />
We found out that the performance of the wireless network is the primary cause<br />
of that observation. The phenomena that are peculiar to mobile ad hoc network<br />
(especially the hidden station) hinder transmission. The improvement of the underlay<br />
network was not our goal.<br />
Figure 5. The one-way delivery ratio
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
63<br />
Nonetheless, the obtained results prove that our application of Chord enables<br />
fully autonomous work on top of MANET. Moreover, our modifications bring a slight<br />
increase in the delivery ratios (Figure 5 <strong>and</strong> Figure 7) as well as some improvement<br />
of the latencies (Figure 6 <strong>and</strong> Figure 8).<br />
Figure 6. The one-way latency<br />
Figure 7. The lookup success ratio
64 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 8. The lookup latency<br />
The knowledge about real distances between nodes may also be exploited<br />
to optimize a process of getting resources. Owing to our modification, the node<br />
is given a chance to choose the nearest node which possesses the requesting resource.<br />
As shown in the Figure 9, the latency is decreased.<br />
Figure 10 <strong>and</strong> Figure 11 depict the total sent <strong>and</strong> received maintenance traffic,<br />
respectively. The underlay network is not overloaded by this kind of traffic. However,<br />
it should be stressed that the frequency of refreshing has considerable impact on<br />
the value of the above-mentioned traffic.<br />
Figure 9. The Get latency
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
65<br />
Figure 10. Sent maintenance traffic<br />
Figure 11. Received maintenance traffic<br />
VI. Conclusion<br />
In this paper, we proved that the Chord structure is able to operate on top<br />
of MANET in a fully autonomous manner. The adaptations we proposed resolve<br />
the joining process as well as improve distance awareness of the node. Although<br />
the effectiveness of work is not perfect, the network is not degraded due to the maintenance<br />
traffic.<br />
During future work we intend to test our solution in a real ad hoc network.<br />
Therefore, we have started practical implementation of the modified Chord<br />
structure.
66 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
References<br />
[1] N. Aschenbruck, E. Gerhards-Padilla, <strong>and</strong> P. Martini, “A survey on mobility<br />
models for performance analysis in tactical mobile networks,” in: Proceedings<br />
of <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> Systems Conference (MCC 2007),<br />
Sep. 2007, Bonn, Germany, pp. 25-26.<br />
[2] I. Baumgart, B. Heep, <strong>and</strong> S. Krause, “OverSim: A scalable <strong>and</strong> flexible overlay<br />
framework for simulation <strong>and</strong> real network applications,” in: Proceedings<br />
of the International Conference on Peer-to-Peer Computing, Seattle, WA, USA,<br />
Sep. 2009, pp. 87-88.<br />
[3] I. Chakeres, <strong>and</strong> C. Perkins, “Dynamic MANET On-dem<strong>and</strong> (DYMO) Routing,”<br />
IETF Internet-Draft, draft-ietf-manet-dymo-21, 2011.<br />
[4] F. Dabek, R. Cox, F. Kaashoek, <strong>and</strong> R. Morris, “Vivaldi: A decentralized network<br />
coordinate system,” in: Proceedings of the ACM SIGCOMM, Portl<strong>and</strong>, Aug. 2004,<br />
pp. 15-26.<br />
[5] R. Kummer, P. Kropf, <strong>and</strong> P. Felber, “Distributed lookup in structured peer-topeer<br />
ad-hoc networks,” in: Proceeding of the on On the Move to Meaningful Internet<br />
Systems, 2006, pp. 1541-1554.<br />
[6] L.B. Oliveira, I.G. Siqueira, <strong>and</strong> A.A.F. Loureiro, “On the performance of ad hoc<br />
routing protocols under a peer-to-peer application,” Journal of Parallel <strong>and</strong> Distributed<br />
Computing, vol. 65, Issue 11, Nov. 2005.<br />
[7] N. Shah, <strong>and</strong> D. Qian, “An Efficient Unstructured P2P Overlay over MANET Using<br />
Underlying Proactive Routing,” in: Proceedings of Seventh International Conference<br />
on the Mobile Ad-hoc <strong>and</strong> Sensor Networks, 2011, pp. 248-255.<br />
[8] N. Shah, D. Qian, <strong>and</strong> Rui Wang, “MANET adaptive structured P2P overlay,” Peerto-Peer<br />
Networking <strong>and</strong> Applications, vol. 5, Number 2, 2012, pp. 143-160.<br />
[9] I. Stoica, R. Morris, D. Liben-Nowell, D.R. Karger, M.F. Kaashoek, F. Dabek,<br />
<strong>and</strong> H. Balakrishnan, “Chord: A Scalable Peer-to-Peer Lookup Protocol for<br />
Internet Applications,” IEEE/ACM Transactions on Networking, vol. 11(1), Feb. 2003,<br />
pp. 17-32.<br />
[10] T. Zahn, <strong>and</strong> J.H. Schiller, “DHT-based unicast for mobile ad hoc networks,”<br />
in: Proceedings of Fourth Annual IEEE International Conference on Pervasive<br />
Computing <strong>and</strong> <strong>Communications</strong> Workshops, 2006, pp. 179-183.<br />
[11] OMNeT++ discrete event simulation system, http://www.omnetpp.org
Revisiting the DARPA’s Idea<br />
of a Programmable Network<br />
Vladimir Aubrecht 1 , Tomas Koutny 2<br />
1 Faculty of Applied Sciences, University of West Bohemia, Pilsen, Czech Republic,<br />
aubrecht@kiv.zcu.cz<br />
2 Faculty of Applied Sciences, University of West Bohemia, Pilsen, Czech Republic,<br />
txkoutny@kiv.zcu.cz<br />
Abstract: In 1995, DARPA recognized the shortcomings of IP networks. As a response, the experts<br />
initiated a project that should become the cornerstone of new military communication architecture.<br />
The goal was a network that would be resistant to attack <strong>and</strong> to operate despite successful attacks,<br />
while allowing a secure sharing of data at all levels of comm<strong>and</strong>. The project was named Active<br />
Networks. However, it failed to meet performance <strong>and</strong> security criteria. We revisited this problem,<br />
identified performance <strong>and</strong> security bottlenecks so that we present an advance to fast, secure <strong>and</strong><br />
scalable active network server – Smart Active Node.<br />
Keywords: programmable network, active networking, smart active node<br />
I. Introduction<br />
In 1995, DARPA recognized the shortcomings of IP networks. As a response<br />
the experts initiated a project that should become the cornerstone of new military<br />
communication architecture. The goal was a network that would be resistant to<br />
attack <strong>and</strong> to operate despite successful attacks, while allowing a secure sharing<br />
of data at all levels of comm<strong>and</strong>. The project was named Active Networks.<br />
Initially, DARPA funded the research on active networks. A number of wellaccepted<br />
papers appeared to demonstrate the capability of the active-networking<br />
architecture to fulfill the desired goals. With a time, it has shown that these papers<br />
presented rather a proof of the concept than a real-world usable implementation<br />
of an active networking server. The existing active networking servers failed to<br />
widespread beyond the research activities. As DARPA ceased funding this research,<br />
the research stopped gradually. Active Networks failed to meet performance <strong>and</strong><br />
security criteria.<br />
The history of computer networks shows a periodic attempt to benefit from<br />
network programmability. For example, it is the Wormhole approach to loadsharing<br />
[1], the paradigm of mobile agents [2] <strong>and</strong> finally, the active networking.
68 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Therefore, we decided to revisit the idea of active networking. We identified performance<br />
<strong>and</strong> security bottlenecks so that we present an advance to fast, secure<br />
<strong>and</strong> scalable active network server – Smart Active Node.<br />
Our decision was based on a development of load-redistribution method<br />
that runs on a simple active networking server – Grade32 [3, 4]. Grade32 runs<br />
processor-native code, but provides no security. In a short, we added a security to<br />
the Grade32 approach.<br />
The paper is organized as follows. The second section describes the related<br />
work. The third section presents Smart Active Node’s (SAN) architecture <strong>and</strong><br />
server’s scalability. The fourth section describes the programming environment<br />
for the capsules <strong>and</strong> active applications. The fifth section presents the use of Ada’s<br />
rendez-vous to implement process isolation <strong>and</strong> making calls to the applicationprogramming<br />
interface (API). The sixth section describes the implementation<br />
of access rights. The seventh section describes capsule transmission. The eighth<br />
section presents results. The ninth section concludes the paper.<br />
II. Related work<br />
A. Active networks<br />
In active networks, a capsule supersedes the packet. The capsule is a packet<br />
associated with a program code. The capsule’s header contains a hash digest<br />
of the program code. This program code can h<strong>and</strong>le the data being transmitted.<br />
A network node can download the program code as needed.<br />
In general, a network protocol is associated with a program code that h<strong>and</strong>les<br />
its packets. In an IP network, the program code has to already run at the network<br />
node, prior the packets are received. Therefore, the services provided are rigid <strong>and</strong><br />
has to be st<strong>and</strong>ardized first. In an active network, the network node can download<br />
<strong>and</strong> execute the program code as needed. Therefore, only the program code notation<br />
<strong>and</strong> execution environment have to be st<strong>and</strong>ardized. As a result, the network<br />
can learn new protocols <strong>and</strong> functionality immediately.<br />
In IP networks, the destination node has to already run a program that<br />
can h<strong>and</strong>le the incoming packets of a given protocol. Active Networks do not have<br />
this restriction.<br />
B. Preceding concept<br />
Let us discuss the concept of active networking that precedes SAN. In the bottom,<br />
there is a so-called NodeOS. It is either a st<strong>and</strong>ard operating system such as Linux or<br />
Windows, or it is a specifically written operating system such as JanOS [5].<br />
On the top of the NodeOS, there are so-called execution environments. Each<br />
environment h<strong>and</strong>les a particular notation of program code. ANTS [6, 7], BEES [8]
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
69<br />
<strong>and</strong> Magician [9] use Java bytecode. Proof of the concept for load redistribution<br />
in Active Networks, called Grade32 [3, 4], uses native x86 code.<br />
A process running in the execution environment is either an active application,<br />
or a capsule. The application injects the capsule into the network. If network’s<br />
implementation allows it, the capsule can replicate itself by injecting another capsule<br />
into the network. Grade32 allow the capsule to run an active application at<br />
the node. This approach was necessary for Grade32 to implement process migration<br />
in a distributed environment. It is not found in preceding implementations such<br />
as ANTS <strong>and</strong> Magician.<br />
Initially, the capsule program code was either pre-installed at the node, or<br />
it was transmitted with the capsule. In later implementations of active networking<br />
servers, each capsule contains a hash digest of capsule’s program code [7]. Using<br />
code distribution protocol, node uses this digest to obtain the program code from<br />
other nodes. Only the capsules of a basic code distribution protocol have to use<br />
st<strong>and</strong>ardized code identifiers, in place of the hash digest, to identify particular<br />
requests. Otherwise, it would be impossible for any two nodes to exchange a program<br />
code. Active node caches recently used program code at a local repository.<br />
Projects like PLAN [10], RCANE [11], SANE [12] <strong>and</strong> SNAP [13] focused<br />
on security <strong>and</strong> performance. In contrast to the general-purpose Java bytecode,<br />
specialized languages appeared. Their goal was simplicity that would limit resource<br />
consumption <strong>and</strong> shorten a capsule’s execution time.<br />
Reference [14] gives an overview on CSANE active network concept, which<br />
aims for security <strong>and</strong> scalability. CSANE is based on cluster processing. It builds<br />
on ANTS, JanOS <strong>and</strong> Linux.<br />
C. Related work<br />
Taking a closer look on the concept of the Google Chrome [15] operating<br />
system, we see a resemblance with the active networks concept. There is a simple,<br />
underlying operating system that provides hard application isolation – s<strong>and</strong>boxing<br />
[16]. API <strong>and</strong> the definition of web services define the Execution Environment.<br />
Also, it features a security manager that prevents running a malware.<br />
Although the Native Client [17] is not primarily designed for a use in active<br />
networks, there are ideas valuable to a high performance execution environment.<br />
III. Architecture<br />
A. Smart Active Node<br />
For the Smart Active Node, we highlight this:<br />
• SAN runs on top of a st<strong>and</strong>ard operating system.<br />
• SAN uses st<strong>and</strong>ard Java Development Kit for programming the capsules<br />
<strong>and</strong> to achieve interoperability across different platforms.
70 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
• SAN does not execute capsules in a single process. Instead it takes advantage<br />
of process isolation that is provided by the underlying operating system.<br />
• SAN uses Ada’s rendez-vous <strong>and</strong> Remote Procedure Call to further isolate<br />
a capsule program code from accessing SAN’s internal data structures.<br />
• SAN runs without a virtual machine such as JVM. The capsule program<br />
code is compiled just once to the native instruction set for the target<br />
processor.<br />
• SAN applies security measures when compiling the bytecode to the native<br />
instruction set, thus eliminating this overhead from the capsule runtime.<br />
• To increase performance, SAN benefits from supporting a distributed<br />
memory model.<br />
• For SAN, we adopted a concept of roles for a fine-grain control over execution<br />
of different program codes of capsules.<br />
B. Farmer – worker model<br />
The SAN server is a farmer-worker model that allows network-node scalability<br />
using the distributed memory model. Furthermore, the client-server model let us<br />
to use the means of process isolation <strong>and</strong> resource-limits which are provided by<br />
the underlying operating system. The resources are the processor time, the memory<br />
<strong>and</strong> network b<strong>and</strong>width.<br />
The farmer manages incoming capsules <strong>and</strong> assigns them to particular workers<br />
for further processing. The SAN server can run on a cluster, i.e. the workers<br />
can be distributed physically. SAN server <strong>and</strong> SAN worker communicate using<br />
the remote procedure call (RPC) mechanism. Therefore, SAN uses RPC to assign<br />
a capsule to a particular worker.<br />
Existing implementations of RPC, e.g. Open Networking Computing RPC,<br />
rely on the TCP/IP stack. As active networks were supposed to supersede IP, SAN<br />
has a custom RPC implementation. The SAN RPC implementation uses SAN’s<br />
internal networking interfaces instead of relying on the presence of TCP/IP stack.<br />
SAN networking interface can encapsulate an ISO/OSI layer 2 protocol such<br />
as the Ethernet. Furthermore, SAN utilizes a proprietary data serialization to avoid<br />
performance penalties by eliminating unnecessary data conversions.<br />
C. Farmer<br />
In the current implementation, the farmer provides the main subsystems:<br />
• Network subsystem – a communication with other nodes<br />
• Security subsystem – monitoring the networking traffic <strong>and</strong> capsule execution,<br />
while enforcing the security measures<br />
• Repository – caching compiled program codes of capsules<br />
• API subsystem – providing an API to capsules via RPC
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
71<br />
As the SAN server development will progress, part of the subsystems will be<br />
moved to the workers. This will reduce an average time a capsule/worker needs to<br />
access a farmer’s subsystem.<br />
Figure 1. SAN’s Famer-Worker Model<br />
D. Worker<br />
In the current implementation, the worker is a s<strong>and</strong>box for an executing capsule.<br />
It takes an advantage of operating-system provided mechanisms for process<br />
isolation <strong>and</strong> enforcing limits on processor–time consumption, memory usage,<br />
network b<strong>and</strong>width usage, etc. To the running capsule, the worker provides the API.<br />
IV. Programming environment<br />
A. The server programming language<br />
Initially, we followed some of the well-accepted papers on active networking.<br />
The programming language was Java. Both, server <strong>and</strong> capsule codes were written<br />
in Java <strong>and</strong> compiled to bytecode.<br />
While the Java Virtual Machine (JVM) executed the server program code,<br />
we needed to execute the capsule program code separately in order to enforce<br />
the security measures. If we would let the JVM to execute the capsule program<br />
code, we would have no control over its execution.<br />
We needed to control processor-time consumption, memory usage, network<br />
b<strong>and</strong>width usage <strong>and</strong> method calls to prevent malicious actions as such calling<br />
System.exit.<br />
Java was designed to be architecture neutral. To follow this principle, we<br />
were left with one choice – to interpret the capsule bytecode in a JVM. Because<br />
of the incurred speed penalty, we decided to use C++ for the server development.
72 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
While the developments costs are higher with C++, we got a robust <strong>and</strong> efficient<br />
platform to execute the capsule program code, with security measures applied.<br />
B. The capsule programming language<br />
While Java is performance-inadequate for the server development, it has benefits<br />
for programming the capsules. Using a Java bytecode to C++ cross-compiler,<br />
<strong>and</strong> a C++ compiler, we compile the bytecode into the target-processor optimized<br />
machine code. In addition, the Java’s portability allows the SAN servers to run<br />
across several processor architectures.<br />
The Java’s simplicity provides an opportunity to analyze the bytecode for a possible<br />
security breach just once, to save the processor time later on. For example,<br />
the absence of pointers in Java greatly improves the security.<br />
Per a class, the bytecode to C++ cross-compiler generates the header file with<br />
class’ declaration <strong>and</strong> C++ file with class’ implementation. The header file includes<br />
header files of other required classes. The Java Runtime Environment is replaced<br />
with a C++ equivalent. In addition to st<strong>and</strong>ard packages, the SAN Java development<br />
kit (SAN JDK) provides classes to call SAN API. Finally, the capsule program<br />
is linked using the pre-compiled SAN JDK <strong>and</strong> compiled capsule’s cross-compiled<br />
C++ code. The linker generates a dynamically linked library that is saved for a later<br />
reuse, once another capsule of the same protocol arrives.<br />
Several JDK methods are security-unsafe. For example, letting a capsule to use<br />
reflection would be a security risk. In SAN JDK, such methods are not available at<br />
all. Such a malicious capsule will not even compile. Classes such as java.io.File,<br />
which access the server’s file system, have custom implementation which forbids<br />
the capsule to access the file system of the underlying operating system. The new<br />
operator is overloaded with a custom implementation that forbids memory allocation,<br />
if the capsule overcomes a given limit.<br />
To monitor processor-time consumption, a separate thread monitors execution<br />
times of capsule. It terminates a capsule, which exceeds the limit.<br />
V. Programming interface<br />
A. SAN programming interface<br />
The capsule program code is compiled into a dynamically linked library.<br />
The library exports a routine. SAN server calls this routine to execute the program<br />
code. The routine takes one parameter. This parameter is an object implementing<br />
a pre-defined interface to access SAN API. Capsule accesses SAN API in an objectoriented<br />
manner. The API offers these services:<br />
• Network service – capsule transmission<br />
• Routing service – accessing <strong>and</strong> updating the routing table
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
73<br />
• Storage service – an inter-process communication using the blackboard<br />
concept [18]<br />
• Diagnostic service – for debugging<br />
B. Calling SAN API<br />
St<strong>and</strong>ard Java compiler compiles the capsule program code. At this point, the SAN<br />
API interface is not implemented. Later on, the SAN server compiles the bytecode<br />
to C++ source code. This compiled source code is linked with an object that makes<br />
the actual calls to the SAN API interface. This object is a wrapper for Ada’s rendezvous<br />
synchronization mechanism.<br />
The Java synchronization model relies on a monitor construction. The monitor<br />
has its working data <strong>and</strong> synchronized methods. For an exclusive access, a thread calls<br />
a synchronized method to manipulate with the monitor’s data. The thread continues to<br />
receive processor-time quanta based on its priority. Also, its access rights are not elevated.<br />
With Ada’s rendez-vous, a thread makes an entry call to the server. Then,<br />
the calling thread is suspended until the server’s thread finishes execution of the call.<br />
Only the server thread accesses its data. Furthermore, the server’s thread priority<br />
<strong>and</strong> access rights are independent on the calling thread.<br />
The SAN server runs in a user-address space. The compiled capsule program<br />
code cannot issue an equivalent of x86 int <strong>and</strong> syscall instructions to isolate SAN’s<br />
kernel from the running capsule. Therefore, we use Ada’s rendez-vous to implement<br />
secure API calls.<br />
To a capsule programmer, the Java capsule program code makes a call to<br />
a Java interface.<br />
VI. Access rights<br />
A particular networking application may require additional access rights to<br />
complete its task. For example, a routing service requires an access right to modify<br />
the routing table. Similarly, time-synchronization service requires an access right to<br />
set the system time. In SAN, we implement the access rights with a concept of users<br />
<strong>and</strong> roles. In a principle, we follow the Windows NT security model of users,<br />
access rights <strong>and</strong> privileges.<br />
A role is a set of access rights. For example, the routing-service role includes<br />
all rights required to modify the routing table, but not to e.g. set the system time.<br />
In addition to the access rights, a role has resource-consumption limits defined.<br />
A user has authorization credentials <strong>and</strong> a set of roles. For the development,<br />
we have defined four roles:<br />
• Administrator – no restriction<br />
• Power User – There is no restriction on capsule’s code execution time.<br />
This is used for the routing service.
74 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
• Users – The execution time limit is increased against the anonymous users.<br />
• Anonymous – This applies to unknown capsule codes <strong>and</strong> unauthorized<br />
users. The code being executed has lowest priority <strong>and</strong> no access right<br />
is granted.<br />
The capsule code can elevate its default access rights. By using different credentials,<br />
it can re-authorize to the server.<br />
VII. Transmitting a capsule<br />
A. All-Nodes-Execute flag<br />
In the original concept, the capsule’s code executed on every node visited.<br />
This implied an additional overhead. For example, let us consider a frequently used<br />
protocol such as TCP. The intermediate nodes have no need to modify packets’<br />
payload. The packets need to be forwarded only. Therefore, we eliminate overhead<br />
of the original active-networking concept by introducing All-Nodes-Execution flag.<br />
When this flag is not set, the capsules’ code executes at the destination node only.<br />
As a result, the intermediate nodes do not need to create s<strong>and</strong>boxes, thus reducing<br />
the associated overhead to increase the node throughput.<br />
With this behavior, we maintain low costs of the TCP protocol, while offering<br />
an additional feature. When the capsule executes at the destination node, it attempts<br />
to deliver its payload. Instead of TCP/UDP ports, we will identify a listening process<br />
with a globally unique ID (GUID). This concept was used successfully in the loadredistribution<br />
method [3, 4]. If the listening process migrated to a different node,<br />
it left its new address using the black-board mechanism. Thus, the capsule’s code<br />
could lookup the new address <strong>and</strong> set it as the new destination address. This concept<br />
reduces the overhead of h<strong>and</strong>ling the error when the listening process is not<br />
present at the destination node.<br />
SAN provides the black-board concept with the Storage service. It is a keyvalue<br />
dictionary. The key is a GUID <strong>and</strong> the value is a sequence of bytes. Its size<br />
<strong>and</strong> persistency is given by respective resource limits. With the storage service, we<br />
implement an inter-process communication, when two communicating processes<br />
do not need to execute concurrently.<br />
With the All-Nodes-Execute flag set, the capsule’s code executes at every visited<br />
node. We use this flag for a routing protocol. To be specific, we use the AntNet<br />
routing protocol [19] to fill the routing table.<br />
B. Quality of Service <strong>and</strong> Type of Service<br />
To implement Quality of Service <strong>and</strong> Type of Service, we experiment with<br />
a concept of alternative routing table. SAN’s capsule has Time-Sensitive flag. With<br />
this flag set, the capsule is routed using the better routes in the sense of AntNet
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
75<br />
protocol routing metric. If this flag is not set, the capsule is routed to a worse<br />
route if the better route’s link is saturated. As a result, we prioritize the capsule<br />
transmission while attempting to reduce a capsule elimination due to an insufficient<br />
b<strong>and</strong>width.<br />
C. Delivering a payload<br />
When a capsule delivers its payload to a process, the SAN would invoke<br />
a registered callback to h<strong>and</strong>le the delivery. The callback executes as a separate<br />
process <strong>and</strong> asynchronously to the main process of the networking application.<br />
As a result, the main process does not need to be executing. The callback can h<strong>and</strong>le<br />
the capsule, while requiring fewer resources. Later, the main process can process<br />
the cumulative results, which were produced by the callback on receiving capsules’<br />
payloads. This way, we attempt to support mobile devices, where the power <strong>and</strong><br />
memory consumption is critical.<br />
When a capsule successfully delivers its payload, it would either forward itself<br />
to a new destination, or finish its execution.<br />
VIII. Results<br />
A. Testing software<br />
To test the performance of the SAN server, we used a custom implementation<br />
of the ping comm<strong>and</strong>. First, we implemented the ping comm<strong>and</strong> as the SAN<br />
active-networking application. Then, we re-implemented the same application using<br />
WinAPI <strong>and</strong> TCP/IP protocol. This guaranteed that we tested principally the same<br />
applications – the first one using IP, the second one using the active network.<br />
The testing ping application transmitted data for two minutes. We counted<br />
the total number of transmitted bytes in packet/capsule payloads. The payload size<br />
increased gradually.<br />
The operating system used was 64-bit Windows 7, version 6.1.7601. The server<br />
<strong>and</strong> cross-compiled bytecode were compiled with the Microsoft Optimizing<br />
Compiler, version 17.00.40825.2. The bytecode was cross-compiled to C++ using<br />
a proprietary compiler [20]. The generated images were 64-bit executables <strong>and</strong><br />
dynamically loaded libraries.<br />
To measure the time, we used QueryPerformanceCounter <strong>and</strong> QueryPerformanceFrequency<br />
WinAPI functions.<br />
B. Testing network<br />
The network nodes used were connected with 100 Mb/s link speed in a full<br />
duplex, using Ethernet. In the current implementation, SAN uses TCP/IP to trans-
76 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
mit the capsules. This implies that the IP-ping should have less overhead than the active-networking<br />
pings.<br />
Two servers ran on Intel64, family 6, model A, stepping 7. We tested the ping<br />
on the localhost <strong>and</strong> over the network. The localhost machine had 8 GB RAM <strong>and</strong><br />
3.4 GHz processor frequency. The other machine had 4 GB RAM <strong>and</strong> 2.3 GHz<br />
processor frequency.<br />
C. Discussion<br />
Table 1 gives achieved bit rate <strong>and</strong> latency for a ping over a network, i.e. when<br />
packets <strong>and</strong> capsules processed through the entire networking stack of the operating<br />
system. Table 2 gives the same, but for the localhost when the packets <strong>and</strong><br />
capsules are not processed by the lowest level of the networking stack of the operating<br />
system.<br />
Size<br />
[B]<br />
Bit rate<br />
[Mb/s]<br />
Table I. Network Ping<br />
SAN<br />
Latency<br />
[µs]<br />
Bit rate<br />
[Mb/s]<br />
IP<br />
Latency<br />
[µs]<br />
64 17.1 643 0.5 945<br />
128 18.3 734 1.0 942<br />
256 24.2 811 2.1 942<br />
512 15.2 923 16.3 239<br />
1024 18.0 1097 18.3 428<br />
2048 20.7 1395 22.6 693<br />
4096 20.1 1804 27.9 1121<br />
8192 21.9 2201 35.2 1777<br />
Size<br />
[B]<br />
Table II. Localhost Ping<br />
Bit rate<br />
[Mb/s]<br />
SAN<br />
Latency<br />
[µs]<br />
Bit rate<br />
[Mb/s]<br />
IP<br />
Latency<br />
[µs]<br />
64 5.1 218 17.4 28<br />
128 5.7 223 33.7 29<br />
256 18.3 232 65.1 30<br />
512 41.9 236 114.9 34<br />
1024 77.1 241 211.2 37<br />
2048 136.8 259 363.4 43<br />
4096 179.2 276 726.7 43<br />
8192 193.5 297 1275.5 49
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
77<br />
The tests were not designed to achieve the maximum bit rate possible, but<br />
to give the difference between the IP processing <strong>and</strong> the programmable network<br />
processing.<br />
Table 3 gives memory usage for the SAN ping over the network. The memory<br />
usage measured was the Peak Working Set, which is the largest working set that<br />
has been observed for the process.<br />
Table III. Memory Usage<br />
Size [B] Server [MB] Worker [MB]<br />
64 8.1 5.4<br />
128 8.2 5.4<br />
256 8.9 5.7<br />
512 10.5 6.1<br />
1024 12.0 6.9<br />
2048 16.8 8.5<br />
4096 25.0 11.8<br />
8192 39.3 14.3<br />
Looking at the measured quantities of the IP ping, we can see the effect<br />
of Nagle’s algorithm <strong>and</strong> that the operating system used a reduced processing for<br />
the localhost communication.<br />
Looking at the latencies of the SAN ping, we see an overhead implied by<br />
the s<strong>and</strong>box usage. Looking at the bit rates over the network, we see that SAN capsule<br />
suppresses the Nagle’s algorithm due to the capsule’s size overhead. With a payload<br />
size greater than 4096 B, we see that capsule serialization has to be improved.<br />
The localhost results confirm this conclusion. Particularly, Table II shows results<br />
above 200 Mb/s for IP, but less than 200 Mb/s for SAN. As the ping-mechanism<br />
is essentially the same for IP <strong>and</strong> SAN, the reason for the achieved bitrate difference<br />
must be related to the present implementation of capsule processing.<br />
Looking at the memory usage, we see that it increased with capsule’s payload<br />
size. However, the memory usage was stable. If it was not, the memory usage<br />
would increase at least to 328 MB for the 8192 B payload <strong>and</strong> at least to 77 MB<br />
for the 64 B payload.<br />
IX. Conclusion<br />
In this paper, we present an advance on the DARPA’s idea of a programmable<br />
network. We show that the implementation presented could provide a sufficient<br />
performance, while enforcing the security measures on the code being executed.<br />
We achieved these results by using a different approach than the initial implementations<br />
did.
78 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
With the All-Nodes-Execution flag not set, data flows are routed in same manner<br />
as in IP networks <strong>and</strong> no s<strong>and</strong>boxes are created at intermediate nodes. If we<br />
would consider rigid protocol hashes for frequently used protocols such as TCP<br />
<strong>and</strong> UDP, it would not be even necessary to create s<strong>and</strong>boxes at all. SAN network<br />
would behave as IP network in such a case, only the address:port-like data structure<br />
would have greater size than with IP protocol. In addition, the SAN network would<br />
still maintain its programmability for other protocols.<br />
If we would consider protocols at higher ISO/OSI level than TCP <strong>and</strong> UDP,<br />
programmable protocols could possibly provide an increased efficiency over IPbased<br />
protocols. For example, reference [22] presents an improved efficiency with<br />
a multi-cast algorithm.<br />
The node throughput depends on the packet buffer size. The node has to<br />
buffer the packet prior processing it. Regarding larger payloads <strong>and</strong> the All-Nodes-<br />
Execution flag set, SAN could provide a blocking access to the payload. The capsule’s<br />
execution would be suspended, if the capsule requires such a part of payload that<br />
has not been received yet. Such an optimization technique would further increase<br />
SAN’s throughput, as it processes a capsule ahead of receiving its complete payload.<br />
On the other h<strong>and</strong>, we still pay with processor time <strong>and</strong> memory consumption for<br />
the network programmability. Therefore, an improved efficiency of networking<br />
protocols at higher ISO/OSI levels should be given by their design. As demonstrated<br />
with e.g. [22], we consider this as possible.<br />
However, the SAN server is still under development [21]. There are a number<br />
of optimization opportunities, which should improve the node’s throughput<br />
furthermore.<br />
References<br />
[1] J.F. Shoch <strong>and</strong> J.A. Hupp, ”The ‘Worm’ Programs – Early Experience with a Distributed<br />
Computation”, <strong>Communications</strong> of the ACM, 1982.<br />
[2] C.G. Harrison, D.M. Chess <strong>and</strong> A. Kershenbaum, “Mobile Agents: Are they a good<br />
idea”, Technical Report, IBM Research Division, T.J. Watson Research Center, March<br />
1995.<br />
[3] T. Koutny <strong>and</strong> J. Safarik, “Load Redistribution in Heterogeneous Systems”,<br />
Proceedings of the Third International Conference on Autonomic <strong>and</strong> Autonomous<br />
Systems, Athens, Greece, 2007.<br />
[4] T. Koutny <strong>and</strong> J. Safarik, “Simulating Distributed Applications in an Active Network”,<br />
Proceedings of 6th Eurosim Congress, Ljubljana, Slovenia, 2007.<br />
[5] P. Tullmann, M. Hibler <strong>and</strong> J. Lepreau, “Janos: A Java-oriented OS for Active Networks”,<br />
IEEE Journal on Selected Areas of Communication, vol. 19, no. 3, March 2001.<br />
[6] D.J. Wetherall, “Developing Protocols with the ANTS Toolkit”, http://www.cs.utah.edu/<br />
flux/janos/ants-manual-2.0.2/papers/programming.ps Last Accessed on April 11, 2012.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
79<br />
[7] D.J. Wetherall, J. Guttag <strong>and</strong> D. Tennenhouse, “ANTS: A Toolkit for Building<br />
<strong>and</strong> Dynamically Deploying Network Protocols”, IEEE Open Architectures <strong>and</strong> Network<br />
Programming 1998, San Francisco, CA USA, 1998<br />
[8] T. Stack, E. Eide <strong>and</strong> J. Lepreau, “BEES: A Secure, Re-source-Controlled, Java Based<br />
Execution Environment”, IEEE Open Architectures <strong>and</strong> Network Programming 2003,<br />
San Francisco, CA, USA, 2003.<br />
[9] S.F. Bush <strong>and</strong> A.B. Kulkarni, “Active Networks <strong>and</strong> Active Network Management –<br />
A Proactive Manage-ment Framework”, Kluwer Academic/Plenum Publishers, 2001.<br />
[10] M. Hicks, J.T. Moore, D.S. Alex<strong>and</strong>er, C.A. Gunter <strong>and</strong> S.M. Nettles, “PLANet:<br />
an active internetwork”, Proceedings of Eighteenth Annual Joint Conference of the IEEE<br />
Computer <strong>and</strong> <strong>Communications</strong> Societies, New York, NY, USA, 1999.<br />
[11] P. Menage, “RCANE: A Resource Controlled Framework for Active Network Services”,<br />
Proceedings of the First International Working Conference on Active Networks,<br />
Berlin, Germany, 1999.<br />
[12] D.S. Alex<strong>and</strong>er, P.B. Menage, A.D. Keromytis, W.A. Arbaugh, K.G. Anagnostakis<br />
<strong>and</strong> J.M. Smith, “The Price of Safety in an Active Network”, Journal of <strong>Communications</strong><br />
<strong>and</strong> Networks, Special Issue on Programmable Switches <strong>and</strong> Routers, vol. 3, Number. 1,<br />
March 2001.<br />
[13] W. Eaves, L. Cheng, A. Galis, T. Becker, T. Suzuki, S. Denazis, C. Kitahara,<br />
“SNAP Based Resource Control for Active Networks”, Proceedings of IEEE Global<br />
Telecommunications Conference, Taipei, Taiwan, 2002.<br />
[14] C. Xiao-lin, Z. Jing-yang, D. Han, L. Sang-lu <strong>and</strong> C. Gui-hai, “A Cluster-Based<br />
Secure Active Network Environment”, In Wuhan University Journal of Natural Sciences,<br />
vol. 10, Number 1, 2005, pp. 142-146, doi: 10.1007/BF02828636.<br />
[15] J. Gray, “Google Chrome: The Making of a Cross-Platform Browser”, In Linux Journal,<br />
vol. 2009, 2009.<br />
[16] Ch. Reis, A. Barth <strong>and</strong> Ch. Pizano, “Browser Security: Lessons from Google Chrome”,<br />
In <strong>Communications</strong> of the ACM, vol. 52, 2009, pp. 45-49, doi: 10.1145/1536616.1536634.<br />
[17] B. Yee, D. Sehr, G. Dardyk, J.B. Chen, R. Muth, T. Orm<strong>and</strong>y, S. Okasaka,<br />
N. Narula, <strong>and</strong> N. Fullagar, “Native Client: A S<strong>and</strong>box for Portable, Untrusted<br />
x86 Native Code”, Proceedings of 2009 IEEE Symposium on Security <strong>and</strong> Privacy,<br />
Oakl<strong>and</strong>, California, USA, 2009.<br />
[18] R.S. Engelmore <strong>and</strong> A. Morgan, editors Blackboard Systems, Addison-Wesley, 1988.<br />
[19] G. di Caro <strong>and</strong> M. Dorigo, “An Adaptive Multi-Agent Routing Algorithm Inspired<br />
by Ants Behavior”, Proceedings of PART98 – Fifth Annual Australasian Conference<br />
on Parallel <strong>and</strong> Real-Time Systems, 1998.<br />
[20] T. Koutny, “Static Cross-Compilation of Java Bytecode”, Submitted to IEEE Transactions<br />
on Computers, March 2012.<br />
[21] T. Koutny <strong>and</strong> V. Aubrecht et al., “Smart Active Node”, http://www.san.zcu.cz/<br />
Last Accessed on April 11, 2012.<br />
[22] V. Ramakrishna, M. Robinson, K. Eustice <strong>and</strong> P. Reiher, “An Active Self-Optimizing<br />
Multiplayer Gaming Architecture”, Cluster Computing, vol. 9, Issue 2, 2006.
Selection <strong>and</strong> Investigation of a Civil Wideb<strong>and</strong><br />
Waveform for Potential <strong>Military</strong> Use<br />
Ferdin<strong>and</strong> Liedtke, Matthias Tschauner, Sarvpreet Singh,<br />
Marc Adrat, Markus Antweiler<br />
Communication Systems, Fraunhofer-FKIE, Wachtberg, Germany,<br />
ferdin<strong>and</strong>.liedtke@fkie.fraunhofer.de<br />
Abstract: This contribution presents the results of an ongoing study 1 evaluating civil wireless<br />
communication systems or Waveforms (WFs) for their potential military use. It is a continuation<br />
of the work presented in [1] where several civilian communication systems with their main strengths<br />
<strong>and</strong> weaknesses have been evaluated. The aim of the past <strong>and</strong> present activities is to examine which<br />
of these communication systems or WFs have valuable characteristics. In addition, it is analyzed which<br />
WFs can probably be modified <strong>and</strong> supplemented to fulfill military requirements. The focus is on<br />
Wide B<strong>and</strong> Waveforms (WBWFs) which could help to fill the capacity gap of the “last tactical mile”.<br />
The studies will contribute to the international activities of finding IP <strong>and</strong> network capable WBWFs<br />
for military Software Defined Radios.<br />
In this paper several fundamentals of tactical communications are sketched, followed by some remarks<br />
on modern civil WFs already in use or tested by military forces. After agreeing on several significant<br />
assessment criteria, three interesting civil systems are short listed before one of these systems is finally<br />
selected for further investigation. For the selected system, WLAN IEEE 802.11n, the first critical<br />
modules are identified <strong>and</strong> some ideas for their modification <strong>and</strong>/or enhancement are presented.<br />
Keywords: Wideb<strong>and</strong> Waveform; Software Defined Radio; Wireless <strong>Military</strong> <strong>Communications</strong>;<br />
Tactical <strong>Communications</strong><br />
I. Introduction<br />
The international defense forces stride ahead towards further development<br />
of the network enabled capabilities for the network centric warfare. Important elements<br />
of this research are the communication capabilities, especially the Software<br />
Defined Radio (SDR) technology. For this technology, appropriate hard- <strong>and</strong> software<br />
modules <strong>and</strong> new Waveforms (WFs) are needed. In addition to narrow b<strong>and</strong> WFs,<br />
the particular focus is on the development of new, so-called Wide b<strong>and</strong> WFs (WBWFs)<br />
with spectral channel b<strong>and</strong>widths ≥ 1 MHz for the transmission of payload data<br />
1<br />
This research project was performed under contract with the Federal Office of the Bundeswehr for <strong>Information</strong><br />
Management <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>, Germany.
82 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
rates > 1 Mbps (Megabits per second) per channel. Several military driven efforts<br />
are pursued in this area. Beside international activities, e.g. from NATO <strong>and</strong> from<br />
the consortium on Coalition Wideb<strong>and</strong> Networking Waveform (COALWNW) [2],<br />
several nations are thinking about designing additional WBWFs for national use. Keeping<br />
this background in mind, it will be interesting to look at civil used WBWFs, too.<br />
In the preceding work [1], the main strengths <strong>and</strong> weaknesses of four categories<br />
of modern communication systems have been examined: broadcast, cellular, wireless<br />
access networks <strong>and</strong> trunked radio systems. The results show that several of those<br />
systems have some military suitable characteristics, but further efforts will be required<br />
to get military usable WBWFs. Thus, it is appropriate to select at first a few or only one<br />
suitable modern communication system for further investigation. For the selection<br />
procedure, many military requirements, both of operational <strong>and</strong> of technical manner,<br />
can be collected, weighted <strong>and</strong> evaluated in a detailed way. But, it is recognized<br />
that only a few evaluation criteria are significant enough for the ongoing efforts that<br />
a comparatively pragmatic <strong>and</strong> short selection procedure is possible.<br />
This is accomplished in the second phase of our investigations which are discussed<br />
in this contribution. In this context, modern civil communication systems<br />
which are already in use or tested by military forces are searched. The recognition<br />
of the state of military deployment of civil WFs has to be kept in mind while deciding<br />
for a suited communication system for further investigation. In the following<br />
text “communication(s)” will be mostly abbreviated by COM(s).<br />
To get a better underst<strong>and</strong>ing of the different military COM requirements<br />
concerning b<strong>and</strong>width, data rate, range <strong>and</strong> mobility, a glimpse on tactical COMs<br />
<strong>and</strong> the necessity to fill the capacity gap of the “last tactical mile” is presented in Section<br />
II. Section III contains some remarks on <strong>and</strong> examples of modern civil COM<br />
systems already in use or tested by military forces. In Section IV, key requirements<br />
of a WBWF for military use are summarized. In Section V, at first, the extraction<br />
of three potentially suited civil COM systems is described. After having outlined<br />
several important strengths <strong>and</strong> weaknesses of these systems, finally, the WLAN<br />
system IEEE 802.11n is selected for further investigation (WLAN: Wireless Local<br />
Area Network). In Section VI, the first critical modules of this system are identified<br />
<strong>and</strong> ideas for their modification or enhancement are presented. Section VII<br />
gives a short overview of the initial steps for implementing the new WF with SCA<br />
(Software <strong>Communications</strong> Architecture) conformity on a simulation platform.<br />
II. Tactical communications <strong>and</strong> difficulties<br />
for the “last tactical mile”<br />
Generally, the military operations planned <strong>and</strong> executed at the divisional<br />
level or below are the tactical ones. In modern scenarios, planning <strong>and</strong> execution<br />
of actions are increasingly accomplished by military subordinated smaller groups,<br />
whereby they have to strive for the superior aims. To solve all the different tasks,
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
83<br />
powerful COM equipment is necessary. Important requirements for tactical COM<br />
systems are: IP <strong>and</strong> networking capability, sufficient transfer capacity, adequate range<br />
<strong>and</strong> fair mobility, also for relevant parts of the infrastructure. The aim is to fulfill<br />
the necessity for Comm<strong>and</strong>, Control (C2) <strong>and</strong> Communication/Coordination (C3)<br />
on the move. The main subsystems of the tactical COM system are pointed out<br />
in Fig. 1 with blue framed boxes. These are: the trunk network, the Combat Net<br />
Radio (CNR) <strong>and</strong> the data distribution subsystems [3].<br />
Figure 1. Main elements of a tactical COM system, derived from [3]<br />
The arrangement of these subsystems concerning their range-capacity-mobility<br />
trade-offs is depicted in Fig. 2.<br />
Figure 2. Range-capacity-mobility trade-off, similar to [3]<br />
The three blue framed circles designate the areas related to the trunk network<br />
(bottom left), the CNR (top) <strong>and</strong> the data distribution (bottom right) subsystems.<br />
The trunk network transfers large amounts of information with high data rates<br />
between the relevant headquarters <strong>and</strong> between the staff personnel <strong>and</strong> the control<br />
officers, traditionally down to brigade level. The connections are by satellite or<br />
other longer range wireless or lined connections. In general, the range is large <strong>and</strong><br />
the mobility is minor.<br />
The CNR in its traditional form is a complement of the trunk network; it has high<br />
mobility, small values for spectral b<strong>and</strong>width <strong>and</strong> data rate – traditionally 25 kHz
84 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
<strong>and</strong> around 20 kbps – <strong>and</strong> a medium range. The personnel communication system<br />
(PCS) is smaller <strong>and</strong>, in its traditional versions, less powerful than the CNR.<br />
The main purpose of both these radio types is to transfer voice <strong>and</strong> low rate data<br />
information, e.g. sensor-to-shooter information. Modern tactical radios offer higher<br />
throughput rates, e.g. 112.5 kbps like the SDR-7200 from Elbit/Tadiran [4].<br />
But, for filling the capacity gap between the trunk network <strong>and</strong> the CNRs or PCSs<br />
for the transfer of more capacity dem<strong>and</strong>ing information, e.g. situational awareness<br />
data, an additional tactical subsystem is necessary, which is the data distribution<br />
subsystem. This system has to transfer more information to <strong>and</strong> from the acting<br />
teams, <strong>and</strong> nowadays it is the “bottle neck” of the tactical COM system. This problem<br />
of the “last tactical mile” is similar to that of the last mile in civil environments.<br />
Although there exist several special solutions for filling this gap, e.g. the U.S. systems<br />
EPLRS (Enhanced Position Locating <strong>and</strong> Reporting System) <strong>and</strong> NTDR (Near Term<br />
Digital Radio), important enhancements can be gained by modern SDRs with different<br />
WFs. Modern narrow b<strong>and</strong> WFs will be used for CNR purposes <strong>and</strong> WBWFs<br />
will serve for (bidirectional) data distribution. For satisfying the different military<br />
requirements, it is necessary that the new WBWFs are scalable.<br />
III. Modern civil wireless COM systems already in use or tested<br />
by military forces<br />
Before going on to the evaluation of civil COM systems concerning their potential<br />
military use, a review of the present situation is necessary, i.e. a check, if <strong>and</strong><br />
where civil wireless COM technologies are already in use or tested by military forces.<br />
A. Broadcast systems<br />
An interesting wideb<strong>and</strong> system is the terrestrial Digital Video Broadcast system<br />
DVB-T/T2. It uses the modern <strong>and</strong> flexible modulation/multiplex type OFDM<br />
(Orthogonal Frequency Division Modulation/Multiplex). But, in its original form,<br />
it has no backward channel. One known modification is the Universal Multi-Media<br />
Link system from Thales Defense [5]. It is provided with a backward channel so<br />
that bidirectional COM is possible. The system is intended for use by safety forces<br />
in difficult scenarios like disasters.<br />
B. Cellular systems<br />
The well-known commercial cellular systems are eagerly used or tested by<br />
military forces though they seem to have some drawbacks like single points of failure<br />
(base stations) <strong>and</strong> limited mobility of the infrastructure. The cellular technologies<br />
of the third generation (3G) <strong>and</strong> beyond, i.e. UMTS, CDMA2000, HSDPA, HSPA<br />
<strong>and</strong> the 4G/LTE (fourth generation of civil cellular systems/Long Term Evolution)
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
85<br />
are in the focus. The literature about the military use mainly concerns activities<br />
from U.K. <strong>and</strong> U.S. [6]. On one h<strong>and</strong>, cellular systems are used in less dangerous<br />
scenarios, e.g. in comm<strong>and</strong> posts, logistical establishments, airports <strong>and</strong> separated<br />
areas. On the other h<strong>and</strong>, they are also used for more robust operations. For those<br />
cases, small <strong>and</strong> transportable base stations, also airborne ones are available with<br />
the aim to have one’s own infrastructure with non-traditional radio frequencies <strong>and</strong><br />
extended range <strong>and</strong> mobility. The currently used or tested h<strong>and</strong>helds are commercial<br />
smartphones or small tablet PCs, enlarged by ciphering <strong>and</strong> personnel identification<br />
circuits. In less peaceful scenarios, these h<strong>and</strong> helds are connected to the CNRs by<br />
wire or wireless, <strong>and</strong> the information transfer takes place through the CNRs. For<br />
future use, so-called sleeve modules are developed which can pick up the h<strong>and</strong>helds<br />
<strong>and</strong> provide the power supply, the crypto module <strong>and</strong> interfaces. For peacekeeping<br />
missions, the h<strong>and</strong> helds can also use the civil cellular infrastructure, if available.<br />
So, the military used cellular technology can fulfill particular tasks of the trunk<br />
network, the data distribution subsystem <strong>and</strong> the CNR, too.<br />
Examples of initiatives from U.K. <strong>and</strong> U.S. are: the Training <strong>and</strong> Doctrine Comm<strong>and</strong><br />
– Brigade Combat Team initiative, where smartphones are tested together with the JTRSs<br />
(Joint Tactical Radio Systems) AN/PRC-154 (so-called Rifleman Radio) <strong>and</strong> 155.<br />
In a DARPA (Defense Advanced Research Project Agency) project, the Harris radio<br />
AN/PRC-117G SDR is tested together with tablet PCs. Connections by WLAN are<br />
provided for the near surrounding. A third example is the Monax system from Lockheed<br />
Martin. The used RF is non-traditional, modules for ciphering are developed <strong>and</strong> IP<br />
connections up to the end-users are available. The developed mobile base stations can be<br />
integrated into l<strong>and</strong> <strong>and</strong> aerial vehicles. Some of the used WFs are tolerant against larger<br />
latencies, e.g. for GEO-SATCOM connections. A further U.S. development is FASTCOM,<br />
a pico cell system from Textron/Overwatch for robust missions. The base stations are<br />
mobile. The COM types are voice, data <strong>and</strong> streaming videos, e.g. from smartphone to<br />
an unmanned aerial vehicle <strong>and</strong> reverse. A high grade ciphering module will be developed.<br />
Up to 100 subscribers can be provided. In the U.K., Roke Manor Research is discussing<br />
ideas <strong>and</strong> concepts concerning the use of civil cellular technology, i.e. 3G/UMTS,<br />
4G/LTE <strong>and</strong> WiMAX, for military purposes (WiMAX: Wireless interoperability<br />
for Microwave Access). Another U.K. project is Roke’s Battlefield Connect, a femto<br />
cell system for a range up to 40 km with up to 7.2 Mbps for non-dem<strong>and</strong>ing IP<br />
connections, VoIP <strong>and</strong> near real-time video transfer. The h<strong>and</strong>helds would be usable<br />
up to 120 km/hr. The used technology is UMTS/HSDPA, HSPA, or, for the future,<br />
4G/LTE or WiMAX. In the final version, 24 subscribers will be provided in one cell,<br />
each with up to 14.4 Mbps for the downlink <strong>and</strong> up to 1.9 Mbps for the uplink.<br />
C. Wireless access networks<br />
The relevant access networks dealt with in [1] are the WLAN family IEEE<br />
802.11 <strong>and</strong> WiMAX IEEE 802.16. WiMAX in its mobile form, i.e. IEEE 802.16e,
86 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
is mainly a cellular system with base stations <strong>and</strong> the appropriate infrastructure.<br />
But, to preserve the same classification as in [1], it is dealt with in this section<br />
as access network. The ranges of WLAN <strong>and</strong> WiMAX in their st<strong>and</strong>ardized forms<br />
are very different. WLAN can provide connections in the near surrounding, while<br />
the range of the mobile WiMAX is up to 15 km.<br />
In the safety or military range of application, WiMAX is proposed for high data<br />
rate linking over medium ranges. In Norway, its use for rescue operations is proposed.<br />
WLAN is used for short range connections as it is known from civil applications.<br />
For example it is used in headquarters <strong>and</strong> comm<strong>and</strong> posts. A particular proposal<br />
is its supplemental use in comm<strong>and</strong> posts during the set-up <strong>and</strong> set-down periods,<br />
if the line connections are not yet or no longer established. A further WLAN application<br />
is the remote control of platforms like sensors, weapon systems or vehicle<br />
based COM nodes. Examples for remotely controlled COM nodes are: Tactical<br />
Cross Domain Solution from U.S. <strong>and</strong> C2UK C-Lite from U.K. [6].<br />
D. Trunked radios<br />
The well-known trunked radios TETRAPOL <strong>and</strong> TETRA are well proven <strong>and</strong><br />
broadly used for safety <strong>and</strong> military forces. The systems have a comparatively good<br />
physical <strong>and</strong> electronic robustness. But, they are designed only with comparably<br />
small channel b<strong>and</strong>widths for low or moderate data rates.<br />
IV. Requirements for a wideb<strong>and</strong> waveform in wireless military<br />
tactical use<br />
The term Waveform (WF) comprises of all components of a COM system<br />
in the seven ISO/OSI layers. The focus of the currently accomplished studies is on<br />
the lower layers, PHY <strong>and</strong> MAC (Physical <strong>and</strong> Medium Access Control layers).<br />
The requirements of a WBWF are orientated towards the necessity to fulfill mainly<br />
the tasks of a modern bidirectional data distribution subsystem, i.e. to find a WBWF<br />
with IP <strong>and</strong> flexible networking capability <strong>and</strong> with appropriate capacity, range<br />
<strong>and</strong> mobility. The new WF should be flexible in use, i.e. it should be scalable <strong>and</strong><br />
adaptable to different applications <strong>and</strong> transmission conditions. Certain robustness<br />
against disturbing influences, natural <strong>and</strong> intentional, is aspired.<br />
A. General requirements<br />
General requirements, which are resulting from the facts mentioned in the sections<br />
above, are compiled as follows:<br />
• comm<strong>and</strong>, control <strong>and</strong> coordination (C3), also on the move,<br />
• single points of failure should be avoided as far as possible, hence an adhoc<br />
capable system/WF would be advantageous,
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
87<br />
• shared situational awareness, thus a payload data rate > 1 Mbps seems<br />
advisable,<br />
• with a range of up to 40 km (as Roke’s Battlefield Connect System) for l<strong>and</strong><br />
based platforms,<br />
• with multi hop <strong>and</strong> multi cast capabilities,<br />
• for use within mobile platforms; also with participation of a slow airborne<br />
vehicle; hence, l<strong>and</strong> based: up to 100 km/hr <strong>and</strong> airborne: up to 400 km/hr,<br />
• secure <strong>and</strong> IP capable information transport,<br />
• Quality of Service (QoS), from low latency to best effort,<br />
• WF with inherent flexibility <strong>and</strong> scalability, thus a OFDM WF seems adequate,<br />
• providing a tactical mobile extension of the deployed Protocol Core Network,<br />
• for use within SDRs taking into account SCA conformity,<br />
• with resilience against noise <strong>and</strong> interference,<br />
• operation within the usual military spectral opportunities (RF b<strong>and</strong>s) <strong>and</strong><br />
constraints, <strong>and</strong><br />
• COM capability between military <strong>and</strong> civil forces.<br />
Further require ments like a certain protection against hostile detection, interception<br />
<strong>and</strong> jamming <strong>and</strong> the provision for the WF usage in high speed airplanes<br />
or for Radio Based Combat Identification will be desirable. But, the last mentioned<br />
requirements are secondary ones <strong>and</strong> can be fulfilled later.<br />
These requirements for military use have to be kept in mind while assessing<br />
civil WBWFs. But, it cannot be expected that the civil WFs in their original forms<br />
can fulfill many of the requirements because they have been developed with different,<br />
commercially driven goals.<br />
B. Further aspects<br />
Some factors proposed from our side are:<br />
• For the present, half-duplex traffic will be sufficient.<br />
• Multiple Input Multiple Output (MIMO) is not yet necessary, i.e. Single<br />
Input Single Output (SISO) will be sufficient.<br />
• The new WBWF shall be demonstrated on particular simulation <strong>and</strong> development<br />
platforms.<br />
If appropriate transceiver modules will be available later on, the possible<br />
WF characteristics concerning RF, transmitter power, range <strong>and</strong> mobility will be<br />
exploited.<br />
V. System evaluation <strong>and</strong> selection of one civil WBWF<br />
for further investigation<br />
As a first step, a pre-election of a few appropriate civil WBWF systems is accomplished.<br />
The result is a selection of three modern wireless COM systems with
88 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
large channel b<strong>and</strong>widths. Later on, as a second selection step, one of these systems<br />
is finally selected for further investigation. For the pre-election <strong>and</strong> the final selection<br />
comparable pragmatic evaluation criteria are used.<br />
A. Evaluation <strong>and</strong> pre-election<br />
For the pre-election, only three significant assessment criteria are employed:<br />
(1) modern wireless WBWF system with<br />
(2) bidirectional information transfer <strong>and</strong><br />
(3) easy scalability.<br />
All the newer systems mentioned in Section III are modern WBWF systems,<br />
except the trunked radios. The newer trunk radio versions (TETRA2/3) allow<br />
a maximum channel b<strong>and</strong>width of only 150 kHz. This fact, together with the comparatively<br />
low development speed of such radios, will result in the exclusion of this<br />
technology from further analysis for a suitable WBWF.<br />
In the second evaluation criterion, the requirement for bidirectional information<br />
transfer is not fulfilled from the broadcast system DVB-T/T2. Additionally,<br />
it has a structure with comparably long frames. Both facts would dem<strong>and</strong> a remarkable<br />
work load for modification or replacement of the modules in question.<br />
The consequence is the exclusion of the broadcast systems from further investigations<br />
as well.<br />
In the third evaluation criterion, the scalability can be easily fulfilled of OFDM<br />
WFs. Additionally, OFDM has significant advantages relating to robustness within<br />
multipath propagation <strong>and</strong> the flexibility of using its particular frequency channels.<br />
So, from the cellular <strong>and</strong> the wireless access network systems those WBWF<br />
systems with this modulation/multiplex type are the most favored ones for our<br />
further investigations: the newest cellular st<strong>and</strong>ard 4G/LTE, the WiMAX IEEE<br />
802.16e <strong>and</strong> the WLAN IEEE 802.11n.<br />
B. Final selection of one system/WF for further investigation<br />
For accomplishing the final selection, the relevant system characteristics<br />
of the three pre-elected systems are gathered in Table I, whereby the focus is essentially<br />
on those system characteristics which are different for the systems. The principally<br />
equal characteristics, like the OFDM WBWFs, the bidirectional information<br />
transfer, the use of IP protocols, the multicast capability <strong>and</strong> the variability of packet<br />
lengths are not picked up in the comparison because they do not contribute to discrimination.<br />
The table contents written in red or green colored text will be explained<br />
below. In addition to the technical characteristics noted in Table I, several other<br />
facts concerning the information gathering <strong>and</strong> the possibilities for modifications<br />
or enhancements are quite relevant for our final system selection. These facts are<br />
collected in Table II below.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
89<br />
Table I. Relevant characteristics of pre-elected COM systems (with focus on those<br />
characteristics which are different between the three systems under consideration)<br />
Characteristics<br />
4G/LTE<br />
WiMAX<br />
802.16e<br />
Max. channel 20 MHz 20 MHz 20 MHz<br />
b<strong>and</strong>width BW chmax (40 MHz)<br />
Max. link data rate<br />
in BW chmax<br />
for SISO operat.<br />
RF b<strong>and</strong>s<br />
B<strong>and</strong>width (data<br />
rate) scalability<br />
Modulation types<br />
DL: 75 Mbps<br />
UL: 18.75 Mbps<br />
0.8 <strong>and</strong> 2.6 GHz<br />
(Europe)<br />
Yes;<br />
1.25 … 20 MHz<br />
QPSK, 16-QAM<br />
<strong>and</strong> 64-QAM<br />
Multiplex method DL: TDMA /<br />
OFDMA;<br />
UL: TDMA /<br />
SC-FDMA<br />
Ad-hoc net work<br />
capabil.<br />
Multi hop relay<br />
capability<br />
Transmission of<br />
speech <strong>and</strong> data<br />
with QoS (priority,<br />
latency, etc.)<br />
Necessity of base<br />
stations<br />
Real time<br />
capability<br />
Range<br />
Mobility<br />
Remarks<br />
DL: 128 Mbps,<br />
UL: 56 Mbps,<br />
both with FDD<br />
2.3, 2.5 <strong>and</strong> 3.5 GHz<br />
for mobile operat.<br />
Yes;<br />
1.25 … 20 MHz<br />
QPSK, 16-QAM<br />
<strong>and</strong> 64-QAM<br />
TDMA/<br />
Scalable OFDMA<br />
(S-OFDMA)<br />
No No Yes<br />
No, but h<strong>and</strong>over<br />
capability<br />
Not yet; the necessary<br />
IP multimedia<br />
subsystem is not yet<br />
imple mented;<br />
Yes<br />
Yes<br />
WLAN<br />
802.11n<br />
75 Mbps (150 Mbps)<br />
2.4 <strong>and</strong> 5 GHz<br />
(in U.S. also < 1 GHz)<br />
Yes; frequency raster<br />
5, 10 <strong>and</strong> 20 MHz<br />
BPSK, QPSK, 16-QAM<br />
<strong>and</strong> 64-QAM<br />
CSMA/CA<br />
Yes<br />
In principle:<br />
Yes; the necessary wireless<br />
multi me dia module is still<br />
included;<br />
Yes Yes No (for the ad-hoc mode);<br />
Yes;<br />
smallest latency<br />
time 5 ms;<br />
Several kilometers;<br />
under spe cial<br />
condi tions up to<br />
100 km<br />
H<strong>and</strong>helds<br />
usable up tp<br />
350 km/hr<br />
comparatively<br />
autonomous base<br />
stations;<br />
very expen sive<br />
infra structure<br />
Yes;<br />
smallest latency<br />
time 1 ms<br />
Several hundred<br />
meters up to 50 km<br />
be tween fixed stations;<br />
up to 15 km<br />
between fixed<br />
<strong>and</strong> mobile stations<br />
H<strong>and</strong>helds<br />
usable up to<br />
120 km/hr<br />
802.16e st<strong>and</strong>ard<br />
for mobile<br />
operation;<br />
expensive infrastructure<br />
With restrictions because<br />
of CSMA/CA <strong>and</strong> relativly<br />
large frame <strong>and</strong> packet<br />
lengths;<br />
Typically: < 100 m indoor<br />
<strong>and</strong> ≤ 250 m outside;<br />
with more transmitter<br />
power: several kilometers;<br />
Restricted to walking pace<br />
Eco/sleep mode;<br />
frame aggregation<br />
<strong>and</strong> block acknoledgment;<br />
mature <strong>and</strong> broadly used<br />
technology;<br />
cheap in-frastructure
90 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Table II. <strong>Information</strong> gathering <strong>and</strong> possibilities for modifications <strong>and</strong> enhancements<br />
Inform. gathering,<br />
possib. for modific.<br />
<strong>and</strong> enhancements<br />
Access of source code<br />
<strong>and</strong> simulation models<br />
Possibilities for code generation<br />
from simulation tools<br />
like MATLAB/SIMULINK<br />
Possibilities for incremental<br />
modifications <strong>and</strong> enhancements<br />
Expenditure for modifications<br />
<strong>and</strong> enhancements<br />
4G/LTE WiMAX 802.16e WLAN 802.11n<br />
Strongly restricted<br />
because of property<br />
rights<br />
Not available<br />
Difficult because<br />
of concetanated<br />
PHY <strong>and</strong> MAC<br />
Restricted<br />
because<br />
of property rights<br />
Only simple PHY<br />
model available<br />
Difficult because<br />
of concetanated<br />
PHY <strong>and</strong> MAC<br />
PHY: Yes, but<br />
without time sync;<br />
MAC: No<br />
Complete PHY<br />
model available<br />
Promising because<br />
PHY <strong>and</strong> MAC<br />
are separable<br />
Very high High Moderate<br />
While the access of system specifications is good for all three systems, the availability<br />
of simulation tools <strong>and</strong> the possibilities for adaptations <strong>and</strong> enhancements are different.<br />
As can be acknowledged from Table II, there are clear advan tages for WLAN 802.11n,<br />
because of (partial) availability of source code <strong>and</strong> simulation tools <strong>and</strong> the possibility<br />
to separate the PHY <strong>and</strong> MAC layers. These advantages alleviate modifications <strong>and</strong><br />
replacements of critical modules <strong>and</strong> are the crucial factors in our decision to select<br />
the WLAN WF for further investigation. For the other two WFs, much work ought<br />
to be invested to reach comparable circumstances. In Table II, the advantageous facts<br />
of WLAN 802.11n are emphasized by using green colored text.<br />
As can be gathered from Table I, WLAN 802.11n has several further advantages<br />
(emphasized with green colored text): the ad-hoc network <strong>and</strong> multi-hop relay capabilities,<br />
the included multi-media module, the independence from base stations,<br />
the eco/sleep mode, the possibility for frame aggregation <strong>and</strong> block acknowledgment<br />
<strong>and</strong> the availability of cheap components. The eco/sleep mode can perhaps help<br />
to realize the military required “radio silence”. The frame aggregation <strong>and</strong> block<br />
acknowledgment reduce the overhead caused by control information.<br />
However, the WLAN WF not only has advantages but also disadvantages which<br />
are emphasized by using red colored text. The main disadvantage is the CSMA/<br />
CA (Carrier Sense Multiple Access/Collision Avoidance) multiplex method which<br />
impedes the required real time information transfer if more than only a few users<br />
are active. Furthermore, CSMA/CA does not efficiently exploit the possible channel<br />
capacity. But, this multiplex method can be replaced as it is discussed in the next<br />
section. The other two emphasized disadvantages, limited range <strong>and</strong> only pedestrian<br />
mobility, are not independent from the multiplex method <strong>and</strong> can also be<br />
improved concerning the military requirements. Furthermore, the topic of insufficient<br />
security has to be worked on in a later study phase.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
91<br />
VI. Ideas for modifications <strong>and</strong> enhancements of WLAN IEEE<br />
802.11n modules<br />
In this section some critical modules of WLAN 802.11n are discussed <strong>and</strong><br />
evaluated for necessary modifications <strong>and</strong> enhancements. Due to the military<br />
requirements on a data distribution subsystem, WLAN 802.11n (as described<br />
in the specifications) has some disadvantages, e.g. in multiplex method, range <strong>and</strong><br />
mobility. In the following subsections, initial ideas for the elimination of these<br />
disadvantages will be presented.<br />
A. Multiplex method<br />
1) Selection of an alternative multiplex method<br />
In WLAN 802.11n, the CSMA/CA multiplex method does not guarantee real<br />
time behaviour <strong>and</strong> cannot exploit the possible channel capacity due to the fact<br />
that a r<strong>and</strong>om based channel access is used. Therefore, multiplex methods with<br />
systematic channel access like Time Division Multiple Access (TDMA), Frequency<br />
Division Multiple Access (FDMA) or Code Division Multiple Access (CDMA)<br />
are better suited. However, CDMA needs an expensive power controller to realize<br />
non-discriminatory data transmission between all users, especially mobile<br />
ones. A realisation without fixed base stations would be very dem<strong>and</strong>ing. FDMA<br />
is normally reserved for the separation of different user groups. Therefore, at first,<br />
the focus is on TDMA. When replacing the existing multiplex method in WLAN<br />
802.11n, the following requirements need to be preserved or newly fulfilled:<br />
• support of many network nodes,<br />
• IP support <strong>and</strong> ad-hoc network capability,<br />
• QoS capability, i.e. appropriate latency <strong>and</strong> priority, based transmission<br />
between nodes, <strong>and</strong><br />
• b<strong>and</strong>width efficiency.<br />
As a possible solution, the use of the Unified Slot Assignment Protocol<br />
(USAP) [7, 8] is proposed. USAP is a TDMA based multiplex method with multichannel<br />
support. The channel access is managed due to distributed slot assignments,<br />
so that r<strong>and</strong>om based packet collisions are avoided. With a collision-free<br />
transmission the reliability rises <strong>and</strong> QoS constraints can be fulfilled more easily.<br />
2) Evaluation of the USAP multiplex method<br />
With the exchange of the multiplex method, an evaluation of the new WBWF<br />
based on the PHY layer scheme of WLAN 802.11n combined with the MAC layer<br />
scheme of USAP is necessary. Therefore, a few equations for estimating the data<br />
rate above the MAC layer are derived.<br />
To estimate the slot time duration T slot (B) dependent on the packet size B<br />
bytes in TDMA systems, several relevant parameters have to be known. Firstly,
92 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
an upper bound of the COM distance D max that should not be exceeded by any two<br />
node pairs in the existing network is needed. This strict constraint is important to<br />
prevent crossover collisions between neighbouring slots that have been assigned<br />
by the USAP for transmission. Secondly, an additional time period T add needs to<br />
be considered which includes time uncertainties on the half-duplex switching<br />
duration, the hard- <strong>and</strong> software processing delays <strong>and</strong> for having an additional<br />
spare time. Further, the transmission time for a PHY layer packet of size B needs<br />
to be known. From the WLAN 802.11n specification [9, 10], it is extracted that for<br />
a given channel b<strong>and</strong>width BW, the number of bytes B in the packet <strong>and</strong> the chosen<br />
modulation <strong>and</strong> coding schemes expressed in the data bits per OFDM symbol<br />
N dbps,k is sufficient to calculate the slot duration. The values for N dbps,k can be<br />
taken from Table III for different modulation <strong>and</strong> coding schemes, assigned by<br />
the index k. The slot duration T slot,k (B) for the USAP multiplex method can then<br />
be calculated by:<br />
Dmax<br />
80 22+8B<br />
<br />
T <br />
slot,k<br />
B =T<br />
add<br />
+ 6 <br />
.<br />
c0 BW Ndbps,k<br />
<br />
The parameter c 0 is the velocity of light. The first two terms of (1) stem from<br />
USAP part <strong>and</strong> the third term is the transmission time for a PHY layer packet<br />
with B bytes corresponding to the WLAN 802.11n specification. T slot,k is valid<br />
either for a payload or a control time slot. Equation (1) can be transformed such<br />
that the maximum number of transmittable bytes B k in a single data slot can be<br />
calculated:<br />
<br />
1 BW <br />
D <br />
max<br />
B<br />
k<br />
= Tdataslot Tadd 6 Ndbps,k<br />
22 .<br />
8 <br />
<br />
80 c<br />
(2)<br />
<br />
<br />
<br />
0 <br />
The next step is the estimation of T dataslot . USAP has a strict separation of payload<br />
<strong>and</strong> control data. A frame with duration T frame is divided by mini slots for USAP<br />
control information <strong>and</strong> by data slots for the payload. The number of available mini<br />
slots in a frame is given by N bootstrap,slot . Similarly, the number of data slots is given<br />
by the sum of broadcast slots N broadcast,slot <strong>and</strong> reservation/st<strong>and</strong>by slots N res/stby,slot .<br />
Thus, the duration of a single data slot T dataslot can be computed by:<br />
(1)<br />
Tframe N bootstrap,slot<br />
T slot,k0<br />
(B20)<br />
T<br />
dataslot<br />
= .<br />
N N<br />
broadcast,slot<br />
res/stby,slot<br />
(3)<br />
For USAP in each mini slot, B = 20 bytes with 16 bytes for USAP control<br />
<strong>and</strong> 4 bytes for the code redundancy check needs to be transmitted. T slot,k=0 can be<br />
calculated from (1).
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
93<br />
Table III. Number of data bits per symbol dependend on the WLAN 802.11n<br />
modulation <strong>and</strong> coding schemes [9, 10]<br />
Index k Modulation Coding N dbps,k<br />
0 BPSK 1/2 26<br />
1 BPSK 3/4 39<br />
2 QPSK 1/2 52<br />
3 QPSK 3/4 78<br />
4 16-QAM 1/2 104<br />
5 16-QAM 3/4 156<br />
6 64-QAM 2/3 208<br />
7 64-QAM 3/4 234<br />
8 64-QAM 5/6 260<br />
The data rate R above the MAC layer can then be computed by:<br />
Nbroadcast,slot<br />
Nres/stby,slot<br />
R 1 B<br />
mean,<br />
(4)<br />
T<br />
frame<br />
whereas ρ is the average slot utilization of the data slot assignment of USAP,<br />
ε is the packet error rate <strong>and</strong> B mean is the assumed mean number of bytes in a packet.<br />
As an example, the following parameter values are chosen for an initial estimation<br />
of the data rate: BW = 5 MHz, D max = 50 km, T add = 1 ms, ε = 0.05, ρ = 0.6<br />
<strong>and</strong> B mean = B k=1 . Corresponding to [7, 8] the further parameter values are chosen<br />
as: T frame = 0.125 sec, N bootstrap,slot = 13, N broadcast,slot = 2 <strong>and</strong> N res/stby,slot = 8. With<br />
the given parameter values T dataslot can be calculated from (3) together with (1)<br />
to 10.71 ms. From (2) <strong>and</strong> Table III B mean = B k=1 is calculated to 2873 bytes, <strong>and</strong>,<br />
together with (4), the data rate R is gained to 1.0235 Mbps. This data rate (above<br />
the MAC layer) can be seen as an initial value which could be adequate for a military<br />
WBWF. It should be emphasized that the corresponding payload data rate will be<br />
smaller <strong>and</strong> the corresponding link data rate will be remarkably higher.<br />
B. Range<br />
The original WLAN 802.11n system is not specified to reach high ranges.<br />
This disadvantage is part of restriction to the transmission power of at most<br />
100 mW in the 2.4 GHz RF B<strong>and</strong>, 200 mW in the 5.1 GHz to 5.3 GHz RF b<strong>and</strong> <strong>and</strong><br />
1000 mW in the 5.4 GHz to 5.7 GHz RF b<strong>and</strong> (European specification). However,<br />
this disadvantage could be eliminated by use of higher transmit power <strong>and</strong> by<br />
operating in the military RF b<strong>and</strong>s with lower center frequencies. Due to the fact<br />
that higher transmit power enlarges the total energy consumption of the system,<br />
further improvements of critical modules of the PHY layer, e.g. those for detection,
94 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
synchronization or modulation <strong>and</strong> coding will be helpful to compensate somewhat<br />
the higher energy consumption.<br />
As a first step, the well-known preamble coding <strong>and</strong> detection algorithm<br />
from Schmidl & Cox [11] is implemented <strong>and</strong> analyzed. This algorithm is applicable<br />
for WLAN 802.11n. But, in the meantime Minn-Zeng-Bhargava published<br />
a more powerful preamble coding scheme [12], with which better symbol timing<br />
estimations at the receiver side can be achieved. At present, this proposed method<br />
is adapted for use together with the new WBWF.<br />
As a second step, an alternative header coding scheme is analyzed. The WLAN<br />
802.11n uses a BPSK modulation <strong>and</strong> a convolutional code rate of 1/2 with generator<br />
polynomial G = [171 133] for header coding. With this configuration,<br />
the 42 header bits are mapped to two symbols with 48 subcarriers for each symbol.<br />
As an alternative, the use of a QPSK modulation <strong>and</strong> convolutional coding rate<br />
of 1/4 with generator polynomial G = [171 153 135 127] is considered. Both configurations<br />
produce the same total coding rate of 42/96. In an AWGN environment<br />
the new configuration outperforms the classical configuration by around 0.4 dB<br />
as shown in Fig. 3. The use of iteratively based channel coding schemes like turbo<br />
or low density parity check schemes would not result in performance improvements<br />
due to the very short block length of a header with only 42 bits.<br />
Figure 3. Bit Error Rate (BER) <strong>and</strong> Header Error Rate (HER) dependend on E b /N 0<br />
for two schemes for header modulation <strong>and</strong> coding; coding rate 42/96
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
95<br />
C. Mobility<br />
Another important goal in designing a military WBWF is the mobility capability.<br />
WLAN 802.11n is developed only for walking pace. Therefore, some modifications<br />
<strong>and</strong> enhancements, <strong>and</strong>, also for the simulations, the use of an appropriate<br />
channel model are required. It is decided to use the ITU models pedestrian A <strong>and</strong><br />
vehicular B [13] which were officially employed together with the WiMAX development.<br />
For taking in account high platform mobility, a channel response with<br />
remarkable values for delay spread, Doppler spread <strong>and</strong> Doppler shift has to be<br />
provided. Another designing aspect is the choice of the OFDM guard interval<br />
length. It has to be chosen in accordance to the largest expected path delay. WLAN<br />
802.11n uses short guard intervals in terms of 1/4 or 1/8 of a symbol length. For<br />
the case of 1/4 symbol length duration, the resulting time durations are 3.2 µs, 1.6 µs<br />
or 0.8 µs for transmission with those symbol rates which are related to the channel<br />
b<strong>and</strong>widths of 5, 10 or 20 MHz. But, since here ITU vehicular model B is used,<br />
in which a maximum delay of 20 µs is pre-determined, the guard interval length<br />
of the new WF has to be enlarged to that value.<br />
VII. SCA based implementation of WLAN IEEE 802.11n<br />
In parallel to reviewing the WF, its implementation on a simulation platform,<br />
according to the SCA st<strong>and</strong>ards, has to be prepared. Various SCA development<br />
tools are available in the market with which such implementations can be accomplished.<br />
For preparing the implementation of a newly designed WBWF, as a first<br />
step, the general SCA based implementation of WLAN 802.11n is accomplished.<br />
A. Modeling – building blocks<br />
The model we propose is depicted in Fig. 4 <strong>and</strong> contents the following modules.<br />
The four green framed boxes on the top are those of the WF in which signal<br />
processing functionality can be added. They are the SCA based resources. The blue<br />
framed boxes below represent the services offered by the SDR platform which a WF<br />
can use. They emulate all the SCA based devices, e.g. the serial port, the sound<br />
card (not shown in Fig. 4) etc. The red framed box in the bottom center represents<br />
the crypto module, which is bypassed in our current simulation environment.<br />
The boxes are individually described as:<br />
• DataReadService is responsible for reading <strong>and</strong> writing data to <strong>and</strong> from<br />
the SerialPort Device. It also contains the functionality of using push-totalk,<br />
i.e. the communication starts when a particular key is pressed.<br />
• RedPayloadProcessing (RPP) h<strong>and</strong>les the payload <strong>and</strong> control data on the red<br />
security side.<br />
• BlackPayloadProcessing (BPP) h<strong>and</strong>les the payload <strong>and</strong> control data on<br />
the black security side.
96 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
• Signal-in-Space (SIS) contains the actual PHY <strong>and</strong> MAC signal processing<br />
code of the waveform. The C++ code of the waveform which is compiled<br />
as a static library (e.g.: WLAN signal processing) is integrated within<br />
the C++ code of this SCA resource.<br />
• SCA Devices Platform (blue framed boxes at bottom) is a combination<br />
of all the SCA Devices used, see Fig. 4. It includes also further devices like<br />
the sound card etc.<br />
We focus on PHY <strong>and</strong> MAC which correspond to SIS Resource <strong>and</strong> BPP<br />
Resource, respectively. But for simplicity, we keep it together in the SIS Resource<br />
in the current implementation. In future, a separation between PHY <strong>and</strong> MAC will<br />
be accomplished. Also, a subdivision of SIS will be required to run parts of it on<br />
GPP, DSP <strong>and</strong> FPGA. But currently, everything is kept working on a GPP.<br />
B. Payload workflow<br />
Fig. 4 shows the workflow of the payload data going through the building<br />
blocks of the SCA based model of the WF. In the first step, the data to be<br />
transmitted is given to the arrangement using the SerialPort Device. Then it is<br />
read by the DataReadService Resource using the DataRead functionality implemented<br />
in it. Then the data is given to the RPP Resource from where it is given<br />
to the SecurityAdapterRed Device. The data from there is given to the crypto<br />
module. From the crypto module it is committed to the SecurityAdapterBlack<br />
Device. The BPP Resource then takes the data from the adapter <strong>and</strong> passes it on<br />
to the SIS Resource. The actual signal processing of the data takes place in this<br />
component. For the present, the WLAN signal processing functionality is added<br />
into this resource. The processed data are then given to the Transceiver (Trx)<br />
Device which transfers it out to the antenna. In the case of receiving information,<br />
the data flow in the reverse direction.<br />
Figure 4. Building blocks for SCA implementation
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
97<br />
C. Separation of red <strong>and</strong> black security sides <strong>and</strong> between payload<br />
<strong>and</strong> control data<br />
the implementation of the WF is done keeping in view the concept of red <strong>and</strong><br />
black security separation. This means that the system can be divided into two parts:<br />
• Red side: It h<strong>and</strong>les unencrypted information usually from devices like<br />
keyboard, audio card etc.<br />
• Black side: It h<strong>and</strong>les the information in encrypted form <strong>and</strong> uses it for<br />
signal processing.<br />
In addition to this concept it is also recommended that there should be a clear<br />
separation between the payload <strong>and</strong> control information.<br />
• Payload is also called user data. It is that part of the transmitted data which<br />
is the fundamental purpose of the transmission.<br />
• Control information provides the control data the network needs to process<br />
<strong>and</strong> deliver the user data.<br />
Keeping in view to the above mentioned separations, all the building blocks<br />
on the red side of the system are implemented with a clear payload <strong>and</strong> control<br />
separation.<br />
D. Defining the interfaces<br />
The interfaces between the SCA based resources <strong>and</strong> devices, which h<strong>and</strong>les<br />
the payload <strong>and</strong> control data, have to be defined beforeh<strong>and</strong>.<br />
VIII. Conclusions<br />
After a short glimpse on tactical communications, followed by remarks on<br />
modern civil WFs already in use or tested by military forces, several requirements<br />
on WBWFs for military use are outlined. With the help of only a few significant<br />
assessment criteria, three modern civil WBWF systems are short listed as c<strong>and</strong>idates<br />
for further investigations. In a second assessment step, WLAN IEEE 802.11n is finally<br />
selected, <strong>and</strong> first critical modules are pointed out for modifications or enhancements.<br />
These modules are: the CSMA/CA multiplex method, the preamble coding<br />
<strong>and</strong> the header coding. The most critical part, the CSMA/CA multiplex method,<br />
could be exchanged by a TDMA based method. Here, USAP is observed closely,<br />
<strong>and</strong> a first estimate for the expected data rate above the MAC layer is presented.<br />
Furthermore, an enhanced preamble coding with the aim to improve the detectability<br />
is considered. Finally, a modulation <strong>and</strong> coding configuration scheme to<br />
improve the header coding <strong>and</strong> therefore decrease the header error rate is proposed.<br />
In parallel to reviewing the new WF, its implementation on an appropriate simulation<br />
platform with SCA conformity is prepared.
98 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
In future, more critical modules will be investigated, <strong>and</strong>, if necessary, modified<br />
or enhanced. All modules, those taken unchanged from WLAN IEEE 802.11n<br />
<strong>and</strong> the modified or enhanced ones shall be integrated in appropriate simulation<br />
<strong>and</strong> development platforms to develop a new military usable WBWF.<br />
References<br />
[1] S. Couturier et al., “Evaluation of wireless civilian communication systems for<br />
military applications”, MCC 2011, Amsterdam, The Netherl<strong>and</strong>s, October 2011.<br />
[2] R. Pengelley, “UK strives for joined-up communic ations networks”, Jane’s International<br />
Defense Review, April 2011.<br />
[3] M.J. Ryan, M.R. Frater, “Tactical communications for the digitized battlefield”,<br />
Artech House, 2002.<br />
[4] “Armada compendium, tactical radios 2010”, Supplement to Armada INTERNATIONAL,<br />
issue no. 3 (volume 34), June/July 2010.<br />
[5] Universal Multi-Media Link, Data Sheet, Thales Defense Solutions <strong>and</strong> Services, 2009.<br />
[6] R. Pengelley, “Digital delights: Commercial wireless commu nications on<br />
the battlefield”, Jane’s International Defense Review, September 2011.<br />
[7] C.D. Young, “USAP: A Unifying dynamic distributed multichannel TDMA Slot<br />
Assignment Protocol”, Proc. of IEEE Milcom, vol. 1, October 1996.<br />
[8] C.D. Young, “USAP multiple access: Dynamic resource allocation for mobile multihop<br />
multichannel wireless networking”, Proc. of IEEE Milcom, November 1999.<br />
[9] IEEE St<strong>and</strong>ard for information technology – Telecommunications <strong>and</strong> information<br />
exchange between systems – Local <strong>and</strong> metropolitan area networks – Specific<br />
requirements, Part 11: “Wireless LAN Medium Access Control (MAC) <strong>and</strong> Physical<br />
layer (PHY) specifications”, 2007 (WLAN 802.11a/b/g).<br />
[10] IEEE St<strong>and</strong>ard for information technology – Telecommunications <strong>and</strong> information<br />
exchange between systems – Local <strong>and</strong> metropolitan area networks – Specific<br />
requirements, Part 11: “Wireless LAN Medium Access Control (MAC) <strong>and</strong> Physical<br />
layer (PHY) specifications”, Amendment 5: “Enhancements for higher throughput”,<br />
2009 (WLAN 802.11n).<br />
[11] T.M. Schmidl, D.C. Cox, “Robust frequency <strong>and</strong> timing synchro nization for OFDM”,<br />
IEEE Trans. on Com., vol. 45, no. 12, pp. 1613-1621, December 1997.<br />
[12] H. Minn, M. Zeng, V.K. Bhargava, “On timing offset estimation for OFDM systems”,<br />
IEEE Com. Let., vol. 4, no. 7, pp. 242-244, July 2000.<br />
[13] ITU-R M.1225, “Guidelines for evaluations of radio transmission technologies for<br />
IMT-2000”, 1997.
Experimental Performance Evaluation<br />
of the Narrowb<strong>and</strong> VHF Tactical IP Radio<br />
in Test-Bed Environment<br />
Edward Golan, Adam Kraśniewski, Janusz Romanik,<br />
Paweł Skarżyński, Robert Urban<br />
Radiocommunications Department, <strong>Military</strong> Communication Institute, Zegrze, Pol<strong>and</strong>,<br />
{e.golan, a.krasniewski, j.romanik, p.skarzynski, r.urban}@wil.waw.pl<br />
Abstract: This paper evaluates the efficiency of IP packets transmission in narrowb<strong>and</strong> networks<br />
based on the RRC 9210 tactical radios. Based on measurements performed in the laboratory test-bed<br />
environment, we examined the user throughput for selected length of UDP datagrams under AWGN<br />
channel. We determined BER characteristics vs. channel attenuation. We also found the thresholds<br />
of BER, when the data rate of the radio interface drops automatically as a result of the increased channel<br />
attenuation. We mapped the BER to the data rate of the radio interface. We found that the maximum<br />
throughput offered to the user amounts to 9,1 kbit/s. We also noticed, that the optimum size of UDP<br />
datagrams is equal to 512 bytes. Based on these results, we assessed the efficiency of the RRC 9210<br />
tactical radios in the IP-mode.<br />
Keywords: Tactical radio, tactical VHF communication, BER characteristics, user throughput<br />
I. Introduction<br />
The rapid growth of needs of the C4I systems for the information exchange<br />
enforced specific requirements for the tactical communications systems. As a result,<br />
military solutions within the scope of communications employ broadb<strong>and</strong> technologies,<br />
mostly based on the IP protocol. This trend also applies to mobile wireless<br />
systems, which are essential mean of communications in the changing <strong>and</strong> unpredictable<br />
battlefield environment. The effort of researchers <strong>and</strong> military engineers<br />
is heavily oriented towards IP radio at the tactical level (Tactical Internet) [1,2,3] <strong>and</strong><br />
also providing new services, e.g., BFT (Blue Force Tracking) <strong>and</strong> RFT (Red Force<br />
Tracking). Broadb<strong>and</strong> technology enables to get an increased network throughput,<br />
better reliability <strong>and</strong> to offer wide range of services. If the network efficiency is high<br />
enough, the set of provided services is almost the same as in the wire network.<br />
Finally, the end user can get full access to the network resources from any place,<br />
using cable connection or wirelessly. This leads to the unification of the interfaces<br />
<strong>and</strong> applications <strong>and</strong> thus enables to get high level of interoperability.
