Beruflich Dokumente
Kultur Dokumente
I. I NTRODUCTION
Wireless communication via radio signal has been involved
in military operation since the World War I. Telegraph radios
were installed on ship and shore to provide wireless communication over long distance. A radio was carried on an
airplane to provide communication between a pilot and ground
headquarter. The reliability of the wireless communication at
that time was very low, which made it less attractive in military
operations. During World War II, wireless communication had
been evolved rapidly. Voice communication through wireless
channel became more reliable. Each deployed force must be
equipped with a portable radio to provide communication
between forces. The wireless technologies during that time
were based on analog signals and operate in point-to-point or
broadcasting manner. [1]
In the current stage of military wireless communication,
the technologies are based on digital technology. Current
wireless communication is not only capable of transmitting
voice but also capable of transmitting data. The demands for
data transmission over wireless channel have been increased,
since various information such as troops position and sensor
data is needed to be shared among military units to provide
situation awareness in the area without network infrastructure.
As a result, wireless networking has been integrated to the
system to provide sharing of information of deployed units.
Wire network is still existed along with wireless network
as a backbone network. Due to the nature of each military
Research Interests
Conducted Researches
Issues Solved
Research Gaps
Research Challenges
[10], [11]
Performance
[6], [9]
Routing
[12], [13]
Robustness,
Reliability,
Availability, Security
Security
[14], [15]
Management
[4], [7]
Congestion, Reliability
Management in uncertain
network is hard to achieved
TABLE I
S UMMARY OF RESEARCH INTERESTS IN TACTICAL W IRELESS N ETWORKS
C. Routing
Interests on routing are concerning with solving robustness,
reliability, availability of route. Most of research are trying to
solve the issues by finding the most reliable route, which will
be sufficient for stable network. Unfortunately, most routes are
unstable in a hostile environment. The challenges of routing
protocol in a hostile environment is knowing future condition
of route such that a transmission scheme can be adapted to
that condition. Hence, the routes with ability to predict future
behavior are more attractive.
D. security
The researches on security tend to solve the problem of
congestion, reliability, and availability caused by hostile attacks. Researches are concerning with protecting information
from being stolen, dropped, or modified by intruders. Some
researchers are concerning with protecting the route. In addition, researches on security have tried to detect the intruders
in the networks from their misbehaviors such as dropping or
modifying packets. In a hostile environment, packet are regularly dropped and corrupted at a node. Detection mechanism
may see this behaviour as a threat and a false detection may
occur. The challenge is to design precise detection mechanism
that not only consider packet dropped from misbehavior but
also packet drop from a hostile environment.
E. Management
The researches on network management are tend to maintain
required QoS of the tactical wireless networks. This solve
the issues of congestion and reliability in tactical wireless
networks. A QoS management framework mostly manages a
network based on network performance parameters such as
throughput, delay, and packet error rate. These parameters
are very unstable in a hostile environment. Hence, a QoS
management in a tactical wireless network is more complex,
and the required QoS is hard to be achieved. The idea to
overcome this uncertainty is to predict the outcomes of these
[12] Han, Q.; Bai, Y.; Gong, L.; Wu, W., Link availability prediction-based
reliable routing for mobile ad hoc networks, Communications, IET ,
vol.5, no.16, pp.2291,2300, November 4 2011.
[13] Zhexiong Wei; Tang, H.; Yu, F.R.; Maoyu Wang; Mason, P., Trust establishment with data fusion for secure routing in MANETs, Communications
(ICC), 2014 IEEE International Conference on , vol., no., pp.671,676, 1014 June 2014.
[14] Little, M.; Ko, C., Detecting coordinated attacks in tactical wireless
networks using cooperative signature-based detectors, Military Communications Conference, 2005. MILCOM 2005. IEEE , vol., no., pp.176,182
Vol. 1, 17-20 Oct. 2005
[15] Jaemin Jeung; Seungmyeong Jeong; Jaesung Lim, Adaptive rapid
channel-hopping scheme mitigating smart jammer attacks in secure
WLAN, MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011 , vol., no., pp.1231,1236, 7-10 Nov. 2011.