Quality of information approach to improving source selection in tactical networks

Intelligence operations in highly dynamic and constrained networked environments require a prudent strategies to query information sources. We consider the performance of this process based on metrics relating to quality of information: accuracy, timeliness, completeness and reliability. These metrics are identified in military doctrine as requirements that promote mission success. Further, it is possible to identify specific network metrics that are indicators of that the network is meeting these quality requirements. We study effective data rate, social distance, link integrity and the utility of information as metrics within a multi-genre network to determine the quality of information of its available sources. This paper proposes a formulation of the analytic hierarchy process to score information sources based on these concepts. A modification to this algorithm is also presented which incorporates the dynamics of the measurements. This is a multimodal fusion approach that considers elements from communications, information and social networks to assist a decision maker in the source selection problem. We show how this approach can be used to score information sources for such tasks using results from representative simulations.

[1]  Joseph P. Macker,et al.  Robust communications for disconnected, intermittent, low-bandwidth (DIL) environments , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[2]  Subbarao Kambhampati,et al.  SourceRank: relevance and trust assessment for deep web sources based on inter-source agreement , 2010, WWW '10.

[3]  James Llinas,et al.  A framework for dynamic hard/soft fusion , 2008, 2008 11th International Conference on Information Fusion.

[4]  Sahin Albayrak,et al.  Situation-Aware Coordination in Multi-agent Filtering Framework , 2004, ISCIS.

[5]  Ananthram Swami,et al.  Guest Editorial: Network science , 2013, IEEE J. Sel. Areas Commun..

[6]  Radha Poovendran,et al.  A joint performance-vulnerability metric framework for designing ad hoc routing protocols , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[7]  Mani B. Srivastava,et al.  On the quality and value of information in sensor networks , 2013, TOSN.

[8]  Yaniv,et al.  Advice Taking in Decision Making: Egocentric Discounting and Reputation Formation. , 2000, Organizational behavior and human decision processes.

[9]  Murat Sensoy,et al.  Trust estimation and fusion of uncertain information by exploiting consistency , 2014, 17th International Conference on Information Fusion (FUSION).

[10]  Srikanth V. Krishnamurthy,et al.  Quality-of-information aware networking for tactical military networks , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[11]  M. Bohanec,et al.  The Analytic Hierarchy Process , 2004 .

[12]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[13]  John D. Lee,et al.  Trust in Automation: Designing for Appropriate Reliance , 2004, Hum. Factors.

[14]  Radha Poovendran,et al.  A Metric for Quantifying Key Exposure Vulnerability in Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[15]  Kelvin Marcus Application of the dynamically allocated virtual clustering management system to emulated tactical network experimentation , 2014, Defense + Security Symposium.

[16]  Tiago Fioreze,et al.  SURFmap: A network monitoring tool based on the Google Maps API , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.