100 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
On the contrary, there are narrowb<strong>and</strong> radios that can operate in IP mode.<br />
For example, Polish L<strong>and</strong> Forces are equipped with tactical VHF radio RRC 9210,<br />
which offers throughput reaching up to 19,2 kbit/s under favorable propagation<br />
conditions [4,5,6,8]. RRC 9210 radios have Ethernet 10/100BaseTX interface.<br />
The latest firmware enables to operate in IP mode.<br />
The advantage of narrowb<strong>and</strong> radios is to get long-range links <strong>and</strong> stable connections.<br />
However, the question about the efficiency of the narrowb<strong>and</strong> IP packets<br />
transmission seems to be justifiable. Until now, this problem was not discussed<br />
widely in the literature. This may result from the fact, that manufacturers do not<br />
provide detailed information of the implemented mechanisms <strong>and</strong> network performance.<br />
Usually, the information is limited to the simple statement, that the Ethernet<br />
interface <strong>and</strong> IP protocol stack are built-in the radio. From the system designing<br />
point of view it is important to assess properly the network efficiency [7] <strong>and</strong> to<br />
plan deployment of stations as well as the set of provided services.<br />
In the literature, there are many papers dedicated to the efficiency of the broadb<strong>and</strong><br />
wireless systems. A lot of important issues have been recognized, which may<br />
have strong influence on the efficiency of the IP transmission in narrowb<strong>and</strong> wireless<br />
networks [9,10,11]. They include, e.g., the informational overhead resulting from<br />
the transfer of the data through the complete protocol stack. While transporting<br />
data from the application layer to the physical layer, headers coming from successive<br />
layers are added <strong>and</strong> consequently the size of the transmitted data increases<br />
significantly [8]. In the physical layer the management <strong>and</strong> control frames such<br />
as RTS, CTS or ACK are exchanged, which also limits the available b<strong>and</strong>width.<br />
Moreover, apart from the user data, additional information is transmitted, e.g., synchronization,<br />
link test.<br />
If the TCP transmission is considered, then the size of the packets amounts to<br />
several hundred of bytes. In the physical layer packets are fragmented <strong>and</strong> typically<br />
are send as a few frames. This process has a significant impact on the transmission<br />
delay, especially in case of errors <strong>and</strong> retransmissions. In addition, one of the critical<br />
parameters of the TCP protocol is Timeout. The value of the Timeout should be<br />
adjusted to the narrowb<strong>and</strong> channel characteristics.<br />
Taking into account issues mentioned above, the detailed test of VHF radio<br />
are strongly required. Such tests will help to assess the efficiency of IP packets<br />
transmission in destructive military environment. The test results will provide<br />
the necessary information about the rules of the radio configuration, the network<br />
capacity, recommended deployment of nodes <strong>and</strong> set of offered services. Moreover,<br />
it will be possible to determine the typical throughput offered to the user.<br />
The paper is organized as follows. In Section II the narrowb<strong>and</strong> VHF communication<br />
was characterized. Section III describes the IP modes of RRC 9210<br />
radio. In Section IV the test scenario <strong>and</strong> assumptions were presented, while<br />
in Section V test results are discussed. Section VI contains conclusions <strong>and</strong> Section<br />
VII future work.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
101<br />
II. Narrowb<strong>and</strong> VHF communication<br />
Fast development of technologies to support reliable data transmission through<br />
radio channels was caused by increasing dem<strong>and</strong>s on services quality offered by<br />
wireless communication systems. It is not easy to realize such expectations because<br />
of transmission channel, which is changeable in a r<strong>and</strong>om way. Signal sent from<br />
transmitter can reach receiver by multiple propagation paths at different delays<br />
as a result of reflection from terrain obstructions. It causes r<strong>and</strong>om fluctuations<br />
in the received signal’s amplitude <strong>and</strong> phase briefly called multipath fading, which<br />
results in burst errors in received signal [9]. This phenomenon depends on type<br />
of environment <strong>and</strong> radio mobility, thus location can have important influence on<br />
signal reception.<br />
Transmission channel of tactical system based on VHF radio is narrowb<strong>and</strong><br />
(usually 25 kHz) <strong>and</strong> is characterized by flat fading. Such fading occurs when coherence<br />
b<strong>and</strong>width is greater than signal b<strong>and</strong>width <strong>and</strong> causes signal suppression [10].<br />
VHF transmission is very suitable for short distance terrestrial communication,<br />
only slightly farther than the line of site from the transmitter to the receiver.<br />
The requirements that must be fulfilled by modern military communications<br />
systems indicate, that the development of such systems is focused on broadb<strong>and</strong><br />
technologies, mostly based on IP protocol. Classical tactical radio networks are<br />
organized with the use of narrowb<strong>and</strong> transceivers operating in the VHF <strong>and</strong> HF<br />
frequency range. In such case radio communications between multiple correspondents<br />
is provided in omni-directional mode <strong>and</strong> integration with wired systems<br />
is realized by means of Radio Access Points (RAPs).<br />
Implementation of TCP/IP protocol stack in tactical radios caused positive<br />
changes in operation of radio networks. Transmission reliability increases, because<br />
IP radio network can operate despite partial destruction or jamming <strong>and</strong> does not<br />
need integrating devices such as RAPs.<br />
III. IP modes of RRC 9210 tactical radio<br />
Polish L<strong>and</strong> Forces are equipped with tactical VHF F@stnet family radios,<br />
which includes the RRC 9210 manpack radios with maximum power of 10W <strong>and</strong><br />
vehicle version called RRC 9310AP with output power increased to 50W. These<br />
radios have Ethernet 10/100BaseTX interface <strong>and</strong> may operate IP mode if the latest<br />
firmware is used. From these reasons RRC 9210 manpack radios were selected to<br />
evaluate the performance of IP packets transmission in VHF channel.<br />
RRC 9210 tactical radio offers two IP modes:<br />
• IP-MUX (Simultaneous Voice & Data over IP mode).<br />
• IP PAS (data packet over IP mode).<br />
IP-MUX mode replaced older MUX mode, which was designed to transmit/<br />
broadcast voice <strong>and</strong> IP data on the same radio channel. It offers simplex data
102 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
transmission or transmission in TDMA triggering mode with the data rate up<br />
to 4,8 kbit/s. Synchronization of hopping is made by station, which play NCS<br />
role in the network. Though, core synchronization type assumes using GPS.<br />
Switching of the station to IP-MUX mode is initialized by an operator. Addition<br />
as well as removal of SUB stations can be comm<strong>and</strong>ed at any time via NCS station.<br />
The automatic selection of routing tracks is provided in the latest version<br />
of the firmware. To provide interoperability with previously delivered radios,<br />
a firmware update is necessary.<br />
IP PAS mode was designed only for data transmission with the data rate up to<br />
19,2 kbit/s. The hopping synchronization is triggered in distracted mode without<br />
NCS station (there is no primary station in the network). Retransmission of data<br />
can be done with maximum 5 hops, Fig. 1. In that case, one radio serves also as relaying<br />
node. Such functionalities provide significant extension of network coverage,<br />
although, it costs notable increase of the transmission delay. Therefore, this mode<br />
is dedicated to non-real time services only.<br />
Figure 1. RRC 9210 in IP PAS mode<br />
Figure 2. Test-bed configuration
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
103<br />
Network topology to which radio station belongs is updated automatically.<br />
As a result each station “knows” its surroundings. If there is lack of direct connection,<br />
then the most optimum neighboring node is selected automatically to play<br />
a role of a retransmitting station.<br />
IV. Test scenario <strong>and</strong> assumptions<br />
The aim of the tests was to assess the efficiency of IP packet transmission of RRC<br />
9210 radio in IP mode. The test-bed consisted of two radio terminals configured<br />
in a point-to-point connection, which is shown in Fig. 2. The first step in the test<br />
was to select one of two IP modes of the radio. After preliminary test the IP-PAS<br />
mode was chosen, as it allocates all of the available b<strong>and</strong>width for data transmission<br />
only. Therefore, this mode allows to measure the available b<strong>and</strong>width in a simple<br />
point-to-point connection, Fig. 2.<br />
Figure 3. BER vs. channel attenuation<br />
All tests were performed in laboratory environment, which guarantee repeatability<br />
<strong>and</strong> stability of experiments. AWGN channel was used as a simulator<br />
of transmission channel. It does not generate burst errors, typical for real VHF<br />
channel, but only errors distributed at a uniform rate. However, to determine BER<br />
characteristics, such test-bed configuration was acceptable. In the next step of tests,<br />
the model of VHF channel with multipath fading will be used.<br />
The channel attenuation was changed from 130 dB to 140 dB with the step<br />
of 1 dB. The output power was set to +27 dBm in each radio. Thus, the signal level<br />
on the receiver site was equal to:<br />
• –103 dBm – maximum signal level.<br />
• –113 dBm – the level of sensitivity.
104 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 4. User throughput<br />
Radio was configured in the IP-PAS mode with adaptive data rate <strong>and</strong> correction<br />
code. End-points were the terminals with specialized software to generate<br />
<strong>and</strong> analyze an IP traffic.<br />
Bit error rate (BER) parameter was chosen as a channel quality metric. Therefore,<br />
BER was measured for each value of attenuation level. Fig. 3 presents BER<br />
characteristics vs. channel attenuation.<br />
Next step of experiments was to determine the available b<strong>and</strong>width vs. the channel<br />
quality. To measure the maximum user throughput, UDP protocol was used,<br />
as it does not need acknowledgements <strong>and</strong> retransmissions [11]. If TCP protocol<br />
were chosen, measured throughput would not be easy to analyze, because of additional<br />
acknowledgements in transport layer.<br />
To sum up the scenario, the quality of VHF channel was changed by selection<br />
of the attenuation level. The source terminal generated UDP datagrams of 512 Bytes<br />
size to achieve the traffic of 12 kbit/s.<br />
V. Test results<br />
Fig. 4 shows the user throughput measured for different BER levels. For each<br />
period of 20 seconds the throughput was measured <strong>and</strong> then the average value<br />
was calculated. After each 10-minute period of measurement, the level of BER<br />
was changed by selection of the channel attenuation level. In Fig. 4 'n' denotes<br />
the number of consecutive 20-second periods. The maximum user data throughput<br />
amounts to 9,10 kbit/s on average. In that case, RRC 9210 operates with maximum<br />
data rate. Because the channel is of high quality (BER from 4,02*10 -7 to 8,45*10 -6 )
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
105<br />
the redundancy of correction codes is low. When the BER achieve the level of 8,18*10 -5 ,<br />
then the user data throughput drops to 3,59 kbit/s. This is a result of applying<br />
of correction codes with higher redundancy. When the channel quality is worsen<br />
again <strong>and</strong> BER achieves the level of 1,88 *10 -2 , then the user throughput drops to<br />
1,49 kbit/s. In such a situation, radios detect high level of errors <strong>and</strong> apply stronger<br />
correction code. Further increase of the channel attenuation makes that the transmission<br />
is impossible <strong>and</strong> finally connection between two radios is simply lost.<br />
VI. Summary<br />
In this paper the efficiency of IP packets transmission in narrowb<strong>and</strong> networks<br />
based on the RRC 9210 tactical radios was evaluated. Based on measurements<br />
performed in the laboratory test-bed environment, the user throughput was determined<br />
under AWGN channel. The maximum throughput offered to the user<br />
amounts to 9,10 kbit/s in point-to-point connection. The minimum throughput<br />
amounts roughly 1,5 kbit/s. The thresholds of BER when the data rate of the radio<br />
interface drops automatically were determined. These BER levels allow to estimate<br />
the network throughput in a given propagation conditions.<br />
These results will be helpful to assess the channel quality in a real environment<br />
<strong>and</strong> to predict user throughput. Finally it will enable to define the set of offered<br />
services. Results of experiments presented in this paper allow to presume, that<br />
the network will not be efficient for real time services. Only non-real time services<br />
will be offered, like chat, e-mail, short message transfer or FTP. However, the range<br />
of provided services in a real environment needs to be confirmed by additional<br />
experiments.<br />
VII. Future work<br />
For future work it would be interesting to examine the efficiency of the IP<br />
transmission in real environment. Based on the test results, we are going to investigate<br />
the network capacity, the set of offered services <strong>and</strong> also the rules of device<br />
configuration for IP-mode.<br />
Furthermore, we would like to devote attention to the aspect of the relaying<br />
<strong>and</strong> test the efficiency of the network, when nodes operate on large area.
106 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
References<br />
[1] Collective work edited by M. Amanowicz, “Zaawansowane metody i techniki<br />
tworzenia świadomości sytuacyjnej w działaniach sieciocentrycznych” (Advanced<br />
methods <strong>and</strong> techniques for creating situational awareness in the network centric<br />
activities).<br />
[2] B. Marczuk, “Radiostacje szerokopasmowe” (Broadb<strong>and</strong> radio stations), The L<strong>and</strong><br />
Forces Review 03/2006.<br />
[3] L. Stypik, “Cyfrowe wsparcie pola walki – przyszłość czy rzeczywistość” (Digital<br />
battlefield support – the future or reality), The L<strong>and</strong> Forces Review 10/2010.<br />
[4] M. Gruszka, “Taktyczny Internet w praktyce” (Tactical Internet in practice), The L<strong>and</strong><br />
Forces Review 01/2011.<br />
[5] E. Golan, A. Kraśniewski, J. Romanik <strong>and</strong> P. Skarżyński, “Ocena potrzeb<br />
i możliwości wykorzystania szerokopasmowych radiostacji osobistych i pokładowych<br />
na szczeblu taktycznym” (Assessment of needs <strong>and</strong> possibilities of using the broadb<strong>and</strong><br />
on-board <strong>and</strong> personal radio stations at the tactical level), Journal of KONBIN, Safety<br />
<strong>and</strong> reliability systems, Warsaw 2011.<br />
[6] D. Pawłocki, “ W stronę transmisji danych z protokołem IP” (Towards a data<br />
transmissions including the IP protocol) The New <strong>Military</strong> <strong>Technology</strong> 09/2011.<br />
[7] J. Dudczyk, “Optymalny dobór parametrów radiostacji szerokopasmowej żołnierza”<br />
(Optimal selection of parameters of the soldier’s broadb<strong>and</strong> radio station) NTV<br />
no. 9/2011.<br />
[8] J. Romanik, P. Gajewski <strong>and</strong> J. Jarmakiewicz, A Resource Management Strategy<br />
to Support VoIP across Ad hoc IEEE 802.11 Networks, ThinkMind Digital Library,<br />
Proceedings of The Fourth International Conference on Communication Theory,<br />
Reliability <strong>and</strong> Quality of Service, April 17-22, 2011, Budapest, Hungary, pp. 15-21,<br />
ISBN 978-1-61208-005-5.<br />
[9] R. Urban, “Metoda określania średniej długości paczek błędów w kanale UKF w oparciu<br />
o analizę zmian wartości BER” (The method of determining mean length of error<br />
bursts in VHF channel based on fluctuation analysis), Biuletyn WAT, Warszawa 2007,<br />
vol. LVI, s. 433-440.<br />
[10] B. Sklar, “Digital <strong>Communications</strong>: Fundamentals <strong>and</strong> Applications” (2nd Edition),<br />
Prentice-Hall, Upper Saddle River, New Jersey 2004.<br />
[11] W. Wysota <strong>and</strong> J. Wytrębowicz, “End to End QoS Measurements of TCP<br />
Connections”, PPAM’07 Proceedings of the 7th international conference on Parallel<br />
processing <strong>and</strong> applied mathematics, Springer-Verlag Berlin, Heidelberg 2008.
Hybrid Error Detecting <strong>and</strong> Correcting System<br />
Using Hardware Associative Memories<br />
Ion Tutănescu, Constantin Anton, Laurenţiu Ionescu,<br />
Gheorghe Şerban, Alin Mazăre<br />
Faculty of Electronics, <strong>Communications</strong> <strong>and</strong> Computers – University of Pitesti, Romania,<br />
{gheorghe.serban, constantin.anton, laurentiu.ionescu, ion.tutanescu, alin.mazare}@upit.ro<br />
Abstract: This paper presents a solution of design <strong>and</strong> implementation of a hardware error<br />
correction <strong>and</strong> detection system using associative memories. This type of memory allows search<br />
of a stored binary value, having as an input data a partial (or modified) amount of this value.<br />
This property can be used in communication, for detection <strong>and</strong> correction of errors. In our<br />
experiments the encoder just associate message with corresponded word code, which is sent<br />
to communication channel. The decoder can associate back the word code received from communication<br />
channel with the message, even if the received word code has errors. This is due<br />
to associative memory recognition ability. Experimental results obtained were compared with<br />
performances of other hardware systems.<br />
Keywords: associative memories, error detecting <strong>and</strong> correcting codes, Field Programmable Gates<br />
Array (FPGA), Hybrid Automatic Request (H-ARQ)<br />
I. Introduction<br />
Errors’ correction <strong>and</strong> detection is a very important feature in modern<br />
communications. There are several methods for error correction <strong>and</strong> detection.<br />
BCH codes (Bose, Chaudhuri, <strong>and</strong> Hocquenghem) are widely used in communication<br />
networks, computer networks, satellite communication, magnetic <strong>and</strong><br />
optic storage systems.<br />
In this paper we present a hybrid ARQ (Automatic Request) <strong>and</strong> FEC (Forward<br />
Error Correction) solution using hardware associative memory.<br />
BCH codes operate over finite fields or Galois fields. BCH codes can be defined<br />
by two parameters that are: length of code words, n, <strong>and</strong> the number of errors to<br />
be corrected, t.<br />
The BCH codes are a class of cyclic codes whose generator polynomial is a product<br />
of distinct minimal polynomials corresponding to<br />
α, α 2 , …, α 2t ,<br />
GF 2 m is a root of the primitive polynomial g(x)[1].<br />
where
108 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
An irreducible polynomial g(x) of degree m is said to be a primitive if only<br />
if it divides polynomial form of degree n, for no n less than 2 m 1. In fact,<br />
m<br />
2 1<br />
every binary primitive polynomial g(x) of degree m is a factor of x 1 [2].<br />
In our application we present two Hybrid ARQ solutions. First use a polynomial<br />
of 10 degree, which can be used to correct 2 erroneous bits <strong>and</strong> detect 5,<br />
in a word code of 20 bits size for 10 bits size message:<br />
10 7 6 4 2<br />
gx ( ) x xxxx 1<br />
(1)<br />
This polynomial is used to generate word codes with 5 Hamming distance.<br />
Secondary, we use a polynomial which generates word codes with 10 Hamming<br />
distance, which can correct 4 erroneous bits from 5-bits size messages <strong>and</strong><br />
20 bits size word code. This solution has a very high correction capacity (from<br />
5 bits message can correct 4 erroneous bits) <strong>and</strong> can detect all errors from message:<br />
15 14 13 12 10 8 5 4<br />
g( x) x x x x x x x x<br />
1<br />
(2)<br />
Field-Programmable Gate Arrays (FPGAs) have become one of the key digital<br />
circuit implementation media over the last decade [3]. One bit patterns will<br />
produce operational circuits <strong>and</strong> can be used in many areas like the communication<br />
systems. Our hardware scheme is based on polynomial generator for errors<br />
detection <strong>and</strong> correction.<br />
FPGA circuits represent a compromise between circuits with microprocessor<br />
<strong>and</strong> ASIC circuits (Application Specific Integrated Circuits) [4]. First, they<br />
present flexibility in programming, called here reconfiguration, which is a feature<br />
for microprocessors.<br />
Even if FPGA cannot be programmable while operation, they can be configured<br />
anytime is needed, having a structure based on RAM programmable machines, as we<br />
see in Figure 1. On the other h<strong>and</strong>, they allow parallel structures implementation,<br />
with response time less than a system with microprocessor.<br />
Figure 1. Communication system with hardware errors’ detection <strong>and</strong> correction<br />
The system proposed in this paper is based on the use of reconfigurable<br />
FPGA circuits for hardware implementation of error detection <strong>and</strong> correction<br />
algorithms.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
109<br />
Our new design system can be integrated inside a multilayer protocol communication.<br />
Thus, hardware module takes the tasks from others components<br />
of communication system (for example from the computers).<br />
In the next section we present the hardware circuits for encoder <strong>and</strong> decoder.<br />
The first presented solution is a simple binary decoder structure while the second<br />
is based on a hardware linear associative memory.<br />
Section 3 present experimental results obtained after implementations for<br />
both H-ARQ solutions. The implementation is done on a FPGA circuit.<br />
II. ENCoder <strong>and</strong> decoder<br />
We designed the encoder <strong>and</strong> decoder using dedicated binary circuits. Thus,<br />
the encoder will be attached as a physical device to any system which transmits<br />
dates to a communication channel while the decoder will be attached to the system<br />
which receives the dates.<br />
In this section we describe the operation of the two systems <strong>and</strong> our design<br />
method proposed for them.<br />
A. Encoder<br />
The operation of encoder is illustrated in Figure 2.<br />
Figure 2. Encoder operation flowchart<br />
According to the first solution, the message is received from the emitter system.<br />
The message can be received serially (Ethernet or USB) or in parallel if the emitter<br />
use a protocol defined by itself. The experiments were performed using 5-bits<br />
size message words (thus can be encoded letters from Latin alphabets) <strong>and</strong> 10-bits<br />
message words (which can contain extended ASCII charset).
110 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Each message has associated a word code. To 10 bits-size message word we<br />
have a Hamming distance 5, which means that we can correct 2 erroneous bits <strong>and</strong><br />
can detect 5 erroneous bits. We generate word codes for all 10-bits size combinations.<br />
Thus we have 2 10 locations in memories to encoder <strong>and</strong> decoder.<br />
In fact, the communication encoder is designed as a simple binary decoder.<br />
The messages are generated in a linear increasing manner <strong>and</strong> word code is obtained<br />
by multiplying message polynomial with generator matrix (see Figure 3).<br />
The word codes are equidistant in Hamming space (distance is 5). This orthogonally<br />
property is required in order to have the same error correction <strong>and</strong><br />
detection capacity to each received word code.<br />
Figure 3. Association between message <strong>and</strong> BCH word code to the encoder<br />
The second solution uses 5-bits size message, which are encoded with 20-bits<br />
size word code. The Hamming distance between word codes is 10 so we have a correction<br />
capacity of 4 erroneous bits.<br />
The encoder is designed in the same way as in previous solution <strong>and</strong> the number<br />
of location is 2 5 . Thus, in both cases, we have a very reduced hardware structure<br />
for encoder.<br />
B. Decoder<br />
Decoder, on the other h<strong>and</strong>, has a more complex structure. This is because<br />
it also has the error detection <strong>and</strong> correction function. The decoder can match<br />
received words with expected word codes but, in some cases, mistakenly received<br />
word is not found in any of the stored ones.<br />
Error correction would actually identify the correct word code. This involves<br />
finding the closest word in memory. Once identified, it will determine what message<br />
is received.<br />
Tasks to be performed at the receiver are presented in the following chart<br />
(see Figure 4).
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
111<br />
Figure 4. Decoder operation flowchart<br />
First, the word code is taken from the communication channel. In our<br />
experiments the word code is of 20 bits size, for both solutions. This word code<br />
is then compared with all stored words. It is a binary comparison. Finally, we<br />
find out which are the erroneous bits. Each memory cell counts the erroneous<br />
bits <strong>and</strong> we can determine minimal value from all locations. The location<br />
which contains an word code with minimum erroneous bits is associated with<br />
the correct message.<br />
The associative memory has a more complex structure that the encoder (see<br />
Figure 5). Thus, each location consists in a binary comparing circuit, as it is illustrated<br />
in Figure 4, <strong>and</strong> in a bits counter (compressor). This compressor count<br />
“1” bits from the comparator output. There’s also a register in which are stored<br />
word code <strong>and</strong> message.
112 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 5. Structure of location in associative memory to the decoder<br />
The message with erroneous bits will be transmitted as a 10 or 15 bits size<br />
data pair (5 or 10 bits message <strong>and</strong> 5 bits number of erroneous bits – from 20 bits<br />
of received word code). All these data pairs, at each location separately, will be<br />
compared to determine the minimum. For this operation we use a combinational<br />
network which gets the minimal value of number of erroneous bits, as is illustrated<br />
in Figure 6.<br />
Figure 6. Minimum computation circuit<br />
The data pairs from the associative memory are applied to left side (x axis).<br />
To y axis we find the data pairs with a minimal value of erroneous bits, which travel<br />
to bottom side of circuit.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
113<br />
The minimum cell (Min), which enters in the structure of the circuit, compares<br />
the number of erroneous bits from two data pairs <strong>and</strong> selects only the data pair<br />
with the minimum number of erroneous bits.<br />
III. Experminental results<br />
Since it’s a hardware system used to detect <strong>and</strong> correct errors in communication,<br />
items that are considered for performance analysis of this system are given<br />
by response time, area occupied on silicon surface <strong>and</strong> communication speed.<br />
In our experiments, we tested two different solutions. The first solution encodes<br />
large message package (10 bits) <strong>and</strong> can correct a small number of erroneous bits<br />
(2 errors). The second solution encodes a smaller message <strong>and</strong> has a greater error<br />
correction capacity. Implementation was performed to a FPGA Xilinx Spartan 3<br />
family, a low cost family circuit (3-20$ per chip inside the family). A complete<br />
communication system will integrate both encoder <strong>and</strong> decoder on the same chip.<br />
We will analyze them separately.<br />
In our analysis we take in account different members of Spartan 3 FPGA family.<br />
The logical cell (Look Up Table, LUT) <strong>and</strong> the logical-routing cell (Slice) are<br />
the same structure for all members inside the family. The differences come from<br />
the number of logical <strong>and</strong> routing cells integrated on chip.<br />
For example, XC3S50 FPGA has 1728 logic cells <strong>and</strong> 768 logical-routing cells,<br />
while XC3S1000 has 17280 logic cells <strong>and</strong> 7680 logic – routing cells. Of course,<br />
the price reflects this difference. For a minimum cost we implement the systems<br />
to the smallest <strong>and</strong> cheapest circuits inside family.<br />
Thus, the communication encoder consists in a simple binary decoder. Its<br />
structure is very simple, in terms of hardware, occupying approximately 1% of all<br />
chip resources for a XC3S50 chip. So we use, for encoder of both solution XC3S50<br />
circuit (3 $/chip).<br />
Table I. Results from encoder <strong>and</strong> decoder implementation – synthesis report<br />
Method Circuit Area on silicon (XC3S) Response time<br />
H-ARQ<br />
w = 20,<br />
m = 10<br />
H-ARQ<br />
w = 20,<br />
m = 5<br />
Encoder<br />
Decoder<br />
Encoder<br />
Decoder<br />
a) for 10 bits of message<br />
b) for 5 bits message<br />
Used slices 10 – 1.3% capacity of XC3S50<br />
Used LUTs 17 – 1.0% capacity of XC3S50<br />
Used slices 6550 – 84% capacity of XC3S1000<br />
Used LUTs 11494 – 66% capacity of XC3S1000<br />
Used slices 9 – 1.17% capacity of XC3S50<br />
Used LUTs 15 – 0.87% capacity of XC3S50<br />
Used slices 466 – 60.68% capacity of XC3S50<br />
Used LUTs 812 – 47% capacity of XC3S50<br />
10.926 ns a<br />
24.048 ns a<br />
9.280 ns b<br />
21.573 ns b
114 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
The circuit simplicity implies a very small response time of 9.2 ns for each<br />
5-bits size message or 10.9 ns for each 10-bits size message (see Table I). So, when we<br />
use 5 bits communication means communication at 1 Gbps for encoder. The same<br />
speed is for 10 bits message.<br />
The decoder, more complex than the encoder, still has a simple structure<br />
consisting only of combinational circuits arranged in an array. Comparison operation<br />
between the input data into the associative memory (word code received from<br />
the communication channel) <strong>and</strong> the word code stored is performed in parallel<br />
for all locations.<br />
Therefore, circuit’s complexity is increased by the number of locations. To<br />
10 bits message solution we have a number of 1024 different location. This number<br />
is reflected in capacity of 84% allocated from XC3S1000 logical resources. The decoder<br />
implemented for second solution, with 5 bits per message but highest error<br />
correction capacity can be implemented in the smallest XC3S50.<br />
On the other h<strong>and</strong>, the response time for both decoders is approximately<br />
the same (24 ns – 10 bits, 22 ns – 5 bits). This happens because all the cells respond<br />
in parallel (this value doesn’t take in account the response time of minimum circuit).<br />
We have a communication speed for 10 bits message packets (encoded in 20 bits<br />
word code) of 416 Mbps <strong>and</strong> for 5 bits message (encoded in 20 bits word code)<br />
the speed is 227 Mbps. First solution makes correction for 2 erroneous bits <strong>and</strong><br />
the second solution makes correction for 4 erroneous bits.<br />
Because of coding it is a reduction in speed of communication with 1/4 (5-bits<br />
message is encoded with 15-bits word code) or ½ (5-bit size message is encoded<br />
with 20-bits word code). For example, if communication is to 1 Gbps the real communication<br />
speed is 333 Mbps. However, in our approach, this reduction is not<br />
presented because of parallel computation of entire message word.<br />
Our system can be integrated in Ethernet communications, as additional<br />
services added to physical layer (see Figure 7).<br />
Figure 7. Hardware correction layer services by using our BCH encoder-decoder<br />
Interposition of this circuit in Ethernet communication system will automatically<br />
corrected 2-4 error bit locally. Thus, it provides error correction services for
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
115<br />
protocols in the highest layer. The TCP services will be significantly relieved of task<br />
that, in other circumstances, would have their back. To increase the communication<br />
speed, we can use a “secured” UDP communication, because we have already,<br />
from physical layer, error correction services.<br />
Compared with other structures, based on hardware implementation of error<br />
correction circuit, performance has improved in this version (see Table II, where<br />
SR-ARQ means Selective Repeat Automatic Repeat Request).<br />
Table II. Comparison with other hardware implemented error correction circuits<br />
Method<br />
Parallel computing, classic<br />
Hardware BCH SR-ARQ<br />
Associative memory ARQ<br />
(w = 20, m = 10)<br />
Associative memory A RQ<br />
(w = 20, m = 5)<br />
Correction (t) <strong>and</strong> detection<br />
(f) capability<br />
t = 1 erroneous bit<br />
f = 0<br />
t = 3 erroneous bits<br />
f = 7 erroneous bits<br />
t = 2 erroneous bits<br />
f = 5 erroneous bits<br />
t = 4 erroneous bits<br />
f = 10 erroneous bits<br />
Communi-cation speed<br />
149 Mbps<br />
87 Mbps<br />
416 Mbps<br />
227 Mbps<br />
Thus, we have a parallel computing circuit which corrects 1 erroneous bit, with<br />
no detection, presented in [5]. Because of parallel computing structure we have<br />
here a 149 Mbps communication speed. Another circuit uses a hardware hybrid<br />
BCH SR-ARQ error correction <strong>and</strong> detection algorithms [6].<br />
IV. Conclusions<br />
Our solution presents a modern method concerning implementation of error<br />
correcting codes with associative memories. Associative memories allow a very easy<br />
design for error correcting codes <strong>and</strong> obtain good performances, both in detection<br />
<strong>and</strong> correction. Also, they provide a very high response speed because of parallel<br />
processing.<br />
Our method, presented in this paper, consist in storing a set of word codes<br />
<strong>and</strong> the message associated with them. The correction is achieved by comparing<br />
the received word code with all stored word codes <strong>and</strong> by selecting the nearest word<br />
code, in terms of Hamming distance. Also this method allows us detection of errors<br />
while the correction is performed, increasing computing speed. Our method<br />
improves the capacity of communication channel in Ethernet communication.<br />
In future works we will implement in FPGA error correcting codes with<br />
a higher power correction <strong>and</strong> detection. We will test these new error correcting<br />
systems in order to measure their throughput <strong>and</strong> to decide their capacity to work<br />
in real conditions.
116 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
References<br />
[1] M.Y. Rhee, “Error Correcting Coding Theory”, McGraw-Hill, Singapore, 1989.<br />
[2] S. Lin, <strong>and</strong> D.J. Costello Jr., “Error Control Coding”, Prentice-Hall, New Jersey, 1983.<br />
[3] J. Rose, S.D. Brown, R.J. Francis, “Field Programmable Gate Arrays”, Kluwer Academic<br />
Publishers, 1992.<br />
[4] T. Fogarty, J. Miller, <strong>and</strong> P. Thompson, “Evolving digital logic circuits on Xilinx<br />
6000 family FPGAs,” in Soft Computing in Engineering Design <strong>and</strong> Manufacturing,<br />
P. Chawdhry, R. Roy, <strong>and</strong> R. Pant (eds.), Springer: Berlin, 1998, pp. 299-305.<br />
[5] L. Ionescu, C. Anton, I. Tutănescu, A. Mazăre, G. Şerban, “Hardware<br />
implementation of BCH Error Correcting Codes on FPGA”, International Journal<br />
of Intelligent Computing Research (IJICR), vol. 1, Issue 3, ISSN 2042-4655, Published<br />
by Infonomics Society, p.148-153, September 2010.<br />
[6] G. Şerban, C. Anton, L. Ionescu, I. Tutănescu, A. Mazăre, “Implementation<br />
of a 64-bit hybrid SR-ARQ algorithm on FPGA”, Proceeding of International Conference<br />
on Applied Electronics, ISBN 978-80-7043-987-6, ISSN 1803-7232, IEEE Catalog<br />
Number CFP1169A-PRT, p. 337-340, Pilsen, 7-8 September 2011.
Concurrent Error Detection Scheme<br />
for HaF Hardware<br />
Ewa Idzikowska<br />
Poznań University of <strong>Technology</strong>,<br />
pl. M. Skłodowskiej-Curie 5, 60-965 Poznań, Pol<strong>and</strong>,<br />
ewa.idzikowska@put.poznan.pl<br />
Abstract: HaF (Hash Function) is a dedicated cryptographic hash function considered for verification<br />
of the integrity of data. It is suitable for both software <strong>and</strong> hardware implementation. HaF has an iterative<br />
structure. This implies that even a single transient error at any stage of the computation<br />
of hash value results in a large number of errors in the final hash value. Hence, detection of errors<br />
becomes a key design issue. In the hardware design of cryptographic algorithms, concurrent error<br />
detection (CED) techniques have been proposed not only to protect the encryption <strong>and</strong> decryption<br />
process from r<strong>and</strong>om faults but also from the intentionally injected faults by some attackers. In this<br />
paper, we show the propagation of errors in the VHDL model of HaF-256 <strong>and</strong> then we propose <strong>and</strong><br />
analyse some error detection schemes. In proposed CED scheme all the components are protected<br />
<strong>and</strong> all single <strong>and</strong> multiple, transient <strong>and</strong> permanent bit flip faults will be detected.<br />
Keywords: hash function, HaF, S-box, concurrent error detection, hardware redundancy, time redundancy,<br />
DWC<br />
I. Introduction<br />
A hash function H is a transformation that takes an input m <strong>and</strong> returns<br />
a fixed-size string, which is called the hash value h (that is, h = H(m)). Hash functions<br />
with just this property have a variety of general computational uses, but<br />
when employed in cryptography, the hash functions are usually chosen to have<br />
some additional properties, e.g. H(m) must be relatively easy to compute for any<br />
given m, one-way <strong>and</strong> collision-free [11]. Very important role of a cryptographic<br />
hash function is in the provision of message integrity checks, digital signatures,<br />
password storage <strong>and</strong> verification etc.<br />
Hash functions are computationally complex, <strong>and</strong> in order to satisfy the high<br />
throughput requirements of many applications, they are often implemented by<br />
means of VLSI (Very Large Scale Integration) devices. The high complexity of such<br />
imple mentations raises concerns regarding their reliability. There is a need to develop<br />
methodologies <strong>and</strong> techniques for designing robust cryptographic systems,<br />
<strong>and</strong> to protect them against both accidental faults <strong>and</strong> intentional intrusions <strong>and</strong>
118 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
attacks, in particular those based on the malicious injection of faults into the device<br />
for the purpose of extracting the secret information [3] <strong>and</strong> [4]. If an attacker<br />
deliberately generates a glitch attack, causing a flip-flop state to change or corrupt<br />
data values when they are transferred from one digest operation to another, even<br />
a single fault can result in multiple errors in the hash value computed. The severity<br />
of the problem necessitates detection of errors a key design issue. A digest round<br />
consists of several operations. Errors can creep in at any of these operations <strong>and</strong><br />
can affect one or several bits at any of the operations in a digest round. As HaF<br />
is considered for use in security services, concurrent error detection is very important.<br />
This necessitates an analysis on the propagation of error from the point<br />
of origin to the output.<br />
CED has certain associated penalties such as hardware cost <strong>and</strong> the performance<br />
degradation due to interaction between the circuit <strong>and</strong> the detection logic,<br />
which need to be considered while designing the error detection circuit. The design<br />
goal of the CED is to achieve 100% error detection with minimal penalty.<br />
CED techniques involve redundancy in the form of hardware, time or information.<br />
A CED circuit based on hardware redundancy can for example duplicate<br />
the complete circuit. It means that hardware overhead is more than 100%. In time<br />
redundancy, the same hardware is used to perform both the normal computation<br />
<strong>and</strong> re-computation using the same input data [9]. The advantage of this technique<br />
is that it uses minimum hardware. The drawbacks of this technique are that it entails<br />
≥100% time overhead <strong>and</strong> it can only detect transient faults. In information<br />
redundancy technique, data are appended with additional bits <strong>and</strong> a coding scheme<br />
is used to detect errors. Coding techniques marginally increase the hardware as well<br />
as performance overhead. Combinations of the above techniques are also employed<br />
to minimize the overhead for CED [1] <strong>and</strong> [5].<br />
In this paper the propagation of errors in HaF-256 is studied. We take into<br />
consideration single, transient as well as permanent faults injected at different<br />
stages of hash value computation. It is found that even a single error injected resulted<br />
in half the bits of hash value being in error <strong>and</strong> the errors are spread across<br />
the computed hash value. Next we focused on CED techniques <strong>and</strong> proposed error<br />
detection schemes to protect basic operations such as multiplication mod (2 n +1),<br />
addition modulo 2, addition modulo 2 n There is also presented schemes to protect<br />
S function, step function <strong>and</strong> round function of HaF-256. The proposed approaches<br />
are tested <strong>and</strong> the results are presented.<br />
This paper is organized as follows. Sec. II presents family HaF of hash functions.<br />
There is shown a method of one block processing, round function, operations<br />
of step function. In Sec. III error analysis is carried out to underst<strong>and</strong> the effect<br />
of an error injected into the hash computation circuit. Error detection schemes,<br />
possible faults <strong>and</strong> faults models are described in Sec. IV. Simulation results are<br />
presented in Sec. V. An error detection scheme for the HaF circuit is proposed<br />
in Sec. VI. Concluding remarks are in Sec. VII.
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
119<br />
II. Family HaF of hash functions<br />
The family HaF is formed of three hash functions: HaF-256, HaF-512 <strong>and</strong><br />
HaF-1024, producing hash values of the length equal to 256, 512 <strong>and</strong> 1024 bits,<br />
respectively. The general model for HaF is presented on Fig. 1 [2].<br />
The original message m has to be formatted before hash value computation<br />
begins. After formatting the message m we have the message M. This massage<br />
is divided on blocks M 0 , M 1 , …, M k–1 . Each block M i is processed with the salt s by<br />
the iterative compression function φ. After processing all blocks we receive the hash<br />
value h(m) = H k as the result.<br />
The length of formatted message M should be a multiple of 16n bits. It means,<br />
that the length of the input block equals 16n bits, where n is a parameter depending<br />
of the hash value we want to obtain. The parameter n equals 16, 32 <strong>and</strong> 64 bits<br />
for HaF-256, HaF-512 <strong>and</strong> HaF-1024 respectively. We consider HaF-256 function<br />
in this article. It means, that n = 16.<br />
Figure 1. Model for hash function HaF [2]<br />
The block M i is processed in two rounds. The method of one block processing<br />
is depicted on Fig. 2. M i , H i <strong>and</strong> s are inputs for compression function. The parameter<br />
n indicates the length of the working variable A r , rÎ{0, 1, …, 15}.<br />
The round function (Fig. 3) has two inputs N i , H i , (H 0 = IV is an initial value)<br />
<strong>and</strong> two outputs N i * , H i * . Before processing in round #1, the block M i is modified,
120 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
N i = M i Å s, where s is a salt, |s| = 16n (Fig. 2). In the round #l (lÎ{1, 2}) four least<br />
significant bits of N i indicate the number of bits the string N i is rotated to the left<br />
(
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
121<br />
Figure 4. Step function F j [2]<br />
In the Fig. 4. the following notations are used:<br />
a ⊙ b – multiplication mod (2 n +1) of n-bit non-zero integers a <strong>and</strong> b,<br />
v
122 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
III. Error propagation<br />
Error propagation analysis is carried out to underst<strong>and</strong> the effect of an error<br />
injected into the hash computation circuit. Error was injected in:<br />
• the inputs of a round function,<br />
• the inputs of step function.<br />
Experiments were conducted by injecting a single bit flip error in one of the inputs<br />
of round function or step function <strong>and</strong> obtaining the number of erroneous<br />
bits at the output of the same block. The errors were introduced at different bits<br />
r<strong>and</strong>omly in every step <strong>and</strong> the number of bits that were in error was computed.<br />
As an example we show the propagation of error injected in first step of round #1<br />
in subblock A 13 . Instead value F9DD is the faulty value F95D. Output values A 0 ,<br />
A 1 , …, A 15 after processing each of 16 steps of round function, are shown in Table I.<br />
The faulty values are depicted by bold, italic font.<br />
One faulty bit in the step #0 of round function causes about 43% faulty bits<br />
in the last, #15 step. Faulty bit in the input of round #1 of round function causes<br />
49% faulty bits in the output of round #2.<br />
This analysis helps us in choosing suitable error detection schemes.<br />
Table I. Error propagation in round function of HaF-256<br />
Faulty free input value A0, A1, …, A15; A13 = F9DD<br />
076A3663D2541F389E94CA4E1A759C92ED3282E55F31FC1514A6F9DDBA029ABE<br />
Faulty input value A0, A1, …, A15; A13 = F95D<br />
076A3663D2541F389E94CA4E1A759C92ED3282E55F31FC1514A6F95DBA029ABE<br />
Step<br />
Faulty outputs<br />
0 3663D2541F389E94CA4E1A759C92ED3282E598AFFC1514A6F95DBA029ABEDFA8<br />
1 D2541F389E94CA4E1A759C92ED3282E598AF0AFE14A6F95DBA029ABEDFA8C321<br />
2 1F389E94CA4E1A759C92ED3282E598AF0AFE530AF95DBA029ABEDFA8C3210741<br />
3 9E94CA4E1A759C92ED3282E598AF0AFE530AAEFCBA029ABEDFA8C3210741A47E<br />
4 CA4E1A759C92ED3282E598AF0AFE530AAEFC015D9ABEDFA8C3210741A47E1059<br />
5 1A759C92ED3282E598AF0AFE530AAEFC015D5F4DDFA8C3210741A47E105943F0<br />
6 9C92ED3282E598AF0AFE530AAEFC015D5F4DD46FC3210741A47E105943F0D7D2<br />
7 ED3282E598AF0AFE530AAEFC015D5F4DD46F90E10741A47E105943F0D7D2C084<br />
8 82E598AF0AFE530AAEFC015D5F4DD46F90E1A083A47E105943F0D7D2C084A3FF<br />
9 98AF0AFE530AAEFC015D5F4DD46F90E1A0833F52105943F0D7D2C084A3FF9977<br />
10 0AFE530AAEFC015D5F4DD46F90E1A0833F522C8843F0D7D2C084A3FF9977CA78<br />
11 530AAEFC015D5F4DD46F90E1A0833F522C88F821D7D2C084A3FF9977CA785AAE<br />
12 AEFC015D5F4DD46F90E1A0833F522C88F821E96BC084A3FF9977CA785AAE875B<br />
13 015D5F4DD46F90E1A0833F522C88F821E96B4260A3FF9977CA785AAE875B8AF7<br />
14 5F4DD46F90E1A0833F522C88F821E96B4260FFD19977CA785AAE875B8AF7D530<br />
15 D46F90E1A0833F522C88F821E96B4260FFD1BBCCCA785AAE875B8AF7D5307F1C
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
123<br />
IV. Error detection schemes<br />
Fault detection is achieved in a circuit by including redundancy in one form<br />
or the other. The selection of a suitable scheme depends on the type of errors to<br />
be covered, error models <strong>and</strong> the performance degradation acceptable in terms<br />
of hardware overhead <strong>and</strong> delay. The schemes based only on time redundancy are not<br />
capable of h<strong>and</strong>ling permanent faults. The simplest form of error detection scheme<br />
which can detect transient as well as permanent faults with hardware redundancy<br />
is the DWC scheme. The hardware overhead in this case is little >100% with very<br />
little additional delay, these can h<strong>and</strong>le unrestricted error models.<br />
The earliest error detecting scheme is the parity bit scheme. It is a well-known<br />
fact that parity codes can detect all single bit errors <strong>and</strong> all errors with multiple<br />
odd erroneous bits. To improve the error detection capability <strong>and</strong> detect also even<br />
erroneous bits, multiple parity bits are required [7] <strong>and</strong> [8]. In HaF-256 first of all<br />
DWC scheme will be used.<br />
A. Faults models<br />
In our considerations we use a fault model wherein either transient or permanent<br />
faults are induced r<strong>and</strong>omly into the device. We consider single <strong>and</strong> multiple<br />
faults. Faults are modelled as an 16-bit error vector E = {e 15 ,...,e i ,...,e 1 ,e 0 }, where<br />
e i Î{0,1} <strong>and</strong> e i = 1 indicates that bit i is faulty. The number of ones in this vector<br />
is equal to the number of inserted faults. Fault simulations were performed for two<br />
kinds of fault models. In one model a fault flips the bit, <strong>and</strong> in the other model<br />
(stuck-at-0/1) the bit takes a constant value 0 or 1.<br />
Let X = {x 15 ,...,x 1 ,x 0 } be an error-free vector of bits.<br />
Vector Xe = {xe 15 ,...,xe 1 ,xe 0 } is an erroneous vector [6] <strong>and</strong> [7]:<br />
• xe i = x i Å e i – if the fault flips the bit,<br />
• xe i = x i + e i – for stuck-at-1 fault,<br />
• xe i = x i × ē i – for stuck-at-0 fault,<br />
where: Å – xor, + – or, × – <strong>and</strong>.<br />
B. Error detection in basic operations<br />
To protect basic operations such as multiplication mod (2 n +1) (⊙), addition<br />
modulo 2 (Å) <strong>and</strong> addition modulo 2 n (⊞) in step function of HaF-256 (Fig. 3) we<br />
used DWC (Duplication With Comparison) scheme as it shown in Fig. 5.<br />
Step function F j with DWC scheme elements for one of addition modulo<br />
2 n (⊞) operation is presented in Fig. 6. In this figure gray boxes are an extra elements<br />
to detect errors in A 1 ⊞A 6 operation. The outputs of the addition block <strong>and</strong><br />
the duplicated addition block are compared (box errcheck) <strong>and</strong> if are different,<br />
an error signal is generated.
124 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 5. Duplication With Comparison scheme<br />
Figure 6. Step function F j with DWC for one of addition modulo 2 n (⊞) operation<br />
Experiments were conducted by injection errors into the inputs of an operation<br />
block <strong>and</strong> observe if the errors are detected. Capability of single <strong>and</strong> multiple,<br />
transient <strong>and</strong> permanent fault detection using this scheme of fault detection<br />
is presented in Sec. V.<br />
C. Error detection in S-boxes<br />
S-box is a substitution function <strong>and</strong> is used to obscure the relationship between<br />
the plaintext <strong>and</strong> the ciphertext. It is an important element of cryptographic
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
125<br />
algorithm <strong>and</strong> it should posses some properties, which make linear <strong>and</strong> differential<br />
cryptanalysis as difficult as possible.<br />
In each step of round function of HaF a substitution S j (n) depending on<br />
n <strong>and</strong> j is used. It consists of four S-boxes S 0 , S 1 , S 2 <strong>and</strong> S 3 each of dimension 16×16<br />
working in such a way that:<br />
• for n = 16, S j (16) = S (j) mod 4<br />
• for n = 32, S j (32) = S (j) mod 4 || S (j+1) mod 4 ,<br />
• for n = 64, S j (64) = S (j) mod 4 || S (j+1) mod 4 || S (j+2) mod 4 (x) || S (j+3) mod 4 .<br />
HaF S-box has been generated using the multiplicative inverse procedure<br />
similar to AES (Advanced Encryption St<strong>and</strong>ard) with a r<strong>and</strong>omly chosen primitive<br />
polynomial defining the Galois field. Nonlinearity of this S-box is 32510 <strong>and</strong> its<br />
nonlinear degree is 15. Sixteen Boolean functions that constitute this S-box have<br />
nonlinearities equal to 32510 or 32512 <strong>and</strong> are all of degree 15 [2].<br />
A 16×16 S-box can be stored as a table containing 65536 values indexed by<br />
an input of the S-box function, i.e., x 1 , x 2 , …, x 16 . The table stores S-box outputs<br />
(16 bits: f 1 (x 1 , x 2 , …, x 16 ), f 2 (x 1 , x 2 , …, x 16 ), …, f 16 (x 1 , x 2 , …, x 16 )).<br />
Concurrent Error Detection schemes for S-box are presented in [9] <strong>and</strong> [10].<br />
There are three different approaches to error detection. Two of these methods<br />
– parity based Concurrent Error Detection approach <strong>and</strong> DWC scheme – are<br />
the methods with hardware redundancy [10], the third one is time redundancy<br />
method <strong>and</strong> use involutional time redundancy CED to protect the S-boxes core<br />
of function HaF [9].<br />
Capabilities of detection single <strong>and</strong> multiple, transient <strong>and</strong> permanent fault<br />
using these schemes are presented in Sec. V.<br />
D. Error detection in step function<br />
The round function (Fig. 3.) consists of 16 steps. The step #j is indicated by<br />
the integer j Î {0, 1, …, 15} <strong>and</strong> is shown in Fig. 4. To protect this function we used<br />
DWC (Duplication With Comparison) scheme as it shown in Fig. 5.<br />
Round function with DWC scheme elements for step function F j is presented<br />
in Fig. 7. In this figure, gray box is an extra step function block. The outputs<br />
of these two blocks are compared (box errcheck) <strong>and</strong> if are different, an error<br />
signal is generated.<br />
Experiments were conducted by injection errors inside or into inputs of the step<br />
function block <strong>and</strong> observation if the errors are detected. Capability of single <strong>and</strong><br />
multiple, transient <strong>and</strong> permanent faults detection using this scheme of fault detection<br />
is presented in the Sec. V.
126 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 7. Round function with CED elements for step function F j protection<br />
E. Error detection in round function<br />
The message block M i is processed in two rounds. The method of one block<br />
processing is depicted in Fig. 2. Round function with DWC is presented in Fig. 8.<br />
The gray box is an extra Round function block. The outputs of Round #1 <strong>and</strong> Round<br />
#1b are compared (box errcheck) <strong>and</strong> if are different, an error signal is generated.<br />
Capability of single <strong>and</strong> multiple, transient <strong>and</strong> permanent faults detection<br />
using this DWC scheme is presented in Sec. V.<br />
V. Simulation results<br />
In order to measure the detection capability of the proposed in Sec. IV error<br />
detection schemas we used VHDL (Very High Speed Integrated Circuits Hardware<br />
Description Language) hardware description language <strong>and</strong> the VHDL simulator,<br />
Active-HDL by Aldec. In this section we provide simulation results related to<br />
the fault coverage of the proposed approaches. We present simulation results on
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
127<br />
the vulnerability of these schemes for fault models from Section IV.A. The faults<br />
were injected into inputs of an basic operation blocks or also inside the other blocks,<br />
<strong>and</strong> observed if the error is detected. We consider r<strong>and</strong>om faults, in the sense that<br />
the faulty value is assumed to be r<strong>and</strong>om <strong>and</strong> uniformly distributed. The VHDL<br />
model of the HaF-256 function has been modified by injected faults. The output<br />
signals have been compared to correct signals. In this way, the obtained fault coverage<br />
gives a measure of the error detection capability.<br />
Figure 8. DWC for round function<br />
A. CED in basic operations<br />
In this experiment we focused on transient <strong>and</strong> permanent, single <strong>and</strong> multiple<br />
stuck-at faults <strong>and</strong> bit flips faults. Errors were injected in the input of an operation block<br />
<strong>and</strong> observe if the error is detected. The obtained faults coverage for addition modulo<br />
2 n operation (⊞) is shown in Fig. 9 for permanent faults <strong>and</strong> in Fig. 10 for transient<br />
faults. Single permanent stuck-at-0/1 faults are detected by proposed CED in 57.9%,<br />
transient faults in 57.2%. All single bit flip faults, permanent <strong>and</strong> transient, are detected.<br />
Fig. 9. <strong>and</strong> Fig. 10. show also dependence of error detection probability on<br />
the number of injected faults. Not only single, but also multiple bit flip faults are<br />
detected always.
128 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Percentage of permanent stuck-0/1 error detection for other operations is presented<br />
in Table II. DWC scheme detects all bit flip errors.<br />
Figure 9. Probability of permanent error detection using DWC for addition modulo 2 n operation (⊞)<br />
Figure 10. Probability of transient error detection using DWC for addition modulo 2 n operation (⊞)
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
129<br />
Table II. Probability of permanent error detection for operations of step function of HaF-256<br />
Stuck-at-0/1<br />
Number of errors 1 2 3 4 5<br />
a ⊙ b 57.2 74.9 88.1 93.1 96.6<br />
v Å w 61.1 82.1 85.4 93.3 96.5<br />
v ⊞ w 57.9 80.3 90.3 95.3 96.8<br />
p 1 (x) Ä p 2 (x) 60.9 78.2 85.8 93.2 96.1<br />
B. CED in S-boxes<br />
In this paper Concurrent Error Detection schemes for S-boxes of the HaF<br />
algotithm was tested for transient <strong>and</strong> permanent, single <strong>and</strong> multiple stuck-at error<br />
<strong>and</strong> bit flips errors. The obtained detection percentage for differnet CED schemes<br />
for transient faults is shown in Table III. <strong>and</strong> for permanent faults in Table IV.<br />
The best detection percentage of errors is for DWC scheme, first for all for<br />
single stuck-at-0/1 errors. A difference between DWC <strong>and</strong> parity bit scheme reaches<br />
more than 25% however this difference is much smaller for multiple errors. There<br />
is no difference between detection percentage for these three error detection schemas<br />
for bit flip errors — all are detected.<br />
A study of concurrent error detection possibilities of these three CED schemas<br />
shows, that involutional time redundancy CED <strong>and</strong> also parity bit based scheme<br />
is a good choice. The hardware overhead is very small <strong>and</strong> detection percentage for<br />
bit flip errors is practically the same as for DWC.<br />
Table III. Probability of transient error detection in S-box<br />
Fault type Stuck-at-0/1 Bit flip fault<br />
No. of errors 1 2 3 4 5 1 2 3 4 5<br />
Parity bits 54.5 79.4 83.5 93.1 95.2 94.5 100 100 100 100<br />
DWC 72.6 86.6 92.9 96.7 99.4 100 100 100 100 100<br />
Involution 65.1 81.8 91.5 91.9 95.1 99.9 100 100 100 100<br />
Table IV. Probability of permanent error detection in S-box<br />
Fault type Stuck-at-0/1 Bit flip fault<br />
No. of errors 1 2 3 4 5 1 2 3 4 5<br />
Parity bits 56.3 82.3 85.5 94.9 97.0 100 100 100 100 100<br />
DWC 75.8 87.7 95.1 98.3 99.7 100 100 100 100 100<br />
Involution 69.2 85.9 95.7 95.9 98.9 100 100 100 100 100
130 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
CED in step function<br />
In this experiment we focused on transient <strong>and</strong> permanent, single <strong>and</strong><br />
multiple stuck-at faults <strong>and</strong> bit flip faults. Errors were injected in the input<br />
of step function block or inside the block <strong>and</strong> observed if the error is detected.<br />
Detection percentage of stuck-at-0/1 <strong>and</strong> bit flip errors, is shown in Table V. for<br />
transient errors <strong>and</strong> in Table VI. for permanent errors. Using this CED method<br />
we can detect all bit flip faults. The worse case is for single stuck-at faults. Only<br />
63.6% transient faults <strong>and</strong> 69.4% permanent faults is detected. Multiple stuck-at<br />
faults are detected in 80-95%.<br />
Table V. Probability of transient error detection in step function<br />
Fault type Stuck-at-0/1 Bit flip fault<br />
No. of errors 1 2 3 4 5 1 2 3 4 5<br />
DWC 63.6 79.6 84.3 90.3 95.6 100 100 100 100 100<br />
Table VI. Probability of permanent error detection in step function<br />
Fault type Stuck-at-0/1 Bit flip fault<br />
No. of errors 1 2 3 4 5 1 2 3 4 5<br />
DWC 69.4 82.8 85.3 93.1 95.9 100 100 100 100 100<br />
C. CED in round function<br />
CED in round function was tested also for stuck-at faults <strong>and</strong> for bit flip faults.<br />
There was considerate single <strong>and</strong> multiple faults, transient <strong>and</strong> permanent faults.<br />
The faults was inserted inside the function block or into the inputs. Probability<br />
of errors detection is presented in Table VII (transient error) <strong>and</strong> in Table VIII<br />
(permanent error). The obtained detection percentage for bit flip faults, single <strong>and</strong><br />
multiple, is 100%.<br />
Table VII. Probability of transient error detection in round function<br />
Fault type Stuck-at-0/1 Bit flip fault<br />
No. of errors 1 2 3 4 5 1 2 3 4 5<br />
DWC 66.5 82.6 85.3 92.1 96.5 100 100 100 100 100<br />
Table VIII. Probability of Permanent error detection in round function<br />
Fault type Stuck-at-0/1 Bit flip fault<br />
No. of errors 1 2 3 4 5 1 2 3 4 5<br />
DWC 70.6 83.9 86.7 94.2 96.7 100 100 100 100 100
Chapter 5: Tactical <strong>Communications</strong> <strong>and</strong> Networks<br />
131<br />
VI. CED for hash function HaF<br />
After analyzing the propagation of errors in HaF <strong>and</strong> the probability of error<br />
detection for elementary function of HaF using different CED schemes, to protect<br />
HaF circuit we used DWC scheme for step function protection <strong>and</strong> DWC for two<br />
basic operations – addition modulo 2 (Å) <strong>and</strong> addition modulo 2 n (⊞). Hardware<br />
redundancy for step function DWC protection is smaller than redundancy for<br />
round function protection, <strong>and</strong> probabilities of error detection are comparable.<br />
We take into consideration transient <strong>and</strong> permanent, single <strong>and</strong> multiple<br />
stuck-at faults <strong>and</strong> bit flip faults. Errors were injected into the input of HaF or inside<br />
this function <strong>and</strong> than we observed if the errors are detected. Detection percentage<br />
is presented in Table IX. <strong>and</strong> Table X. All, transient <strong>and</strong> permanent, bit flip faults<br />
are detected. Multiple stuck-at faults are detected in 79-95%. Single stuck-at fault<br />
are detected at approximately 60-65%.<br />
Table IX. Probability of transient error detection in HaF<br />
Fault type Stuck-at-0/1 Bit flip fault<br />
No. of errors 1 2 3 4 5 1 2 3 4 5<br />
DWC 58.6 78.7 84.1 89.4 94.1 100 100 100 100 100<br />
Table X. Probability of permanent error detection in HaF<br />
Fault type Stuck-at-0/1 Bit flip fault<br />
No. of errors 1 2 3 4 5 1 2 3 4 5<br />
DWC 65.4 81.9 85.0 91.9 95.5 100 100 100 100 100<br />
VII. Concluding remarks<br />
Fault attacks are becoming a serious threat to hardware implementations<br />
of cryptographic systems. Proper countermeasures must be adopted to foil them.<br />
In this paper first the propagation of errors in HaF-256 is studied. We take<br />
into consideration single, transient as well as permanent faults injected at different<br />
stages of hash value computation. It is found that even a single error injected<br />
resulted in half the bits of hash value being in error <strong>and</strong> the errors are spread across<br />
the computed hash value.<br />
We proposed also error detection schemes for basic operations <strong>and</strong> elementary<br />
functions of hash function HaF <strong>and</strong> finally for HaF-256 circuit. In order to<br />
measure the fault detection capability of these schemas we used VHDL models <strong>and</strong><br />
the VHDL simulator, Active-HDL by Aldec. We presented simulation results on<br />
the vulnerability of these schemes for single <strong>and</strong> multiple faults <strong>and</strong> for transient<br />
<strong>and</strong> permanent faults. These methods can provide high coverage for multiplebit<br />
errors, which are the most common fault attacks. The coverage depends heavily
132 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
also on the fault model. Simulation experiments conducted on a large number<br />
of test cases show that our schemes have 100% fault coverage in the case of bit flip<br />
errors. These solution can be useful for concurrent checking cryptographic chips,<br />
especially designed for platforms with limited resources<br />
Acknowledgment<br />
This research was partially supported by the Polish Ministry of Education <strong>and</strong><br />
Science as a 2010-2013 research project.<br />
References<br />
[1] G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, V. Piuri, “Error Analysis <strong>and</strong><br />
Detection Procedures for a Hardware Implementation of the Advanced Encryption<br />
St<strong>and</strong>ard”, IEEE Transactions on Computers, vol. 52, no. 4, pp. 492-505, 2003.<br />
[2] T. Bilski, K. Bucholc, A. Grocholewska-Czuryło, J. Stokłosa, „Hash Function<br />
Concept”, Report no. 596, Poznań University of <strong>Technology</strong>, Poznań, 2011.<br />
[3] D. Boneh, R. DeMillo, R. Lipton, “On the Importance of Eliminating Errors<br />
in Cryptographic Computations”, Journal of Cryptology, vol. 14, pp. 101-119, 2001.<br />
[4] D. Boneh, R. DeMillo, R. Lipton, On the importance of checking cryptographic<br />
protocols for faults. Proceedings of Eurocrypt, pp. 37-51. Springer-Verlag LNCS 1233,<br />
1997.<br />
[5] L. Breveglieri, I. Koren, P. Maistri, “An Operation-Centered Approach to Fault<br />
Detection in Symmetric Cryptography Ciphers”, IEEE Transactions on Computers,<br />
vol. 56, no. 5, 635-649, 2007.<br />
[6] E. Idzikowska, K. Bucholc, “Concurrent Error Detection in S-boxes”, International<br />
Journal of Computer Science & Applications, vol. 4, no. 1, pp. 27-32, 2007.<br />
[7] E. Idzikowska, K. Bucholc, “Error detection schemes for CED in block ciphers”,<br />
Proceedings of the 5th IEEE/IFIP International Conference on Embedded <strong>and</strong><br />
Ubiquitous Computing, pp. 22-27. Shanghai 2008.<br />
[8] E. Idzikowska, “CED for S-boxes of symmetric block ciphers”, Pomiary, Automatyka,<br />
Kontrola, vol. 56, no. 10, pp. 1179-1183 2010.<br />
[9] E. Idzikowska, “CED for involutional functions of PP-1 cipher”, Proceedings of the 5th<br />
International Conference on Future <strong>Information</strong> <strong>Technology</strong>. Busan 2010.<br />
[10] E. Idzikowska, “Errors detection in S-boxes of hash function HaF-256”, Borzemski L.,<br />
Grzech A., Świątek J., Wilimowska Z. (eds.), <strong>Information</strong> Systems Architecture <strong>and</strong><br />
<strong>Technology</strong> – Web <strong>Information</strong> Systems Engineering, Knowledge Discovery <strong>and</strong> Hybrid<br />
Computing, Wroclaw University of <strong>Technology</strong> Press, Wrocław, 2011, 231-240.<br />
[11] J. Stokłosa, T. Bilski, T. Pankowski, “Bezpieczeństwo danych w systemach informatycznych”,<br />
PWN, Warszawa-Poznań 2001.
Chapter 6<br />
Spectrum Management<br />
<strong>and</strong> Software Defined Radio Techniques
A Realistic Roadmap for the Introduction<br />
of Dynamic Spectrum Management in <strong>Military</strong><br />
Tactical Radio Communication<br />
Bart Scheers 1 , Austin Mahoney 2 , Hans Åkermark 2<br />
1 CISS Department, Royal <strong>Military</strong> Academy (RMA), Brussels, Belgium,<br />
bart.scheers@rma.ac.be<br />
2 <strong>Communications</strong> Development, Security <strong>and</strong> Defense Solutions, Saab AB, Linköping, Sweden,<br />
{austin.mahoney, hans.akermark}@saabgroup.com<br />
Abstract: Cognitive radio (CR) technology has to date not been adopted by the military even though<br />
more than a decade has passed since its inception. This paper describes how cognitive radio <strong>and</strong><br />
associated dynamic spectrum management (DSM) procedures can be introduced in military tactical<br />
radio communication. CR <strong>and</strong> DSM address key challenges that face future military tactical<br />
radio communication <strong>and</strong> their successful introduction can reduce or even overcome current<br />
spectrum scarcity <strong>and</strong> deployment difficulty. A DSM roadmap is introduced where military users<br />
develop trust in, <strong>and</strong> experience with, these novel technologies in manageable steps. The first step<br />
in this DSM roadmap involves the introduction of a military b<strong>and</strong> dedicated for CRs <strong>and</strong> subsequent<br />
steps gradually increase the spectrum that may be utilized for military cognitive operation.<br />
A high-level vision of how existing military spectrum management procedures will change in the future<br />
with the introduction of DSM is also presented resulting in a significant reduction in the workload<br />
of spectrum management personnel.<br />
Keywords: cognitive radio; dynamic spectrum management; military tactical communication;<br />
roadmap<br />
I. Introduction<br />
<strong>Military</strong> tactical networks are being required to support a greater number<br />
of services than ever before. In addition, the b<strong>and</strong>width requirements associated<br />
with many of the new services are also rapidly increasing. The combination<br />
of these two factors means that we are nearing a time when there will be insufficient<br />
b<strong>and</strong>width to support the services required for future military operations. Today’s<br />
military operations are also typically undertaken by multiple nations cooperating<br />
in a coalition force. The spectrum <strong>and</strong> frequency planning activities associated with<br />
This research work was carried out in the frame of the CORASMA – EDA Project B-0781-IAP4-GC.
136 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
the deployment of a large multi-national coalition force are extremely complex <strong>and</strong><br />
unacceptably long, <strong>and</strong> can even delay the start of an operation [1].<br />
Both of the aforementioned problems, spectrum scarcity <strong>and</strong> deployment burden,<br />
are to a large degree consequences of the centralized <strong>and</strong> static nature of current<br />
spectrum management [1]. Dynamic spectrum management <strong>and</strong> cognitive radios<br />
seek out <strong>and</strong> use a part of the electromagnetic spectrum in ways that are not predictable,<br />
so that it is not generally known which set of frequencies that a radio will use at<br />
any given time”. The DSM process may be seen as a harmonization of, <strong>and</strong> dynamic<br />
interaction between, both a human element in the form of spectrum regulators <strong>and</strong><br />
spectrum planners or managers <strong>and</strong> an autonomous element in the form of one or<br />
more cognitive radio networks. DSM represents a fundamental change from existing<br />
spectrum management procedures in the way that spectrum is allocated <strong>and</strong> used for<br />
both civilian <strong>and</strong> military domains.<br />
This paper aims to address two particular aspects of DSM, first:<br />
• how a new <strong>and</strong> unproven technology such as DSM can be introduced<br />
in military tactical radio communication, <strong>and</strong> second<br />
• how current spectrum management procedures would be affected by such<br />
a change.<br />
To address these two aspects, this paper starts in section 2 with an overview<br />
of current spectrum management procedures in the military tactical domain <strong>and</strong><br />
their inadequacy for future military operations. Section 3 highlights the key challenges<br />
for a proposed roadmap describing the gradual <strong>and</strong> systematic extension<br />
of current spectrum management procedures that is presented in section 4. Section<br />
5 relates the proposed roadmap to future spectrum management procedures<br />
to clarify possible DSM practices in a future setting where cognitive enabled radios<br />
will be the norm in military tactical radio communication. This paper ends in section<br />
6 with major conclusions.<br />
II. Current NATO spectrum management procedures<br />
at the operational level<br />
The worldwide use of the electromagnetic spectrum is regulated by the International<br />
Telecommunication Union (ITU). The ITU sets out the global radio<br />
regulations in the form of a global Frequency Allocation Table (FAT) from which<br />
each nation defines its own FAT covering many aspects of radio regulation, such<br />
as the generic type of radio service that is permitted within each frequency b<strong>and</strong><br />
<strong>and</strong> whether the b<strong>and</strong> is allocated for military, civil or shared use. In what follows,<br />
existing non-cognitive military spectrum management procedures are summarized<br />
for coalition operations as defined in ACP 190(C) [2]. ACP 190(C) defines three<br />
main phases to each operation: Planning, Deployment (also known as Implementation)<br />
<strong>and</strong> Recovery. The description provided is structured according to these<br />
three phases involving the elements introduced in Figure 1.
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
137<br />
Combined Task<br />
Force Comm<strong>and</strong>er<br />
(CTFC)<br />
Host Nation<br />
Administration<br />
Combined Spectrum<br />
Management Cell<br />
(CSMC)<br />
Component Spectrum<br />
Manager (CSM)<br />
Lead Nation<br />
National Spectrum<br />
Manager<br />
National Spectrum<br />
Manager<br />
National Spectrum<br />
Manager<br />
National<br />
Element<br />
- Networks<br />
- Radios<br />
National<br />
Element<br />
- Networks<br />
- Radios<br />
National<br />
Element<br />
- Networks<br />
- Radios<br />
Figure 1. Elements of a coalition deployment <strong>and</strong> their relationships<br />
A. Planning phase<br />
The primary purpose of the planning phase is to produce the Battlespace<br />
Spectrum Management Plan (BSMP). The BSMP is used to inform the coalition<br />
force entities of issues relating to the management <strong>and</strong> planned usage of the spectrum<br />
during the operation by providing a mapping between all radio <strong>and</strong> network<br />
systems <strong>and</strong> frequencies.<br />
In the planning phase, the Combined Task Force Comm<strong>and</strong>er (CTFC) assumes<br />
overall comm<strong>and</strong> of the forthcoming operation as part of a m<strong>and</strong>ate from<br />
a higher authority specifying the conditions under which the coalition force will<br />
operate. The CTFC establishes a Combined Spectrum Management Cell (CSMC)<br />
responsible for coordinating the spectrum requirement of the force, acquiring<br />
the necessary spectrum <strong>and</strong> assigning frequencies for the systems used by the forces<br />
within the operational area. The CSMC will normally delegate the authority to manage<br />
frequency allotments to one or more Component Spectrum Managers (CSMs),<br />
where maritime, l<strong>and</strong>, air, logistics <strong>and</strong> special forces are typical components. Each<br />
component may be composed of multiple National Elements (NEs).<br />
When a coalition is formed, a single nation is given the responsibility to act<br />
as the Lead Nation. The Lead Nation is responsible for providing <strong>and</strong> sustaining<br />
frequencies for the force through the spectrum management process <strong>and</strong> providing<br />
technical support to the CSMC. Each nation within the coalition force is obliged to<br />
set up its own spectrum management cell with a National Spectrum Manager (NSM)<br />
to coordinate spectrum processes for its national forces. Each NSM will identify<br />
all radio equipment to be deployed by the NEs, including equipment parameters
138 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
<strong>and</strong> operational (geographical) areas, <strong>and</strong> provide this information to the CSMC.<br />
The CSMC combines the spectrum requirements, operational areas <strong>and</strong> radio<br />
equipment characteristics provided by the individual NSMs into the Electronic<br />
Order of Battle (EOB). The EOB expresses the overall spectrum requirement for<br />
the operation.<br />
Depending on the tools available to the CSMC, it should be possible to model<br />
the overall spectrum requirement for the operation that is detailed in the EOB (i.e.<br />
frequency planning). This modeling activity makes use of the topographical data<br />
associated with the operational area to identify where frequency re-use is possible.<br />
It also takes into account any equipment frequency constraints, frequency hopping<br />
systems, airborne emitters, preferred frequency allotments <strong>and</strong> any protected<br />
frequencies. The CSMC uses the output of the modeling activity <strong>and</strong> the EOB to<br />
acquire the necessary spectrum to satisfy the operation requirement. Depending<br />
on whether or not the operation is conducted with the support of the host nation,<br />
the CSMC either establishes contact with the host nation spectrum administrators<br />
<strong>and</strong> submits a frequency request detailing the spectrum requirements or uses<br />
electronic surveillance to select the most favorable spectrum without regard for<br />
existing local users.<br />
When the available spectrum has either been allocated by the host nation or<br />
identified through observation, the CSMC (<strong>and</strong> CSMs) will produce the frequency<br />
assignment tables for all radio equipment associated with the coalition force <strong>and</strong><br />
incorporate them into the BSMP. These tables include any constraints on the use<br />
the frequencies including transmit power, antenna height <strong>and</strong> location.<br />
B. Deployment phase<br />
In the deployment phase, each NE implements the BSMP as received from<br />
the CSMC via their CSM prior to deployment. Interference may be encountered at<br />
any time due to host nation emitters, conflicting allied systems or enemy jamming.<br />
Each NE is responsible for investigating the interference that is encountered to try to<br />
determine the source <strong>and</strong>, if the source is local, endeavor to reduce the interference<br />
or eliminate it using appropriate action. If local action is impractical or unsuccessful,<br />
the interference <strong>and</strong> resultant loss of capability is reported to the CSM using<br />
a specified interference report format <strong>and</strong> procedure. Each CSM is responsible for<br />
the real-time control <strong>and</strong> management of the spectrum within its area of operation<br />
(i.e. the spectrum used by its NEs). The CSM responsibilities include the resolution<br />
of any frequency conflicts between its NEs <strong>and</strong> other interference issues by making<br />
appropriate frequency assignment changes or modifying allotments if other efforts<br />
to alleviate the interference are ineffective. The CSM will send any spectrum changes<br />
to the appropriate NEs where they are implemented.<br />
Whilst the CSMC may delegate responsibility for real-time spectrum management<br />
to the CSMs, it retains overall control <strong>and</strong> will become involved where
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
139<br />
coordination between components is required. The CSMC’s responsibilities include<br />
maintaining a close relationship with the host nation so that all interference reports<br />
associated with host nation emitters that are received from CSMs are sent to<br />
the host nation administration to be resolved. The CSMC will also act to resolve<br />
spectrum conflicts between components <strong>and</strong> other interference issues by making<br />
appropriate frequency assignment changes or modifying allotments if other efforts<br />
to alleviate the interference are ineffective.<br />
C. Recovery phase<br />
The recovery phase is a period of transition where each individual NE is responsible<br />
for informing the CSM of the time <strong>and</strong> date when the element will stop<br />
using their frequency assignments <strong>and</strong> h<strong>and</strong>ing back frequencies to the CSM for<br />
reassignment to another unit. Each CSM is responsible for reviewing <strong>and</strong> consolidating<br />
the spectrum in use by the force component, identifying any NE changes<br />
that need to be incorporated into a new BSMP. The CSMC is responsible for reviewing<br />
<strong>and</strong> consolidating the spectrum in use by the force as a whole, incorporate<br />
any changes into a new BSMP to meet the requirements of the new force which<br />
is passed on to an incoming force or the (newly established) civil administration.<br />
III. Key challenges for the introduction of DSM in military<br />
tactical environments<br />
The previous section shows that today’s military spectrum management procedures<br />
are, in the main, centralized <strong>and</strong> static. For example, the frequency b<strong>and</strong>s<br />
allocated for military use within the relevant FAT are typically not modified on<br />
a regular basis. The frequency planning procedures that are applied within these<br />
military b<strong>and</strong>s are also performed to meet the particular operational requirements<br />
of an operation including factors such as size, scope <strong>and</strong> composition of the deployed<br />
force. To a large extent, frequency management activities are typically performed<br />
prior to the operation in the planning phase <strong>and</strong> are often time consuming <strong>and</strong><br />
complex especially for large coalition operations. Hence, once the assignments are<br />
made, they are generally fixed for the duration of the operation. Cognitive radio<br />
<strong>and</strong> DSM technologies offer the potential to significantly enhance the operational<br />
effectiveness <strong>and</strong> management of military tactical radio communications.<br />
However, these new technologies are relatively complex <strong>and</strong> represent a paradigm<br />
shift in capability <strong>and</strong> operational procedure for military spectrum managers<br />
<strong>and</strong> end-users. Several hurdles must be overcome if cognitive radio technology is to<br />
be adopted by the military as the technology is currently not in use even though more<br />
than a decade has passed since its inception. Firstly, as with any novel technology,<br />
there is general mistrust in its capability <strong>and</strong> military users tend to be conservative<br />
<strong>and</strong> risk averse towards new <strong>and</strong> unproven technology. Secondly, if the cognitive
140 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
radio concept is adopted, it will be introduced into service in a gradual fashion<br />
where CRs must be able to safely coexist with existing legacy radio equipment <strong>and</strong><br />
existing procedures for the foreseeable future. These issues call for a carefully managed<br />
<strong>and</strong> incremental introduction of CR technology over time.<br />
Summarizing, the extension of current spectrum management procedures<br />
requires that:<br />
• DSM is introduced in a step-wise fashion gradually increasing military users’<br />
experience with <strong>and</strong> underst<strong>and</strong>ing of CR technology <strong>and</strong> equipment,<br />
<strong>and</strong> where<br />
• DSM procedures co-exist with legacy equipment <strong>and</strong> current spectrum<br />
management procedures taking on a gradually increasing role as more CR<br />
technology is coming into service.<br />
Following these two principles, the introduction of CR <strong>and</strong> DSM in military<br />
tactical radio communication should be regarded as a evolution <strong>and</strong> not<br />
a revolution enabling a more flexible <strong>and</strong> efficient use of the spectrum in future<br />
military operations, <strong>and</strong> to ease the burden of the pre-mission frequency planning<br />
procedures.<br />
IV. A relastic roadmap for the introduction of dynamic<br />
spectrum management<br />
This section proposes a realistic DSM roadmap that identifies how cognitive<br />
radio technology may be introduced into the military communications<br />
domain in discrete steps although no specific timeframe is proposed. This DSM<br />
roadmap starts from the present day, with no cognitive radios, <strong>and</strong> with each increment<br />
takes a step further into the future with an increasing exposure to DSM<br />
in terms of number of devices, spectrum access complexity <strong>and</strong> freedom in operating<br />
spectrum. The DSM roadmap is designed such that military users may develop trust<br />
in <strong>and</strong> experience with the technology in an incremental fashion, <strong>and</strong> limit risk to<br />
existing operational capabilities.<br />
A. The first step – a dedicated b<strong>and</strong> for CR systems<br />
As mentioned previously, it is imperative that this first step involves minimal<br />
risk to existing legacy operations <strong>and</strong> allows military end-users the opportunity to<br />
build trust in <strong>and</strong> evaluate CR technology. We propose the introduction of a b<strong>and</strong><br />
exclusively dedicated to CRs within the military allocation. All cognitive devices<br />
would operate within this b<strong>and</strong> <strong>and</strong> all existing legacy systems would operate outside<br />
this dedicated b<strong>and</strong> that is governed by current spectrum management procedures.<br />
Initially, we would expect only a limited number of CRs within a coalition force <strong>and</strong><br />
the b<strong>and</strong>width requirement for this CR-only b<strong>and</strong> would be small in comparison<br />
to that required to support the legacy systems of the coalition.
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
141<br />
Civilian<br />
B<strong>and</strong>s<br />
<strong>Military</strong><br />
B<strong>and</strong>s<br />
Today's spectrum<br />
management procedures<br />
Step 1: A dedicated b<strong>and</strong><br />
for CR cystems<br />
Step 2: Opportunistic military<br />
use of limited civilian b<strong>and</strong>s<br />
Time<br />
<strong>Military</strong> b<strong>and</strong>s<br />
(legacy radio only)<br />
Civilian b<strong>and</strong>s<br />
(no military users)<br />
CR as secondary users<br />
(military b<strong>and</strong>s)<br />
Step 3: Coexistence of CR<br />
with military legacy systems<br />
in military b<strong>and</strong>s<br />
Step 4: Flexible use of military<br />
b<strong>and</strong>s <strong>and</strong> wide scale opportunistic<br />
use of civilian b<strong>and</strong>s<br />
Dedicated CRonly<br />
b<strong>and</strong><br />
CR as secondary users<br />
(civilian b<strong>and</strong>s)<br />
Mostly CR (military<br />
b<strong>and</strong>s, flexible use)<br />
1) General considerations<br />
Figure 2. DSM roadmap representation<br />
We propose that the CR-only b<strong>and</strong> would be managed under a managed<br />
commons DSA model 1 where all CR users would be considered equal <strong>and</strong> no<br />
traditional spectrum management procedures, such as channel assignment, would<br />
be required leading to a reduced pre-operation preparation time. Separate CRNs 2<br />
would be able to coexist within the same b<strong>and</strong> by autonomously <strong>and</strong> cooperatively<br />
or non-cooperatively selecting different operating channels within the b<strong>and</strong><br />
(i.e. channels with the least interference). In the managed commons model case,<br />
all CR users/networks share spectrum using an agreed management protocol<br />
that encapsulates technology agnostic spectrum access rules. This CR-only b<strong>and</strong><br />
may be utilized by military users at all levels of the military hierarchy. However,<br />
it may be best to initially target the technology at the lower priority echelons <strong>and</strong><br />
for particular applications (see below). If CRs demonstrate success at this lower<br />
level, they are more likely to gain acceptance <strong>and</strong> be more widely adopted across<br />
all layers of the military hierarchy.<br />
1<br />
2<br />
A DSA model is here used as classification of a high-level Dynamic Spectrum Access (DSA) technique following<br />
the terms introduced in [3]-[5].<br />
A CRN is a network where a number of cognitive radios interoperate.
142 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
The choice of a dedicated b<strong>and</strong> for CR systems as a first step in the road-map<br />
has some important advantages.<br />
a) No risk for interference with legacy systems<br />
<strong>Military</strong> end-users are generally conservative <strong>and</strong> risk averse. The use of a cognitive<br />
system in a shared-use spectrum access mode that could degrade a legacy<br />
communication system would not be acceptable. The use of a dedicated b<strong>and</strong> for<br />
cognitive systems eliminates this risk.<br />
b) Relaxation of system requirements<br />
From a technical point of view, a dedicated b<strong>and</strong> based on the managed commons<br />
model will relax system requirements for CR systems. The primary reason for<br />
this statement is that the cognitive b<strong>and</strong> will lack primary users, placing less severe<br />
constraints on CR sensing <strong>and</strong> decision making functions to gather <strong>and</strong> process<br />
spectrum information to adapt its behavior. Cognitive systems would thus only<br />
need to address interference from other cognitive systems <strong>and</strong> jammers, which<br />
can be expected to be less time-critical compared to more challenging channel<br />
evacuation requirements.<br />
c) Familiarity<br />
The concept of a license free b<strong>and</strong> such as the current 2.4 GHz ISM b<strong>and</strong>,<br />
is not new for most military end-users <strong>and</strong> the introduction of a license free military<br />
b<strong>and</strong> for CR is likely to be regarded not as a revolution, but as a case where military<br />
procedures catch up to the less restrictive procedures used in the civilian world.<br />
d) Compatibility with current NATO spectrum management procedures<br />
In NATO, the civil/military spectrum Capability Panel 3 (CAP3) is responsible<br />
for the harmonization of radio frequency use among NATO allies. CAP3 is placed<br />
under the new C3B sub-structure (Consultation, Comm<strong>and</strong> <strong>and</strong> Control Board).<br />
The military part of the CAP3 panel manages the harmonized military spectrum<br />
by allocating b<strong>and</strong>s to applications or services, such as wide-b<strong>and</strong> l<strong>and</strong> systems or<br />
satellite broadcast services. As such, the proposed first step would be compatible<br />
with established administrative spectrum management procedures where CAP3<br />
would allocate one or multiple b<strong>and</strong>s exclusively for CR systems. However, NATO<br />
currently considers CR as a technology rather than as a service or application.<br />
CAP3 has therefore refrained from making the proposed allocation necessitating<br />
further negotiations <strong>and</strong> lobbying to overcome this hurdle.<br />
e) Incentives for research <strong>and</strong> development<br />
One of the main obstacles in the technological development of military CR<br />
is the deadlock created by the general lack of confidence in the technology. As long<br />
as there is no clear sign from the military end-user showing an interest in the tech-
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
143<br />
nology <strong>and</strong> thus establishing a potential market, the military communications<br />
industry will be hesitant to invest in the development of military CR systems. On<br />
the other h<strong>and</strong>, as long as there are no military off-the-shelf CR products, which<br />
can prove the concept <strong>and</strong> clearly demonstrate key CR benefits, the military enduser<br />
will remain skeptical towards the technology. The creation of a dedicated<br />
b<strong>and</strong> for CR systems can end this deadlock <strong>and</strong> be an incentive for the industry to<br />
start investing <strong>and</strong> developing products, comparable to what happened in the civil<br />
2.4 GHz ISM b<strong>and</strong>.<br />
f) Extensibility<br />
As mentioned previously, an important motivation for this first step is gaining<br />
trust. Once the concept of CR proves to work in this dedicated b<strong>and</strong>, the b<strong>and</strong><br />
can be easily extended <strong>and</strong> integrate more complex spectrum access models with<br />
civilian <strong>and</strong>/or military primary users.<br />
In summary, in light of the advantages described above, the introduction <strong>and</strong><br />
use of a dedicated b<strong>and</strong> for CR is by far the most appropriate first step in the roadmap<br />
towards the introduction of cognitive radio in the military. If this first step<br />
proves to be successful, the following steps can be implemented to overcome<br />
spectrum scarcity <strong>and</strong> alleviate current deployment burdens.<br />
2) Spectrum suitability, rules <strong>and</strong> limitations<br />
Spectrum is a scarce resource, both civilian <strong>and</strong> military, <strong>and</strong> the introduction<br />
of a CR-only b<strong>and</strong> will require sacrifices. In our opinion, the most<br />
suitable option is to define multiple smaller b<strong>and</strong>s within different spectrum<br />
regions <strong>and</strong> use them as dedicated CR-b<strong>and</strong>s. It is obvious that the NATOharmonized<br />
b<strong>and</strong>s are the most appropriate. From a technical point of view,<br />
<strong>and</strong> taking into account the possible applications, we think that at least a b<strong>and</strong><br />
of 5 to 10 MHz should be defined in the NATO harmonized UHF b<strong>and</strong> I<br />
(225-400 MHz). Other possible c<strong>and</strong>idate frequency b<strong>and</strong>s are the military UHF b<strong>and</strong> II<br />
(790-960 MHz), the military UHF b<strong>and</strong> III (1350-2690 MHz) <strong>and</strong> the SHF b<strong>and</strong><br />
(4400-5000 MHz), where cognitive systems for short range wireless networks<br />
could be envisaged.<br />
An in-depth study of the rules <strong>and</strong> limitations for the use of this dedicated<br />
b<strong>and</strong> for CR systems is out of the scope of the paper. We will therefore only comment<br />
on three aspects of such rules <strong>and</strong> limitations:<br />
• The types of applications that are allowed <strong>and</strong> are forbidden to use this<br />
b<strong>and</strong> together should be defined. Some example of systems that could be<br />
allowed are wideb<strong>and</strong> l<strong>and</strong> systems, line-of-sight microwave links <strong>and</strong> tactical<br />
wireless local area networks whereas pulsed systems like surveillance<br />
radars <strong>and</strong> broadcast stations are likely to be excluded.<br />
• The technical elements of a set of restrictions need to be studied <strong>and</strong><br />
st<strong>and</strong>ardized in a future STANAG. Some possible restrictions are the use
144 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
of a spectrum mask, a radiated power bound per application <strong>and</strong> the duty<br />
cycle of the systems.<br />
• The need for a pre-defined channelization in the dedicated b<strong>and</strong> should<br />
also be studied <strong>and</strong> if necessary the choice of the channel b<strong>and</strong>width.<br />
B. The second step – opportunistic military use of limited civilian b<strong>and</strong>s<br />
A long-term driving factor is the increasing pressure felt by governments <strong>and</strong><br />
regulatory authorities to reallocate spectrum traditionally reserved for military<br />
use to support civilian wireless services. In the event that spectrum allocated for<br />
military operations diminishes on this basis, allowing the military to operate in civilian<br />
b<strong>and</strong>s as non-interfering secondary users offers a way to increase the total<br />
military spectrum pool. 3<br />
In this second step, we propose to extend the military CR footprint by allowing<br />
military CR systems to operate as secondary users within limited civilian b<strong>and</strong>s<br />
(taking advantage of white spaces in time <strong>and</strong> space). The terrestrial television<br />
<strong>and</strong> radio UHF/VHF b<strong>and</strong>s are likely first c<strong>and</strong>idates due to the ideal propagation<br />
characteristics for tactical radio systems, the relatively stable channel availability<br />
<strong>and</strong> the maturity of the commercial IEEE 802.22 st<strong>and</strong>ard which may be leveraged<br />
for military implementations.<br />
Within these television <strong>and</strong> radio b<strong>and</strong>s, the military CR systems would operate<br />
on a non-interfering secondary user basis under a spectrum overlay model.<br />
<strong>Military</strong> CRNs may or may not cooperate with each other <strong>and</strong>/or with the primary<br />
civilian users regarding spectrum access. As noted in step 1, the necessary avoidance<br />
of primary user transmissions under the overlay model represents an additional complexity<br />
over <strong>and</strong> above operations under a managed commons model (as in step 1).<br />
From a military perspective, a significant advantage of this step in the DSM roadmap<br />
is that whilst the military users will have acquired more operating spectrum, no interference<br />
risk is introduced for existing military operations using legacy systems. 4<br />
<strong>Military</strong> CRs would be operating within both the dedicated CR-only b<strong>and</strong> (as peers)<br />
<strong>and</strong> within limited civilian b<strong>and</strong>s (as secondary users). All legacy systems would<br />
be operating in remaining military allocations as today. This isolation in frequency<br />
maintains the CR <strong>and</strong> legacy system coexistence assurance provided in step 1. This<br />
step also allows military users to evaluate the more complex overlay spectrum access<br />
technique with no additional risk to military legacy operations.<br />
3<br />
4<br />
Here it is assumed that the military agree to be subservient to civil users (i.e. act as secondary users). This<br />
may be the case in training or humanitarian relief operations. In more aggressive operations (such as Defense<br />
of National Territory), military forces are unlikely to operate under this premise. They will more likely secure<br />
spectrum on an exclusive-use basis either through negotiation with the host nation or by force.<br />
There may be an interference risk to civilian primary users. Of course, the level of acceptability of risk depends<br />
on the importance of civilian services being supported in the specific b<strong>and</strong> <strong>and</strong> the context of the military<br />
operation. The risk may be deemed acceptable for TV <strong>and</strong> broadcast radio b<strong>and</strong>s but not so for civilian<br />
air traffic control b<strong>and</strong>s.
