scholarly journals Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective

Entropy ◽  
2020 ◽  
Vol 22 (10) ◽  
pp. 1166
Author(s):  
Yuan Feng ◽  
Menglin Li ◽  
Chengyi Zeng ◽  
Hongfu Liu

Through the combination of various intelligent devices and the Internet to form a large-scale network, the Internet of Things (IoT) realizes real-time information exchange and communication between devices. IoT technology is expected to play an essential role in improving the combat effectiveness and situation awareness ability of armies. The interconnection between combat equipment and other battlefield resources is referred to as the Internet of Battlefield Things (IoBT). Battlefield real-time data sharing and the cooperative decision-making among commanders are highly dependent on the connectivity between different combat units in the network. However, due to the wireless characteristics of communication, a large number of communication links are directly exposed in the complex battlefield environment, and various cyber or physical attacks threaten network connectivity. Therefore, the ability to maintain network connectivity under adversary attacks is a critical property for the IoBT. In this work, we propose a directed network model and connectivity measurement of the IoBT network. Then, we develop an optimal attack strategy optimization model to simulate the optimal attack behavior of the enemy. By comparing with the disintegration effect of some benchmark strategies, we verify the optimality of the model solution and find that the robustness of the IoBT network decreases rapidly with an increase of the unidirectional communication links in the network. The results show that the adversary will change the attack mode according to the parameter settings of attack resources and network communication link density. In order to enhance the network robustness, we need to adjust the defense strategy in time to deal with this change. Finally, we validated the model and theoretical analysis proposed in this paper through experiments on a real military network.

2018 ◽  
Vol 7 (3.12) ◽  
pp. 545
Author(s):  
Risabh Mishra ◽  
M Safa ◽  
Aditya Anand

Recent advances in wireless communication technologies and automobile industry have triggered a significant research interest in the field of Internet of Vehicles over the past few years.The advanced period of the Internet of Things is guiding the development of conventional Vehicular Networks to the Internet of Vehicles.In the days of Internet connectivity there is need to be in safe and problem-free environment.The Internet of Vehicles (IoV) is normally a mixing of three networks: an inter-vehicleNetwork, an intra-vehicle network, and a vehicle to vehicle network.Based on  idea of three networks combining into one, we define  Internet of Vehicles as a large-scale distributed system to wireless communication and information exchange between vehicle2X (X: vehicle, road, human and internet).It is a combined   network for supporting intelligent traffic management, intelligent dynamic information service, and intelligent vehicle control, representation of an application of the Internet of Things (IoT) technology for intelligent transportation system (ITS).  


2019 ◽  
Vol 11 (4) ◽  
pp. 100 ◽  
Author(s):  
Maurizio Capra ◽  
Riccardo Peloso ◽  
Guido Masera ◽  
Massimo Ruo Roch ◽  
Maurizio Martina

In today’s world, ruled by a great amount of data and mobile devices, cloud-based systems are spreading all over. Such phenomenon increases the number of connected devices, broadcast bandwidth, and information exchange. These fine-grained interconnected systems, which enable the Internet connectivity for an extremely large number of facilities (far beyond the current number of devices) go by the name of Internet of Things (IoT). In this scenario, mobile devices have an operating time which is proportional to the battery capacity, the number of operations performed per cycle and the amount of exchanged data. Since the transmission of data to a central cloud represents a very energy-hungry operation, new computational paradigms have been implemented. The computation is not completely performed in the cloud, distributing the power load among the nodes of the system, and data are compressed to reduce the transmitted power requirements. In the edge-computing paradigm, part of the computational power is moved toward data collection sources, and, only after a first elaboration, collected data are sent to the central cloud server. Indeed, the “edge” term refers to the extremities of systems represented by IoT devices. This survey paper presents the hardware architectures of typical IoT devices and sums up many of the low power techniques which make them appealing for a large scale of applications. An overview of the newest research topics is discussed, besides a final example of a complete functioning system, embedding all the introduced features.


2016 ◽  
Vol 2016 ◽  
pp. 1-13 ◽  
Author(s):  
Chi Guo ◽  
Guangyi Cao ◽  
Jieru Zeng ◽  
Jinsong Cui ◽  
Rong Peng

Perceiving the location of dangerous moving vehicles and broadcasting this information to vehicles nearby are essential to achieve active safety in the Internet of Vehicles (IOV). To address this issue, we implement a real-time high-precision lane-level danger region service for moving vehicles. A traditional service depends on static geofencing and fails to deal with dynamic vehicles. To overcome this defect, we devised a new type of IOV service that manages to track dangerous moving vehicles in real time and recognize their danger regions quickly and accurately. Next, we designed algorithms to distinguish the vehicles in danger regions and broadcast the information to these vehicles. Our system can simultaneously manipulate a mass of danger regions for various dangerous vehicles and broadcast this information to surrounding vehicles at a large scale. This new system was tested in Shanghai, Guangzhou, Wuhan, and other cities; the data analysis is presented in this paper as well.


Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3129
Author(s):  
Weiwei Mu ◽  
Guang Li ◽  
Yulin Ma ◽  
Rendong Wang ◽  
Yanbo Li ◽  
...  

