Connectivity augmentation in tactical mobile ad hoc networks

Tactical networks in urban environments are constrained by limited line-of-sight communication and frequent network partitioning. Moreover, energy efficiency for both communication and computation is a major concern as such networks are typically limited to battery-powered devices. Additional resources such as autonomous unmanned vehicles (UVs) or unmanned aerial vehicles (UAVs) are available in today missions. In this paper we investigate the connectivity augmentation of platoon size networks by said network resources, especially UAVs. We propose an authentication and negotiation protocol to securely request information and services from said resources. Services potentially provided in considered scenarios can incorporate the forwarding of data with a certain bandwidth, information about the UV's primary mission or missions, or a communication back-link to an infrastructure network. We furthermore investigate a more sophisticated support by motional adjustment of the UAVs. The efficiency and efficacy of the proposed protocols is evaluated in an simulated small-unit tactical network operating in an urban environment.

[1]  Hugo Krawczyk,et al.  Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs , 2008, ESORICS.

[2]  Hervé Rivano,et al.  Optimal positioning of active and passive monitoring devices , 2005, CoNEXT '05.

[3]  Timothy W. McLain,et al.  Decentralized Cooperative Aerial Surveillance Using Fixed-Wing Miniature UAVs , 2006, Proceedings of the IEEE.

[4]  N. Memon,et al.  A hierarchical key pre-distribution scheme , 2005, 2005 IEEE International Conference on Electro Information Technology.

[5]  Stephen D. Wolthusen,et al.  An Evaluation of Cluster Head TA Distribution Mechanisms in Tactical MANET Environments , 2007 .

[6]  Xinbing Wang,et al.  An efficient negotiation protocol for real-time multimedia applications over wireless networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[7]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[8]  Sai-Ming Li,et al.  Forest fire monitoring with multiple small UAVs , 2005, Proceedings of the 2005, American Control Conference, 2005..

[9]  Panayiotis Kotzanikolaou,et al.  Preventing impersonation attacks in MANET with multi-factor authentication , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[10]  Hannes Tschofenig,et al.  Pre-Shared Key Ciphersuites for Transport Layer Security (TLS) , 2005, RFC.

[11]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[12]  Stephen D. Wolthusen,et al.  Efficient Trust Authority Distribution in Tactical MANET Environments , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[13]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[14]  William A. Arbaugh,et al.  A secure service discovery protocol for MANET , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[15]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[16]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[17]  Jyh-Cheng Chen,et al.  Dynamic service negotiation protocol (DSNP) and wireless DiffServ , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[18]  Guy Pujolle,et al.  COPS-SLS: a service level negotiation protocol for the Internet , 2002 .

[19]  Jim Boyle,et al.  Accept-Ranges : bytes Content-Length : 55967 Connection : close Content-Type : text / plain Internet Draft , 2012 .

[20]  Timothy W. Finin,et al.  GSD: a novel group-based service discovery protocol for MANETS , 2002, 4th International Workshop on Mobile and Wireless Communications Network.