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
145<br />
C. The third step – coexistence of CR with military legacy systems<br />
in military b<strong>and</strong>s<br />
In this third step we propose to build on the experience developed in the second<br />
step where military CRs were allowed to operate as secondary users within limited<br />
civilian b<strong>and</strong>s. We propose that military CR systems would also be allowed to coexist<br />
with legacy systems in limited military b<strong>and</strong>s. The legacy systems would be<br />
designated as primary users. The CRs would operate on a non-interfering secondary<br />
user basis. This will allow military CR systems to take advantage of white spaces<br />
in time <strong>and</strong> space left fallow by military legacy systems.<br />
The proposed third step differs from the previous two steps in the proposed<br />
DSM roadmap in that CRs would be allowed to coexist in the same spectrum<br />
as legacy systems <strong>and</strong> thus represents the first step where there is an increase in risk<br />
of interference by CRs to existing military operations. However, with the experience<br />
of the previous steps in the roadmap <strong>and</strong> only allowing a limited spectrum<br />
overlap (between military legacy <strong>and</strong> CR systems), this risk may be easily managed.<br />
D. The fourth step – flexible use of military b<strong>and</strong>s <strong>and</strong> wide scale<br />
opportunistic use of civil b<strong>and</strong>s 5<br />
The previous steps have identified how CR <strong>and</strong> DSM technology may be<br />
evaluated <strong>and</strong> implemented in an incremental process. A fundamental component<br />
of these steps is the coexistence with existing civilian <strong>and</strong> military legacy systems<br />
as described in steps 2 <strong>and</strong> 3, respectively. For this final step we assume that most<br />
military legacy systems have been retired from service <strong>and</strong> that cognitive radios are<br />
the norm (i.e. a far future setting). 6 We also assume that military acquisition agencies<br />
<strong>and</strong> end-users have accepted, <strong>and</strong> are comfortable with, the new technology.<br />
These assumptions enable the exciting possibility for a significantly more flexible<br />
<strong>and</strong> effective use of spectrum within the military domain.<br />
In this final step we propose that military spectrum will be managed under<br />
a highly flexible <strong>and</strong> dynamically variable combination of the uncontrolled commons,<br />
managed commons, dynamic exclusive-use <strong>and</strong> overlay DSA model types<br />
controlled using DSM policies. We also propose the continual <strong>and</strong> extensive use<br />
of civil spectrum b<strong>and</strong>s on a secondary use basis. A CRN will be provided DSM<br />
policies which identify where in spectrum it will be allowed to operate <strong>and</strong> the associated<br />
operating conditions, which it must adhere to. Such allocations may include<br />
multiple b<strong>and</strong>s each managed under a different DSA model type. The DSM strategy<br />
implemented by the CRN management system will autonomously determine<br />
5<br />
6<br />
The first three steps may not be accompanied by the proposed fourth step as it is entirely possible that<br />
the third step is sufficient to overcome challenges with spectrum scarcity <strong>and</strong> deployment difficulty.<br />
Some portions of the spectrum may always need to be reserved for fixed frequency operations (e.g. GPS <strong>and</strong><br />
some safety critical applications) <strong>and</strong> for any remaining legacy radios. However, this may still be managed<br />
under the new DSM paradigm with the exclusive-use DSA model type.
146 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
the most favorable operating location within the allowed spectrum given the local<br />
time-variable environmental conditions.<br />
CRNs operating within b<strong>and</strong>s designated under either of the commons types<br />
or the overlay model type (as secondary users) will not require complex traditional<br />
frequency planning <strong>and</strong> should realize more efficient <strong>and</strong> effective use of the spectrum.<br />
However, systems operating under these conditions will not benefit from<br />
the preferential (<strong>and</strong> often sole) spectrum access rights enjoyed under existing<br />
military processes, which may have a detrimental impact on existing levels of quality<br />
of service (QoS) that need to be managed by planning efforts as well as more dynamic<br />
cognitive monitoring <strong>and</strong> control loops to better reflect the needs of an ongoing<br />
operation. These future spectrum management procedures are clarified in the following<br />
section.<br />
V. Future dynamic spectrum management procedures<br />
in the military tactical domain<br />
The introduction of CR technology <strong>and</strong> DSM will involve the modification<br />
of existing military spectrum management practices. It is anticipated that these<br />
changes will simplify <strong>and</strong> shorten the spectrum planning activity required prior to<br />
an operation. This section addresses these procedural changes using the same three<br />
phases of operation as in the current procedure with an emphasis on the planning<br />
phase. 7<br />
A. The DSM planning phase<br />
In a CRN future, CRs <strong>and</strong> CRNs will not, in general, need to be assigned<br />
specific operating frequencies. CRs will instead be allowed to dynamically <strong>and</strong><br />
autonomously select the best available operating spectrum within specific b<strong>and</strong>s<br />
according to certain rules. This means that future DSM planning processes will<br />
change from current spectrum management procedures as described in the following<br />
starting with an overview followed by a detailed example.<br />
1) Overview of DSM planning considerations<br />
CRs will not, in general, be assigned specific operating frequencies which<br />
is fundamental difference from current spectrum planning that result in the compilation<br />
of the BSMP that includes the (static) frequency assignments for all radio <strong>and</strong><br />
network equipment. CRs will instead be allowed to dynamically <strong>and</strong> autonomously<br />
select the best available operating frequency channel within specific b<strong>and</strong>s accord-<br />
7<br />
In the proposed roadmap, CR systems <strong>and</strong> legacy radio systems may coexist. It is proposed that legacy radio<br />
systems will continue to be managed using the principles described in section 2 whereas future CR systems<br />
managed as described in this section. The overall management procedure will therefore be a blend between<br />
static <strong>and</strong> dynamic processes.
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
147<br />
ing to certain rules formalized by the DSM policies. 8 This means that the contents<br />
of the BSMP will fundamentally change in the future <strong>and</strong> include DSM polices<br />
rather than today’s mapping between all radio <strong>and</strong> network systems to frequencies.<br />
The EOB can also be expected to undergo changes making DSM policy generation,<br />
refinement <strong>and</strong> distribution the key activities to be undertaken during planning<br />
phase of future operations.<br />
A future DSM hierarchy would in the planning phase define <strong>and</strong> refine the DSM<br />
policies for the underlying CRNs in preparation for deployment. Each decision<br />
making entity in the hierarchy is expected to use a computer-based DSM policy<br />
generation <strong>and</strong> management tool for this purpose. The host nation administration<br />
will define the highest level DSM policies. These mainly specify the frequency<br />
allocations <strong>and</strong> conditions of their use, which may be used by the CR systems<br />
of the coalition force in the forthcoming operation. These DSM policies may be<br />
updated <strong>and</strong> refined by each lower layer in the SM hierarchy prior to being downloaded<br />
into the policy repositories in the individual CRN management. DSM policy<br />
refinements made by the individual NESMs <strong>and</strong> CSMs are reported back up the SM<br />
hierarchy to the CSMC. These feedback paths ensure that the CSMC is completely<br />
aware of how the spectrum will be utilized during the mission. The CSMC would<br />
here not be permitted to change the DSA model type of a b<strong>and</strong> unless the b<strong>and</strong><br />
has been allocated to it by the host nation on an exclusive-use basis. This is true<br />
for all decision making entities in the SM hierarchy, which must respect the DSA<br />
model decisions made by the hierarchical level immediately above it.<br />
The CSMC will update the DSM policies provided to it by the host nation to<br />
reflect the decisions made. Where host nation allocations are split into sub-b<strong>and</strong>s,<br />
the DSM policy associated with each sub-b<strong>and</strong> inherits the access conditions<br />
of the parent allocation, together with any additional or replacement conditions<br />
specified by the CSMC. The relevant DSM policies are then distributed to the CSMs.<br />
Note that the particular decisions made by the CSMC depend on the requirements<br />
of the individual national elements supplied to it by the NSMs.<br />
2) A DSM planning example<br />
As an example to illustrate the DSM planning phase, we consider a military<br />
operation involving two battle groups, BG A <strong>and</strong> BG B, from two different nations.<br />
The host nation administration provides the military force with two frequency<br />
b<strong>and</strong>s, one in the VHF b<strong>and</strong> from 47-50 MHz <strong>and</strong> one in the UHF I b<strong>and</strong> from<br />
318-328 MHz, both on an exclusive use basis. The administration also allows the military<br />
force to make use of the civilian terrestrial television b<strong>and</strong> (470-830 MHz) on<br />
a secondary use basis. Figure 3 illustrates the allocations defined by the spectrum<br />
management hierarchy (line 1).<br />
8<br />
DSM policies are here used as a mechanism to guide, control <strong>and</strong> bound the autonomous behavior of CRs.
148 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
The CSMC decides how the host nation allocation should be used by the military<br />
force on a high level (line 2 in Figure 3). Whilst the focus here is for the BG A operation,<br />
the CSMC must also consider the spectrum needs for BG B, that is operating<br />
in another region of the same area of responsibility.<br />
47<br />
MHz<br />
VHF<br />
50<br />
MHz<br />
318<br />
MHz<br />
UHF I<br />
328<br />
MHz<br />
470<br />
MHz<br />
UHF II<br />
830<br />
MHz<br />
1<br />
Host Nation<br />
<strong>Military</strong> Use<br />
<strong>Military</strong> Use<br />
Terrestrial TV<br />
2<br />
CSMC<br />
Terrestrial TV<br />
3<br />
NESM A<br />
Terrestrial TV<br />
Company Waveforms<br />
Coalition Waveform<br />
B<strong>and</strong> Allocation Key<br />
Dynamic<br />
Exclusive Use<br />
Civil Overlay<br />
(<strong>Military</strong> as SU)<br />
Uncontrolled<br />
Commons<br />
<strong>Military</strong> Overlay<br />
(PU)<br />
<strong>Military</strong> Overlay<br />
(SU)<br />
Figure 3. Spectrum plan as output from DSM planning processes at different levels in the spectrum<br />
management hierarchy. Primary <strong>and</strong> secondary users are designated as PU <strong>and</strong> SU, respectively<br />
The CSMC assigns primary status to NESM A for BG A communications<br />
for the 48-49 MHz <strong>and</strong> 318-320.5 MHz b<strong>and</strong>s. These preferential assignments are<br />
intended for the higher priority waveforms associated with BG A. The CSMC also<br />
assigns primary status to NESM B for BG B communications for the 49-50 MHz<br />
<strong>and</strong> 320.5-323 MHz b<strong>and</strong>s. We assume that a coalition waveform is used for communication<br />
between elements in the two battle groups does not support DSM<br />
<strong>and</strong> is assigned exclusive-use access for the 47-48 MHz b<strong>and</strong>. The CSMC assigns<br />
the 323-328 MHz VHF b<strong>and</strong> as uncontrolled commons spectrum to be shared by<br />
all BG A <strong>and</strong> BG B cognitive systems (intended for squad or platoon level waveforms).<br />
The terrestrial television b<strong>and</strong> is assigned to be used equally by all systems<br />
in the military force on a secondary basis.<br />
Line 3 in Figure 3 illustrates the planning decisions made by NESM A as the next<br />
level below the CSMC in the SM hierarchy (the decisions made by NESM B are<br />
not shown as they are of no further interest in this example). NESM A decides that<br />
it has three different company waveforms that are high priority <strong>and</strong> are thus given<br />
primary status in separate b<strong>and</strong>s as shown. Underlying squad <strong>and</strong> platoon level<br />
waveforms are not provided dedicated allocations – they are required to find their<br />
own operating spectrum.<br />
B. The DSM deployment phase<br />
At the beginning of the deployment phase, all CRs should have downloaded<br />
the appropriate DSM policies <strong>and</strong> be able to initiate communication activities<br />
within their possible allocations, under the specific conditions defined in the planning<br />
process. During deployment all CRNs will regularly send performance <strong>and</strong>
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
149<br />
spectrum status reports back up to the relevant NESM provided resources are allocated<br />
for this purpose. The NESMs will send aggregate status reports to the relevant<br />
CSM, status reports that are further aggregated to the CSMC. These status reports<br />
allow spectrum managers at all levels of the SM hierarchy to continuously evaluate<br />
spectrum usage <strong>and</strong> network performance within their allocations throughout<br />
an operation. Spectrum managers at all levels will have the ability to update <strong>and</strong><br />
disseminate DSM policies at any time to ensure the coalition force communication<br />
needs are continuously met.<br />
Each CRN will be responsible for dynamically <strong>and</strong> autonomously selecting<br />
the best available operating frequency within its specific allocations defined by<br />
the active DSM policies <strong>and</strong> be transparent to the end-user. With this capability,<br />
many interference issues may be h<strong>and</strong>led directly by the CRNs themselves through<br />
the execution of the selected DSM strategy <strong>and</strong> spectrum mobility, with no involvement<br />
of any spectrum management personnel. Each NESM, in conjunction with<br />
a network manager, will be responsible for monitoring the status reports provided<br />
by their CRN management systems. During deployment, an NESM may make act<br />
to optimize the performance of the underlying CRNs by updating the active DSM<br />
policies associated with any allocations provided to it on an exclusive-use basis<br />
by the relevant CSM.<br />
C. The DSM recovery phase<br />
During the recovery phase, spectrum managers at all levels of the SM hierarchy<br />
will be responsible for reporting to their immediate superior manager that their<br />
units no longer require their spectrum allocations. The associated DSM polices<br />
may be modified to better reflect the needs of the remainder of the coalition force.<br />
The CSMC will be responsible for consolidating the master DSM policy database<br />
such that it may be used by an incoming / replacement force.<br />
VI. Conclusions<br />
<strong>Military</strong> DSM is <strong>and</strong> requires a fundamental shift in capability <strong>and</strong> spectrum<br />
management procedures. This paper has attempted to clarify the need for an incremental<br />
approach for implementing DSM into the military domain. We have outlined<br />
a DSM roadmap for this purpose. Through this roadmap we have described how<br />
novel CR technology with non-cognitive legacy radio systems can co-exist over<br />
the transitionary period towards an all CR future. This roadmap has also addressed<br />
how military users may develop trust in, <strong>and</strong> experience with, this novel technology<br />
in manageable steps. The first step in this DSM roadmap involves the introduction<br />
of a military b<strong>and</strong> dedicated for CRs. It has been proposed that this b<strong>and</strong> is managed<br />
under the managed commons models using multiple smaller b<strong>and</strong>s within different<br />
NATO-harmonized spectrum regions.
150 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
We have also presented a high-level vision of how existing military spectrum<br />
management procedures will change in the future with the introduction of DSM<br />
using ACP 190(C) as a baseline reference. With the application of secondary use<br />
<strong>and</strong> uncontrolled use of spectrum, we foresee a significant reduction in the workload<br />
of spectrum management personnel. We have focused on both the important<br />
planning <strong>and</strong> deployment phases of military operations. The decisions made by<br />
the spectrum management entities, both before <strong>and</strong> during an operation, will<br />
principally revolve around dynamically creating, updating, activating, deactivating<br />
<strong>and</strong> deleting DSM policies.<br />
References<br />
[1] XG Working Group, The XG Vision Request for Comments, v. 2.0, available through<br />
http://www.ir.bbn.com/~ramanath/pdf/rfc_vision.pdf<br />
[2] Combined <strong>Communications</strong> <strong>and</strong> Electronics Board, Guide to Spectrum Management<br />
in <strong>Military</strong> Operations, ACP 190(C), september 2007, available through http://jcs.<br />
dtic.mil/j6/cceb/acps/acp190/ACP190C.pdf<br />
[3] M. Buddhikot, “Dynamic spectrum access: models, taxonomy <strong>and</strong> challenges”, IEEE<br />
International Symposium on New Frontiers in Dynamic Spectrum Access Networks,<br />
2007, pp. 649-663.<br />
[4] Q. Zhao, A. Swami, “A survey of dynamic spectrum access: signal processing <strong>and</strong><br />
networking perspectives”, Proceedings from the IEEE International Conference on<br />
Acoustics, Speech <strong>and</strong> Signal Processing, 2007, pp. 1349-1352.<br />
[5] Q. Zhao, B.M. Sadler, “A survey of dynamic spectrum access: signal processing,<br />
networking <strong>and</strong> regulatory policy”, IEEE Signal Processing Magazine, vol. 24, May 2007,<br />
pp. 79-89.
Dynamic Spectrum Management<br />
in Legacy <strong>Military</strong> Communication Systems<br />
Marek Suchański 1 , Paweł Kaniewski 1 , Robert Matyszkiel 1 ,<br />
Piotr Gajewski 2<br />
1 <strong>Military</strong> Communication Institute, Zegrze, Pol<strong>and</strong>,<br />
{m.suchanski, p.kaniewski, r.matyszkiel}@wil.waw.pl<br />
2 <strong>Military</strong> University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong><br />
piotr.gajewski@wat.edu.pl<br />
Abstract: Increasing dem<strong>and</strong>s are being placed on dynamic spectrum access as a result of overload<br />
of the frequency spectrum. In this paper we present a concept of frequency broker as a crucial element<br />
of coordinated spectrum management system for battlefield communication network.<br />
Critical problem in such system is automation of the collision-free frequency planning <strong>and</strong> management.<br />
In this paper, the solution of this problem basing on the graph theory is described. The new<br />
model of electromagnetic waves attenuation prediction is also presented.<br />
Keywords: dynamic spectrum management, frequency broker, radio wave attenuation, frequency<br />
assignment, frequency planning<br />
I. Introduction<br />
The rapid development of the technical systems that use wireless technologies<br />
causes increasing of the spectrum shortage problem. The devices that are “dependent”<br />
on the spectrum appear – apart from the classic uses such as e.g. radio broadcasting<br />
– also as more <strong>and</strong> more complex systems such as the cellular telephony, WLAN<br />
802.11, 802.16 (WiMAX) wireless networks, the GPS systems as well as simple<br />
radio-devices e.g. wireless telephones <strong>and</strong> devices for home RTV equipment control,<br />
garage gates control etc. The saturation of such type of devices grows causing overload<br />
of the frequency spectrum <strong>and</strong> thus increase of the level of interference. An illustration<br />
of this phenomenon can be a forecast of use of the spectrum fragment intended for<br />
broadb<strong>and</strong> mobile systems that has been constructed by the USA national regulator<br />
(FCC – Federal Communication Commission) that foresees occurrence of significant<br />
spectrum deficiency for these systems already in 2014 year (see Figure 1) [1].<br />
The work is supported by Polish Ministry of Science <strong>and</strong> Higher Education funds under the project<br />
No. OR 00018712.
152 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
The spectrum static management <strong>and</strong> methods that have been used so far,<br />
lead to drastically low effectiveness of spectrum usage. It was proved in many<br />
measurements that were made in various parts of the world [2]. It was found, on<br />
the basis of such experiments, that within the frequency below 3 GHz, an average<br />
level of the spectrum use does not exceed 10% [3].<br />
Such observations <strong>and</strong> experiments have caused growing of common awareness<br />
of a need of the spectrum use rationalization, among others, by application<br />
of more efficient management methods.<br />
Figure 1. Forecast of increasing use of spectrum intended for broadb<strong>and</strong> mobile systems<br />
That is why at the end of XX century appeared a concept of a dynamic access<br />
to the spectrum. The most advanced form of which is so called opportunistic access.<br />
This concept will find its embodiment in future solutions of the cognitive radio.<br />
A spectrum coordinated management system can be used to rationalize<br />
the spectrum efficiency of the communication systems that are built on the basis<br />
of currently operated radio equipment. In some cases to solve this problem, it is<br />
possible to use the frequency broker that operates in a quasi-real time. Such a possibility<br />
exists in the communication systems that are based on radio stations susceptible<br />
to radio data remote control. In polish army, VHF radio stations of the family<br />
of PR4G <strong>and</strong> HF type Harris RF-5800H have such possibilities.<br />
This article describes a concept of the spectrum coordinated management<br />
system in which the critical problem is to find an effective algorithm to provide<br />
<strong>and</strong> to modify the collision-free frequency plans. The presented below algorithm<br />
is based on the graph theory using a specific models to predict an electromagnetic<br />
waves attenuation of the path between a transmitter <strong>and</strong> a receiver.<br />
II. Frequency broker concept<br />
The main element of the spectrum coordinated management system is the frequency<br />
broker. The tasks of the frequency broker are generation <strong>and</strong> distribution
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
153<br />
of radio data for radio networks that are covered by such broker <strong>and</strong> that ensure<br />
a collision-free operation.<br />
To correctly generate the radio data that ensures a collision-free operation<br />
of the radio networks, the frequency broker must obtain the data that defines a set<br />
of accessible frequencies. Under Polish conditions the unit responsible for the frequency<br />
management in armed forces is the <strong>Military</strong> Office of Frequency Management<br />
– NARFA PL. To define the organizational structure of the radio communication<br />
system, the frequency broker should cooperate with automated comm<strong>and</strong><br />
systems from which it receives information about location <strong>and</strong> type of all radio<br />
equipment that is grouped in the radio network. Additionally, to currently verify<br />
the received frequency set, a close cooperation with the electronic warfare systems<br />
is recommended. Such cooperation enables an assessment of the electromagnetic<br />
environment real state in defined nodes of the radio communication system.<br />
Figure 2 shows a concept of the frequency broker usage that takes into account<br />
a hierarchic comm<strong>and</strong> system from an operational level to a subunit level.<br />
Figure 2. Concept of broker use in military forces<br />
Starting from the tactical level, the frequency broker is connected with the comm<strong>and</strong><br />
system section that is responsible for the communication (G6, J6). It exchanges<br />
data to execute frequency assessment procedures. The radio data from the broker<br />
is sent to a properly level of the radio networks that confirm their acceptance or<br />
generate dem<strong>and</strong> for spectrum resources in a reverse channel. The intermediate<br />
level broker is connected with a higher or lower level broker to distribute data<br />
about allocations of the spectrum resources to a lower level <strong>and</strong> data collection<br />
about electromagnetic situation in the area of the lower level broker responsibility.
154 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 3 shows a system diagram that takes into account structural connections<br />
between the NAFRA PL <strong>and</strong> local brokers <strong>and</strong> a block diagram of the frequency<br />
broker that illustrates its modular structure.<br />
The basic broker element is a planning module that enables generation of radio<br />
data on the basis of jamming measures <strong>and</strong> criteria defined earlier. The accepted<br />
measures <strong>and</strong> criteria of the jamming result directly from the radio equipment type<br />
that is used in the radio communication system. For correct assessment of a interfering<br />
signal <strong>and</strong> the level of a usable signal it is necessary to use reliable waves<br />
attenuation models <strong>and</strong> hence in the further part of the article is presented a radio<br />
waves attenuation model in an urban area (GUPL) complete with test results that<br />
verify this model.<br />
Figure 3. Broker architecture <strong>and</strong> its functional connections<br />
The collision-free radio plans is generated by broker taking into account a reliable<br />
waves attenuation model <strong>and</strong> some earlier defined data such as: a set of accessible<br />
frequencies, a structure of radio communication system, jamming measures<br />
<strong>and</strong> criteria, radio stations operating mode <strong>and</strong> parameters. To solve this problem<br />
an optimization method is used. An example of the greedy algorithm used in our<br />
broker is presented below.<br />
III. Concept of frequency planning<br />
The problem of frequency assignment, even in a simplest model is a NP-hard<br />
problem (it is a generalized problem of a graph colouring) <strong>and</strong> that is why a working<br />
out of a polynomial algorithm that finds an optimal solution is impossible at the present<br />
state of knowledge. The best known algorithms that bring optimal solutions<br />
of the NP-hard problems work in an exponential time what means that in practice<br />
they are suitably only to solve not too complex cases of very limited input data [5].
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
155<br />
The data sizes in practical use exceed considerably the ones suitable for solution<br />
in an exponential time <strong>and</strong> therefore the worked out algorithms should find<br />
a possibly best solution in the time assumed in advance what means a necessity<br />
of selection of one of suboptimal methods used in NP-hard problem solutions. Hence<br />
for the considered applications, the following types of algorithms can be helpful:<br />
• approximation <strong>and</strong> heuristic algorithms (e.g. a greedy algorithm);<br />
• branch & cut type algorithms that reduce the exponential complexity of indepth<br />
searching by suitably early elimination of ineffective searching paths;<br />
• artificial intelligence algorithms: genetic algorithms, ant colony algorithms,<br />
tabu search, simulated annealing.<br />
It seems that the simple <strong>and</strong> small time-consuming method to solve frequency<br />
assignment question is the greedy algorithm. The greedy algorithm executes always<br />
operation that is the most advantageous operation at a given moment. Thus, it selects<br />
a locally optimal solution expecting that it leads to a globally optimal solution.<br />
A separation matrix is an input element for the frequency assignment algorithm.<br />
The separation matrix elements determine a smallest possible distance expressed<br />
in the frequency field that ensures a collision-free operation of two radio networks.<br />
For co-site locations (the distance between two correspondents of two different<br />
radio networks is within 1,5-10 m), the radio station producers define<br />
separation as the percentages that determine the distance between the upper frequency<br />
of the lower b<strong>and</strong> <strong>and</strong> the lower frequency of the upper b<strong>and</strong> that ensures<br />
the networks compatibility.<br />
The formalized expression of such a state when two radio networks operating<br />
in the subb<strong>and</strong>s F min1 – F max1 <strong>and</strong> F min2 – F max2 (F min2 > F max1 ) do not interfere<br />
themselves has the form:<br />
B* F F F<br />
<br />
min 2 min 2 max1<br />
Where “B” is a coefficient of a co-site separation <strong>and</strong> in case of the above<br />
mentioned radio station of the PR4G family is 0,09.<br />
To determine the separation coefficients for other networks that are not cosite<br />
networks, it is assumed that the usable signal “S” reduced by the protection<br />
coefficient “O” must be greater than the interfering signal “Z”.<br />
SZO<br />
On the basis of literature <strong>and</strong> experimental tests the separation of 10 dB<br />
has been assumed.<br />
After correct construction of the separation matrix it is possible to approach<br />
frequency assignment for the defined radio networks. The input data for such<br />
an algorithm is:<br />
• a set of accessible frequencies for use in the frequency assignment process;<br />
• defined networks complete with the type of used radio stations (an operation<br />
frequency range, a transmitter power, a receiver selectivity characteristics);
156 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
• defined criteria of the co-site separation;<br />
• operation modes for particular radio networks (a FH frequency hopping<br />
mode, an operation mode at the DFF fixed frequency);<br />
• a defined protective coefficient;<br />
• a separation matrix;<br />
Moreover, if a given radio network is operating using of the FH mode, the minimum<br />
<strong>and</strong> maximum number of frequency subb<strong>and</strong>s should be defined for a given<br />
radio network as well as hops in the defined frequency subb<strong>and</strong>.<br />
Figure 4. Algorithm frequency assignment used in frequency broker<br />
Figure 4 presents a functional diagram of the frequencies assignment algorithm<br />
that uses the greedy algorithm. The defined structure of the radio communication<br />
system can be treated as a full graph in which the nodes are the vertexes<br />
whereas the graph edges are determined on the basis of the values contained<br />
in a separation matrix. The task of the algorithm of the frequency assignment<br />
is to solve the travelling salesman problem, it means finding the Hamilton path<br />
of minimum weights sum. The algorithm sums all edge weights in every node <strong>and</strong><br />
sorts the nodes depending on the obtained sum of the edge weights. In the first
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
157<br />
step, a frequency is assigned to the node of the highest sum of the edge weights that<br />
is treated as the graph starting node. Searching of next “unvisited” graph vertexes<br />
is done by selection of a lowest weight edge.<br />
After all vertexes are visited the total sum of the edge weights of the visited<br />
vertexes is saved.<br />
In the described algorithm every node is the starting node from which searching<br />
the Hamilton path is started.<br />
The result of the algorithm operation is a path of the edge weights smallest<br />
sum of the visited vertexes.<br />
In every case it is checked if the number of used frequencies does not exceed<br />
the set of the accessible frequencies. In a special case, when the algorithm can not<br />
determine any path that meets the above mentioned criterion, the assignment<br />
of radio frequencies is not possible.<br />
After the solution is selected that is the best solution (it requires the smallest<br />
number of accessible frequencies to allocate them to defined radio networks), there<br />
is carried out a selection of the radio frequencies that exist in the set of accessible<br />
frequencies <strong>and</strong> that are not used <strong>and</strong> a trial to assign successive frequency subb<strong>and</strong>s<br />
to co-site networks.<br />
IV. Prediction of electromagnetic waves attenuation<br />
To determine an usable signal level <strong>and</strong> an interfering signal level, waves<br />
attenuation prediction models are used in the planning module. A detailed<br />
analysis of such models leads to the conclusion that there is lack of suitable models<br />
that serve for prediction of radio waves attenuation in urban environments<br />
in which more <strong>and</strong> more military operations are carried out for the frequencies<br />
within 30-88 MHz <strong>and</strong> 225-400 MHz most often used by army <strong>and</strong> for the geometry<br />
of the systems that are characterized by low antennas hanging above ground<br />
(1-3 m) (see Table I). [1]<br />
Among the items specified in the Table I, the first three items (Okumura,<br />
Hata, COTS 231) are the most popular empiric models in the engineering practice<br />
that are used for prediction of waves attenuation in urban environments. Unfortunately,<br />
these models are useful only for highly hanged antennas because they are<br />
constructed for designing of conventional cellular systems in which the base station<br />
antennas are mounted at high altitudes. Other items presented in the Table 1 show<br />
the analysis results for frequencies other than for above mentioned Okumura, Hata<br />
<strong>and</strong> COST 231 models, even when they refer to parts of the military frequency<br />
ranges also always regards the situation when one of antennas is mounted at high<br />
altitude. A confirmation of such an observation are also results of the problem<br />
thorough analysis included in [2]. Wishing to fill the existing gap, the authors<br />
of this publication proposed an adaptation of the model given by Rappaport [3]<br />
that was constructed for the frequencies of 900 <strong>and</strong> 1800 MHz. Thus, they made
158 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
a linear extrapolation of the model coefficients <strong>and</strong> carried out its initial experimental<br />
verification. According to that model called the General Urban Path Loss (GUPL)<br />
the attenuation of waves for the frequency range of 30-88 MHz that propagate<br />
in an urban environment is expressed by the following formula:<br />
d<br />
L[ dB] 10lg( ) 10nlg( ) d FAF<br />
d<br />
d<br />
4<br />
o o<br />
Where:<br />
<br />
d o – reference distance in a close zone (m) d o<br />
(when the antenna<br />
2 <br />
largest dimension < λ, do @ 30 meters);<br />
λ – wave length (m);<br />
d – distance between transmitter <strong>and</strong> receiver (m);<br />
β – power component which indicates that received power decays with distance<br />
at a rate of 10β dB/decade;<br />
n – path loss exponent;<br />
α – attenuation constant (dB/m);<br />
FAF – floors attenuation coefficient (dB)<br />
Author<br />
Frequency<br />
(MHz)<br />
Table I<br />
Distance<br />
(km)<br />
HT<br />
(m)<br />
Y. Okumura 15-1920 1-100 30-1000<br />
HR<br />
(m)<br />
M. Hata 150-1500 ≥ 1 30-200 1-10<br />
COST 231 800-2000 0.02-5 4-50 1-3<br />
H. Xia 900, 1900 0.001-2 3.2, 8.7, 13.4 1.6<br />
V. Erceg 1956 0.01-0.5 3.3, 6.6 1.5<br />
D. Har 900, 1900 0.06-2 3.2, 8.7, 13.4 1.6<br />
A. Kanatas 1890 0.02-0.18 4 1.7<br />
H. Masui 3350, 8450, 15750 0.02-0.5 4 2.7<br />
Y. Oda 457-15450 ≥ 20<br />
T. Rao 200, 400, 450 0.5-10.5 ≥ 20 3<br />
N. Blaunstein 902-928 7 2-3<br />
W. Young 150, 450, 800, 3700 0.108-16.3 138 2<br />
In Table II are presented values of β, n <strong>and</strong> α coefficients for the following<br />
scenarios:<br />
Scenario 1: outdoor RF propagation in an urban canyon;<br />
Scenario 2: indoor propagation (same building, same/multiple floor(s));<br />
Scenario 3: indoor-to-indoor propagation (between two different buildings, same/<br />
multiple floor(s));<br />
(1)
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
159<br />
Scenario 4: indoor-to-outdoor propagation;<br />
Scenario 5: outdoor-in-indoor propagation.<br />
Scenario<br />
Power component<br />
β<br />
Table II<br />
Path loss<br />
exponent<br />
n<br />
Attenuation<br />
constant<br />
α (dB/m)<br />
1 2,2 1,8 0,06<br />
2 2,63 1,5 0,65<br />
3<br />
5 (if number of penetrated floors = 0),<br />
4 (if number of penetrated floors > 0)<br />
2 0,65<br />
4 3,6 4 0<br />
5 3,6 4 0<br />
The analysis of the GUPL model carried out by us shown a necessity of making<br />
corrects of FAF values given in [2] – in particular for higher than 4 number<br />
of floors. That is why experiments were carried out. The results of these experiments<br />
are discussed in [4] <strong>and</strong> the obtained corrected values of the FAF coefficient are<br />
presented in the Table III <strong>and</strong> Table IV.<br />
Table III<br />
Recommended FAF<br />
Number of floors 30 MHz 49 MHz 87,5 MHz<br />
1 1,9 3,44 1,76<br />
2 5,85 7,67 5,5<br />
3 9,1 15,7 10,26<br />
4 15,46 18,75 14,15<br />
5 21,25 25,15 19,8<br />
Table IV<br />
Recommended FAF<br />
Number of floors 230 MHz 320 MHz<br />
1 6,4 7,95<br />
2 11,8 10,75<br />
3 14,5 15<br />
4 21,9 18,15<br />
5 26,6 20,1<br />
These experiments enabled at the same time verify positively the GUPL model<br />
usability for signal attenuation prediction in urban areas – both inside buildings<br />
<strong>and</strong> in street “canyons”.
160 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
V. Summary<br />
The problems related to the frequency assignment were subject to wide analyses<br />
as regards use in the cellular telephony network planning. However, the results<br />
of these analyses are not useful for the frequency assignment in military radio<br />
networks what results from a different specificity of these systems.<br />
In commercial systems, the aim of frequency assignment is to minimize<br />
the number of used frequencies, what is motivated by the concession costs. In the battlefield<br />
radio networks it is desired to use maximum number of frequencies, what<br />
is motivated by the system resistance to intentional interference.<br />
In the presented article a way of solution of the problem of frequency assignment<br />
to radio networks has been discussed using the greedy algorithm. The greedy algorithm<br />
selects locally optimal solution assuming that such a strategy will lead to a globally<br />
optimal solution. It should be noted that it is one of possible solutions of the travelling<br />
salesman problem. Another way of optimal frequency assignment is use of the SAT<br />
solvers. The SAT-solver is a program that for a given formula written in a form CNF<br />
(Conjunction Normal Form) finds if there exists such a sentence variables substitution<br />
for which the formula is true. If such a substitution exists the program returns<br />
it as a result. At the moment, in the <strong>Military</strong> Communication Institute is conducted<br />
work on use of the SAT solvers in the frequency assignment.<br />
References<br />
[1] http://blogs.uco.edu/graduate/files/2012/02/chart_wireless_data_2.gif<br />
[2] J. Andrusenko, R.J. Miller, J.A. Abrahamson, N.M. Merheb Emanuelli, R.S.<br />
Pattay <strong>and</strong> R.M. Shuford, “VHF General Urban Path Loss Model for Short Range<br />
Ground-to-Ground <strong>Communications</strong>” IEEE Transaction on Antennas <strong>and</strong> Propagation,<br />
vol. 56, No. 10, 2008.<br />
[3] T.S. Rappaport, Wireless Communication: Principle <strong>and</strong> Practice, Upper Saddle<br />
River, NJ: Prentice Hall PTR, 2002 (second edition).<br />
[4] P. Gajewski, M. Suchański, P. Kaniewski, R. Matyszkiel, „Prediction of VHF <strong>and</strong><br />
UHF Wave Attenuation In Urban Environment” 19th International Conference on<br />
Microwave,Radar <strong>and</strong> Wireless <strong>Communications</strong> MIKON-2012, May 21-23.<br />
[5] T.C. Cormen, C.E. Leiserson, R. Rivest, “Introduction to Algorithms”, Massachusets<br />
Institute of <strong>Technology</strong>, Thirteenth priinting, 1994.
Spectrum Issues of NATO Narrowb<strong>and</strong> Waveform<br />
Jan Leduc 1 , Markus Antweiler 1 , Torleiv Maseng 2<br />
1 Fraunhofer Institute for Communication, <strong>Information</strong> Processing <strong>and</strong> Ergonomics FKIE,<br />
Wachtberg, Germany, jan.leduc@fkie.fraunhofer.de<br />
2 Forsvarets Forskningsinstitutt FFI, Kjeller, Norway, Torleiv.Maseng@ffi.no<br />
Abstract: In order to fulfill most of the military operational requirements, two kinds of waveforms<br />
are needed, a wideb<strong>and</strong> networking waveform, e.g. the Coalition Wideb<strong>and</strong> Networking<br />
waveform (COALWNW) with high data rates, enabling network centric warfare <strong>and</strong> a Narrow<br />
B<strong>and</strong> Waveform (NBWF) covering long ranges <strong>and</strong> enabling the parallel transmission of data <strong>and</strong><br />
voice. As a complement to COALWNW, the NATO Line of Sight <strong>Communications</strong> Capability<br />
Team is developing a new NBWF. Legacy versions of the NBWF exist as national waveforms only,<br />
operating historically in the VHF tactical communications b<strong>and</strong> ranging from 30 MHz to 88 MHz<br />
occupying a channel b<strong>and</strong>width of 25 kHz. The new NBWF is expected to operate in the same<br />
frequency range, employing the same channelization; furthermore, the NBWF should allow operation<br />
in the tactical UHF b<strong>and</strong> as well. The current waveform proposal is based on Continuous<br />
Phase Modulation (CPM), which is widely used in mobile communications, due to the constant<br />
envelope property of the modulation scheme.<br />
In this paper, we first introduce principles of the newly defined NBWF. Furthermore, we want to<br />
point out some unapparent spectrum usage issues of the current proposal.<br />
Keywords: Narrowb<strong>and</strong> Waveform; B<strong>and</strong>width; Continuous Phase Modulation; Spectral Efficiency<br />
I. Introduction<br />
In the NATO Technical Note 1246 [1], it was identified that two types of waveforms<br />
are needed to fulfill all operational requirements. The first kind of waveform<br />
is a wideb<strong>and</strong> networking waveform enabling high data rates for advanced network<br />
enabled capabilities. This kind of waveform is addressed in the COALWNW project<br />
in order to achieve interoperability. The second kind of waveform, a narrow<br />
b<strong>and</strong> waveform, enabling long range transmission employing the VHF 25 kHz<br />
channelization is currently defined at NATO within the NATO Line of Sight <strong>Communications</strong><br />
Capability Team. The focus of this paper is on the NBWF. The NBWF<br />
will be mainly used in Combat Net Radios (CNR) for interoperability on the lower<br />
comm<strong>and</strong> levels. Currently there is no secure <strong>and</strong> networking capable CNR<br />
This research project was performed under contract with the Federal Office of the Bundeswehr for <strong>Information</strong><br />
Management <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>, Germany.
162 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
waveform available as a NATO St<strong>and</strong>ard, since legacy versions of the NBWF are<br />
available as national waveforms only.<br />
There exist several solutions for the NBWF at present, but the one described<br />
in [2] is a CPM employing a scheme with joint iterative demodulation <strong>and</strong> decoding<br />
of convolutional codes. We appreciate, that the lead development was done<br />
at the <strong>Communications</strong> Research Centre (CRC), Canada [3], [4].<br />
The waveform is described by a variety of modes for a 25 kHz channelization.<br />
These modes are mainly distinguished by the provided data rates. The three lower<br />
rate modes, namely NR (R refers to robust), N1 <strong>and</strong> N2, offering 10 kbps, 20 kbps<br />
<strong>and</strong> 31.5 kbps respectively, can be considered as long range modes, while the modes<br />
N3 <strong>and</strong> N4, offering 64 kbps <strong>and</strong> 96 kbps respectively can be considered as high<br />
throughput modes. It is worth to mention that this CPM-waveform uses a very interesting<br />
approach to realize higher data rates, which will be described subsequently.<br />
There are two possibilities for increasing the data rate. The first one is to increase<br />
the amount of information within one symbol duration by transmitting e.g. 2 Bit/<br />
Symbol instead of 1 Bit/Symbol, which is the common way of increasing the data<br />
rate. The CPM waveform follows another, the second possible approach. While keeping<br />
the amount of information constant during one symbol duration, the symbol<br />
duration itself gets reduced, thus the symbol rate increases. When the symbol rate<br />
increases, it is known that the b<strong>and</strong>width occupation of the system increases as well,<br />
which is not desired, since the use of a 25 kHz channel is a m<strong>and</strong>atory requirement<br />
(Requirement 2.07.03, 2.07.04 <strong>and</strong> 2.07.08 in [5]). Thus, the maximum phase<br />
change within a symbol, h the modulation index, needs to be reduced to compensate<br />
the spectral growth. This technique is very ambitiously applied in the modes N3<br />
<strong>and</strong> N4, because the modulation indices become very small.<br />
In this paper, the modulation parameters of this particular waveform are<br />
investigated to see, whether the chosen approach for generating higher data rates<br />
is appropriate for CNR NBWF or not.<br />
The paper is organized as follows: In Section II, we give some more insights<br />
on the physical layer of the CPM NBWF as defined in [2]. In Section III, we describe<br />
the simulation environment. Simulations results are presented in Section IV.<br />
In Section V, the results <strong>and</strong> possible consequences are summarized.<br />
II. CPM NBWF<br />
CPM is a digital phase modulation of the same family as the Continuous-Phase<br />
Frequency-Shift Keying (CPFSK) used in many legacy VHF tactical <strong>and</strong> civilian<br />
waveforms. The most significant properties are, a constant envelope in the timedomain<br />
signal, a fundamental robustness to amplitude modulation distortion <strong>and</strong><br />
an efficient utilization of power in the transmit amplifiers since the power amplifier<br />
can work in saturation. A complete overview of CPM can be found in [7].<br />
The complex baseb<strong>and</strong> representation of the CPM waveform without filtering is
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
163<br />
2Es<br />
jt,<br />
<br />
st , e<br />
(1)<br />
T<br />
with E s denoting the symbol energy <strong>and</strong> T s representing one symbol period. The parameter<br />
denotes the bipolar represented information input values. The phase<br />
of the n th symbol of this CPM modulation can be computed by<br />
n<br />
, 2 ,<br />
t h qt iT <br />
s<br />
i<br />
s<br />
(2)<br />
i<br />
with nT t ( n 1) T . The accumulated phase is defined by<br />
s<br />
s<br />
nL<br />
i<br />
(3)<br />
i<br />
2h<br />
n<br />
K<br />
1<br />
where K is a given normalization constant (for the NBWF) <strong>and</strong> indicates<br />
2<br />
the kind of CPM modulation. In case of L = 1 a full response system is considered,<br />
if L > 1 there is a memory of length L in the system <strong>and</strong> adjacent symbols overlap.<br />
The phase shaping pulse is<br />
t<br />
qt gd<br />
(4)<br />
<br />
<strong>and</strong> g represents the – REC (Rectangular) partial response phase shaping<br />
pulse.<br />
As already mentioned the CPM-NBWF is described in modes, by employing<br />
different physical layer parameters, but for all modes there is no transmission<br />
filter defined [2] <strong>and</strong> the phase shaping is done with a rectangular pulse. Thus, two<br />
adjacent modulations symbols are connected by equally spaced samples. The list<br />
of important waveform parameters are given below in Table I.<br />
CPM-Mode<br />
Table I. CPM-Waveform-Modes <strong>and</strong> specific parameters<br />
User Data Rate<br />
[kbps]<br />
L M h Code Rate<br />
Symbol Rate<br />
[ksps]<br />
NR 10 2 2 1/2 1/3 30<br />
N1 20 2 2 1/2 2/3 30<br />
N2 31.5 2 2 1/4 3/4 42<br />
N3 64 3 2 1/6 4/5 80<br />
N4 96 3 2 1/11 3/4 128<br />
In the first columns of Table I, the five different modes are indicated with<br />
their respective user data rate in the second column. Furthermore, L is denoting<br />
the ratio of width of the phase shaping pulse <strong>and</strong> the symbol duration; thus
164 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
all specified modes use partial response modulation. The parameter M indicates<br />
the number of signal states, which is binary for all the different modes; h is representing<br />
the modulation index (max. phase change in a symbol duration), which<br />
the developers of the waveform are using to compensate the spectral growth due<br />
to the increasing symbol rates (<strong>and</strong> data rate).<br />
The Forward Error Correction (FEC) is realized with a convolutional mother<br />
code with code rate R = 1/3 <strong>and</strong> constraint length 4. The mother code is given by<br />
the octal generator polynomials G 13,15,17 8<br />
<strong>and</strong> is defined to be in a non-recursive<br />
form. For all modes except NR, the mother code is punctured by the puncturing<br />
matrices given in [2]. Convolutional codes are vulnerable to burst errors, where<br />
a contiguous sequence of bits or symbols gets corrupted. In order to break these burst<br />
errors in single bit errors; an interleaving scheme is employed between FEC <strong>and</strong><br />
modulator. The interleavers have been designed following the “S-R<strong>and</strong>om/Dithered<br />
Relative Prime (DRP)” approach [6] which ensures a minimum distance between<br />
adjacent input bits. Since, a joint iterative demodulation <strong>and</strong> decoding<br />
scheme is suggested by the inventors in the receiver, the interleaver has another<br />
important function besides enhancing the robustness against burst errors.<br />
The interleaver guarantees that the sources of reliability information in the generation<br />
of extrinsic information on the receiver side are independent, namely<br />
the independence between the inner code (the CPM modulator) <strong>and</strong> the outer<br />
convolutional code.<br />
A conclusive block diagram with the transmitter of the CPM-NBWF is given<br />
in Fig. 1.<br />
Figure 1. Block diagram of CPM-NBWF transmitter<br />
III. Simulation environment<br />
From a spectrum perspective, the modes given in Table 1 are following<br />
the design constraint, that 99% of the power is within 25 kHz b<strong>and</strong>width. As shown<br />
in [8], even this constraint is not completely fulfilled. The 99% power b<strong>and</strong>width<br />
is given by:<br />
• N1 = 25.89844 kHz<br />
• N2 = 23.78906 kHz<br />
• N3 = 27.10938 kHz<br />
• N4 = 28.50000 kHz
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
165<br />
However, another evident constraint tells, that all information of the waveform<br />
is embedded within 25 kHz. We have to bear in mind that the increase of data rate<br />
is achieved with an increase of the symbol rate <strong>and</strong> the symbol rate is somehow reciprocal<br />
to the b<strong>and</strong>width. Hence, we want to analyze, if the decrease of the modulation<br />
index h is able to compensate the spectral growth due to the increase of the symbol<br />
rate. Therefore, only the modulation scheme is under analysis, since the FEC shall<br />
only be used to increase the robustness to interferences <strong>and</strong> not to compensate<br />
shortcomings of the application of the modulation scheme. Furthermore, the FEC<br />
does not contribute to the spectral shaping of this waveform. The robustness to<br />
interferences is not considered in this paper.<br />
A block diagram of the simulation is given in Fig. 2. First, uniformly distributed<br />
r<strong>and</strong>om bits are generated <strong>and</strong> then CPM modulated using the parameters<br />
of Table I (excluding FEC). The system employs oversampling with factor 16. This<br />
means that after the modulator each bit (M = 2) for all modes) is represented by<br />
16 samples. The signal stream is then filtered by an equiripple Finite Impulse Response<br />
(FIR) low pass filter. The pass frequency f<br />
pass<br />
is variable <strong>and</strong> fstop<br />
1.2 fpass<br />
,<br />
is indicated in Fig. 2. Furthermore, the pass b<strong>and</strong> ripple is limited 0.1 dB <strong>and</strong><br />
the stop b<strong>and</strong> attenuation is given by A 60 dB .<br />
stop<br />
Figure 2. Block diagram of simulation chain<br />
The filtered signal is then demodulated by the respective CPM demodulator<br />
<strong>and</strong> the Bit Error Rate (BER) is measured.<br />
IV. Simulation results<br />
The previous described setup permits to measure the BER dependent on the (by<br />
f<br />
the FIR filter limited) one-sided b<strong>and</strong>width W 1.1fpass<br />
fpass<br />
<strong>and</strong> with<br />
2<br />
this, a possibility to verify, whether all information is contained within the 12.5 kHz<br />
one-sided (25 kHz two-sided) channel.
166 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
First, the generated results are presented in Fig. 3, where the BER is drawn<br />
over the one-sided b<strong>and</strong>width W in kHz.<br />
Figure 3. One-sided b<strong>and</strong>width W versus BER<br />
In Fig. 3, it is easy to observe that the mode N1 needs clearly less b<strong>and</strong>width<br />
than the maximum of 12.5 kHz. Also, the mode N2 can transmit all information<br />
within a b<strong>and</strong>width smaller than the 12.5 kHz one-sided (25 kHz two-sided) channel.<br />
One could assume that the symbol rate for those modes could be further increased<br />
in order to maximize the data rate, but we have to bear the 99% power b<strong>and</strong>width<br />
in mind. Thus, the long range modes are compliant to the spectral requirements.<br />
(NR is disregarded here, since NR <strong>and</strong> N1 have the same modulation parameters<br />
<strong>and</strong> only differ in the puncturing).<br />
The behavior under filtering is very different for the high throughput modes N3<br />
<strong>and</strong> N4, since they have a higher b<strong>and</strong>width dem<strong>and</strong> to transmit all the containing<br />
information. If the maximum b<strong>and</strong>width W=12.5 kHz (one-sided) is granted to<br />
the system, the mode N3 has a BER of approximately 6% <strong>and</strong> the mode N4 of approximately<br />
35%. Those are not tolerable values <strong>and</strong> to be able to transmit the bits<br />
at a BER of 10 -7 , the mode N3 would need two channels, thus 50 kHz (two sided)<br />
<strong>and</strong> the mode N4 three channels, thus 75 kHz (two sided), in order to be compliant<br />
to the current NATO channelization. This observation reduces the spectral<br />
efficiency of the system dramatically, if we assume that NATO will not change<br />
the 25 kHz channelization for this waveform. The results of the above section are<br />
summarized in Table II.<br />
All modes are advertised as occupying 25 kHz b<strong>and</strong>width; the respective<br />
spectral efficiencies are indicated in Table II. Simulations results show (Fig. 3)
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
167<br />
that the necessary b<strong>and</strong>width occupation for the modes N3 <strong>and</strong> N4 is higher;<br />
the realistic, corrected spectral efficiency of the high throughput modes N3 <strong>and</strong><br />
N4 is approximately as high as the spectral efficiency of the long range mode N2,<br />
as can be seen in Table II. Furthermore, the high throughput, low-h, modes are<br />
more sensitive to noise, as can be seen in Table III.<br />
CPM-Mode<br />
Table II. CPM-Waveform with realistic spectral efficiences<br />
Spectral Efficiency<br />
a)<br />
25<br />
Necessary b<strong>and</strong>width<br />
in NATO channels<br />
Spectral Efficiency<br />
b)<br />
real<br />
NR 0.4 1 channels (25 kHz) 0.4<br />
N1 0.8 1 channels (25 kHz) 0.8<br />
N2 1.26 1 channels (25 kHz) 1.26<br />
N3 2.65 2 channels (50 kHz) 1.28<br />
N4 3.84 3 channels (75 kHz) 1.28<br />
a) is defined as the user throughput divided by 25 kHz b<strong>and</strong> width<br />
b) is defined as the user throughput divided by necessary b<strong>and</strong> width<br />
Table III. Nosie sensitivity of low-h CPM (Oversampling 16)<br />
CPM-Scheme<br />
(Modulation parameters)<br />
M = 2; L = 2; h = 1/2<br />
(N1 without FEC)<br />
M = 2; L = 2; h = 1/4<br />
(N2 without FEC)<br />
M = 2; L = 3; h = 1/6<br />
(N3 without FEC)<br />
M = 2; L = 3; h = 1/11<br />
(N4 without FEC)<br />
Necessary E b / N 0<br />
to reach a BER of 10 -3 Necessary E b / N 0<br />
to reach BER of 10 -6<br />
7.5 dB 11.1 dB<br />
12.8 dB 16.5 dB<br />
17.7 dB 21.4 dB<br />
23 dB 26.4 dB<br />
Thus, combining two or respectively three channels to provide the necessary<br />
b<strong>and</strong>width to N3 respectively N4 is disadvantageous. It would be the same<br />
from a spectral occupation (see Table II) perspective <strong>and</strong> significantly better<br />
from a robustness (see Table III) perspective, if e.g. the N2 waveform would be<br />
employed with double or triple data rate <strong>and</strong> occupying the respective two or<br />
three frequency channels.<br />
However, we further want to verify, if the modulation index can be used to<br />
compensate the spectral growth of the waveform, due to the increase of the symbol<br />
rate. To do so, the results are normalized to the symbol rate <strong>and</strong> in Fig. 4<br />
B . T s (T s is the symbol duration; B = 2W) versus the BER is plotted.
168 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 4. B . T s (T s is the symbol duration; B = 2W) versus BER<br />
It can be observed that all modes have a different normalized b<strong>and</strong>width<br />
occupation. The higher the throughput, the lower the b<strong>and</strong>width needs. The valid<br />
question at this point is, if the normalized b<strong>and</strong>width gains of N3 <strong>and</strong> N4 are caused<br />
by the reduction of h, because the value of L (ratio phase pulse length / symbol time)<br />
also has an impact on the b<strong>and</strong>width [7] <strong>and</strong> L = 3 for the modes N3 <strong>and</strong> N4 <strong>and</strong><br />
L = 2 for the modes N1 <strong>and</strong> N2. To verify this, further simulations are conducted,<br />
with the modulation settings of N3 <strong>and</strong> N4 but employing a value of L = 2. These<br />
results are plotted using dashed lines in Fig. 4.<br />
As it can be seen, these “verification modes” perform normalized to the symbol<br />
rate very similar to the mode N2. Thus, if L = 2 is used for the low h modes<br />
(N3 <strong>and</strong> N4), they are almost as b<strong>and</strong>width efficient as N2. Thus, the observed<br />
b<strong>and</strong>width gains between the mode N2 <strong>and</strong> N3/N4 are due to the higher values<br />
of L. Hence, there are only negligible b<strong>and</strong>width gains from reducing h beyond ¼.<br />
V. Conclusions<br />
In this paper the upcoming NATO NBWF has been analyzed, regarding<br />
the necessary b<strong>and</strong>width occupation of the system. This particular waveform<br />
is keeping the amount of information constant during one symbol duration <strong>and</strong>
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
169<br />
to increase the data rate, the symbol duration itself gets reduced <strong>and</strong> the symbol<br />
rate increases. Thus the b<strong>and</strong>width occupation of the system increases as well,<br />
which is not desired, since the use of a 25 kHz channel (two-sided) is a m<strong>and</strong>atory<br />
requirement [5]. This increase of b<strong>and</strong>width is compensated with the reduction<br />
of the modulation in h of the CPM modulation scheme, which is the maximum<br />
phase change within a symbol duration. Therefore, while making the symbols<br />
duration shorter, the phase change within a symbol is also reduced. It is shown<br />
that the spectral growth cannot be compensated by a reduction of h. The modes<br />
N3 <strong>and</strong> N4 occupy (to function properly) two <strong>and</strong> respectively three 25 kHz<br />
channels, which does not meet [5], especially because military spectrum is a very<br />
scarce resource.<br />
On the other h<strong>and</strong> the modes N1 <strong>and</strong> N2 are very robust <strong>and</strong> well-defined<br />
waveforms fulfilling all requirements regarding spectral occupation [5]. Therefore,<br />
we propose the following two steps:<br />
1. Move on with N1 <strong>and</strong> N2 for a fast ratification <strong>and</strong> make these new waveforms<br />
available to the user<br />
2. Revisit higher data rate modes in the future for a possible annex <strong>and</strong> ensure<br />
usable modes fulfilling requirements of all nations.<br />
There are certain possible solutions for overcoming the issue pointed out<br />
in the paper within the second proposed step.<br />
The other waveform c<strong>and</strong>idates, which were submitted to the LOS Comms<br />
CaT could be taken into consideration for the high throughput modes or modifications<br />
would had to be made to the current waveform,<br />
If the CPM-waveform is kept also for the high throughput modes there are<br />
also certain modification possibilities.<br />
First, the modulation parameters of the mode N2 are kept, but the number<br />
of bits per symbol M = 1 would have to be increased to M = 2 respectively M = 3,<br />
which would double/triple the data rate (63 kbps resp. 94.5 kbps) on the expense<br />
of the demodulator complexity [7].<br />
Second, the symbol rate of N2 gets increased (doubled/tripled offering (63 kbps<br />
resp. 94.5 kbps); occupying two resp. three 25 kHz channels, while being fairly<br />
resistant to interference compared to the current modes N3 <strong>and</strong> N4.<br />
References<br />
[1] Technical Note 1246, ‘Wireless communication architecture (l<strong>and</strong> tactical): scenarios,<br />
requirements <strong>and</strong> operational view’, NC3A, The Hague, Netherl<strong>and</strong>s, 2007.<br />
[2] LOS Comms CaT (formaly known as: SC/6 AHWG/2), “Technical St<strong>and</strong>ards for Narrow<br />
B<strong>and</strong> Physical Layer of the NATO Network enabled <strong>Communications</strong> Waveform <strong>and</strong><br />
VHF Propagation Models (STANAG Draft 4),” 2010.
170 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
[3] C. Brown <strong>and</strong> P. Vigneron, “Spectrally Efficient CPM Waveforms for Narrowb<strong>and</strong><br />
Tactical <strong>Communications</strong> in Frequency Hopped Networks”, <strong>Military</strong> <strong>Communications</strong><br />
Conference, 2006. IEEE MILCOM 2006, 23-25 Oct. 2006.<br />
[4] C. Brown <strong>and</strong> P. Vigneron, “Equalisation <strong>and</strong> Iterative Reception for Spectrally<br />
Efficient CPM in Multipath Environments”, <strong>Military</strong> <strong>Communications</strong> Conference,<br />
2010. IEEE MILCOM 2010, Oct. 31-Nov. 3 2010.<br />
[5] NATO C3B, “Requirements for a Coalition Tactical Radio Waveform,” (AC/322-N<br />
(2011)0010-REV1), January 2011.<br />
[6] D. Divsalar, G. Montorsi, S. Benedetto <strong>and</strong> F. Pollara, “Serial concatenation<br />
of interleaved codes : Design <strong>and</strong> performance analysis,” in IEEE Trans. Inform.<br />
Theory (1998), April, pp. 409-429.<br />
[7] J.G. Proakis, “Digital <strong>Communications</strong>,” Mcgraw-Hill Publ.Comp., Edition: 4., August<br />
2000.<br />
[8] J. Nieto, “NBWF Investigations”, LOS Comms Cat Workshop, Rome, Italy, March 2011.
Legacy Waveforms on Software Defined Radio:<br />
Can Hierarchical Modulation Offer<br />
an Added Value to SDR Operators<br />
Marc Adrat 1 , Tobias Osten 1 , Jan Leduc 1 , Markus Antweiler 1 ,<br />
Harald Elders-Boll 2<br />
1 Fraunhofer Institute for Communication, <strong>Information</strong> Processing <strong>and</strong> Ergonomics FKIE,<br />
Wachtberg, Germany, marc.adrat@fkie.fraunhofer.de<br />
2 Cologne University of Applied Sciences, Cologne, Germany, harald.elders-boll@fh-koeln.de<br />
Abstract: <strong>Military</strong> tactical communications is taking the next step in its evolution. Many nations<br />
spend considerable efforts to bring the novel Software Defined Radio (SDR) technology into service.<br />
SDRs allow military radio operators to change waveforms on-the-fly according to the mission needs.<br />
New capabilities can be loaded as so-called Waveform Application (WFA). Before novel waveforms<br />
with wideb<strong>and</strong> networking capabilities will be available in the future, most nations have launched<br />
projects to port legacy waveforms to SDRs. These WFAs on the modern SDRs shall ensure interoperable<br />
communication to legacy radios in situations where both types of radio equipment are deployed<br />
at the same time in the same mission.<br />
In this paper, we present first results of our analysis if an added value can be provided to the operators<br />
at SDRs, e.g., in terms of a higher data throughput or robustness. As an example, we apply the concept<br />
of hierarchical modulations to a legacy waveform. The modulation scheme of the legacy waveform<br />
acts as the base-layer which ensures the over-the-air interoperability to legacy radios. Additional<br />
information can be transmitted between SDRs only utilizing some extra enhancement-layers.<br />
Keywords: Software Defined Radio, Waveform Application, Hierarchical Modulations, Bit Interleaved<br />
Coded Modulation with Iterative Decoding<br />
I. Introduction<br />
It is expected that the modern Software Defined Radio (SDR) technology will<br />
considerably extend the capabilities of future military tactical communications.<br />
Among many other advantages of SDR technology, one key benefit is that waveforms<br />
can be loaded onto the SDRs as so-called Waveform Applications (WFA)<br />
according to the mission needs. Another key benefit is that SDRs are expected to<br />
be powerful enough to host modern WFAs with wideb<strong>and</strong> networking capabilities.<br />
This research project was performed under contract with the Federal Office of the Bundeswehr for <strong>Information</strong> Management<br />
<strong>and</strong> <strong>Information</strong> <strong>Technology</strong>, Germany.
172 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Such Wideb<strong>and</strong> Networking Waveforms (WNW) typically set the most dem<strong>and</strong>ing<br />
requirements for the design of high capable heterogeneous SDR platforms.<br />
However, if WFAs with lower computational dem<strong>and</strong>s are deployed on SDRs, like<br />
legacy waveforms, some of the computational resources remain unused. These<br />
spare resources might probably be beneficially utilized by applying advanced signal<br />
processing algorithms. An example will be discussed later on in this paper.<br />
Moreover, it can be anticipated that SDR technology will be introduced to the<br />
military forces in a step-by-step process. There will be a significant period of time<br />
where legacy radios <strong>and</strong> modern SDRs hosting the corresponding legacy WFA will<br />
be deployed at the same time in the same mission. Guaranteeing interoperability<br />
between both types of radio equipment, legacy radios <strong>and</strong> modern SDR, is the<br />
utmost requirement in the Porting process. Porting in this context means that the<br />
waveform functionality which is known from the legacy radio is implemented<br />
as a piece of software which runs on the SDR platform. This piece of software is called<br />
Waveform Application. Usually, interoperability is guaranteed by reproducing the<br />
known functionality of the legacy radios one-to-one in the WFA for SDRs.<br />
However, as we have already proposed in [1], it might be of value to apply<br />
modern advancements in digital signal process ing at the receiving end of a communication<br />
link. While keeping interoperability on the air interface, the operator<br />
at the receiving SDR can experience a benefit if compared to the operator at the<br />
legacy radio thanks to the more sophisticated receiver signal processing. Such<br />
benefit can be, e.g. a reduced bit error rate or an extended communication range.<br />
In the example given in [1] the concept of Bit Interleaved Coded Modulation<br />
with Iterative Decoding (BICM-ID) [2] [3] has been applied at the receiver using<br />
some MIL-STD188-110B-like waveform modes [4]. It has been shown that some<br />
gains are achievable, but unfortunately that these gains have to be considered<br />
as negligibly small if the concept of BICM-ID is directly applied to the st<strong>and</strong>ardized<br />
configuration settings. It has also been shown that substantial gains can be<br />
realized if a change of a single line of software code at the transmitter is tolerable.<br />
Of course, this would violate the key requirement to guarantee interoperability to<br />
legacy radios.<br />
In this paper, we analyze if the concept of Hierarchical Modulation can beneficially<br />
be applied. Again we use some MIL-STD188-110B-like waveform modes<br />
as example. Our objective is to provide some extended services to the operators<br />
at the SDRs. Using the known configuration settings from the legacy waveform<br />
as a base-layer in the hierarchical modulation scheme, allows ensuring interoperability<br />
between legacy radios <strong>and</strong> SDRs. Thanks to some enhancement-layers in the<br />
hierarchical modulation scheme additional data becomes transferable within an<br />
SDR-to-SDR communication link.<br />
Important note: In this paper, we focus on presenting the basic idea, discussing<br />
some useful design guidelines as well as showing first simulation results. These<br />
simulation results focus on the analysis if an enhanced data throughput can be
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
173<br />
provided as added value to the operator at an SDR. In a second complementing<br />
paper, see [8], we discuss if a higher robust ness (<strong>and</strong> with this a higher range) can<br />
be realized.<br />
This paper is structured as follows. In Section II we explain the idea of hierarchical<br />
modulation in the context of legacy waveforms on SDRs in more detail.<br />
In Section III we describe the simulation environment. Simulations results are<br />
presented in Section IV. After having given a short outlook on the results in [8] <strong>and</strong><br />
having described some future steps of our analysis in Section V, we finally conclude<br />
our findings in Section VI.<br />
II. Hierarchical modulations in the context of legacy<br />
waveforms on SDRs<br />
Hierarchical modulation allows to multiplex <strong>and</strong> to modulate multiple streams<br />
of user data into a single stream of modulation symbols. It is sometimes also referred<br />
to as Layered Modulation because one of the input data streams determines<br />
the base-layer symbols <strong>and</strong> the other input data streams determine the extra<br />
enhancement-layer symbols.<br />
One prominent practical implementation of hierarchical modulation can<br />
be found in the area of digital video broadcasting where the base-layer carries<br />
the information of a robust, but typically low-resolution video stream. The extra<br />
enhancement-layers, which might only be decodable by receivers under very good<br />
channel conditions, allow to increase the resolution <strong>and</strong> therewith the quality<br />
of the video.<br />
Thus, our basic idea is to apply a similar technique in the porting process<br />
of legacy waveforms to modern software defined radios. In the ported counterpart<br />
of the legacy waveform, the information of the legacy waveform represents the<br />
base-layer guaranteeing interoperability. On top of that the operators at SDRs can<br />
transmit additional data using the extra enhancement-layers.<br />
A. Example base-layer <strong>and</strong> enhancement-layers<br />
To simplify matters, in the following we restrict our considerations to a comprehensible<br />
example using an 8-PSK signal constellation as base-layer. Such a digital<br />
modulation scheme is widely used in a couple of present military tactical communication<br />
schemes like in NATO STANAG 4285 [5] or MIL-STD188-110B<br />
Appendix C [4]. The extension of our considerations to other digital modulation<br />
schemes is straight forward.<br />
The left part of Figure 1 shows an 8-PSK signal constellation set with a Gray<br />
labeling for the individual symbols. This set shall serve as the base-layer for our<br />
hierarchical modulation schemes. Note, in this simple example the base-layer carries<br />
information solely in its phase.
174 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 1. Different Signal Constellation Sets with exemplary symbol labels; left: 8-PSK base-layer,<br />
center: 8-PSK base-layer plus 4-ASK enhancement layer (star);<br />
right: 8-PSK base-layer plus 4-QAM enhancement layer (diamonds)<br />
In order to provide an add-on to the operators at SDRs we are aiming for<br />
transmitting some additional data in so-called enhancement-layers. Two examples<br />
are shown in the center <strong>and</strong> in the right part of Figure 1.<br />
In the first example, we apply a 4-ASK enhancement-layer as an overlay to<br />
the 8-PSK base-layer. This results in an overall 32-QAM scheme which would<br />
allow the operator at the SDR to transmit two additional bits. Simply speaking,<br />
the base-layer selects one of the eight sectors in the I/Q-plane (inphase/<br />
quadrature) while the enhancement-layer selects one out of four magnitudes<br />
in each sector. Later on, this scheme will also be referred to as “star-shaped”<br />
32-QAM scheme.<br />
In the second example we again apply an enhancement-layer with 4 signal<br />
constellation points to the 8-PSK base-layer. However, inspired by [6] the slightly<br />
different placing of signal constellation points allows exploiting the I/Q-plane more<br />
effectively. In the rest of this paper, this scheme will be called “diamond-shaped”<br />
32-QAM scheme.<br />
Two categories of questions arise immediately:<br />
• How to design the enhancement-layer in detail How to place the signal<br />
constellation points How to label them<br />
• What are the beneficial/adverse consequences with respect to the performance,<br />
e.g. in terms of bit error rate behavior What are the consequences<br />
for the operators at the legacy radios resp. software defined radios<br />
Answers to the design aspects (first category) will be given in the next subsection.<br />
The consequences (second category) will be analyzed in Sections III <strong>and</strong> IV.<br />
B. Designing the enhancement-layer<br />
When designing the enhancement-layer we have to consider a couple of design<br />
rules. Among others, these are:
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
175<br />
1. The mean energy E S required per modulation symbol shall be the same for the<br />
original 8-PSK scheme <strong>and</strong> the extended star- resp. diamond-shaped 32-QAM.<br />
2. The Euclidean distance between any pair of signal constellation points shall<br />
be such that not a single pair exists which reveals a dedicated bottleneck<br />
with respect to the bit error rate performance.<br />
3. The symbol labels shall be optimized in view of a receiver using the<br />
concept of Bit-Interleaved Coded Modulation with Iterative Decoding<br />
(BICM-ID) [2][3].<br />
The first two design rules are related to the placing of signal constellation<br />
points in the I/Q-plane while the third design rule is dedicated to the labeling.<br />
Both aspects will be optimized separately from each other.<br />
1) Placing of signal constellation points for the star-shaped 32-QAM scheme: Figure<br />
2 shows an extract of the star-shaped 32-QAM scheme.<br />
Figure 2. Design of star-shaped 32-QAM scheme (extract)<br />
Let us assume that the four signal constellation points representing the 4-ASK<br />
enhancement-layer are equidistantly separated by the distance α. The 4-ASK scheme<br />
shall be centered around β. In order to make sure that the mean energy E s of the<br />
resulting star-shaped 32-QAM scheme is the same as for the original 8-PSK scheme<br />
(see first design rule), it can be shown that α <strong>and</strong> β have to satisfy the condition<br />
5 2<br />
.<br />
E S<br />
<br />
4<br />
(1)<br />
If the spacing between the four signal constellation points representing the<br />
4-ASK enhancement-layer tends towards zero, i.e. 0, the term .<br />
E S
176 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Thus, the star-shaped 32-QAM scheme degenerates to the original 8-PSK scheme<br />
(this fact can be considered as a consistency check). If we increase α, the term β starts<br />
to decrease. While doing so, we have to take into consideration that the Euclidean<br />
distance between the inner signal constellation points on radius r * 1 becomes smaller<br />
the larger α resp. the smaller β is. In order to satisfy the second design rule, we enforce<br />
*<br />
that the Euclidean distance between the inner signal constellation points on radius r 1<br />
is also α. It can be shown that in this case α <strong>and</strong> β have to satisfy the condition<br />
13sin 22.5<br />
<br />
.<br />
(2)<br />
2 sin 22.5<br />
Solving Eqs. (1) <strong>and</strong> (2) for E S = 1 yields α = 0.331 <strong>and</strong> β = 0.928999. From<br />
that we can easily determine the radii of the star-shaped 32-QAM scheme shown<br />
in the center of Figure 1<br />
r<br />
∗<br />
1<br />
r<br />
∗<br />
2<br />
r<br />
∗<br />
3<br />
r<br />
∗<br />
4<br />
= 0.<br />
432499<br />
= 0.<br />
763499<br />
= 1.<br />
094499<br />
= 1.<br />
425499<br />
with * 0.331.<br />
(3)<br />
2) Placing of signal constellation points for the diamond-shaped 32-QAM scheme:<br />
Figure 3 shows an extract of the diamond-shaped 32-QAM scheme.<br />
Figure 3. Design of diamond-shaped 32-QAM scheme (extract)<br />
In this scheme we assume that two of the signal constel lation points are placed<br />
with a fixed phase offset of 22.5° on a circle with radius r r r <br />
. 2<br />
<br />
3<br />
A third point<br />
is located at a larger radius r ◊ 4 , while the Euclidean distance α to the first two points
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
177<br />
on radius r shall be the same as in between the first mentioned two points. The<br />
fourth point is located at a smaller radius r 1 ◊ . Again, in order to make sure that the<br />
mean energy E s of the resulting diamond-shaped 32-QAM scheme is the same as for<br />
the original 8-PSK scheme (see first design rule), it can be shown that r <strong>and</strong> r 1<br />
◊<br />
have to satisfy the condition<br />
1<br />
<br />
<br />
2<br />
2<br />
4<br />
S<br />
2 cos11.25 3sin11.25 .<br />
r E r<br />
(4)<br />
Note, while doing the consistency check, whether the diamond-shaped 32-QAM<br />
scheme degenerates to the original 8-PSK scheme, e.g. by letting r<br />
1<br />
r 0 , we<br />
have to keep in mind that at the same time the phase offset of 11.25° disappears.<br />
With this in mind, the term in the inner parenthesis in (4) becomes 1.<br />
Again, in order to ensure that the Euclidean distance between the inner signal<br />
constellation points on radius r ◊ 1 is at least α, the terms r <strong>and</strong> r ◊ 1 have also to satisfy<br />
the condition<br />
sin11.25 <br />
r1<br />
r .<br />
(5)<br />
sin 22.5<br />
From (4) <strong>and</strong> (5) follows<br />
<br />
r 0.5098<br />
<br />
r2 r3<br />
1.0001 with 0.3902.<br />
<br />
r 1.31878<br />
4<br />
The minimum Euclidean distance between any combination of two signal constellation<br />
points in the diamond-shaped 32-QAM scheme is α ◊ = 0.3902. This is slightly<br />
higher than for the star-shaped 32-QAM scheme α* = 0.331. This offers the potential<br />
for a higher performance as it will be discussed in more detail in Section IV.<br />
3) Finding the optimal labels for the star-shaped resp. diamond-shaped 32-QAM<br />
scheme: The symbol labels for both 32-QAM schemes shall be chosen such<br />
that a receiver design based on the BICM-ID concept is optimally supported.<br />
The concept of BICM-ID was first described in [2] <strong>and</strong> is based on a serial<br />
concatenation of a Forward Error Correction (FEC) component, a bit-level interleaver<br />
<strong>and</strong> a digital modulation scheme. On the receiving end, there is a feedback loop<br />
between the BCJR-decoder [7] <strong>and</strong> the demodulator. So-called Extrinsic <strong>Information</strong><br />
generated by the BCJR-decoder is interleaved <strong>and</strong> then fed back to the demodulator<br />
as additional a priori information for the received channel symbols.<br />
It has already been shown in [3] that the BICM-ID concept is optimally<br />
supported if a so-called Semi Set Partitioning (SSP) symbol labeling is applied.<br />
For a given signal constel lation the SSP mapping ensures that the so-called<br />
Harmonic Mean d H [3] is maximized. Table I shows the Harmonic Means for all<br />
signal constellations under consideration in this paper.<br />
<br />
<br />
(6)
178 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Table I. Harmonic Means for different Signal Constellation Sets<br />
Restricted SSP<br />
Free-running SSP<br />
Signal Constellation Set<br />
Harmonic Mean d H<br />
8-PSK (Gray) 0.809<br />
Star-shaped 32-QAM 0.470<br />
Diamond-shaped 32 QAM 0.403<br />
8-PSK 2.877<br />
Star-shaped 32-QAM 2.501<br />
Diamond-shaped 32 QAM 2.520<br />
If we are totally free in designing the symbol labeling the maximum achievable<br />
values are given in the lower part of Table I (marked as free-running SSP). It can<br />
be seen that (besides the better α ◊ > α* mentioned above) the diamond-shaped<br />
32-QAM offers also a slightly higher Harmonic Mean d H if compared to the starshaped<br />
32-QAM. Note, a comparison to the optimal d H for the 8-PSK constellation<br />
with a free-running SSP is not fair because due to the higher number of signal<br />
constellation points in the 32-QAM schemes, the Euclidean distances (which are<br />
taken into account by the Harmonic Mean) are typically smaller.<br />
However, since our key objective is to ensure interopera bility to legacy radios<br />
we are not totally free in the design of the symbol labeling. We have to take into<br />
account the labeling of the original 8-PSK scheme. For instance, in case of the<br />
4.8 kbps mode of MIL-STD188-110B Appendix C [4] the original labeling is given<br />
by a Gray labeling. The left part of Figure 1 shows the corresponding example. In this<br />
paper, when designing the labelings for the 32-QAM schemes we restrict ourselves<br />
to the case in which the labeling of the base-layer is part of the overall labels. For<br />
the given example considered here that means that the Gray labeling of the 8-PSK<br />
scheme determines the three leftmost bits in the overall five bit long labels for the<br />
32-QAM schemes. Taking this restriction into account yields the Harmonic Mean<br />
values mentioned in the upper part of Table I. Obviously, the restriction results<br />
in significantly smaller Harmonic Mean d H values if compared to the free-running<br />
optimization approach. Consequently, the attainable performance gains will be<br />
significantly smaller. The corresponding SSP symbol labelings are shown in the<br />
center <strong>and</strong> in the right part of Figure 1.<br />
III. Simulation environment<br />
In the following, the pros <strong>and</strong> cons of considering hierarchical modulation<br />
in the porting process of legacy waveforms to SDRs shall be analyzed using a simulation<br />
example. For this purpose we use a simulation environment where the baselayer<br />
(i.e., the legacy system) resembles the 4.8 kbps mode of MIL-STD188-110B<br />
Appendix C [4].
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
179<br />
A block diagram for the simulation environment under consideration is shown<br />
in Figure 4.<br />
Figure 4. Block diagram of simulation environment with base-layer <strong>and</strong> enhancement-layer<br />
signal processing<br />
A. Base-layer<br />
In the 4.8 kbps mode of MIL-STD188-110B Appendix C the input data is at first<br />
encoded by a rate R = 1/2, constraint length L = 7 convolutional mother code with<br />
generator polynomial G = {171,133} 8 . Afterwards the codewords are punctured<br />
to R p = 3/4 using the puncturing pattern (1 1 1 0 0 1).<br />
The punctured codewords are block interleaved using one out of several possible<br />
interleaver sizes. The interleaver size is mainly determined by the maximum<br />
acceptable delay on the communication link <strong>and</strong> it must be a multiple i of 768 bits<br />
(with i = 1,3,9,18,36,72).<br />
In contrast to the original 4.8 kbps mode of MIL-STD188-110B Appendix C [4]<br />
in this paper we neglect aspects like scrambling or synchronization. We focus on<br />
an interleaver size of 6912 only, i.e. i = 9. Instead of a full tail-biting convolutional<br />
code we use a terminated convolutional code. Anyhow, we assume that none of these<br />
simplifications has a major impact on the relevance of our findings for an established<br />
real-world legacy system.<br />
B. Enhancement-layer<br />
Similar simulation settings are applied to the enhancement-layer. The only<br />
difference is that we have to take into account the lower number of bits which are<br />
transmitted on the enhancement-layer (only 2 bits instead of 3 bits are considered<br />
in the determination of modulation symbols). From that follows that the interleaver<br />
size in the enhancement-layer is 4608. It is designed as an S-r<strong>and</strong>om interleaver.<br />
C. Combination of base-layer <strong>and</strong> enhancement-layer<br />
After having determined the interleaved blocks of punctured codewords<br />
for the base-layer <strong>and</strong> the enhancement-layer, both data streams are multiplexed<br />
to a single data stream. As mentioned earlier, in this paper we restrict ourselves
180 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
to the case in which the 3 bits of the base-layer determine the three leftmost bits<br />
<strong>and</strong> in which the 2 bits of the enhancement-layer determine the two rightmost bits<br />
of the overall 5 bit long labels at each signal constellation point (see labeling<br />
in Figure 1).<br />
As transmission channel serves an Additive White Gaussian Noise (AWGN)<br />
channel with known E S /N O where E S determines the energy per modulation<br />
symbol <strong>and</strong> N O the power spectral density of the AWGN. At the receiving end<br />
of our simulation chain we apply the concept of BICM-ID independently to both,<br />
the base-layer <strong>and</strong> the enhancement-layer. Note, the behavior of a legacy radio<br />
is inherently included by decoding the base-layer without any BICM-ID iteration<br />
(i.e., no feedback loop in Figure 4).<br />
IV. Simulation results<br />
Table II summarizes all relevant cases which need to be considered during<br />
the evaluation.<br />
Table II. Relevant cases to be considered (TX: transmit; RX: Receive)<br />
Receiver<br />
Legacy Radio<br />
Software<br />
Defined Radio<br />
Legacy Radio<br />
TX: Base-Layer<br />
RX: Base-Layer<br />
TX: Base-Layer<br />
RX: Base- & Enhanc. Layer<br />
Transmitter<br />
Software Defined Radio<br />
TX: Base- & Enhancement-Layer<br />
RX: Base-Layer<br />
TX: Base- & Enhancement-Layer<br />
RX: Base- & Enhancement-Layer<br />
A. Legacy radio as receiver & arbitrary transmitter<br />
In a first experiment we want to analyze the performance for the cases in which<br />
a legacy radio acts as receiver. We can expect a reduced performance if we use an<br />
SDR as transmitter because of the adverse effects of the enhancement-layer.<br />
Figure 1 illustrates the reason for our expectation. The demodulator of a legacy<br />
system will make a decision for the most probable sector in the I/Q-plane. As an<br />
example the sector for the bit pattern 000 is highlighted in light-grey. This sector<br />
is exactly the same for all three cases, i.e. for a legacy radio transmitting the baselayer<br />
only (see leftmost plot in Figure 1) as well as for the star-shaped resp. diamondshaped<br />
SDR cases (see plots in the center <strong>and</strong> on the right of Figure 1). However,<br />
the Euclidean distance of the signal constellation points to the sector resp. decision<br />
boundaries becomes usually smaller for the SDR cases. Thus, a performance loss<br />
in terms of Bit Error Rate (BER) behavior has to be tolerated.<br />
Figure 5 shows the corresponding simulation results.
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
181<br />
Figure 5. Bit error rate performance of Legacy Receiver for Legacy resp. Software Defined<br />
Radio Transmitters<br />
As expected, it can be seen that the operator at the legacy radio will experience<br />
a performance loss of up to ~ 4 dB in E S /N O if a SDR with one of the 32-QAM<br />
schemes serves as transmitter. The star-shaped 32-QAM scheme behaves slightly<br />
better than the diamond-shaped 32-QAM scheme. One reason for this observation<br />
can be found in the fact that in the star-shaped 32-QAM scheme only the two<br />
signal constellation points on radii r * 1 <strong>and</strong> r * 2 exhibit a smaller distance to the sector<br />
resp. decision boundary than for the original 8-PSK scheme while in the diamondshaped<br />
32-QAM scheme these are three, namely the points on radii r ◊ <br />
1 <strong>and</strong> r 2<br />
r 3<br />
(cmp. to Figure 1).<br />
Notice, as mentioned earlier the behavior of a legacy receiver is inherently<br />
included in Figure 4 by decoding the base-layer without any BICM-ID iteration<br />
(i.e., no feedback loop). In addition, Figure 5 also shows for all three transmitters<br />
a second curve labeled Error-Free Feedback (EFF). These curves illustrate the best<br />
possible BER performance attainable in a BICM-ID system. For this purpose,<br />
during the simulation the values on the feedback loop are directly taken from the<br />
transmitter side. With this, they can be considered to be error-free. Obviously, due<br />
to the Gray labeling the perfor mance differences between the non-iterative legacy<br />
scheme as well as the error-free feedback bound are negligibly small.<br />
B. SDR as receiver & legacy radio as transmitter<br />
In this case the base-layer of the SDR receiver reveals a similar performance<br />
as the legacy receiver because the sector resp. decision boundaries are identical<br />
(cmp. to Figure 1). The only difference is that the additional interference/noise
182 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
being introduced by the enhancement-layer is not added at the transmitter of the<br />
communication link, but at the receiving end. The corresponding simulation results<br />
have already been presen ted in Figure 5. Since the transmitter was a legacy<br />
radio, there is no information on the enhancement-layer. Thus, decoding the<br />
enhancement-layer does not provide any benefit <strong>and</strong> can be skipped. The decision,<br />
if the enhancement-layer needs to be decoded, can be derived from the side information<br />
whether transmitter is a legacy radio or an SDR. We assume that this side<br />
information can be provided to all radio operators once in advance, e.g. during the<br />
network planning/management phase.<br />
C. SDR as receiver & SDR as transmitter<br />
Last but not least, we consider the case using an SDR on both ends of the<br />
communication link. Figure 6 shows the corresponding simulation results.<br />
Figure 6. BER performance of SDR receiver for SDR transmitter<br />
As a reference we also plotted a copy of the BER curve for the case where we<br />
have legacy systems on both ends. In order to allow a fair comparison between all<br />
curves they are plotted as a function of the mean energy E B per user data bit. As<br />
a consequence the BER curve for the legacy system shown in Figure 5 is shifted by<br />
10 • log 10 (4 / 3 • 1 / 3) = –3.52 dB to the left (w.r.t. the punctured code rate R p<br />
<strong>and</strong> number of bits per symbol). Since we transmit in total 5 bits per symbol<br />
using the SDR modes, all the other curves include a shift to the left by<br />
10 • log 10 (4 / 3 • 1 / 5) = –5.74 dB.<br />
Figure 6 shows two sets of simulation results, one for the star-shaped 32-QAM<br />
scheme <strong>and</strong> one for the diamond-shaped 32-QAM scheme. Each set contains BER
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
183<br />
curves for different numbers of iteration I = 0,1,5,10 <strong>and</strong> for error-free feedback.<br />
It can easily be seen that performance improvements are possible by iterations for<br />
both sets. In addition, the diamond-shaped 32-QAM scheme outperforms the starshaped<br />
32-QAM scheme thanks to the better properties mentioned in Section II.B.<br />
However, it can also be seen that due to the restrictions in the design of both<br />
schemes, there is still a considerable gap to the reference curve. The SDR modes<br />
perform even worse than the original 8.0 kbps mode of MIL-STD188-110B<br />
Appendix C [4] which also allows transmitting 5 bit per symbol.<br />
Note, the simulation results for both 32-QAM schemes reveal a plateau at a BER<br />
of 0.2. The reason for this plateau can be found in the fact that the plotted BER<br />
curves show the mean BER for the base-layer <strong>and</strong> the enhancement-layer. Since the<br />
base-layer is more robust than the enhancement-layer, the three bits transmitted<br />
on the base-layer exhibit a much better BER performance than the two bits on the<br />
enhancement-layer. Thus, in this range of E B /N 0, where the plateau appears, the<br />
mean BER can be approximated by 2 / 5 • 0.5 = 0.2.<br />
V. Next steps in our ongoing research activity<br />
In the preceding sections the basic idea, the design, <strong>and</strong> some first results of our<br />
ongoing research activity have been described. Unfortunately, these first results<br />
show that with the given restrictions in the design of the 32-QAM schemes no<br />
added value, in terms of data throughput, can be offered to the operator at the SDR.<br />
A. Improved robustness<br />
Anyways, in parallel we already started some investigations if an improved<br />
robustness (<strong>and</strong> with this maybe communication range) can be offered as added<br />
value, e.g., by transmitting extra error protection information on the enhancementlayer.<br />
For instance, we can transmit the parity check information which had been<br />
eliminated from the coded data stream by puncturing.<br />
Figure 7 shows a first exemplary simulation result where we use a rate 9/20<br />
FEC code in combination with the 32-QAM scheme instead of the rate 3/4 code<br />
<strong>and</strong> the 8-PSK scheme. The effective ratio of data bits carried in each modulation<br />
symbol remains the same, while at the same time interoperability to the legacy<br />
system remains preserved.<br />
The simulation results in Figure 7 show that thanks to the stronger error<br />
protection scheme an added value in terms of higher robustness can be provided<br />
to the SDR operator. A single iteration is sufficient to provide a gain if compared<br />
to the legacy 8-PSK scheme. After 5 Iterations gains of more than 3 dB in E S /N O<br />
can be realized.<br />
A more detailed analysis of this case is beyond the scope of this paper <strong>and</strong><br />
will be presented in [8].