In this paper, we designed a beacon-based hybrid routing protocol to adapt to the new forms of intelligent warfare, accelerate the application of unmanned vehicles in the military field, and solve the problems such as high maintenance cost, path failure, and repeated routing pathfinding in large-scale unmanned vehicle network communications for new battlefields. This protocol used the periodic broadcast pulses initiated by the beacon nodes to provide synchronization and routing to the network and established a spanning tree through which the nodes communicated with each other. An NS3 platform was used to build a dynamic simulation environment of service data to evaluate the network performance. The results showed that when it was used in a range of 5 ~ 35 communication links, the beacon-based routing protocol’s PDR was approximately 10% higher than that of AODV routing protocol. At 5 ~ 50 communication links, the result was approximately 20% higher than the DSDV routing protocol. The routing load was not related to the number of nodes and communication link data and the protocol had better performance than traditional AODV and DSDV routing protocol, which reduced the cost of the routing protocol and effectively improved the stability and reliability of the network. The protocol we designed is more suitable for the scenarios of large-scale unmanned vehicle network communication in the future AI battlefield.


2019 ◽  
Vol 9 (13) ◽  
pp. 2667 ◽  
Author(s):  
Ilja Rausch ◽  
Yara Khaluf ◽  
Pieter Simoens

In many complex systems observed in nature, properties such as scalability, adaptivity, or rapid information exchange are often accompanied by the presence of features that are scale-free, i.e., that have no characteristic scale. Following this observation, we investigate the existence of scale-free features in artificial collective systems using simulated robot swarms. We implement a large-scale swarm performing the complex task of collective foraging, and demonstrate that several space and time features of the simulated swarm—such as number of communication links or time spent in resting state—spontaneously approach the scale-free property with moderate to strong statistical plausibility. Furthermore, we report strong correlations between the latter observation and swarm performance in terms of the number of retrieved items.


Author(s):  
Paolo Bellavista

The increasing availability of fixed/wireless network connectivity and the integration of telecommunication systems and the Internet create novel opportunities for users who can benefit from anytime-anywhere access to a growing amount of Internet/intranet Web information. In particular, university communities clearly perceive the potential benefits of widespread availability of Web-based services, which should satisfy heterogeneous requirements from different classes of users, for example, students, teachers, administrative and technical staffs.


2010 ◽  
Vol 34-35 ◽  
pp. 1911-1915
Author(s):  
Jun Tang

Because the web is not only the platform for information exchange but also the computational platform based on JavaScript engine, every computer having installed modern browser on the Internet can easily access the web and execute some JavaScript programs. Under above conditions, we develop a lightweight distributed computing system based on the web and JavaScript technologies. Our system plays an intermediary role between the IT expert who has to solve large-scale computational problem and end users on the Internet. In the other words, people could easily cooperate with each other to finish complicated computational problem through the support of our system.


Author(s):  
Tao Wen ◽  
Adriana-Simona Mihăiţă ◽  
Hoang Nguyen ◽  
Chen Cai ◽  
Fang Chen

This paper introduces the framework of an innovative incident management platform with the main objective of providing decision-support and situation awareness for transport management purposes on a real-time basis. The logic of the platform is to detect and then classify incidents into two types: recurrent and non-recurrent, based on their frequency and characteristics. Under this logic, recurrent incidents trigger the data-driven machine learning module which can predict and analyze the incident impact, in order to facilitate informed decisions for transport management operators. Non-recurrent incidents activate the simulation module, which then evaluates quantitatively the performance of candidate response plans in parallel. The simulation output is used for choosing the most appropriate response plan for incident management. The current platform uses a data processing module to integrate complementary data sets, for the purpose of improving modeling outputs. Two real-world case studies are presented: 1) for recurrent incident management using a data-driven model, and 2) for non-recurrent incident management using traffic simulation with parallel scenario evaluation. The case studies demonstrate the viability of the proposed incident management framework, which provides an integrated approach for real-time incident decision-support on large-scale networks.


2021 ◽  
Author(s):  
Angger Binuko Paksi

The need for the utilization of information via the internet , making the flow of information exchange through the Internet increased rapidly . This makes the need for very high bandwidth availability . The development of the software could not be separated from the need for it . In large-scale distributed computing environments , which are sought bandwidth utilization as efficient as possible , because the availability of Internet infrastructure does not run as fast as the need for information exchange space.Web services allow two applications to communicate with each other despite the different application platforms . By using Web services , the Java platform applications can communicate with a PHP application platform . In designing applications based on android Zoopedia will utilize web services to access data in a web -based server . That way when there is an update the data in the application server zoopedia will also update the data.With the implementation of web service technology in mobile applications integrated with web applications , is expected to provide application Zoopedia effectiveness and efficiency in the distribution of data , can be developed by many people who want to develop applications by using data that has been provided by the web service . With the restrictions on data sharing web service is expected to reduce the possibility of destruction of data by parties that are not desirable.


Author(s):  
X. Zhuo ◽  
F. Kurz ◽  
P. Reinartz

Manned aircraft has long been used for capturing large-scale aerial images, yet the high costs and weather dependence restrict its availability in emergency situations. In recent years, MAV (Micro Aerial Vehicle) emerged as a novel modality for aerial image acquisition. Its maneuverability and flexibility enable a rapid awareness of the scene of interest. Since these two platforms deliver scene information from different scale and different view, it makes sense to fuse these two types of complimentary imagery to achieve a quick, accurate and detailed description of the scene, which is the main concern of real-time situation awareness. This paper proposes a method to fuse multi-view and multi-scale aerial imagery by establishing a common reference frame. In particular, common features among MAV images and geo-referenced airplane images can be extracted by a scale invariant feature detector like SIFT. From the tie point of geo-referenced images we derive the coordinate of corresponding ground points, which are then utilized as ground control points in global bundle adjustment of MAV images. In this way, the MAV block is aligned to the reference frame. Experiment results show that this method can achieve fully automatic geo-referencing of MAV images even if GPS/IMU acquisition has dropouts, and the orientation accuracy is improved compared to the GPS/IMU based georeferencing. The concept for a subsequent 3D classification method is also described in this paper.


Sign in / Sign up

Export Citation Format

Share Document