184 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 7. BER performance of robust SDR schemes transmitting extra error protection<br />
information on the enhancement-layer<br />
B. Further potentials for improvement<br />
In addition, we see some aspects which offer the potential for improvement<br />
of both usages of the enhancement layer, either for the higher throughput or the<br />
higher robustness.<br />
Currently, the design of the Multiplexer resp. De-Multiplexer shown in Figure 4<br />
reveals some limiting restrictions. The Multiplexer combines the data streams of the<br />
base-layer <strong>and</strong> the enhancement-layer to a single data stream by simply combining<br />
the 3 bit resp. 2 bit patterns to a single 5 bit long label. As a consequence, the<br />
BICM-ID decoders for the base-layer as well as the enhancement-layer shown<br />
in Figure 4 run strictly in parallel <strong>and</strong> cannot benefit from each other. In addition,<br />
from the current Multiplexer design it follows that the Harmonic Mean d H of the<br />
restricted SSP optimization is substantially smaller than the d H of a free-running<br />
SSP optimization (see Table I). A more sophisticated Multiplexer/Combiner might<br />
provide higher Harmonic Mean d H values <strong>and</strong> it might support a joint decoding<br />
approach of both layers.<br />
Figure 8 shows a simulation using the free-running SSP labeling. This simulation<br />
can be considered as an upper practical performance bound for an alternative<br />
Multiplexer/ Combiner design. Obviously, significant performance gains can be<br />
realized if compared the preceding simulations using the restricted SSP labeling.<br />
As a next step of our ongoing research activity, we will analyze how to design<br />
an alternative Multiplexer/Combiner which comes closer to the practical bound.<br />
In addition, we will investigate how close this practical performance bound can<br />
be approached.
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
185<br />
Figure 8. BER performance of SDR Receiver for SDR transmitter with an optimal SSP<br />
symbol labeling<br />
VI. Conclusions<br />
In this paper, we analyzed if an added value can be provided to an SDR<br />
operator using an enhanced legacy waveform. For this purposes the concept<br />
of hierarchical modulations has been applied in the porting process. The original<br />
legacy waveform is represented as the base-layer. The focus of the present paper<br />
has been to present the basic idea, the major design considerations as well as some<br />
first simulation results. Unfortunately, these results have shown that due to some<br />
restrictions in the design process no gains in terms of data throughput can be<br />
realized. However, an outlook on an ongoing research activity has been given<br />
which allows providing a significant gain in terms of robustness. More details<br />
will follow in a complementing paper [8].<br />
Finally, with respect to the original question being raised in the title of this<br />
paper, we conclude: partially yes, applying hierarchical modulations in the<br />
porting process of legacy waveforms allows realizing an improved robustness.<br />
We also see a potential for providing a higher throughput, but, however, so far<br />
we have not been able to exploit the additional capacity of the enhancementlayer<br />
to realize this.
186 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
References<br />
[1] J. Leduc, M. Adrat, M. Antweiler, H. Elders-Boll, „Legacy Waveforms on Software<br />
Defined Radios: Benefits of Advanced Digital Signal Processing“, in Proc. of NATO<br />
RTO <strong>Information</strong> Systems <strong>Technology</strong> Panel Symposium (IST – 092 / RSY – 022),<br />
Breslau (Pol<strong>and</strong>), Sept. 2010.<br />
[2] X. Li <strong>and</strong> J.A. Ritcey, “Bit Interleaved Coded Modulation with Iterative Decoding”,<br />
IEEE <strong>Communications</strong> Letters, pages 169-171, May 1998.<br />
[3] X. Li, A. Chindapol <strong>and</strong> J.A. Ritcey, ”Bit-Interleaved Coded Modulation with<br />
Iterative Decoding <strong>and</strong> 8-PSK Signalling”, IEEE Transactions on <strong>Communications</strong>,<br />
pp. 1250-1257, August 2002.<br />
[4] U.S. DoD Interface St<strong>and</strong>ard MIL-STD-188-110B “Interoperability <strong>and</strong> Performance<br />
St<strong>and</strong>ards for Data Modems”, App. B, April 2000.<br />
[5] NATO <strong>Military</strong> Agency for St<strong>and</strong>ardization (MAS), “STANAG 4285: Characteristics<br />
of 1200/2400/3600 Bits Per Second Single Tone Modulators/Demodulators for HF<br />
Radio Links”.<br />
[6] A. Seeger, "A new Signal Constellation for the Hierarchical Transmission of Two<br />
equally sized data streams" in Proc. IEEE ISIT, p. 169, Ulm, Germany, June 1997.<br />
[7] L. Bahl, J. Cocke, F. Jelinek, <strong>and</strong> J. Raviv, ”Optimal decoding of linear codes for<br />
minimizing symbol error rate”, IEEE Transactions on <strong>Information</strong> Theory, vol. 20,<br />
no. 2, pp. 284-287, 1974.<br />
[8] M. Adrat, T. Osten, J. Leduc, M. Antweiler, H. Elders-Boll, “Can an Added Value<br />
be offered to SDR Operators in Scenarios where Interoperability to Legacy Radios<br />
is a Requirement” submitted to Technical Conference of the Wireless Innovation<br />
Forum SDR’12, Washington, Jan. 2013.
Data Fusion Schemes for Cooperative Spectrum<br />
Sensing in Cognitive Radio Networks<br />
Djamel Teguig 1, 2 , Bart Scheers 1 , Vincent Le Nir 1<br />
1 Royal <strong>Military</strong> Academy – Department CISS,<br />
2<br />
Polytechnic <strong>Military</strong> School-Algiers-Algeria,<br />
Renaissance Avenue 30-B1000 Brussels, Belgium,<br />
{djamel.teguig, bart.scheers}@rma.ac.be, vincent.lenir@elec.rma.ac.be<br />
Abstract: Cooperative spectrum sensing has proven its efficiency to detect spectrum holes in cognitive<br />
radio network (CRN) by combining sensing information of multiple cognitive radio users. In this<br />
paper, we study different fusion schemes that can be implemented in fusion center. Simulation comparison<br />
between these schemes based on hard, quantized <strong>and</strong> soft fusion rules are conducted. It is shown<br />
through computer simulation that the soft combination scheme outperforms the hard one at the cost<br />
of more complexity; the quantized combination scheme provides a good tradeoff between detection<br />
performance <strong>and</strong> complexity. In the paper, we also analyze a quantized combination scheme based on<br />
a tree-bit quantization <strong>and</strong> compare its performance with some hard <strong>and</strong> soft combination schemes.<br />
Keywords: Cooperative spectrum sensing, cognitive radio (CR), data fusion, soft, quantized <strong>and</strong><br />
hard fusion rules<br />
I. Introduction<br />
In recent years, the dem<strong>and</strong> of spectrum is rapidly increasing with the growth<br />
of wireless services. The scarcity of the spectrum resource becomes more serious.<br />
Cognitive radio provides a new way to better use the spectrum resource [1]. Therefore,<br />
a reliable spectrum sensing technique is needed. Energy detection exhibits<br />
simplicity <strong>and</strong> serves as a practical spectrum sensing scheme. As a key technique<br />
to improve the spectrum sensing for Cognitive Radio Network (CRN), cooperative<br />
sensing is proposed to combat some sensing problems such as fading, shadowing,<br />
<strong>and</strong> receiver uncertainty problems [2].<br />
The main idea of cooperation is to improve the detection performance by<br />
taking advantage of the spatial diversity, in order to better protect a primary user,<br />
<strong>and</strong> reduce false alarm to utilize the idle spectrum more efficiently.<br />
The three steps in the cooperative sensing process are [3]:<br />
1. The fusion center FC selects a channel or a frequency b<strong>and</strong> of interest for<br />
sensing <strong>and</strong> requests all cooperating CR users to individually perform local<br />
sensing.
188 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
2. All cooperating CR users report their sensing results via the control<br />
channel.<br />
3. Then the FC fuses the received local sensing information to decide about<br />
the presence or absence of signal <strong>and</strong> reports back to the CR users.<br />
As shown in Fig. 1, CR3 suffers from the receiver uncertainty problem because<br />
it is located outside the transmission range of primary transmitter <strong>and</strong> it is unaware<br />
of the existence of primary receivers. So, transmission from CR3 can interfere with<br />
the reception at a primary receiver. CR2 suffers from multipath <strong>and</strong> shadowing<br />
caused by building <strong>and</strong> trees. Cooperative spectrum sensing can help to solve these<br />
problems if secondary users cooperate by sharing their information.<br />
Figure 1. Sensing problems (receiver uncertainty, multipath <strong>and</strong> shadowing)<br />
To implement these three steps, seven elements of cooperative sensing are<br />
presented [4] as illustrated in Fig. 2.<br />
Figure 2. Elements of cooperative spectrum sensing [4]
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
189<br />
• Cooperation models: is concerned with how CR users cooperate to perform<br />
sensing.<br />
• Sensing techniques: this element is crucial in cooperative spectrum sensing<br />
to sense primary signals by using signal processing techniques.<br />
• Hypothesis testing: in order to decide on the presence or absence of a primary<br />
user (PU), a statistical test is performed to get a decision on the presence of PU.<br />
• Control channel <strong>and</strong> reporting: is used by CR users to report sensing result<br />
to the FC.<br />
• Data fusion: is a process of combining local sensing data to make cooperation<br />
decision.<br />
• User selection: in order to maximize the cooperative gain, this element provides<br />
us the way to optimally select the cooperating CR users.<br />
• Knowledge base: means a prior knowledge included PU <strong>and</strong> CR user location,<br />
PU activity, <strong>and</strong> models or other information in the aim to facilitate<br />
PU detection.<br />
In this paper, we will focus on the data fusion rules. The decision on the presence<br />
of PU is achieved by combining all individual sensing information of local CR<br />
users at a central (FC) using various fusion schemes. These schemes can be classified<br />
as hard decision fusion, soft decision fusion, or quantized (softened hard) decision.<br />
The hard decision is the one in which the CR users make a one-bit decision<br />
regarding the existence of the PU, this 1-bit decision will be forwarded to the FC<br />
for fusion. In [5], a logic OR fusion rule for hard-decision combining is presented<br />
for cooperative spectrum sensing. In [6], two simple schemes of hard decision combining<br />
are studied: the OR rule <strong>and</strong> the AND rule. In [7]-[8], another sub-optimal<br />
hard decision scheme is used called Counting Rule. In [9] that half-voting rule<br />
is shown as the optimal hard decision fusion rule in cooperative sensing based on<br />
energy detection. In the case of soft decision, CR users forward the entire sensing<br />
result to the center fusion without performing any local decision. In [10] a soft<br />
decision scheme is described by taking linear combination of the measurements<br />
of the various cognitive users to decide between the two hypotheses. However, in [11]<br />
collaborative detection of TV transmissions is studied while using soft decision<br />
using the likelihood ratio test. It is shown that soft decision combining for spectrum<br />
sensing achieves more precise detection than hard decision combining. This<br />
was confirmed in [12] when performing Soft decision combination for cooperative<br />
sensing based on energy detection. Some soft combining techniques are discussed<br />
in [13-14-15] as square-law combining (SLC), equal gain combining (EGC) <strong>and</strong><br />
square-law selection (SLS) over AWGN, Rayleigh <strong>and</strong> Nakagami-m channel.<br />
The paper is organized as follows. We present in Section II the system model<br />
related to cooperative spectrum sensing. In Section III, we describe different fusion<br />
rules for cooperative spectrum sensing; several hard, soft <strong>and</strong> quantized schemes<br />
are proposed <strong>and</strong> discussed. Simulation results in section IV are given to compare<br />
these fusion rules. We conclude this paper in Section V.
190 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
II. System model<br />
Consider a cognitive radio network, with K cognitive users (indexed by<br />
k = {1, 2 ... K}) to sense the spectrum in order to detect the existence of the PU.<br />
Suppose that each CR performs local spectrum sensing independently by using N<br />
samples of the received signal. The spectrum sensing problem can be formulated<br />
as a binary hypothesis testing problem with two possible hypothesis H 0 <strong>and</strong> H 1 .<br />
H : xk( n) wk( n)<br />
(1)<br />
H : x( n) hsn ( ) w ( n)<br />
k k k<br />
Where s(n) are samples of the transmitted signal (PU signal), wk<br />
( n ) is the receiver<br />
noise for the k th CR user, which is assumed to be an i.i.d. r<strong>and</strong>om process with zero<br />
mean <strong>and</strong> variance σ 2 n <strong>and</strong> h k is the complex gain of the channel between the PU <strong>and</strong><br />
the k th CR user. H 0 <strong>and</strong> H 1 represent whether the signal is absent or present respectively.<br />
Using energy detector, the k th CR user will calculate the received energy as [16]:<br />
N<br />
E x ( n)<br />
(2)<br />
k<br />
In the case of soft decision, each CR user forwards the entire energy result<br />
E k to the FC. However, for hard decision, the CR users make the one-bit decision<br />
given by Δ k, by comparing the received energy E k with a predefined threshold λ k .<br />
1,<br />
Ek<br />
k<br />
k<br />
<br />
(3)<br />
0, otherwise<br />
Detection probability P d,k <strong>and</strong> false alarm probability P f,k of the CR user k<br />
are defined as:<br />
P d,k = Pr {Δ k = 1|H 1 } = Pr {E k > λ k |H 1 }<br />
P f,k = Pr {Δ k = 1|H 0 } = Pr {E k > λ k |H 0 }<br />
Assuming that λ k = λ for all CR users, the detection probability, false alarm<br />
probability <strong>and</strong> miss detection P m,k over AWGN channels can be expressed as follows<br />
respectively [17]<br />
Pdk<br />
,<br />
Qm( 2 , )<br />
(4)<br />
( m, / 2)<br />
Pf , k ( m)<br />
(5)<br />
P<br />
k<br />
1 P<br />
(6)<br />
mk , dk ,<br />
where γ is the signal to noise ratio (SNR), m = TW is the time b<strong>and</strong>width product,<br />
Q N (.,.) is the generalized Marcum Q-function, Г(.) <strong>and</strong> Г(.,.) are complete <strong>and</strong><br />
incomplete gamma function respectively.
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
191<br />
III. Fusion rules<br />
This section describes the fusion rules that are used for the comparison.<br />
III.1. Hard decision fusion<br />
In this scheme, each user decides on the presence or absence of the primary<br />
user <strong>and</strong> sends a one bit decision to the data fusion center. The main advantage<br />
of this method is the easiness the fact that it needs limited b<strong>and</strong>width [12]. When<br />
binary decisions are reported to the common node, three rules of decision can be<br />
used, the “<strong>and</strong>”, “or”, <strong>and</strong> majority rule. Assume that the individual statistics Δ k<br />
are quantized to one bit with Δ k = 0, 1; is the hard decision from the k th CR user.<br />
1 means that the signal is present, <strong>and</strong> 0 means that the signal is absent.<br />
The AND rule decides that a signal is present if all users have detected a signal.<br />
The cooperative test using the AND rule can be formulated as follows:<br />
H<br />
H<br />
K<br />
<br />
otherwise<br />
(7)<br />
The OR rule decides that a signal is present if any of the users detect a signal.<br />
Hence, the cooperative test using the OR rule can be formulated as follows:<br />
K<br />
H : 1<br />
H<br />
k<br />
k<br />
: otherwise<br />
The third rule is the voting rule that decides on the signal presence if at<br />
least M of the K users have detected a signal with 1≤ M ≤ K. The test is formulated<br />
as:<br />
(8)<br />
H<br />
H<br />
M<br />
<br />
otherwise<br />
(9)<br />
A majority decision is a special case of the voting rule for M = K/2, the same<br />
as the AND <strong>and</strong> the OR rule which are also special cases of the voting rule for<br />
M = K <strong>and</strong> M = 1 respectively.
192 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Cooperative detection probability Q d <strong>and</strong> cooperative false alarm probability<br />
Q f are defined as:<br />
K<br />
<br />
<br />
Qd<br />
Pr1 H1Prk<br />
MH<br />
1<br />
<br />
i1<br />
<br />
(10)<br />
K<br />
<br />
Qf<br />
Pr<br />
1 H0<br />
Pr <br />
k MH0<br />
<br />
<br />
i1<br />
<br />
Where Δ is the final decision. Note that the OR rule corresponds to the case M = 1,<br />
hence<br />
K<br />
Qd , or<br />
1 (1 Pd , k<br />
)<br />
(11)<br />
Q<br />
k1<br />
1 (1 )<br />
(12)<br />
K<br />
f , or<br />
P<br />
k1<br />
f , k<br />
The AND rule can be evaluated by setting M = K.<br />
K<br />
Q P<br />
(13)<br />
Q<br />
d , <strong>and</strong><br />
k1<br />
d , k<br />
(14)<br />
K<br />
f , <strong>and</strong><br />
P<br />
k1<br />
f , k<br />
III.2. Soft data fusion<br />
In soft data fusion, CR users forward the entire sensing result E k to the center<br />
fusion without performing any local decision <strong>and</strong> the decision is made by combining<br />
these results at the fusion center by using appropriate combining rules such<br />
as square law combining (SLC), maximal ratio combining (MRC) <strong>and</strong> selection<br />
combining (SC). Soft combination provides better performance than hard combination,<br />
but it requires a larger b<strong>and</strong>width for the control channel [18]. It also<br />
generates more overhead than the hard combination scheme [12].<br />
Square Law Combining (SLC): SLC is one of the simplest linear soft combining<br />
schemes. In this method the estimated energy in each node is sent to the center<br />
fusion where they will be added together. Then this summation is compared to<br />
a threshold to decide on the existence or absence of the PU <strong>and</strong> a decision statistic<br />
is given by [19]:<br />
E E<br />
(15)<br />
slc<br />
where E k denotes the statistic from the k th CR user. The detection probability <strong>and</strong><br />
false alarm probability are formulated as follow [19]:<br />
k<br />
k
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
193<br />
Qd , SLC<br />
QmK ( 2 slc<br />
, )<br />
(16)<br />
Q<br />
f , SLC<br />
( mK, / 2)<br />
(17)<br />
( mK)<br />
Where slc k<br />
<strong>and</strong> γ k is the received SNR at k th CR user.<br />
k<br />
Maximum Ratio Combining (MRC): the difference between this method<br />
<strong>and</strong> the SLC is that in this method the energy received in the center fusion from<br />
each user is ponderated with a normalized weight <strong>and</strong> then added. The weight<br />
depends on the received SNR of the different CR user. The statistical test for this<br />
scheme is given by:<br />
E<br />
wE<br />
(18)<br />
mrc k k<br />
k<br />
Over AWGN channels, the probabilities of false alarm <strong>and</strong> detection under<br />
the MRC diversity scheme can be given by [21]:<br />
Qd , MRC<br />
Qm( 2 mrc<br />
, )<br />
(19)<br />
<br />
Where: mrc k<br />
k<br />
Q<br />
f , MRC<br />
( m, / 2)<br />
(20)<br />
( m)<br />
Selection Combining (SC): in the SC scheme, the fusion center selects<br />
the branch with highest SNR [20].<br />
max( , ,....., )<br />
sc<br />
Over AWGN channels, the probabilities of false alarm <strong>and</strong> detection under<br />
the SC diversity scheme can be written as [21]:<br />
Qd , SC<br />
Qm( 2 sc<br />
, )<br />
(21)<br />
Q<br />
f , SC<br />
1 2<br />
K<br />
( m, / 2)<br />
(22)<br />
( m)<br />
III.3. Quantized data fusion<br />
In this scheme, we try to realize a tradeoff between the overhead <strong>and</strong> the detection<br />
performance. Instead of one bit hard combining, where there is only one
194 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
threshold dividing the whole range of the detected energy into two regions, a better<br />
detection performance can be obtained if we increase the number of threshold to<br />
get more regions of observed energy.<br />
In [12], a two-bit hard combining scheme is proposed in order to divide<br />
the whole range of the detected energy into four regions. The presence of the signal<br />
of interest is decided at the FC by using the following equation:<br />
wn<br />
i i<br />
L<br />
(23)<br />
i<br />
where L is the threshold <strong>and</strong> it is equal to the weight of the upper region,<br />
n i is the number of observed energies falling in region i <strong>and</strong> w i is the weight value<br />
of region i with w 0 = 0 w 1 = 1, w 2 = 2 <strong>and</strong> w 3 = 4.<br />
In this paper, we extend the scheme of [12] to a three-bit combining scheme.<br />
In the three-bit scheme, seven threshold λ 1 , λ 2 … <strong>and</strong> λ 7 , divide the whole range<br />
of the statistic into 8 regions, as depicted in Fig. 3. Each CR user forwards 3 bit of information<br />
to point out the region of the observed energy. Nodes that observe higher<br />
energies in upper regions will forward a higher value than nodes observing lower<br />
energies in lower regions.<br />
The three-bits combining scheme is performed in four steps:<br />
1: Define a quantization threshold λ i (i = 1 ... 7) for each region according to<br />
the maximal received energy of the signal.<br />
Figure 3. Principle of three-bit hard combination scheme<br />
2: Each user makes a local decision by comparing the received energy with<br />
the thresholds predefined in 1, <strong>and</strong> sends 3-bits information to the FC.<br />
3: The FC sums the local decisions ponderated with weights w i (i = 0.., 7).<br />
In our case, we have taken: w 0 = 0, w 1 = 1, w 2 = 2, w 3 = 3, w 4 = 4, w 5 = 5,<br />
w 6 = 6, w 7 = 7.<br />
4: The final decision is made by comparing this sum with a threshold L.<br />
wik<br />
L<br />
(24)<br />
k
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
195<br />
IV. Simulations <strong>and</strong> results<br />
In this section we study the detection performance of our scheme through<br />
simulations, <strong>and</strong> compare its performances with soft <strong>and</strong> hard fusion schemes.<br />
First, we present the performance of the hard combining schemes as depicted<br />
in Fig. 4. Secondly, we will compare the performance of the different fusion rules<br />
in case of soft combining. Next, the two-bit <strong>and</strong> the three-bit quantized schemes<br />
are compared in term of detection performance.<br />
For the hard decision, we present in Fig. 4 the ROC curves of the ‘AND’ <strong>and</strong><br />
the ‘OR’ rule, <strong>and</strong> compare it to the detection performance of a single CR user. For<br />
the simulations, we consider 3 CR users. Each user has a SNR of –2 db. As shown<br />
in Fig. 4, the OR rule has better detection performance than the AND rule, which<br />
provides slightly better performance at low Pfa than the OR, because the data fusion<br />
center decide in favor of H1 when at least one CR user detects the PU signal.<br />
However in the AND rule, to decide of the presence of a primary user, all CR users<br />
must detect the PU signal.<br />
Figure 4. ROC for the hard fusion rules under AWGN channel, SNR = –2 dB, K = 3 users,<br />
<strong>and</strong> energy detection with N = 1000<br />
Fig. 5 shows the ROC curves of different soft combination schemes discussed<br />
in section III.2 under AWGN channel. For the simulations, each CR user sees a different<br />
SNR. We observe from this figure that the MRC scheme exhibits the best<br />
detection performance, but it requires channel state information. The SLC scheme<br />
does not require any channel state information <strong>and</strong> still present better performance<br />
than SC. When no channel information is available, the best scheme is SLC.
196 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 5. ROC for soft fusion rules under AWGN channel with K = 3 users,<br />
<strong>and</strong> energy detection with m = 5<br />
Fig. 6 shows the ROC curves for quantized data fusion with 2-bit <strong>and</strong><br />
3-bit quantized combination, the figure indicates that the proposed 3-bit combination<br />
scheme shows much better performance than the 2-bit combination scheme<br />
at the cost of one more bit of overhead for each CR user, this scheme can achieve<br />
a good tradeoff between detection performance <strong>and</strong> overhead.<br />
Figure 6. ROC curves for quantized data fusion under AWGN channel with SNR = –2 db,<br />
K = 4 users <strong>and</strong> N = 1000 samples
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
197<br />
For comparison, we show in Fig. 7 the ROC curves for the different fusion<br />
rules under AWGN channel. As the figure indicates, all fusions method outperform<br />
the single node sensing, the soft combining scheme based on SLC rule<br />
outperforms the hard <strong>and</strong> quantized combination at the cost of control channel<br />
overhead, the 3-bit quantized combination scheme shows a comparable detection<br />
performance with the SLC, with less overhead.<br />
Figure 7. ROC for combining fusion rules under AWGN channel with K = 3 users, SNR = –2 db<br />
<strong>and</strong> energy detection with N = 1000 samples<br />
V. Conclusion<br />
In this paper, the effect of fusion rules for cooperative spectrum sensing is investigated.<br />
It is shown that the soft fusion rules outperform the hard fusion rules.<br />
However, these benefits are obtained at the cost of a larger b<strong>and</strong>width for the control<br />
channel. The hard fusion rules occur with less complexity, but also with a lower<br />
detection performance than soft combination schemes. The proposed quantized<br />
three-bit combination scheme wins advantage of the soft <strong>and</strong> the hard decisions<br />
schemes with a tradeoff between overhead <strong>and</strong> detection performance. In practical<br />
application, we can select an appropriate method of data fusion <strong>and</strong> decision algorithms<br />
according to the requirement of detection performance <strong>and</strong> the requirement<br />
of the available b<strong>and</strong>width for the reporting channel.
198 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
References<br />
[1] S. Haykin, “Cognitive radio: Brain-empowered wireless communications”, IEEE<br />
Journal Selected Areas in <strong>Communications</strong>, vol. 23, no. 2, Feb.2005, pp. 201-220.<br />
[2] T. Yucek & H. Arslan, A. Survey of Spectrum Sensing Algorithms for Cognitive<br />
Radio Application, IEEE <strong>Communications</strong> Surveys & Tutorials, 11(1), First Quarter<br />
2009.<br />
[3] D. Cabric, S. Mishra, R. Brodersen, Implementation issues in spectrum sensing<br />
for cognitive radios, in: Proc. of Asilomar Conf. on Signals, Systems, <strong>and</strong> Computers,<br />
vol. 1, 2004, pp. 772-776.<br />
[4] I.F. Akyildiz, B.F. Lo, <strong>and</strong> R. Balakrishnan, “Cooperative Spectrum Sensing<br />
in Cognitive Radio Networks: A Survey,” Physical Communication (Elsevier) Journal,<br />
vol. 4, no. 1, pp. 40-62, March 2011.<br />
[5] A. Ghasemi, E. Sousa, Collaborative Spectrum Sensing for Opportunistic Access<br />
in Fading Environments. DySPANn 2005, pp. 131-136, Nov. 2005.<br />
[6] E. Peh, Y.-Ch. Liang, Optimization for Cooperative Sensing in Cognitive Radio<br />
Networks, WCNC 11-15, pp. 27-32, March 2007.<br />
[7] Jayakrishnan Unnikrishnan <strong>and</strong> Venugopal V. Veeravalli, Cooperative Spectrum<br />
Sensing <strong>and</strong> Detection for Cognitive Radio, IEEE GLOBCOM 26-30 Nov. 2007,<br />
pp. 2972-2976.<br />
[8] T. Jiang, D. Qu, “On minimum sensing error with spectrum sensing using counting<br />
rule in cognitive radio networks,” in Proc. 4th Annual Int. Conf.Wireless Internet<br />
(WICON’08), Brussels, Belgium, 2008, pp. 1-9.<br />
[9] W. Zhang, R. Mallik, <strong>and</strong> K. Letaief, “Cooperative spectrum sensing optimization<br />
in cognitive radio networks,” in Proc. IEEE Int. Conf.Commun., 2008, pp. 3411-3415.<br />
[10] Zhi Quan, Shuguang Cui, <strong>and</strong> Ali H. Sayed, Optimal Linear Cooperation for Spectrum<br />
Sensing in Cognitive Radio Networks, IEEE Journal of Selected Topics in Signal.<br />
[11] E. Visotsky, S. Kuffner, <strong>and</strong> R. Peterson, “On collaborative detection of TV<br />
transmissions in support of dynamic spectrum sharing,” in Proc. 1st IEEE Int. Symp.<br />
New Frontiers in Dynamic Spectrum Access Netw. (DySPAN), pp. 338-345, 2005.<br />
[12] J. Ma <strong>and</strong> Y. Li, “Soft combination <strong>and</strong> detection for cooperative spectrum<br />
sensing in cognitive radio networks,” in Proc. IEEE Global Telecomm. Conf., 2007,<br />
pp. 3139-3143.<br />
[13] S.P. Herath, N. Rajatheva, C. Tellambura, “On the Energy Detection of Unknown<br />
Deterministic Signal over Nakagami Channel with Selection Combining,” Proc. IEEE<br />
Symp. CCECC ’09 Canadian conference on. pp. 745-749, 2009.<br />
[14] S.P. Herath, N. Rajatheva, “Analysis of equal gain combining in energy detection<br />
for cognitive radio over Nakagami channels,” IEEE. GLOBECOM 2008, pp. 1-5, 2008.<br />
[15] Yunxue Liu, Dongfeng Yuan, et al., “Analysis of square-law combining for<br />
cognitive radios over Nakagami channels,” WiCom’09 5th International Conference<br />
on, pp. 1-4, 2009.<br />
[16] V.I. Kostylev, Energy detection of a signal with r<strong>and</strong>om amplitude, In Proc. IEEE<br />
ICC, pp. 1606-1610, New York, Apr. 2002.<br />
[17] Fadel F. Digham, Mohamed-Slim Alouni, Marvin K. Simon, “On the energy<br />
detection of unknown signals over fading channels,” IEEE. Trans. Commun., vol. 55,<br />
pp. 21-24, Jan. 2007.
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
199<br />
[18] Zhi Quan, Shuguang Cui, H. Vincent Poor, <strong>and</strong> Ali H. Sayed, “Collaborative<br />
wideb<strong>and</strong> sensing for cognitive radios,” IEEE Signal Processing Magazine, vol. 25,<br />
no. 6, pp. 63-70, 2008.<br />
[19] Zhengquan Li, Peng Shi, Wanpei Chen, Yan Yan, “Square Law Combining Double<br />
threshold Energy Detection in Nakagami Channel”, Internation Journal of Digital<br />
Content <strong>Technology</strong> <strong>and</strong> its Application, vol. 5, Number 12, December 2011.<br />
[20] M.K. Simon <strong>and</strong> M.-S. Alouini, Digital communication over fading channels. John<br />
Wiley & Sons, Inc., 2 ed., Dec. 2004.<br />
[21] Hongjian Sun, Collaborative Spectrum Sensing in Cognitive Radio Networks.<br />
A doctoral thesis of Philosophy. The University of Edinburgh. January 2011.
Implementation of an Adaptive OFDMA PHY/MAC<br />
on USRP Platforms for a Cognitive Tactical<br />
Radio Network<br />
Vincent Le Nir, Bart Scheers<br />
Department Communication, <strong>Information</strong>, Systems <strong>and</strong> Sensors (CISS),<br />
Royal <strong>Military</strong> Academy (RMA), 30, Avenue de la Renaissance, B-1000 Brussels, Belgium,<br />
{vincent.lenir, bart.scheers}@rma.ac.be<br />
Abstract: Cognitive radio is envisioned to solve the problem of spectrum scarcity in military networks<br />
<strong>and</strong> to autonomously adapt to rapidly changing radio environment conditions <strong>and</strong> user needs.<br />
Dynamic spectrum management techniques are needed for the coexistence of multiple cognitive<br />
tactical radio networks. Previous work has investigated the iterative water-filling algorithm (IWFA)<br />
as a possible c<strong>and</strong>idate to improve the coexistence of such networks. It has been shown that adding<br />
a constraint on the number of transmitter’s sub-channels improves the convergence of IWFA. In this<br />
paper, we propose an adaptive orthogonal frequency division multiple access (OFDMA) physical<br />
(PHY) <strong>and</strong> medium access control (MAC) for the coexistence of multiple cognitive tactical radio networks.<br />
The proposed scheme is implemented on universal software radio peripheral (USRP) platforms<br />
using Qt4/IT++ <strong>and</strong> the USRP hardware driver (UHD) application programming interface (API).<br />
Keywords: Cognitive radio; adaptive OFDMA; distributed bit <strong>and</strong> power allocation; USRP<br />
I. Introduction<br />
Cognitive radio (CR) has been introduced by Mitola as an extension of software<br />
radio. In this technology, radio nodes are intelligent agents that search out<br />
ways to deliver services according to the user needs <strong>and</strong> the radio environment [1].<br />
CR has been an active topic of research since most regulatory bodies found that<br />
the spectrum is underutilized although most available spectrum is licensed, leaving<br />
small room for future wireless applications [2].<br />
CR can also solve the problem of spectrum scarcity for military networks.<br />
As the electro-magnetic environment in an operational theater can be very hostile,<br />
cognitive tactical radio networks can autonomously adapt to rapidly changing<br />
conditions <strong>and</strong> user needs [3].<br />
The coexistence of cognitive tactical radio networks requires dynamic spectrum<br />
management techniques in order to reduce the interference <strong>and</strong> to improve the performance<br />
in terms of throughput, power (longer battery life), <strong>and</strong> delay. Dynamic spectrum
202 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
management techniques can be centralized/distributed (decisions are made centrally/<br />
locally), cooperative/non-cooperative (some information is shared/not shared between<br />
networks), <strong>and</strong> can use a horizontal/vertical sharing model (all networks have equal/<br />
limited rights to access the spectrum) [4]. Our target application for the coexistence<br />
of cognitive tactical radio networks corresponds to a mission involving multiple coalition<br />
nations in a foreign country with no a priori frequency planning, meaning that<br />
there is no frequency management cell (FMC) to coordinate the different networks.<br />
Moreover, the networks can’t exchange information between each other’s <strong>and</strong> they<br />
have equal priority rights. Therefore, we are interested in a distributed non-cooperative<br />
technique in a horizontal spectrum sharing model.<br />
The iterative water-filling algorithm (IWFA) is an adequate dynamic spectrum<br />
management technique to meet these requirements [5]. Indeed, IWFA is an autonomous<br />
algorithm solving the distributed power control problem in a frequency selective<br />
interference channel. Robust versions of the IWFA have been designed to cope with<br />
dynamic wireless channels [6, 7, 8, 9, 10]. However, IWFA does not converge to a unique<br />
solution (multiple Nash equilibriums). This aspect is inherent to IWFA because at each<br />
iteration some power is poured in the best sub-channel regardless the interference<br />
caused to the other networks, while they have a better benefit avoiding each other by<br />
taking different sub-channels. The convergence of the IWFA can be improved by adding<br />
a constraint on the number of transmitter’s sub-channels [11, 12].<br />
R<strong>and</strong>om access multi-channel medium access control (MAC) protocols have<br />
been proposed for CR networks [13]. Multi-channel MAC protocols have also been<br />
designed for IWFA [6, 14]. These protocols use a dedicated control channel to coordinate<br />
the radios. It is unlikely that a dedicated control channel can be used in a military<br />
context since it is a single point of failure. A possible workaround is to use a rendezvous<br />
multi-channel MAC protocol; however the radios may beacon for a long time before<br />
establishing a rendezvous. Another alternative is to employ time division multiplexing<br />
access (TDMA) to obtain a collision-free transmission schedule or frequency division<br />
multiplexing access (FDMA) as described in [15]. In this paper, we propose an adaptive<br />
orthogonal frequency division multiple access (OFDMA) PHYsical/MAC to<br />
allow simultaneous collision-free transmissions in a cognitive tactical radio network.<br />
The adaptive OFDMA PHY/MAC has the following characteristics:<br />
• It is based on the IWFA with selection of a single sub-channel [11, 12].<br />
It consists of grouping several OFDM sub-carriers to form a sub-channel.<br />
In a first mode, it uses a fixed bit-loading per sub-carrier. In a second<br />
mode, it uses an adaptive bit-loading related to the spectrum sensing <strong>and</strong><br />
the channel estimation on each OFDM sub-carrier.<br />
• It is robust against multi-path due to the insertion of a cyclic prefix <strong>and</strong><br />
allows a single-tap equalizer due to the orthogonality of the sub-carriers.<br />
• It uses a blind demodulation chain, meaning that it uses the cyclic prefix to<br />
estimate blindly the timing offset <strong>and</strong> to detect the presence of an OFDM<br />
signal. The timing offset estimate is used to synchronize control packets
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
203<br />
<strong>and</strong> data packets, <strong>and</strong> to estimate blindly the frequency offset, transmission<br />
channel, phase offset <strong>and</strong> transmitted bits. The residual ambiguity<br />
given by the BPSK or the adaptive QAM modulation schemes is solved by<br />
transmitting a single sub-carrier pilot or by using differential encoding.<br />
The adaptive OFDMA PHY/MAC has been implemented on universal software<br />
radio peripheral (USRP) platforms using Qt4/IT++ <strong>and</strong> the USRP hardware<br />
driver (UHD) application programming interface (API). Qt is a cross-platform<br />
application framework that is widely used for developing application software with<br />
a graphical user interface (GUI) [16]. IT++ is a C++ library of mathematical, signal<br />
processing <strong>and</strong> communication classes <strong>and</strong> functions. Its main use is in simulation<br />
of communication systems <strong>and</strong> for performing research in the area of communications<br />
[17]. The goal of the UHD is to provide a host driver <strong>and</strong> API for current <strong>and</strong><br />
future USRP products. The UHD driver can be used st<strong>and</strong>alone or with 3rd party<br />
applications such as Gnuradio, Labview, or Simulink [18].<br />
This paper is organized as follows. First, the adaptive OFDMA MAC protocol<br />
is described in Section II. Second, the adaptive OFDMA PHysical layer functions<br />
are described in Section III. The implementation of the adaptive OFDMA PHY/<br />
MAC on USRP platforms using Qt4/IT++ <strong>and</strong> the UHD API is described in Section<br />
IV. Finally, Section V concludes the paper.<br />
II. Adaptive OFDMA MAC protocol<br />
In this Section, the adaptive OFDMA MAC protocol is described. It is assumed<br />
that the CRs have agreed on the same front-end parameters to transmit <strong>and</strong><br />
receive, i.e. carrier frequencies, sampling rates <strong>and</strong> b<strong>and</strong>widths. It is also assumed<br />
that the CRs have the same OFDM parameters, i.e. number of sub-carriers, cyclic<br />
prefix (CP) size, <strong>and</strong> number of sub-channels. The adaptive OFDMA MAC protocol<br />
uses control packets for the h<strong>and</strong>shaking between two CRs. These control<br />
packets are request-to-send (RTS) <strong>and</strong> clear-to-send (CTS) packets. In a first mode,<br />
the two control packets include source address, destination address <strong>and</strong> best subchannel<br />
sensed by the CR. In a second mode, control packets also include target<br />
rate constraint, bit <strong>and</strong> power allocation. Therefore, unlike carrier sense multiple<br />
access (CSMA) scheme <strong>and</strong> other r<strong>and</strong>om access multi-channel MAC protocols,<br />
the two control packets convey some information <strong>and</strong> need to be aligned with<br />
the timing of OFDM symbols transmitted in the same b<strong>and</strong>width of interest to<br />
keep the orthogonality between sub-carriers.<br />
A. First mode<br />
The first mode uses a fixed bit-loading, e.g. a fixed BPSK or QAM modulation<br />
over the different sub-carriers. In the following, we suppose a transmission from CR 1<br />
to CR 2. CR 1 <strong>and</strong> CR 2 perform spectrum sensing in the b<strong>and</strong>width of interest <strong>and</strong>
204 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
determine their best sub-channel based on an energy estimate. The RTS includes<br />
the source address CR 1, the destination address CR 2, <strong>and</strong> the best sub-channel<br />
of CR 1 given by spectrum sensing. CR 1 transmits the RTS on its best sub-channel.<br />
CR 2 demodulates all the sub-channels in parallel (see Section III.C) <strong>and</strong> discovers<br />
that a RTS is sent based on the destination address of CR 1. CR 2 gets the RTS source<br />
address <strong>and</strong> the best sub-channel of CR 1. The CTS includes the CR 2 source address,<br />
the CR 1 destination address, <strong>and</strong> the best sub-channel of CR 2 by spectrum sensing.<br />
CR 2 transmits the CTS on CR 1 best sub-channel. CR 1 knows to receive on its best<br />
sub-channel. CR 1 demodulates the CTS <strong>and</strong> gets CR 2 best sub-channel. Finally,<br />
CR 1 transmits the data on CR 2 best sub-channel.<br />
B. Second mode<br />
The second mode uses an adaptive QAM over the different sub-carriers. CR 1 <strong>and</strong><br />
CR 2 determine their best sub-channel based on an energy estimate. The RTS includes<br />
the CR 1 source address, the CR 2 destination address, the CR 1 best sub-channel,<br />
<strong>and</strong> the target rate constraint. CR 1 transmits the RTS on its best sub-channel. CR 2<br />
demodulates all the sub-channels in parallel <strong>and</strong> discovers that a RTS is sent based<br />
on the destination address of CR 1. CR 2 gets the RTS source address, the target rate<br />
constraint, <strong>and</strong> the best sub-channel of CR 1. If the CR 1 best sub-channel is the same<br />
as the CR 2 best sub-channel, the CTS includes the CR 2 source address, the CR 1<br />
destination address, the CR 2 best sub-channel, <strong>and</strong> the bit <strong>and</strong> power allocation for<br />
CR 1 target rate constraint. CR 2 transmits the CTS on CR 1 best sub-channels. CR 1<br />
knows to receive on its best sub-channel. CR 1 demodulates the CTS <strong>and</strong> gets CR 2<br />
best sub-channel, as well as the bit <strong>and</strong> power allocation for its target rate constraint.<br />
Finally, CR 1 transmits the data on their common best sub-channel with adaptive QAM.<br />
If the CR 1 best sub-channel is different from the CR 2 best sub-channels, CR 1 gets<br />
the best sub-channel of CR 2 by the CTS, <strong>and</strong> send a second RTS on CR 2 best subchannel<br />
to allow CR 2 to compute the bit <strong>and</strong> power allocation. CR 2 sends a second<br />
CTS with this information on CR 1 best sub-channel. Finally, CR 1 transmits the data<br />
on CR 2 best sub-channel with adaptive QAM.<br />
III. Adaptive OFDMA physical layer<br />
In this Section, the key functions of the adaptive OFDMA PHY are described,<br />
i.e. the spectrum sensing, the OFDM signal detection, the blind OFDM demodulation<br />
<strong>and</strong> the distributed bit <strong>and</strong> power allocation.<br />
A. Spectrum sensing<br />
A CR needs to determine its best sub-channel <strong>and</strong> communicate this information<br />
to another CR. The b<strong>and</strong>width of the signal of interest B is divided into
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
205<br />
a number of sub-channels S of width B/S. As there is no assumption about the type<br />
of the observed signals, a nonparametric method should be used. We propose<br />
to use the classical Barlett’s method for power spectrum estimation known also<br />
as the method of averaged periodograms [19]. We assume that the complex sampling<br />
rate equals the b<strong>and</strong>width of the signal of interest. The averaged periodograms for N<br />
sub-carriers of a complex baseb<strong>and</strong> signal with K blocks of N samples y = [y(kN),…<br />
,y((k+1)N-1)] with k = [0,…,K-1] is given by<br />
K1 N1 j2in<br />
1<br />
<br />
2<br />
<br />
N<br />
E i | y( kN n) e |<br />
(1)<br />
KN<br />
k0 n0<br />
with i = [0,…,N-1] bins. The best sub-channel selection consists of integrating<br />
the estimated power spectrum of the frequency bins corresponding to the width B/S<br />
for all sub-channels <strong>and</strong> determines the sub-channel which have the lowest energy<br />
( m1)<br />
N 1<br />
S<br />
opt<br />
S = min Ei ( )<br />
(2)<br />
m<br />
mN<br />
i<br />
S<br />
with m = [0,…,S-1]. This sensing procedure is used first by CR 1 for the selection<br />
of its best sub-channel for RTS transmission, <strong>and</strong> is further embedded in the RTS<br />
control packet. Secondly, this sensing procedure is used by CR 2 to communicate<br />
its best sub-channel to CR 1 in the CTS control packet via CR 1 best sub-channel.<br />
B. OFDM signal detection<br />
The CR also needs to detect within the b<strong>and</strong>width of interest B the presence<br />
of an OFDM signal even if the signal is sent over a single sub-channel. A survey<br />
of OFDM signal detection techniques can be found in [20, 21, 22, 23]. Some<br />
techniques require the knowledge of a pilot sequence, OFDM parameters, <strong>and</strong><br />
noise variance to determine the detection threshold. Detection techniques requiring<br />
the knowledge of a pilot sequence have better detection performance, but<br />
worse b<strong>and</strong>width/power/complexity efficiency. Detection techniques requiring<br />
the knowledge of the noise variance assume a white noise assumption <strong>and</strong> degrade<br />
severely in the presence of colored noise. Moreover, when the theoretical values<br />
of the threshold are not known, they have to be empirically computed by feeding<br />
the detector with pure noise signals <strong>and</strong> calculating the test statistic.<br />
In the proposed adaptive OFDMA MAC protocol, control <strong>and</strong> data packets<br />
are sent only over a subset of the available sub-carriers. Moreover, other unknown<br />
signals or colored noise can be present in the b<strong>and</strong>width of interest. We propose<br />
to use a modified version of the cyclic prefix based sliding window correlation detector<br />
to determine the presence of an OFDM signal in the b<strong>and</strong>width of interest.<br />
This detector does not require the knowledge of a pilot sequence but only requires
206 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
the knowledge of the OFDM parameters, i.e. number of subcarriers N, cyclic prefix<br />
size P. The detection threshold is based on the non-correlated part of the cyclic<br />
prefix sliding window correlation estimate instead of the noise variance. This allows<br />
detecting the presence of an OFDM signal even in the presence of an unknown<br />
signal in the b<strong>and</strong>width of interest. Moreover, this detector also gives an estimate<br />
of the OFDM timing offset when it is detected. Assuming a complex baseb<strong>and</strong><br />
signal with K blocks of N+P samples samples y = [y(k(N+P)),…,y((k+1)(N+P)-1)]<br />
with k = [0,…,K-1], the cyclic prefix sliding window correlation estimate is given by<br />
( ) <br />
K2 P1<br />
<br />
*<br />
| y( k( NP) j) y ( k( NP) jN)|<br />
k0<br />
j<br />
( K1)<br />
P<br />
2<br />
y<br />
(3)<br />
with σ 2 y the variance of the received complex baseb<strong>and</strong> signal. The absolute value<br />
of the correlation estimate is able to cope with frequency <strong>and</strong> phase offsets introduced<br />
by Doppler shifts <strong>and</strong> clock mismatches. The estimate of the timing offset<br />
is given by<br />
opt<br />
max ( )<br />
(4)<br />
{0,..., NP1}<br />
In order to determine the presence of an OFDM signal, the estimate of the timing<br />
offset is compared with the non-correlated part of the cyclic prefix sliding<br />
window correlation estimate. Assuming a channel delay spread spanning the entire<br />
cyclic prefix, the non-correlated part of the cyclic prefix sliding window correlation<br />
estimate is given by ρ(mod(θ opt + 2 P, N + P)). Assuming that the non-correlated<br />
part is a Gaussian distribution with mean m nc <strong>and</strong> variance σ 2 nc , the detection<br />
threshold η is given by<br />
m nc<br />
nc<br />
(5)<br />
with α an integer corresponding to the number of st<strong>and</strong>ard deviations necessary<br />
to discriminate between an OFDM signal <strong>and</strong> a non-OFDM signal using only<br />
the cyclic prefix sliding window correlation estimate ρ(θ). The detector scheme is<br />
opt<br />
( ) Presence of an OFDM signal<br />
(6)<br />
opt<br />
( ) Absence of an OFDM signal<br />
Using K = 50 blocks in the application, α has been set to 40, allowing very few<br />
false alarms <strong>and</strong> mis-detections.<br />
C. Blind OFDM demodulation<br />
The cyclic prefix sliding window correlation estimate can be used to estimate<br />
the frequency offset [24]
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
207<br />
opt 1<br />
opt<br />
( )<br />
2N<br />
After time <strong>and</strong> frequency offset corrections, the OFDM symbols are transformed<br />
to the frequency domain by the discrete Fourier transform (DFT) operation.<br />
As there is no interference between two consecutive OFDM symbols, we obtain independent<br />
sub-carriers with the following channel model<br />
Y ( kN i) H ( kN i) X ( kN i) N ( kN i)<br />
(8)<br />
with k = [0,…,K-1] <strong>and</strong> i = [0,…,N-1], in which Y(kN+i), H(kN+i), X(kN+i), <strong>and</strong><br />
N(kN+i) are respectively the demodulated data, the channel frequency response,<br />
the transmitted symbol <strong>and</strong> the noise for the block k <strong>and</strong> sub-carrier i. Assuming<br />
the channel invariant over the K blocks, a blind estimate of the channel amplitude<br />
is given by<br />
K1<br />
(7)<br />
opt 2 1<br />
2<br />
| H i<br />
| | Y ( kN i)|<br />
(9)<br />
K<br />
k0<br />
Assuming the channel invariant over the K blocks, a blind estimate of the phase<br />
offset can be obtained for M-PSK signals [25] by the following expression<br />
K1<br />
est 1<br />
M<br />
() i Y ( kN i)<br />
(10)<br />
K<br />
k0<br />
Modulation stripping has also been investigated for M-QAM signals in [26].<br />
Knowing the phase offset estimate for each sub-carrier, it is possible to correct<br />
linear shift of the phase in the frequency domain due to an incorrect timing offset<br />
estimate belonging to the ISI free region, as well as abrupt changes of the phase<br />
in the frequency domain due to the phase ambiguity introduced by the blind phase<br />
offset algorithm (phase unwrapping). The phase correction for M-PSK signals<br />
is performed using the Algorithm 1.
208 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
D. Distributed adaptive bit <strong>and</strong> power allocation<br />
The distributed bit <strong>and</strong> power allocation (adaptive QAM) can only be determined<br />
when a CR sends its control packet on the other CR best sub-channel. If CR 1<br />
best sub-channel is the same as CR 2 best<br />
sub-channel, then only one h<strong>and</strong>shake<br />
is necessary (RTS-CTS) to inform CR 1<br />
about CR 2 best sub-channel, bit <strong>and</strong><br />
power allocation. However, if CR 1 best<br />
sub-channel is different from CR 2 best<br />
sub-channel, two h<strong>and</strong>shakes are necessary<br />
(RTS-CTS-RTS-CTS) because CR 2<br />
informs CR 1 about its best sub-channel<br />
in the first CTS <strong>and</strong> the bit <strong>and</strong> power<br />
allocation in the second CTS. The distributed<br />
bit <strong>and</strong> power allocation is based on<br />
the waterfilling algorithm, in which an inner<br />
loop maximizes the bit allocation for<br />
a transmit power constraint, <strong>and</strong> an outer<br />
loop minimizes the transmit power for<br />
a target rate constraint. The algorithm<br />
for distributed bit <strong>and</strong> power allocation<br />
is described in Algorithm 2, in which<br />
λ is the Lagrangian parameter [27],<br />
Г is the SNR gap which measures the loss with respect to theoretically optimum<br />
performance [29], p = [p(0),…,p(N-1)] <strong>and</strong> p opt = [p(0) opt ,…, p(N-1) opt ] are the power<br />
allocation vectors, b opt = [b(0) opt ,…,b(N-1) opt ] is the bit allocation vector, P tot is the total<br />
power constraint, Δf is the sub-carrier b<strong>and</strong>width, R is the data rate <strong>and</strong> R target is the<br />
target rate constraint. As shown in [11, 12], when the number of sub-channels is lower<br />
than the number of concurrent links, CR users have to share the same sub-channels<br />
<strong>and</strong> iterative updates of bit <strong>and</strong> power allocation can lead to convergence problems<br />
due to multiple Nash equilibriums. To avoid this problem, the number of sub-channels<br />
is larger than the number of concurrent links to ensure the convergence to a single<br />
Nash equilibrium. This leads to a distributed adaptive OFDMA solution.<br />
IV. Implementation using QT4/IT++ <strong>and</strong> the UHD API<br />
In this Section, the implementation of the adaptive OFDMA PHY/MAC on<br />
USRP platforms using Qt4/IT++ <strong>and</strong> the UHD API is described. Several classes<br />
<strong>and</strong> procedures have been implemented for this application using QThread to enable<br />
multi-threading, Qwt to enable plotting, IT++ to enable mathematical operations,<br />
<strong>and</strong> Gstreamer to enable video/audio transmission <strong>and</strong> reception.
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
209<br />
A. Names <strong>and</strong> description of the implemented classes<br />
• Class BitWaterfilling. This class does the bit <strong>and</strong> power allocation according to<br />
spectrum sensed <strong>and</strong> estimated channel for a target rate constraint or a total<br />
power constraint.<br />
• Class BlindOFDM. This class gets a vector of bits from a named pipe (FIFO)<br />
coming from text, video, or audio in the application. It modulates this vector<br />
of bits into a fixed BPSK, QAM or an adaptive QAM OFDM vector according<br />
to its best group of subcarriers. It also performs a blind detection of a received<br />
OFDM vector based on the cyclic prefix, <strong>and</strong> blindly demodulates a received<br />
fixed BPSK, QAM or an adaptive QAM OFDM vector into a vector of bits<br />
according to its best group of subcarriers (blind time offset correction, blind<br />
frequency offset correction, blind phase offset estimation). Finally, it puts<br />
a vector of bits into a named pipe (FIFO) to be read by a text reader, video<br />
reader, audio reader in the application.<br />
• Class File. This class converts from/to characters to/from bits. It also reads/<br />
writes a vector of bits from/to a file.<br />
• Class MainWindow. This class is dedicated to the GUI thread. This class<br />
has a first push Button to Start/Stop Tx, a second push Button to Start/Stop<br />
Rx, <strong>and</strong> a third push Button to Start/Stop Video. It uses a lineEdit to take comm<strong>and</strong><br />
or to input text <strong>and</strong> textEdit to display some text. It also uses multiple<br />
lineEdits to control Tx rate, Tx frequency, Tx gain, Tx amplitude, Rx rate, Rx<br />
frequency, Rx gain, FFT size, CP size, <strong>and</strong> number of sub-channels.<br />
• Class Packets. This class does a conversion between vector of a double, float,<br />
integer <strong>and</strong> a vector of bits to include in the RTS/CTS packets. It encodes/<br />
decodes the RTS/CTS packets with necessary information (source address,<br />
destination address, best sub-channel, bit <strong>and</strong> power allocation).<br />
• Class Plot. This class plots some information (spectrum sensing, best group<br />
of sub-channels, target rate constraint, bit <strong>and</strong> power allocation).<br />
• Class Protocols. This class is dedicated to the worker thread (QThread).<br />
It can reinitialize the parameters as requested by the GUI (FFT size, CP size,<br />
number of sub-channels). This class implements a state machine for a Tx/Rx<br />
h<strong>and</strong>shaking adaptive OFDMA MAC protocol based on RTS sending/listening,<br />
CTS listening/sending <strong>and</strong> data sending/listening. It also performs a time offset<br />
estimation before RTS sending, CTS sending to avoid inter-carrier interference.<br />
• Class Sensing. This class estimates the spectrum based on averaged FFT. It takes<br />
a decision based on the mean spectrum estimated shifted by a fixed amount<br />
of dB, <strong>and</strong> selects the best group of sub-carriers according to the number<br />
of sub-channels.<br />
• Class Text. This class is implemented as a separate thread (QThread). It reads<br />
some input text in the GUI <strong>and</strong> put it in a named pipe (FIFO). It also displays<br />
some text in the GUI from a named pipe (FIFO).
210 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
• Class UHDDevice. This class reinitializes USRP parameters as requested<br />
in the GUI (Tx rate, Tx frequency, Tx gain, amplitude, Rx rate, Rx frequency,<br />
Rx gain). It reads a certain amount of samples at a particular time (timestamp).<br />
It writes a certain amount of samples at a particular time (timestamp).<br />
It also checks for errors after sending/receiving data. The procedures are<br />
implemented such that the received <strong>and</strong> transmitted samples are in a steady<br />
state for the USRP (first samples should be discarded because of the time to<br />
power up).<br />
• Class Video. This class is implemented as a separate thread (QThread). It uses<br />
a Gstreamer transmit pipeline showing the video transmitted on screen <strong>and</strong><br />
writing the same data in a named pipe (FIFO) which will be read by the OFDM<br />
modulator for transmission. It also uses a Gstreamer receive pipeline showing<br />
the video received on screen if a video container is detected.<br />
B. Description of the application<br />
Figure 1 shows the application window for spectrum sensing. The GUI parameters<br />
can be chosen during run-time. The transmission parameters are the Tx<br />
Rate in Msps, the Tx Frequency in MHz, the Tx Gain in dB, the Tx Amplitude<br />
corresponding to a linear multiplication factor. The reception parameters are the Rx<br />
rate in Msps, the Rx frequency in MHz, the Rx Gain in dB. The OFDM parameters<br />
are the FFT size, the CP size, <strong>and</strong> the number of sub-channels. There are two<br />
buttons to Start Tx <strong>and</strong> to Start Rx, which correspond to different state machines.<br />
The Tx state machine does a spectrum sensing, send RTS, receive CTS, <strong>and</strong> send<br />
data procedure, while the Rx state machine does a spectrum sensing, receive RTS,<br />
send CTS, <strong>and</strong> receive data procedure. The spectrum sensing is performed using<br />
the method of averaged periodograms (Barlett’s method) described in Section II.<br />
The red plot corresponds to the sub-carriers whose powers are larger than a decision<br />
threshold (in this case a mean decision threshold shifted by a fixed amount<br />
of dB). One can see a DC offset due to the USRP <strong>and</strong> some occupied sub-carriers<br />
between sub-carriers 320 <strong>and</strong> 340.<br />
Figure 2 shows one of the plots provided by the application. The different<br />
plots are the spectrum sensing <strong>and</strong> decision as shown in Figure 1 (Tab 1), the best<br />
sub-channel plot (Tab 2), the estimated channel amplitude plot (Tab 3), the power<br />
allocation plot (Tab 4), the bit allocation plot (Tab 5). For the system to work well,<br />
a good compromise should be taken between the FFT size, CP size, the expected<br />
frequency offset, <strong>and</strong> the number of OFDM symbols used for estimation of the channel.<br />
As shown on Figure 2, a good compromise has been found with an FFT<br />
size 512, CP size 128, <strong>and</strong> number of OFDM symbols 50 such that we get a very<br />
good estimate of the channel. This serves the bit <strong>and</strong> power allocation function to<br />
have accurate values since the spectrum sensing is based on average periodograms<br />
<strong>and</strong> the estimate of the channel is based on the average of multiple OFDM symbols.
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
211<br />
Figure 1. Application window for spectrum sensing<br />
Figure 2. Application window for channel estimation
212 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 3 shows the application window for text, video <strong>and</strong> audio (Tab 6). This<br />
tab is used to input some text, video or audio in a named pipe called ‘inputpipe’<br />
whenever the Tx state machine is launched. Once the enter comm<strong>and</strong> or the video<br />
button is pressed, the Tx state machine switches from a spectrum sensing state to<br />
a RTS sending state to initiate a communication. It is also used to output some text,<br />
video or audio from a named pipe called ‘outputpipe’ whenever the Rx state machine<br />
is launched. Once the enter comm<strong>and</strong> or the video button is pressed, the Rx state<br />
machine switches from a spectrum sensing state to a RTS listening state to receive<br />
a communication. After h<strong>and</strong>shaking between the two CRs, data can be received<br />
as shown on Figure 3.<br />
Figure 3. Application window for text, video <strong>and</strong> audio<br />
Future improvements of this application would be to implement other algorithms<br />
for spectrum estimates (Multitaper method, Welch, Hamming, Hanning...)<br />
<strong>and</strong> to implement decision algorithms based on noise estimation. However,<br />
a whitening approach might take a long time because of eigenvalue decomposition.<br />
Secondly, a comparison of the new OFDM signal detection algorithm with existing<br />
algorithms in the literature could also lead to an improvement of the application.<br />
Thirdly, it would be interesting to implement other algorithms for OFDM demodulation<br />
to compare different non-data-aided <strong>and</strong> data-aided approaches.
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
213<br />
V. Conclusion<br />
In this paper, we have proposed an adaptive OFDMA PHY/MAC on USRP platforms<br />
for a cognitive tactical radio network. In the first part of the paper, the adaptive<br />
OFDMA MAC protocol has been described, as well as the key function of the adaptive<br />
OFDMA PHY, i.e. the spectrum sensing, the OFDM signal detection, the blind<br />
OFDM demodulation <strong>and</strong> the distributed bit <strong>and</strong> power allocation. In the second part<br />
of the paper, the adaptive OFDMA PHY/MAC implementation on USRP platforms<br />
using Qt4/IT++ <strong>and</strong> the UHD API has been described. Several classes have been<br />
implemented, as well as support for text, video <strong>and</strong> audio transmission.<br />
References<br />
[1] J. Mitola III <strong>and</strong> G.Q. Maguire Jr., Cognitive Radio: Making Software Radios More<br />
Personal. IEEE Personal <strong>Communications</strong>, 6(4):13-18, 2009.<br />
[2] FCC. Spectrum Policy Task Force Report. ET Docket, (02-135), 2002.<br />
[3] O. Younis, L. Kant, A. McAuley, K. Manousakis, D. Shallcross, K. Sinkar,<br />
K. Chang, K. Young, C. Graff <strong>and</strong> M. Patel, Cognitive Tactical Network Models.<br />
IEEE <strong>Communications</strong> Magazine, 48(10):70-77, 2010.<br />
[4] E. Hossain <strong>and</strong> V. Bhargava, Eds., Cognitive Wireless Communication Networks.<br />
Springer, 2007.<br />
[5] W. Yu, G. Ginis <strong>and</strong> J. M. Cioffi, Distributed Multiuser Power Control for Digital<br />
Subscriber Lines. IEEE Journal on Selected Areas in <strong>Communications</strong>, 20(5):<br />
1105-1115, 2002.<br />
[6] F. Wang, M. Krunz <strong>and</strong> S.G. Cui, Price-based spectrum management in cognitive<br />
radio networks. IEEE Journal on Selected Areas in <strong>Communications</strong>, 2(1):74-87, 2008.<br />
[7] G. Scutari, D.P. Palomar <strong>and</strong> S. Barbarossa, Optimal linear precoding strategies<br />
for wideb<strong>and</strong> noncooperative systems based on game theory, part II: Algorithms.<br />
IEEE Transactions on Signal Processing, 56(3):1250-1267, 2008.<br />
[8] P. Setoodeh <strong>and</strong> S. Haykin, Robust Transmit Power Control for Cognitive Radio.<br />
Proceedings of the IEEE, 97(5):915-939, 2009.<br />
[9] R.H. Gohary <strong>and</strong> T.J. Willink, Robust IWFA for open-spectrum communications.<br />
IEEE Transactions on Signal Processing, 57(12):4964-4970, 2009.<br />
[10] M.i Hong <strong>and</strong> A. Garcia, Averaged Iterative Water-Filling Algorithm: Robustness<br />
<strong>and</strong> Convergence. IEEE Transactions on Signal Processing, 2011.<br />
[11] V. Le Nir <strong>and</strong> B. Scheers, Improved Coexistence between Multiple Cognitive<br />
Tactical Radio Networks by an Expert Rule based on Sub-channel Selection. Wireless<br />
Innovation Forum European Conference on <strong>Communications</strong> Technologies <strong>and</strong><br />
Software Defined Radio (SDR’11-WInnComm-Europe), Brussels, Belgium, 2011.<br />
[12] V. Le Nir <strong>and</strong> B. Scheers, Iterative Waterfilling Algorithm with Sub-channel<br />
Selection for the Coexistence of Multiple Cognitive Tactical Radio Networks. <strong>Military</strong><br />
<strong>Communications</strong> <strong>and</strong> <strong>Information</strong> Systems Conference (MCC’2011), Amsterdam,<br />
Nederl<strong>and</strong>s, 2011.
214 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
[13] J. Mo, H.W. So <strong>and</strong> J. Walr<strong>and</strong>, Comparison of Multichannel MAC Protocols. IEEE<br />
Transactions on Mobile Computing, 7(1):50-65, 2008.<br />
[14] Y. Lin, K. Liu <strong>and</strong> H. Hsieh, Design of Power Control Protocols for Spectrum Sharing<br />
in Cognitive Radio Networks: A Game-Theoretic Perspective. IEEE Conference on<br />
<strong>Communications</strong> (ICC’2010), Cape Town, South Africa, 2010.<br />
[15] L. Yang, W. Hou, L. Cao, B.Y. Zhao <strong>and</strong> H. Zheng, Supporting Dem<strong>and</strong>ing Wireless<br />
Applications with Frequency-agile Radios. Proceedings of the 7th USENIX Symposium<br />
on Networked Systems Design <strong>and</strong> Implementation, 2010.<br />
[16] J. Blanchette <strong>and</strong> M. Summerfiled, Eds., C++ GUI Programming with Qt 4,<br />
Second Edition. Prentice Hall, 2008.<br />
[17] IT++ project. http://itpp.sourceforge.net/current/index.html<br />
[18] “Universal Software Radio Peripheral” hardware driver. http://code.ettus.com/redmine/<br />
ettus/projects/uhd/wiki.<br />
[19] J.G. Proakis <strong>and</strong> D.G. Manolakis, Eds., Digital Signal Processing. Principles,<br />
Algorithms <strong>and</strong> Applications. 3rd Edition, Prentice Hall, 1996.<br />
[20] V. Le Nir, T. van Waterschoot, M. Moonen <strong>and</strong> J. Duplicy, Blind CP-OFDM <strong>and</strong><br />
ZP-OFDM parameter estimation in frequency selective channels. EURASIP Journal<br />
on Wireless <strong>Communications</strong> <strong>and</strong> Networking vol. 2009, Article ID 315765, 10 pages<br />
doi:10.1155/2009/315765, 2009.<br />
[21] S. Chaudhari, V. Koivunen <strong>and</strong> H.V. Poor Autocorrelation-Based Decentralized<br />
Sequential Detection of OFDM Signals in Cognitive Radios. IEEE Transactions on<br />
Signal Processing, 57(7):2690-2700, 2009.<br />
[22] D. Danev, On Signal Detection Techniques for the DVB-T St<strong>and</strong>ard. Proceedings<br />
of the 4th International Symposium on <strong>Communications</strong>, Control <strong>and</strong> Signal Processing<br />
(ISCCSP’2010), Limassol, Cyprus, 2010.<br />
[23] D. Danev, E. Axell <strong>and</strong> E.G. Larsson, Spectrum sensing methods for detection<br />
of DVB-T signals in AWGN <strong>and</strong> fading channels. Proceedings of the IEEE 21st<br />
International Symposium on Personal Indoor <strong>and</strong> Mobile Radio <strong>Communications</strong><br />
(PIMRC’2010, Istanbul, Turkey, 2010.<br />
[24] J. van de Beek, M. S<strong>and</strong>ell <strong>and</strong> P.O. Borjesson, ML Estimation of Time <strong>and</strong><br />
Frequency Offset in OFDM Systems. IEEE Transactions on Signal Processing,<br />
45(7):1800-1805, 1997.<br />
[25] H. Meyr, M. Moeneclaey, <strong>and</strong> S.A. Fechtek, Eds., Digital <strong>Communications</strong><br />
Receivers: Synchronization, Channel Estimation, <strong>and</strong> Signal Processing. John Wiley<br />
<strong>and</strong> Sons, 1998.<br />
[26] M. Rezki, L. Sabel <strong>and</strong> I. Kale, High Order Modulation Stripping for Use<br />
by Synchronisation Algorithms in Communication Systems. Proceedings<br />
of the Instrumentation <strong>and</strong> Measurement <strong>Technology</strong> Conference (IMTC’2003,<br />
Vail, USA, 2003.<br />
[27] S. Boyd <strong>and</strong> L. V<strong>and</strong>enberghe, Convex Optimization. Cambridge University Press,<br />
2004.<br />
[28] John M. Cioffi, A Multicarrier Primer. ANSI Contribution T1E1.4/91-157, 1991.
Validation of the ITU 1546 L<strong>and</strong>-Sea<br />
Propagation Model for the 900 MHz B<strong>and</strong><br />
Krzysztof Bronk 1 , Rafał Niski 1 , Jerzy Żurek 1 , Maciej J. Grzybkowski 2<br />
1 National Institute of Telecommunication,<br />
Wireless Systems <strong>and</strong> Networks Department, Gdansk, Pol<strong>and</strong>,<br />
{K.Bronk, R.Niski, J.Zurek}@itl.waw.pl<br />
2 National Institute of Telecommunication,<br />
Electromagnetic Compatibility Department, Wroclaw, Pol<strong>and</strong>, mag@il.wroc.pl<br />
Abstract: The article discusses the accuracy of the ITU-1546 l<strong>and</strong>-sea propagation model for<br />
the 900 MHz b<strong>and</strong>. This analysis is mainly based on the measurement results which were compared<br />
with the data resulting from the theoretical model. This paper is comprised of four sections. Firstly,<br />
the measurement methodology <strong>and</strong> scenarios are described. In the next section, the method of field<br />
strength calculations for the mixed paths, introduced by the ITU, is briefly explained. The next, <strong>and</strong><br />
most important, part is filled with the comparison (<strong>and</strong> statistical analysis) of the theoretical <strong>and</strong><br />
measured field strength values, which allows to evaluate the model. Finally, in the last section, a short<br />
conclusion is presented.<br />
Keywords: component; l<strong>and</strong>-sea propagation model, validation, measurements, GSM 900<br />
I. Introduction<br />
The following article presents the selected results of the extensive measurement<br />
campaign at the Baltic Sea waters conducted as a part of the EfficienSea project [5, 6].<br />
All the activities described in this paper were carried out by the National Institute<br />
of Telecommunications (NIT) in cooperation with other EfficienSea partners, i.e.:<br />
Maritime Office in Gdynia – MOG <strong>and</strong> Gdynia Maritime University – GMU.<br />
The campaign took place in the second half of 2011 <strong>and</strong> comprised four<br />
parts lasting from one to five days, during which a total of over 40 000 measurement<br />
points have been gathered. For the purpose of this campaign two ships have<br />
been utilised: MS “Tucana” (operated by the MOG) – during the 1st <strong>and</strong> 2nd part<br />
of the campaign <strong>and</strong> MS “Horyzont II” (operated by the GMU) – during the 3rd<br />
<strong>and</strong> 4th part respectively.<br />
The whole measurement campaign covered selected radiocommunications<br />
systems available at sea, including 2G/3G, TETRA, Telenor VHF Data, Iridium.<br />
In this paper the authors present some results for the GSM 900 system only.
216 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
In the subsequent part of this paper the measurement methodology <strong>and</strong> measurement<br />
devices set will be presented. After that, the method of propagation loss<br />
evaluation for the mixed propagation paths, based on the ITU 1546 recommendation,<br />
will be discussed. Finally, a comparative analysis of the measurement results <strong>and</strong><br />
the results of the predicted communication ranges, obtained from the computations<br />
(performed with the software tool created by the NIT) will be presented.<br />
II. Field strength measurements<br />
As the part of the EfficienSea project activities, the measurement campaigns<br />
at the Baltic Sea waters were conducted. The main goal of them was to analyse<br />
the coverage, availability, type <strong>and</strong> quality of the 2G/3G data transmission services<br />
offered by one of the Polish cellular providers at the Polish coastal waters (especially<br />
at the Bay of Gdansk <strong>and</strong> along the Polish coast line, see Fig. 7). The most<br />
important output of this measurements was an indication which data transmission<br />
services (EDGE, UMTS or HSPA) were available in the particular area of interest.<br />
Besides that, a big number of additional information have been obtained, such as:<br />
the actual achievable throughputs (for uplink <strong>and</strong> downlink), ping values, signal<br />
levels, Cell-IDs, etc.<br />
The measurement set for this part of the campaign can be schematically<br />
depicted as in Fig. 1.<br />
Figure 1. The measurement set for 2G/3G systems tests
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
217<br />
The central <strong>and</strong> most important element of the measurement set was an application<br />
module. This software tool (developed by the NIT for the purposes of this<br />
campaign) h<strong>and</strong>led all the functions connected with control over the equipment <strong>and</strong><br />
FTP client, triggered the subsequent steps of the measurement algorithm, performed<br />
the necessary calculations <strong>and</strong> stored the results. It also had a very strong capability<br />
of detecting <strong>and</strong> h<strong>and</strong>ling errors <strong>and</strong> unexpected situations, so consequently<br />
the whole measurement process was as automatic as possible.<br />
The user interface of this application is presented in Fig. 2. In this picture<br />
the main functions of each of the modules are indicated.<br />
Figure 2. User interface of measurement software tool
218 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
The second part of the measurement set was the GSM/UMTS module, based<br />
on the Dev Kit platform by Sierra Wireless, which was originally manufactured for<br />
telecommunication devices testing. This platform was equipped with a card slot<br />
supporting both regular modems as well as professional ones for measurement<br />
purposes. On the Dev Kit platform, a GSM/UMTS MC-8795V card was installed,<br />
which supported HSPA data transmission with rates up to 7.2 Mb/s (downlink)<br />
<strong>and</strong> 5.76 Mb/s (uplink). The communication between the application module <strong>and</strong><br />
the GSM/UMTS module was based on the AT comm<strong>and</strong>s.<br />
The Dev Kit platform <strong>and</strong> the MC-8795V card are depicted in Fig. 3.<br />
Figure 3. The Dev Kit platform <strong>and</strong> the MC-8795V card<br />
Another part of the measurement set was the GPS module Holux M-215<br />
– a USB wired GPS receiver equipped with a MTK chipset, which supported the data<br />
transmission protocol NMEA0183 v.3.01. The module’s sensitivity was 159 dBm<br />
<strong>and</strong> the cold-start time was 36 seconds.<br />
The additional parts of the measurement set were the Anritsu MS2721B<br />
Spectrum Analyzer (high-performance h<strong>and</strong>held spectrum analyzer, operating<br />
in the frequency range of 9 kHz ÷ 7.1 GHz, suitable for a great variety of RF, microwave<br />
or cellular signal measurements, even in the harsh physical environment)<br />
<strong>and</strong> a highly-precise, calibrated antenna SAS-521F-7 by A.H. Systems.<br />
The methodology of the measurement was as follows. In the NIT premises<br />
in Gdansk, an external FTP server (connected to the Internet via a very fast fibre<br />
connection) has been activated, <strong>and</strong> 13 test files have been uploaded into it.<br />
Those files contained some r<strong>and</strong>om data <strong>and</strong> they varied in size (the possible sizes<br />
of the test files were: 10 kB, 25 kB, 50 kB, 100 kB, 250 kB, 500 kB, 1 MB, 2,5 MB,<br />
5 MB, 10 MB, 25 MB, 50 MB <strong>and</strong> 100 MB). The rest of the necessary measurement<br />
equipment was placed aboard the ship.<br />
Using the GSM/UMTS/HSPA Module, a radio link between the ship <strong>and</strong><br />
the External FTP server was established. The module was able to work in a few<br />
modes: preferred 2G or 3G or the best available service (EDGE/UMTS/HSPA),<br />
which gave an instant information about the services available in a given area.
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
219<br />
After establishing the connection, it was possible to start a bi-directional data<br />
transmission between FTP ship <strong>and</strong> to measure its duration. In order to test<br />
the downlink transmission, the application module started to download a file<br />
from the FTP server; to test the uplink transmission, the same file was uploaded<br />
into the FTP. The size of the file that was being transmitted in a given moment<br />
was not r<strong>and</strong>om, but selected by the application module according to the special<br />
algorithm. If the available throughput was low, the file size was gradually decreased,<br />
so that the duration of a single measurement was not excessively long;<br />
on the other h<strong>and</strong>, if the throughput increased, it was also possible to increase<br />
the size of a test file, so the file size was being changed adaptively. When the transmission<br />
was complete, the software calculated the real throughput (separately for<br />
downlink <strong>and</strong> uplink), which was done through dividing the (known) file size by<br />
the (measured) transmission duration. The GSM/UMTS/HSPA modem allowed<br />
to obtain some additional parameters as well, i.e.: signal level (in dBm), number<br />
of the utilized GSM/UMTS channel <strong>and</strong> Cell ID. Through the ICMP protocol,<br />
the value of the ping was also extracted.<br />
Additionally, the application module was connected with the Anritsu MS2721B<br />
programmable spectrum analyzer to enable the optional channel power measurements.<br />
An integral part of the measurement set was a GPS module which provided<br />
a precise location- <strong>and</strong> time-stamp for every single measurement record (additionally,<br />
the current speed in km/h, course in degrees <strong>and</strong> altitude in m AMSL were obtained).<br />
After finishing a complete set of a measurement, the application module created<br />
a record with the results. Every record comprised the following information:<br />
• Date <strong>and</strong> time of the measurement;<br />
• Geographic coordinates (longitude <strong>and</strong> latitude);<br />
• Direction of radio link (downlink/uplink);<br />
• Measured transmission throughput [in kb/s];<br />
• Measurement duration [in ms];<br />
• Amount of transmitted data [in bytes];<br />
• Ping [in ms];<br />
• Available service [EDGE/HSPA/UMTS];<br />
• Signal level [in dBm];<br />
• Speed [in km/h];<br />
• Course [in deg];<br />
• Altitude [in m AMSL];<br />
• Cell ID;<br />
• Nr of GSM/UMTS channel;<br />
• Channel power [in dBm].<br />
Since the spectrum analyzer made its own measurements as well, it also created<br />
a log file with the results. The analyzer was also equipped with an in-built GPS<br />
receiver, so every record in this log file was marked with a time-stamp <strong>and</strong> precise<br />
geographic coordinates of the point where the current measurement took place.
220 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
In some measurement campaigns it was not possible to use the spectrum<br />
analyser, therefore to obtain the same conditions of received signal lever measurements,<br />
the modem measurement method was chosen. Moreover, the modem<br />
provided additional parameters which were important part of the measurements.<br />
It should also be noted that all measurements were performed on the move,<br />
<strong>and</strong> the ship’s speed was not greater than 20 km/h.<br />
III. Method of mixed path field strength calculations<br />
The results of the radio wave field strength measurements in the 900 MHz<br />
b<strong>and</strong>, carried out for the mixture of l<strong>and</strong> <strong>and</strong> see paths, have been compared to<br />
the field strength calculations performed according to the method provided by<br />
the ITU-R P.1546-4 Recommendation [1]. In this Recommendation, the mixedpath<br />
method of calculations utilises the values of E l (d) <strong>and</strong> E s (d) to represent<br />
the field strength at a specific distance d from the transmitting antenna. The additional<br />
factor, i.e. the representative clutter height, R, for all-l<strong>and</strong> <strong>and</strong> all-sea paths<br />
respectively, interpolated for transmitting/base antenna height h 1 , as well as for<br />
frequency (900 MHz) <strong>and</strong> percentage time (50%), has been used as required.<br />
The receiving/mobile antenna height used for the purpose of the calculations<br />
was equal to the real height of the antenna mounted at the shipboard on the level<br />
of 10 meters over sea surface.<br />
The mixed path field strength, E [dB(μV/m)], has been evaluated in line<br />
of the ITU method [1] as:<br />
<br />
E 1A El dT A Es dT<br />
(1)<br />
where:<br />
d T – total distance between transmitter <strong>and</strong> receiver [km],<br />
E l – field strength calculated for l<strong>and</strong> path zone at the distance d T [dB(μV/m)],<br />
E s – field strength calculated for see path zone at the distance d T [dB(μV/m)],<br />
A – mixed path interpolation factor, given by formula:<br />
2/3<br />
where the fraction of path over sea, F sea , is given by:<br />
<strong>and</strong> the factor V is expressed by:<br />
A[1 1 F ] V<br />
sea<br />
(2)<br />
F<br />
d<br />
sT<br />
sea<br />
(3)<br />
dT<br />
<br />
V max1.0,1.0<br />
40.0<br />
<br />
(4)
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
221<br />
with:<br />
<br />
N<br />
d<br />
d<br />
M<br />
s<br />
l<br />
sn<br />
lm<br />
Esn dT Elm dT<br />
<br />
(5)<br />
n1 sT m1<br />
where:<br />
E sn (d T ) – field-strength value [dB(µV/m)] for distance d T , assumed to be all of sea<br />
or coastal-l<strong>and</strong> zone type n,<br />
E lm (d T ) – field-strength value [dB(µV/m)] for distance d T , assumed to be all of l<strong>and</strong><br />
zone type m.<br />
The length of total propagation path d T is equal to:<br />
d<br />
d<br />
dT dsT dlT<br />
(6)<br />
where:<br />
d d – total length of sea <strong>and</strong> coastal l<strong>and</strong> paths traversed by radio<br />
d<br />
sT<br />
lT<br />
n<br />
m<br />
sn<br />
lm<br />
wave [km]<br />
lT<br />
(7a)<br />
d – total length of l<strong>and</strong> paths traversed by radio wave [km] (7b)<br />
When the radio path consists of two parts of l<strong>and</strong> or sea zones, then N s =2<br />
<strong>and</strong> M s =2 respectively. When a mixed path includes only one l<strong>and</strong> <strong>and</strong> only one<br />
sea zone, then N s =M s =1. Only those types of paths (see Fig. 7) were taken into<br />
consideration during the mixed radio path field strength calculations. A detailed<br />
method to determine the particular field strength values E (E l or E s ), using the field<br />
strength versus distance curves, valid for the l<strong>and</strong> <strong>and</strong>/or see paths, is described<br />
in the ITU-R P.1546-4 Recommendation.<br />
The mixed path field strength calculations were conducted by means of the Digital<br />
Terrain Model (DTM) of Polish coast <strong>and</strong> Baltic Sea. DTM model SRTM-3 with<br />
the 3 seconds resolution, which means, for areas in Pol<strong>and</strong>, a rectangle of the size<br />
60x90 meters, has been used during these calculations.<br />
The comparison of the mixed path field strength calculations’ results obtained<br />
for the 900 MHz frequency b<strong>and</strong> at the distance up to 37 km from the transmitting<br />
antenna are illustrated in the next section. These results were necessary<br />
to validate the quality of the mixed path field strength prediction provided by<br />
the ITU 1546 method.<br />
IV. Comparison of results of measurements <strong>and</strong> field strength<br />
calculations<br />
All the presented measurements were carried out on board the MS Horizon II<br />
ship (see Fig. 4). The antennas of the measurement set were placed 10 m AMSL
222 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
<strong>and</strong> the measurement route was within the Bay of Gdansk <strong>and</strong> along the east part<br />
of the Polish coastline – measurement locations are depicted in Fig. 7. For the further<br />
analysis, eight GSM 900 base stations (for which the distance from the sea was at<br />
least 5 km) have been selected. The BTSs’ parameters obtained from the network<br />
operator are given in the Table 1. In the considered case, the measurement points<br />
for seven stations correspond to the path profile type 1 (l<strong>and</strong> – sea) <strong>and</strong> for one<br />
station the type 2 of the profile is more suitable (l<strong>and</strong> – sea – l<strong>and</strong> – sea). For all<br />
of the stations the statistical analysis of the obtained field strength measurements<br />
results has been conducted. The input parameter, i.e. the difference between the calculated<br />
<strong>and</strong> measured field strength values, ΔE, is given as follows:<br />
EE1546 E meas<br />
[dB]<br />
(8)<br />
where E 1546 denotes the median of the field strength calculated on the basis of the<br />
ITU 1546 model <strong>and</strong> E meas indicates the field strength value obtained in the measurements.<br />
The levels (values) of the electric field strength E were calculated on the basis<br />
of the parameters shown in table 1 (including BTS antenna’s characteristics),<br />
in the software tool developed by the NIT [2], in which the newest version of the<br />
ITU 1546-4 Recommendation was implemented.<br />
In Figs. 6 <strong>and</strong> 7 the values of ΔE as a function of distance for different<br />
types of the path profile were shown. It is noteworthy that the red line denotes<br />
the mean value <strong>and</strong> the green ones represent the st<strong>and</strong>ard deviation.<br />
Figure 4. Horyzont II – the ship utilized during the measurement campaign
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
223<br />
Figure 5. Dependence of ΔE on distance for propagation path type 1<br />
Figure 6. Dependence of ΔE on distance for propagation path type 2<br />
Figure 7. Measurement area
224 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Table I. BTS information obtained form the network operator<br />
BTS Name BTS1 BTS2 BTS3 BTS4 BTS5 BTS6 BTS7 BTS8<br />
Longitude [deg] 16,55 17,90 17,90 18,46 18,47 18,56 18,64 19,61<br />
Latitude [deg] 54,48 54,74 54,74 54,50 54,47 54,34 54,36 54,29<br />
Terrain height [m] AMSL 59 67 67 142 140 127 43 102<br />
GSM channel 66 59 49 65 50 65 56 65<br />
Antenna height [m] AGL 46 48 49 39 35 16 23 49<br />
Antenna azimuth [deg] 330 330 60 70 145 60 60 300<br />
Antenna type K 739650 K 739650 K 730691 K 739 685 K 742 272 K 739622 K 742264 K 730691<br />
EIRP [dBW] 27,5 26,9 27,2 27,1 27,9 26,3 25,2 26,8<br />
Table II. Detailed analysis results<br />
BTS Name BTS1 BTS2 BTS3 BTS4 BTS5 BTS6 BTS7 BTS8<br />
Measurements number 390 75 118 141 24 26 19 53<br />
Path type 1 1 1 1 1 1 1 2<br />
Min path length 29,8 15,7 16,4 26,9 26,6 19,7 16,9 28,1<br />
Max path length 36,7 16,4 30,2 35,6 33,4 23,5 34,1 33,2<br />
ΔE min [dB] -6,5 -11,5 -12,5 -10,5 -10,5 -11,5 -13,5 -6,5<br />
ΔE max [dB] 8,5 -0,5 -0,5 -5,5 0,5 -4,5 -0,5 8,5<br />
average of ΔE [dB] 2,3 -5,2 -7,1 -8,1 -4,4 -7,9 -4,6 -0,2<br />
RMSE [dB] 3,0 2,6 2,9 1,1 4,1 1,7 3,7 2,9
Chapter 6: Spectrum Management <strong>and</strong> Software Defined Radio Techniques<br />
225<br />
Table 2 presents the results of the analysis, i.e.: number of measurements,<br />
minimum <strong>and</strong> maximum distance between measurement points <strong>and</strong> BTSs (length<br />
of the radio path), minimum <strong>and</strong> maximum ΔE values as well as the average value<br />
of the ΔE <strong>and</strong> RMSE.<br />
In the Table 3 the summary results of the measurement errors, for both types<br />
of the path profile as well as for all measurement points, are presented.<br />
Table III. Overall analysis results<br />
BTS Name BTS1-7 BTS8 All<br />
Measurements number 793 53 846<br />
Path type 1 2 1 & 2<br />
Min path length 15,7 28,1 15,7<br />
Max path length 36,7 33,2 36,7<br />
ΔE min [dB] –13,5 –6,5 –13,5<br />
ΔE max [dB] 8,5 8,5 8,5<br />
average of ΔE [dB] –2,4 –0,2 –2,2<br />
RMSE [dB] 5,4 2,9 5,3<br />
The obtained results show a very good agreement of the measurement data<br />
with the results obtained from the mathematical model introduced by the ITU<br />
in the recommendation 1546-4. It is proved by the small values of the average error<br />
ΔE, which amounts to –2,4 dB for the propagation paths of type 1 (l<strong>and</strong>-sea) <strong>and</strong><br />
–0,2 dB for the propagation paths of type 2 (l<strong>and</strong>-sea-l<strong>and</strong>-sea), as well as –2,2 dB<br />
on average. Negative values of the average ΔE mean that in most cases the measured<br />
level of the signal strength was higher than expected.<br />
Additionally, the relatively small values of the RMS error, which are respectively:<br />
5,4 dB for propagation path type 1, 2,9 dB for type 2 <strong>and</strong> 5,3 dB on average<br />
verify positively the correctness of the measurement method <strong>and</strong> reproducibility<br />
of the measurements. Both values (average <strong>and</strong> RMS errors) are smaller for<br />
the propagation paths type 2, which might suggest that for these type the correctness<br />
of the model is better. On the other h<strong>and</strong>, it must be mentioned that the number<br />
of the measurements for the propagation path type 1 was 793, whereas for type 2<br />
it was almost 15 times less, merely 53.<br />
V. Conclusions<br />
In the paper the comparative analysis of the ITU 1546 l<strong>and</strong>-sea propagation<br />
model for the 900 MHz b<strong>and</strong> <strong>and</strong> the actual field strength measurements results<br />
has been presented. An important part of this research was a statistical analysis,<br />
which allowed to validate the accuracy of the ITU 1546 model.
226 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
The comparative research <strong>and</strong> measurement [3,4], which has been carried<br />
out earlier by the authors in the maritime VHF b<strong>and</strong>, showed that the measured<br />
signal level was higher than the level calculated according to the method described<br />
in the recommendation ITU 1546. In this case the differences were from several to<br />
dozen dBs. It proves, yet again, that for the l<strong>and</strong>-sea paths in the 900 MHz b<strong>and</strong>,<br />
the discussed model is slightly underestimated.<br />
To make the comparison more reliable it would be advisable to assess <strong>and</strong><br />
consider the type of the environment in which BTSs are located. This issue is addressed<br />
in the authors’ current research activities.<br />
Acknowledgment<br />
The measurement results utilised in this paper have been obtained as part<br />
of the EfficienSea project, partially financed by the EU Baltic Sea Region<br />
2007-2013 Programme.<br />
References<br />
[1] ITU-R, Method for Point-to-Area Predictions for Terrestrial Services in the Frequency<br />
Range 30 MHz to 3000 MHz, Recommendation ITU-R P.1546-4, Geneva, 10/2009.<br />
[2] R. Niski, K. Bronk, J. Stefański, Opracowanie narzędzia programowego do<br />
prognozowania zasięgów stacji brzegowych dla potrzeb radiokomunikacji morskiej<br />
(nr 08300047) Instytut Łączności – Państwowy Instytut Badawczy, 2007.<br />
[3] R. Niski, J. Żurek, New empirical model of propagation path loss for the Baltic Sea<br />
in the marine VHF frequency b<strong>and</strong> (Polish Journal of Environmental Studies) HARD,<br />
Olsztyn 2007, no. 4B, vol. 16, pp. 143-145.<br />
[4] R. Niski, J. Żurek, Empiryczna weryfikacja modeli propagacyjnych w strefie<br />
przybrzeżnej Morza Bałtyckiego (Zeszyty Naukowe Wydziału Elektroniki,<br />
Telekomunikacji i Informatyki Politechniki Gdańskiej. Radiokomunikacja, Radiofonia,<br />
Telewizja) Politechnika Gdańska, Gdańsk 2007, nr 1, s. 117-120.<br />
[5] Communication for e-Navigation – results of the tests <strong>and</strong> measurements, E-Navigation<br />
Underway 2012 Conference, 18-20 January 2012, Copenhagern – Oslo – Copenhagen.<br />
[6] A. Lipka, K. Bronk, R. Niski, Measurement campaign at the Baltic Sea, 2012,<br />
EfficienSea report.
Chapter 7<br />
Mobile Ad-hoc<br />
<strong>and</strong> Wireless Sensor Networks
Algorithms for Channel <strong>and</strong> Power Allocation<br />
in Clustered Ad hoc Networks<br />
Luca Rose 1 , Christophe J. Le Martret 1 , Mérouane Debbah 2<br />
1 Thales <strong>Communications</strong> <strong>and</strong> Security, France,<br />
{luca.rose, christophe.le_martret}@thalesgroup.com<br />
2 Alcatel – Lucent Chair in Flexible Radio, Supelec, France,<br />
merouane.debbah@supelec.fr<br />
Abstract: In the context of mobile clustered ad hoc networks, this paper proposes <strong>and</strong> studies a self-<br />
-configuring algorithm which is able to jointly set the channel frequency <strong>and</strong> power level of the transmitting<br />
nodes, by exploiting one bit of feedback per receiver. This algorithm is based upon a learning<br />
algorithm, namely trial <strong>and</strong> error, that is cast into a game theoretical framework in order to study its<br />
theoretical performance. We consider two different feedback solutions, one based on the SINR level<br />
estimation, <strong>and</strong> one based on the outcome of a CRC check. We analytically prove that this algorithm<br />
selects a suitable configuration for the network, <strong>and</strong> analyse its performance through numerical<br />
simulations under various scenarios.<br />
I. Introduction<br />
In recent times, the interest for technological solutions which allow communications<br />
to happen in difficult conditions, e.g. without the aid of a central controller,<br />
has gained much momentum. The development of cognitive radios (CR), devices<br />
able to sense their environment <strong>and</strong> to modify their configuration in accordance,<br />
has made this a reality.<br />
On operational theatres, the presence of a fixed central controller infrastructure,<br />
for instance a base station, configuring the whole network is difficult to implement<br />
<strong>and</strong> is not desirable for the weakness it presents against potential enemies. Moreover,<br />
one can expect future equipments on the battlefield to be able to exploit the free<br />
spectrum to communicate <strong>and</strong> to keep their transmit power as low as possible.<br />
The goal is both minimizing their spatial frequency footprint, avoiding to pollute<br />
transceivers from other networks, <strong>and</strong> reducing the battery drain while achieving<br />
a certain Quality of Service (QoS). The concept of cognitive, self-configuring ad hoc<br />
network, thus, is a c<strong>and</strong>idate solution to all of the above challenges.<br />
In our work, we consider clustered ad hoc networks where the nodes are grouped<br />
into subsets (clusters), each of which is led by a cluster head (CH). We assume
230 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
that all the clusters share the same frequency b<strong>and</strong>, each CH being in charge of allocating<br />
sub-channels of the common resource to the multiple transmitter-receiver<br />
links that need to be operated within its cluster.<br />
The CH, basically, fulfils two purposes: () i it selects a frequency-channel <strong>and</strong><br />
a power level to be employed by the devices within its control zone, ( ii ) it manages<br />
the intra-cluster communication by allocating logical sub-channels to each link.<br />
Thus we can consider our system as locally centralized, <strong>and</strong> globally distributed.<br />
In order to do so, we assume that the CH only relies on local information, without<br />
any form of cooperation or explicit coordination with the other CHs. This reduces<br />
the amount of signalling dem<strong>and</strong>ed <strong>and</strong> makes the network more resistant to jamming<br />
attacks. For the same reasons, we need to minimize the amount of feedback<br />
between the CH <strong>and</strong> the nodes under its control.<br />
The closest works to ours are [1-4]. In [1] an algorithm for interference avoidance<br />
is presented assuming an underlying clustered ad hoc network. The algorithm<br />
sets the frequency channel, leaving to the CH the duty to choose the power based<br />
on the needs of the cluster’s devices. The authors assume the clusters to be far<br />
apart from each other in such a way that the interference created form one cluster<br />
to another does not depend on the actual transmitters location. In [2], authors<br />
consider <strong>and</strong> present a trial <strong>and</strong> error (TE) algorithm, <strong>and</strong> analytically study its<br />
convergence properties. There, the scenario under analysis is composed of a group<br />
of communicating links, without considering the structure of a clustered network.<br />
In [3], authors suggest the use of iterative water filling (IWF) to allocate sub-channels<br />
<strong>and</strong> power in order to achieve a certain QoS, measured in terms of achievable rate.<br />
The authors assume a system with low interference, i.e., interferers very distant<br />
from each other, such that the convergence of the IWF could be insured. In [4],<br />
authors consider a clustered network where, in each cluster, a single transmitter<br />
broadcasts to the other nodes. In this work, each transmitter allocates its power<br />
using an IWF strategy aiming at maximizing the weighted mean of the throughputs.<br />
In a clustered network with many transmitters <strong>and</strong> only one decision maker, it is<br />
not practical to implement such a water-filling strategy. Indeed, this would require<br />
all the receivers to feedback to the decision maker their channel state information.<br />
Thus, this strategy requires a large amount of signalling to allow the CH to evaluate<br />
the correct power allocation. Moreover, there exists a sufficient literature, e.g. [4-6]<br />
showing that, in decentralized networks, the operating point achieved through<br />
IWF is often less efficient than the one achieved through spectrum segregation,<br />
i.e. forcing each link to operate only on a small fraction of the available b<strong>and</strong>width.<br />
In our paper, we present <strong>and</strong> detail an algorithm which, when employed by all<br />
the CHs, is able to set the network channel <strong>and</strong> power configuration by exploiting<br />
the information of only one bit feedback per receiver. This algorithm, namely trial<br />
<strong>and</strong> error learning algorithm, has been studied in [2] under the assumption of a static<br />
scenario (i.e., time invariant channel, fixed power gains <strong>and</strong> network topology),<br />
with the transceivers aiming at achieving a certain SINR to fulfil a given QoS.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
231<br />
In this paper, we study several scenarios taking into consideration cluster<br />
mobility as well as more realistic communication performance metrics. We show<br />
the capability of the proposed algorithm to statistically steer the network into a state<br />
where clusters next to each other employ different channels.<br />
Therefore, the main contributions of this paper are the following: () i we detail<br />
a self configuring algorithm by defining all its parameters; ( ii ) we study its behaviour<br />
under several scenarios; ( iii ) we compare two ways of measuring transmission<br />
success, either by comparing the estimated SINR to a target or by considering<br />
packet integrity through cyclic redundancy check (CRC) of the transmitted packet;<br />
( iv ) through numerical simulations, we estimate the optimal number of spectral<br />
resources, (i.e., channels) the network should be providing for the algorithm to well<br />
perform.<br />
The paper is organized as follows. In Sec. II we present the general model of an<br />
ad hoc network <strong>and</strong> provide its associated game-theoretical model in Sec. III. In Sec.<br />
IV we briefly describe the resource allocation algorithm <strong>and</strong> we show the test bench<br />
scenarios in Sec. V providing the results of the experiment in Sec. VI. Finally, we<br />
conclude our work in Sec. VII.<br />
II. System model<br />
In this work, we consider a network populated with<br />
of which composed by<br />
links (transmitter-receiver pairs), with<br />
clusters, each<br />
N<br />
N<br />
K<br />
N .<br />
k k k<br />
Let 1, 2, , K<br />
<br />
k<br />
1, 2, ,<br />
N<br />
the set<br />
k<br />
of links within an arbitrary cluster . The nodes communicate by sharing a common<br />
spectrum, thus creating mutual interference. The overall spectrum is divided<br />
into channels, <strong>and</strong> we denote by 1, 2, ,C<br />
the set of available channels.<br />
Each cluster, say , is managed by its CH, which selects its transmission setting,<br />
i.e., a channel <strong>and</strong> a power level , to be used by all the devices belonging<br />
to the cluster. The power level is chosen among a finite set of possible power<br />
levels 0, , P MAX<br />
, where P<br />
MAX<br />
is the maximum amount of power that can be<br />
used by a transmitter device. The CH divides the selected channel, , into N<br />
sc<br />
orthogonal logical sub-channels <strong>and</strong> assigns them to the links to avoid intra-cluster<br />
interference. Assuming a time division multiple access scheme (slotted frame),<br />
each CH allocates to each link a set of sub-channels per slot, as depicted in Fig. 1.<br />
We define by the set of sub-channels allocated to link <strong>and</strong> by an arbitrary<br />
element of . In every cluster we also assume that the transmit power on each<br />
sub-channel is constant for all the links.<br />
indicates the set of clusters <strong>and</strong> <br />
k<br />
k
232 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 1. Sub-channel assignment instance. Each different colour corresponds to a different link<br />
We consider flat <strong>and</strong> block fading channels, i.e., channels power gain is both<br />
time <strong>and</strong> frequency invariant for the whole duration of one transmission. As such,<br />
the level of multiple access interference (MAI) in each sub-channel suffered by<br />
a receiving node, for instance the receiving node of link , on the sub-channel<br />
is given by the sum of the interference created by all the transmitters which employ<br />
the same sub-channels at the same time, that is:<br />
N<br />
x<br />
k<br />
MAI k 1<br />
( , ) <br />
pxg( l, m)1 t<br />
<br />
.<br />
m s ckc<br />
<br />
(1)<br />
<br />
x<br />
s s<br />
N<br />
<br />
sc<br />
xk lx<br />
k<br />
In (1), gl (,<br />
m)<br />
indicates the channel power gain between the transmitting<br />
node of link <strong>and</strong> the receiving node of link , <strong>and</strong> 1 <br />
is the indicator function.<br />
Therefore, the level of the SINR experienced by the receiver of link on<br />
sub-channel is given by:<br />
N pg( , )<br />
SINR <br />
,<br />
( <br />
k , s)<br />
m N<br />
k k<br />
k k m m<br />
2<br />
sc<br />
MAI<br />
k<br />
( m , s)<br />
k k<br />
where g( m, <br />
m)<br />
indicates link power gain, which is modelled by the two-ray<br />
model [7], i.e.<br />
2 2<br />
k j k j<br />
m l m l<br />
<br />
4<br />
d k j<br />
( m , l )<br />
(2)<br />
G G h h<br />
k j<br />
g( , ) .<br />
(3)<br />
m<br />
l<br />
In (3), <strong>and</strong> represent the antenna gains, , the height of the antennas<br />
of nodes <strong>and</strong> respectively, <strong>and</strong> d<br />
( <br />
k j<br />
m , <br />
is the distance between the two<br />
l )<br />
nodes. In order to study the performance of the network, we assume the queue of each<br />
transmitter to be not empty, i.e., we analyse the system in a fully loaded situation.<br />
For the sake of simplicity, we consider an uncoded binary phase shift keying<br />
(BPSK) modulation scheme for each sub-channel transmission. Since the transmitters<br />
may use multiple sub-channels per link to perform their communication, we<br />
introduce an equivalent SINR that accounts for all the sub-channels in order to<br />
assess the link performance. We define our equivalent SINR based on a bit error
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
233<br />
rate (BER) point of view. Here, we consider the interference as Gaussian noise, thus,<br />
the equivalent SINR may be expressed, by applying uncoded BPSK BER formula, as:<br />
<br />
N<br />
<br />
SINR ( ) erfc erfcSINR <br />
<br />
,<br />
<br />
k<br />
1<br />
k<br />
eq m<br />
( <br />
k , s)<br />
N<br />
sc m<br />
s<br />
where erfc is the complementary error function.<br />
III. Game formulation<br />
In this section, we model the scenario presented in Sec. II under a normalform<br />
formulation [8].<br />
(4)<br />
A. Normal-form<br />
A game in a normal-form is defined by a triplet:<br />
<br />
<br />
<br />
<br />
<br />
, , uk (5)<br />
k<br />
where, represents the set of players, 12 ... K<br />
is the joint set of actions<br />
with , i.e., ak ( pk, ck)<br />
. Since the utility is a measure of the individual<br />
quality of the chosen action, its formulation strongly depends on the type<br />
of feedback chosen. Here, we formulate our utility function as<br />
1<br />
<br />
p<br />
<br />
k<br />
uk( a) 1 Feedback<br />
x( ) ,<br />
1 N <br />
a<br />
<br />
k<br />
P <br />
MAX x<br />
<br />
where Feedback<br />
x( a ) is a one bit value, which depends on the nature of the feedback<br />
chosen in the network, as described in the following section. This utility function<br />
is chosen to be monotonically decreasing with the power consumption<br />
<strong>and</strong> increasing with the number of successful transmission Feedback<br />
x( a ). The parameter<br />
tunes the interest we have in satisfying the constraints over the power<br />
consumption.<br />
Definition 1. (Interdependent game). The game is said to be interdependent<br />
if for every not empty subset <strong>and</strong> every action profile a<br />
( a , a )<br />
<br />
it holds that:<br />
'<br />
'<br />
i , a a : u ( a , a ) u<br />
( a , a ). (7)<br />
k<br />
i i <br />
<br />
(6)<br />
In the following, we assume that game is interdependent. This is a reasonable<br />
assumption, since, physically, this means that no cluster is electromagnetically<br />
isolated. Under a normal-form formulation, the solution concept used is the Nash<br />
equilibrium (NE), which we define as follows:
234 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Definition 2. (Nash equilibrium in pure strategies). An action profile <br />
is a NE of game if <strong>and</strong> a<br />
k<br />
k<br />
* * ' *<br />
u ( a , a ) u ( a , a ).<br />
(8)<br />
k k k k k k<br />
Generally speaking, a game can have an arbitrary number of NE, thus, to<br />
measure the efficiency of each one, we introduce the social welfare function, defined<br />
by the sum of all individual utilities: W( a) u ( a ).<br />
B. QoS <strong>and</strong> feedback strategies<br />
K<br />
<br />
In this work, we express the QoS constraints in terms of SINR, which means<br />
that we fix a given SINR target for each link. For simplicity sake, this value will be<br />
assumed here constant, i.e. equal to , for all links. As explained in the previous<br />
section, the utility function design (6) allows the system to take these constraints<br />
into account.<br />
We discuss now two different feedback strategies that can be applied in real<br />
systems.<br />
1) SINR-based feedback:<br />
This is the first strategy that naturally arises, given that the QoS is expressed<br />
in terms of SINR. Most of communication systems estimate the received SNR<br />
based on pilot sequences, <strong>and</strong> thus the SINR when MAI is present. Relying on this<br />
capability, we define the feedback as:<br />
Feedback a 1 .<br />
(9)<br />
x<br />
k<br />
k<br />
SINR<br />
a<br />
This formulation was proposed <strong>and</strong> studied in [9]. There, authors proved that<br />
with a utility function such as (6), the action profile which maximizes the social<br />
welfare is the one which () i maximizes the number of links which simultaneously<br />
satisfy the SINR condition, ( ii ) minimizes the network power consumption. Tuning<br />
the parameter allows to favour either the QoS constraints satisfaction for<br />
large values, or the consumed power for small values.<br />
2) CRC-based feedback:<br />
Usually, communication systems implement a CRC to check the integrity<br />
of the received packets. From this information, it is thus possible to infer the quality<br />
of the communication link, <strong>and</strong> this allows us to consider another kind of feedback<br />
defined as:<br />
Feedback ( a ) 1 .<br />
(10)<br />
x<br />
<br />
x<br />
<br />
CRC x ( a) 0<br />
Here, the receivers feedback a 1 if the packet is received without errors <strong>and</strong><br />
a 0 otherwise. Note that, in this case the result in [9] does not apply, especially since
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
235<br />
the CRC is a stochastic function of the action profile . In this case, the theoretical<br />
framework is not able to predict the exact point of convergence of the algorithm.<br />
However, simulation results, illustrated in Sec. VI, indicate that this way of evaluating<br />
the feedback results in better performance.<br />
IV. Trial <strong>and</strong> error<br />
In this section, we briefly summarize the TE algorithm, introduced in [10], [11],<br />
<strong>and</strong> applied to wireless networks in [2]. TE is a state machine which selects, in a fully<br />
decentralized way, a strategy for a player such that, when every player is using<br />
the same scheme, the system is at an optimal NE a large proportion of the time<br />
with high probability. A state of a player is defined as a triplet zk ( mk, ak, uk)<br />
,<br />
where mk, ak,<br />
u<br />
k<br />
represent, respectively, the mood, the benchmark action <strong>and</strong><br />
the benchmark utility of player . There are four possible moods, each implying<br />
a different behaviour <strong>and</strong> depending on different responses by the network.<br />
• Content<br />
If player is content, then it plays action a<br />
k<br />
with probability (1 ) , <strong>and</strong><br />
another action (chosen r<strong>and</strong>omly according to some probability distribution)<br />
with probability Here, 0 1, namely the experimentation probability,<br />
0.02<br />
is a parameter of the system. Numerical simulations suggest as a value<br />
K<br />
with a good trade off between stability <strong>and</strong> experimentation. At each iteration,<br />
each player compares the actual utility with the benchmark utility u<br />
k.<br />
There<br />
are four possible outcomes: () i if uk<br />
uk<br />
, <strong>and</strong> it did not experiment, i.e., ak<br />
ak<br />
,<br />
player mood becomes hopeful, ( ii ) if uk<br />
uk<br />
, <strong>and</strong> it experimented, i.e., ak<br />
ak<br />
,<br />
( ( k ( ) k ))<br />
then, with probability<br />
F u a <br />
u , becomes the new benchmark action, <strong>and</strong><br />
the new benchmark utility; ( iii ) if uk<br />
uk<br />
<strong>and</strong> ak bar ak<br />
then the player mood<br />
turns to watchful; ( iv ) if uk<br />
uk<br />
<strong>and</strong> ak<br />
ak<br />
, then nothing changes. Here F()<br />
,<br />
is a non increasing function as explained in [11].<br />
• Hopeful<br />
If player is hopeful it evaluates its utility <strong>and</strong> compares it with the benchmark<br />
utility u<br />
k<br />
. If uk<br />
uk<br />
, then the player mood becomes content <strong>and</strong> the benchmark<br />
becomes the new benchmark utility. If uk<br />
ruk,<br />
then the player becomes<br />
watchful.<br />
• Watchful<br />
If player is watchful it evaluates its utility <strong>and</strong> compares it with the benchmark<br />
utility u<br />
k.<br />
If uk<br />
uk, then the player mood becomes discontent. If uk<br />
uk,<br />
then the player becomes hopeful.
236 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
• Discontent<br />
If player is discontent, it experiments a r<strong>and</strong>om action <strong>and</strong> evaluates its<br />
G( u )<br />
corresponding utility . Then, with probability k<br />
the player mood becomes<br />
content, with <strong>and</strong> as new benchmark action <strong>and</strong> utility. Here, G( ), is a non<br />
increasing function as explained in [11].<br />
A. Trial <strong>and</strong> error properties<br />
The theoretical properties of TE have been thoroughly analysed in precedent<br />
works. In this section, we report two among the most relevant results with our<br />
notations.<br />
Theorem 1. Let be an interdependent game, <strong>and</strong> let it have at least one NE<br />
<strong>and</strong> let each player employ TE, then a NE that maximizes the social welfare among<br />
all equilibrium states is played a large proportion of the time.<br />
This theorem, shown in [11], states that the algorithm does not only look for<br />
individual optimality (the NE) but, among the states individually optimal, it searches<br />
the one which maximizes the global outcome.<br />
Theorem 2. Let <strong>and</strong> let game be interdependent with at least one NE.<br />
Then, TE converges to the NE where the number of links satisfied is maximized <strong>and</strong><br />
the power employed to obtain this result is minimized.<br />
This result, proven in [9], shows that TE is able to select among all the possibilities<br />
an optimal working point for the network under analysis, at least for a large<br />
proportion of the time.<br />
V. Scenario description<br />
The scope of this section is to present <strong>and</strong> describe the scenarios used to<br />
run the simulations <strong>and</strong> study the performance of TE. First, we consider a static<br />
dense scenario. Second, we consider a mobile scenario with one cluster moving<br />
around four static clusters. We aim at illustrating that TE is suitable for configuring<br />
networks even in mobility, where channels are, thus, no more time-invariant.<br />
In the following, we set K 1 , to comply with the conditions in Theorem 2.<br />
A. Static scenario<br />
In this scenario, we consider a square field of 5 km per side populated with<br />
K 16 equally dimensioned square clusters, each of which has a side of 5 km.<br />
4<br />
In each cluster, 8 nodes are r<strong>and</strong>omly positioned as in Fig. 2. The clusters are<br />
not overlapping, the nodes belonging to each cluster are coloured with different<br />
colours, <strong>and</strong> the role (transmitter or receiver) is decided once <strong>and</strong> for all. In this
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
237<br />
scenario, each cluster has N<br />
sc<br />
sub-channels, which are r<strong>and</strong>omly associated<br />
with the links. This means that, between two TE loops there will be three time slots,<br />
N<br />
sc<br />
<strong>and</strong> three feedbacks. For each of these packets 2 sub-channels are r<strong>and</strong>omly<br />
Nk<br />
assigned for each link.<br />
Figure 2. Square scenario setting with K = 16 clusters <strong>and</strong> N k = 4 pairs. Clusters <strong>and</strong> nodes<br />
are static with SINR-based feedback. CH, AVG PW, <strong>and</strong> AVG SAT indicate respectively the most<br />
frequently selected channel, the APC <strong>and</strong> the AS.<br />
B. Mobility scenario<br />
In this scenario, we evaluate the performance of TE in the presence of a moving<br />
cluster. We assume clusters to be aligned <strong>and</strong> sharing the spectrum<br />
while a fifth cluster is far enough to be creating little interference. An instance<br />
of this starting situation is depicted in Fig. 3. In this case the topology is such that,<br />
between the four static clusters, there exists an empty space for the fifth cluster to<br />
pass. Therefore, when all the five clusters are aligned, no cluster is overlapping with<br />
another. This happens after around 2250 iterations. Later, the cluster in mobility<br />
reaches the end of the field after 3000 iterations. Here, the number of available channels<br />
is restricted to .
238 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 3. Cluster positions at the beginning of the mobility scenario with K=5 clusters in a field<br />
of 1 km side. Four clusters are static <strong>and</strong> aligned, the cluster at the bottom is the one in mobility.<br />
VI. Simulation results<br />
In this section, we evaluate the performance of the TE for the scenarios<br />
introduced in Sec. II according to some metrics defined in the following section.<br />
A. Performance metrics<br />
In order to evaluate the performance <strong>and</strong> the behaviour of the proposed<br />
algorithm, we have selected the following metrics:<br />
• Average satisfaction (AS): defined as the average number of positive feedbacks<br />
the receivers send to their CH, for each iteration of the TE. It evaluates<br />
how much the algorithm enables to satisfy the criterion selected by<br />
the feedback (either SINR or CRC).<br />
• Average power consumption (APC): defined as the average amount of power<br />
used by the transmitters in a cluster to achieve the corresponding satisfaction<br />
level. It captures how much power is consumed per cluster.<br />
• Packet error rate (PER): defined as the average dropped packets, it helps<br />
evaluating the link quality <strong>and</strong> thus if the algorithm is correctly configuring<br />
the network.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
239<br />
• Channel switch per iteration (CSpI): defined as the average number of channels<br />
that have changed for each TE iteration <strong>and</strong> thus captures the channel<br />
allocation stability.<br />
B. Static scenario, SINR-based feedback<br />
In this section, we analyse the performance of TE, in terms of satisfaction <strong>and</strong><br />
power consumption, applied to the square scenario described in Sec. V-A. Here,<br />
receivers feedback their satisfaction based on the comparison between the received<br />
SINR <strong>and</strong> the threshold , fixed in the simulation equal to 10 dB.<br />
In Fig. 4, we plot AS in the network <strong>and</strong> the APC by the nodes as a function<br />
of the iteration number. As we can see, full satisfaction is not reached. This is due<br />
to the scarcity of resources in the network that does not permit full satisfaction.<br />
This can be understood intuitively since, in a network with K 16 clusters sharing<br />
channels, each cluster has on the average two neighbour clusters which<br />
employ the same channel.<br />
Figure 4. Achieved AS <strong>and</strong> APC as a function of the TE iterations for a square static scenario,<br />
with SINR-based feedback<br />
In Fig. 2, we show the node localizations on the field <strong>and</strong> the corresponding<br />
links with the AS <strong>and</strong> APC along with the most often chosen channel for each
240 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
cluster. Note that having the same channel as the most used ones does not imply<br />
a collision, since the channels might be used in different time slots. On the contrary,<br />
having two different channels as the most used one implies no interference<br />
for a large part of the simulation.<br />
C. Mobility scenario<br />
In this simulation, we refer to the scenario presented in Sec. V-B. First we<br />
consider the case where receivers feedback their satisfaction based on the comparison<br />
between the received SINR <strong>and</strong> the threshold 10 dB. Then, we consider<br />
the case where receivers send a CRC-based feedback.<br />
In Fig. 5, we plot the global performance of the system in terms of AS <strong>and</strong> APC.<br />
It is possible to see the drop down of the system performance after 2000 iterations.<br />
The algorithm reacts by increasing the power level <strong>and</strong> by modifying the channel<br />
configuration. The satisfaction level, then, increases when the algorithm rearranges<br />
the channel <strong>and</strong> power allocation scheme in order to suit the new topology. Note<br />
that, when the mutual interference is too high, TE turns off one cluster by selecting<br />
zero power. The rationale behind this is that, if the desired level of SINR is not reachable<br />
by the current topological configuration, then the algorithm prefers to stop one<br />
of the clusters to improve the individual utility. When the algorithm reaches a different<br />
channel assignation pattern it is, again, possible to achieve a higher level of satisfaction.<br />
Figure 5. Achieved AS <strong>and</strong> APC as a function of the TE iterations for a square static scenario,<br />
with SINR-based feedback
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
241<br />
In Fig. 6, we plot the AS <strong>and</strong> APC in a similar scenario, where the feedback<br />
is based on the evaluation of a CRC over a packet of 256 bytes. Note that,<br />
here, the reaction to the approach of the moving cluster appears to be a sudden<br />
increment in the power level. The power level increment is larger then when<br />
using an SINR-based feedback. Intuitively, this is due to the fact that the CRC<br />
test is more tolerant on the SINR decrement than the SINR test. Therefore,<br />
the transmission power increment is more effective to insure the compliance<br />
with the constraints when considering a CRC-based feedback than when considering<br />
a SINR-based one.<br />
Figure 6. Achieved AS <strong>and</strong> APC as a function of the TE iterations for a the mobility scenario,<br />
with SINR-based feedback<br />
In Fig. 7 we plot a summary of the simulation run. Here each colour represents<br />
one of the possible two channels, while the height of the bins represents the used<br />
power. The static clusters are indexed with numbers 1, 2, 4, <strong>and</strong> 5 <strong>and</strong> the moving<br />
cluster is indexed with the number 3. When the system reaches time instant () i<br />
the 3rd cluster is close enough to create interference to the other clusters. This forces<br />
the system to reorganize the power-channel pattern. When the moving cluster<br />
is completely aligned with the others ( ii ) the system starts working in an orthogonal<br />
way <strong>and</strong> the power starts decreasing. At ( iii ) the cluster is far enough to stop<br />
creating interference.
242 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 7. Channel-power allocation as a function of the TE iterations for the mobility scenario with<br />
two channels. Each colour represents a different channel, <strong>and</strong> the heights of the graph the transmit<br />
power level. Clusters 1, 2, 4, 5 are static, cluster 3 is in mobility. (i) beginning of the interference from<br />
the 3rd cluster, (ii) Five clusters are aligned, (iii) end of interference from the 3rd cluster. The blue<br />
solid lines represent P MAX = 50 W.<br />
D. Static scenario, CRC-based feedback<br />
In this section, we analyse the performance, in terms of satisfaction <strong>and</strong> power<br />
consumption when the TE is applied to the square scenario described in Sec. V-A.<br />
We recall that, in the following graphs, the upper curve measures the AS, where<br />
the feedbacks are calculated with a CRC on the received packets. We recall that in this<br />
simulation each packet is considered to be 256 bytes long. In Fig. 8, the performance<br />
of such a system is summarized. The upper curve represents the AS reached in the network,<br />
while the lower curve represents the APC. Note that, it is not possible to directly<br />
deduce the PER from the satisfaction. Especially, low levels of AS do not automatically<br />
translate into high levels of PER. This is because, when the transmitter is employing<br />
zero power, which may happen especially if the satisfaction level is low, the feedback<br />
is zero, but it cannot be considered as an unsuccessful transmission. Therefore, to<br />
evaluate the PER, we need to reduce the level of no-satisfaction by the amount<br />
of time the transmitters were using zero power. On the other h<strong>and</strong>, a high level<br />
of AS, can guarantee a high number of packets received correctly, which translates<br />
in a low PER. In this system, simulation results indicate an average PER = 2.8 10 -3 .<br />
Note that, when we employ an SINR-based feedback, we obtain PER = 0.23, which<br />
is much higher for equivalent average employed power.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
243<br />
Figure 8. AS <strong>and</strong> APC as a function of the TE iterations for a square static scenario,<br />
with CRC-based feedback<br />
In Fig. 9, the performance of the algorithm on a single node is reported. It is<br />
possible to see that, generally, most of the transmitted packets are correctly received.<br />
Moreover, it appears that packets errors increase during some particular time windows,<br />
i.e., errors appear in burst. This is probably due to a change in the network<br />
(for instance another cluster starts employing the same channel) which makes<br />
the power-channel pair chosen by the CH inappropriate for the transmission.<br />
Figure 9. Fraction of packet correctly received. Single node CRC outcome for scenario<br />
V-A CRC-based feedback
244 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
E. Channel switch per second<br />
The stability of a network configuration is an important parameter to evaluate<br />
the performance of a self configuring algorithm. TE attempts to steer the network<br />
to a NE, which is inherently stable point. Nonetheless, the stochastic nature of TE,<br />
the incompleteness of the information <strong>and</strong> the lack of CH cooperation leave<br />
space for interference <strong>and</strong> collisions. To evaluate this instability we have defined<br />
the CSpI metric in Sec. VI-A. To compute it, we run 20 simulations on the scenario<br />
described in Sec. V-A <strong>and</strong> we count the number of time a CH switches its channel.<br />
We performed this evaluation both in the case of a SINR-based feedback <strong>and</strong><br />
of a CRC-based feedback <strong>and</strong> found CSpI SINR = 4.5 10 -3 <strong>and</strong> CSpI CRC = 4.3 10 -3 .<br />
As we can see the results are very close one to each other. This is due to the fact that<br />
avoiding other clusters interference is important independently from the nature<br />
of the feedback. As a consequence, in both cases clusters try to employ good (low<br />
interference) channels.<br />
F. Average satisfaction versus available channels<br />
Here, we aim at evaluating the variation of TE’s performance as a function<br />
of the available channels. In this simulation we use the scenario depicted in Sec. V-A,<br />
where we set a CRC-based feedback. In this scenario, we have K 16 clusters <strong>and</strong><br />
we vary the number of available channels for the network from 4 to 18. For each<br />
Figure 10. Expected satisfaction versus available channels. This plot has been realized assuming<br />
a square field as the one described in V-A, assuming a SINR-based feedback
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
245<br />
of this values, we run 20 tests, each of which lasts 6000 TE iterations. We recall<br />
that, three packets are sent for each iteration, <strong>and</strong> each packet has 256 bytes length.<br />
The result is depicted in Fig. 10. It is possible to see that the curve does not reach<br />
the full satisfaction. This is due to the stochastic nature of the algorithm. Since<br />
clusters are experimenting, <strong>and</strong> the CH have no way of cooperating one with each<br />
other, a certain, even if low, level of unsatisfaction is unavoidable. From these<br />
results, it appears that the optimum number of channels should be 10. Here, we<br />
mean optimum as the minimum number of channels needed to keep the network<br />
satisfied at least 90% of the time.<br />
VII. Conclusion<br />
In this paper, we have presented <strong>and</strong> studied the performance of a resource<br />
allocation algorithm, namely the trial <strong>and</strong> error (TE) learning algorithm. We have<br />
shown that it is effectively capable of setting the transmission parameters (channel<br />
<strong>and</strong> power) of clustered ad hoc network, using only one bit feedback per receiver.<br />
This feedback must be an evaluation of the quality of the transmission link. In our<br />
settings, we have proposed two different types of feedback strategies: one based<br />
upon the measurement of the SINR at the receiver, the other reporting the CRC<br />
check status of the transmitted packet over the link.<br />
In a crowded network, when several clusters try to share a few spectral resources,<br />
TE is able to find a setting such that the largest part of the cluster fulfils its<br />
QoS constraints, employing a low level of power. The clusters which are not able to<br />
fulfil their QoS constraints are automatically turned off, saving battery power <strong>and</strong><br />
avoiding useless interference.<br />
When clusters are moving, the changes in the topology force the algorithm to<br />
react quickly <strong>and</strong> to find a different channel <strong>and</strong> power allocation scheme, such as to<br />
satisfy the new conditions. This may be done by a temporary increase in the power<br />
level, or by a reorganization of the channel assignment.<br />
Several paths could be followed to extend this contribution. Experimentation<br />
parameters which adapt on the satisfaction levels, for instance, could be used to let<br />
the algorithm discriminate between almost static or high mobility situations. Moreover,<br />
a study on a more effective probability distribution for the experimentation,<br />
<strong>and</strong> on the effect of the values of the parameters <strong>and</strong> could bring insight on<br />
ways to improve the performance. Finally, the case when an action profile depends<br />
upon stochastic parameters would need to be investigated to study convergence<br />
properties of the game when CRC-based feedback is used.<br />
VIII. Acknowledgment<br />
This research work was carried out in the framework of the CORASMA EDA<br />
Project B-0781-IAP4-GC.
246 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
References<br />
[1] B. Babadi <strong>and</strong> V. Tarokh, “GADIA: A greedy asynchronous distributed interference<br />
avoidance algorithm,” IEEE Transaction on <strong>Information</strong> Theory, vol. 56, pp. 6228-6252,<br />
Dec. 2010.<br />
[2] L. Rose, S.M. Perlaza, M. Debbah, <strong>and</strong> C.L. Martret, “Distributed power<br />
allocation with SINR constraints using trial <strong>and</strong> error learning,” in IEEE Wireless<br />
<strong>Communications</strong> <strong>and</strong> Networking Conference, WCNC, Paris, France, Apr. 2012.<br />
[3] J.S. Pang, G. Scutari, D.P. Palomar, <strong>and</strong> F. Facchinei, “Design of cognitive radio<br />
systems under temperature-interference constraints: A variational inequality approach,”<br />
IEEE Transaction on Signal Processing, vol. 58, no. 6, pp. 3251-3271, Jun. 2010.<br />
[4] V. Le Nir <strong>and</strong> B. Scheers, “Autonomous dynamic spectrum management for<br />
coexistence of multiple cognitive tactical radio networks,” in Proceedings of the Fifth<br />
International Conference on Cognitive Radio Oriented Wireless Networks<br />
<strong>Communications</strong> (CROWNCOM), Jun. 2010.<br />
[5] O. Popescu <strong>and</strong> C. Rose, “Water filling may not good neighbors make,” in IEEE<br />
Global Telecommunications Conference – GLOBECOM, San Francisco, CA, USA,<br />
Dec. 2003.<br />
[6] L. Rose, S.M. Perlaza, <strong>and</strong> M. Debbah, “On the Nash equilibria in decentralized<br />
parallel interference channels,” in IEEE Workshop on Game Theory <strong>and</strong> Resource<br />
Allocation for 4G, Kyoto, Japan, Jun. 2011.<br />
[7] T. Rappaport, Wireless <strong>Communications</strong>: Principles <strong>and</strong> Practice, 2nd ed. Upper<br />
Saddle River, NJ, USA: Prentice Hall PTR, 2001.<br />
[8] D. Fudenberg <strong>and</strong> J. Tirole, “Game theory,” MIT Press, 1991.<br />
[9] L. Rose, S.M. Perlaza, M. Debbah, <strong>and</strong> C.L. Martret, “Achieving Pareto optimal<br />
equilibria in energy efficient clustered ad hoc networks,” in <strong>Military</strong> Communication<br />
Conference, Milcom, Orl<strong>and</strong>o, FL, USA, 2012.<br />
[10] H.P. Young, “Learning by trial <strong>and</strong> error,” University of Oxford, Department<br />
of Economics, Economics Series Working Papers 384, 2008.<br />
[11] B.S. Pradelski <strong>and</strong> H.P. Young, “Efficiency <strong>and</strong> equilibrium in trial <strong>and</strong> error<br />
learning,” University of Oxford, Department of Economics, Economics Series Working<br />
Papers 480, 2010.
High Spatial-Reuse Distributed Slot Assignment<br />
Protocol for Wireless Ad-hoc Networks<br />
Muhammad Hafeez Chaudhary 1 , Bart Scheers 2<br />
1 Royal <strong>Military</strong> Academy, Belgium, mh.chaudhary@rma.ac.be<br />
2 Royal <strong>Military</strong> Academy, Belgium, bart.scheers@rma.ac.be<br />
Abstract: Application of ad hoc networks in mission-critical environments requires wireless connectivity<br />
that meets certain quality-of-service (QoS). In such networks mechanism to control access to<br />
the shared wireless channel is crucial to ensure efficient channel utilization <strong>and</strong> to provide the QoS.<br />
TDMA based MAC protocols are considered to be appropriate for this kind of applications; however,<br />
finding an efficient <strong>and</strong> distributed slot assignment protocol is crucial. In this paper, a distributed<br />
slot assignment protocol is developed which gives high spatial reuse of the channel. To assign slots,<br />
the protocol does not need global topology information: Each node assigns slots based on the local<br />
topology information. The protocol can find the conflict-free slot assignment with limited message<br />
overhead. We evaluate the performance of the proposed protocol <strong>and</strong> show that the protocol gives<br />
considerably better channel utilization efficiency than exiting distributed slot assignment protocols.<br />
I. Introduction<br />
The last decade has seen an explosive growth in applications of wireless communications<br />
<strong>and</strong> networking technology bringing ubiquitous mobile service into<br />
the everyday realm. A recent forecast by CISCO suggests that during the current<br />
year there will be more wirelessly connected devices than the total human population.<br />
Moreover, the dem<strong>and</strong> for high-speed wireless data transfer is increasing at<br />
astronomical rates. The phenomenal increase in the wirelessly connected devices<br />
<strong>and</strong> the applications running on them have put an extremely high premium on<br />
the communications spectrum, <strong>and</strong> thus placing great dem<strong>and</strong> on designing spectrum<br />
efficient communication <strong>and</strong> networking protocols to meet the requirements<br />
of the current <strong>and</strong> emerging applications in wireless networking. Currently, a key<br />
area of research is mobile ad hoc networking, which is driven by the requirement<br />
of having a technology that enables a disparate set of mobile devices/nodes create<br />
a network on dem<strong>and</strong>, as the need arises, to accomplish an assigned mission.<br />
In a wireless network, simultaneous transmissions of two or more nodes<br />
in the same channel may not be successful if their intended receivers are in the radio<br />
interference range of more than one transmitter. A mechanism to control access to
248 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
the shared wireless channel is crucial to ensure efficient channel utilization <strong>and</strong> to<br />
provide quality-of-service (QoS). Ad hoc networks for mission-critical applications<br />
<strong>and</strong> emergency response services require that the data be delivered to the destination<br />
node reliably <strong>and</strong> within certain time limits. To support such QoS, schedule based<br />
medium access control protocols using TDMA scheme are deemed suitable [1].<br />
There are numerous algorithms dealing with TDMA slot scheduling in ad hoc<br />
networks, whereby nodes can find conflict-free slot assignment. In [1], a TDMA<br />
slot scheduling protocol named GinMAC is presented; the protocol requires<br />
the network be arranged in a tree-like structure. Building on the GinMAC, in [2]<br />
the BurstProbe slot assignment protocol is proposed. These slot scheduling protocols<br />
require global topology information which may not be available in ad hoc<br />
networks that are inherently bereft of any central coordinating <strong>and</strong> controlling<br />
infrastructure. In [3, 4] a slot assignment protocol called USAP is proposed which<br />
allows nodes to get conflict-free slot assignment in a distributed way using local<br />
topology information. Kanzaki <strong>and</strong> his colleagues proposed a protocol named<br />
ASAP in [5, 6] which can be viewed as an extension of the USAP, adding details<br />
on dynamic frame-size selection <strong>and</strong> more detailed procedures about the nodes<br />
joining/leaving the network. Another related protocol named DRAND is proposed<br />
in [7], <strong>and</strong> later on extended to Z-MAC [8] which combines artifacts of both TDMA<br />
<strong>and</strong> CSMA medium access schemes. The main focus of these protocols (<strong>and</strong> others<br />
like in [9, 10]) is to find conflict-free slot assignment to nodes in a distributed<br />
way. The maximization of the channel utilization efficiency (i.e., the spatial reuse<br />
of the slots) is not explicitly considered. Thus from channel utilization viewpoint,<br />
these protocols may give suboptimal performance.<br />
In this paper, we propose a high spatial-reuse distributed slot assignment protocol<br />
(HUDSAP). In the protocol, the nodes find slot assignment using their local<br />
topology information. The protocol introduces a priority mechanism by which<br />
nodes having higher number of one-hop neighbors (NoNs) assign slots first. Each<br />
node computes its priority index independently using only the information form<br />
the nodes within its contention zone. We show that the protocol achieves substantially<br />
higher channel utilization efficiency than the DRAND <strong>and</strong> related protocols.<br />
The remainder of the paper is organized as follows: Section II gives preliminaries<br />
on slot assignment <strong>and</strong> the problem formulation; Section III presents details<br />
of the proposed slot assignment protocol; Section IV outlines an adaptive frame<br />
length selection scheme; Section V illustrates the performance of the protocol by<br />
simulation examples; <strong>and</strong> finally Section VI gives some concluding remarks.<br />
II. Preliminaries <strong>and</strong> problem formulation<br />
For the slot assignment we represent the network by a graph G =(ϑ, ξ), where<br />
ϑ is the set of vertices that correspond to the nodes in the network <strong>and</strong> ξ is the set<br />
of edges representing the wireless links between the nodes. We assume that for any
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
249<br />
two distinct vertices i, j Î ϑ, an edge (i, j) exits in ξ if <strong>and</strong> only if i <strong>and</strong> j can hear<br />
each other – that is, all edges are bidirectional.<br />
Given a graphical representation of the network, the TDMA slot assignment<br />
problem with the associated assignment constraints can be defined as an equivalent<br />
graph coloring optimization problem. The equivalence between the two problems<br />
is one-to-one; that is, two nodes receive different slots if <strong>and</strong> only if the corresponding<br />
vertices have received different colors. Moreover, the total number of slots is equal<br />
to the total number of colors used.<br />
The objective of the slot assignment optimization problem is to minimize<br />
the number of slots used to find the transmission schedule for all nodes in the network<br />
under the constraint that a node can only assign a slot that has not been used<br />
within the contention zone of the node. The contention zone of a node is assumed to<br />
be limited to its two-hop neighbors. As is often assumed in designing MAC protocols,<br />
such a definition of the contention zone is imposed to remove the hidden-terminal<br />
problem. The hidden-terminal problem arises when two nodes cannot hear transmissions<br />
of each other but a third node can hear transmissions of both of them.<br />
An optimal solution for slot scheduling problem is known to be NP-complete<br />
[11, 12]: That is, the computational complexity of finding the solution increases<br />
exponentially as the number of nodes increases; which means it becomes prohibitively<br />
time consuming to find the optimal slot schedule. That is why to solve the slot<br />
assignment problem, in literature heuristic-based suboptimal solutions are proposed<br />
that vary in their schedule length, the convergence time, <strong>and</strong> the message overhead.<br />
To this end, in [13], three greedy heuristic-based slot assignment procedures are<br />
proposed: namely, the RAND (r<strong>and</strong>om), the MNF (minimum neighbor first),<br />
<strong>and</strong> the PMNF (progressive minimum neighbor first), listed in increasing order<br />
of complexity. The basic principle underlying each of these schemes is essentially<br />
the following: first, give a unique label to each node, <strong>and</strong> then assign slots to nodes<br />
in decreasing order of their labels. In RAND, the nodes are labeled in a r<strong>and</strong>om<br />
way; in MNF, the node with minimum number of neighbors is labeled first; <strong>and</strong><br />
in PMNF, the nodes are labeled as in MNF with a difference that after labeling<br />
a node, the node <strong>and</strong> its edges are removed. Effectively that means, at each step<br />
among the nodes that have not been assigned slot yet, the RAND takes a node at<br />
r<strong>and</strong>om <strong>and</strong> allots time slot to it; the MNF takes the node with maximum number<br />
of neighbors <strong>and</strong> allots slot to it; <strong>and</strong> the PMNF first removes the nodes <strong>and</strong><br />
the associated edges that have already been assigned slots, then within the updated<br />
network assign slot to the node with maximum number of neighbors.<br />
It has been shown in [13] that the schedule length (SL) achieved with the three<br />
schemes is in the order SL PMNF ≤ SL MNF ≤ SL RAND . That is, from the spatial reuse<br />
point of view, the PMNF is the most efficient <strong>and</strong> the RAND the least efficient<br />
among the three labeling schemes. However, the problem with these schemes<br />
is that they require knowledge of the global network topology; that is, they are<br />
centralized schemes. For ad hoc networks, distributed slot assignment schemes
250 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
are sought because such networks are devoid of any central coordinating <strong>and</strong><br />
controlling infrastructure <strong>and</strong> the global topology knowledge is hard to come by<br />
at individual nodes.<br />
Recently a distributed implementation of RAND, known as DRAND, is proposed<br />
in [7] which can achieve the same channel utilization efficiency as the RAND.<br />
The RAND ordering can be viewed as archetype of the channel scheduling in wireless<br />
networks. The roots of many heuristics for slot scheduling algorithms in the literature<br />
can be found to be equivalent to the RAND [3, 5, 7, 8, 14]. The appeal<br />
of RAND lies in its simplicity <strong>and</strong> the ease with which its distributed version<br />
can be implemented. However, as shown in [13], the performance (in terms of SL)<br />
of the RAND can be significantly inferior to the MNF <strong>and</strong> PMNF. In this work, we<br />
present a distributed implementation of MNF, which we call as the HUDSAP that<br />
can achieve same channel utilization efficiency as the MNF by using only the local<br />
topology knowledge at individual nodes. Towards this end, the ensuing section<br />
gives details of the proposed protocol.<br />
III. Slot assignment protocol<br />
We assume that the time is divided into slots <strong>and</strong> the nodes are synchronized<br />
on the slot boundaries. The protocol operates in two main phases: the neighborhood<br />
discovery phase <strong>and</strong> the slot assignment phase. Fig. 1 shows the state diagram<br />
of the protocol, where the slot assignments phase is divided into four states: node classification,<br />
waiting slot assignment, active slot assignment, <strong>and</strong> completed slot assignment.<br />
In the neighborhood discovery phase, a node collects information about the nodes<br />
within its two-hop neighborhood, that is, one-hop neighbors (ONs) <strong>and</strong> two-hop<br />
neighbors (TNs), the NoNs of these nodes, <strong>and</strong> their assigned slots. The two-hop<br />
neighbors are strict two-hop neighbors, that is, it excludes the one-hop neighbors<br />
that can also be reached by another one-hop node. Based on that, the node constructs<br />
neighbor information table (NiT), an example of which is shown in Fig. 2. In the slot<br />
assignment phase, the nodes assign slots in a distributed way as explained next.<br />
Each node compares its NoNs with the NoNs of the nodes, in its NiT, which<br />
have not yet assigned slots, <strong>and</strong> based on that, the node classifies itself in one<br />
of the following three groups:<br />
1. In node group I (NG-I) if the NoNs of the node is greater than the NoNs<br />
of all nodes in its NiT that have not yet assigned slots; for instance, in Fig. 2<br />
initially nodes e <strong>and</strong> p will place themselves in this group.<br />
2. In NG-II if the NoNs of the node is equal to the NoNs of some (one or<br />
more) nodes in its NiT that have not yet assigned slots; for example, in Fig. 2,<br />
node b <strong>and</strong> l will initially place themselves in this node group.<br />
3. In NG-III if the NoNs of the node is less than the NoNs of some (one or more)<br />
nodes in its NiT that have not yet assigned slots; for instance, in Fig. 2, all nodes<br />
will initially place themselves in this node group except nodes b, e, l, <strong>and</strong> p.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
251<br />
Figure 1. State transition diagram of the HUDSAP<br />
The classification at each node is done independently solely based on the local<br />
topology information available at the node in the form of NiT. After the classification,<br />
the node assigns slot to itself <strong>and</strong> the procedure of which depends on<br />
its node group. The slot assignment is managed differently in the three groups,<br />
as shall be explained in the ensuing sections. During the slot assignment phase,<br />
following control messages are exchanged between the nodes: slot assignment<br />
request (SAR), slot assignment grant (SAG), slot assignment confirmation (SAC),<br />
slot assignment denial (SAD), <strong>and</strong> slot assignment failure (SAF). The SAR, SAF,<br />
<strong>and</strong> SAC messages are transmitted by the node that attempts to assign a slot, <strong>and</strong><br />
the SAG <strong>and</strong> SAD are response messages to the SAR message. These response<br />
messages are transmitted by the nodes within the contention area of the node that<br />
has sent out the SAR message.<br />
A. Slot assignment in NG-I<br />
All nodes in this group assign the first free slot that has not yet been assigned<br />
to any node within their two-hop neighborhood. For the network of Fig. 2, initially<br />
the nodes e <strong>and</strong> p are in this group <strong>and</strong> there is no slot assigned to any node<br />
in the network; so both of these nodes assign slot 0 to themselves. After assigning<br />
the slot, the nodes announce their slot assignment to their neighbors by sending<br />
the SAC message as shown in Fig. 3. In this case the nodes do not have to wait for<br />
any confirmation from their one-hop <strong>and</strong> two-hop neighbors about their slot<br />
assignment, because the nodes in this group are sure that there is no other node<br />
within their contention area currently assigning slot until their slot assignment
252 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
is complete; the other nodes in the contention area are prohibited from initializing<br />
slot assignment by the slot assignment procedures for NG-II <strong>and</strong> NG-III, as we<br />
shall see in the ensuing sections. Each one-hop neighbor after receiving the SAC<br />
announcement does the following things: updates its slot assignment information,<br />
forwards the SAC to its ONs, removes the node which transmitted the announcement<br />
from its NiT for further consideration during the classification step, <strong>and</strong><br />
changes its state accordingly as shown in Fig. 1. It is interesting to note that all nodes<br />
in this group can complete slot assignment in one time-slot, as no slot assignment<br />
permission is required from neighbors.<br />
Figure 2. Network topology with NoNs of each node within {.}. An example of NiT<br />
of node p is also shown
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
253<br />
Figure 3. Successful slot assignment to nodes e <strong>and</strong> p in NG-I<br />
Figure 4. Successful slot assignment to node b in NG-II<br />
Figure 5. Failed slot assignment to node b in NG-II<br />
B. Slot assignment in NG-II<br />
For slot assignment in NG-II, we propose two procedures: one based on<br />
an elaborate exchange of control messages, <strong>and</strong> the other based on a prioritization<br />
mechanism using node IDs.
254 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
1) Message exchange based slot assignment:<br />
Each node in this group has at least one or more nodes (that have not<br />
assigned slots yet) in its NiT with the same number of NoNs as that node itself.<br />
For node i, in this group, let N i be the number of nodes with the same<br />
NoNs as the node i that have not yet assigned slots. To assign slot, the node<br />
runs a lottery for which the probability of success is chosen as P (i) =1 / (N i +1).<br />
In case a node does not win the lottery, it will wait for certain time slots chosen<br />
at r<strong>and</strong>om before trying the lottery again. If the node wins the lottery, it assigns<br />
the minimum possible slot that has not been assigned to any node within its<br />
contention-zone <strong>and</strong> sends the SAR message to its neighbors. For the given network<br />
topology in Fig. 2, initially nodes b <strong>and</strong> l are in this group <strong>and</strong> the probability<br />
of winning the lottery for each of them is 1/3. The probability that only one of them<br />
wins the lottery in a given slot <strong>and</strong> thus avoid collision of their announcement<br />
messages is 2/9.<br />
For the slot assignment to be complete, the node has to wait for the SAG messages<br />
from nodes within its contention area. After the slot assignment is granted by<br />
the nodes in the contention area, the node i sends out a SAC message; an example<br />
of which is shown in Fig. 4. Similar to the NG-I, after receiving the confirmation<br />
message, the one- <strong>and</strong> two-hop nodes update their slot assignment information, <strong>and</strong><br />
remove node i from their NiTs for further consideration in the node classification<br />
step. Interestingly, the node i does not have to wait for response messages from<br />
nodes that have NoNs different than the node itself as well as from nodes having<br />
same NoNs that have completed slot assignment. For example, if node i has only<br />
one node with the same NoNs, then a confirmation from only that node is needed:<br />
if that node is a one-hop neighbor then the slot assignment can be completed<br />
in three slots – one to send SAR, second to receive SAG, <strong>and</strong> third to send SAC;<br />
if that node is a two-hop neighbor, then can be done in five slots – two additional<br />
slots are used by the one-hop node to relay SAR/SAG messages; <strong>and</strong> in either<br />
case, a unicast addressing can be employed. This can reduce the traffic overhead<br />
substantially, <strong>and</strong> thereby reduces the chances of collision of the slot assignment<br />
control messages in the network.<br />
When a node receives a SAR message of a one-hop node, the receiving node<br />
performs one of the following tasks:<br />
I. If the receiving node <strong>and</strong> all of its ONs have NoNs which are different<br />
than the NoNs of the SAR transmitter, then the receiving node neither<br />
forwards the SAR to its ONs nor sends a reply message (i.e., SAG/SAD).<br />
The receiving node simply waits for the SAC/SAF message form the transmitter<br />
of SAR.<br />
II. In case the receiving node has same NoNs as the transmitter of SAR but<br />
the NoNs of all of its ONs are different, the receiver node sends a SAG<br />
message to the transmitter. In this case also, the receiver does not forward<br />
the SAR to its ONs.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
255<br />
III. If the NoNs of the receiving node are different than the NoNs of the transmitter<br />
of the SAR message, but one (or more) of its ON(s) has (have)<br />
same NoNs, the receiver forwards the SAR to those ONs. In this case,<br />
the receiver has to relay back any reply message (i.e., SAG/SAD) from its<br />
ONs: The receiver node sends a SAG message if all of its ONs with same<br />
NoNs reply with SAG, <strong>and</strong> otherwise sends a SAD message.<br />
IV. If the receiving node <strong>and</strong> one (or more) of its on-hop nodes have same<br />
NoNs as the transmitter of the SAR message, the receiver node sends a SAD<br />
message to the transmitter if it has already sent a SAG for this particular<br />
slot to one of its ONs other than the transmitter of recently received SAR.<br />
Otherwise, the receiver first forwards the SAR to its ONs with the same<br />
NoNs as the transmitter of SAR <strong>and</strong> waits for their reply. Once the receiver<br />
receives responses of those nodes, it fuses them <strong>and</strong> replies with a SAG<br />
message if all those nodes send SAG, else it replies with a SAD message.<br />
When a node receives a forwarded SAR message of a two-hop node, the receiving<br />
node performs one of the following tasks:<br />
I. If the NoNs of the receiver are different than the NoNs of the originator<br />
of the SAR message, the receiver discards the SAR message <strong>and</strong> does<br />
nothing else.<br />
II. In case the NoNs of the receiver are same as the NoNs of the originator<br />
of the SAR message, the receiver replies with a SAD message if it has already<br />
sent its own SAR message to its neighbors for the same slot, otherwise<br />
it replies with a SAG message.<br />
When a node receives a SAF message originated from a one-hop node it executes<br />
one of the following tasks:<br />
I. If the NoNs of the receiver <strong>and</strong> all of its ONs are different than the transmitter<br />
of the SAF message, the receiver discards the message.<br />
II. In case the NoNs of the receiver are different than the NoNs of the transmitter<br />
but some (one or more) of its ONs have same NoNs as the transmitter,<br />
then the receiver forwards the SAF to those ONs.<br />
III. If the NoNs of the receiver are same as the transmitter, but the NoNs<br />
of all of its ONs are different than the transmitter, then the receiver frees<br />
the slot for which it has earlier sent the SAG message to the transmitter<br />
of SAF. After which, the receiver discards the SAF.<br />
IV. In case the receiver <strong>and</strong> some (one or more) of its ONs have same NoNs<br />
as the transmitter of SAF, the receiver releases the slot <strong>and</strong> forwards<br />
the SAF to those ONs having same NoNs.<br />
When a node receives SAF originated from a two-hop node, the receiver<br />
discards the SAF if its NoNs are different than the transmitter of the SAF, else<br />
it releases the slot related to the SAF.<br />
When a node receives a SAC message it updates its NiT; if the SAC is originated<br />
from a one-hop node, then the receiver also forwards the SAC to its ONs.
256 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Remark 1: The slot assignment in NG-II by the preceding dialog based mechanism<br />
though requires message exchange between a subset of nodes in the contention<br />
area of a node, however, despite this the control message overhead could be high.<br />
For instance, if multiple nodes in a contention area try to assign slots at the same<br />
time, then none of them will succeed <strong>and</strong> they have to try again after a r<strong>and</strong>om<br />
back-off time, which would slow down the convergence of the algorithm. In this<br />
regard, next we present an alternative slot assignment procedure for NG-II which<br />
avoids the preceding detailed message exchange routine when assigning slots to<br />
the nodes.<br />
Figure 6. For linear network topology all nodes except the two nodes at the extremities are in NG-II.<br />
When the number of nodes is large <strong>and</strong> the nodes in the network are in increasing (or decreasing)<br />
order of their IDs, for slot assignment, the nodes on the right (left) edge have to wait until all nodes<br />
on their left (right) side have completed slot assignment<br />
2) Alternative priority based slot assignment procedure:<br />
When all nodes have unique IDs, the slot assignment in NG-II can be h<strong>and</strong>led<br />
in a much simpler way, very much like in the NG-I. Let there be a one-to-one<br />
function Ψ i which could map a node ID i to a unique numeric number µ i , that is,<br />
Ψ i : i → µ i , µ i ≠ µ j , i, j Î J. (1)<br />
Now any node i in NG-II, instead of r<strong>and</strong>omly deciding about when to initiate<br />
slot assignment, compares its ID µ i with the IDs of the nodes (that have not yet<br />
assigned slots) having same NoNs in its NiT. If its ID is greater than these nodes,<br />
it assigns the minimum possible slot(s) to itself which is(are) not yet taken by<br />
the nodes in its contention area; otherwise, the node does not try to assign slot(s)<br />
unless the preceding condition is true. After assigning the slot(s), the node sends<br />
out the SAC message to neighboring nodes. Note that, like the nodes in NG-I, for<br />
slot assignment by this procedure the nodes in NG-II are not required to exchange<br />
messages SAR/SAG/SAD/SAF.<br />
Remark 2: The control message overhead of the alternative priority based slot<br />
assignment procedure is quite low compared to the message exchange based procedure.<br />
However, under the alternative slot assignment procedure, in certain cases,<br />
some nodes in NG-II may have to wait inordinate amount of time for slot assignment,<br />
for example, as shown in Fig. 6, the nodes in NG-II on the right (left) h<strong>and</strong><br />
side have to wait until all other nodes in the group have completed their slot assignment.<br />
In such scenarios where a node in NG-II has to wait excessively long time to<br />
initiate slot assignment, the message exchange based slot assignment mechanism<br />
could be employed. To be more specific, if a node in NG-II does not receive new<br />
slot assignment information, during a predefined time duration, about any node
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
257<br />
within its contention area having the same NoNs as the given node then the node<br />
initiates slot assignment according to the message exchange based procedure.<br />
In this regard, to avoid more than two nodes to initiate slot assignment at the same<br />
time, after expiration of the predefined time duration, the nodes employ r<strong>and</strong>om<br />
back-off mechanism whereby a node waits for r<strong>and</strong>omly chosen time-slots before<br />
starting slot allocation. If during this time, the node receives new slot assignment<br />
information, it will abort the message exchange based slot assignment procedure<br />
<strong>and</strong> will revert to the priority based slot assignment procedure.<br />
C. Slot assignment in NG-III<br />
The nodes in this group do not try to assign slots to themselves. They listen to<br />
the messages from their neighbors, assist in slot assignment of their neighbors by<br />
forwarding slot assignment control messages as discussed in the preceding sections,<br />
<strong>and</strong> update their slot assignment information. When a node, in this group, receives<br />
a SAC message about any node in its contention area, it removes that node from<br />
its NiT for further consideration in the node classification step.<br />
Each node, in NG-II <strong>and</strong> NG-III, that has not yet assigned a slot to itself,<br />
whenever updates its slot assignment information <strong>and</strong> removes any node from<br />
consideration in its NiT, it reruns the node classification test shown in Fig. 1. Note<br />
that after the classification test, a node in NG-II that has not yet assigned a slot to<br />
itself may find itself in NG-I, <strong>and</strong> a node in NG-III may find itself in either NG-II<br />
or NG-I (cannot be in both because the groups are mutually exclusive). For example,<br />
when nodes e <strong>and</strong> p (which were in NG-I) finish slot assignment, their neighbors<br />
d, j, i, <strong>and</strong> o (which were in NG-III) reclassify themselves in NG-II. Each node<br />
h<strong>and</strong>les the slot assignment according to the procedure specific to its current node<br />
group. It is interesting to note that the nodes can only upgrade their groups <strong>and</strong><br />
thus the slot assignment protocol is bound to converge within limited time; that is,<br />
the slot assignment to all nodes will be completed within a bounded time. We will<br />
analyze the convergence time <strong>and</strong> the message complexity of the protocol in more<br />
details in our future work.<br />
Proposition: The execution of the HUDSAP produces conflict-free slot assignment<br />
schedule.<br />
Proof: To show that the slot assignment schedule produced by the HUDSAP<br />
is conflict-free, it suffices to note the following: 1) At any given time only nodes<br />
in NG-I <strong>and</strong> NG-II are assigning slots <strong>and</strong> the two groups are mutually exclusive; 2)<br />
By definition, all neighboring nodes of each node in NG-I do not assign slots until<br />
slot assignment is completed for the nodes in NG-I; <strong>and</strong> 3) Each node in NG-II<br />
assign slot which is not assigned to any other node in its neighborhood by exchanging<br />
the control messages, or by the prioritization mechanism.
258 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
IV. Frame length selection<br />
With uniform frame size across the network, although the design <strong>and</strong> implementation<br />
of the MAC protocol will be simplified, however, the channel resources<br />
will remain underutilized. In the conventional TDMA slot assignment protocols,<br />
frame length is fixed based on the maximum expected number of nodes in the network,<br />
for instance, to ensure that each node gets at least one slot [8]. These protocols<br />
show poor channel utilization as they must leave enough unused slots for new<br />
coming nodes. Another possibility is to dynamically set the frame length for each<br />
node which is equal to the maximum slot number (MSN) assigned within the network.<br />
However, this would require each node to know the MSN. The propagation<br />
of the MSN within the entire network would not be adaptive to the local slot assignment<br />
changes – any change in the slot assignment may change the MSN <strong>and</strong><br />
the new value has to be propagated throughout the network. Although by setting<br />
the network-wide same frame length based on the MSN effectively removes the requirement<br />
of a priori fixing the number of slots in a frame, however, it would still<br />
give lower channel utilization efficiency.<br />
The channel utilization can be improved by variable frame length for each<br />
node depending on the slot assignment in its neighborhood, that is, to change<br />
the frame length dynamically according to the slot assignment to the nodes within its<br />
contention area. If the contention area of a node is limited to its two-hop neighborhood<br />
<strong>and</strong> reuse of slots is allowed outside this area, then each node can set its<br />
frame length which is a function of the MSN assigned within the contention area<br />
(instead of the entire network). Note that, the MSN allocated within the contention<br />
area cannot exceed the two-hop neighborhood size of the node. To have conflictfree<br />
transmission among nodes with different frame lengths, usually the lengths<br />
of frames are chosen as multiple of two [4-8].<br />
To set the frame length L i of node i according to the local MSN, the Z-MAC<br />
protocol in [8] proposed the following rule:<br />
L i = 2 k , (2)<br />
where k is a non-negative integer. The value of k is selected such that the following<br />
holds:<br />
2 k–1 ≤ A i ≤ 2 k –1, (3)<br />
where A i is the MSN within the two-hop contention area of the node i. This scheme<br />
although could achieve better channel reuse than the uniform frame length rule<br />
across the entire network, however this is not optimal from the point of view of channel<br />
utilization efficiency. In this regard, we propose an alternative scheme by which<br />
local framing rule varies depending on the node connectivity. Specifically, we classify<br />
nodes in two groups: leaf nodes <strong>and</strong> non-leaf nodes. For leaf nodes – a leaf node<br />
is a node which has only single one-hop neighbor; otherwise the node is a non-leaf<br />
node – the frame length is selected as in the Z-MAC. For non-leaf nodes, the framing
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
259<br />
rule is modified as follows. Let à i be the MSN within the one-hop neighborhood<br />
of the non-leaf node i. The frame length is set as in (2) <strong>and</strong> (3) with A i replaced by à i .<br />
An example of the heterogeneous frame length (Z-MAC <strong>and</strong> proposed) <strong>and</strong><br />
the uniform frame length across the network is given in Fig. 7. From the figure,<br />
we can observe increase in the channel reuse due to the variable length frame size.<br />
The increase in channel reuse directly translates into higher channel utilization<br />
efficiency as well decrease in the data transfer delays.<br />
Figure 7. An example of variable <strong>and</strong> fixed length TDMA frames for a given conflict-free slot assignment:<br />
In the case of uniform length frame, all nodes have 8-slot frame length; in the Z-MAC<br />
variable length frame strategy, node a has 4-slot frame length whereas all other nodes have 8-slot<br />
frame length; <strong>and</strong> in the HUDSAP variable length frame strategy, nodes a <strong>and</strong> b have 4-slot frame<br />
length whereas all other nodes have 8-slot frame length<br />
Once the nodes have decided their frame lengths, the information are exchanged<br />
with nodes within their respective contention areas. After which the nodes<br />
can start data transmission within their assigned time-slots. The Z-MAC framing rule
260 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
produces slot assignment which is always conflict-free. However, in the proposed<br />
framing scheme, there could be occasional conflicts in assigned slots. Such conflicts<br />
can be detected by the nodes once frame-length information is available. When<br />
a node detects a slot conflict due to frame size selection, it compares its assigned<br />
slot with the slot assigned to the node causing the conflict. If the slot of the given<br />
node is less than the conflicting node, then the given node selects its frame length<br />
according to the MSN within its two-hop area (instead of one-hop area); otherwise,<br />
it leaves the conflict resolution to the conflicting node which would use the same<br />
procedure to resolve the conflict.<br />
V. Simulation examples <strong>and</strong> discussion<br />
In this section, with some numerical experiments, we evaluate channel utilization<br />
efficiency (i.e., the spatial reuse of slots) of the proposed HUDSAP <strong>and</strong> compare<br />
it with the centralized schemes RAND <strong>and</strong> MNF of [13]. Note that the DRAND<br />
is proven to achieve the same channel utilization efficiency as RAND [7]; so the comparison<br />
of HUDSAP with DRAND is not performed here. For a given network,<br />
assuming uniform frame length, the channel utilization efficiency is measured<br />
in terms of the minimum number of slots used by the protocol to find the conflictfree<br />
slot assignment schedule. We deploy the nodes in a 400-by-400 planar region.<br />
We conduct two numerical experiments: In the first, we fix the transmission range<br />
of nodes to 40 <strong>and</strong> vary the number of nodes from 50 to 400; in the second, we fix<br />
the number of nodes to 300 <strong>and</strong> vary the transmission range from 10 to 50. Each<br />
point in the numerical results is obtained by averaging over 10 4 r<strong>and</strong>om deployments<br />
(uniform distribution) of the nodes in the region.<br />
The results are plotted in Fig. 8 <strong>and</strong> Fig. 9. The figures show that the HUDSAP<br />
gives conflict-free slot assignment schedule that requires substantially less number<br />
of slots than the RAND (<strong>and</strong> consequently of the DRAND). That means, the spatial<br />
reuse of the slots, <strong>and</strong> consequently the channel utilization efficiency, is higher<br />
in HUDSAP. It should be noted that we deployed the node in a planar region of fixed<br />
area. Therefore, when either the number of nodes is small or the transmission range<br />
is small, or both, the performance gap is negligibly small. This is because, in such<br />
scenarios, the network is divided into small sub-networks (each comprising a few<br />
nodes) that are disconnected from each other – here we do not impose the condition<br />
that the network is connected. The performance of slot allocation protocols<br />
from spatial reuse point of view in such small networks does not differ much.<br />
However, if we impose the condition that the network is always connected, that is,<br />
any node can be reached from any other node (via multi-hops), then there would<br />
be a noticeable performance gap between the HUDSAP <strong>and</strong> the RAND even for<br />
a network comprising 50 sensors or less, which we observed in simulations that are<br />
not included here due to space constraints. Regarding the topological information,<br />
in DRAND each node requires knowledge about the identities of the nodes within its
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
261<br />
two-hop contention area <strong>and</strong> their slot assignment. Compared to that, in HUDSAP,<br />
each node also requires knowledge about the NoNs of the two-hop neighbors. Note<br />
that, although the NoNs of the one-hop neighbors is available in DRAND but that<br />
knowledge is not employed in slot scheduling.<br />
Figure 8. Channel utilization efficiency comparison for fixed number of nodes<br />
Figure 9. Channel utilization efficiency comparison for fixed transmission range<br />
For MNF two labeling schemes are considered, one based on the the NoNs<br />
<strong>and</strong> the other based on the number of two-hop neighbors (NtN) which are, respectively,<br />
denoted as MNF-NoNs <strong>and</strong> MNF-NtNs. The figures show that there is no<br />
appreciable gap between the schedule length of the HUDSAP <strong>and</strong> the MNF-NoNs.
262 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
However, there is a marginal gap between the performance of the HUDSAP <strong>and</strong><br />
the MNF-NtNs. The reason for this performance gap is that the HUDSAP is designed<br />
for ordering based on NoNs whereas the MNF-NtNs is based on the NtNs.<br />
Even though the performance gap is not substantial, it is straightforward to extend<br />
the HUDSAP where prioritization of slot assignment is based on the NtNs,<br />
in which case it is expected that the performance of the HUDSAP <strong>and</strong> the MNF-<br />
NtNs will converge. However, that will require each node to know the NtNs of all<br />
nodes within its contention area, which would entail additional protocol overhead.<br />
Given that there is a marginal gain in channel utilization efficiency, the additional<br />
overhead may not justify the gain. Besides, it should be noted that the HUDSAP<br />
is a distributed slot assignment protocol which relies on local topology knowledge<br />
at each node, whereas the MNF is a centralized protocol which requires global<br />
topology information.<br />
Next we evaluate the impact of variable frame-length selection on the channel<br />
utilization efficiency. In this regard, for the preceding two network deployment<br />
scenarios, we compare the number of additional packets that can be<br />
transmitted within the frame length of Z-MAC when the frame-length is selected<br />
according to the proposed framing scheme. In Fig. 10 <strong>and</strong> Fig. 11 we<br />
plot the additional packets: average over 10 4 r<strong>and</strong>om deployments of the nodes<br />
<strong>and</strong> the maximum over the deployments. The figures show that with the proposed<br />
framing scheme, we could transmit more packets, which when seen for<br />
the network use over considerably longer time window could translate into<br />
substantially higher throughput.<br />
Figure 10. Number of additional packets (maximum <strong>and</strong> average over deployments of nodes)<br />
that can be transmitted within the frame length of Z-MAC under the proposed adaptive frame size<br />
selection scheme. Comparison is for fixed transmission range
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
263<br />
Figure 11. Number of additional packets (maximum <strong>and</strong> average over deployments of nodes) that<br />
can be transmitted within the frame length of Z-MAC under the proposed adaptive frame size<br />
selection scheme. Comparison is for fixed number of nodes<br />
VI. Concluding remarks<br />
In this work, we proposed a distributed TDMA slot assignment protocol to<br />
schedule access of the wireless nodes to the shared wireless channel. The nodes,<br />
by this protocol, can find conflict-free slot assignment using only the local topology<br />
information. The proposed medium access scheduling protocol is suitable for<br />
wireless ad hoc networks for mission-critical applications <strong>and</strong> emergency response<br />
services which require wireless connectivity be provided that meet certain QoS<br />
requirements. We showed that the protocol can achieve higher channel utilization<br />
efficiency compared to the existing protocols like RAND <strong>and</strong> DRAND. We also<br />
proposed an adaptive frame size selection scheme which gives higher channel<br />
utilization than the framing scheme proposed in Z-MAC protocol.<br />
In this work we give a qualitative description of our protocol <strong>and</strong> substantiate<br />
it with performance evaluation with a few numerical examples. In our planned ongoing<br />
work, to better underst<strong>and</strong> the behavior of the protocol, we would do further<br />
analysis based on analytical modeling <strong>and</strong> event driven simulations. We plan to<br />
compare the convergence time <strong>and</strong> the control message overhead of the protocol.<br />
We also plan to study the behavior of the algorithm for dynamic topology changes<br />
due to the nodes joining <strong>and</strong> leaving the network, <strong>and</strong> the movement of the nodes<br />
within the network.
264 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
References<br />
[1] P. Suriyachai, J. Brown, <strong>and</strong> U. Roedig, “Time-critical data delivery in wireless<br />
sensor networks,” Proc. of 6th IEEE Int. Conf. on Distributed Computing in Sensor<br />
Systems (DOCSS’10), pp. 216-229, June 2010.<br />
[2] J. Brown et al., “BurstProbe: debugging time-critical data delivery in WSNs,” Proc.<br />
of EU. Conf. on WSNs, pp. 195-210, Feb. 2011.<br />
[3] C.D. Young, “USAP: A unifying dynamic distributed multichannel TDMA slot<br />
assignment protocol,” Proc. of IEEE MILCOM, pp. 235-239, Oct. 1996.<br />
[4] C.D. Young, “USAP multiple access: dynamic resource allocation for mobile multihop<br />
multichannel wireless networking,” Proc. of IEEE MILCOM, pp. 271-275, Nov. 1996.<br />
[5] A. Kanzaki, T. Uemukai, T. Hara, <strong>and</strong> S. Nishio, “Dynamic TDMA slot assignment<br />
in ad hoc networks,” Proc. of 17th Int. Conf. on Advanced Inform. Net. <strong>and</strong> Applications<br />
(AINA ’03), pp. 330-335, Mar. 2003.<br />
[6] A. Kanzaki, T. Hara, <strong>and</strong> S. Nishio, “An efficient TDMA slot assignment protocol<br />
in mobile ad hoc networks,” Proc. of ACM Symp. on Applied Computing (SAC ’07),<br />
pp. 891-895, Mar. 2007.<br />
[7] I. Rhee, A. Warrier, J. Min, <strong>and</strong> L. Xu, “DRAND: Distributed r<strong>and</strong>omized TDMA<br />
scheduling for wireless ad hoc networks,” IEEE Trans. on Mobile Computing, vol. 8,<br />
no. 10, pp. 1384-1396, Oct. 2009.<br />
[8] I. Rhee et al., “Z-MAC: A hybrid MAC for wireless sensor networks,” IEEE/ACM<br />
Trans. on Net., vol. 16, no. 3, pp. 511-524, June 2008.<br />
[9] L. Bao, <strong>and</strong> J.J. Garcia-Luna-Aceves, “A new approach to channel access ccheduling<br />
for ad hoc networks,” Proc. of 7th ACM Int. Conf. on Mobile Comp. <strong>and</strong> Net.<br />
(SIGMOBILE’01), pp. 210-221, Jul. 2001.<br />
[10] A. Rao, <strong>and</strong> I. Stoica, “An overlay MAC layer for 802.11 networks,” Proc. of ACM<br />
Int. Conf. on Mobile Sys., Applications, <strong>and</strong> Services, pp. 135-148, 2005.<br />
[11] E.L. Lloyd, <strong>and</strong> S. Ramanathan, “On the complexity of link scheduling in multihop<br />
radio networks,” Proc. of 26th Conf. on Inform. Science <strong>and</strong> System, 1992.<br />
[12] S. Even et al., “On the NP-completeness of certain network testing problems,”<br />
Jr. on Networks, vol. 14, no. 1, pp. 1-24, 1984.<br />
[13] S. Ramanathan, “A unified framework <strong>and</strong> algorithm for (T/F/C)DMA channel<br />
assignment in wireless networks,” Proc. of 16th IEEE INFOCOM, pp. 900-907,<br />
Apr. 1997.<br />
[14] A. Ephremedis, <strong>and</strong> T. Truong, “Scheduling broadcasts in multihop radio networks,”<br />
IEEE Trans. on Commun., vol. COM-38, pp. 456-460, Apr. 1990.
Hybrid Network Synchronization for MANETs<br />
Harri Saarnisaari, Teemu Vanninen<br />
Centre for Wireless <strong>Communications</strong>, University of Oulu, Oulu, Finl<strong>and</strong><br />
harri.saarnisaari@ee.oulu.fi, teemu.vanninen@ee.oulu.fi<br />
Abstract: <strong>Military</strong> radio networks such as mobile ad hoc networks (MANETs) usually rely on global<br />
satellite navigation systems (GNSSs) for network time synchronization. However, in reality all nodes<br />
may not have a GNSS timing device or they do not have a direct link to a GNSS timed node. In addition,<br />
in some situations GNSSs may fail. Therefore, additional supporting mechanisms are needed<br />
for synchronization. This paper provides a hybrid algorithm that uses GNSS timed nodes as master<br />
time servers if they are available but automatically turns to a distributed mode if GNSS time is not<br />
available providing robustness <strong>and</strong> survivability. Furthermore, the distributed mode can be used also<br />
as a st<strong>and</strong>-alone synchronization mechanism, i.e., a GNSS time reference is not necessarily needed<br />
at all. Simulations show the behavior of the algorithm in different scenarios but as main conclusions<br />
it can be said that the availability of GNSS timed nodes speeds up the initial convergence, the convergence<br />
rate depends on the number of nodes <strong>and</strong> the number of hops <strong>and</strong> that if GNSS time is lost,<br />
the network still maintains synchronism but time is not necessarily GNSS time.<br />
Keywords: component; network; synchronization; hybrid<br />
I. Introduction<br />
All the pictures are created by the authors<br />
<strong>Military</strong> mobile ad hoc networks (MANETs) usually use time division multiple<br />
access (TDMA) as a channel access protocol <strong>and</strong> often frequency hopping to<br />
provide robustness. These operations require time synchronized nodes. There are<br />
several possible strategies for network time synchronization [1]. One option is to<br />
have full autonomy, where the clocks function independently without affecting<br />
to each other. This option requires frequent calibrations since clocks tend to drift<br />
from each other. Precise clocks that provide autonomy for a period [2] or external<br />
precise time source such as global satellite navigation system (GNSS) are also possibilities<br />
herein. A second option is the (centralized) master-slave structure. This<br />
is a hierarchical system where the lower level nodes synchronize with the higher<br />
level nodes but not vice versa. A drawback of this method is that a fault in a master<br />
(or sub-master) node affects the whole (rest of the) network. This makes the network<br />
vulnerable. The advantages of this method are its simplicity <strong>and</strong> that clock quality<br />
requirements are reduced to the higher hierarchy levels, which lowers the costs.<br />
The third alternative is the mutual (distributed, decentralized) synchronization
266 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
in which the nodes synchronize themselves based on mutual cooperation without<br />
a master. Naturally, there are also hybrid strategies where a master (or a group<br />
of masters) leads the game but the rest of the nodes cooperate in a mutual fashion.<br />
Possibly, there is a hierarchical structure <strong>and</strong> cooperation exists within a hierarchy<br />
level. Furthermore, the master could be one that is not permanent but it can be<br />
replaced by another node in the case of failure or if it is not available for some<br />
other reason.<br />
Inside the strategies are protocols, which describe how timing messages are<br />
distributed in a network <strong>and</strong> what <strong>and</strong> how many messages are needed. Several<br />
protocols have been proposed for network time synchronization (NTS) of wireless<br />
sensor <strong>and</strong> ad-hoc networks. References [3-9] provide a good snapshot of these<br />
protocols. They follow the above mentioned general strategies in a way or another.<br />
Actions one needs are not usually concentrated in a single spot (system). Instead,<br />
one may use information coming from different systems all around the globe.<br />
In order to keep different systems on the same time base it is natural to assume,<br />
or require, that if GNSS time is available it has to be used since it is a provider<br />
of the Universal Coordinated Time (UTC). This paper considers a novel hybrid<br />
synchronization approach proposing an algorithm which uses a GNSS timed<br />
node or nodes as a master or masters if they are available. If those are not available<br />
it uses a distributed approach. This increases robustness since lost of masters<br />
does not destroy synchronization. Both use of GNSS time whenever available <strong>and</strong><br />
robustness are features sought by military. It is also very possible that all nodes<br />
do not have a GNSS time source device or they are not direct neighbors of such<br />
a node. The proposed algorithm is able to synchronize nodes in a multi hop fashion.<br />
It uses nodes that have heard GNSS timed nodes or their nearest or further distant<br />
neighbors as masters if those are available. Furthermore, the algorithm distributes<br />
knowledge of existence of masters all over the network, <strong>and</strong> neglects this information<br />
if masters are lost. This information may be utilized in the merging case. The way<br />
how network time synchronization messages are delivered (which channel, how<br />
often, etc) is not proposed, neither there are special requirements on that meaning<br />
that the algorithm is very generic. Simulations demonstrate convergence speed for<br />
different network size, (normalized) network synchronization accuracy <strong>and</strong> effect<br />
of losing all the masters.<br />
II. Algorithm<br />
The principles of the proposed algorithm are simple. First, use GNSS time<br />
as a master time reference if it is available. Second, if GNSS time is not available<br />
in the network, use a distributed algorithm. A consequence of the first principle<br />
is that even if only one GNSS timed node is available, its existence must be distributed<br />
all over the network <strong>and</strong> its time must be used as a reference. In practice this<br />
is implemented by maintaining a heard master (HM) flag in the synchronization
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
267<br />
message. It is on if GNSS time is available <strong>and</strong> off otherwise. It is set on if a node<br />
receives message from a GNSS timed node (master) or from a node whose HM<br />
flag is on. A consequence of the second principle is that if a node is not a GNSS<br />
timed node or does not receive any time synchronization messages where the HM<br />
flag is on, it uses a distributed time synchronization algorithm.<br />
The state machine of the algorithm is shown in Fig. 1. The shown algorithm<br />
includes the integrity check not implemented in the simulation chain. The integrity<br />
check is essential to self-monitor the network for malfunctioning of GNSS timed<br />
nodes (or detect misleading GNSS timed nodes) <strong>and</strong> inform the operator if needed.<br />
Herein, this aspect was not considered <strong>and</strong> all GNSS timed nodes were assumed<br />
to perform properly, i.e., they all show the same time. Neither was inform-mycurrent-network<br />
feature implemented. That can ease <strong>and</strong> speed up merging cases<br />
that is discussed briefly later on.<br />
Figure 1. The state machine of the proposed network synchronization algorithm
268 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
A node initially listens a period for network synchronization messages<br />
(NETSYNC MSG). If it does not receive any it initiates its own message. Then it waits<br />
again. The waiting time may include some r<strong>and</strong>omness around an initial value or<br />
in an interval. It may also be shorter in the initialization phase than in the communications<br />
phase. It may be shorter for GNSS timed nodes than for other nodes<br />
since that would favor GNSS timed nodes that are anyway used as master nodes.<br />
If it receives a message its behavior depends on the contents of the message <strong>and</strong> its<br />
own state. If the node is a GNSS timed node (master) it does not adjust itself. If it is<br />
non GNSS timed node its behavior depends on contents of the message as clearly<br />
described on the state machine. However, some principles may be unclear from<br />
the machine. Therefore, some aspects are considered more detailed in what follows<br />
in this section.<br />
Time tuning at the receiver is based on time difference of the local clock<br />
reading <strong>and</strong> received time readings [10]. Time tuning is done at the every adjustment<br />
instant, i.e., discretely at certain points, not continuously after receiving any<br />
single message. This is because of robustness. If all messages would be used for<br />
time tuning after they arrive it may result a ping pong effect in time or between<br />
master-slave <strong>and</strong> distributed mode. In addition, if a receiver could receive several<br />
messages it can select the best ones for its own purpose. For example, it receives<br />
a few messages from HM-flag-off nodes <strong>and</strong> then finally at the end of the listening<br />
period a message from a HM-flag-on node. Then, it can be use the best time<br />
source on that period, i.e., the HM-flag-on node <strong>and</strong> ignore the HM-flag-off nodes.<br />
Observed time difference is used as such if the message is from a master node<br />
(node with a GNSS time device) or from a node with the HM lag on. If several<br />
masters are observed during a period, only one is used. This could be the one<br />
with the smallest time since that is closest to the receiver <strong>and</strong>, as a consequence,<br />
the bias from uncompensated propagation delay would be the smallest. In the simulations<br />
the first master was selected for simplicity. If several HM-flag-on nodes are<br />
observed, average of their time difference to the local time is used to set the time.<br />
In both the cases the observed (<strong>and</strong> selected) time differences are used in the masterslave<br />
fashion, i.e., directly to set the time. In the distributed mode the average time<br />
difference is weighted by a coefficient (0.5 herein) <strong>and</strong> then added to the previous<br />
time [10].<br />
An adjustment interval should be selected such that a new adjustment is done<br />
before clocks drift too far away from each other. Or, indeed, well before to leave<br />
some margin. What affects to this interval are the initial synchronization error after<br />
previous adjustment, discussed in the next subsection, <strong>and</strong> clock skew caused by<br />
frequency errors. For example, 1 ppm (part per million) clocks cause 1 µs error<br />
in every second. Since this may be in both directions, the total maximum error is 2 µs.<br />
One has to count how many seconds clocks could be without adjustment <strong>and</strong> select<br />
adjustment period based on this. At the initial phase the adjustment period, as well<br />
as listening period, could be shorter. In the communications phase, at least, these
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
269<br />
two coincide. It would also be advantageous if time information (NETSYNC MSG)<br />
could be transmitted more than once in the adjustment period since that increases<br />
robustness, e.g., since some messages may be lost. However, this may not be sensible<br />
since that increases overhead in the system. Therefore, final selection is a tradeoff<br />
between overhead <strong>and</strong> robustness.<br />
Time information is sent in a network synchronization message. The message<br />
includes a time stamp, a master flag <strong>and</strong> the HM flag information. The master flag<br />
informs that a node is a master (GNSS timed node). The synchronization messages<br />
are send in a control channel (either logical or physical), but in this paper we do<br />
not care how the control channel is actually implemented. It is just assumed that<br />
the network synchronization messages are send at certain intervals <strong>and</strong> that these<br />
messages can be heard by other nodes. This is a sensible assumption since otherwise<br />
synchronization is impossible.<br />
Possible difficult points in MANETs are late entry <strong>and</strong> merging. These should<br />
be made as automatic <strong>and</strong> fast as possible, i.e., the operator should not need to<br />
manage this <strong>and</strong> it should not take tens of minutes. As the network synchronization<br />
process is part of this, it should be fast too. It is obvious from the state machine that<br />
the GNSS timed node case is trivial. If two GNSS timed networks merge they are<br />
readily synchronized. If a non-GNSS timed node or network merges with a GNSS<br />
timed node or network it adapts GNSS time. However, if two non-GNSS timed<br />
networks merge the situation is more problematic since use of pure distributed<br />
algorithm would yield to very long convergence period. Therefore, the process<br />
should be speeded <strong>and</strong> that means, e.g., merging case detection <strong>and</strong> decision which<br />
of the networks has to change its time <strong>and</strong> which preserves its time.<br />
A. Performance of NTS<br />
It can be concluded from [10-13] that the accuracy of the algorithm depends<br />
on the accuracy of time delivery <strong>and</strong> biases caused by uncompensated delays <strong>and</strong><br />
clock frequency offsets (skew). Since the beating frequency of clocks is not usually<br />
controlled, skew occurs in every adjustment period. This term is mitigated by<br />
properly chosen the adjustment interval. Contrary, propagation delay could be<br />
compensated. In master-slave networks bias by uncompensated delays cumulates<br />
on each hop the master’s message has to jump whereas in distributed networks<br />
this effect is somewhat averaged away. Therefore, delay compensation might be<br />
a critical issue especially if the network synchronization requirements are high<br />
<strong>and</strong> also if distances (measured in seconds) between nodes are large, quite close to<br />
the synchronization requirement. There are several means for the compensation.<br />
In the master-slave scheme master <strong>and</strong> slave may interact pairwise to measure<br />
the propagation delay. This means that interaction has to be repeated for each pair.<br />
An example of this is the IEEE 1588 precise timing protocol. In two way schemes<br />
nodes send measured time differences back to the origin which use them to mitigate
270 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
the delay. If feedback fails this kind of system reduces to uncompensated systems,<br />
i.e., it still works but has bias. The system is robust in the sense that it does not rely<br />
on delay compensation (assuming that provided synchronization accuracy is sufficient).<br />
Node positions, if they are known, can be used to calculate propagation delays<br />
<strong>and</strong> used for delay compensation. In this sense use of situation awareness picture<br />
(concerning node positions) could be a valuable tool in network synchronization.<br />
Note that the positioning accuracy does not necessarily need to be extremely accurate<br />
since 1 µs corresponds to 300 m. If one or few µs is tolerable compensation<br />
accuracy, then 300 m to 1 km positioning accuracy would be sufficient.<br />
III. Simulations<br />
Simulations were implemented using MATLAB. The simulation area is a X<br />
by X square with N r<strong>and</strong>omly deployed nodes. The communication range is αX.<br />
There are M masters that could be switched off at the moment T. Results are shown<br />
as a function of adjustment intervals. All time errors <strong>and</strong> distances are normalized<br />
to time-of-arrival (TOA) measurement accuracy which is typically about one tenth<br />
of the inverse of the signal b<strong>and</strong>width or, equally, one tenth of the symbol duration.<br />
Therefore, 1 MHz signal provides (about) 0.1 µs TOA accuracy (or 30 m) <strong>and</strong> 5 MHz<br />
signal 0.02 µs (6 m) accuracy. With these numbers, if X is 500, it corresponds to<br />
15 000 m or 3000 m, respectively. Correspondingly one founds effects of skew <strong>and</strong><br />
distances. One counts the effect of skew in TOA accuracy units during the adjustment<br />
period. So, if β is the skew <strong>and</strong> T adj the adjustment period, then the effect of skew<br />
is βT adj /σ, where σ is the accuracy. For example, if the skew is 1 ppm <strong>and</strong> T adj is 1 s<br />
or 100 s, then for 1 MHz signal this corresponds to 10 <strong>and</strong> 1000, respectively, <strong>and</strong><br />
for 5 MHz signal these are five times larger.<br />
If required synchronization accuracy (worst case) in frequency hopping<br />
systems would be half the hop duration <strong>and</strong> hop rate would be 1000 hops/s, then<br />
the required worst case synchronization accuracy would be 5000 units or 25 000<br />
units, respectively using the above numerical values. This would be nice to remember<br />
when one interprets the simulation results. Even without reference to hopping systems<br />
one should calculate worst case accuracy related to delay estimation accuracy.<br />
Furthermore, we calculate clock time errors with respect a reference node since<br />
this is the meaningful way to do it [10]. If there are masters, a master is selected<br />
as a reference that is quite natural. In the other case node number 1 is selected.<br />
The former selection causes some harm when lost of GNSS nodes is investigated<br />
since error is still measured with respect to a master. However, most significant<br />
conclusions can be drawn even with this small inconvenience. Results are averaged<br />
over 100 runs with same node deployment. The initial time offsets, skews <strong>and</strong> TOA<br />
errors are altered.<br />
The first result shows ultimate accuracy limits since delays are perfectly compensated<br />
<strong>and</strong> skews are zero. There are 32 nodes including 5 masters <strong>and</strong> X = 500.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
271<br />
The initial offset (of non-masters) is from range ±3×10 8 . The communication range<br />
is 250. A r<strong>and</strong>om deployment is shown in Fig. 2 <strong>and</strong> resulting time errors at Fig. 3.<br />
Since the communication range is long <strong>and</strong> masters quite uniformly distributed<br />
over the area, convergence is fast, at the first round, i.e., all nodes are direct neighbors<br />
of masters. The not shown root means square error (RMSE) values are equal<br />
to one, i.e., equal to the time delivery accuracy as it should be. Therefore, the time<br />
delivery accuracy is the ultimate limit.<br />
500<br />
Connectivity plot. Masters are red diamonds.<br />
450<br />
400<br />
350<br />
300<br />
250<br />
200<br />
150<br />
100<br />
50<br />
0<br />
0 100 200 300 400 500<br />
Figure 2. Example r<strong>and</strong>om node deployment into area <strong>and</strong> existing connections.<br />
X = 500, N = 32, M = 5, α = 0.5<br />
10<br />
8<br />
6<br />
4<br />
time error term<br />
2<br />
0<br />
−2<br />
−4<br />
−6<br />
−8<br />
−10<br />
0 5 10 15 20<br />
adjustment instants<br />
Figure 3. Ultimate timing errors <strong>and</strong> convergence speed. X = 500, N = 32, M = 5, α = 0.5<br />
The results in Fig. 4 show the same setup but with uncompensated delays.<br />
The maximum bias is close to the maximum communication range as well as is<br />
RMSE, which value, indeed, is the limit in the single hop case. In the multiple hops<br />
case uncompensated delays would cumulate.
272 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
If the skew is from interval ±500 (for non masters) the total bias still increases<br />
as shown in Fig. 5 as well as RMSE, that goes up to level 400.<br />
300<br />
250<br />
200<br />
time error term<br />
150<br />
100<br />
50<br />
0<br />
0 5 10 15 20<br />
adjustment instants<br />
Figure 4. Timing errors when delays are uncompensated. X = 500, N = 32, M = 5, α = 0.5<br />
500<br />
450<br />
400<br />
350<br />
time error term<br />
300<br />
250<br />
200<br />
150<br />
100<br />
50<br />
0<br />
0 5 10 15 20<br />
adjustment instants<br />
Figure 5. Timing errors when delays are uncompensated <strong>and</strong> skews are present.<br />
X = 500, N = 32, M = 5, α = 0.5<br />
Shorter communications ranges often yield to separated subnets <strong>and</strong> are thus<br />
meaningless to study in this paper where the focus is in the behavior of the whole<br />
network. To study this shorter communication range effect we increase the number<br />
of nodes to 128 <strong>and</strong> kept the rest parameters. The results are in Fig. 6. It can be seen<br />
that some nodes are one hop <strong>and</strong> some two hop neighbors of masters. Then the range<br />
was decreased to 100, i.e., one fifth of the area size. Although not easily seen from<br />
the Fig. 7, the convergence rate decreases to four rounds (but depends naturally<br />
on the largest number of hops between a master <strong>and</strong> a node). After convergence<br />
the error is increased. It is believed that this is due to averaging in the algorithm
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
273<br />
since a node computes an average based on all received HM-flag-on messages. This<br />
averaging increases robustness. It would be possible to modify the algorithm to accept<br />
only one HM-flag-on message. It is expected that if this selection could be done<br />
wisely, the error would be smaller. However, this feature was not tested. The total<br />
bias is also increased due to this averaging <strong>and</strong> accumulated skew <strong>and</strong> delay terms.<br />
Figure 6. Timing errors when delays are uncompensated <strong>and</strong> skews are present.<br />
X = 500, N = 128, M = 5, α = 0.5<br />
Figure 7. Timing errors when delays are uncompensated <strong>and</strong> skews are present.<br />
X = 500, N = 128, M = 5, α = 0.2<br />
The effect of losing the masters at the adjustment point 100 is investigated<br />
when X = 500, N = 32, M = 5, α = 0.5. The results in Fig. 8 show that after the lost<br />
the nodes' times diverge from zero (that is the masters' time). However, the nodes'<br />
times stay very close together <strong>and</strong> their times go to the same direction. Therefore,<br />
they remain synchronized, but that is what is expected. The novelty was to include
274 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
an automated step from the master-slave mode into the distributed mode (<strong>and</strong><br />
back if needed).<br />
Finally, convergence speed <strong>and</strong> error without master nodes is investigated.<br />
The RMSE results in Fig. 9 show that convergence takes about 80 adjustment periods,<br />
i.e., much much more than in the master-slave mode. However, the timing<br />
error is at the same level.<br />
6000<br />
5000<br />
4000<br />
time error term<br />
3000<br />
2000<br />
1000<br />
0<br />
0 50 100 150 200<br />
adjustment instants<br />
Figure 8. Timing errors when delays are uncompensated <strong>and</strong> skews are present <strong>and</strong> masters<br />
are lost at point 100. X = 500, N = 32, M = 5, α = 0.5<br />
1000<br />
900<br />
800<br />
rmse of time error wrt ref<br />
700<br />
600<br />
500<br />
400<br />
300<br />
200<br />
100<br />
0<br />
0 50 100 150 200<br />
adjustment instants<br />
Figure 9. RMSE timing errors when delays are uncompensated <strong>and</strong> skews are present without<br />
master nodes. X = 500, N = 32, M = 5, α = 0.5<br />
IV. Conclusions<br />
This paper proposed a novel hybrid master-slave distributed network time<br />
synchronization algorithm that is robust to lost of masters. The algorithm uses GNSS
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
275<br />
timed nodes as masters if they are available <strong>and</strong> is in a robust distributed mode otherwise.<br />
The algorithm has flexibility for further developments. The basic properties<br />
of the algorithm were demonstrated by simulations. The ultimate synchronization<br />
accuracy depends on the time delivery accuracy, but in real life uncompensated<br />
delays or errors in delay compensation <strong>and</strong> unequal clock frequencies cause larger<br />
time errors. The convergence speed in terms of required adjustments depends on<br />
the number of hops between masters <strong>and</strong> slaves. The convergence speed in distributed<br />
mode may be much slower than in the master-slave mode. In addition, it is<br />
slower for larger networks. Therefore, some kind of master-slave structure would<br />
be beneficial in distributed networks at least in the initial phase. In addition, the adjustment<br />
period could be shorter in the initialization phase as usual.<br />
Acknowledgment<br />
This work was done for European Defence Agency (EDA) projects WOLF<br />
(Wireless Robust Link for Urban Force Operations) <strong>and</strong> ETARE (Enabling <strong>Technology</strong><br />
for Advanced Radio in Europe).<br />
References<br />
[1] W.C. Lindsey, F. Ghazvinian, W.C. Hagman, <strong>and</strong> K. Dessouky, “Network<br />
synchronization,” Proceedings of the IEEE, vol. 73, no. 10, pp. 1445-1467, October<br />
1985.<br />
[2] H.A. Stover, “Network Timing/Synchronization for defence communications,”<br />
IEEE Transactions on <strong>Communications</strong>, vol. 28, no. 8, pp. 1234-1244, August 1980,<br />
in a special issue of network synchronization.<br />
[3] K. Römer, P. Blum, <strong>and</strong> L. Meier, “Time synchronization <strong>and</strong> calibration in wireless<br />
sensor networks,” in H<strong>and</strong>book of Sensor Networks: Algorithms <strong>and</strong> Architectures,<br />
I. Stojmenovic, Ed. John Wiley & Sons, 2005.<br />
[4] B. Sundararaman, U. Buy, <strong>and</strong> A. Kshemkalyani, “Clock synchronization for<br />
wireless sensor networks: a survey,” Ad Hoc Networks, vol. 3, pp. 281-323, 2005.<br />
[5] C. Rentel, T. Kunz, “Network synchronization in wireless ad hoc networks,” Carleton<br />
University, Systems <strong>and</strong> Computer Engineering Department, Ottawa, Canada,<br />
Technical report SCE-04-08, 2004.<br />
[6] C. Rentel, T. Kunz, “A clock-sampling mutual network time-synchronization<br />
algorithm for wireless ad hoc networks,” in IEEE Wireless <strong>Communications</strong> <strong>and</strong><br />
Networking Conference (WCNC), vol. 1, 2004, pp. 638-644.<br />
[7] Q. Li, D. Rus, “Global clock synchronization in sensor networks,” IEEE Transactions<br />
on Computers, vol. 55, no. 2, pp. 214-226, February 2006.<br />
[8] D. Mills, “Improved algorithms for synchronizing computer network clocks,” IEEE<br />
Transactions on Networking, vol. 3, no. 3, pp. 245-254, June 1995.
276 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
[9] E. Serpedin, Q.M. Chaudhari, Synchronization in Wireless Sensor Networks:<br />
Parameter Estimation, performance Benchmarks <strong>and</strong> Protocols. Cambridge University<br />
Press, 2009.<br />
[10] H. Saarnisaari, “Analysis of a discrete network synchronization algorithm,”<br />
in Proceedings of the IEEE <strong>Military</strong> <strong>Communications</strong> Conference, Atlantic City, NJ,<br />
USA, 2005.<br />
[11] A. Fasano, G. Scutari, “The effect of additive noise on consensus achievement<br />
in wireless sensor networks,” in Proceedings of the IEEE International Conference<br />
on Acoustics, Speech, <strong>and</strong> Signal Processing, April 2008, pp. 2277-2280.<br />
[12] A. Davies, “Discrete-time synchronization of communications networks having<br />
variable delays,” IEEE Transactions on <strong>Communications</strong>, vol. 23, no. 7, pp. 782-785,<br />
July 1975.<br />
[13] G. Scurati, S. Barbarossa, <strong>and</strong> L. Pescosolido, “Distributed decision through selfsynchronizing<br />
sensor networks in the precence of propagation delays <strong>and</strong> asymmetric<br />
channels,” IEEE Transactions on Signal Processing, vol. 56, no. 4, pp. 1667-1684,<br />
April 2008.
Application of Dezert-Smar<strong>and</strong>ache Theory<br />
for Tactical MANET Security Enhancement<br />
Joanna Głowacka, Marek Amanowicz<br />
Faculty of Electronics, <strong>Military</strong> University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong>,<br />
{jglowacka, mamanowicz}@wat.edu.pl<br />
Abstract: The article presents a concept of Dezert-Smar<strong>and</strong>ache theory application for enhancing<br />
security in tactical mobile ad-hoc network. Tactical MANET, due to its specification, requires collection<br />
<strong>and</strong> processing of information from different sources of diverse security <strong>and</strong> trust metrics.<br />
The authors specify the needs for building a node’s situational awareness <strong>and</strong> identify data sources<br />
used for calculations of trust metrics. They provide some examples of related works <strong>and</strong> present their<br />
own conception of Dezert-Smar<strong>and</strong>ache theory applicability for trust evaluation in mobile hostile<br />
environment.<br />
Keywords: situational awareness, trust, inference methods, tactical MANET, security, Dezert-Smar<strong>and</strong>ache<br />
theory<br />
I. Introduction<br />
The mobile ad-hoc networks are collections of independent nodes that<br />
can communicate via radio channels. These networks are often developed in conditions<br />
of limited or total lack of access to fixed infrastructure.<br />
MANETs are characterized by high dynamic changes in the location of each<br />
node <strong>and</strong> the vulnerabilities of various types of attacks. Due to the open medium,<br />
ad-hoc networks are more susceptible to eavesdropping <strong>and</strong> data injections. A dynamic<br />
change of network topology contributes to the frequent connecting <strong>and</strong><br />
disconnecting nodes, <strong>and</strong> no central network monitoring makes it difficult to<br />
detect malicious behaviour of nodes. In addition, the network resource limitations<br />
contribute to the selfish attacks. They are aimed at consuming a large amount<br />
of b<strong>and</strong>width. One of the selfish behaviours is the failure to transfer the packages<br />
by a node to conserve its own energy.<br />
Security ensuring is particularly difficult for a tactical ad-hoc network, due to<br />
the necessity of dealing with a hostile environment, strict capacity constraints, the re-<br />
This article was written as a part of a scientific research project financed by polish government budget for<br />
science in 2010-2013 “An advanced methods <strong>and</strong> techniques of traffic control in tactical ad-hoc networks”<br />
No. O N517 274 839.
278 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
quirements for services, very rapid changes of network topology <strong>and</strong> dynamically<br />
forming groups of common interests, which cannot be pre-defined by trust relationships<br />
[1]. These networks are characterized by simple capability of adding new nodes,<br />
which may be of diverse nature, such as the allies, neutral or hostile nodes.<br />
Figure 1. A sample mobile ad-hoc network structure<br />
One method of ensuring the security is user authentication. Only the authorized<br />
nodes <strong>and</strong> those verified as allies can have access to the network. However,<br />
during the mission, a node can be taken over by the enemy, or change the nature<br />
of its behaviour – behaving to the detriment of the mission.<br />
Due to the lack of a central management system it is needed for nodes to<br />
cooperate. Each of them is in fact a router ensuring cooperation between subnets<br />
<strong>and</strong> nodes located at a distance greater than the radio range.<br />
Restrictions on ad-hoc networks contribute to the need of using other means<br />
than in wired networks to satisfy the safety requirements. In addition to authorization<br />
<strong>and</strong> authentication mechanisms, it is necessary for a node to have the knowledge<br />
on the behaviour of other nodes in the network, determining safety routes for data<br />
transfer <strong>and</strong> knowledge concerning the reaction manners in certain situations.<br />
The situational awareness building method will be complement of st<strong>and</strong>ard security<br />
mechanisms in mobile ad-hoc networks.<br />
II. Node’s situational awareness<br />
A. Definitions<br />
To identify opportunities of secure cooperation between nodes in ad-hoc<br />
networks, it is necessary to collect information about other nodes in the network.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
279<br />
The ability to have accurate information about the surrounding reality <strong>and</strong> interpretation<br />
of the current situation in terms of the performed tasks is defined as a node’s<br />
situational awareness.<br />
The main product of the node’s situational awareness mechanism is information<br />
on the node trust levels.<br />
Trust is an interdisciplinary concept, characterized by a variety of definitions.<br />
It is understood as relying on the integrity, strength <strong>and</strong> ability of a person or thing.<br />
In the case of ad-hoc network it is translated as a set of relationships between people<br />
who use similar communication protocols [1]. These relations are defined based on<br />
previous interactions of individuals. In [2], trust is treated as the degree of belief<br />
about the behaviour of other entities. Trust can also be understood as reputation,<br />
opinion, or the probability of correct behaviour [3].<br />
In MANET, trust is the level of faith, which can be assigned by the node to<br />
its surroundings on the basis of observations <strong>and</strong> opinions coming from the other<br />
nodes in the network [4].<br />
B. Benefits<br />
Building node’s awareness is essential to achieve the mission. In heterogeneous<br />
networks, the completion of the mission is dependent on the integrity of individuals.<br />
The knowledge gained from building node’s awareness can ensure cooperation<br />
only between trusted entities that do not behave suspiciously.<br />
Secure exchange of information between nodes requires proper selection<br />
of the route of data transfer. Sending data via routes that are not safe may contribute<br />
to the leak or acquisition of data by unauthorized persons. Lack of metrics<br />
allowing for choosing the path depending on the level of confidence in nodes <strong>and</strong><br />
the risk, that exists in choosing the path of data transfer <strong>and</strong> cooperation between<br />
the nodes, may contribute to the failure of the operation.<br />
Figure 2. The possibility of application of the knowledge from building node’s awareness<br />
in different OSI model layers
280 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
The dynamic process of creating a current situational view of node can be<br />
the basis for decisions on how to control traffic.<br />
The knowledge about the surrounding environment gained through the mechanism<br />
of building node’s awareness can be applied in different layers in order to protect<br />
the communication between nodes. In the data link layer it can be used to define<br />
a parameter indicating the possibility of cooperation with the nodes or the need<br />
for failure to communicate with nodes characterizing a low level of confidence.<br />
In the third layer level of trust, it can be used as metric routing protocol that will<br />
allow you to safely share data. Specified nodes confidence level can be used also<br />
in the application layer, where the nodes of questionable confidence level will be<br />
forced to certain behaviour for performing its final assessment assignment.<br />
C. Data sources<br />
Node’s situational awareness in most cases is built based on direct interactions,<br />
indirect observations <strong>and</strong> recommendations.<br />
Trust determined by the node based on direct interaction <strong>and</strong> observation<br />
of behaviour of other nodes is called direct trust.<br />
Trust determined on the basis of indirect observations <strong>and</strong> recommendations<br />
is called indirect trust. Recommendations shall be understood as opinions of other<br />
nodes on the node for which the level of confidence is being specified.<br />
Figure 3. Direct <strong>and</strong> indirect trust<br />
In many cases information from various sources may be incomplete, inconsistent<br />
or conflicting. This requires the selection of appropriate methods of inference,<br />
which would allow clear <strong>and</strong> accurate assessment of the current environment<br />
in which network node operates.<br />
III. Related works<br />
The problem of gathering information about the surrounding node reality <strong>and</strong><br />
determining the nodes trust in ad-hoc networks has recently been very popular <strong>and</strong><br />
widely developed in the literature, which demonstrates the importance of this topic.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
281<br />
Probabilistic inference is the most frequently used method in the literature to<br />
determine the node trust level. The information about node behaviour is evaluated<br />
as 0 or 1, match or success.<br />
In [5], the theoretical concept was presented to assess the level of trust <strong>and</strong><br />
its propagation. Trust in this approach is considered as a measure of uncertainty<br />
expressed in a measure of entropy. In the case of entropy based trust model, promoted<br />
trust is calculated on the basis of individual trust values. In the trust model<br />
based on the probability, the value of propagated trust is calculated by the probability<br />
of trust relationships. In this model, the probability of correct relations<br />
assessment is also included. This concept also includes an assessment of trust on<br />
the basis of observation.<br />
In [6], new concept of the TMF (Trust Management Framework) was presented.<br />
TMF is used for nodes to obey protocol <strong>and</strong> cooperate with each other.<br />
There are two types of TMF:<br />
• reputation based – trust is assessed based on direct observations <strong>and</strong> information<br />
of the second h<strong>and</strong>, Bayesian approach based on the distribution<br />
of β is being used,<br />
• trust establishment – trust is assessed based on direct observation <strong>and</strong><br />
the relationship established between nodes without regard to previous<br />
opinions of intermediate nodes.<br />
Both types of TMF are immune to numerous attacks, therefore, OTMF (Objective<br />
TMF) has been proposed to prevent them. This solution is based on modified<br />
Bayesian approach, in which different weights are assigned to different information<br />
given at the time of their occurrence <strong>and</strong> that concerning their supplier. Influence<br />
of the previous observations decreases exponentially, <strong>and</strong> the trust is used as a weight<br />
for second-h<strong>and</strong> information. The two parameters – “trust value” <strong>and</strong> “confidence<br />
value” – are combined in OTMF into one metric called “trustworthiness”.<br />
The article [7] presents Hermes framework determination of node trust, which<br />
helps in ensuring the reliability of packet transmission. Framework ensures that<br />
the source sends packets only by the trusted intermediate nodes. In this solution,<br />
each node determines the reliability metric of neighbouring nodes based on direct<br />
observation of transmitted packets. Reliability is further extended with opinions<br />
from other nodes. The proposed solution uses a Bayesian approach to determine<br />
the value of trust. Trust is calculated on the basis of the beta probability distribution.<br />
Beta distribution parameters are determined from observations gathered<br />
during the packet forwarding behaviour. A new metric called trustworthiness,<br />
being a combination of trust <strong>and</strong> confidence metrics, is introduced.<br />
In [8], the trust model was created for the DSR protocol in order to take a decision<br />
on acceptance or rejection of the route. Decisions are made based on the estimated<br />
trust respectively. Trust is determined on the basis of the direct trust <strong>and</strong> recommendations<br />
from other nodes. Direct trust is determined by the sum of experiences<br />
on a given node <strong>and</strong> the recommendation trust is the sum of the recommendations
282 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
received from the nodes. In determining the total trust value both values are taken<br />
into account, but the direct trust has the higher weight. Direct trust is determined<br />
by observation of packets forwarded by the evaluated node. Collected observations<br />
are evaluated positively if they are not modified. The assessment is proportional to<br />
the type of transmitted packet (e.g. route request, data packet). If sent packages are<br />
modified, the observation is evaluated negatively. Negative evaluation is proportional<br />
to the type of packet transmitted <strong>and</strong> the type of modification (e.g. modification<br />
of information about the source, recipient, sequence number, route).<br />
The use of probabilistic inference provides an easy way to determine the node<br />
trust level but also has some disadvantages. Classical logic is based only on two<br />
values represented by 0 <strong>and</strong> 1 or true <strong>and</strong> false. The border between them is clearly<br />
defined <strong>and</strong> unchanging. In addition, classical probability theory does not allow<br />
for distinguishing uncertainty (expressed in terms of probability) from incomplete<br />
knowledge (lack of knowledge on the topic).<br />
The other inference method used to evaluate <strong>and</strong> combine knowledge about<br />
node behaviours is fuzzy logic.<br />
Trust model based on the recommendation similarities (RFSTrust) calculated<br />
with the use of fuzzy mathematics for MANET environment was presented in [9].<br />
The fuzzy trust model is proposed to quantify <strong>and</strong> evaluate the trustworthiness<br />
of nodes, which includes five types of fuzzy trust recommendation relationships.<br />
Theoretical analysis <strong>and</strong> the simulation results show that RFSTrust model can effectively<br />
prevent selfish nodes <strong>and</strong> improves the performance of the entire MANET.<br />
As in the case of inference based on classical logic, fuzzy inference does not<br />
allow separation of uncertain knowledge from lack of knowledge.<br />
Another method of enabling the representation of uncertainty is the mathematical<br />
theory of evidence.<br />
The use one of the mathematical evidence methods – the Dempster-Shafer<br />
theory (DST)[10] – for the determination of selfish behaviour of each node is presented<br />
in [11]. Node cooperation rating is based on the observation of correct packet<br />
delivery. If a source node receives the information about arrival of the package, it will<br />
mean that all nodes in the path behave correctly. In this case, the source node defines<br />
the m() function for each path node, which is named basic belief assignment, as:<br />
0 A{ SELFISH}<br />
mA ( ) <br />
. (1)<br />
1 A{ UNSELFISH}<br />
In the absence of proof of information delivery <strong>and</strong> the lack of error messages,<br />
the source node finds that a path includes not cooperating nodes. Unfortunately,<br />
a number of these nodes <strong>and</strong> information about which nodes are selfish is not<br />
known. The basic belief assignment is defined as:<br />
P A{ SELFISH}<br />
mA ( ) <br />
.<br />
(2)<br />
1 P A { UNSELFISH, SELFISH}
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
283<br />
Each of the nodes in the network is equipped with a dedicated component<br />
implementing an algorithm based on the Dempster-Shafer theory, which uses<br />
the received recommendations <strong>and</strong> results of nodes observation. The solution<br />
has defined two types of trust. The first determines the extent to which the source<br />
node trusts another node that it will send the package correctly. It was used to<br />
determine the belief function defined by the Dempster-Shafer theory. The second<br />
value indicates the degree of trust in which a node trusts that recommendations<br />
generated by another node are correct.<br />
IV. Concept description<br />
Dynamic evaluation of the environment surrounding the node is possible<br />
by continuously monitoring the node behaviour, their analysis <strong>and</strong> information<br />
inference.<br />
Figure 4. Node evaluation process<br />
In many cases, the knowledge acquired by a single node is insufficient to fully<br />
assess the current situation, therefore it must be able to exchange information about<br />
situational awareness built between nodes. Nodes can have different access to data<br />
about other nodes, so their passing information may be incomplete or uncertain.<br />
In the solutions described in section III, in most cases it is impossible to distinguish<br />
ignorance from uncertain knowledge, taking into account incomplete <strong>and</strong><br />
conflicted knowledge derived from various sources.<br />
The Dezert-Smar<strong>and</strong>ache theory [12-14] allows combining information from<br />
multiple sources. It focuses on the problems of combining uncertain, conflicted<br />
<strong>and</strong> inaccurate information [15]. DSmT overcomes the limitations of applying<br />
the inference methods used so far in the assessment of trust: probabilistic inference,<br />
fuzzy logic or DST. These methods enable the binary evaluation of nodes or<br />
creating hypotheses that cannot penetrate. By using DSmT it is possible to create<br />
any number of hypotheses that do not have to be exclusive, <strong>and</strong> thus more accurate<br />
assessment of the nodes. In addition, this method enables to distinguish the uncertain<br />
knowledge from ignorance.<br />
This theory rejects the main limitations of the Dempster-Shafer theory:<br />
• frame of discernment is a finite, exhausted <strong>and</strong> exclusive set of hypotheses,<br />
• the application of the excluded middle rule,<br />
• acceptance of the Dempster’s rule as a rule a combination of views,<br />
• acceptance of the Dempster’s conditioning rule.
284 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
The DSmT distinguished two types of models:<br />
• free model – where frame of discernment (Θ) consists of extensive but not<br />
exclusive items, so components can be mutually overlapping. This model<br />
is called free because of the lack of assumptions imposed on the hypothesis.<br />
• hybrid model – it allows the modelling of imprecise-views <strong>and</strong> exclusivity<br />
constraints Θ elements. In this case, the elements may overlap, but they<br />
do not have to.<br />
The DSmT introduces the concept of hyper-power set, which is denoted by D Θ .<br />
This collection is understood as the set of all proposals that were created from elements<br />
of Θ with the use of operators <strong>and</strong> . For example:<br />
<br />
for D <br />
<br />
, , ,..., ,| D | 5<br />
1 2 0 1 4<br />
, , , , .<br />
0 1 1 2 1 3 1 2 4 1 2<br />
(3)<br />
A. Events monitoring<br />
Node assessment is made based on direct node observation <strong>and</strong> information<br />
from neighbouring nodes. Examples of observed events by which nodes can be<br />
evaluated are:<br />
• provision of information – some of the nodes in ad-hoc networks are<br />
characterized by self-interested behaviour in order to deprive other nodes<br />
of the shares, for example by failing to forward packets for selfish node<br />
to the other nodes. Validation of packet transmission is possible through<br />
the analysis of incoming acknowledgments, when transmission of acknowledgments<br />
is enabled in the network or by tracking the packages sent by<br />
the monitoring node.<br />
• compliance of safety rules – in tactical networks information may have different<br />
levels of sensitivity, for example: secret, confidential, non-confidential.<br />
Data on a certain level of sensitivity can be sent only to nodes that have<br />
access to information about a specific level or a higher level. Based on information<br />
collected on nodes access levels <strong>and</strong> data contained in the labels,<br />
it can be verified if a node observes the principles of safety, i.e. whether<br />
it has access only to data which is authorized <strong>and</strong> makes it available only<br />
to the authorized users.<br />
• recommendation correctness – in the case when trust level is determined<br />
by recommendations from other nodes in the network, it is necessary<br />
to provide protection against “liar” nodes. A “liar” shall construe nodes,<br />
which transmit incorrect recommendations on other nodes, the objective<br />
of re-routing packet forwarding, intercepting or preventing delivery to<br />
the destination node.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
285<br />
The observed events can be evaluated as 0, 1 – using the classical theory of probability.<br />
However, in many cases, the observed behaviour provides some indication<br />
of both hypotheses, which would require omitting the evaluation of the event or<br />
a need to assign two assessments – which would misrepresent the two behaviours.<br />
Each behaviour is treated equally <strong>and</strong> the designated level of trust makes it impossible<br />
to identify the appropriate response to behaviour.<br />
B. Nodes classification<br />
Application of the Dezert-Smar<strong>and</strong>ache theory provides for more hypotheses,<br />
which enable more accurate assessment of behaviour. Additionally, through the creation<br />
of secondary hypotheses using sum <strong>and</strong> product operators, it can constitute<br />
representation of imprecise <strong>and</strong> uncertain hypotheses.<br />
During the observation of nodes behaviour they can be evaluated as:<br />
• cooperating node (C) – the node transmitting information,<br />
• egoistic node (E) – the node is not transmitting information,<br />
• honest node (H) – the node transmitting the proper recommendations,<br />
• liar node (L) – the node transmitting incorrect recommendations,<br />
• secure node (S) – the node adhering to safety rules,<br />
• unsecure node (U) – the node is not adhering to safety rules.<br />
The set of basic assumptions in some cases may be insufficient for correct classification<br />
of nodes. Apart from the hypotheses, it is possible to determine the basal<br />
intermediate hypotheses developed from the basal hypothesis with the sum <strong>and</strong><br />
logical product operators. The secondary hypotheses can distinguish:<br />
• uncertain cooperating node (UC) – the node to which correctness of packet<br />
forwarding was tested, but it is not possible to take clear decision whether<br />
it is a cooperating or selfish node. This situation can occur if a node did<br />
not receive confirmation of the package transfer – for each of the nodes<br />
in the path the uncertain cooperating node hypothesis is taken.<br />
UC C E<br />
• suspect liar node (SL) – the node whose recommendations may be biased,<br />
the value reported earlier, recommendation differs from the accumulated<br />
knowledge <strong>and</strong> the other recommendations, however, this difference does<br />
not yet allow for finding that they are wrong <strong>and</strong> biased.<br />
SL H L<br />
• uncertain honest node (UH) – the node to which you cannot determine<br />
whether the recommendations forwarded by it are correct, because<br />
of the lack of previously accumulated knowledge.<br />
UH H L
286 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
• suspect unsecure node (SU) – the node whose behaviour indicates partial<br />
compliance with security rules, for example, a node has access to the resources<br />
which are not eligible, but only make them available to the authorized<br />
individuals.<br />
SU S U<br />
• uncertain secure node (US) – the node in the case of which you cannot<br />
determine if it complies with the security rules, due to lack of knowledge<br />
regarding the node's resource access level.<br />
US S U<br />
With such specific hypotheses, it is possible to refine the assessment of nodes<br />
indicating the possibility of exchanging data with the node, but it does not include an incoming<br />
recommendation <strong>and</strong> needs more detailed observation of node’s behaviour, for<br />
example by using an additional mechanism for including a node to certain behaviours.<br />
C. Sample evaluations<br />
<strong>Information</strong> fusion is done separately for each type of event – co-operation<br />
between the nodes- following the security rules <strong>and</strong> recommendation correctness.<br />
Each hypothesis is assigned with a value of m(), depending on the number of observed<br />
events, which were assigned to a particular hypothesis. The m() is described<br />
by conditions defined by the following formula (4):<br />
m( ) 0<br />
mA ( ) 1.<br />
(4)<br />
<br />
AD<br />
The set of hypotheses for each type of event allows using the DSm rule of combination<br />
for free-DSm models:<br />
m ( A) m ( X ).<br />
M( )<br />
i i<br />
<br />
X1, X2,...,<br />
Xk<br />
D<br />
i1<br />
( X1X2... Xk<br />
) A<br />
k<br />
(5)<br />
Tables 1 <strong>and</strong> 2 show some example values of the received recommendations<br />
on node’s cooperation observation <strong>and</strong> compliance with security policies.<br />
TABLE I. Recommendations about node cooperation<br />
cooperating egoistic uncertain cooperating suspect egoistic<br />
m 1 0,650 0,030 0,320 –<br />
m 2 0,720 0,050 0,230 –<br />
m 3 0,690 0,040 0,270 –<br />
m M(Θ) 0,865 0,011 0,020 0,105
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
287<br />
TABLE II. Recommendations about security policy compliance<br />
secure unsecure uncertain secure suspect unsecure<br />
m 1 0,230 0,265 0,150 0,350<br />
m 2 0,270 0,290 0,070 0,370<br />
m 3 0,320 0,280 0,100 0,300<br />
m M(Θ) 0,136 0,130 0,007 0,727<br />
It can be specified based on the collected recommendations, if the node is cooperating<br />
<strong>and</strong> suspect unsecure. This information allows a node to take a decision on further<br />
node observation. The node can forward low sensitivity information, whose transmission<br />
to unauthorized units will not contribute to the realization of carried out actions.<br />
V. Conclusion<br />
Ensuring security in tactical MANET requires gathering <strong>and</strong> processing information<br />
about the node surrounding reality. <strong>Information</strong> from various sources,<br />
however, is often uncertain, incomplete <strong>and</strong> even conflicting. The method ensuring<br />
coverage of all of this information is Dezert-Smar<strong>and</strong>ache theory, which allows<br />
representing of imprecise hypotheses. By applying the Dezert-Smar<strong>and</strong>ache theory<br />
it is possible to identify specific <strong>and</strong> general hypotheses, which can combine data<br />
from different sources with access to information on the behaviour of nodes. As part<br />
of further work a function that enables combining data including their update time<br />
<strong>and</strong> weight of data sources will be determined.<br />
References<br />
[1] K. Seshadri Ramana, A.A. Chari, N. Kasiviswanth, “A Survey on Trust Management<br />
for Mobile Ad Hoc Networks”, International Journal of Network Security & Its<br />
Applications (IJNSA), vol. 2, no. 2, April 2010.<br />
[2] L. Capra, “Towards a Human Trust Model for Mobile Ad-hoc Networks”, Dept.<br />
of Computer Science, University College London.<br />
[3] Z. Han, K.J.R. Liu, Y.L. Sun, W. Yu, “A Trust Evaluation Framework in Distributed<br />
Networks: Vulnerability Analysis <strong>and</strong> Defence Against Attacks”, INFOCOM 2006.<br />
25th IEEE International Conference on Computer <strong>Communications</strong>, April 2006.<br />
[4] J. Głowacka, “Procedures of building nodes’ awareness for security in tactical<br />
ad-hoc networks, KKRRiT 2011, Poznań 2011, Telecommunication Review<br />
– Telecommunication News 2011 [CD], no. 6, pp. 405-408 (in Polish).<br />
[5] Zhu Han, Yan Lindsay, K.J. Ray Liu, Wei Yu, “<strong>Information</strong> Theoretic Framework<br />
of Trust Modelling <strong>and</strong> Evaluation for Ad Hoc Networks”, IEEE Journal on Selected<br />
Areas in <strong>Communications</strong>, vol. 24, no. 2, February 2006.
288 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
[6] Jien Kato, Jie Li, Ruidong Li, “Future Trust Management Framework for Mobile<br />
Ad Hoc Networks”, IEEE <strong>Communications</strong> Magazine, April 2008, pp. 108-114.<br />
[7] C. Zouridaki, B.L. Mark, M. Hejmo, R.K. Thomas, “A Quantitative Trust<br />
Establishment Framework for Reliable Data Packet Delivery in MANETs”, In SASN ’05:<br />
Proceedings of the 3rd ACM workshop on Security of ad hoc <strong>and</strong> sensor networks,<br />
pp. 1-10, New York, NY, USA, 2005.<br />
[8] V. Balakrishnan, V. Varadharajan, U.K. Tupakula, P. Lucs, “Trust <strong>and</strong><br />
Recommendations in Mobile Ad hoc Networks”, Third International Conference on<br />
Networking <strong>and</strong> Services, IEEE 2007.<br />
[9] Junhai Luo, Xue Liu, Mingyu Fan, “A trust model based on fuzzy recommendation<br />
for mobile ad-hoc networks”, Computer Networks 53 (2009), pp. 2396-2407.<br />
[10] G. Shafer, “A mathematical theory of evidence”, Princeton U.P., Princeton, NJ, 1976.<br />
[11] J. Konorski, R. Orlikowski, “DST-Based Detection of Noncooperative Forwarding<br />
Behavior of MANET <strong>and</strong> WSN Nodes”, Proc. 2nd Joint IFIP WMNC., Gdansk,<br />
Pol<strong>and</strong>, 2009.<br />
[12] F. Smar<strong>and</strong>ache, J. Dezert, “Advances <strong>and</strong> Applications of DSmT for <strong>Information</strong><br />
Fusion”, vol. 1, American Research Press Rehoboth, 2004.<br />
[13] F. Smar<strong>and</strong>ache, J. Dezert, “Advances <strong>and</strong> Applications of DSmT for <strong>Information</strong><br />
Fusion”, vol. 2, American Research Press Rehoboth, 2006.<br />
[14] F. Smar<strong>and</strong>ache, J. Dezert, “Advances <strong>and</strong> Applications of DSmT for <strong>Information</strong><br />
Fusion”, vol. 3, American Research Press Rehoboth, 2009.<br />
[15] J. Głowacka, M. Amanowicz, „Situational awareness of a military MANET node<br />
– the basis” („Podstawy tworzenia świadomości sytuacyjnej węzła wojskowej sieci<br />
MANET”), Telecommunication Review – Telecommunication News 2012, no. 2-3,<br />
pp. 59-62 (in Polish).
Mechanisms of Ad-hoc Networks Supporting<br />
Network Centric Warfare<br />
Rafał Bryś, Jacek Pszczółkowski, Mirosław Ruszkowski<br />
Systems Elements Designing Section, <strong>Military</strong> Communication Institute,<br />
Zegrze Poludniowe, Pol<strong>and</strong>,<br />
{r.brys, j.pszczolkowski, m.ruszkowski}@wil.waw.pl<br />
Abstract: In this article are presented the results of Ad-hoc networks mechanisms analyzes (identification,<br />
authorization, autoconfiguration <strong>and</strong> data exchange). These mechanisms were analyzed taking into<br />
account specifications of Ad-hoc networks using in netcentric operations. After that, have been selected<br />
the most appropriate mechanisms specified to be used in the special conditions. The Ad-hoc networks<br />
mechanisms specifications will be helpful in designing <strong>and</strong> building of networks for netcentric operations.<br />
Keywords: ad-hoc networks; NCW; autoconfiguration; authorization<br />
I. Introduction<br />
The way of modern warfare is strongly focused on the informations of enemy<br />
status <strong>and</strong> activities. It prodeuces the need for new <strong>and</strong> more sophisticated communications<br />
systems, which will guarantee fast <strong>and</strong> secure way to exchange data<br />
during Network-Centric Warfare. The overall military systems architecture provides<br />
MANET (Mobile Ad-hoc NETwork) for a military communications networks,<br />
at the lowest levels of comm<strong>and</strong>.<br />
The essential features of Ad-hoc networks intended for use in netcentric<br />
environments are:<br />
• Network decentralization. Each node in Ad-hoc network can perform<br />
the services as well as participate in the data transfer to the recipient.<br />
• Ability for dynamic topology changes. Network nodes are independent<br />
from each other <strong>and</strong> can arbitrarily changes its location, <strong>and</strong> thereby in their<br />
mutual relations.<br />
• Radio links usage. It eliminates the need to develop telecommunications<br />
infrastructure.<br />
• High network reliability – in case of failure of any network components,<br />
others can automatically take over their functions.<br />
• Good scalability (ease of expantion). Nodes joining the network that fulfill<br />
certain safety requirements are able to realize services almost immediately.
290 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
According to given above Ad-hoc networks advantages <strong>and</strong> communications<br />
requirements for netcentric systems, it can be concluded that these networks can be<br />
used in military systems but must fulfill some additional requirements for special<br />
communication systems. Therefore, the Ad-hoc networks functions should be<br />
enhanced with additional mechanisms: adaptation, identification, authentication,<br />
auto-configuration, data exchange <strong>and</strong> routing.<br />
In next paragraph of this article is presented the specification of above mechanisms<br />
in terms of special use (netcentric operations) of Ad-hoc networks.<br />
II. Autoconfiguration mechanisms<br />
Addressing in Mobile Ad-Hoc networks can be classified in terms of nodes<br />
addresses managing, as follows:<br />
• state accumulation addressing (so-called: stateful),<br />
• stateless addressing.<br />
In statefull approach, addresses are accumulated in a network entity that<br />
has knowledge of assigned <strong>and</strong> not assigned IP addresses, so it can avoid duplication<br />
of addresses. In stateless approach, each node r<strong>and</strong>omly selects its own IP address<br />
<strong>and</strong> then executes duplicate address detection test to ensure that selected address<br />
is not yet in use on the network.<br />
The accumulation state approach seems to be the most optimal to prevent<br />
addresses duplication, but taking into account network vulnerability to destructive<br />
factors, this solution is not acceptable. Therefore, for the netcentric Ad-hoc networks<br />
it is recommended to use of stateless mechanisms with emphasis on the Ad-Hoc<br />
IP Address Autoconfiguration mechanism.<br />
A. Ad-Hoc IP Address Autoconfiguration<br />
The Ad-Hoc IP Address Autoconfiguration mechanism combines mechanisms<br />
SDAD (Strong Duplicate Address Detection) <strong>and</strong> WDAD (Weak Duplicate Address<br />
Detection). In this way, the duplicate address detection mechanism checks<br />
duplication occurence during the initialization of the node, <strong>and</strong> detect <strong>and</strong> solve<br />
duplicated addresses by analysis of routing messages in intermediary nodes.<br />
The combination of two mechanisms allows continuously operate for nodes during<br />
network splitting <strong>and</strong> merging. As in WDAD, each node selects the key of 128 bits<br />
length <strong>and</strong> appends it to the routing protocol control packets. Intermediary nodes<br />
must retain the key value for each address in the routing table or cache. Automatic<br />
configuration procedure is exactly the same as in the SDAD mechanism. When<br />
a node receives a routing packet, examines all the IP addresses <strong>and</strong> keys values<br />
(contained in this packet) <strong>and</strong> compares it with the addresses <strong>and</strong> keys contained<br />
in the address table or cache. If more than one key value will be found for the IP<br />
address, the conflict of addresses is stated. In this case the node sends the unicast
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
291<br />
error message to the address with lower value key. During normal operation,<br />
if the node receives information about the error of his address, it releases this address<br />
<strong>and</strong> starts reconfiguring procedure to obtain a new IP address. In the next<br />
subsections is presented idea of the WDAD <strong>and</strong> SDAD mechanisms.<br />
B. Strong Duplicate Address Detection (SDAD)<br />
SDAD mechanism is the basis for all stateless solutions. It consists of a simple<br />
mechanism that allows an Ad-Hoc node to select IP address <strong>and</strong> then check to<br />
if it is already used by another node. Although, SDAD produces some problems<br />
<strong>and</strong> limitations. Performing of duplicate address detection procedure is limited<br />
to the nodes initialization phase. So, for some reasons (such as temporary<br />
loss of connection to network), autoconfiguration process leads to duplication<br />
of addresses, <strong>and</strong> the network is not able to function properly. This protocol<br />
does not guarantee the uniqueness of the network addresses <strong>and</strong> the probability<br />
of address duplication increases with the size of the network. In addition,<br />
the protocol generates a lot of traffic – every joining node sends a few broadcast<br />
packets in flood mode.<br />
C. Weak Duplicate Address Detection (WDAD)<br />
The WDAD mechanism is intended to extend the mechanism for detecting<br />
duplicate addresses on whole life cycle of the network. The idea is that duplicate<br />
addresses can be tolerated as long as packets reach the destination node indicated<br />
by the sender, even if the destination address is used by another node. Therefore,<br />
each node selects an identification key using for the routing protocol to distinguish<br />
the potential duplicate IP addresses.<br />
The main disadvantage of WDAD mechanism is its dependence on routing<br />
protocol. The WDAD requires some changes in the routing layer to support the key<br />
identifier of the node. In the routing layer, each node is identified by a virtual address<br />
involving the combination of IP address <strong>and</strong> key value. In addition, WDAD<br />
duplicate addresses detection relies on local routing information, which makes<br />
it completely adaptable only to proactive routing (each node uses a full routing<br />
table). In case of reactive routing, the possibility of duplicate address detection<br />
in a realitvely short time is reduced – delays increase. WDAD does not generate<br />
additional traffic caused by the automatic configuration mechanism, but produces<br />
the overhead of routing protocol packets.<br />
III. Identification <strong>and</strong> authorization mechanisms<br />
The security issues are carried out in two phases: authentication of participants<br />
of data exchange session, data authentication, <strong>and</strong> integrity guarantee. This
292 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
article presents the mechanisms used in the first stage. There can be distinguished<br />
mechanisms for different functional purposes, as follow:<br />
• identification,<br />
• authentication,<br />
• authorization.<br />
The user authenticity checking process <strong>and</strong> giving the authority for a specific set<br />
of services is carried out by subsequent performing of the mechanisms mentioned<br />
above. First of all must be carried out user identification, what provides recognition<br />
of the unique features assigned to a person or object. This process allows to identify<br />
user or object of automated data processing system. The result of the identification<br />
process is so-called electronic identity. The next step is to carry out the authentication<br />
process, which aim is to provide a correlation of the electronic identity with<br />
real world. The aim of the authentication process is to ensure at least one of the two<br />
parties of data exchange about the identity of the other. After successfully authenticating<br />
the parties of data exchange session, the authorization process is executed.<br />
The aim is to give the user or program or process appropriate permissions (access<br />
<strong>and</strong> resource use rights) associated with the authenticated part.<br />
The following chapters are presented mechanisms used in the WLAN, WMAN<br />
<strong>and</strong> WPAN network techniques.<br />
A. IEEE 802.11<br />
The IEEE802.11 technique as the most often used, has a number of mechanisms<br />
proposals:<br />
• MAC filtration,<br />
• WEP (Wired Equivalent Privacy),<br />
• EAP (Extensible Authentication Protocol) <strong>and</strong> 802.1X,<br />
• WPA/WPA2 (WIFI Protected Access).<br />
The most powerful security mechanism used in the WLAN is WPA <strong>and</strong> WPA2<br />
(an upgraded version). It is also recommended to use in Ad-hoc networks dedicated to<br />
support netcentric operations. With regard to identification <strong>and</strong> authentication, both<br />
protocol versions use the same mechanisms. The difference is only in used to the encryption<br />
data protocol. The first version uses the TKIP protocol, while the second – AES.<br />
WPA (WiFi Protected Access) is the successive WEP mechanism <strong>and</strong> provides<br />
implementation of safety procedures at a higher level. It inherits from its predecessors<br />
some parts of properties <strong>and</strong> also introduces new, such as data encryption or<br />
integrity checking mechanisms. It is assumed that the WPA2 mechanism (IEEE<br />
802.11i) is a combination of: WPA2 = 802.1x + EAP + AES + CCMP.<br />
The EAP (Extensible Authentication Protocol), described in recommendation<br />
RFC2284, was intended to authenticate endpoints of PPP connection for remote<br />
access to network resources. The objective of this st<strong>and</strong>ard is to control network<br />
access, based on ports.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
293<br />
In terms of authentication, 802.11i mechanism implemented two policies,<br />
namely:<br />
• WPA Personal – often denoted as WPA-PSK (Pre-Shared Key), where<br />
both parties identify together <strong>and</strong> encrypt data using previously set key of<br />
256-bit length,<br />
• WPA-Enterprise – is dedicated to the larger networks, where the station<br />
authentication is carried out using the RADIUS server <strong>and</strong> mechanisms<br />
described in 802.1X recommendation.<br />
This st<strong>and</strong>ard also set a new security architecture – RSN (Robust Security<br />
Network). In this architecture the process of secure connection establishing is divided<br />
into four phases: agreeing of security policy, authentication, key generation<br />
<strong>and</strong> distribution, <strong>and</strong> safe data exchange ensuring data integrity <strong>and</strong> confidentiality.<br />
From the netcentric operations point of view, the WPA2-PSK mechanism seems<br />
to be optimal, because there is no need to use network authentication server. In case<br />
of WPA2-Enterprise mode, each new station that joining to network or disconnected<br />
<strong>and</strong> connected (due to changes in propagation) is obligated to authenticate with<br />
entity (authentication server), which can be inaccessible due to a server crash. For<br />
this reason, in 802.11 networks should be applied WPA2 Pre Shared Key mechanism,<br />
taking into account all the principles of key material distribution <strong>and</strong> protection.<br />
In this case, the PMK (Pairwise Master Key) used to determine the PTK (Pairwise<br />
Transient Key), during the 4-way h<strong>and</strong>shake, is determined on the basis of three<br />
values: SSID, SSID length <strong>and</strong> shared secrets – WPA password.<br />
B. IEEE 802.15 series<br />
1) IEEE 802.15.4<br />
The ZigBee system architecture developed by the ZigBee Alliance is based on<br />
the physical layer PHY <strong>and</strong> data link layer – MAC layer specification, as is described<br />
in Recommendation 802.15.4:2004 <strong>and</strong> the later version 802.15.4:2006. In the structure<br />
is the network coordinator. This entity has full functionality in the star structure<br />
taking part in relay of data between devices. In others, network coordinator functions<br />
are limited to determining the basic parameters of the network.<br />
In terms of secure communication, the ZigBee can operate in several modes:<br />
open mode without security mechanisms included, only authentication <strong>and</strong> integrity<br />
check – AES-CBC-MAC, only encryption – AES-CTR, <strong>and</strong> authentication, integrity<br />
check <strong>and</strong> encryption AES-CCM. The authorization is thus realized in two above<br />
modes, <strong>and</strong> is made in the data link layer MAC. This is performing by calculating<br />
a common secret (MIC – Media Integrity Code) using CBC-MAC mechanism<br />
basing on a common cryptographic key held by cooperating stations. This secret<br />
is calculated based on a symmetric key (known by two parties of data exchange<br />
session) <strong>and</strong> the bits in the entire data frame (including the header <strong>and</strong> data field).
294 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Therefore, apart from the sender <strong>and</strong> recipient authentication, there is the frame<br />
integrity check performed. The MIC code is transmitted in each 802.15.4 frame<br />
except confirmations frames – ACK.<br />
2) IEEE 802.15.3<br />
The 802.15.3 networks are organized in a picocells (called piconet), are managed<br />
by the picocell supervisor PNC (PicoNet Controller). PNC is selected from<br />
the terminals located in the area of mutual radio range. PNC is responsible for<br />
synchronizing the piconet elements (using “beacon”), management of QoS parameters,<br />
power saving modes, <strong>and</strong> network access control. PNC also performs security<br />
functions relating to all piconet members. Secure relationships DEV-DEV can be<br />
created independently, without the use of PNC.<br />
The user’s identification, authentication <strong>and</strong> authorization are done in a similar<br />
way as for 802.15.4 networks, using CBC-MAC algorithm. It is realized based<br />
on knowledge of the symmetric key by both parties of exchanging data session<br />
<strong>and</strong> the “nonce” value, which carrying the identifiers of the sender <strong>and</strong> recipient.<br />
The last block of CBC-MAC algorithm result is a message integrity code calculated<br />
on the basis of identification data <strong>and</strong> common cryptographic key. In the 802.15.3<br />
networks, all the messages (including the beacon message) are authorized.<br />
3) IEEE 802.15.1<br />
IEEE 802.15.1 networks are organized in piconets, managed by the terminal<br />
selected as the Master, which oversees the complex piconet consist of up to 255 slave<br />
devices, where only up to 7 may have an active state. Communication between slave<br />
devices always takes place through the master device. Security (encryption <strong>and</strong> authentication)<br />
is done through a pairing process for secure communication between<br />
terminals, using a cryptographic key for the SAFER+ algorithm (algorithm E).<br />
In the first phase of the pairing, initial key K INIT (Initialization Key) is generated<br />
using the shared 128-bits pseudor<strong>and</strong>om string (IN_RAND) <strong>and</strong> PIN number (up<br />
to 128 bits of length). If the PIN is shorter, is completed with the hardware address<br />
of the master device (BD_ADDR). Figure 1 shows the key generation process.<br />
Figure 1. K INIT key negotiation from PIN number<br />
Than, the devices encrypts the data carrying in time slots <strong>and</strong> carry out negotiations<br />
of new 128-bits cryptographic key K LINK – Link Key. This key is stored
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
295<br />
by the devices <strong>and</strong> is used to encrypt the proper data exchange. The possession<br />
of this key by a pair of devices is equivalent to their logical association (pairing).<br />
The last stage is authentication of pairing devices – Figure 2.<br />
Figure 2. Authentication process.<br />
It involves the generation of SRES’ word, which is compared with the SRES<br />
recalculated locally (the original). The authentication process is as follows:<br />
1. Station A (authenticator), sends 128-bits pseudo-r<strong>and</strong>om sequence as a clear<br />
text to station B AU_RAND A (authenticated).<br />
2. Station B using the E1 algorithm calculates the 32-bits SRES’ word based<br />
on its hardware address (the remaining 96 bits (ACO) are used to calculate<br />
the encryption key), K LINK cryptographic key <strong>and</strong> the AU_RAND A word.<br />
3. Station B sends the SRES’ to station A.<br />
4. Station A calculates locally the SRES word <strong>and</strong> compares it with<br />
SRES’ – SRES=SRES’.<br />
5. The positive result of comparison indicates a positive result of authentication<br />
station B by station A.<br />
6. The process is repeated but station B is the authenticator.<br />
C. IEEE 802.16<br />
WiMAX (Worldwide Interoperability for Microwave Access – 802.16) is intended<br />
for the building of urban networks <strong>and</strong> MANs, were designed as part<br />
of the last mile users access. WiMAX security architecture includes elements <strong>and</strong><br />
mechanisms such as stations digital signature (X.509), the security associations (SA),<br />
encryption protocols, key management protocols (also responsible for confirming<br />
the identity of co-operating stations).<br />
Security Association is a logical link between two terminals (stations) <strong>and</strong><br />
consist of safety parameters, such as cryptographic keys, certificates, etc. Due to<br />
the three-phased secure data exchange process between stations, there are two<br />
basic types of association: authentication security association (Authorization<br />
Security Association) <strong>and</strong> the data exchange security association (Data Security
296 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Association). The phases of secure data exchange process are: authentication, negotiation<br />
of cryptographic keys <strong>and</strong> encryption.<br />
Authentication security associations are used during station authentication<br />
stage <strong>and</strong> includes security parameters used for this stage:<br />
• X.509 certificate used to identify the station,<br />
• authorization key (AK – Authorization Key) used to generate the KEK<br />
(Key Encryption Key) – KEK is a cryptographic key to encrypt the TEK<br />
negotiation process (Traffic Encryption Key),<br />
• hash – computed by HMAC-Digest function, used to data integrity check<br />
during the negotiation of cryptographic material,<br />
• sequence number of AK,<br />
• the period validity of AK,<br />
• association descriptor.<br />
The station authorization phase is performed in four steps:<br />
1. The connecting station sends authentication informations in AuthenticationInfMess,<br />
containing a manufacturer certificate, to verify its credibility.<br />
2. Simultaneously, the station sends an authentication request in a AuthorizationReqMess<br />
message, which contains a request of authentication key<br />
<strong>and</strong> security association descriptor. Also, there are send informations<br />
of supported cryptographic algorithms, data authentication mechanisms<br />
<strong>and</strong> connection identifier BCID (Basic Connection ID). BCID is assigned<br />
by the station B during the initial phase of connection establishing (Initial<br />
Ranging). Station A is authorized after its certificate confirmation.<br />
3. Station B sets security association descriptors (the initial association<br />
properties / Primary SA / <strong>and</strong> existing static association / Static SA /).<br />
Then activates the authentication key <strong>and</strong> sends the response to station<br />
A in the AuthorizationRepMess, containing :<br />
a. AK key (encrypted by public key of station A),<br />
b. 4-bits AK key number used to distinguish the following keys,<br />
c. validity period of AK key,<br />
d. SA descriptors – previously established<br />
4. In the last phase is calculated the cryptographic key KEK <strong>and</strong> message authentication<br />
keys (HMAC_Key_D <strong>and</strong> HMAC_Key_U) based on key AK.<br />
They will be used during the negotiation phase of TEK keys. Because the AK<br />
key has a limited period of validity than the station should periodically<br />
renew the authorization process by sending an AuthenticationReqMess,<br />
before the AK validity period expires.<br />
The figure 3 shows that the station identification <strong>and</strong> authentication process<br />
is carried out in two stages of the symmetric <strong>and</strong> asymmetric encryption, using<br />
PKM protocol version 2. This protocol is responsible for normal <strong>and</strong> cyclic station<br />
authentication processes <strong>and</strong> exchange of cryptographic material. This protocol<br />
operates in a client/server mode. The station identification is performed basing
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
297<br />
on X.509 certificates. Each WiMAX station has the X.509 certificate issued <strong>and</strong><br />
implemented by the equipment manufacturer.<br />
Figure 3. IEEE 802.16 authorization phase<br />
IV. Adaptative ad-hoc technologies<br />
Network centric operations requires such Ad-hoc networks organization that<br />
provide the conditions for data exchange as far as possible to guarantee reliable delivery<br />
of informations <strong>and</strong> ensure accuracy of the transmissions.<br />
In order to fulfill these conditions, technologies used for wireless networks<br />
must meet two fundamental conditions:<br />
– Support as far as possible creating <strong>and</strong> maintaining a Ad-hoc network<br />
topology;<br />
– Offer the mechanisms of adaptation to terrain conditions, propagation,<br />
the nature of the end-user services <strong>and</strong> quality requirements for<br />
these services <strong>and</strong> types of users of such networks (mobile, nomadic,<br />
stationary).<br />
With regard to the abovementioned factors was carried out analysis of network<br />
techniques enabling the building of Ad-hoc networks <strong>and</strong> adaptation to<br />
the changing conditions in a radio channel. The analysis concerned the network<br />
technologies st<strong>and</strong>ardized within the IEEE <strong>and</strong> covered st<strong>and</strong>ards for the Personal<br />
Area (WPAN), Local (LAN) <strong>and</strong> Metropolitan Network (WMAN).<br />
A. IEEE 802.11<br />
WLAN wireless technologies st<strong>and</strong>ardized within the IEEE 802.11 group is currently<br />
the most prevalent. WLANs based on IEEE 802.11 can be found in a number<br />
of private <strong>and</strong> commercial installations.
298 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Originally, it was developed version labeled as 802.11 operating in 2,4 GHz<br />
ISM b<strong>and</strong>. However, due to the growing needs of the telecommunications market<br />
<strong>and</strong> technological development have been designed subsequent versions of this<br />
technique. Currently, as WLAN solutions are used four base protocols prepared by<br />
IEEE 802.11 group (a, b, g, n) specifying the encoding of radio signals, the operating<br />
b<strong>and</strong>s <strong>and</strong> offered rate. Original version is currently not used.<br />
Name<br />
Max.<br />
bitrate<br />
[Mbit/s]<br />
B<strong>and</strong>width<br />
[GHz]<br />
Table I. IEEE 802.11 st<strong>and</strong>ards [3]<br />
Modulation<br />
Supported<br />
MIMO<br />
streams<br />
Range<br />
[m]<br />
Publication/<br />
comments<br />
802.11 2 2,4 FHSS, DSSS, IR 1 100 June 1997<br />
802.11a 54 5 OFDM 1 120 September 1999<br />
802.11b 11 2,4 HR-DSSS, CCK 1 140 September 1999<br />
802.11g 54 2,4<br />
HR-DSSS, CCK,<br />
OFDM<br />
1 140<br />
June 2003<br />
compatible downwards<br />
with 802.11b,<br />
802.11n 540 2,4 or 5 OFDM 4 250 November 2009<br />
Significant role for high transmission rate ensuring have OFDM modulation,<br />
which allows more efficient use of radio spectrum. The IEEE 802.11n extension<br />
allows obtaining higher speeds <strong>and</strong> transmission ranges by using MIMO technology<br />
(Multiple-Input Multiple-Output). For MIMO technology are used more<br />
than one antenna transmission or reception <strong>and</strong> a special encoding techniques.<br />
WLANs based on 802.11 can run in infrastructure mode, where users<br />
communicate with each other through the AP (Access Point) or independent,<br />
in Ad-hoc mode. The main directions of development of the 802.11 series<br />
of st<strong>and</strong>ards focused on solutions for network infrastructure, while working<br />
in Ad-hoc mode was not considered or undertaken works in this direction are<br />
on a limited scale.<br />
Prevalence of use cards compliant with the IEEE 802.11 st<strong>and</strong>ard for office<br />
<strong>and</strong> home has made the necessary research on the use of these technologies for<br />
building <strong>and</strong> organization of wireless networks in Ad-hoc mode.<br />
Comprehensive solution for this type of network is proposed in extension IEEE<br />
802.11s – “ESS – Extended Service Set Mesh Networking”. The solution assumes<br />
the possibility of creating a self-configuring 802.11 wireless network operating<br />
in Ad-hoc mode, where each device can have several interfaces. One of the basic<br />
assumptions of the developed solution was to provide extensibility <strong>and</strong> flexibility,<br />
consisting of applying a variety of mechanisms to fulfill the same functions in different<br />
nodes of the network.<br />
For IEEE 802.11s st<strong>and</strong>ard assumed use of the underlying mechanisms for<br />
the physical layer, the security of information <strong>and</strong> access to the transmission
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
299<br />
medium used in previous versions of IEEE 802.11. Additionally, assumes the use<br />
of new, additional solutions. The required functionality described by the IEEE<br />
802.11s includes:<br />
a) PHY – Physical Layer, based on the IEEE 802.11a /b/g/n.<br />
b) Medium Access Coordination – mechanisms for medium access control,<br />
based on st<strong>and</strong>ard solutions adopted for the network compatible with IEEE<br />
802.11 with QoS extensions described in the IEEE 802.11e. To further<br />
use are expected new features such as the ability to dynamically change<br />
the operating channel.<br />
c) Mesh Security – authentication of users, nodes <strong>and</strong> trunks cryptographic<br />
protection, in large part based on the extension of EEE 802.11i.<br />
d) Mesh Configuration & Management – mechanisms for automatic configuration<br />
of radio parameters (operating channel frequency selection,<br />
transmit power, etc.), QoS management policies.<br />
e) Discovery & Asscociation – mechanisms for detecting the presence of neighboring<br />
nodes <strong>and</strong> mesh networks <strong>and</strong> to identify parameters of mesh network,<br />
the procedures for connecting to the network nodes <strong>and</strong> the statement<br />
of logical links with its neighbors.<br />
f) Mesh Topology, Learning, Routing & Forwarding – a group of mechanisms<br />
<strong>and</strong> protocols for the control <strong>and</strong> the creation of the current topology, <strong>and</strong><br />
data forwarding, it is assumed the use the Hybrid Wireless Mesh Protocol<br />
(HWMPA) for routing, which is a combination of m<strong>and</strong>atory reactive<br />
protocol mechanisms Ad-hoc Radio Metric on-dem<strong>and</strong> Distance Vector<br />
(RM-AODV), <strong>and</strong> optional proactive mechanisms – Tree Based Routing<br />
(TBR). It is also assumed to use a proactive routing protocol Metric Radio<br />
Optimized Link State Routing (RM-OLSR).<br />
g) Internetworking – mechanisms for ensuring mesh network cooperation<br />
with external 802 series networks, including the wired networks.<br />
h) Mesh Measurement – mechanisms <strong>and</strong> procedures for monitoring the mesh<br />
network <strong>and</strong> radio environment, e.g. for setting routes in mesh network.<br />
In this st<strong>and</strong>ard was assumed using of several types of mesh network nodes,<br />
which can change operation mode during its functionality. They are:<br />
a) Mesh Point (MP) – this is the basic type of the node in the network 802.11s.<br />
It is used to carry out the procedures for establishing <strong>and</strong> maintaining<br />
networks. Arranges <strong>and</strong> maintains the logical links of detected neighbors<br />
<strong>and</strong> forward transit traffic.<br />
b) Mesh Access Point (MAP) – an extended version of the node MP, also<br />
supports the function of an access point (AP) to support st<strong>and</strong>ard WLAN<br />
client station (not supporting 802.11s st<strong>and</strong>ard).<br />
c) Mesh Portal Point (MPP) – used to work as node in mesh networks to<br />
the external networks compatible with the IEEE 802 (wired, wireless,<br />
<strong>and</strong> also compatible with the 802.11s). In addition to features for the MP
300 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
can perform the functions of the bridge (network bridge) <strong>and</strong> support<br />
a proactive routing within their own mesh network.<br />
d) Lightweight Mesh Point (LWMP) – nodes implementing the functionality<br />
of a Mesh Point node only in an environment of mutual audibility of nodes<br />
(as the classic WLAN nodes in Ad-hoc mode).<br />
e) Client Station (STA) – a classic client station designed to work with the AP<br />
<strong>and</strong> mechanisms not supporting 802.11s st<strong>and</strong>ard.<br />
For each of these nodes is assumed that it will work as terminal <strong>and</strong> offer users’<br />
access to services at the OSI application layer.<br />
B. IEEE 802.16<br />
St<strong>and</strong>ard for wireless metropolitan structures WMAN defined by a group<br />
of IEEE 802.16. Mobile WiMAX provides support for stationary equipment,<br />
nomadic <strong>and</strong> full mobility for the devices carried or transported at speeds up to<br />
120 km/h. This functionality of WiMAX technology is extremely important for<br />
dynamic operation conducted with the use of vehicles.<br />
Assuming the possibility of using battery-powered portable devices IEEE<br />
802.16e authors have developed the two modes operation of subscriber stations<br />
for energy conservation, that are: idle <strong>and</strong> sleep mode.<br />
IEEE 802.16e introduces the possibility of scalable b<strong>and</strong>width utilization<br />
of the radio channel from 1.25 MHz to 20 MHz, with modulation SOFDMA<br />
(Scalable Orthogonal Frequency Division Multiple Access), where the number<br />
of subcarriers varies with the width of the channel. This property, greatly increases<br />
the feasibility of efficient transmission with high speeds.<br />
Mobile WiMAX is ready to use multipath reception. For this purpose are<br />
used OFDM modulation <strong>and</strong> MIMO (Multiple Input – Multiple Output) solutions,<br />
involving the use of multiple antennas on the receiving <strong>and</strong> transmitting sites.<br />
It has a great importance in the case of communication systems in urban areas,<br />
where the multipath phenomenon is the most noticeable.<br />
In response to the possibility of variable propagation conditions experienced<br />
by mobile subscribers, the IEEE 802.16e introduces the hybrid automatic repeat<br />
request H-ARQ (Hybrid Automatic Repeat called Request), where the first correction<br />
coding is used, the detection coding (used for ARQ) can be used, if necessary,<br />
in the next step.<br />
IEEE 802.16e also implies the possibility of using smart antennas, where<br />
the adaptive gain control of selected direction of the transmission is used. It can increase<br />
the useful range <strong>and</strong> reduce interference.<br />
Current implementation of WiMAX technology in the great majority basing<br />
on the solutions with the use of base stations. The creators of the IEEE 802.16 st<strong>and</strong>ard<br />
established the possibility of network functioning without using base stations.<br />
Devices working in cooperation mode on the network (without the use of WiMAX
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
301<br />
base stations) has been identified as a “mesh” mode <strong>and</strong> presented in the extension of<br />
IEEE 802.16, <strong>and</strong> then included in the version IEEE 802.16-2004 (extension “a”<br />
has been incorporated into the version of 2004). Mesh mode can also be used in cooperation<br />
of base stations. In this mode, client stations are referred as MSS (mesh<br />
subscriber station), <strong>and</strong> base stations as MBS (mesh base station). In the mesh<br />
mode, unlike the communication mode managed by the base station, where<br />
in the transmission frame structure is distinguished direction from the base station<br />
(downlink) <strong>and</strong> up to her (uplink), transmission between mesh networks<br />
elements (MSS or BSS) is carried out as bi-directional which is established during<br />
initialization of the SS.<br />
These links are described by an 8-bits connection identifier (Link ID). If the data<br />
is transmitted in the direction to the MSS located closer to the MBS, traffic is treated<br />
as uplink traffic, otherwise it is seen as the downlink channel. The mesh mode uses<br />
three methods of data transmission known as a method of scheduling:<br />
• coordinated distributed scheduling;<br />
• uncoordinated distributed scheduling;<br />
• centralized scheduling.<br />
In the case of distributed scheduling, each node transmits the current <strong>and</strong><br />
proposed schedule of data transmission to neighboring nodes in one hop distance.<br />
If the destination node provides support for data transfer according to this schedule,<br />
it responds to the source node in the control subframe slot. Ultimately the source<br />
node sends to destination node acknowledgment of receipt of approval for transmission<br />
according to the desired schedule. For distributed coordinated scheduling,<br />
the scheduling messages are sent with using a scheme providing collision avoidance.<br />
Centralized scheduling method is similar to mode where the transmission<br />
is directly managed by the base station. In this mode, the MSS points are used only<br />
as relay stations to the nearest MBS.<br />
Described in IEEE 802.16-2004 mesh mode is not included in the extension<br />
known as the IEEE 802.16e. Due to the fact that the use of mobile WiMAX technology<br />
requires other devices than based on the IEEE 802.16d, mesh mode is not<br />
supported by network equipment manufacturers for the IEEE 802.16e. However,<br />
are created theoretical attempts to modify the IEEE 802.16e devices for mesh mode.<br />
One of the proposals to use mesh mode in a mobile version of WiMAX has been<br />
presented for the tactical communications networks in [4].<br />
The most recent proposal to improve the functionality of mobile WiMAX<br />
subscriber station is in extension IEEE 802.16j, which introduces the concept<br />
of a relay station – MRS (multihop relay station). MRS perform a similar function<br />
as the MSS in a centralized mode, passing data from other SS subscriber station to<br />
base station BS, in the case of absence of direct contact SS to BS. MRS is used also<br />
in the IEEE 802.16m version (Advanced Air Interface with data rates of 100 Mbit/s<br />
mobile & 1 Gbit/s fixed), known as WiMAX2 designed to provide transmission<br />
rates up to 1 Gbit/s.
302 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
C. IEEE 802.15<br />
Personal Area Networks (WPAN) are created to provide a wireless user access<br />
to facilities <strong>and</strong> services provided by them <strong>and</strong> co-operation devices in the network.<br />
Due to their use, a network device must be simple to use, characterized by small<br />
size <strong>and</strong> weight <strong>and</strong> low power consumption. The most popular st<strong>and</strong>ard for WPAN<br />
is defined in the IEEE 802.15 group. These are the techniques: Bluetooth (IEEE<br />
802.15.1). UWB (IEEE 802.15.3), ZigBee (802.15.4). In Table II, developed in [1],<br />
are presented the most important properties of these techniques.<br />
Table II. Properties of WPAN technologies<br />
Bluetooth<br />
802.15.3 802.15.4<br />
WiMedia UWB Forum st<strong>and</strong>ard ZigBee<br />
B<strong>and</strong>width 2,4 GHz 3,1-10,6 GHz<br />
3,1-4,85 GHz,<br />
6,2-9,7 GHz<br />
2,4 GHz <strong>and</strong> 868/915 MHz<br />
Modulation<br />
Channel<br />
Access<br />
Bitrate<br />
GFSK,<br />
π/4-DQPSK,<br />
8DPSK<br />
Polling, master-<br />
-slave, TDD (Time<br />
Division Duplex)<br />
21 kbit/s do<br />
40 Mbit/s<br />
QPSK, DQPSK, 16-QAM,<br />
32-QAM, 64-QAM<br />
CSMA-CA,<br />
OFDM,<br />
optionally TDD<br />
53,3, 80, 110,<br />
160, 200, 320,<br />
400, 480 Mbit/s<br />
No data<br />
DSSS with BPSK or MSK<br />
CSMA/CA <strong>and</strong> guaranteed<br />
time slots GTS in superframes<br />
< 2 Gbit/s 2-250 kbit/s<br />
Range [m] 0,1-100 < 10 1-100<br />
Transmiter<br />
Power<br />
Network<br />
topologies<br />
QoS<br />
Security<br />
Usability<br />
< 100 mW<br />
Piconet,<br />
scatternet, mesh<br />
SDP<br />
(Service Discovery<br />
Protocol)<br />
SAFER+,<br />
authentication,<br />
encryption<br />
Dedicated<br />
applications<br />
B<strong>and</strong>width depended<br />
1 mW<br />
Star,<br />
cluster, mesh<br />
Guaranteed time slots<br />
AES-128<br />
AES-128,<br />
authentication<br />
Sensor networks,<br />
automation systems<br />
1) UWB (IEEE 802.15.3)<br />
The IEEE 802.15.3 specification defines the physical layer <strong>and</strong> data link of high<br />
speed (high rate) WPANs (Wireless Personal Area Network), that offers above<br />
20 Mbit/s data rate.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
303<br />
The basic element of the IEEE 802.15.3 wireless network is piconet, defined<br />
as a wireless communication system, operating in Ad-hoc mode, which allows<br />
mutual communication of many independent devices. It is assumed that the size<br />
of a typical piconet covers an area with a radius of 10 m. The IEEE 802.15.3 st<strong>and</strong>ard<br />
defines several functional elements in piconet structure, shown in Figure 4.<br />
Figure 4. IEEE 802.15.3 piconet elements [11]<br />
The basic component of this structure is the data transfer object – DEV, which<br />
in general should be identified as a terminal. DEV can also be a group of devices<br />
in one location. In piconet, the one DEV element must act as PNC (Piconet Coordinator).<br />
PNC is responsible for synchronizing the piconet elements (using<br />
“beacon” messages), the management of QoS parameters, power saving modes,<br />
<strong>and</strong> network access control. PNC also performs security functions relating to all<br />
piconet members.<br />
Piconet is not a spatial structure, but rather logical. Crucial in the piconet<br />
creation have PNC. The precondition, which is adopted for the piconet existence<br />
is DEV act as PNC sending a messages “beacon” containing the information required<br />
to piconet maintain. The process of piconet creation is done by sending<br />
joining notification to the PNC, by the DEV in the surrounding area, interested<br />
in piconet membership. St<strong>and</strong>ard assumes dynamic piconet membership for DEV.<br />
DEV can attach <strong>and</strong> detach during the transmission. In situations where the device<br />
acts as a PNC leaves piconet, must be designated the new PNC.<br />
St<strong>and</strong>ard provides parallel operation of different piconets. DEV can belong<br />
to the parent piconet, where have guaranteed access to b<strong>and</strong>width, offspring<br />
piconet (where piconet is managed by the unit included in the home network),<br />
<strong>and</strong> the neighboring piconet when it is managed by the device, that there have no<br />
contact with home piconet.<br />
Messages between piconets are sent in superframe, in frames transmitted<br />
during the transmission time labeled CFP (Contention Free Period). As addresses<br />
in the so-constructed network are proposed to use the PNID (Piconet ID) identifiers,
304 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
<strong>and</strong> device IDs DevID (Device ID). To avoid ambiguity in the allocation of these<br />
addresses is assumed to use the parent element defined as MC (mesh PNC).<br />
2) Bluetooth (IEEE 802.15.1)<br />
Bluetooth is a st<strong>and</strong>ard for wireless networks described by the recommendation<br />
IEEE 802.15.1. To work using unlicensed 2.4 GHz ISM b<strong>and</strong>. Provides transmission<br />
range in open space defined by three transmit power classes respectively: 100, 10<br />
<strong>and</strong> 1 meter. Depending on the version of the st<strong>and</strong>ard offer bit rate of 21 kbit/s<br />
for 1.0 to 40 Mbit/s for version 3.1.<br />
The technique enables “point-to-point” <strong>and</strong> “point-to-multipoint” connection<br />
in Ad-hoc mode for devices on a small area. The 802.15.1 st<strong>and</strong>ard define Bluetooth<br />
profiles i.e. scenarios for the using Bluetooth technology. Profile supports h<strong>and</strong>ling<br />
application-layer data <strong>and</strong> voice, print data, access to local <strong>and</strong> global networks,<br />
in uniform way.<br />
The st<strong>and</strong>ard assumes that the communication between Bluetooth devices<br />
is carried out in the logical structure as for the IEEE 802.15.3 i.e. piconet. It is<br />
assumed that at the same time can be active seven slaves <strong>and</strong> one master. Status<br />
of the master unit performs machine that initiates the process of creating a network.<br />
Data exchange can take place only between the parent node (master) <strong>and</strong> slave<br />
(slave). Direct data exchange between slave devices is not possible.<br />
In addition, devices can participate in piconet in power save mode-Park, except<br />
seven active slaves. By enabling <strong>and</strong> disabling the device in this mode, the master<br />
can provide communication for multiple devices. To ensure cooperation between<br />
piconets the ability of working in bridge mode was adopted. Thus, piconets can be<br />
combined into larger structures called scatternet. The IEEE 802.15.1 st<strong>and</strong>ard does<br />
not define the principles of scatternet creation. There were designed only custom<br />
proposals including Bluetrees, Bluestar, Bluemesh.<br />
3) ZigBee (IEEE 802.15.4)<br />
IEEE 802.15.4 was developed for sensor networks. In relation to the Bluetooth<br />
<strong>and</strong> UWB offers a relatively low data rate (up to 250 kbit/s). The st<strong>and</strong>ards assumed<br />
the ability to create complex network topologies. IEEE 802.15.4 st<strong>and</strong>ard defines<br />
the format of the physical <strong>and</strong> data link layer. Based on these recommendations,<br />
the organization ZigBee Alliance (assembling more than 150 companies) extended<br />
the functionality of this solution by introducing a st<strong>and</strong>ard named ZigBee, which<br />
also includes recommendations for network <strong>and</strong> application layers.<br />
ZigBee defines three types of devices that can be used to create network connections.<br />
These include the following types:<br />
• The coordinator – the parent node of ZigBee network;<br />
• Router – a node that can be used to create network <strong>and</strong> realizing routing<br />
<strong>and</strong> transit data functions;<br />
• Terminal – devices that do not offer the data relay functionality.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
305<br />
The st<strong>and</strong>ard defines the following elements:<br />
• Application Object (APO) – endpoints (processes) that work together <strong>and</strong><br />
carrying out certain tasks utility. It was assumed ability to run up to 240<br />
objects in each of the nodes. APOs can work together within a single node,<br />
<strong>and</strong> through the network infrastructure;<br />
• ZigBee Default Object (ZDO) – the objects responsible for network maintaining.<br />
Determines the type of device (coordinator, router, terminal<br />
equipment), discovers the environment, network management, creates<br />
associations between the APO at different nodes;<br />
• Application Support Sublayer (APS) – responsible for APOs communication<br />
in the network <strong>and</strong> maintain established (using ZDO) network connections<br />
between the APOs;<br />
• Network Layer (NWK) – uses the functions provided by the data link<br />
layer. NWK is used in the processes for the network addresses allocation,<br />
routing, attaching <strong>and</strong> removal of network nodes.<br />
• Security Service Provider (SSP) – provides mechanisms for the cryptographic<br />
protection for APS <strong>and</strong> NWK layer;<br />
In the network, ZigBee addresses are determined hierarchically, from the coordinator.<br />
ZigBee network routes are designated in reactive manner. Source node<br />
sends request about the destination node to the nearest neighboring node. The request<br />
is advertised until it reaches the destination. Routing informations are stored<br />
in intermediate nodes, <strong>and</strong> can be used for future transmissions.<br />
It may be noted that the greatest support for the operation of wireless devices<br />
in a network organized in Ad-hoc mode are WPANs networks. Due to their short<br />
range <strong>and</strong> requirements to reduce the cost of specialized devices, do not use superior<br />
devices specialized in managing the wireless infrastructure.<br />
V. Conclusions<br />
In article are presented the mechanisms <strong>and</strong> communication technologies<br />
of Ad-hoc networks using for net centric operations. The analysis<br />
indicates that the most appropriate is IEEE802.11s technology with MIMO<br />
antennas <strong>and</strong> modern coding techniques. Taking into account the applications<br />
of this technique – NCW, it is necessary to use WPA2-PSK <strong>and</strong><br />
Ad-hoc IP Address Authoconfiguration mechanisms. The next step of our work is to<br />
perform simulations experiments <strong>and</strong> than build a technology demonstrator.
306 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
References<br />
[1] K. Gierłowski, T. Klajbor, J. Woźniak, “Analiza sieci bezprzewodowych serii IEEE<br />
802.15.x – Bluetooth (BT), UWB i ZigBee – z transmisją wieloetapową. Część I”,<br />
Przegląd Telekomunikacyjny. Wiadomości Telekomunikacyjne. 2008, nr 10.<br />
[2] K. Gierłowski, T. Klajbor, J. Woźniak, “Analiza sieci bezprzewodowych serii IEEE<br />
802.15.x – Bluetooth (BT), UWB i ZigBee – z transmisją wieloetapową. Część II”,<br />
Przegląd Telekomunikacyjny. Wiadomości Telekomunikacyjne. 2008, nr 11.<br />
[3] K. Gierłowski, J. Woźniak, “Analiza szerokopasmowych sieci bezprzewodowych<br />
serii IEEE 802.11 i 16 (WiFi i WiMAX) z transmisją wieloetapową”, Przegląd<br />
Telekomunikacyjny. Wiadomości Telekomunikacyjne. 2008, nr 8-9.<br />
[4] BRYON KEITH HARTZOG, “WiMAX potential commercial off – the – shelf solution<br />
for tactical mobile mesh communications”, <strong>Military</strong> <strong>Communications</strong> Conference,<br />
2006. MILCOM 2006.<br />
[5] Evren Eren, Kai-Oliver Detken, “WiMAX-Security – Assessment of the Security<br />
Mechanisms in IEEE 802.16d/e”, WMSCI 2008.<br />
[6] IEEE Std 802.15.3b-2005, “Wireless Medium Access Control (MAC) <strong>and</strong> Physical<br />
Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPANs)”.<br />
[7] Naveen Sastry, David Wagner, “Security Considerations for IEEE 802.15.4<br />
Networks”, University of California.<br />
[8] J. Jeong, J. Park, H. Kim <strong>and</strong> D. Kim, “Ad Hoc IP Address Autoconfiguration”,<br />
I-D draft-jeong-adhoc-ip-addr-autoconf-02.txt, February 2004.<br />
[9] P. Paakkonen, M. Rantonen <strong>and</strong> J. Latvakoski, “IPv6 addressing in a heterogeneous<br />
MANET-network”, I-D draft-paakkonen-addressing-htr-manet-00.txt, December<br />
2003.<br />
[10] C. Jelger, T. Noel, <strong>and</strong> A. Frey, “Gateway <strong>and</strong> address autoconfiguration for IPv6<br />
adhoc networks”, I-D draft-jelger-manet-gateway-autoconf-v6-02.txt, April 2004.<br />
[11] IEEE St<strong>and</strong>ards, “IEEE St<strong>and</strong>ard for <strong>Information</strong> technology – Telecommunications<br />
<strong>and</strong> information exchange between systems – Local <strong>and</strong> metropolitan area networks<br />
– Specific requirements. Part 15.3: Wireless Medium Access Control (MAC) <strong>and</strong><br />
Physical Layer (PHY). Specifications for High Rate Wireless Personal Area Networks<br />
(WPANs).”, IEEE Std 802.15.3-2003, 29 September 2003.
Using Network Coding in 6LoWPAN WSNs<br />
Jarosław Krygier<br />
<strong>Military</strong> University of <strong>Technology</strong>, Faculty of Electronics,<br />
Telecommunications Institute, Warsaw, Pol<strong>and</strong>, jkrygier@wat.edu.pl<br />
Abstract: The low power wireless sensor devices which usually uses the low power wireless private<br />
area network (IEEE 802.15.4) st<strong>and</strong>ard are being widely deployed for various purposes <strong>and</strong> in different<br />
scenarios both in civil <strong>and</strong> military world. IPv6 low power wireless private area network<br />
(6LoWPAN) was adopted as part of the IETF st<strong>and</strong>ard for the wireless sensor devices in order to<br />
decrease the IP overhead <strong>and</strong> to adapt big IPv6 packets to small maximum transmission unit (MTU)<br />
offered by the IEEE 802.15.4 st<strong>and</strong>ard. This paper is focused on the adoption of the network coding<br />
to 6LoWPAN/IEEE 802.15.4 network. The solution based on COPE mechanism is proposed <strong>and</strong><br />
described here. Also the implementation problems are discussed.<br />
Keywords: component; network codding, WSN, 6LoWPAN<br />
I. Introduction<br />
Tactical communication networks are evolving toward complex heterogeneous<br />
ad-hoc networks where mobile nodes can simultaneously embed very different kinds<br />
of communication technologies such as HF or VHF tactical radios (including legacy<br />
systems), UHF (microwave) ad-hoc radios, lightweight satellite ground stations <strong>and</strong><br />
also wireless sensor networks (WSNs) [1]. Considering the mobile <strong>and</strong> temporary<br />
nature of military missions, developing sensor networks that operate in wireless<br />
mode are a necessity. These conditions pose a number of challenges comprising<br />
sensor hardware platforms, communications <strong>and</strong> networks, <strong>and</strong> information management<br />
systems. In order to cope with a wide heterogeneity of hardware devices<br />
as well as to meet the requirements on the end-to-end communication (including<br />
sensor networks), the Internet Protocol (IP) should be applied in the network elements<br />
– also in highly mobile <strong>and</strong> sensor part of the network [9].<br />
WSNs are currently the most common type of so called Low-power Wireless<br />
Personal Area Network LoWPAN (LoWPAN), which are self-configuring ad-hoc<br />
networks composed of wirelessly connected, autonomous devices, usually characterized<br />
by constrained computational <strong>and</strong> memory resources <strong>and</strong> low consumption.<br />
On the other h<strong>and</strong>, the LoWPAN tiny nodes have to be equipped with the IP protocol.<br />
Unfortunately, the IP traffic causes significant overhead, which is especially
308 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
relevant in WSNs <strong>and</strong> military mobile ad-hoc networks (in low data rates modes).<br />
In order to adapt the IP to the LoWPANs some solutions are proposed, from which<br />
the most commonly used are: uIP (micro IP), nano IP <strong>and</strong> IPv6 low power wireless<br />
private area network (6LoWPAN). 6LoWPAN was adopted as the part of the IETF<br />
st<strong>and</strong>ard for the sensor devices [2]. Although the 6LoWPAN is not restricted to<br />
the IEEE 802.15.4-based devices, but it is commonly used with such st<strong>and</strong>ard. It is<br />
also proposed for tactical networks in [3].<br />
The 6LoWPAN significantly reduces the IPv6 overhead in the network using<br />
header compression mechanisms, but additional reduction is required in order<br />
to transfer high amount of data across the sensor network effectively. Meanwhile,<br />
network coding has recently emerged as an effective strategy to provide significant<br />
performance improvements in wireless networks. Many researchers have shown<br />
that by applying network coding in wireless networks we can improve the network<br />
throughput <strong>and</strong> reliability, minimize energy <strong>and</strong> decrease the network congestion<br />
[4] [5] [6]. Most of the network coding solutions have been verified using<br />
mathematical analysis <strong>and</strong> by the simulation experiments, while modest amount<br />
have been implemented <strong>and</strong> tested in limited network environment. Moreover,<br />
the network coding theory can be applied practically in each layer of the communications<br />
protocols stack. Also most of the solutions concern the physical (PHY),<br />
medium access control (MAC) <strong>and</strong> the application (APPL) layers. This paper<br />
is focused on application of the network coding theory in the 6LoWPAN-based<br />
system, taking into account the network (NET), 6LoWPAN adaptation (AL) <strong>and</strong><br />
MAC layers, while the wireless links are built using the IEEE 802.15.4 st<strong>and</strong>ard.<br />
Proposed solution is tailored to the Contiki 6LoWPAN <strong>and</strong> MAC implementation<br />
run on the AVR RAVEN sensor motes [10].<br />
The remainder of the paper is organized as follows. Section II presents the concept<br />
of the network coding mechanism for 6LoWPAN. Section III explains the implementation<br />
details. Description of the tests <strong>and</strong> the results discussion is performed<br />
in section IV. General conclusions <strong>and</strong> future work plans are given in section V.<br />
II. Concept of network coding for 6LoWPAN/IEEE 802.15.4<br />
network<br />
Network coding is known to improve network throughput by mixing information<br />
from different flows <strong>and</strong> conveying more information in each transmission.<br />
Though the idea of network coding is not new, in the past, it has been<br />
applied mainly in the context of multicasting in traditional wired networks. It is<br />
because the data packets are sent using multicast <strong>and</strong> broadcast addresses <strong>and</strong> they<br />
can visit many intermediate nodes in the same time, <strong>and</strong> than some streams often<br />
meet together <strong>and</strong> can be mixed (coded) <strong>and</strong> decoded in other nodes. Wireless<br />
networks are equipped with similar features, where sent frames can be received by<br />
many nodes simultaneously, because of the broadcast nature of the transmission
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
309<br />
medium. In order to shortly explain the idea of the network coding in a wireless<br />
multihop network let us assume simple scenario composed of three wireless<br />
nodes illustrated in Fig. 1 [8]. Nodes 1 <strong>and</strong> 3 have to send their packets (‘a’ <strong>and</strong> ‘b’<br />
respectively). Packet ‘a’ has to be delivered to node 3 <strong>and</strong> packet ‘b’ has to reach<br />
node 1. The left picture shows transfer of the packets without network coding. Each<br />
node performs st<strong>and</strong>ard packet transmission, know as store <strong>and</strong> forward. It means<br />
that to transfer those two packets from the source to the destination, four wireless<br />
transmissions are required. If the network coding is employed (right picture), after<br />
receiving both packets (‘a’ <strong>and</strong> ‘b’) by node 2, it can transmit a single coded packet<br />
(a Å b) in such a manner that both destination nodes can receive it. It is possible<br />
because of the broadcast nature of the wireless network. Two packets are coded<br />
using simple xor function. It means that in order to extract one native (original)<br />
packet from coded packet the receiver needs the second packet. For example,<br />
the node 3 is able to extract packet ‘a’ from packet ‘a Å b’ if it stores the packet ‘b’<br />
(a = aÅbÅb). This exchange reduces the total number of wireless transmission<br />
from 4 to 3. Generally, network coding can be based on linear composition of two<br />
or more native packets [7].<br />
Figure 1. An example of information exchange with network coding<br />
A practical scheme, referred to as COPE (Coding Opportunistically), based<br />
on the network coding for wireless networks is proposed in [6]. The solution tailored<br />
to the 6LoWPAN network presented in this paper is based on COPE. Each<br />
node in the network has to store transmitted <strong>and</strong> received packets during predefined<br />
time as shown at the network in Fig. 2. For example, node 2 should store transmitted<br />
packet P4 <strong>and</strong> received packets P3 <strong>and</strong> P5 (marked in rectangles).<br />
Figure 2. Collecting of sent <strong>and</strong> received packets
310 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
For simplicity, it was also assumed that packets will be coded using simple<br />
xor function <strong>and</strong> they can be extracted just in the next hope nodes. The native<br />
packets hidden in the coded packet can be extracted in each destination<br />
node if the node has stored n-1 packets (where n – number of native packets included<br />
in the coded packet). It means that each node has also to store the table with<br />
information about the packets stored in the neighboring nodes. Fig. 3. shows that<br />
node 1 keeps the neighbor table. The entries in this table are collected based on<br />
the packets identifiers constructed from the native packets source addresses <strong>and</strong><br />
sent in coded packets in additional header. If the data packets are not in the network<br />
during some time, signaling packets should be used to inform neighboring nodes<br />
about stored packets. If the sender sent a coded packet which is a composition of too<br />
many native packets, some receivers could not extract their missing native packet<br />
<strong>and</strong> they should be resent by the sender. Such operation increases the network load<br />
<strong>and</strong> decreases the network coding gain.<br />
Figure 3. Storing of network coding neighbor table in each node<br />
The network coding gain in opportunistic coding scheme is achievable due<br />
to, as it has been already mentioned, the broadcasting nature of the wireless network.<br />
Majority of MAC <strong>and</strong> PHY radio-based protocols make possible to transfer<br />
<strong>and</strong> receive the broadcast frames. The same, considered IEEE 802.15.4 st<strong>and</strong>ard<br />
gives an opportunity to broadcast traffic h<strong>and</strong>ling. Assuming that node 1 from<br />
Fig. 4 wants to transfer the coded packet P1ÅP2ÅP4ÅP5, it ought to broadcast<br />
the packet.<br />
Unfortunately, broadcast transmission is not confirmed by the receivers in MAC<br />
layer, than coded packet transmission is not reliable. Even if some mechanism<br />
was employed in the network layer that can confirm the coded packets, it would<br />
be significant, additional signaling traffic. If the transmission reliability is not rel-
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
311<br />
evant or ensured by the upper layer protocols the coded packets can be sent using<br />
broadcasting technique (as in Fig. 4).<br />
Figure 4. Sending coded packet in broadcasting mode<br />
As an alternative, the coded packet can be sent in unicast transmission to one<br />
of the next hope node which confirms its reception using MAC acknowledgment<br />
(MAC ACK) <strong>and</strong> the other nodes can receive the packet, interpret it but they cannot<br />
acknowledge its correct reception (as in Fig. 5).<br />
Figure 5. Sending coded packet in unicast mode with MAC ACK<br />
The third possibility is to confirm the coded packet on the fly. Fig. 6. shows<br />
that node 2 confirms the coded packet using MAC ACK, but nodes 3 <strong>and</strong> 4 confirm<br />
reception of given coded packet while transferring its native or other coded<br />
packets (NC_ACK).
312 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 6. Sending coded packet in unicast mode with mixed acknowledgment<br />
Tailoring the network coding scheme explained above to the 6LoWPAN/IEEE<br />
802.15.4 network some assumptions are taken. Since the solution is dedicated to<br />
sensor motes, it should not consume too much memory during implementation <strong>and</strong><br />
operation. It also should use both IEEE 802.15.4 MAC <strong>and</strong> network layer features<br />
(6LoWPAN, uIP6 – microIPv6, RPL – Routing for Low Power <strong>and</strong> Lossy Networks,<br />
IPv6 ND – Neighbor Discovery). Fig. 7 presents typical multihop transmission<br />
of 6LoWPAN datagrams (compressed or fragmented packets) between node 1<br />
<strong>and</strong> 3. Depending on the implementation, the 6LoWPAN packets are equipped with<br />
the addresses (‘Src’, ‘Dest’) which comes from the IPv6 layer <strong>and</strong> can be carried inline<br />
or can be extracted from the MAC addresses. Thus, from node 1 the 6LoWPAN<br />
packet is sent to the IP ‘Dest’ address of the node 3, but the IEEE 802.15.4 frames<br />
are equipped with the MAC ‘Src’ <strong>and</strong> ‘Dest’ addresses of node 1 <strong>and</strong> 2 respectively.<br />
Both the data <strong>and</strong> ACK frames are also overheard by the neighboring nodes.<br />
Figure 7. Typical multihop transmission in 6LoWPAN<br />
Also depending on the 6LoWPAN implementation, the packets can be routed<br />
in the IPv6 layer or forwarded in the 6LoWPAN layer. The first case is shown in Fig. 8,
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
313<br />
where three nodes are represented by the layered architecture similar to those used<br />
by the 6LoWPAN implementation in the Contiki operating system [10]. The application<br />
(Appl), routing (RPL) <strong>and</strong> neighbor discovery segments are sent using TCP/<br />
IPv6 protocol (uIP6 implementation) <strong>and</strong> routed in the intermediate node using<br />
tiny IPv6 routing table, collected by the RPL protocol. The 6LoWPAN layer is supported<br />
also by the IPv6 neighbor discovery which delivers the neighboring nodes<br />
MAC addresses <strong>and</strong> IPv6 addresses (string them in the ND cache).<br />
Figure 8. Routing over 6LoWPAN<br />
The 6LoWPAN defines also the mesh routing (Fig. 9.). It means that routing<br />
is performed using the 6LoWPAN mesh header. Moreover, if fragmentation is performed,<br />
each fragment is routed from source to the destination independently, what<br />
is different than during routing over the 6LoWPAN, where all fragments have to<br />
be collected in the intermediate node before subsequent forwarding.<br />
Figure 9. 6LoWPAN mesh routing<br />
The network coding operations in 6LoWPAN depends on the routing scheme.<br />
If the forwarding mechanism is located in the IPv6 layer the coding has to be
314 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
performed after header decompression <strong>and</strong> all fragments collection. This is because<br />
the 6LoWPAN fragments are not equipped with IP destination address (except the first<br />
one, if the address is carried inline). If the mesh forwarding is used, the coding operation<br />
can be located in 6LoWPAN layer before decompression <strong>and</strong> fragments collection.<br />
During network coding operation two or more native packets are mixed using<br />
linear combination. But the native packets can differ in lengths. It is confirmed<br />
in [6], that coding of native packets with significantly different lengths gives small<br />
gain. It means that it is required to collect the native packets with similar lengths.<br />
A format of the coded packet is shown in Fig. 10. Example two 6LoWPAN packets<br />
with header compression (IPHC – IP header compression) <strong>and</strong> IP addresses<br />
carried inline (s – source, d – destination) are xored to receive the coded packet<br />
with additional network coding header (NC Header). The coded packet is sent to<br />
an appropriate MAC address, depending on the transmission rule. The example<br />
in Fig. 10 shows that coded packet is sent to broadcast address. During network<br />
coding operation it is required to ensure an appropriate length of the native packets<br />
in order to do not exceed the MAX IEEE 802.15.4 MAC SDU.<br />
Figure 10. Format of coded packet<br />
Figure 11. Network coding header format (NCi – NC identifier ‘0001’, A – address type,<br />
N – number of MAC addresses, Pad L – Pad length)<br />
The network coding header format is presented in Fig. 11. It is composed<br />
of the Dispatch field <strong>and</strong> destination nodes identifiers (MAC addresses) which in-
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
315<br />
dicate the destination nodes responsible for decoding the native packets. Dispatch<br />
field begins from the NC identifier which is set to binary 000 <strong>and</strong> is allocated by<br />
the 6LoWPAN recommendation [2] to Non-IPv6 packets.<br />
III. Implementation<br />
The network coding proposal presented in section II was implemented in Contiki<br />
operating system (OS) [10]. The Contiki OS is an open source operating system<br />
for networked embedded systems in general, <strong>and</strong> wireless sensor nodes in particular.<br />
It is developed by a team of developers from the industry <strong>and</strong> academia.<br />
The Contiki system incorporates uIPv6 – the IPv6 protocols stack. Both the Contiki<br />
system <strong>and</strong> applications for the system are implemented in the C programming<br />
language. Contiki has been ported to a number of microcontroller architectures,<br />
including the Texas Instruments MSP430 <strong>and</strong> the Atmel AVR [11]. The network<br />
coding implementation was tested on the 8-bit Amtel AVR motes.<br />
Currently, the Contiki OS allows running the 6LoWPAN implementation<br />
working on the IEEE 802.15-based MAC, but with some limitations. The most<br />
important is that the 6LoWPAN implementation is limited to IP routing. It means<br />
that all fragments have to be collected in each node before transferring the packet to<br />
the next node. It is shown in Fig. 12. This limitation is very important from network<br />
coding point of view. Since the sensor motes have memory limitations, they cannot<br />
allocate to big memory for stored packets. It is because the remaining memory must<br />
be used to store the fragments before the node rebuild a full IPv6 packet.<br />
Figure 12. Collecting the fragmented packets in Contiki 6LoWPAN implementation<br />
The network coding functions (net_coding(), net_decoding()) are located<br />
in functions defined in sicslowpan.c file, <strong>and</strong> they allows the network coding before
316 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
the packets reach the uIP6 layer. A location of these functions is shown in Fig. 13<br />
against the other Contiki protocols stack functions.<br />
Figure 13. Location of the net_coding() <strong>and</strong> net_decoding() functions in contiki protocols stack<br />
(routing over 6LoWPAN)<br />
IV. Verification results discussion<br />
Implemented network coding mechanisms were verified in a simple testbed<br />
based on the Atmel evaluation <strong>and</strong> starter kit that includes two AVR Raven boards<br />
with a 2.4 GHz transceiver, on-board picoPower AVR application processors with<br />
LCD display, <strong>and</strong> one USB stick with a 2.4 GHz transceiver to allow USB connections<br />
to a PC. The maximum transmission power of the nodes were decreased<br />
<strong>and</strong> the nodes were deployed in such a way that using the RPL routing protocol<br />
the network were configured to the structure presented in Fig. 7, where node 1<br />
is the USB stick connected to a PC. Such configuration corresponds to the real sensor<br />
networks in which the nodes transmit the sensor data to the gateway (node 1).<br />
Instead of the real sensor data generated by the node 3, the IPv6 Ping streams<br />
(30 packets in each stream) with packet intervals from 0.4 to 0.45 s were transmitted<br />
between nodes 1 <strong>and</strong> 3. The length of the Ping packets were set up to 10 Bytes.<br />
The number of streams were changed from 1 to 7. Also a number of native pack-
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
317<br />
ets that can be buffered in each node were changed during verification experiments<br />
from 0 (without network coding) to 5. Each native packet were buffered<br />
in the node by 0.5 second. Fig. 14 shows the overall traffic captured in the air<br />
depending on the number of streams <strong>and</strong> number of buffered native packets<br />
in the node (0 – means without network coding).<br />
Figure 14. Overall traffic captured in the air<br />
For clarity, detailed values of overall traffic are presented for the network<br />
without network coding procedures <strong>and</strong> while 5 native packets can be buffered<br />
in the node for coding purposes. The results confirm that using network coding<br />
the overall traffic in the air is decreased. Additionally, the level of traffic decreasing<br />
is directly dependent on the traffic generated by the nodes <strong>and</strong> the network coding<br />
buffers capacity. The cost of the network coding in the network was the end-to-end<br />
packet delay increasing. In the case of presented network the end-to-end packet<br />
delay was increased by about 0.5 s (native packet buffering time). By increasing<br />
the number of buffered native packets in the node the we can attain additional<br />
gain but the limitation is a memory of the sensor motes.<br />
V. Conclusions <strong>and</strong> future work<br />
The paper described the possibility of using the network coding mechanisms<br />
in 6LoWPAN wireless sensor networks. The proposal is based on relatively simple<br />
mechanism relying on the linear combination of two or more 6LoWPAN packets<br />
<strong>and</strong> on transmission coded packet to one hop neighbours using broadcasted nature<br />
of WSN. The proposed mechanisms are tailored to the Contiki 6LoWPAN <strong>and</strong><br />
MAC implementation run on the AVR RAVEN sensor motes.<br />
The first verification results confirm that using network coding in presented<br />
network the overall traffic can be decreased. This endeavor would require more
318 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
work in the future, especially in terms of implementation of all described here routing<br />
cases <strong>and</strong> performing detailed tests in the wider network with more realistic<br />
traffic generated by the nodes.<br />
References<br />
[1] EDA IAP4 Raoadmap, “Future IAP4 European Defense stratEgic Research Agenda”,<br />
EDA Final Report, September 2011.<br />
[2] G. Montenegro, N. Kushalnagar, Intel Corp, J. Hui, D. Culler, “Transmission<br />
of IPv6 Packets over IEEE 802.15.4 Networks”, Request for Comments: 4944, September<br />
2007.<br />
[3] H. Song, S.H. Lee, S. Lee, H.S. Lee, “6LoWpan-based tactical wireless sensor network<br />
architecture for remote large-scale r<strong>and</strong>om deployment scenarios”, IEEE <strong>Military</strong><br />
<strong>Communications</strong> Conference, MILCOM, October 2009.<br />
[4] R. Ahlswede, N. Cai, S.-Y.R. Li, <strong>and</strong> R.W. Yeung, “Network information flow,”<br />
IEEE Transactions on <strong>Information</strong> Theory, vol. 46, no. 4, pp. 1204-1216, 2000.<br />
[5] Y. Chen, G. Feng, L. Zhou, “Using network coding to improve robustness <strong>and</strong><br />
persistence for data transmission in sensor networks”, 6th International ICST<br />
Conference on <strong>Communications</strong> <strong>and</strong> Networking in China, CINACOM, August 2011.<br />
[6] S. Katti, H. Rahul, H. Wenjun, D. Katabi, M. Medard, J. Crowcroft, “XORs<br />
in the Air: Practical Wireless Network Coding “, IEEE/ACM Transactions on<br />
Networking, vol. 16, Issue 3, pp. 497-510, June 2008.<br />
[7] S.-Y.R. Li, R.W. Yeung, <strong>and</strong> N. Cai, “Linear network coding”. IEEE Transactions on<br />
<strong>Information</strong> Theory, February, 2003.<br />
[8] B. Ni, N. Santhapuri, Z. Zhong, S. Nelakuditi, “Routing with opportunistically<br />
coded exchanges in wireless mesh networks”, Proceedings of the 2nd IEEE Workshop<br />
on Wireless Mesh Networks (WiMesh 2006) (2006), pp. 157-159.<br />
[9] J. Krygier, M. Bednarczyk, K. Maślanka, Integration of MAC Relaying <strong>and</strong><br />
IP Routing Protocols in Ad-Hoc Networks: Multimetric Approach, <strong>Military</strong> CIS<br />
Conference MCC’2010, Wroclaw, Pol<strong>and</strong>, September 2010.<br />
[10] A. Dunkels, B. Grönvall, T. Voigt, “Contiki – a lightweight <strong>and</strong> flexible operating<br />
system for tiny networked sensors”, Proceedings of the First IEEE Workshop on<br />
Embedded Networked Sensors (Emnets-I), Tampa, Florida, USA, November 2004.<br />
[11] Thang Vu Chien, Hung Nguyen Chan, <strong>and</strong> Thanh Nguyen Huu, “A Comparative<br />
Study on Operating System for Wireless Sensor Networks”, International Conference<br />
on Advance Computer Science <strong>and</strong> <strong>Information</strong> System, ICACSIS 2011, Jakarta 2011.
Testbed Implementation of Energy Aware Wireless<br />
Sensor Network<br />
Ewa Niewiadomska-Szynkiewicz 1, 2 , Michał Marks 1, 2 , Filip Nabrdalik 2<br />
1 Research <strong>and</strong> Academic Computer Network (NASK), Warsaw, Pol<strong>and</strong>,<br />
ewan@nask.pl, Michal.Marks@nask.pl<br />
2 Institute of Control <strong>and</strong> Computation Engineering,<br />
Warsaw University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong>,<br />
ens@ia.pw.edu.pl, mmarks@elka.pw.edu.pl, F.Nabrdalik@stud.elka.pw.edu.pl<br />
Abstract: Wireless sensor networks (WSNs) are autonomous ad hoc networks designed <strong>and</strong> developed<br />
for potential applications in monitoring, surveillance, security, etc. The sensor devices that are<br />
battery powered should have lifetime of months or years. Therefore, energy efficiency is a crucial<br />
design challenge in WSN. In this paper the energy efficient communication techniques, i.e., activity<br />
control <strong>and</strong> power control protocols are presented <strong>and</strong> discussed. We focus on the implementation<br />
of energy aware algorithm for WSN – Geographical Adaptive Fidelity (GAF) – in our testbed network<br />
formed by the Maxfor devices. The results of experiments confirm significant energy savings that<br />
lead to network lifetime increase.<br />
Keywords: wireless sensor networks; WSN; energy aware communication; activity protocols; power<br />
control protocols<br />
I. Introduction to WSN<br />
The last decade has seen tremendous interest in all aspects of wireless sensor<br />
networks (WSNs) – distributed systems composed of numerous smart, embedded <strong>and</strong><br />
inexpensive sensor devices deployed densely in a sensing area [1], [2], [15]. The nodes<br />
of a network equipped with CPU, battery, sensing units <strong>and</strong> radio transceiver, networked<br />
through wireless links can be used in applications, in which traditional networks are<br />
inadequate. The important property of WSN is the ability to operate in harsh <strong>and</strong> hostile<br />
environments, in which human monitoring is risky, <strong>and</strong> often impossible. The lack<br />
of fixed network infrastructure components allows creating unique topologies <strong>and</strong><br />
enables the dynamic adjustment of individual nodes to the current network structure<br />
in order to execute assigned tasks. Wireless sensor networks are deployed in various<br />
environments <strong>and</strong> are used in large number of practical applications concerned<br />
with monitoring, rescue missions <strong>and</strong> military actions. Ad hoc architecture of WSN<br />
has many benefits, however its flexibility come at a price. A number of complexities <strong>and</strong><br />
design constraints are concerned with the characteristics of wireless communication,
320 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
i.e., limited transmission range <strong>and</strong> throughput, limited QoS, limited resources, <strong>and</strong><br />
multihop nature of a network. Moreover, the quality of wireless transmission depends<br />
on numerous external factors, like weather conditions or l<strong>and</strong>form features. Most<br />
of these factors can change in time.<br />
For these reasons, WSNs need some special treatment. The most important<br />
constraint is concerned with limited power source. Nodes forming the network are<br />
often small battery-fed devices. Each device, participating in WSN needs to manage<br />
its power in order to perform duties as long <strong>and</strong> as effective as possible. Moreover,<br />
devices are often deployed in remote locations where replacing batteries is difficult<br />
or even impossible, <strong>and</strong> usually a high disparity between expected <strong>and</strong> real power<br />
drawn can be observed. Thus, power management is very important. A numerous<br />
energy aware communication methods <strong>and</strong> strategies have been developed, <strong>and</strong><br />
are presented in literature [2], [12], [14]. In general, power management is a topic<br />
that has been a subject of intensive research in ad hoc networking in recent years.<br />
In this paper we discuss the approaches to design energy aware WSN topologies.<br />
The main contribution of our work is to show the benefits of application<br />
of the energy aware communication protocol in real network system. We have<br />
implemented <strong>and</strong> verified the modified version of commonly known protocol GAF<br />
in our testbed network formed by the Maxfor devices. The results of tests in our<br />
laboratory were compared with simulation results presented by Xu et al. in [16].<br />
In section II, we describe the energy consumption characteristics in WSN. In section<br />
III, we investigate some energy aware methods <strong>and</strong> algorithms, in section IV,<br />
the GAF protocol is described. The results of the performance evaluation of GAF<br />
through testbed implementation are presented <strong>and</strong> discussed in section V.<br />
II. Energy consumption in WSN<br />
A lifetime of WSN is measured by the time interval before all devices have<br />
been drained out of their battery power or WSN is unserviceable – no longer<br />
provides an acceptable event detection ratio. To maximize the lifetime, all aspects<br />
such as architecture, circuits <strong>and</strong> communication protocols must be made energy<br />
efficient. Let us focus on the energy consumption characteristics of a sensor device<br />
(WSN node). Three main components that consume the energy are: microprocessor,<br />
sensing circuit <strong>and</strong> radio transceiver.<br />
The energy consumed by microprocessor is determined by the sum of dynamic P d<br />
<strong>and</strong> static P s power, i.e., P = P d + P s . Many techniques have been developed to<br />
minimize the energy consumption, such as: dynamic voltage scaling, modulation<br />
scaling, <strong>and</strong> energy aware embedded, event driven operating systems.<br />
The objective of a sensing unit is to translate physical measurements to electrical<br />
signals. Several sources of energy consumption can be listed: signal sampling,<br />
conversion of physical signals to electrical ones, analog to digital conversion, signal<br />
conditioning. The energy usage in this unit is relatively constant. In some applica-
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
321<br />
tions the detectors can work in the event driven mode, <strong>and</strong> can be switched off for<br />
some time to save energy.<br />
The communication system is the major energy consumer during wireless<br />
network operation. The radio transceiver unit can operate in one of four modes,<br />
which differ in the consumption of energy: transmission – signal is transmitted to<br />
other nodes (greatest power consumption), receiving – message from other nodes<br />
is received (medium power consumption), st<strong>and</strong>-by (idle) – inactive transceiver,<br />
turned on <strong>and</strong> ready to change to transmission or receiving mode (low power<br />
consumption) <strong>and</strong> sleep – transceiver is switched off. In order to extend the lifetime<br />
of a network, it is frequent practice that radio transceivers of some nodes are<br />
deactivated. The nodes remain inactive for most time <strong>and</strong> are activated only to<br />
transmit or receive messages from the network.<br />
The energy consumption strongly depends on the transmission range <strong>and</strong><br />
modulation parameters. Generally, short transmissions in a network are desired.<br />
They involve smaller power usage <strong>and</strong> cause less interference in a network, simultaneously<br />
effected transmissions, thus increasing the network throughput.<br />
III. Energy aware communication<br />
A. Methods <strong>and</strong> algorithms<br />
In this paper we focus on energy aware protocols for IEEE 802.15.4 (ZigBee)<br />
based networks. The protocol used by the node of WSN consists of the application,<br />
transport, network, data link <strong>and</strong> physical layers [1]. The energy management<br />
in WSN is emphasized in data link <strong>and</strong> network layers. The MAC protocol guarantees<br />
efficient access to the transmission media while carefully managing the energy<br />
allotted to the nodes. Typically, this objective is achieved by switching the radio to<br />
a low-power mode based on the current transmission schedule.<br />
Energy efficiency is considered mostly by protocols provided by network<br />
layer. Energy aware routing ensures the survivability of low energy networks.<br />
In commonly used wireless senor networks it is assumed that the receiver is not<br />
located within the transmitter’s range. The transmitter must transmit data to the receiver<br />
by means of intermediate nodes. Thus, the natural communication method<br />
in WSNs is a multi-hop routing. This is a certain limitation, but on the other h<strong>and</strong><br />
it enables the construction of network of greater capacity – a multi-hop network<br />
enables simultaneous transmission via many independent routes, <strong>and</strong> managing<br />
available energy. Moreover, each node of a network can attribute the level of power<br />
used to send a message to the other node in order to minimize the amount of energy<br />
received from the battery, while at the same time maintaining the coherence<br />
of the network. Due to a significant node redundancy (nodes are densely deployed),<br />
<strong>and</strong> the assumption that each node of WSN has impact on the power used to transmit<br />
a message numerous low energy consumption communication methods <strong>and</strong>
322 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
energy conservation techniques have been developed, <strong>and</strong> are described in literature.<br />
In general, two main approaches for power saving in WSN can be distinguished:<br />
• power control protocols,<br />
• activity control protocols.<br />
B. Power control protocols<br />
The popular approach to energy efficient communication is controlling a transmit<br />
power of each node in a network. In general, short transmissions involve smaller<br />
power consumption <strong>and</strong> cause less interference <strong>and</strong> latency. Power control protocols<br />
(PCs) are responsible for providing the routing protocols with the list of the nodes’<br />
neighbors, <strong>and</strong> making decisions about the ranges of transmission power utilized<br />
in each transmission. Therefore, the PC protocols are placed partially in the OSI<br />
network layer <strong>and</strong> the OSI data link layer [14]. A numerous PC protocols have<br />
been developed <strong>and</strong> are described in literature. They utilize various information<br />
about a network <strong>and</strong> network nodes, i.e., location of nodes <strong>and</strong> its neighbors or<br />
direction from which the signal was received. Based on these information power<br />
control techniques may be divided into following groups: location-based (nodes<br />
are able to determine their exact positions), direction-based (relay on the ability<br />
of all nodes to estimate relative directions of their neighbors) <strong>and</strong> neighbor-based<br />
(determine all neighbors within the maximal transmission range). The detailed<br />
survey of PC protocols can be found in [14]. The results of performance evaluation<br />
of selected techniques through simulation are presented in [12].<br />
C. Activity control protocols<br />
The other approach to energy efficient communication is controlling a number<br />
of active nodes in a network. Due to a significant node redundancy <strong>and</strong> multiple<br />
paths between nodes we can turn off selected intermediate nodes while still guarantee<br />
full connectivity <strong>and</strong> maximum link utilization constraints. Dynamic power<br />
management is an efficient approach to reduce system power consumption <strong>and</strong><br />
extend the lifetime of individual node without significantly degrading the network<br />
performance. The basic idea is to deactivate the radio transceiver of selected<br />
nodes when not needed <strong>and</strong> wake them up when necessary. Hence, radio devices<br />
remain inactive for most working time <strong>and</strong> are activated only to transmit or receive<br />
messages from other nodes. In general, dynamic power management is a complex<br />
problem. It can involve the limitation of accessible b<strong>and</strong>, <strong>and</strong> can also interrupt<br />
the data transfer in the network. Therefore, implementing the correct policy for<br />
radio switching <strong>and</strong> estimating the optimal value of radio transceiver’s switch-off<br />
time are critical for a network performance.<br />
The activity control protocols (AC) employ dynamic management of radio<br />
devices. The objective is to limit the power consumption while simultaneously
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
323<br />
minimizing the negative impact on the network throughput <strong>and</strong> on the efficiency<br />
of data transmission routing. Different types of AC protocols are presented<br />
in literature, <strong>and</strong> are applied to WSN systems. Similarly to PC protocols, they<br />
utilize various information about a network <strong>and</strong> network nodes, i.e., location<br />
of nodes in a network, nodes density, connectivity, etc. Many of them implement<br />
clustering techniques. It was observed that grouping nodes into clusters<br />
can reduce the overall energy usage in a network. Based on utilized information<br />
activity control techniques may be divided into several groups: locationbased<br />
(GAF [16], GeRaF [6]), connectivity-based (Span [7]), clustering-based<br />
([LEACH [9], HEED [17], PANEL [5], PRWST [3]) <strong>and</strong> hierarchical (EEHC [4],<br />
CGPS [12]).<br />
It should be pointed that activity control protocols should be capable of buffering<br />
traffic destined to the sleeping nodes <strong>and</strong> forwarding data in the partial network<br />
defined by the covering set. The covering set membership needs to be rotated between<br />
all nodes in the network in order to maximize the lifetime of the network.<br />
IV. GAF algorithm<br />
The Geographic Adaptive Fidelity (GAF) algorithm developed by Y. Xu et al.,<br />
<strong>and</strong> described in [16] selects nodes responsible for relaying traffic in the network<br />
based on their geographical position estimated using the GPS system or calculated<br />
using any other location system [2], [11]. GAF assumes covering the network deployment<br />
area with a virtual grid. The location information is employed to form clusters.<br />
The GAF protocol relies on the concept of ‘’node equivalence’’. Two nodes are<br />
equivalent when they are equally useful as relays in communication between other<br />
nodes. Problem of selecting equivalent nodes is nontrivial. It can be easily observed<br />
that network nodes equivalent in communication between a given pair of nodes do<br />
not have to be equivalent in communication between other pairs of nodes.<br />
To select equivalent nodes GAF divides a spatial domain, where nodes are<br />
distributed into cells that form a grid, see Fig. 1. The size d of each cell is calculated<br />
due to transmission ranges of nodes, i.e., d<br />
r/ 5 , where r denotes the maximal<br />
transmission range assigned to network nodes. It is assumed that each node in a cell<br />
is in transmission range of all other nodes within adjacent cell. The construction<br />
of such a grid allows to preserve the network connectivity. All nodes in a network<br />
may switch between one of three states: active, discovery <strong>and</strong> sleep. In the active<br />
state a node is responsible for relaying traffic on behalf of its cell. In the discovery<br />
state nodes exchange discovery messages, trying to detect other nodes with higher<br />
energy in the same cell. However, the overhead due to discovery messages is not<br />
very high. The following load balancing energy usage is proposed. After spending<br />
a fixed amount of time T A in the active state, a node switches to the discovery state,<br />
<strong>and</strong> another node from the same cell switches to the active state. After spending<br />
a fixed amount of time T D in the discovery state, the node backs to the active state.
324 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Whenever a node changes the state, it sends a message containing its identifier (ID)<br />
<strong>and</strong> its ranking value (RV). The ranking value is used to select the relay node to<br />
transmission a message. Several rules are proposed to determine a node’s RV. In general,<br />
a node that is in the active state has a higher rank than a node in the discovery<br />
state, <strong>and</strong> nodes with longer expected lifetimes (calculated with respect to energy<br />
consumption characteristics) have higher rank than the others.<br />
Figure 1. Communication using GAF. The data transmission from the source to the target<br />
is realized using different relay nodes for different time slots<br />
Nodes in the active <strong>and</strong> discovery states may switch to the sleep state whenever<br />
they find a node in the same cell with higher RV. When a node enters the sleep state,<br />
it cancels all pending timers, <strong>and</strong> powers down the radio. After spending the fixed<br />
amount of time T S in the sleep state the node turns on its radio <strong>and</strong> switches to<br />
the discovery state. The sole concept of GAF is to maintain only one node with its<br />
radio transceiver turned on per cell, see Fig. 1. The mentioned parameters, i.e., T A ,<br />
T D , T S , are used to tune the algorithm. In our improved version of GAF (GAF-M)<br />
the value of the interval T D is estimated independently for each cell, <strong>and</strong> depends<br />
on the number of nodes that form a given cell. The bigger the number of nodes<br />
the shorter T D time. Moreover, we prohibit switching between different states<br />
the nodes with very low battery level.<br />
The GAF algorithm was designed for IEEE 802.11 networks. It can run over<br />
any routing protocol for ad hoc networks. Y. Xu et al., discuss the performance<br />
of GAF combined with two reactive routing protocols AODV (Ad-hoc On-Dem<strong>and</strong><br />
Distance Vector) [13] <strong>and</strong> DSR (Dynamic Source Routing) [10]. We adopted GAF<br />
to work in 802.15.4 networks. In our implementation we used DYMO (Dynamic<br />
Manet On-dem<strong>and</strong>) [8] routing protocol that is a successor of AODV. DYMO<br />
shares many benefits of AODV but is slightly easier to implement.<br />
Y. Xu et al. claim that GAF provides longer lifetime of WSN with minimal loss<br />
in data delivery rates compared to pure AODV <strong>and</strong> DSR protocols. The simulation<br />
results presented in [16] confirm the good performance of the algorithm. It is<br />
worth to note that simulation results show that GAF extends the network lifetime<br />
proportionally to the increase of nodes density in the deployment area.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
325<br />
V. GAF performance in testbed network<br />
The main objective of our research was to implement <strong>and</strong> validate the GAF<br />
algorithm using testbed implementation in our laboratory formed by physical<br />
sensor devices.<br />
A. Testbed WSN – hardware <strong>and</strong> software<br />
The experiments in our WSN laboratory were performed using testbed implementation<br />
involving MTM-CM5000 motes (http://www.maxfor.co.kr/eng/<br />
en_sub5_1.html) manufactured by Maxfor (see Fig. 2).<br />
Figure 2. The MTM-CM5000 mote<br />
The MTM-CM5000 mote is IEEE 802.15.4 compliant wireless sensor node<br />
based on the original open-source “TelosB” platform design, developed <strong>and</strong> published<br />
by the University of California, Berkeley. The mote’s architecture is presented<br />
in Fig. 3 <strong>and</strong> the general specification is given in Table I.<br />
Figure 3. Architecture of the MTM-CM5000 mote<br />
The testbed networks were formed by three to eleven MTM-CM5000 motes <strong>and</strong><br />
one base station, all operating under TinyOS system. TinyOS (http://www.tinyos.net/)
326 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
is an open source, highly portable operating system that can be used to on-line<br />
operation of WSN formed of real low-power wireless devices. Our application<br />
was written in nesC (Network Embedded Systems C) language provided by TinyOS<br />
system. TYMO (http://tymo.sourceforge.net/) – the implementation of DYMO protocol<br />
on the TinyOS system was used to work with GAF. The preliminary version<br />
of our implementation was done in TOSSIM simulator, <strong>and</strong> next transformed into<br />
physical network. TOSSIM (http://docs.tinyos.net/tinywiki/ index.php/TOSSIM)<br />
is a discrete-events simulator for TinyOS wireless sensor networks. By exploiting<br />
the sensor network domain <strong>and</strong> TinyOS’s design, TOSSIM can capture network<br />
behavior at a high fidelity while scaling to thous<strong>and</strong>s of nodes. The same code<br />
can be used for simulation <strong>and</strong> real WSN operating in TinyOS.<br />
Table I. Specification of MTM-CM5000 Mote<br />
Processor<br />
RF chip<br />
RF power<br />
Power supply<br />
Antenna<br />
RF current draw<br />
Range<br />
Sensors<br />
TI MSP430F1611<br />
TI CC2420<br />
–25 dBm~0 dBm<br />
2.1 V~3.6 V – (AA or AAA battery)<br />
Dipole antenna / PCB antenna<br />
Receive mode: 18.8 mA<br />
Transmit mode: 17.4 mA<br />
Sleep mode: 1.0 μA<br />
~150 m (outdoor), 20~30 m (indoor)<br />
Light, humidity, temperature<br />
B. Results of experiments<br />
Multiple experiments were performed in our laboratory. The goal of the first<br />
series of experiments was to evaluate the performance of the GAF algorithm<br />
in a physical wireless network. The wireless sensor networks implementing GAF<br />
<strong>and</strong> DYMO protocols were compared with networks with no power capabilities at<br />
all (implementing pure DYMO). The key metric for evaluating examined networks<br />
was the lifetime of the network. To compare the performance of a given network<br />
we used the following characteristic:<br />
LTI = Lifetime GAF+DYMO / Lifetime DYMO (1)<br />
where Lifetime GAF+DYMO denotes the lifetime of a network implementing GAF <strong>and</strong><br />
DYMO protocols, <strong>and</strong> Lifetime DYMO is the lifetime of a network using only DYMO.<br />
The goal of the second series of experiments was to test the influence<br />
of the nodes density into a lifetime of a given network.<br />
In this paper the results of experiments performed for nine network configurations,<br />
i.e., examples E1-E9 describing different model size <strong>and</strong> topology are
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
327<br />
presented <strong>and</strong> discussed. The detailed description of examined networks is given<br />
in Table II. The variable N_cells denotes the number of cells that form a grid covering<br />
a deployment area, <strong>and</strong> S_cell the number of motes in each cell. Figures 4 <strong>and</strong> 5<br />
show the exampled network configurations.<br />
Table II. Specificatiojn of Eight Testbed Networks<br />
Testbed Networks (examples)<br />
E1 E2 E3 E4 E5 E6 E7 E8 E9<br />
N_cells 1 1 1 1 1 2 2 2 3<br />
S_cell 2 3 4 5 6 2 3 4 3<br />
Figure 4. Network E4 formed by 7 motes (source, sink <strong>and</strong> one cell of 5 nodes)<br />
Figure 5. Network E9 formed by 11 motes (source, sink <strong>and</strong> three cells of 3 nodes each)<br />
During the tests, we calculated the lifetime of a network measured by the time<br />
interval before WSN was unserviceable (all motes in one cell were drained out<br />
of their battery power). The performance of examined algorithms GAF+DYMO<br />
<strong>and</strong> pure DYMO for networks E4 <strong>and</strong> E9 are presented in Fig. 6 <strong>and</strong> 7. The summary<br />
of results – extensions of network lifetimes using GAF <strong>and</strong> DYMO over pure<br />
DYMO for eight experiments is presented in Table III.
328 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 6. Extension of WSN lifetime using GAF; network E4<br />
Figure 7. Extension of WSN lifetime using GAF; network E9<br />
Table III. Summary of Results (Values of LTI For All Testbed Networks)<br />
Method<br />
Testbed Networks (examples)<br />
E1 E2 E3 E4 E5 E6 E7 E8 E9<br />
DYMO 1 1 1 1 1 1 1 1 1<br />
GAF+DYMO 1.78 2.18 3.28 5.18 5.90 1.71 2.57 3.40 2.56<br />
The goal of the third series of experiments was to compare the performance<br />
of the original version of GAF with the modified version GAF-M implementing our<br />
scheme for T D time interval calculation. The performance of examined algorithms<br />
GAF-M <strong>and</strong> pure DYMO for network E4 is presented in Fig. 8.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
329<br />
Figure 8. Extension of WSN lifetime using GAF-M; network E4<br />
The summary of results for this case study are presented in Table IV <strong>and</strong> Fig. 9.<br />
The modified GAF-M allows to extend the network lifetime up to 30%.<br />
Table IV. Summary of Results (Values of LTI For 5 Testbed Networks)<br />
Method<br />
Testbed Networks (examples)<br />
E1 E2 E3 E4 E5<br />
DYMO 1 1 1 1 1<br />
GAF+DYMO 1.78 2.18 3.28 5.18 5.90<br />
GAF-M + DYMO 1.93 2.78 4.40 5.48 6.50<br />
Figure 9. Sensitivity to network density
330 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
The results of experiments confirm the strength of the GAF algorithm. GAF<br />
provides longer lifetime compared to pure DYMO routing protocol. The results<br />
of tests performed in our testbed networks formed by the physical devices<br />
were not worse than simulation results described in [16]. We can even say that<br />
the combination of GAF <strong>and</strong> DYMO provides better results than the application<br />
that combines GAF <strong>and</strong> AODV. Similarly to the conclusions presented in [16],<br />
we could observe that GAF extends the network lifetime proportionally to<br />
the increase of nodes density in the deployment area. Tables III <strong>and</strong> IV, <strong>and</strong> Fig. 9<br />
show that time of accurate network operation strongly depends on the number<br />
of nodes that form each cell of a grid covering the deployment region. Moreover,<br />
our modifications of GAF improve the performance of the algorithm that leads<br />
to network lifetime increase.<br />
VI. Summary<br />
Many challenges arise from ad hoc networking <strong>and</strong> development of real life<br />
wireless sensor systems. In this paper we focused on energy aware networks. We<br />
described a functionality of the popular activity control protocol GAF for power<br />
saving in WSNs, <strong>and</strong> our testbed implementation that combines GAF <strong>and</strong> routing<br />
protocol DYMO. We evaluated the performance of our application in the laboratory,<br />
<strong>and</strong> improved the algorithm performance w.r.t. original version. The results<br />
of experiments confirm good performance of GAF in real life networks. In our<br />
future work we plan to make experiments with higher dimension networks <strong>and</strong><br />
compare GAF with other activity control protocols described in literature.<br />
As a final observation we can say that the design of wireless sensor networks<br />
should account for trade-offs between several attributes such energy consumption<br />
(due to mobility, sensing, <strong>and</strong> communication), reliability, fault-tolerance, data<br />
collection latency, <strong>and</strong> quality of information, <strong>and</strong> their impact on mission objectives.<br />
Therefore, strategies <strong>and</strong> techniques for energy efficient, reliable <strong>and</strong> secure<br />
communication in wireless sensor network has become a hot debate nowadays.<br />
Acknowledgment<br />
This work was partially supported by National Science Centre grant<br />
NN514 672940.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
331<br />
References<br />
[1] I.F. Akyildiz, W. Su, Y. Sankasubramaniam, <strong>and</strong> E. Cayirci, “Wireless sensor<br />
networks. A survey”, Computer Networks, vol. 38(4), pp. 393-422, 2002.<br />
[2] I. Akyildiz, <strong>and</strong> M. Vuran, “Wireless sensor networks”, John Wiley & Sons, Ltd,<br />
West, Sussex, UK, 2010.<br />
[3] N. Asiam, W. Philips, W. Robertson, <strong>and</strong> S. Sivakumar, “A multi-criterion<br />
optimization technique for energy efficient cluster formation in wireless sensor<br />
networks”, <strong>Information</strong> Fusion, vol. 12(3), pp. 202-212, 2011.<br />
[4] S. B<strong>and</strong>yopadhyay, <strong>and</strong> E. Coyle, “Minimizing communication costs in hierarchicallyclustered<br />
networks of wireless sensors”, Computer Networks, vol. 44(1), pp. 1-16, 2004.<br />
[5] L. Buttyan, <strong>and</strong> P. Schaer, “Position-based aggregator node election in wireless sensor<br />
networks”, International Journal of Distributed Sensor Networks, pp. 1-15, 2010.<br />
[6] M. Casari, A. Marcucci, M. Nati, C. Petrioli, <strong>and</strong> M. Zorzi, “A detailed simulation<br />
study of geographic r<strong>and</strong>om forwarding”, Proc. of <strong>Military</strong> <strong>Communications</strong> Conference<br />
MILCOM. vol. 1, pp. 59-68, 2005.<br />
[7] B. Chen, K. Jamieson, H. Balakrishnan, <strong>and</strong> R. Morris, “Span: An energy-efficient<br />
coordination algorithm for topology maintenance in ad hoc wireless networks”, ACM<br />
Wireless Networks, vol. 8(5), pp. 481-494, 2002.<br />
[8] I. Chakeres <strong>and</strong> C. Perkins, “Dynamic manet on-dem<strong>and</strong> (dymo) routing”, 2006,<br />
http://www.ietf.org/internet-drafts/draft-ietfmanet-dymo-05.txt.<br />
[9] W. Heinzelman, A. Ch<strong>and</strong>rakasan, <strong>and</strong> H. Balakrishnan, “Energy-efficiet<br />
communication protocol for wireless sensor networks”, Proc. of the 33rd Hawaii<br />
International Conference on System Sciences. pp. 1-10, 2000.<br />
[10] D.B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts”, Proc. of the IEEE<br />
Workshop on Mobile Computing Systems <strong>and</strong> Applications, pp. 158-163, 1994.<br />
[11] E. Niewiadomska-Szynkiewicz, <strong>and</strong> M. Marks, “Optimization schemes for wireless<br />
sensor network localization”, Journal of Applied Mathematics <strong>and</strong> Computer Science,<br />
vol. 19(2), pp. 291-302, 2009.<br />
[12] E. Niewiadomska-Szynkiewicz, P. Kwaśniewski, <strong>and</strong> I. Windyga, “Comparative<br />
study of wireless sensor networks energy-efficient topologies <strong>and</strong> power save protocols”,<br />
Journal of Telecommunications <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>, no. 3/2009. pp. 68-75,<br />
2009.<br />
[13] C.E. Perkins <strong>and</strong> E.M. Royer, “The ad hoc on-dem<strong>and</strong> distance vector protocol”<br />
in C. E. Perkins, editor, Ad hoc Networking, Addison-Wesley, pp. 173-219, 2000.<br />
[14] P. Santi, “Topology control in wireless ad hoc <strong>and</strong> sensor networks”, John Wiley<br />
& Sons, Ltd, West Sussex, UK, 2006.<br />
[15] R. Verdone, D. Dardari, G. Mazzini, <strong>and</strong> A. Conti, “Wireless sensor networks<br />
<strong>and</strong> actuator networks. Technologies, analysis <strong>and</strong> design”, Elsevier, USA, 2008.<br />
[16] Y. Xu, J. Heidemann, <strong>and</strong> D. Estrin, “Geography-informed energy conservation<br />
for ad hoc routing”, Proc. of the 7th Annual International Conference on Mobile<br />
Computing <strong>and</strong> Networking (MobiCom ’01). pp. 70-84, 2001.<br />
[17] O. Younis, <strong>and</strong> S. Fahmy, “Distributed clustering in ad-hoc sensor networks: A hybrid,<br />
energy-efficient approach”, Proc. of the IEEE INFOCOM, vol. 1, pp. 629-640, 2004.
An Energy Aware Self-Configured Wireless<br />
Sensor Network<br />
Marcin Wawryszczuk, Marek Amanowicz<br />
Electronics Faculty, <strong>Military</strong> University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong>,<br />
marcin.wawryszczuk@gmail.com, marek.amanowicz@wat.edu.pl<br />
Abstract: Recent years have shown that wireless communication are becoming more popular<br />
in professional, academic <strong>and</strong> every day applications. A wireless sensor node is usually autonomous,<br />
advanced device with limited power source. This limited power source makes the topology control<br />
a crucial technique, which allow the network to obtain energy efficiency without affecting the network’s<br />
connectivity <strong>and</strong> sensing coverage. The article demonstrates the energy efficient topology<br />
control mechanism, which allow a majority of network nodes stay in sleeping mode <strong>and</strong> do not affect<br />
the connectivity <strong>and</strong> sensing coverage. The result in energy consumption of the nodes <strong>and</strong> network<br />
lifetime are exposed <strong>and</strong> compared to different approaches.<br />
Keywords: wireless sensor network, topology control, energy efficiency<br />
I. Introduction<br />
Wireless sensor networks have become an emerging technology that represents<br />
the next evolutionary step in environment monitoring, traffic control, objects detection<br />
<strong>and</strong> tracking, etc. Typically, a network consists of a large number of nodes,<br />
distributed over some specific area <strong>and</strong> organized into multi hop system. A node<br />
of wireless sensor network is a simple device equipped with control, communication,<br />
sensing units as well as a power supply. The power supply is usually a small,<br />
low capacity battery which is very hard to replace. It makes the energy factor<br />
of the sensor node a critical one. As a result, topology control mechanisms of sensor<br />
network have to be equipped with efficient power management procedures.<br />
The network designer is responsible for these power management procedures to<br />
protect the energy resources what imply that the network lifetime is elongated. On<br />
the other h<strong>and</strong>, the network has to realize the primary objectives what is often out<br />
of whack with the energy conservation. The suitable compromise between both<br />
is called “topology control” (TC). It adjusts desired network’s parameters (like connectivity,<br />
coverage, etc.) while reducing energy consumption.<br />
There are two approaches to the topology control in wireless sensor networks.<br />
One of them is the nodes activity control, where only the small subgroup of nodes
334 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
is operative (active) <strong>and</strong> the rest of them run in sleep mode. The other method<br />
is called sleep/wake-up algorithms. The nodes with implemented sleep/wake-up<br />
algorithm stay active for a small period of time <strong>and</strong> then turn into sleep mode,<br />
where the communication, sensing <strong>and</strong> control units are deactivated. The active<br />
<strong>and</strong> inactive cycles are repeated during the whole node lifecycle. This approach<br />
minimize the energy consumption of every single node, but it does not guarantee<br />
the connectivity <strong>and</strong>/or coverage at any time of the network life. Obviously, these<br />
methods reduce the global energy consumption, as a result of all nodes energy conservation.<br />
Both methods are capable of elongating the network lifetime significantly.<br />
II. Related work<br />
Much of the related research are addressed to WSN that are dense, battery<br />
powered <strong>and</strong> self configured. Because of these requirements, most of the authors<br />
are concentrated on finding solution at various levels of the communication protocol,<br />
including extremely energy efficient aspects [1]. Some of the most popular<br />
solutions in energy efficient topology control are stated below.<br />
• GAF [2] (Geographical Adaptive Fidelity) is the nodes activity control<br />
method. This approach groups nodes in virtual grids. Each grid is defined<br />
such that, for any two adjacent grids A <strong>and</strong> B, all nodes in grid A are capable<br />
of communicating with any node in grid B, <strong>and</strong> vice-versa. The nodes<br />
in the same grid are equivalent in terms of routing, consequently just<br />
one node at a time needs to be active. The rest of the nodes can switch to<br />
the sleep mode <strong>and</strong> save the energy in this way.<br />
• GeRaF [3] (Geographic R<strong>and</strong>om Forwarding) is the nodes activity control<br />
method. In this method, each node posses the information about the neighborhood.<br />
Each node follows to the sleep/active pattern, starting from<br />
channel listening. The data transmission starts when the source node w s<br />
has any packet to send. The source node broadcasts the data with the location<br />
of itself <strong>and</strong> the location of the destination node w d . The node, which<br />
is inside the communication range of w s <strong>and</strong> is closest to the destination<br />
node w d simultaneously, continues the process of the data forwarding.<br />
The process is accomplished when the end point w d is reached. GeRaF<br />
protocol can cause a lot of collisions in a network [3][4].<br />
• SPAN [5] is the nodes activity control method. In the method, only a small<br />
group of coordinators stay active, while the rest of nodes switch into sleep<br />
mode <strong>and</strong> only periodically check if they are requested to wake up <strong>and</strong> become<br />
the coordinators. The coordinators are responsible for passing the data<br />
from a source node to a sink node. To guarantee a sufficient number of coordinators,<br />
SPAN uses so called coordinator eligibility rule: if two neighbors<br />
of a non-coordinator node cannot communicate with each other directly<br />
or via coordinators, it means that the node should become a coordinator.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
335<br />
However, it may happen that several nodes discover the lack of a coordinator<br />
at the same time <strong>and</strong>, thus, they all decide to become a coordinators.<br />
• ASCENT [6] (Adaptive Self Configuring Sensor Network Protocol)<br />
is the node activity control method. In ASCENT a node decides when to<br />
join the network or stay dormant. The decision is taken based on the connectivity<br />
<strong>and</strong> packet loss ratio measured locally.<br />
• STEM [7] (Sparse Topology <strong>and</strong> Energy Measurement) is the sleep/wakeup<br />
method. This approach exploits two different communication units: one for<br />
wakeup signaling <strong>and</strong> other for data transmission. The wakeup radio is not<br />
a low power consumption unit. Both radios work with the same communication<br />
range. Periodically each node turns its wakeup radio on for T active<br />
time, every T duration. When a source node wants to communicate with<br />
a neighboring node, it sends a stream of signals via the wakeup channel.<br />
As soon as the destination node receives the signal message, it acknowledges<br />
that fact <strong>and</strong> turns the data transmission unit on.<br />
• FSP [8] (Fully Synchronized Pattern) is the sleep/wakeup method. In this<br />
approach, all nodes in network wake up at the same time, following<br />
the pattern. It means that each node goes periodically into active mode<br />
for T active time, every T wakeup . After that, nodes switch to the sleep mode<br />
until the next T wakeup .<br />
• SWP [9] (Staggered Wakeup Pattern) is the sleep/wakeup method. In this<br />
approach nodes create the specific data acquisition tree structure. The nodes<br />
located at different levels of data gathering tree, wake up in a different time.<br />
Obviously, the active time T active of the adjacent tree levels must partially<br />
overlap to guarantee that children <strong>and</strong> parent nodes in the mentioned tree<br />
structure are able to communicate.<br />
Figure 1 shows the mechanism of SWP, where T active is the time the node stays<br />
active, T sleep is the time the node stays dormant, T is the sum of T active <strong>and</strong> T sleep .<br />
Figure 1. Staggered sleep/wakeup pattern<br />
• 802.11 PSM [10] is the sleep/wakeup method. In the approach, when two<br />
nodes want to communicate, their activity times T active , have to overlap.<br />
The method uses backoff mechanism for signaling <strong>and</strong> sampling the channel.<br />
When a node has a packet to send, it waits r<strong>and</strong>om period of time,<br />
assigned by backoff mechanism, before the action is performed.
336 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Comparing the methods described above, GAF <strong>and</strong> SPAN can reduce the energy<br />
consumption 3 times [11], GeRaF 2-3 times [4], ASCENT even more than 5 times [11].<br />
In group of sleep/wakeup methods, the energy conservation depends on<br />
the T active to T ratio. Therefore, it is difficult to estimate the exact energy conservation.<br />
Definitely STEM method is worse than the rest of the methods, because<br />
the method requires two communication units. For small T active /T ratio, the energy<br />
consumption is decreased to 1-2% of the regular energy consumption (without any<br />
method implemented).<br />
III. Assumptions<br />
In our work, we assume that the sensor network is dense <strong>and</strong> composed with<br />
MicaZ nodes, equipped with one communication module Chipcon CC2420. Nodes<br />
positions are known <strong>and</strong> every node is aware of its neighborhood in 2-hops distance.<br />
These information can be acquired through procedures introduced in [12].<br />
Communication <strong>and</strong> sensing ranges are modeled as a uniform disks. The radiuses<br />
of the disks are labeled as r c <strong>and</strong> r s respectively. The communication radius is not<br />
greater than the sensing radius. The nodes are placed on a flat area, so the network<br />
is considered in two dimensional perspective.<br />
IV. Problem statement<br />
We would like to consider the network purposed to detect ground moving<br />
objects <strong>and</strong> track them afterwards. In this case, it is necessary to monitor only<br />
the border layer of the network. Accordingly, the devices placed on the network<br />
edge have to maintain their sensing units active, while the rest of the devices<br />
can turn them off. They adhere to the set S E (external layer). The nodes localized<br />
on the network edge, can drowse communication units temporally to<br />
conserve the energy. The nodes placed inside the network are mainly inactive<br />
(all modules are switched off) <strong>and</strong> their control <strong>and</strong> communication units are<br />
active only for a short period of time. These nodes belong to the set S I (internal<br />
layer). The time when some node units are switched off is called T S . The time<br />
when the units are active <strong>and</strong> the device is capable of communicating with<br />
others is called T A . The sum of T A <strong>and</strong> T S is called cycle duration T. The T A to<br />
T ratio is called duty cycling:<br />
T<br />
DC = A<br />
100%<br />
(1)<br />
T<br />
It is obvious that the lower value of DC implies the lower energy consumption<br />
in particular node [12].
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
337<br />
The set of all nodes participating in the network structures S is defined as:<br />
S S S<br />
(2)<br />
E<br />
Obviously the nodes shaping the internal layer consume significantly less<br />
energy in comparison with the external layer nodes. What is more, it can exist k max<br />
disjoint sub-layers of environment at the same time. Each external layer node w E<br />
belongs to only one sub-layer:<br />
w S S : w S , i 1,..., k<br />
(3)<br />
E E Ei E Ei<br />
where: i is the sub-layer number, i=1,…,k max . Each layer has to follow the consistency<br />
rule:<br />
w S d( w , w ) r d( w , w ) r<br />
(4)<br />
z<br />
I<br />
max<br />
z Ei z j c z l c<br />
where: w z is a node, which belongs to the external layer, w j , w l are the closest<br />
nodes to the node w z , S Ei is the i-th sub-layer, i is the number of the sub-layer,<br />
i=1,…,k max . The consistency rule guarantees that the distance between any two<br />
nodes in a sub-layer is lower that the communication range (<strong>and</strong> the sensing<br />
range as well).<br />
The external sub-layers are active interchangeably. This approach allows<br />
the network to work longer in initial size of deployment.<br />
In the following chapters we answer the question how to assign the nodes to<br />
the proper layer <strong>and</strong> how to assure the consistency in external sub-layers during<br />
the whole network lifecycle in fully distributed manner.<br />
Figure 2. One of the sub-layers of external layers
338 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
V. Energy consumption<br />
The overall energy consumption is defined as temporal energy consumption<br />
of control unit E MC , communication unit E R <strong>and</strong> sensing unit E S in specified period<br />
of time Δt:<br />
te te te<br />
(5)<br />
E E dt <br />
E dt E dt<br />
t MC R S<br />
ts ts ts<br />
where: E Δt is the energy consumption in the analyzed period of time Δt,<br />
E MC is energy consumption of the control unit, E R is energy consumption of the communication<br />
unit, E S is the energy consumption of the sensing unit, t s is the start<br />
time, t k is the end time, Δt = t k -t s .<br />
The energy consumption of the control unit is defined as:<br />
EMC TMC IMC<br />
V<br />
(6)<br />
where: T MC is the time of measurement, I MC is a current supply, V is a voltage.<br />
Obviously, E MC consists of:<br />
E E E<br />
(7)<br />
A S<br />
MC MC MC<br />
where: E A MC is energy consumption in active mode <strong>and</strong> E S MC is energy consumption<br />
in sleep mode.<br />
The energy consumption of communication unit is defined as:<br />
ERTRIR V<br />
(8)<br />
where: T R is time of measurement, I R is current supply, V is voltage. On the other<br />
h<strong>and</strong>, E R consists of energy consumption in four different states of communication<br />
module: sleep E S R , listening EL R , transmission ETX R <strong>and</strong> reception ERX R :<br />
E E E E E<br />
(9)<br />
S L TX RX<br />
R R R R R<br />
The energy consumption of the sensing unit is defined as:<br />
EDTDID V<br />
(10)<br />
where: T D is the time, when the communication unit stays active, I D is a current<br />
supply, V is a voltage.<br />
VI. Procedures description<br />
To configure the network structures, self-configured algorithms were developed<br />
to classify the nodes to the internal layer or one of the external layers.<br />
Each node w in a startup phase of the network lifetime, checks if the conditions<br />
described by the equation (11) are met to determine whether the node belongs<br />
initially to the external layer:
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
<br />
<br />
<br />
<br />
w S : x x y y<br />
k s k k<br />
w S : x x y y<br />
k s k k<br />
w S : x x y y<br />
k s k k<br />
w S : x x y y<br />
k s k k<br />
<br />
<br />
<br />
<br />
339<br />
(11)<br />
where: S S is a set of neighborhood nodes in 2-hops distance, w k is a node in S S ,<br />
x is x coordinate of the node w, y is y coordinate of the node w, x k is x coordinate<br />
of the node w k , y k is y coordinate of the node w k . The procedure below demonstrates<br />
how the sub-layer number one is shaped. The procedure is performed by each node<br />
in the network.<br />
Shaping of sub-layer one of external layer<br />
1: If condition (11) is fulfilled then<br />
2: label as a sub-layer one node<br />
3: broadcast the information about sub-layer affiliation<br />
4: wait Δt wi<br />
5: If k max > 1 then<br />
6: broadcast the request for formation the next sub-layer<br />
7: End-if<br />
8: Else<br />
9: label as the internal layer node<br />
10:End-if<br />
In this way the first sub-layer of external layer is developed. It was mentioned<br />
that it can exist k max sub-layers because of the density of the network. The process<br />
of shaping the next sub-layer is always initiated by the previous sub-layer. The procedure<br />
of forming next sub-layers is described by the procedure below.<br />
Shaping of next sub-layer of the external layer<br />
1: If request for formation the sub-layer i received then<br />
2: wait Δt wi<br />
3: If the equation (11) is fulfilled then<br />
4: label as a sub-layer i node<br />
5: broadcast the information about sub-layer i affiliation<br />
6: wait Δt wj<br />
7: If i+1
340 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
In the procedures two timeouts: Δt wi <strong>and</strong> Δt wj Are used. The first one guarantees<br />
that the node is waiting long enough to receive the information from all nodes shaping<br />
previous sub-layer. The second timeout guarantees that the node will wait long<br />
enough to collect the information about the nodes at the same sub-layer.<br />
After the sub-layer is established, the correction procedure is performed. The correction<br />
procedure is responsible for securing the consistency in a sub-layer <strong>and</strong> switching<br />
redundant nodes off. The sub-layer consistency is assured by the consistency rule<br />
(eq. 4). Therefore, the local consistency of the sub-layer between any two nodes w j<br />
<strong>and</strong> w l is guaranteed. It means that the node evaluates the consistency rule <strong>and</strong> selects<br />
the set S d i of nodes among all neighboring nodes. It can exist several sets Sd i , satisfying<br />
the consistency rule requirement, but the desired one is with the lowest cardinality.<br />
To switch the redundant nodes off, the procedure exploits the redundancy rule:<br />
d( w , w ) r d( w , w ) r d( w , w ) r<br />
(12)<br />
z j c z l c j l c<br />
where: w z is the node checking whether it is redundant, w j <strong>and</strong> w l are the closest<br />
nodes to the node w z . The procedure is presented below.<br />
Sub-layer correction<br />
1: If the information about creation the sub-layer sent then<br />
2: wait Δt wj<br />
3: If the consistency rule is unfulfilled (eq. 4) then<br />
4: engage additional nodes<br />
5: End-if<br />
6: If the redundancy rule fulfilled (eq. 12) then<br />
7: label as the internal layer node<br />
8: broadcast the information about the internal layer affiliation<br />
9: End-if<br />
10: End-if<br />
The external layer is composed of one or several sub-layers. Among the sublayers,<br />
only the one is active (in case of sensing the environment). After certain time,<br />
the active sub-layer i activates the sub-layer i+1 (or sub-layer 1) <strong>and</strong> swaps to inactive<br />
state. After that, only the one sub-layer (number i+1) is still active.<br />
When the network structures are established, the sub-layer consistency procedures<br />
run. The procedures are responsible for sub-layers reconfiguration in case<br />
of the sub-layer inconsistency detection <strong>and</strong> when the inconsistency is at risk.<br />
In the first case each node exchange their neighborhood table S ng with the neighbors<br />
within the communication range r c . This neighborhood tables synchronization take<br />
place every Δt a . In case one of the closest nodes do not answer in synchronization<br />
process, <strong>and</strong> both of them belong to the same sub-layer, the node which has not<br />
received the information starts the sub-layer reconfiguration. The algorithm below<br />
describes this situation (from external sub-layer node perspective).
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
341<br />
Sub-layer reconfiguration in case of inconsistency detection<br />
1: If the consistency rule is not fulfilled (eq. 4) then<br />
2: engage the additional neighbor nodes to assure the consistency of the sub-layer<br />
3: End-if<br />
The second group of the reconfiguration procedures run when the inconsistency<br />
can appear. It can happen when the power source capacity of the sub-layer<br />
node is at risk. When the node discovers that:<br />
C t C<br />
(13)<br />
Z<br />
where: C Z (t) is the power source capacity, C G is the border power source capacity,<br />
it starts reconfiguration process. The algorithm above describes this situation.<br />
Sub-layer reconfiguration in case of inconsistency detection<br />
1: If the power source capacity is lower than the border power source<br />
capacity (eq. 13) then<br />
2: engage the additional neighbor nodes capable to replaceitself<br />
3: End-if<br />
VII. Simulation results<br />
We evaluated the performance of proposed solution. The model of node used<br />
in the simulation is previously mentioned MicaZ node, equipped with ZigBee<br />
protocols stack. The energy consumption parameters of micaZ node are shown<br />
in table 1<strong>and</strong> described in more details in [13] <strong>and</strong> [14].<br />
Table 1. The energy consumption of MicaZ node<br />
G<br />
Control unit<br />
Communication unit<br />
Sensing unit<br />
Active<br />
8 mA<br />
Sleep<br />
15 μA<br />
Memory write<br />
15 mA<br />
Memory read<br />
4 mA<br />
Receive (RX)<br />
19.7 mA<br />
Send (TX) (at 0 dBm) 17.4<br />
Sleep<br />
1 μA<br />
Active<br />
5,5 mA<br />
Sleep<br />
0 mA
342 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
The simulation was run for three types of nodes deployment:<br />
A) Nodes with antennas put 7 cm above the ground covered by grass vegetation,<br />
r c = 10.5 m, the network size is equal 190 m × 190 m,<br />
B) Nodes with antennas put 30 cm above the ground covered by grass vegetation<br />
l, r c = 50 m, the network size is equal 730 m × 730 m,<br />
C) Nodes with antennas put 30 cm above the ground covered by forest vegetation<br />
l, r c = 30 m, the network size is equal 300 m × 300 m.<br />
The duty cycling (DC) is set differently for the external <strong>and</strong> internal layers<br />
nodes. External layer nodes work with DC = 25% <strong>and</strong> internal layer nodes work<br />
with DC = 10%. What is more, during the activity time T A , the external layer nodes,<br />
actively sensing the environment have control, communication <strong>and</strong> sensing units<br />
switched on. During the sleep time T U , the communication module of these nodes<br />
is switched off, but the sensing function is maintained. The external layer nodes,<br />
which are not responsible for sensing <strong>and</strong> the internal layer nodes, retain the control<br />
<strong>and</strong> communication units active at time T A . At the sleep time T S , both groups<br />
of nodes have all units switched off.<br />
Table 2 shows the number of nodes in the network with external layer consisting<br />
of three sub-layers in comparison with the number of all nodes in the network.<br />
The result is split by deployment type <strong>and</strong> the sub-layer number.<br />
Table 2. The reduction of active nodes<br />
Deployment type Sub-layer number # of sub-layer nodes # of all nodes<br />
A) 1 80<br />
B) 2 83<br />
1474<br />
C) 3 82<br />
A) 1 62<br />
B) 2 60<br />
920<br />
C) 3 63<br />
A) 1 41<br />
B) 2 43<br />
412<br />
C) 3 42<br />
The average energy consumption of the nodes is shown in table 3.<br />
As a result, the average lifetime of the external layer nodes is about 21 days<br />
(having three sub-layers switching every one hour) <strong>and</strong> internal layer nodes lifetime<br />
is about 100 days.<br />
Figure 3 depicts the lifetime of the networks: without any topology control<br />
mechanism implemented, one of the node activity control mechanism presented<br />
in section II <strong>and</strong> the topology control procedure introduced in the article. The approaches<br />
are evaluated according to two criterions: global lifetime <strong>and</strong> the time<br />
while the network consistency is guaranteed. In our approach the internal layer
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
343<br />
nodes consume significantly less energy in comparison with the external layer<br />
nodes. When the external layer nodes run out of the energy, they are replaced by<br />
the internal layer nodes. In the earlier mentioned methods, the active nodes cover<br />
the whole network. Therefore, after certain period of time some active nodes run<br />
out of energy. It means, it is possible that some uncovered areas inside the network<br />
will appear.<br />
Table 3. Average energy consumption in mWh<br />
Active sub-layer node Inactive sub-layer node Internal layer node<br />
25.2 5.1 2.15<br />
Figure 3. The comparison of networks lifetimes<br />
We also checked the reconfiguration procedures in the simulations (if do<br />
they work <strong>and</strong> how effective, from the reconfiguration time perspective, they are).<br />
The average times needed to reinstate the sub-layers t rec are evaluated for either:<br />
reconfiguration in case of inconsistency detection <strong>and</strong> when the inconsistency<br />
is jeopardized. The result is shown on picture 4.<br />
Figure 4. The time of a sublayer reconfiguration
344 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Maximal time the sub-layer can be inconsistent is equal to:<br />
t<br />
t sec<br />
(14)<br />
a<br />
rek<br />
where: Δt a is the time when the nodes exchange the information about their<br />
neighborhood (mentioned above), t rek is the time necessary to accomplish the reconfiguration.<br />
Assuming the Δt a time equal to 180 sec, the time of the sub-layer<br />
inconsistency is round 181.5 sec.<br />
Demonstrated layer configuration elongate the network lifetime in the initial<br />
size of deployment. The simulation experiment showed that the network shrinks<br />
to inside at the borders (due to higher energy consumption of the external layer<br />
nodes). As a result, after 100 days of work, the network size is reduced by r c meters<br />
at each border.<br />
VIII. Conclusion <strong>and</strong> future work<br />
The article demonstrates the self-configured, energy aware method of topology<br />
control. The procedures of network structures establishment <strong>and</strong> maintenance<br />
are provided <strong>and</strong> explained. The methods are evaluated in terms of energy consumption,<br />
the network lifetime <strong>and</strong> ability to guarantee the sub-layers consistency<br />
<strong>and</strong> repair. The network shaped in this way is capable of detecting object<br />
moving on the ground. It gives excellent basis for the creation of such a system,<br />
because the coverage consistency <strong>and</strong> maintenance are assured. What is more,<br />
the network lifetime is significantly improved, even 10 times, in comparison with<br />
a network without any topology control mechanism. The value of DC parameter<br />
is adjusted to the network purposes. The greater values of DC parameter used<br />
in the simulation has no serious impact on the communication effectiveness.<br />
Evidently, there is a possibility to use lower values for DC parameter, but it would<br />
degrade the communication performance <strong>and</strong> could have an impact on the detection<br />
operation.<br />
There exist still many areas to explore within this research engagement.<br />
It would be worth to check the network performance in different types of the nodes<br />
deployment <strong>and</strong> environments of deployment. Verification the ability of the network<br />
to objects tracking is another very desired research which we plan to practice<br />
in near future.
Chapter 7: Mobile Ad-hoc <strong>and</strong> Wireless Sensor Networks<br />
345<br />
References<br />
[1] C. Patel, S.M. Chai, S. Yalamanchili, <strong>and</strong> D.E. Schimmel, Power/Performance Tradeoffs<br />
for Direct Networks. In Parallel Computer Routing & CommunicationWorkshop,<br />
pages 193-206, July 1997.<br />
[2] Y. Xu, J. Heidemann, D. Estrin, Geography informed Energy Conservation for Ad Hoc.<br />
Proc. ACM MobiCom 2001, pp. 70-84. Rome, 2001.<br />
[3] P. Vasari, A. Marcucci, M. Nati, C. Petrioli, M. Zorzi, A Detailed Simulation<br />
Study of Geographic R<strong>and</strong>om Forwarding (GeRaF) in Wireless Sensor Networks. Proc.<br />
of <strong>Military</strong> <strong>Communications</strong> Conference 2005 (MILCOM 2005), vol. 1, pp. 59-68,<br />
17-20 Oct. 2005.<br />
[4] M. Zorzi, R.R. Rao, Geographic R<strong>and</strong>om Forwarding (GeRaF) for Ad Hoc <strong>and</strong> Sensor<br />
Networks: Multihop Performance. IEEE Transactions Mobile Computing, vol. 2, no. 4,<br />
pp. 337-348, 2003.<br />
[5] B. Chen, K. Jamieson, H. Balakrishnan, R. Morris, Span: An Energy-Efficient<br />
Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks. ACM<br />
Wireless Networks, vol. 8, no. 5, September 2002.<br />
[6] A. Cerpa, D. Estrin, Ascent: Adaptive Self-Configuring Sensor Network Topologies.<br />
Proc. IEEE INFOCOM 2002.<br />
[7] C. Schurgers, V. Tsiatsis, M.B. Srivastava, STEM: Topology Management for<br />
Energy Efficient Sensor Networks. IEEE Aerospace Conference ’02, Big Sky, MT,<br />
March 10-15, 2002.<br />
[8] J. Ansari, D. Pankin, P. Mähönen, Radio-Triggered Wake-ups with Addressing<br />
Capabilities for Extremely Low Power Sensor Network Applications. Proc. of the 5th<br />
European conference on Wireless Sensor Networks (EWSN 2008), Bologna (Italy),<br />
Jan. 30 – Feb. 1, 2008.<br />
[9] A. Keshavarzian, H. Lee, L. Venkatraman, Wakeup Scheduling in Wireless Sensor<br />
Networks. Proc. ACM MobiHoc 2006, pp. 322-333, Florence (Italy), May 2006.<br />
[10] IEEE 802.11, Part 11: Wireless LAN Medium Access Control (MAC) <strong>and</strong> Physical Layer<br />
(PHY) Specifications. [online], document dostępny na: http://st<strong>and</strong>ards.ieee.org/about/<br />
get/802/802.11.html<br />
[11] A. Arora, Topology Control. [online], dokument dostępny na: www.cse.ohio-state.<br />
edu/~anish/.../Lecture5.ppt<br />
[12] M. Wawryszczuk, The Method of Self-organizing Wireless Sensor Network<br />
Implementation with Extended Durability (in Polish). PhD thesis, <strong>Military</strong> University<br />
of <strong>Technology</strong>, September 2011.<br />
[13] MicaZ Datasheet, [online]. The article accessible on: https://www.eol.ucar.edu/rtf/<br />
facilities/isa/internal/CrossBow/Doc/MPR-MIB_Series_User_Manual_7430-0021-<br />
05_A.pdf<br />
[14] Xmesh User’s Manual, [online]. The article accessible on: http://www.memsic.<br />
com/support/documentation/wireless-sensor-networks/category/6-user-manuals.<br />
htmldownload=95%3Axmesh-user-s-manual
Chapter 8<br />
Localization Techniques
Enhanced Location Tracking<br />
for Tactical MANETs Based on Particle Filters<br />
<strong>and</strong> Additional <strong>Information</strong> Sources<br />
Peter Ebinger *1 , Arjan Kuijper 2 , Stephen D. Wolthusen 3<br />
1 AGT Group (R&D) GmbH, Darmstadt, Germany, pebinger@agtinternational.com<br />
2 Fraunhofer IGD, Darmstadt, Germany, arjan.kuijper@igd.fhg.de<br />
3 <strong>Information</strong> Security Group, Department of Mathematics, Royal Holloway, U. of London,<br />
Norwegian <strong>Information</strong> Security Lab., Gjøvik University College, Norway,<br />
stephen.wolthusen@rhul.ac.uk<br />
Abstract: The networking capabilities of tactical mobile ad-hoc networks (MANETs) provide the basis<br />
to enhance robustness <strong>and</strong> accuracy of Blue Force Tracking (BFT) where existing BFT mechanisms are<br />
unavailable, unreliable, or simply not sufficiently accurate (owing to factors such as update frequencies<br />
<strong>and</strong> the need for back-link availability). BFT is an essential element to any tactical environment given<br />
its ability to contribute to situational awareness at all levels.<br />
Tactical environments are characterized by spectrum contention, jamming <strong>and</strong> other factors limiting<br />
the ability of naïve approaches, e.g. in urban environments <strong>and</strong> broken terrain. Unlike previous work<br />
this paper aims to provide MANET-based BFT without the requirement of line-of-sight (LOS) links<br />
or back-end infrastructure which is robust against temporal disruption of network connectivity. These<br />
results are achieved by distributedly fusing sensor data <strong>and</strong> additional information sources across<br />
the tactical MANET using techniques also employed in robotics <strong>and</strong> object tracking.<br />
Our contribution is the provision of enhanced BFT mechanisms exploiting networking capabilities<br />
of tactical MANETs <strong>and</strong> data fusion mechanisms based on Sequential Monte Carlo methods, specifically<br />
particle filters, incorporating additional information such as mission information (e.g. mobility<br />
models) <strong>and</strong> topographic data. We demonstrate that the use of these techniques enhances both accuracy<br />
<strong>and</strong> robustness as compared to st<strong>and</strong>ard BFT by using a simulation environment with various<br />
mobility <strong>and</strong> radio propagation characteristics.<br />
Keywords: Mobile Ad hoc Networks, Location Tracking, Blue Force Tracking<br />
I. Introduction<br />
Blue Force Tracking (BFT) is a tactical term for a localization system based<br />
on Global Positioning System (GPS) sensors with the objective to provide location<br />
estimates of friendly military forces (blue forces). BFT is an essential element to<br />
*Work performed while working at Competence Center for Identification <strong>and</strong> Biometrics, Fraunhofer IGD,<br />
Darmstadt, Germany.
350 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
any tactical environment given its ability to contribute to situational awareness at<br />
all levels [1]. Decreasing the friction in complex geopolitical contexts, particularly<br />
in urban environments, may help to support decision-makers <strong>and</strong> lower the risk<br />
of errors [2]. This has not only been incorporated into the doctrine of modern<br />
forces’ in support of Comm<strong>and</strong> <strong>and</strong> Control (C2), but has also resulted in an overall<br />
reduction of causalities [3], [1].<br />
There are several challenges to BFT that render it a complex problem: Nodes<br />
(military units) are typically scattered on the operation area, the environment<br />
changes dynamically due to node mobility <strong>and</strong> operations need to be coordinated<br />
not only within the armed forced of a specific country, but also with allies. For<br />
rapidly evolving tactical situations in confined areas (such as those encountered<br />
in urban areas) existing mechanisms (e.g. satellite-based systems) are limited by<br />
several factors including update frequency, accuracy, <strong>and</strong> robustness to communication<br />
channel disruption (due to jamming or capacity limitations).<br />
Satellite-based BFT systems highly depend on the availability of a complex<br />
infrastructure <strong>and</strong> backend. They are therefore vulnerable to attacks on the global<br />
infrastructure, e.g. jamming or denial of service (DoS) attacks. BFT systems based<br />
on mobile ad hoc networks (MANETs) that are locally deployed reduce the dependencies<br />
<strong>and</strong> can improve this situation.<br />
MANETs in conjunction with sensors <strong>and</strong> information sources found<br />
in mobile computing components provide redundant, mutually supporting<br />
information on individual node locations. Data sources comprise geolocation<br />
(e.g. GPS) receivers, electronic compasses <strong>and</strong> gyroscopes, but also the ability<br />
to perform trilateration based on radio-frequency signals used for communication<br />
[4]. The types of terrain <strong>and</strong> radio frequency environments to be expected<br />
in tactical MANETs implies that one cannot assume continuous connectivity<br />
across the MANET, but rather that the MANET will be partitioned frequently<br />
in an arbitrary manner [5].<br />
Although MANET-based BFT systems have been proposed [6], [7], these are<br />
typically limited to basic communication mechanisms that do not provide additional<br />
means to increase the robustness <strong>and</strong> the accuracy of BFT <strong>and</strong> are therefore<br />
inappropriate for challenging environments, e.g. urban operations or similarly<br />
constrained terrain.<br />
In this paper we propose a mechanism which can be used as a supplement<br />
or even substitute for existing infrastructure-based BFT systems but which is robust<br />
against the aforementioned problems affecting naïve designs for MANETs or<br />
similar mesh-type networks. Robustness <strong>and</strong> accuracy of location estimation are<br />
increased within the proposed BFT system utilizing additional information sources<br />
such as mission information (group structure <strong>and</strong> tactical mobility patterns) <strong>and</strong><br />
topographic data. Employing a combination of mobility models adapted to the tactical<br />
domain, the interpolation of likely node positions in the absence of immediate<br />
updates becomes possible.
Chapter 8: Localization Techniques<br />
351<br />
It is important to note that a key requirement for robust BFT in the tactical<br />
domain is that each node should retain information on current <strong>and</strong> likely positions<br />
of other network nodes. Our proposal outlined in this paper employs Sequential<br />
Monte Carlo (SMC) methods in a distributed manner to achieve this purpose.<br />
In this environment Particle Filters (PF) are particularly suitable as they provide<br />
a natural, scalable mechanism for mutual updates of location <strong>and</strong> motion estimations<br />
which decay gracefully in cases of missing updates [8]. Equally important<br />
is their high tolerance level regarding faulty or deliberately incorrect data whilst<br />
permitting the inclusion of additional information.<br />
In the remainder of the paper we therefore briefly outline related work on BFT<br />
<strong>and</strong> geolocation tracking <strong>and</strong> review background terminology for particle filters.<br />
This provides the basis for discussion on several assumptions used in the design<br />
of the BFT algorithm. An elaboration of the proposed particle filter algorithm<br />
(SMC-BFT), first conceptually <strong>and</strong> then at the algorithmic level, precedes a discussion<br />
of a simulative evaluation of the algorithm based on the network simulator<br />
developed by [9]. A comparison to a naïve baseline algorithm <strong>and</strong> a global motion<br />
estimation algorithm concludes the paper, demonstrating significantly improved<br />
results of the outlined algorithm with respect to the average estimation error.<br />
II. Related work<br />
Riblett <strong>and</strong> Wiseman [6] present a MANET-based system for tactical environments<br />
named TacNet. They point out that a MANET-based communication<br />
approach provides the capabilities to the network to dynamically self-heal <strong>and</strong><br />
to overcome some line-of-sight constraints that are typical limitations of radio<br />
networks. The TacNet system provides secure access to critical data such as realtime<br />
maps of resource positions <strong>and</strong> could be used as an underlying communication<br />
network for Blue Force tracking. However, no enhanced data fusion <strong>and</strong><br />
location estimation mechanisms are proposed <strong>and</strong> no evaluation of the system<br />
performance is given [7].<br />
Suri et al. [1] describe how BFT can benefit from a distributed approach<br />
in comparison to centralized architectures due to the dynamic, geographically<br />
sensitive nature of most tactical situations. They present observations from several<br />
tactical networking experiments <strong>and</strong> discuss the requirements for <strong>and</strong> the advantages<br />
of peer-to-peer (P2P) approaches for tactical network environments. Even<br />
in cases where connectivity to a central BFT server is lost, nodes in close proximity<br />
continue to communicate in order to share critical location information.<br />
A number of research papers have been published about localization schemes<br />
for MANETs, in particular, for scenarios where no GPS sensors are available or where<br />
only a subset of (anchor) nodes are equipped with a GPS sensor. Biaz <strong>and</strong> Ji [10]<br />
present a survey <strong>and</strong> comparison on localization algorithms for wireless ad hoc networks,<br />
e.g. based on radio signal characteristics such as time of arrival (TOA), time
352 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
difference of arrival (TDOA), angle of arrival (AOA) <strong>and</strong> received signal strength<br />
indicator (RSSI). However, most of these approaches address a different scenario<br />
in comparison to BFT as in tactical MANETs it is typically assumed that all nodes are<br />
equipped with GPS sensors. The challenge of BFT is not to determine the location<br />
of a local node but to have accurate location estimations for all other network nodes.<br />
Some MANET localization approaches based on SMC are presented in the following,<br />
although they also address different scenarios in comparison to BFT. Hu<br />
<strong>and</strong> Evans [9] introduce a SMC localization method for a MANET setup where only<br />
a small number of seed nodes know their locations. The other nodes estimate their<br />
location based on location messages that they receive from seed nodes. The evaluation<br />
results of the SMC-based approach are promising, even in scenarios where<br />
network transmissions are highly irregular <strong>and</strong> severe computation <strong>and</strong> memory<br />
limits are in place. Huang et al. [11] present a MANET localization framework<br />
based on particle filters based on AoA <strong>and</strong> RSSI. They study how different types<br />
of sensor data can be incorporated into a common localization framework <strong>and</strong><br />
claim that they provide the first localization framework based on particle-filters<br />
that integrates heterogeneous sensor types.<br />
Ristic et al. [12] outline the concept of Terrain-Aided Tracking. They propose<br />
to exploit knowledge of the environment or limitations in the dynamic motion<br />
of the target to produce more accurate location estimation results. They show<br />
an example how additional information sources can be used in order to improve<br />
the accuracy of state estimation based on particle filters. However, they do not address<br />
the communication <strong>and</strong> distributed processing challenges of a MANET scenario.<br />
Rosencrantz et al. [13] present a decentralized state estimation architecture<br />
based on particle filters for a robotic system. They address the problem that<br />
arises in a distributed estimation systems if observation arrive that refer to a time<br />
in the past. They introduce the concept of re-simulation in order to reduce the variance<br />
of importance weights. In cases of re-simulation part of the history of an agent’s<br />
particle filter is erased <strong>and</strong> then re-simulated to the current time, incorporating all<br />
collected observations at appropriate time intervals.<br />
III. Background: Sequential Monte Carlo models / particle filters<br />
In this section we outline the mathematical background of state estimation<br />
using particle filters [8] – also known as sequential Monte Carlo (SMC) methods<br />
– <strong>and</strong> how they can be applied to our application scenario:<br />
A. System state<br />
Current properties <strong>and</strong> status of a tactical MANET can be described using<br />
a set of state variables. For simplicity the number of nodes in the MANET<br />
is assumed to be fixed <strong>and</strong> denoted as .
Chapter 8: Localization Techniques<br />
353<br />
Notation: The current state of a node at time is denoted as <br />
The state is (at least partially) not directly observable but can be inferred from<br />
sensor data. The measurements (related to target state) at time are denoted as<br />
. The sequence of all available measurements up to time is denoted<br />
as z1:k<br />
{ z<br />
t<br />
, t1, , k}<br />
.<br />
The posterior probability distribution function (pdf) regarding all available<br />
measurements up to time is denoted as p( xk| z<br />
1: k)<br />
<strong>and</strong> is also known<br />
as filtering distribution.<br />
State information including BFT tracking location <strong>and</strong> other information<br />
is collected, evaluated <strong>and</strong> transmitted to other network nodes. The current state<br />
pos<br />
vel<br />
information at time includes the location x<br />
k<br />
<strong>and</strong> the velocity x<br />
k<br />
of all other<br />
nodes. Sensors estimate the GPS coordinates of a node <strong>and</strong> the speed <strong>and</strong> direction<br />
of movement.<br />
B. State evolution <strong>and</strong> estimation problem<br />
Assumptions The target state evolves according to a discrete-time stochastic<br />
model defined by the following equation:<br />
x f ( x , v )<br />
(1)<br />
k k k1 k1<br />
nx n nx<br />
where f : <br />
k<br />
is a known, possibly nonlinear function of the state<br />
<strong>and</strong> <strong>and</strong> a process noise sequence.<br />
Objective: The overall objective of our architecture is to recursively estimate<br />
based on measurements that are related to the target state via the measurement<br />
equation:<br />
z ( , )<br />
k<br />
hk xk<br />
w<br />
k<br />
(2)<br />
nx n nz<br />
where hk : is a known, possibly nonlinear function of the state<br />
<strong>and</strong> the measurement noise sequence .<br />
From a Bayesian perspective the objective is to recursively quantify some<br />
degree of belief in the state at time given data z<br />
1:k<br />
up to time . Thus it is<br />
required to construct the posterior pdf p( xk| z<br />
1: k)<br />
which can be obtained recursively<br />
in two stages: prediction <strong>and</strong> update.<br />
C. Particle filters<br />
In the following a short overview of the basic concept of particle filters including<br />
importance (re-)sampling is given [14], [12]. The key concept of particle filters<br />
is to represent probability density functions by a set of samples (also referred to<br />
as particles) <strong>and</strong> their associated weights. The pdf p( xk| z<br />
1: k)<br />
is therefore approximated<br />
with an empirical density function:
354 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
N<br />
N<br />
i i<br />
i i<br />
k 1: k qk <br />
k k<br />
qk i qk<br />
i1 i1<br />
p( x | z ) x x , 1, : 0<br />
(3)<br />
where is the Dirac delta function <strong>and</strong> denotes the weight associated with<br />
particle .<br />
Monte Carlo Integration: Monte Carlo (MC) integration is the basis for SMC<br />
methods. Its objective is the numerical evaluation of a multidimensional integral:<br />
I g g x<br />
dx<br />
(4)<br />
where .<br />
Monte Carlo methods factorize gx<br />
f x x<br />
in such a way that x<br />
is interpreted as a probability density satisfying x 0 <strong>and</strong> x, dx1.<br />
i<br />
The assumptions is that it is possible to draw samples { x , i1, , N}<br />
distributed according to x<br />
. An approximation of the integral<br />
is the sample mean:<br />
I g f xxdx<br />
(5)<br />
N<br />
1<br />
I g f x .<br />
(6)<br />
N<br />
i<br />
<br />
N<br />
i 1<br />
Importance Sampling: Ideally we want to generate samples directly from x<br />
<strong>and</strong> estimate using equation (6). Suppose we can only generate samples from<br />
a density qx which is similar to x<br />
, then a correct weighting of samples<br />
makes SMC estimation still possible. The pdf qx is referred to as the importance<br />
or proposal density, where qx <strong>and</strong> x<br />
have the same support. Equation (5)<br />
can be rewritten as:<br />
x<br />
I gf xxdx f x<br />
qxdx<br />
(7)<br />
qx<br />
x<br />
provided that is upper bounded.<br />
qx<br />
A Monte Carlo estimate of can be computed by generating independent<br />
samples { x , i1, , N}<br />
distributed according to qx <strong>and</strong> forming<br />
i<br />
the weighted sum:<br />
are the importance weights.<br />
N<br />
i<br />
1<br />
{ x<br />
i i i<br />
I <br />
N<br />
g f { x q { x , q {<br />
x <br />
i<br />
(8)<br />
N q { x<br />
i1
Chapter 8: Localization Techniques<br />
355<br />
A problem for consideration – in particular for distributed <strong>and</strong> cooperative<br />
state estimation – is that measurements can only be combined if they refer<br />
to the same state, <strong>and</strong> therefore the same instance in time. Only simultaneously<br />
measured observations can be directly combined. In the following section we<br />
introduce our novel SMC-based BFT that overcomes these issues using resimulation<br />
whenever measurements need to be combined that refer to different<br />
moments in time.<br />
IV. SMC-Based BFT (SMC-BFT)<br />
In the following we describe some basic assumptions <strong>and</strong> present some examples<br />
of additional information that can be incorporated in order to enhance BFT<br />
in tactical MANETs. We show how re-simulation can be used to apply particle<br />
filters in distributed environments <strong>and</strong> finally present the concept of the proposed<br />
SMC-based BFT (SMC-BFT) in detail.<br />
A. Basic assumptions<br />
The overall objective of our proposed SMC-BFT approach is to derive a probabilistic<br />
estimation of a node’s location <strong>and</strong> velocity for enhanced BFT. The posterior<br />
distribution for is represented by a set of weighted samples { x , i 1, , N}<br />
which are periodically updated using importance sampling. Time is divided into<br />
discrete time units (as described in section III) where the current state of a node<br />
at time is denoted as . Node movement <strong>and</strong> messages exchange are modeled<br />
as discrete steps within each time unit.<br />
SMC-BFT State Evolution Model: Location <strong>and</strong> velocity state variables evolve<br />
according to a discrete-time stochastic model defined by equation (1) where the system<br />
state variable represents both node location x<br />
loc<br />
vel<br />
k<br />
<strong>and</strong> velocity x<br />
k<br />
.<br />
GPS Measurement Equation: Sensor measurements of GPS sensors are modeled<br />
according to equation (2) where the measurement represents both location<br />
loc<br />
vel<br />
measurement z<br />
k<br />
<strong>and</strong> velocity measurement z<br />
k<br />
of the GPS sensor. The measurements<br />
noise sequences are modeled as Gaussian white noise with<br />
mean zero <strong>and</strong> st<strong>and</strong>ard deviations <strong>and</strong> respectively.<br />
loc<br />
GPS<br />
vel<br />
GPS<br />
B. Incorporation of additional information sources<br />
An important tenet of the SMC-BFT concept is the inclusion of additional<br />
knowledge sources such as information about the tactical mission <strong>and</strong> a topographical<br />
model of the environment.<br />
Mission <strong>Information</strong>: Knowledge of mission objectives, participants <strong>and</strong> group<br />
structure of a specific mission are promising information sources for improving BFT.<br />
Typical formation patterns <strong>and</strong> typical (minimum, average <strong>and</strong> maximum) velocities
356 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
can be derived from this form of information. Such properties may either belong<br />
to specific nodes or reflect a specific tactical situation.<br />
In section V-C2 an example of how group structure <strong>and</strong> movement formation<br />
information can be used for enhanced BFT (Reference Point Group Mobility Model).<br />
Topographical Model: A topographical model of the environment can be used<br />
to improve estimation of node movement. The direction of movement is probabilistically<br />
dependent on properties of the area of movement [12]. There are areas with<br />
restricted movement (e.g. water, mountains), areas of free movement (e.g. open<br />
field) <strong>and</strong> areas which are characterized with a high likelihood of following specific<br />
paths (e.g. roads, pathways, or stairs).<br />
In section V-C2 an example of how such information can be used to significantly<br />
enhance BFT in a setup where nodes follow specific paths or streets (Manhattan<br />
Grid Model) is demonstrated.<br />
Additional information sources enable the preference of more likely state<br />
values <strong>and</strong> the exclusion of implausible estimations. For example, impossible<br />
locations can be removed from the set of potential locations based on node type<br />
<strong>and</strong> topography model, e.g. lakes or buildings for regular cars. Additionally impossible<br />
velocity values can be excluded based on node properties <strong>and</strong> physical laws,<br />
e.g. based on upper bounds for acceleration.<br />
C. Re-simulation<br />
An important aspect of distributed data fusion is their temporal <strong>and</strong> causal<br />
relationship: how can measurements that refer to different nodes be combined <strong>and</strong><br />
integrated if they were performed at different times<br />
The sequence of events must be considered in order to arrange measurements<br />
of different nodes in a distributed system. Observations retrieved from other nodes<br />
at a specific time may refer to a moment that is several steps in the past, each node<br />
therefore records current measurement values as well as a history of received <strong>and</strong><br />
local measurements. This allows node’s particle filter to periodically re-simulated<br />
when data arrives at time that refers to an earlier time t l<br />
t k<br />
(cf. [13]), which<br />
is more recent than previously received measurements.<br />
When this occurs a section of the filter’s history is erased <strong>and</strong> re-run to the current<br />
time , incorporating all collected observations at appropriate intervals. Measurements<br />
that refer to a moment in the past that are outside the history window<br />
( tk tl thistory<br />
) are discarded. This leads to improved re-sampling of particles<br />
<strong>and</strong> improved performance of the particle filter.<br />
D. SMC-BFT concept<br />
The basic concept of SMC-BFT is that each network node utilizes a set of particle<br />
filters to probabilistically model the location information of the other network
Chapter 8: Localization Techniques<br />
357<br />
nodes. Each particle filter is initialized when first measurement arrive <strong>and</strong> continuously<br />
updated afterwards.<br />
The following actions performed in each round, on each node for each<br />
of the other nodes:<br />
1) Initialization (when first measurements arrive)<br />
2) Prediction <strong>and</strong> Filtering<br />
An overview of these actions is shown in figure 1 <strong>and</strong> the individual steps<br />
of each action are described in more detail in the following sections.<br />
1) Initialization: The particle filter for BFT of another node is initialized at time<br />
when the first measurements (referring to some time ) of that specific<br />
node arrive:<br />
i<br />
• Generation of samples x<br />
l<br />
, i1, ,<br />
N<br />
equally distributed around newly<br />
available measurements , incorporating additional information sources, e.g.<br />
– topography model for deletion of invalid samples or alignment of samples,<br />
– mission information for group movement patterns.<br />
• If required ( t l<br />
t k<br />
): Re-simulation from time to current time for<br />
this node based on system evolution model (cf. equation (1)), incorporating<br />
additional information sources.<br />
Figure 1. Basic Concept of SMC-BFT
358 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
2) Prediction <strong>and</strong> Filtering: All newly arriving incoming location messages are<br />
preliminarily processed. The output of this process is a set of new measurements<br />
(referring to some time t<br />
l<br />
tk<br />
in the past). For some nodes new<br />
measurements are available in a specific round <strong>and</strong> for other nodes not.<br />
Based on the availability of new measurements for another network node<br />
in a specific round the BFT particle filter for a specific node is reset to a moment<br />
in time tl 1in the past or not. Subsequently the system state is updated according<br />
to the procedure described below. The basic input for the prediction <strong>and</strong> filtering<br />
i<br />
step is the set of samples x , 1, ,<br />
l1 i N<br />
representing a probabilistic estimation<br />
of the location <strong>and</strong> velocity of another node at a specific time tl tk<br />
(or if no new<br />
measurements are available is equal to ).<br />
• System update based on previous system state estimation x<br />
l1<br />
<strong>and</strong> system<br />
evolution model (cf. equation (1), incorporating additional information source<br />
(similar to “re-simulation” of one step).<br />
• If new measurements are available:<br />
1) Elimination of impossible system states: Remove all samples that are invalid<br />
due to newly arrived measurement , e.g. that are<br />
– too far away from the measured location,<br />
– in an invalid location according to a topography model or<br />
– too far away from the center of a group formation.<br />
2) If not enough samples are left: Generation of new samples x<br />
i<br />
l<br />
, i1, ,<br />
N<br />
equally distributed around the newly available measurement , incorporating<br />
additional information sources.<br />
3) If required ( t l<br />
t k<br />
): Re-Simulation from time to current time for this<br />
node based on system evolution model (cf. equation (1)), incorporating<br />
additional information source.<br />
The goal of re-simulation is to generate new samples for the current time<br />
x i<br />
, i k<br />
1, , N by probabilistically updating all previously calculated samples<br />
x j, l jki , 1, ,<br />
N<br />
stored in the history list up to estimation time ,<br />
i<br />
e.g. applying the mobility model <strong>and</strong> incorporating mission information <strong>and</strong><br />
topographical model.<br />
V. Evaluation<br />
The key metric of BFT is the accuracy of location estimation. Estimation errors<br />
should be minimized while limiting communication overhead to an acceptable level.<br />
In this section we evaluate how our proposed SMC-BFT mechanism performs<br />
<strong>and</strong> its robustness with respect to various network parameters in comparison to<br />
st<strong>and</strong>ard BFT approaches.
Chapter 8: Localization Techniques<br />
359<br />
A. Evaluation setup<br />
A MANET simulator developed in [9] is used as a basis for evaluation (also<br />
used <strong>and</strong> extended in [15]). The basic setup is that each mobile node contains<br />
a computing device, has GPS sensor capability <strong>and</strong> topography model <strong>and</strong> mission<br />
information are available on each node.<br />
Nodes regularly exchange data (geo-location, velocity) to direct neighbors<br />
via multi-hop flooding with all other nodes (e.g. piggyback with routing information).<br />
Location measurement <strong>and</strong> message processing are performed in discrete<br />
time steps (round based simulation) where the duration of each step was set to 1 s.<br />
B. St<strong>and</strong>ard BFT approaches<br />
We compare our newly proposed SMC-BFT method with two st<strong>and</strong>ard BFT<br />
mechanisms: A simple straight forward BFT mechanism, which simply takes<br />
a measurement “as is” <strong>and</strong> a more elaborate mechanism based on dead reckoning<br />
(cf. [16]) considering the progress in time between last measurements <strong>and</strong> current<br />
time as well as node velocity.<br />
a) St<strong>and</strong>ard BFT (STD-BFT): The most recently received measurement , (GPS<br />
coordinates <strong>and</strong> velocity) is taken as an estimate of current location <strong>and</strong> velocity<br />
of a node:<br />
x z<br />
k<br />
b) Velocity Based BFT (VEL-BFT): The location accuracy is improved by predicting<br />
the current location based on available measurement data (cf. [2],[17]).<br />
Previous node location, time difference t tk<br />
t between measurement<br />
time <strong>and</strong> current time as well as node velocity are considered:<br />
pos pos vel<br />
x z t<br />
z<br />
k l l<br />
x<br />
vel<br />
k<br />
z<br />
l<br />
vel<br />
l<br />
C. Experimental setup <strong>and</strong> simulation parameters<br />
In the following sections we describe the default parameter set used for our<br />
evaluation. It is explicitly mentioned in the description whenever default values<br />
are not used.<br />
1) Basic Parameters: The default setup contains 20 nodes that move within a simulation<br />
area of 1000 x 1000 m. Nodes locally determine their location <strong>and</strong><br />
velocity using the GPS sensor. The GPS measurement st<strong>and</strong>ard deviation for<br />
loc<br />
vel<br />
location is GPS<br />
3.0 m <strong>and</strong> for velocity <strong>and</strong> GPS<br />
1.0 m/s. Every 10 s each<br />
node generates a location message <strong>and</strong> forwards it to all its neighbor nodes.
360 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Each simulation is carried out for 250 s (i. e. 250 rounds) of which the first 50 s<br />
are left out as initialization <strong>and</strong> stabilization period <strong>and</strong> therefore are not considered<br />
for the evaluation. Each simulation setup is run in 50 iterations to determine<br />
stable average values. The number of particles for the SMC-BFT approach is 50.<br />
2) Mobility Model: For the evaluation we implemented a mobility model reflecting<br />
the topography of the environment <strong>and</strong> a group based model reflecting<br />
tactical formations.<br />
Manhattan Grid Model: The Manhattan Grid Model [18] is based on road<br />
topology. Roads are located in a grid structure <strong>and</strong> nodes move in horizontal or<br />
vertical directions on these roads. The model follows a probabilistic approach: each<br />
node probabilistically chooses at each intersection to keep moving in the same<br />
direction or to turn left or right.<br />
For the evaluation we implemented the Manhattan Grid Model based on<br />
the BonnMotion [19] algorithm. This model is used as default mobility model for<br />
the evaluation. There are 10 blocks in each direction (i. e. each block is 100 x 100 m)<br />
<strong>and</strong> the probability for mobile nodes to turn at a crossing is 0.5. The probability<br />
for a node to change its speed (in a simulation round) is 0.2. The minimum speed<br />
is 0.5 m/s, the mean 2.0 m/s <strong>and</strong> the st<strong>and</strong>ard deviation of a normally distributed<br />
r<strong>and</strong>om speed 2.0 m/s. The pause probability is zero.<br />
Reference Point Group Mobility (RPGM): The Reference Point Group Mobility<br />
(RPGM) Model [20], [21] can represent tactical relationships among a group<br />
of mobile nodes. Applications of the RPGM model include complex scenarios such<br />
as a military maneuver with joint aircraft, tank <strong>and</strong> infantry operations or two-level<br />
scenarios, e.g. infantry <strong>and</strong> helicopters, with slow <strong>and</strong> fast nodes.<br />
For the evaluation the following default parameter set is used. There is a group<br />
of 20 nodes that move with a common average speed. The minimum group speed<br />
is 4 m/s <strong>and</strong> the maximum 10 m/s. The overall group movement follows a r<strong>and</strong>om<br />
waypoint mobility model. Each node chooses a destination r<strong>and</strong>omly distributed around<br />
a group destination in a distance of up to 25 m from this specified location. In each<br />
step a node may also r<strong>and</strong>omly move up to 30 percent of this maximum distance.<br />
3) Radio Propagation Model: During evaluation a deterministic <strong>and</strong> a probabilistic<br />
radio propagation model are used.<br />
Free Space Model: The Free Space Model is a basic deterministic model where<br />
only line-of-sight radio transmissions through free space (without any obstacles,<br />
reflection or diffraction disturbances) are taken into account. For the evaluation<br />
we use the available simulator implementation [9].<br />
Shadowing Model: In reality radio propagation is a probabilistic process due<br />
to multipath propagation effects. The shadowing model consists of two distinct<br />
parts: a path loss model (which predicts the mean received power) <strong>and</strong> a second<br />
that reflects the variation of the received power at a certain distance.<br />
For the evaluation an implementation based on ns-2 [22] is used. This model<br />
is used as default radio propagation model with a radio transmission range of 250 m.
Chapter 8: Localization Techniques<br />
361<br />
The pathloss exponent is set to 4.0 (recommendation for outdoor environment/<br />
shadowed urban area: 2.7 to 5 [22]) <strong>and</strong> a shadowing deviation <br />
dB<br />
8.0 is used<br />
(recommendation for outdoor environments: 4 to 12 [22]).<br />
D. Accuracy of location estimation<br />
40<br />
Field Size (Node Number, Node Density)<br />
Estimation Error [m]<br />
30<br />
20<br />
10<br />
STD-BFT<br />
VEL-BFT<br />
SMC-BFT<br />
0<br />
250 500 750 1000 1250 1500<br />
Field Size [m]<br />
Figure 2. Average Estimation Error vs. Node Density for Manhattan Grid Model<br />
1) Field Size, Node Number <strong>and</strong> Node Density: In this evaluation setup we increase<br />
the field size (incrementally from 250 x 250 m to 1500 x 1500 m) proportional to<br />
the number of nodes (5 to 30). Therefore node density decreases with increasing<br />
field size <strong>and</strong> node numbers. Figure 2 shows that the estimation error stays on<br />
a similar level as long as node density provides some basic connectivity of all<br />
nodes, but decreases when network connectivity is disturbed. The SMC-BFT<br />
method outperforms other methods in all setups by 16 to 41 percent.<br />
2) Mobility Model Parameters: In figure 3 <strong>and</strong> figure 4 simulation results are<br />
shown for different speed settings for Manhattan Grid <strong>and</strong> RPGM models<br />
respectively. The results for both mobility models show that STD-BFT works<br />
well for scenarios with low mobility.<br />
40<br />
Node Speed<br />
Estimation Error [m]<br />
30<br />
20<br />
10<br />
STD-BFT<br />
VEL-BFT<br />
SMC-BFT<br />
0<br />
1 2 3 4<br />
Average Speed [m/s]<br />
Figure 3. Average Estimation Error vs. Node Speed for Manhattan Grid Model
362 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
40<br />
Group Speed<br />
Estimation Error [m]<br />
30<br />
20<br />
10<br />
STD-BFT<br />
VEL-BFT<br />
SMC-BFT<br />
0<br />
2 4 6 8<br />
Maximum Speed [m/s]<br />
Figure 4. Average Estimation Error vs. Group Speed for RPGM Model<br />
In figure 3 the minimum speed for the Manhattan Grid Model is set to 0.5 m/s<br />
for speeds below 3 m/s <strong>and</strong> to 1 m/s otherwise. Mean speed as well as the st<strong>and</strong>ard<br />
deviation are increased from 1 m/s to 4 m/s. Estimation errors grow relatively<br />
proportional to speed. Average estimation errors of SMC-BFT are 23 to 48 percent<br />
lower than for both st<strong>and</strong>ard BFT methods.<br />
In figure 4 maximum group speed of RPGM is increased from 2 m/s to 8 m/s,<br />
minimum group speed is increased proportionally from 0.5 m/s to 2 m/s. Average<br />
estimation errors of SMC-BFT are 12 to 55 percent lower than for the other methods.<br />
Estimation Error [m]<br />
150<br />
125<br />
100<br />
75<br />
50<br />
Radio Range <strong>and</strong> Radio Propagation Model<br />
STD-BFT: Free Space<br />
VEL-BFT: Free Space<br />
SMC-BFT: Free Space<br />
STD-BFT: Shadowing<br />
VEL-BFT: Shadowing<br />
SMC-BFT: Shadowing<br />
25<br />
0<br />
150 200 300 400<br />
Radio Range [m]<br />
Figure 5. Radio Propagation Model <strong>and</strong> Radio Range<br />
3) Radio Propagation Model Parameters: The following setup evaluates the radio<br />
propagation models influence on BFT performance. For these purposes two<br />
radio propagation models (Free Space <strong>and</strong> Shadowing) are used with varying<br />
radio ranges from 150 m to 400 m where radio range is the maximum transmission<br />
range for the Free Space model <strong>and</strong> the average transmission range for<br />
the Shadowing model. Figure 5 shows that error estimation is significantly lower
Chapter 8: Localization Techniques<br />
363<br />
for the Shadowing model. When even a few messages are transmitted beyond<br />
“normal” (Free Space) radio range it significantly improves location estimation<br />
due to an increase in valuable information that would otherwise not be available to<br />
that part of the network. The results show that the average estimation error is lower<br />
for SMC-BFT for all evaluated setups than for both st<strong>and</strong>ard BFT methods.<br />
20<br />
Accuracy of GPS Messearument<br />
Estimation Error [m]<br />
15<br />
10<br />
5<br />
STD-BFT<br />
VEL-BFT<br />
SMC-BFT<br />
0<br />
2 3 4 5<br />
St<strong>and</strong>ard Deviation of GPS Measurements [m]<br />
Figure 6. GPS Measurement Accuracy<br />
4) GPS Measurement Accuracy: Accuracy of sensor measurements has a direct<br />
impact on BFT performance. Figure 6 shows results for varying GPS precisions<br />
(GPS st<strong>and</strong>ard deviation 2 m to 5 m). Estimation error increases are relatively<br />
proportional to GPS accuracy where the estimation error of the proposed<br />
SMC-BFT is 25 to 38 percent than for the other methods.<br />
Table I. Number of Messages <strong>and</strong> Average Estimation Error vs. Message Generation Interval<br />
Message Generation Interval<br />
5 s 10 s 20 s<br />
Average Number of Generated Messages 481 240 120<br />
Average Number of Forwarded Mess. 33512 16576 8488<br />
Average Estimation Error<br />
STD-BFT 8.4 m 13.7 m 24.5 m<br />
VEL-BFT 6.7 m 10.9 m 20.9 m<br />
SMC-BFT 4.6 m 8.1 m 15.0 m<br />
E. Communication overhead<br />
In this section we evaluate BFT communication overhead <strong>and</strong> the resulting<br />
location estimation errors in dependency of message generation intervals. As message<br />
generation, forwarding <strong>and</strong> processing do not depend on the data fusion<br />
algorithm, the number of messages that are generated <strong>and</strong> exchanged are equivalent<br />
for all three methods.
364 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Table I shows that the quantity of messages significantly decreases when location<br />
message generation time intervals are increased. Similarly location estimation<br />
error increases proportionally to a decrease in message generation intervals where<br />
SMC-BFT outperforms the other approaches in all scenarios by 25 to 45 percent.<br />
VI. Conclusion <strong>and</strong> outlook<br />
In this paper we demonstrated how BFT can be significantly enhanced<br />
by using networking capabilities of tactical MANETs <strong>and</strong> data fusion based on<br />
particle filters. Using advanced data analysis <strong>and</strong> fusion mechanisms for multiple<br />
sensor <strong>and</strong> data sources based on techniques that are employed in robotics <strong>and</strong><br />
object tracking, we developed a model for enhanced BFT in tactical MANETs by<br />
incorporating additional information such as mission information (e.g. mobility<br />
models) <strong>and</strong> topographic data. As shown in the simulation environment using<br />
various mobility <strong>and</strong> radio propagation characteristics (cf. figure 2 to 6), our<br />
proposed SMC-BFT model enhanced both accuracy <strong>and</strong> robustness as compared<br />
to existing models.<br />
This paper has outlined mechanisms that can be used to implement more accurate<br />
<strong>and</strong> robust BFT systems for tactical MANETs. Our proposed model can be<br />
used as a replacement if no satellite infrastructure is available, or as a supplement<br />
to an existing backend system thereby improving local precision while maintaining<br />
a coarse global overview, e.g. using a satellite system.<br />
References<br />
[1] N. Suri, G. Benincasa, M. Tortonesi, C. Stefanelli, J. Kovach, R.Winkler,<br />
U.S. Kohler, J. Hanna, L. Pochet, <strong>and</strong> S. Watson, “Peer-to-Peer <strong>Communications</strong><br />
for Tactical Environments: Observations, Requirements, <strong>and</strong> Experiences,” IEEE<br />
<strong>Communications</strong> Magazine, vol. 48, pp. 60-69, 2010.<br />
[2] P. Labbe, L. Lamont, Y. Ge, <strong>and</strong> L. Li, “Creating a Dynamic Picture of Network<br />
Participant Geospatial <strong>Information</strong> in Complex Terrains,” in Proceedings of the Second<br />
International Conference on Internet Monitoring <strong>and</strong> Protection. Washington, DC,<br />
USA: IEEE Computer Society, 2007, pp. 39.<br />
[3] K.R. Chevli, P.Y. Kim, A.A. Kagel, D.W. Moy, R.S. Pattay, R.A. Nichols, <strong>and</strong><br />
A.D. Goldfinger, “Blue Force Tracking Network Modeling <strong>and</strong> Simulation,” in IEEE<br />
<strong>Military</strong> <strong>Communications</strong> Conference (MILCOM), 2006.<br />
[4] R. Filler, S. Ganop, P. Olson, <strong>and</strong> S. Sokolowski, “Positioning, Navigation <strong>and</strong><br />
Timing: The Foundation of Comm<strong>and</strong> <strong>and</strong> Control,” in Comm<strong>and</strong> <strong>and</strong> Control<br />
Research <strong>and</strong> <strong>Technology</strong> Symposium (CCRTS), 2004.<br />
[5] S. Reidt <strong>and</strong> S.D. Wolthusen, “Connectivity Augmentation in Tactical Mobile<br />
Ad hoc Networks,” in IEEE <strong>Military</strong> Communication Conference (MILCOM), 2008.
Chapter 8: Localization Techniques<br />
365<br />
[6] L. Riblett. <strong>and</strong> J. Wiseman, “TACNET: Mobile ad hoc Secure <strong>Communications</strong><br />
Network,” in 41st Annual IEEE International Carnahan Conference on Security<br />
<strong>Technology</strong>, 2007.<br />
[7] L. Riblett <strong>and</strong> J. Wiseman, “TacNet Tracker©: Built-in Capabilities for Situational<br />
Awareness,” in 42nd Annual IEEE International Carnahan Conference on Security<br />
<strong>Technology</strong>, 2008.<br />
[8] P. Ebinger <strong>and</strong> S. Wolthusen, “Efficient State Estimation <strong>and</strong> Byzantine Behavior<br />
Identification in Tactical MANETs,” in IEEE <strong>Military</strong> <strong>Communications</strong> Conference<br />
(MILCOM), 2009.<br />
[9] L. Hu <strong>and</strong> D. Evans, “Localization for Mobile Sensor Networks,” in 10th ACM Annual<br />
International Conference on Mobile Computing <strong>and</strong> Networking (MobiCom), 2004.<br />
[10] S. Biaz <strong>and</strong> Y. Ji, “A Survey <strong>and</strong> Comparison on Localisation Algorithms for Wireless<br />
Ad Hoc Networks,” Int. J. Mob. Commun., vol. 3, pp. 374-410, May 2005.<br />
[11] R. Huang <strong>and</strong> G.V. Zaruba, “Incorporating Data from Multiple Sensors for Localizing<br />
Nodes in Mobile Ad Hoc Networks,” IEEE Transactions on Mobile Computing, vol. 6,<br />
pp. 1090-1104, September 2007.<br />
[12] B. Ristic, S. Arulampalam, <strong>and</strong> N. Gordon, Beyond the Kalman Filter: Particle<br />
Filters for Tracking Applications. Artech House, 2004.<br />
[13] M. Rosencrantz, G. Gordon, <strong>and</strong> S. Thrun, “Decentralized Sensor Fusion with<br />
Distributed Particle Filters,” in 19th Conference on Uncertainty in Artificial Intelligence<br />
(UAI), 2003.<br />
[14] A. Doucet, N.D. Freitas, <strong>and</strong> N. Gordon, Eds., Sequential Monte Carlo Methods<br />
in Practice. Springer, 2001.<br />
[15] A. Baggio <strong>and</strong> K. Langendoen, “Monte Carlo Localization for Mobile Wireless<br />
Sensor Networks,” Ad Hoc Networks, vol. 6, no. 5, pp. 718-733, Jul. 2008.<br />
[16] A. Agarwal <strong>and</strong> S.R. Das, “Dead Reckoning in Mobile Ad Hoc Networks,” in IEEE<br />
Wireless <strong>Communications</strong> <strong>and</strong> Networking (WCNC), vol. 3, 2003, pp. 1838-1843.<br />
[17] E. Amar <strong>and</strong> S. Boumerdassi, “Enhancing Location Services with Prediction,”<br />
in Proceedings of the 2009 International Conference on Wireless <strong>Communications</strong><br />
<strong>and</strong> Mobile Computing: Connecting the World Wirelessly, ser. IWCMC ’09. New<br />
York, NY, USA: ACM, 2009, pp. 1025-1029.<br />
[18] Special Mobile Group (SMG), “Universal Mobile Telecommunicatios System (UMTS) –<br />
Selection Procedures for the Choice of Radio Transmission Technologies of the UMTS,”<br />
European Telecommunications St<strong>and</strong>ards Institute (ETSI), Tech. Rep., 1998.<br />
[19] N. Aschenbruck, R. Ernst, E. Gerhards-Padilla, <strong>and</strong> M. Schwamborn,<br />
“BonnMotion: A Mobility Scenario Generation <strong>and</strong> Analysis Tool,” in 3rd International<br />
ICST Conference on Simulation Tools <strong>and</strong> Techniques, 2010.<br />
[20] X. Hong, M. Gerla, G. Pei, <strong>and</strong> C.-C. Chiang, “A Group Mobility Model for Ad Hoc<br />
Wireless Networks,” in 2nd ACM International Conference on Modeling, Analysis<br />
<strong>and</strong> Simulation of Wireless <strong>and</strong> Mobile Systems (MSWiM ’99), 1999.<br />
[21] T. Camp, J. Boleng, <strong>and</strong> V. Davies, “A Survey of Mobility Models for Ad Hoc<br />
Network Research,” Wireless <strong>Communications</strong> <strong>and</strong> Mobile Computing, vol. 2, no. 5,<br />
pp. 483-502, 2002.<br />
[22] K. Fall <strong>and</strong> K. Varadhan, The ns Manual, May 2010, available online at<br />
http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf; accessed 2012-07-26.
Spatial Localization of Radio Wave Emission Sources<br />
Using SDF <strong>Technology</strong><br />
Jan M. Kelner, Piotr Gajewski, Cezary Ziółkowski<br />
<strong>Military</strong> University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong>,<br />
{jkelner, pgajewski, cziolkowski}@wat.edu.pl<br />
Abstract: The paper is devoted to the question of locating of radio wave emission sources by using<br />
of SDF technology. The generalized algorithm to estimate the radio transmitter coordinates has been<br />
presented. The Doppler characteristics are the basis to determine the location coordinates of a source.<br />
They are obtained as the result of measuring of instantaneous frequency of a signal received on<br />
board of an airplane.<br />
Keywords: location techniques, Doppler shift, Signal Doppler Frequency (SDF), 3D localization<br />
I. Introduction<br />
The localization of mobile radio waves transmitters is more <strong>and</strong> more interesting<br />
service both for networks users of <strong>and</strong> for operators of Electronic Warfare<br />
(EW) systems. Many location techniques have been already studied <strong>and</strong> described,<br />
mainly [6]-[12]: CoO (Cell of Origin), AoA (Angle of Arrival), RSS (Received Signal<br />
Strength), TOA (Time of Arrival), TDoA (Time Difference of Arrival), GPS/A-GPS<br />
(Assisted GPS), FDoA (Frequency Difference of Arrival) as well as the so-called<br />
hybrid methods.<br />
Above methods have some advantages <strong>and</strong> disadvantages for using in practical<br />
systems. Mostly, the location in two dimensions (2D) is these methods main limitation.<br />
The article presents an idea of the method for location in 3D that use<br />
the values of signal Doppler shift which is measured on the mobile flying platform<br />
(helicopters, planes, drones).<br />
The SDF (Signal Doppler Frequency) technology [2] is based on the analytical<br />
description of the Doppler effect [1]. It uses the distinctive nature of Doppler curves<br />
resulting from the reciprocal location of signal sources <strong>and</strong> receiver in relation to<br />
the movement of the objects trajectory.<br />
Because of using the Doppler effect, the SDF method is compared to FDoA<br />
one. However, the SDF <strong>and</strong> FDoA methods present considerably different approaches<br />
to the location techniques. The possibility of object spatial 3D localizations<br />
is a main advantage of the SDF technology, which is presented below.
368 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Moreover, the main propriety of SDF method is its high precision as well as independency<br />
for the time-frequency structure of signals emitted by objects being<br />
localised. It gives the possibility to use the method universally <strong>and</strong> autonomously<br />
in numerous practical applications. Several applications of the SDF technology have<br />
been presented till now, among others in the area of: reconnaissance <strong>and</strong> electronic<br />
warfare, spectrum monitoring, sea <strong>and</strong> l<strong>and</strong> rescue, <strong>and</strong> navigation.<br />
II. Characteristic of SDF method<br />
The SDF technology bases on the analytical description of the Doppler frequency<br />
[1]. The expression describing the variability of the Doppler frequency<br />
has the following form [1]:<br />
k<br />
<br />
xvt<br />
<br />
f <br />
D<br />
x , t <br />
2<br />
k<br />
2<br />
f<br />
2 2 2 0<br />
1k xvt 1k y z<br />
<br />
, (1)<br />
<br />
<br />
where: k vc, – the difference of velocity between a signal source <strong>and</strong> the receiver,<br />
– the electromagnetic wave propagation speed in the medium, – the<br />
carrier frequency of the emitted signal, x xyz<br />
, , – coordinates of the signal<br />
source location.<br />
Above formula shows that the value of the Doppler frequency shift is a function<br />
of signal source location coordinates. This fact has become the essence of elaborated<br />
method is a measurement of the instantaneous value of the signal frequency<br />
by a moving measurement receiver. Basing on (1), particular coordinates x, y, z<br />
of the transmitter location can be determined as the functions of the Doppler<br />
frequency shift measured in various time moments. In the case, when the receiver<br />
is moving on a fixed height above the flat terrain, the coordinates are known <strong>and</strong><br />
fixed values. Making elementary transformations of the equation (1) we achieve<br />
formulas describing the coordinates x <strong>and</strong> y of the signal source [2]-[5]:<br />
<br />
<br />
x v tAt<br />
At<br />
<br />
<br />
tAt<br />
1 1 2 2<br />
At<br />
1 2<br />
, (2)<br />
y<br />
1<br />
1<br />
v<br />
t t At At <br />
<br />
<br />
1 2 1 2 2<br />
2<br />
<br />
k At1 At2<br />
<br />
2<br />
<br />
z<br />
, (3)<br />
where:<br />
2<br />
2<br />
1<br />
F t<br />
f <br />
D<br />
t 1k<br />
At , Ft k . (4)<br />
Ft<br />
f k<br />
So, in order to determine coordinates of signal source, it is necessary to measure<br />
the Doppler frequency value in two moments <strong>and</strong> . Therefore, it is<br />
0
Chapter 8: Localization Techniques<br />
369<br />
possible to determine locations of emitting radio wave sources during the receiver<br />
movement, basing on the measurement of the Doppler frequency shift.<br />
The idea of SDF 3D method is described below.<br />
III. SDF spatial localization method<br />
The algorithm of localization procedure is presented in the Fig. 1. The following<br />
simplifications were assumed in the analysed scenario [2]:<br />
• the signal generated by the localised transmitter is received at any point<br />
of the space where the localization st<strong>and</strong> (LS) is placed;<br />
• the localised signal source is immovable <strong>and</strong> it is placed on the flat Earth<br />
surface;<br />
• the LS is moving at a defined height over the Earth, what means that only<br />
the direct component is taken into account in the signal coming from<br />
the source to the receiver;<br />
• the operator of the LS knows the frequency of the signal transmitted<br />
by the localised source.<br />
Figure 1. Algorithm of the SDF spatial localization procedure
370 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Here, the several possible situations of localization using an aircraft are taken<br />
into account. They depend on the knowledge of an approximated direction for<br />
the transmitter. So, Algorithm contents three blocks. Block (A) corresponds to<br />
the situation, when the LS operator knows the approximated direction to the signal<br />
source. Block (B) is using if the LS operator does not know the approximated<br />
direction to the signal source, <strong>and</strong> the st<strong>and</strong> is moving in the direction, for which<br />
is not possible the coordination determining. And finally block (C) corresponds<br />
to the situation where the LS operator does not know the approximate direction<br />
to signal source, but he is able to determine transmitter coordinates x <strong>and</strong> y on<br />
the flying route.<br />
The task of part B is to define the precise coordinates of the transmitter using<br />
procedure Z, presented in the Fig. 2 [2].<br />
Figure 2. Illustration of Z-procedure<br />
The Z procedure is brought to define 3-phase flight route of LS between<br />
the points (1)→(2)→(3)→(4). In the first phase between the points (1)→(2), the ap-
Chapter 8: Localization Techniques<br />
371<br />
proximate transmitter’s coordinations can be determined. Knowing the approximated<br />
direction to the localised transmitter, it is possible to select a suitable flight<br />
direction within the first phase of the procedure Z. This direction should be established<br />
so that the Doppler frequency shift changed [2]. In the point (2), the change<br />
of the movement direction takes place in the OXY plane by the angle (Fig. 2)<br />
defined by the formula [2]:<br />
y<br />
s<br />
1 xy<br />
s<br />
arctg arccos<br />
xvt D<br />
xvt s<br />
arccos arccos ,<br />
D D<br />
xy<br />
where: 2 2<br />
D xvt y , s – the length of the route segment between point (2)<br />
xy<br />
<strong>and</strong> point (X) (Fig. 2), where the Doppler frequency is equal to zero.<br />
This phase of the Z procedure allows to achieve the coordinate values<br />
of the transmitter position with high accuracy. It is resulted from the suitable selection<br />
of the route where almost symmetrical part of the Doppler curve is achieved<br />
around the value of . The point (X) in the Fig. 2 is called the Point of the Closest<br />
Approach – PCA [12]. The selection of the length 2s of the route segment between<br />
the points (2)→(3) depends on the distance of the localization st<strong>and</strong> to the signal<br />
source. The question of selection of the measurement segment 2s is presented<br />
in the references [2,13]. In the point (3) the next change in the movement direction<br />
takes place in the plane OXY by the angle of (Fig. 2) described by formula [2]:<br />
xy<br />
xy<br />
(5)<br />
y ' <br />
vt ' x'<br />
<br />
2<br />
arctg<br />
<br />
y' 2 y'<br />
, (6)<br />
where: x',<br />
y', z ' – coordinates of the signal source position determined in the second<br />
phase of the procedure Z, – the time measured from the moment of changing<br />
the movement direction in the point (2), y' y ' – a factor responsible for the sign<br />
of the angle <strong>and</strong> providing the proper change of the direction (to the right or<br />
to the left) in the point (3).<br />
Within the third phase of the procedure Z the plane flights in the direction<br />
to the transmitter. The change in the direction for the route (3)→(5) (Fig. 2) is executed<br />
similarly to the point (2) of the procedure Z. The precise coordinate values<br />
of the source position are determined in this way.<br />
When the direction to the transmitter is not known <strong>and</strong> Doppler shift does not<br />
changed, the block (B) is worked out. Here, three situations can be distinguished:<br />
a) the st<strong>and</strong> moves away from the transmitter that is in a large distant from<br />
the receiver ( f <br />
D<br />
t fDmax<br />
),<br />
b) the st<strong>and</strong> moves closer to the transmitter, but is in a large distant from it<br />
( f <br />
D<br />
t fDmax<br />
),
372 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
c) the st<strong>and</strong> moves (closer or away) in small distant of the source, but the flight<br />
direction overlaps (with a margin) the direction to the signal source<br />
( f <br />
D<br />
t fDmax<br />
).<br />
The Fig. 2 presents an example of such situation by moving the LS between<br />
the points (6)→(7). Then, the diametrical change in the movement direction is required<br />
in the plane OXY by the angle of ±90° related to the present movement<br />
direction. Next, the procedure Z is executed. The segment (7)→(2) corresponds to<br />
the (1)→(2) one in the procedure Z as for the situation (A).<br />
The last block (C) corresponds to the situation where the LS operator does<br />
not know the approximate direction to signal source, but he is able to determine<br />
coordinates x <strong>and</strong> y of the source position on the route of his movement (the segment<br />
(1)→(2) in the Fig. 2. The coordinate y is then defined ambiguously. It is not<br />
known if the signal source is on the right or on the left side of the LS movement<br />
trajectory (the segment (1)→(2) in the Fig. 2). Therefore, the LS direction change<br />
in the point (2) can be done in the incorrect direction. In such a case, the movement<br />
of the receiver in the direction (2)→(8) will cause that f <br />
D<br />
t fDmax<br />
. The return<br />
(8)→(2) <strong>and</strong> further continuation of the flight according to the procedure Z is required<br />
in such situation.<br />
IV. Simulation results<br />
The SDF method was verified by simulations <strong>and</strong> measurements for 2D localization.<br />
Some results have been presented in [4],[5]. The procedure Z has been<br />
positively verified by simulation tests for the rescue action scenario [14]. Some<br />
simulation results are presented below.<br />
Figure 3. Simulation scenario
Chapter 8: Localization Techniques<br />
373<br />
Fig. 3 shows the simulation scenario <strong>and</strong> the flight trajectory in 2D. The aircraft<br />
position is in geographical UMT st<strong>and</strong>ard. At the top, the positioning accuracy<br />
results obtained for the point F is shown. This is the point with the best accuracy<br />
of location because of the most distinguish change of Doppler frequency (Fig. 4).<br />
Figure 4. Doppler frequency courses<br />
Figure 5. Localization accuracy<br />
The r localization accuracy is shown in Fig. 5. The best results are obtained<br />
during the flight in sector EF, after few changes of flight route.<br />
V. Summary<br />
The paper shows the possibility of using the space platform to spatial localization<br />
of the radio emission sources (both stationary <strong>and</strong> movable).<br />
The SDF method in the spatial localization can find wide applications in air <strong>and</strong><br />
sea rescue systems as well as in national security agencies. Installing the localization
374 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
st<strong>and</strong> on helicopters <strong>and</strong> aircrafts increases the range <strong>and</strong> accuracy of the method<br />
in relation to the ground localization.<br />
The exact characteristics of this method, the many experiments should be<br />
worked out. At present, the preparations are in progress to develop the new research<br />
project. Within this grant it is expected to carry out researches <strong>and</strong> the attempt<br />
to implement the SDF technology on an aircraft from the Navy Sea Rescue Unit.<br />
The expected better precision of the Doppler localization method in the case<br />
of placing the localization st<strong>and</strong> on aircraft than placed on l<strong>and</strong> vehicles allows<br />
to infer of high capacities of the method, which can be also used for air navigation,<br />
particularly within aircraft l<strong>and</strong>ing systems in reduced visibility conditions.<br />
The possibility to use the SDF method to navigation purposes is presented, among<br />
others, in [2],[13].<br />
References<br />
[1] J. Rafa, C. Ziółkowski, “Influence of transmitter motion on received signal parameters<br />
– Analysis of the Doppler effect”, Wave Motion, vol. 45, no. 3, pp. 178-190, January<br />
2008.<br />
[2] J.M. Kelner, Analiza dopplerowskiej method lokalizacji źródeł emisji fal radiowych<br />
(Analysis of the Doppler location method of the radio waves emission source),<br />
Ph.D. thesis, <strong>Military</strong> University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong>, 2010, (in Polish).<br />
[3] P. Gajewski, J.M. Kelner, C. Ziółkowski, “Subscriber location in radio communication<br />
nets”, Journal of Telecommunications <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>, no. 2, pp. 88-92,<br />
2008.<br />
[4] J.M. Kelner, C. Ziółkowski, L. Kachel, “The empirical verification of the location<br />
method based on the Doppler effect”, 17th International Conference on Microwaves,<br />
Radar <strong>and</strong> Wireless <strong>Communications</strong> MIKON 2008, Wroclaw, Pol<strong>and</strong>, vol. 3, pp. 755-758,<br />
May 2008.<br />
[5] P. Gajewski, C. Ziółkowski, J.M. Kelner, “Mobile location method of radio wave<br />
emission sources”, Progress in Electromagnetics Research Symposium PIERS 2009,<br />
Moscow, Russia, August 2009.<br />
[6] A. Amar, A.J. Weiss, “Localization of narrowb<strong>and</strong> radio emitters based on<br />
Doppler frequency shifts”, IEEE Transactions on Signal Processing, vol. 56, no. 11,<br />
pp. 5500-5508, 2008.<br />
[7] Y. Zhao, “St<strong>and</strong>ardization of mobile phone positioning for 3G systems”, IEEE<br />
<strong>Communications</strong> Magazine, vol. 40, no. 7, pp. 108-116, 2002.<br />
[8] M. Vossiek, L. Wiebking, P. Gulden, J. Wieghardt, C. Hoffmann, P. Heide,<br />
“Wireless local positioning”, IEEE Microwave Magazine, vol. 4, no. 4, pp. 77-86, 2003.<br />
[9] I.J. Gupta, “Stray signal source location in far-field antenna/RCS ranges”, IEEE<br />
Antennas <strong>and</strong> Propagation Magazine, vol. 46, no. 3, pp. 20-29, 2004.<br />
[10] A. Küpper, Location-based services. Fundamentals <strong>and</strong> operation, John Wiley & Sons,<br />
Chichester, UK, 2005.
Chapter 8: Localization Techniques<br />
375<br />
[11] K.W. Kołodziej, J. Hjelm, Local positioning system. LBS applications <strong>and</strong> services,<br />
CRC Press, Boca Raton, FL, USA, 2006.<br />
[12] N. Levanon, M. Ben-Zaken, “R<strong>and</strong>om error in ARGOS <strong>and</strong> SARSAT satellite<br />
positioning systems”, IEEE Transaction on Aerospace <strong>and</strong> Electronic System, vol. AES-21,<br />
no. 6, pp. 783 790, 1985.<br />
[13] P. Gajewski, C. Ziółkowski, J.M. Kelner, “Influence of length <strong>and</strong> location<br />
of the measurement route on location accuracy of the radio waves sources using<br />
the SDF method”, Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne,<br />
vol. LXXXIII, no. 8-9, pp. 1360-1369, August-September 2010 (in Polish).<br />
[14] C. Ziółkowski, J.M. Kelner, “Using the Doppler methodology for object location<br />
estimation in lifeboat service”, 6th International Conference on: Perspectives <strong>and</strong><br />
Development of Rescue, Safety <strong>and</strong> Defence Systems in the 21st Century RSDS 2008,<br />
Gdansk, Pol<strong>and</strong>, June 2008.
On the Effect of Tuner Phase Noise<br />
on TDOA Measurements<br />
Anders M. Johansson, Patrik Hedström<br />
Swedish Defence Research Agency, Linköping, Sweden,<br />
{ajh, pathed}@foi.se<br />
Abstract: Radio geolocation of unknown signals using time difference of arrival techniques is dependent<br />
on signal measurements that are recorded using a time <strong>and</strong> frequency coherent measurement<br />
system. This paper investigates what effect the phase noise in the reference oscillator inside the tuner<br />
has on the geolocation accuracy, <strong>and</strong> proposes a model for the phase noise in addition to a method<br />
for counteracting its effect. The results include both real world measurements <strong>and</strong> computer simulations.<br />
Results from a field experiment indicate that the proposed method outperforms traditional<br />
time difference of arrival techniques by a factor between 3 <strong>and</strong> 5.8 depending on SNR.<br />
1. Introduction<br />
Time difference of arrival (TDOA) techniques for geolocation of unknown<br />
signals has been researched within acoustics since the First World War [1]. In later<br />
years systems for measuring the TDOA on radio signals has been developed <strong>and</strong><br />
a few military systems based on TDOA techniques are in use today. One problem<br />
when dealing with narrow b<strong>and</strong> signals or signals with poor signal to noise ratio<br />
(SNR) is that long measurement times are required to reach sufficient TDOA<br />
accuracy. This can easily be seen by studying the Cramer-Rao Bound (CRB),<br />
for details see [2]. In particular, narrow b<strong>and</strong> signals with poor SNR requires<br />
measurement times exceeding one second in order to reach sufficient accuracy.<br />
In this paper we show that phase noise in the reference oscillator used in the radio<br />
receivers impacts negatively on the accuracy of TDOA estimation. Furthermore,<br />
we present a method for modeling the phase noise, <strong>and</strong> results from a real world<br />
field trial. The results are presented using both real measurements <strong>and</strong> computer<br />
simulations. A method for counteracting the problems arising from the phase<br />
noise is also presented.<br />
Section 2 presents a signal model <strong>and</strong> an oscillator model, followed by a description<br />
of the TDOA algorithm including modifications to counteract the phase<br />
noise in Section 3. Measurements <strong>and</strong> simulations are presented in Section 4, <strong>and</strong><br />
conclusions in Section 5.
378 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
2. Signal models<br />
Assume a b<strong>and</strong> limited signal st (), where denotes time, transmitted from<br />
a position in space, impinge on a group of receivers placed in the positions<br />
, m{1, 2, , M}<br />
, see Figure 1. By comparing the received base b<strong>and</strong> signals x m()<br />
t ,<br />
the TDOA algorithm can be used to form an estimate ˆ of the transmitter position.<br />
Figure 1. System model<br />
The propagation channel from to is denoted hm<br />
() t <strong>and</strong> is considered to<br />
be stationary over the measurement time . At each receiver, the received signal<br />
is corrupted by noise denoted vm()<br />
t , which is considered spectrally white, time<br />
invariant <strong>and</strong> uncorrelated between the receivers. The modulation frequency is denoted<br />
<strong>and</strong> the signal b<strong>and</strong>width . The local oscillator of the receiver is assumed<br />
to be unstable with the phase noise m()<br />
t . The signal chain from the transmitter<br />
to receiver is depicted in Figure 2. The received signal is:<br />
<br />
( ( ))<br />
() () j c<br />
t m<br />
t<br />
m m<br />
* ()<br />
Bm<br />
(),<br />
<br />
x t h te st v t<br />
(1)<br />
where denotes convolution. The above equation shows that the output signal,<br />
x () m<br />
t , from the receiver is a demodulated version of the system impulse response<br />
convolved with the transmitted base b<strong>and</strong> signal.<br />
The base b<strong>and</strong> noise term, vBm()<br />
t , in Equation (1) is [3]:<br />
<br />
v t v jH v<br />
(2)<br />
<br />
<br />
( c m( ))<br />
() e j t t<br />
Bm m m<br />
,<br />
where H () denotes the Hilbert transform.
Chapter 8: Localization Techniques<br />
379<br />
Figure 2. Signal model<br />
2.1. Free space propagation<br />
Assuming free space propagation without attenuation, the propagation channel<br />
simplifies to a pure delay hm() t ( t m)<br />
, where is the propagation delay<br />
in seconds between the transmitter <strong>and</strong> receiver , <strong>and</strong> is calculated according to:<br />
<br />
m<br />
m<br />
q<br />
p ,<br />
(3)<br />
c<br />
where denotes vector norm, <strong>and</strong><br />
the speed of light.<br />
2.2. Oscillator phase noise<br />
The model for phase noise is here defined as flicker noise denoted m()<br />
t<br />
added to the centre frequency of the reference oscillator. Typically this noise is what<br />
causes Allan variation [4].<br />
() t t (), t<br />
(4)<br />
where<br />
m f m<br />
is the noise power. The power spectral density (PSD) of the flicker noise<br />
m()<br />
t 1N<br />
f<br />
. Both <strong>and</strong> are oscillator specific constants,<br />
where oscillators with high precision typically have a low value of <strong>and</strong> a high<br />
value of <strong>and</strong> vice versa. Several numerical methods for simulating flicker noise<br />
have been presented in the literature, the method used here is a fast Fourier transform<br />
(FFT) based method called “the discrete spectrum method”, <strong>and</strong> is described<br />
in [5]. Section 4.1 presents a method for estimating the constants <strong>and</strong> for<br />
a real oscillator.<br />
As the power of the flicker noise is concentrated at very low frequencies, it is<br />
possible to model the oscillator as stable with a phase offset for short measurement<br />
times. A simplified model for the noise for short measurement times is<br />
() t (), t<br />
(5)<br />
m<br />
where <br />
m( t ) is a constant over tTs<br />
/2 t t Ts<br />
/2for small values of the measurement<br />
time . Note that due to the phase noise, the phase offset can be assumed<br />
to vary between measurements.<br />
m
380 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
3. The TDOA algorithm<br />
The TDOA algorithm estimates the position of the transmitter by identifying<br />
the time difference of arrival between all receiver pairs. This can be done either in the time<br />
domain or in the frequency domain, by analysing the cross correlation or the cross<br />
spectral density (CSD) between the received signals. To study the effect of phase noise,<br />
we have here chosen the frequency domain approach described in [6].<br />
Using Equation (1) the CSD between the receivers <strong>and</strong> for free space<br />
propagation is derived as<br />
R ( , t) E x *<br />
tx()<br />
t<br />
(6)<br />
xm, n 0<br />
m n<br />
<br />
*<br />
j( m( t0) n( t0))<br />
Hm( c) Hn( c) Rs( )e <br />
R ( ) vm n<br />
(7)<br />
( )( ) ( ( 0 ) ( 0<br />
( )e j c mn m n<br />
e j t <br />
R<br />
t ))<br />
s<br />
Rvm,<br />
n( ),<br />
(8)<br />
for short measurement times. In the above equation, <br />
denotes Fourier transform<br />
<strong>and</strong> E <br />
is the expected value operator, () denotes complex conjugate,<br />
Hm( ) hm()<br />
t , Rs<br />
( ) is the PSD of the transmitted signal st () <strong>and</strong> Rvm n( )<br />
is the CSD between the noise in xm()<br />
t <strong>and</strong> xn()<br />
t .<br />
To estimate the TDOA we remove the influence of constant phase terms according<br />
to<br />
R<br />
( , t )<br />
xm, n 0<br />
xm, n<br />
( , t0)<br />
<br />
Rxm, n<br />
(0, t0)<br />
(9)<br />
R<br />
<br />
j( mn)<br />
e ,<br />
(10)<br />
where we have made the assumption that Rs( ) / Rs(0) 1without loss of generality,<br />
<strong>and</strong> the measurement time is sufficient such that the approximation Rvm n( ) 0<br />
can be made. The above equation shows that the phase reveals the TDOA:<br />
mnm n. By calculating estimates ˆ mn of the TDOA for multiple receiver<br />
pairs it is possible to solve for the transmitter position using Equation (3). Estimating<br />
is however not the focus of this paper, the rest of the paper will therefore<br />
concentrate on the two receiver case to highlight the effect of oscillator instability.<br />
In a practical application the CSD is estimated by sampling the time signals<br />
at the sample frequency , xm() t xm( n/ Fs)<br />
where , <strong>and</strong> splitting them<br />
into element segments<br />
L<br />
xm n k k<br />
<br />
R ( ) X ( , m) X ( , n),<br />
(11)<br />
where X ( k<br />
, m ) is the th FFT bin of sensor <strong>and</strong> signal segment .
Chapter 8: Localization Techniques<br />
381<br />
TF<br />
s s<br />
By studying Equation (11), we find that for low values of , i.e. when L ,<br />
K<br />
the approximation made in Equation (5) holds, <strong>and</strong> the phase is stable over the<br />
segments. A problem does however arise when the SNR is poor or when very<br />
high SNR levels are required. In these cases the value of must be large to reduce<br />
the impact of the noise on the TDOA estimate. From Equation (8) we can see that<br />
by adding components with different phase ( m( t) n( t ) will be different for different<br />
values of ) the effective SNR will drop as increases. As a result the TDOA<br />
estimation accuracy also drops as the measurement time increases.<br />
The solution to the problem is simply to estimate the TDOA mn()<br />
t over<br />
multiple short time samples whereby a simple incoherent data fusion (IDF) can be<br />
performed using time averaging:<br />
T<br />
ˆ 1<br />
<br />
() t<br />
(12)<br />
mn , mn ,<br />
T<br />
t 1<br />
The measurement time used to calculate each TDOA estimate, mn()<br />
t , is less<br />
than . The resulting algorithm is here denoted IDF-TDOA.<br />
4. Measurements<br />
4.1. Oscillator modeling<br />
The oscillator parameters <strong>and</strong> were estimated using the experimental<br />
setup depicted in Figure 3. The experiment was designed to make it possible to<br />
measure oscillator parameters without using a stable frequency reference. The input<br />
for the experimental setup was a signal generator <strong>and</strong> the signal was received <strong>and</strong><br />
saved to mass storage using a custom built data acquisition system. The signal<br />
generator was adjusted to a frequency 1 kHz above the tuning frequency for<br />
the two tuners.<br />
A simulation of the measurement setup was made in order to determine<br />
the flicker noise parameters. The PSD of the output signal yn ( ) for the measurement<br />
<strong>and</strong> the simulation setup is depicted in Figure 4. The measurement time was 30 s.<br />
The oscillator parameters were experimentally determined to be <br />
f<br />
0.0008<br />
<strong>and</strong> N = 3.8. The figure clearly show the low frequency characteristic of the flicker<br />
noise in the oscillator.
382 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 3. Experimental setup for evaluating oscillator stability<br />
Figure 4. PSD for simulation <strong>and</strong> experiment setup
Chapter 8: Localization Techniques<br />
383<br />
4.2. TDOA accuracy<br />
In order to investigate the effect of oscillator instability on TDOA estimation<br />
for varying measurement times the signal generator in Figure 3 was replaced by<br />
a vector signal generator generating a 10 kHz wide 8-PSK signal. In the experiment,<br />
independent white noise was added to the signal in the digital domain to study<br />
the effect of varying SNR. In Figure 5, the st<strong>and</strong>ard deviation in micro seconds<br />
is displayed as a function of measurement time for SNR levels of 65 dB, 25 dB <strong>and</strong><br />
5 dB, along with the CRB <strong>and</strong> the measurement system accuracy for TDOA <strong>and</strong><br />
IDF-TDOA. The constants <strong>and</strong> L 32 . The CRB is displayed for 5 dB <strong>and</strong><br />
25 dB SNR levels only. The st<strong>and</strong>ard deviation is estimated by calculating an estimate<br />
of the TDOA on 490 data segments drawn from 400 seconds of recorded data.<br />
The figure shows that the oscillator noise reduces the accuracy for long measurement<br />
times for traditional TDOA while the proposed IDF-TDOA is unaffected by<br />
the oscillator instability for long measurement times.<br />
Figure 5. St<strong>and</strong>ard deviation in micro seconds versus measurement time for TDOA <strong>and</strong> IDF-TDOA<br />
on measured signals. The red line shows the measured accuracy inherent to the system, <strong>and</strong> the black<br />
dotted lines the CRB. Note that the CRB is only displayed for 5 dB <strong>and</strong> 25 dB SNR<br />
The experiment described above was repeated in a simulated environment<br />
where the oscillator phase noise parameters estimated in Section 4.1 were used.<br />
The results are displayed in Figure 6. By comparing the results presented in Figure 5<br />
<strong>and</strong> 6 it becomes obvious that it is the phase noise that is causing the observed<br />
errors, <strong>and</strong> no other tuner parameter such as linearity or noise.
384 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
4.3. Results from a field experiment<br />
A field experiment was conducted in order to test the IDF-TDOA under real<br />
world conditions. A transmitter emitting a 10 kHz wide 8-PSK modulated pseudo<br />
r<strong>and</strong>om sequence centered at 306 MHz was recorded for 15.9 s. The transmitter<br />
output power was varied to achieve four different signal to noise ratios at the receivers.<br />
The distance between the receivers <strong>and</strong> the transmitter was around 5 km,<br />
<strong>and</strong> the experiment was conducted in an urban environment. The result for TDOA<br />
<strong>and</strong> IDF-TDOA is tabulated in Table 1 along with the CRB. The table shows that<br />
IDF-TDOA improves the accuracy by a factor of 3 to 5.8 depending on the SNR.<br />
The table also shows that the error is far above the CRB. The reason for this will<br />
however require further scrutiny <strong>and</strong> is beyond the scope of this paper.<br />
Table 1. TDOA st<strong>and</strong>ard deviation in micro seconds versus SNR<br />
SNR TDOA IDF-TDOA CRB<br />
30 0.6 0.2 0.002<br />
20 0.7 0.2 0.005<br />
10 1.5 0.3 0.02<br />
0 8.7 1.5 0.06<br />
5. Conclusions<br />
This paper investigates the effect of oscillators phase noise in tuners used for<br />
TDOA based radio geolocation of unknown signals. The presented theoretical<br />
study shows that the phase noise causes an effective decrease in the SNR if the rate<br />
of frequency change caused by the phase noise exceeds the measurement time. These<br />
results are used to propose a modification to the TDOA algorithm, <strong>and</strong> the final<br />
algorithm is denoted IDF-TDOA.<br />
Measurements on a tone using two tuners are used to estimate the spectral<br />
contents of the phase noise. The measured spectrogram is used to calibrate an FFT<br />
based phase noise model.<br />
Measurements on noise using the two tuners are used to investigate the effect<br />
of phase noise on TDOA estimation. The measurements are compared to the simulations<br />
<strong>and</strong> to the CRB. A comparison between the simulations <strong>and</strong> the measurements<br />
shows that it is the phase noise causing performance degradations.<br />
The paper is concluded with results from a field trial showing the effectiveness<br />
of the proposed new IDF-TDOA algorithm under real world conditions. The new<br />
algorithm outperforms traditional TDOA with respect to accuracy by a factor<br />
of 3 to 5.8 depending on the SNR.
Chapter 8: Localization Techniques<br />
385<br />
Figure 6. St<strong>and</strong>ard deviation in micro seconds versus measurement time for TDOA<br />
<strong>and</strong> IDF-TDOA on simulated signals. The black dotted lines shows the CRB. Note that the CRB<br />
is only displayed for 5 dB <strong>and</strong> 25 dB SNR<br />
References<br />
[1] D.H. a. D.D.E. Johnsson, Array Signal Processing: Concepts <strong>and</strong> Techniques, Upper<br />
Saddle River, New Jersey 07458: Prentice-Hall Inc., 1993.<br />
[2] W.R. a. T.S.A. Hahn, ”Optimum Processing for Delay-Vector Estimation in Passive<br />
Signal Arrays,” IEEE Transactions on <strong>Information</strong> THeory, vol. 19, nr 5, pp. 608-614,<br />
1973.<br />
[3] A. a. C.P.B. a. R.J.C. Carlson, Communication Systems, An introductions to signal<br />
<strong>and</strong> noise in electrical communication, Fourth edition, Mc Graw Hill, 2002.<br />
[4] W.J. Riley, H<strong>and</strong>book of frequency stability analysis, Boulder, COlorado U.S.<br />
Department of Commerce: National Institute od St<strong>and</strong>ards <strong>and</strong> <strong>Technology</strong>, 2008.<br />
[5] C.A. Greenhall, ”FFT-Based Methods for Simulatin Flicker (FM),” 34th Annual<br />
Precise Time <strong>and</strong> Time Interval (PTTI) Meeting, pp. 481-491, November 2002.<br />
[6] C.K. a. G. Carter, ”The generalized correlation method for estimation of time<br />
delay,” IEEE Transactions on Acoustics, Speech <strong>and</strong> Signal Processing, vol. 24, nr 4,<br />
pp. 320-327, 2003.
Aircraft Tracking Using Mobile Devices<br />
Michał Andrzejewski 1 , Radosław Schoeneich 2<br />
1<br />
Institute of Control <strong>and</strong> Computation Engineering, 2 Institute of Telecommunications,<br />
Warsaw University of <strong>Technology</strong>,<br />
M.Andrzejewski@stud.elka.pw.edu.pl, R.Schoeneich@tele.pw.edu.pl<br />
Abstract: The following article presents an overview of airship tracking system using mobile devices<br />
equipped with GPS receiver, running under Android operating system. It describes general approach,<br />
usage of store, carry <strong>and</strong> forward paradigm in delay <strong>and</strong> disruption tolerant networking <strong>and</strong><br />
elements of architecture <strong>and</strong> implementation of presented applications. Shown results represent tests<br />
run in real environment.<br />
Keywords: tracking, monitoring, general aviation, aircraft, disruption tolerant network, DTN<br />
I. Introduction<br />
The dynamic development of mobile devices <strong>and</strong> navigation systems in recent<br />
years has introduced many new everyday services. Among the most commonly<br />
used are location <strong>and</strong> remote monitoring. Their potential was quickly spotted by<br />
industries related to the transport <strong>and</strong> logistics, where knowledge about the current<br />
position <strong>and</strong> status of objects such as vehicles <strong>and</strong> packages is often a key factor<br />
in the success of the operation.<br />
The main task of the monitoring system is to provide reliable information<br />
about the position of tracked objects. This information can be interpreted <strong>and</strong><br />
used in different ways, depending on current needs. In general, however, it serves<br />
two basic purposes: to increase safety <strong>and</strong> to improve efficiency. Location data<br />
are widely used in planning <strong>and</strong> decision support systems, fleet management <strong>and</strong><br />
emergency assistance.<br />
Unfortunately, despite the continuous development of systems of various<br />
complexity, there is still no good solution that could be used to monitor general<br />
aviation aircraft. For commercial <strong>and</strong> military aviation, there are several extensive<br />
technical capabilities, such as primary or secondary surveilance radars or satellite<br />
systems capable to track objects in real time with very high accuracy. However,<br />
the cost of such solutions disqualifies them from usage in general aviation flying<br />
clubs, flight schools <strong>and</strong> by private users.
388 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Key idea of this article is to consider popular mobile devices (such as smartphones,<br />
tablets, Personal Digital Assistants) as a reliable source of location data<br />
<strong>and</strong> their usage in real application.<br />
II. Environment<br />
General aviation aircraft are moving in the sky at various altitudes <strong>and</strong> with<br />
different speeds, depending on the type of an airship, airspace category or purpose<br />
of the flight. However, assumption can be made that the vast majority of flights take<br />
place at an altitude up to 1000 m above the ground level at speeds not exceeding<br />
250 km/h. Flight paths at such altitude can be set freely, but near the airports some<br />
constraints <strong>and</strong> obligations to accurately proceed between specified points exist.<br />
General aviation flights may run across areas with different levels of urbanization,<br />
<strong>and</strong> at potentially large scale of height above ground level. This means that<br />
the use of GSM mobile network to monitor the aircraft may be inefficient or even<br />
impossible. This is due to cellular antennas settings. Additionally, the level of noise<br />
<strong>and</strong> interference caused by signals from nearby stations raises with the altitude.<br />
In practice, however, very often even at the height of up to 1500 meters mobile<br />
network is available, <strong>and</strong> quality of connection allows data transmission. Making<br />
a voice call is however not possible at this altitude. This makes an opportunity<br />
of creating simple tracking system based on GSM-capable devices <strong>and</strong> data transmission<br />
provided by mobile telephony operators. Results obtained in this field are<br />
presented later in this article.<br />
The environment in which flights are made, is a challenge for active position<br />
monitoring systems. Continuity <strong>and</strong> quality of data transmission becomes a major<br />
issue. Direct use of GSM network as a way to transmit information related to<br />
the location may not give expected results in terms of reliability <strong>and</strong> availability.<br />
This is an area where algorithms developed for use in incoherent networks may be<br />
applied. Their essence is to enable operation in the harsh environment of unknown<br />
characteristics.<br />
III. Subject of research<br />
The main task <strong>and</strong> also the source of the biggest problems of active monitoring<br />
systems is to develop a suitable method for data transmission. Such method,<br />
consisting of software <strong>and</strong> technology, should provide high availability <strong>and</strong> reliability.<br />
In the perfect case, monitored object should always have the possibility<br />
of an effective data transmission.<br />
The research, which became the basis for this article was focused on:<br />
• exploring the possibilities of using mobile devices <strong>and</strong> GSM networks to<br />
keep track of general aviation aircraft,
Chapter 8: Localization Techniques<br />
389<br />
• testing <strong>and</strong> evaluating prototype of aircraft tracking system in a real environment,<br />
• identification of advantages <strong>and</strong> disadvantages of the proposed solution,<br />
• proposing possible directions of development <strong>and</strong> improvement of the system.<br />
During the developement of an aircraft monitoring system, the natural<br />
choice was to provide transmission using wireless communications. The concept<br />
of the satellite communication solutions was rejected because of their high cost.<br />
Emphasis has been placed on technologies directly offered by mobile devices with<br />
data transmission over GSM network in particular. Fig. 1 presents the basic scenario<br />
where proposed system, in addition to direct communication between the aircraft<br />
<strong>and</strong> data collection server, uses also the paradigm of data storage <strong>and</strong> forwarding.<br />
This approach, commonly referred to as a store-carry-forward paradigm, is specific<br />
to delay <strong>and</strong> disruption tolerant networks. The aircraft marked as SP1 is out<br />
of GSM coverage, so it can not send data on the position in a direct way. Using<br />
a wireless network, it communicates <strong>and</strong> exchanges all necessary information<br />
with the aircraft marked as SP2. The aircraft SP2 can then forward information<br />
regarding both objects to the server collecting data. The system has information<br />
about the positions of both vessels despite the fact that SP1 is not in a GSM range<br />
to establish a direct connection.<br />
Figure 1. Wireless data transmission scenario<br />
Wireless communication channel between objects must meet the following<br />
conditions for its use in the proposed system to be possible:<br />
• time required to estabilish two-way communication channel <strong>and</strong> its effective<br />
range should allow data exchange between aircraft flying in opposite<br />
directions at speeds of around 150 km/h,<br />
• each pair of nodes using appropriate software should be able to connect<br />
automatically in the same way,<br />
• estabilishing the connection shouldn't require any additional operations<br />
from the user.
390 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Lack of any of these features reduces the area of application of wireless communication<br />
between the aircraft <strong>and</strong> makes it difficult to achieve given functionality.<br />
A. Architecture of aircraft tracking system<br />
The system this research has been based on is divided into two parts, performing<br />
distinct functions <strong>and</strong> embedded in different environments, as shown<br />
in the Fig. 2. It separates two basic areas of functionality – one related to the collection<br />
<strong>and</strong> transmission of data carried by the mobile application, <strong>and</strong> the other responsible<br />
for their analysis <strong>and</strong> visualization using an application server. It was a natural approach,<br />
given the purpose <strong>and</strong> the use of both items supplied in two applications.<br />
Figure 2. Aircraft tracking system architecture<br />
Mobile devices transmit files to an FTP server using the best currently available<br />
mean of communication. This can be a 2G/3G mobile network, Wi-Fi or another,<br />
depending on the particular device. If estabilishment of a direct connection<br />
to a remote server hosting the data is impossible due to lack of network coverage,<br />
high levels of noise, latency, or other actual problems, the application uses the storecarry-forward<br />
paradigm <strong>and</strong> gathers data locally. At a time when it is again possible<br />
to transfer data to another node, the device acts as discussed before.<br />
An attempt to transfer data to the server is controlled by an event timer –<br />
the expiration of the specified period of time since the last attempt to send or other<br />
parameters associated with the flight.<br />
Before a file is put on the FTP server, its validity is checked, <strong>and</strong> the transmission<br />
is performed only when attempting to send a file containing more data<br />
than the former. This allows nodes that are willing to send data less accurate<br />
than those already stored on the server not to overwrite <strong>and</strong> lose them.
Chapter 8: Localization Techniques<br />
391<br />
In order to simplify whole process <strong>and</strong> increase the reliability of data exchange<br />
between system elements, it was decided to use one common data model. This allows<br />
the system architecture as a whole to remain open, since all it requires is that<br />
the source data have a specific format.<br />
Usage of database management systems was rejected <strong>and</strong> flat text files in a specified<br />
comma separated values format were used instead. This reduces the requirements<br />
for the server, simplifies the implementation <strong>and</strong> developement of the solution <strong>and</strong><br />
allows further analysis using common tools. Text files can still be imported <strong>and</strong><br />
stored in a database when necessary.<br />
B. Technical limitations<br />
Available methods for wireless connectivity between mobile devices are limited<br />
to two common st<strong>and</strong>ards: IEEE 802.15.1 (Bluetooth) <strong>and</strong> Wi-Fi.<br />
The first one has too short range in order to be used for communication between<br />
aircraft in flight. For this purpose it is necessary to estabilish an effective connection<br />
between the devices in a distance of at least 300 meters, while Bluetooth allows<br />
efficient transmission at a distance several times smaller. In addition, the process<br />
of finding neighboring nodes using this method can take tens of seconds. The use<br />
of Bluetooth in incoherent networks is possible, but requires distances between<br />
nodes to be small, as well as their relative speeds [1].<br />
Use of Wi-Fi networking was a natural choice. Despite the low power of transmitters<br />
mounted in mobile devices, it was possible to connect two nodes within a distance<br />
of about 200 meters apart in the open area. One of the devices, the Samsung<br />
Galaxy tablet, worked as an access point, while the second – LG-GT540 mobile<br />
phone – as a client. This combination allowed a stable exchange of data at speeds<br />
of about 100 kbps. Unfortunately, the long time needed to set up an access point <strong>and</strong><br />
then to connect the other device (in this particular case – a total of more than 45<br />
seconds) <strong>and</strong> the need for manual adjustment of connection parameters prevented<br />
this method from the application in the system.<br />
In the course of the work it was discovered that the mobile device platform<br />
capabilities are insufficient to meet all the required functionality. The main limitation<br />
was the lack of ability to automatically establish a wireless connection in adhoc<br />
mode between devices without user intervention. This feature is essential<br />
for establishing a connection in an incoherent network <strong>and</strong> the exchange of data<br />
between nodes. Application Programming Interface of Android operating system<br />
used in experiments does not support such mechanism, nor is it possible to emulate.<br />
There is also no documentation on this issue available.<br />
Further studies show that the mechanism for supporting automatic wireless<br />
connections between mobile devices is not available on any other of the popular<br />
platforms.
392 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Therefore, it was impossible to verify <strong>and</strong> evaluate inconsistent network<br />
performance in practice. The actual implementation required from the operating<br />
system <strong>and</strong> the mobile device functionality, which it was not able to provide. Perhaps<br />
in the future, with the development in this field of technology, this will become<br />
possible. After examining the possibility to connect the devices during the flight<br />
(discussed further in the next section) it was decided to ab<strong>and</strong>on the functionality<br />
associated with the use of incoherent network in the proposed system.<br />
IV. Tests <strong>and</strong> results<br />
An important element of the work was to conduct several series of tests, not<br />
only to check the correctness of the implemented system, but also its usefulness<br />
in proposed applications. Results were used to verify presented concepts <strong>and</strong> theoretical<br />
considerations in actual, real environment.<br />
Tests in the target environment were divided into three stages. In the first,<br />
a prototype of mobile application was used. It was able to collect environmental<br />
data, such as the GSM signal strength, network mode, the height <strong>and</strong> position<br />
of the airship, etc. In addition, the aircraft was equipped with a second instrument<br />
– Garreht Volkslogger – which is a logger device certified by the International Air<br />
Sports Federation used to record position in gliding competitions. At this stage,<br />
the ability to perform data transmission using the GSM network at different heights<br />
was verified. Another income was the examination of GPS receiver accuracy by<br />
reference to the indications presented by the certified device. This part of the test<br />
was conducted in May <strong>and</strong> June 2011.<br />
The second step was to test the basic, working implementation of aircraft<br />
monitoring system between July <strong>and</strong> October 2011. The system was used to monitor<br />
the position of student pilots <strong>and</strong> pilots during training in the area of Warsaw-<br />
Babice airfield.<br />
The last stage completed in November 2011 was to test the operation of the system<br />
in the mountainous region. Differences in system’s behavior were identified <strong>and</strong><br />
investigated basing on analysis of data collected during the flights in the vicinity<br />
of Bezmiechowa. Some additional opportunities for air-to-ground communications<br />
were diagnosed.<br />
A. Collecting data about environment<br />
Fig. 3 shows the altitude above mean sea level <strong>and</strong> GSM signal strength<br />
during one of the flights. The value of the signal strength equal to -113 dBm<br />
is identified as the inability to connect to the network. Data were sampled with<br />
a period of 30 seconds.<br />
Obtained results differed significantly from what was expected. It was anticipated<br />
that the range of the GSM network will be unavailable for much of the flight because
Chapter 8: Localization Techniques<br />
393<br />
of the altitude <strong>and</strong> its characteristics. Data collected during the first test flights, however,<br />
revealed that GSM network was available up to a height of about 1400 meters<br />
above terrain at urban areas throughout the duration of the flight. This is the result<br />
of reflection <strong>and</strong> reinforcement of radio waves from the ground, buildings, etc.<br />
Figure 3. Altitude <strong>and</strong> GSM signal strength correlation<br />
Position samples collected by the mobile device does not differ significantly<br />
from those provided by a professional logger. The maximum absolute error<br />
was 8 meters for static measurement <strong>and</strong> 25 meters for the measurement of motion<br />
on average. Errors associated with determining the height were greater, however<br />
they did not exceed 75 meters.<br />
During one of the flights, an attempt to establish a wireless connection using<br />
Wi-Fi network between two parallel flying aircraft was made. They were flying<br />
at an altitude of 500 meters at speeds of 120 km/h. The distance between objects<br />
was 150 meters. On board one of the aircrafts was a device which acted as an access<br />
point, while the second tried to connect to that network. An access point was seen<br />
by the other device, but the connection could not been established. Performed test<br />
showed that in given conditions it is not possible to create <strong>and</strong> use Wi-Fi networking.<br />
Results confirmed however, that the use of mobile devices for determining<br />
the position is sufficiently accurate for use in most of the monitoring applications.<br />
The quality of connections over the GSM network was sufficient for efficient transmission<br />
of data text files within a given height of 0-1000 meters.<br />
B. Tests in lowl<strong>and</strong> area<br />
Most of the testing was made in the lowl<strong>and</strong>s, because it is an environment<br />
in which the highest number of general aviation flights are performed. The mobile<br />
device was installed on board several aircrafts operating various types of flights<br />
in the northern area of Mazovia region. Position of the aircraft was observed<br />
in visualisation system <strong>and</strong> verified with reports collected via VHF radio. Between<br />
July <strong>and</strong> November 2011, 28 such flights were made. Below analysis in Tab. I shows<br />
12 flights selected of them.
394 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Flight #<br />
Table I. Results of tests in lowl<strong>and</strong> area<br />
Time in seconds [s]<br />
Flight duration MTBT a ATBT b<br />
1 3716 231 218<br />
2 6642 212 201<br />
3 823 180 164<br />
4 9144 288 234<br />
5 5323 222 190<br />
6 6006 265 207<br />
7 4571 303 253<br />
8 5701 281 219<br />
9 3122 201 183<br />
10 6717 568 305<br />
11 1559 180 173<br />
12 1287 180 160<br />
a) Maximum Time Between air-to-ground Transmissions<br />
b) Average Time Between air-to-ground Transmissions<br />
The most important parameter of such system is the location data refresh<br />
rate, understood as time between air-to-ground communication. <strong>Information</strong><br />
about the successful upload to the server are recorded in the logs, so it is possible<br />
to calculate the time between successive transmissions. During the test, the interval<br />
of 180 seconds was set up to make updates of the data as frequent as possible,<br />
but not to excessively exhaust the battery. Tab. I shows a summary of flight time,<br />
the value of the maximum interval between transmissions of data <strong>and</strong> the average.<br />
Both of these times directly translate to the refresh rate of position data, therefore<br />
it is desired to minimize both of them.<br />
Each of the flights presented in a table has taken place in different weather<br />
conditions, using a different route <strong>and</strong> at different heights. For this reason it is<br />
impossible to directly compare obtained results. Obtained average values for each<br />
flight lead to the conclusion that despite initial concerns related to the use of GSM<br />
network for data transmission, the frequency of updating information about<br />
the position of the aircraft is sufficient for the intended application.<br />
C. Tests in mountainous area<br />
The usefulness of the system to monitor flights taking place in a mountainous<br />
environment, due to potential differences in performance, was also tested. The research<br />
was focused on the influence of the location of GSM network base stations<br />
on the system effectiveness, compared to the results collected before. In the moun-
Chapter 8: Localization Techniques<br />
395<br />
tainous terrain antennas are placed on the tops of hills to embrace the largest area<br />
lying below. It was expected that due to the smaller than in the lowl<strong>and</strong>s height<br />
difference between GSM transmitter <strong>and</strong> the aircraft, the average interval between<br />
transmissions would be smaller. Because of the weather conditions, only 3 flights<br />
were made, as shown below.<br />
Flight #<br />
Table II. Results of tests in mountainous area<br />
Flight duration<br />
Time in seconds [s]<br />
c<br />
MTBT<br />
ATBT d<br />
1 1232 180 176<br />
2 747 180 172<br />
3 1338 191 186<br />
c) Maximum Time Between Transmissions<br />
d) Average Time Between Transmissions<br />
During the first flight, it turned out that in close proximity to one of the mountain<br />
ranges it is possible to connect to public Wi-Fi network. Its access point<br />
was located near one of the hotels <strong>and</strong> its range included a substantial portion<br />
of the ridge. The results of the flights are shown in Tab. II taking both transmission<br />
methods into account.<br />
The achieved results confirmed that the air-to-ground communication using<br />
the Wi-Fi st<strong>and</strong>ard during the flight is possible, though available only in specific<br />
conditions. Shortening the average interval between transmissions is the result<br />
of virtually uninterrupted stay of the aircraft in a GSM network <strong>and</strong> usage of availible<br />
Wi-Fi for data transmission.<br />
V. Conclusions<br />
The results of the analyzed system, based on data collected during test flights,<br />
were better than expected. It was possible to obtain better average refresh interval<br />
of location data then initially planned. Value of 300 seconds was thought as satisfactory,<br />
while the average value for 12 flights in a lowl<strong>and</strong> area was 209 seconds.<br />
Increasing the frequency of data transmissions could further improve this value,<br />
however, this would be associated with an increased resource consumption.<br />
Area of testing had a significant impact on the results. Analyzed flights were<br />
made up of several dozen kilometers from Warsaw agglomeration <strong>and</strong> mostly<br />
ran above the urban areas. Execution of test flights over areas characterized by poor<br />
coverage of GSM network is likely to lead to a deterioration of results.<br />
Analysis of the system in mountainous terrain allowed the discovery of additional<br />
options – usage of Wi-Fi networks for data transmission. Thanks to this observation,<br />
capabilities of mobile applications were increased <strong>and</strong> results could be improved.
396 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
The biggest obstacle in the development of the system is lack of possibility to<br />
create automatic connections between devices on an ad-hoc basis. This prevents<br />
direct application of the store-carry-forward paradigm, which could significantly<br />
improve performance.<br />
References<br />
[1] M. Liberatore, B.N. Levine, <strong>and</strong> C. Barakat, “Maximizing transfer opportunities<br />
in bluetooth DTNs”, Proc. CoNEXT, 2006.
Index
A<br />
Adrat Marc 81, 171<br />
Åkermark Hans 135<br />
Amanowicz Marek 55, 277, 333<br />
Andrzejewski Michał 387<br />
Anton Constantin 107<br />
Antweiler Markus 81, 161, 171<br />
Aubrecht Vladimir 67<br />
B<br />
Bloebaum Trude H. 9<br />
Bronk Krzysztof 215<br />
Bryś Rafał 289<br />
C<br />
Caban Przemysław 9<br />
Chaudhary Muhammad Hafeez 247<br />
D<br />
Debbah Mérouane 229<br />
Dołowski Jerzy 55<br />
E<br />
Ebinger Peter 349<br />
Elders-Boll Harald 171<br />
G<br />
Gajewski Piotr 151, 367<br />
Głowacka Joanna 277<br />
Goetz Michael 27<br />
Golan Edward 99<br />
Grzybkowski Maciej J. 215<br />
H<br />
Hedström Patrik 377<br />
I<br />
Idzikowska Ewa 117<br />
Ionescu Laurenţiu 107<br />
J<br />
Johansson Anders M. 377<br />
Johnsen Frank T. 9<br />
K<br />
Kaniewski Paweł 151<br />
Kelner Jan M. 367<br />
Koutny Tomas 67<br />
Kraśniewski Adam 99<br />
Krygier Jarosław 307<br />
Kuijper Arjan 349<br />
L<br />
Leduc Jan 161, 171<br />
Le Martret Christophe J. 229<br />
Le Nir Vincent 187, 201<br />
Liedtke Ferdin<strong>and</strong> 81<br />
M<br />
Mahoney Austin 135<br />
Marks Michał 319<br />
Maseng Torleiv 161<br />
Matyszkiel Robert 151<br />
Mazăre Alin 107<br />
N<br />
Nabrdalik Filip 319<br />
Niewiadomska-Szynkiewicz Ewa 319<br />
Niski Rafał 215<br />
Nissen Ivor 27<br />
O<br />
Osten Tobias 171<br />
P<br />
Pszczółkowski Jacek 289<br />
R<br />
Romanik Janusz 99
400 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Rose Luca 229<br />
Ruszkowski Mirosław 289<br />
S<br />
Saarnisaari Harri 265<br />
Scheers Bart 135, 187, 201, 247<br />
Schenkels Léon 9<br />
Schoeneich Radosław 387<br />
Şerban Gheorghe 107<br />
Singh Sarvpreet 81<br />
Skarżyński Paweł 99<br />
Suchański Marek 151<br />
Ś<br />
Śliwa Joanna 9<br />
T<br />
Teguig Djamel 187<br />
Tschauner Matthias 81<br />
Turčaník Michal 45<br />
Tutănescu Ion 107<br />
U<br />
Urban Robert 99<br />
V<br />
Vanninen Teemu 265<br />
W<br />
Wawryszczuk Marcin 333<br />
Wolthusen Stephen D. 349<br />
Z<br />
Ziółkowski Cezary 367<br />
Ż<br />
Żurek Jerzy 215