Naval Postgraduate School
Calendar | Directory
banner

Calendar of Events

  • 2013 MWC Conference Delayed due to Memo 29Sep12
  • Feb 25-28, Limited Participation in TNT, Florida

Research Areas

  • Secure Cell Phone Technology
  • Disruption Tolerant Networks
  • Economical DOD Cellular Technology
  • Information Warfare
  • Information Assurance
  • DoD / Military Policy
  • Force Protection / IED Abatement
  • Current Research

Military Wireless Thesis and Publications

Thesis:

  • Tsai, Shang-Yuan, "Device profiling analysis in Device-Aware Network", Dec 2014 ( Thesis )

    As more and more devices with a variety of capabilities are Internet-capable, device independence becomes a big issue when we would like the information that we request to be correctly displayed. This thesis introduces and compares how existing standards create a profile that describes the device capabilities to achieve the goal of device independence. After acknowledging the importance of device independence, this paper utilizes the idea to introduce a Device-Aware Network (DAN). DAN provides the infrastructure support for device-content compatibility matching for data transmission. We identify the major components of the DAN architecture and issues associated with providing this new network service. A Device-Aware Network will improve the network's efficiency by preventing unusable data from consuming host and network resources. The device profile is the key issue to achieve this goal.

  • Casey, Charles, "Free Space Optical communication in the military environment", Sept 2014 ( Thesis )

    Free Space Optical (FSO) communications use modulated collimated light energy, usually in the form of an infrared (IR) laser, to transmit data. This affords FSO many appealing qualities such as a very high bandwidth capability, a high level of security through a low probability of detection (LPD) and a low probability of intercept (LPI), and a signal that is impervious to radio frequency (RF) interference or regulation. Military communications require broadband capabilities at the highest level of security in an incredibly dense RF operating environment. The bandwidth and security qualities of FSO make it an attractive technology for military communications. However, a strict line of sight (LOS) requirement and link attenuation in poor atmospheric conditions limit its application. Several companies are developing and implementing FSO communication solutions worldwide in response to a demand for broadband connectivity without RF interference at a relatively low price point. Recent advances in hybrid FSO-RF systems have improved performance in all atmospheric conditions. This research conducts a survey of the current state of FSO communications and analyzes its suitability as a military communication solution. The findings indicate further research, development, and link performance improvement is required before actual implementation of FSO communications can occur.

  • Takaya, Souhaiel Ben, "Distance estimation using handheld devices", June 2013 ( Thesis )

    The different capabilities mobile devices can offer in the field of distance estimation for military applications are explored in this thesis. Of particular interest is the potential for using computer vision techniques to estimate distance in an operational military environment. The methods used for this investigation include a review of past literature on computer vision techniques in this domain, as well as an exploration of the different capabilities mobile devices offer in terms of sensors and networking. We present two potential solutions. The first is a simulation of a distance estimation algorithm that gives the distance to the target using a pair of hyper stereo images. The second solution is a web-based mobile application prototype developed in HTML5. This prototype is intended for the use of untrained forward observers. It goes through the basic steps of a call for fire mission as required by a forward observer, with a focus on distance estimation.

  • Yang, Keo S., "An adaptive communication solution: applying commercial off-the-shelf (COTS) cellular technology to tactical communication requirements", Sept 2011 ( PDF )

    This thesis will research the availability and applicability of using commercial off-the-shelf (COTS) cellular software, running on a smartphone hardware platform to address communication requirements as identified in a 1 st Marine Division, Universal Needs Statement (UNS). Having only conducted introductory research in to this topic, preliminary results have shown that the majority of the research conducted in the past have centered on either COTS cellular software specific to an application, or on the utility of tactical communication devices as they are currently being employed. The intent of this research is to discover if a bridge is possible and available for cellular COTS software running on a COTS smartphone device to be leveraged, thus satisfying communication requirements of small-unit leaders in a tactical environment.

    Our hypothesis is that COTS technology can provide a number of viable options to address tactical communication shortfalls based on the fact that the communication shortfalls identified, are capabilities that the commercial industry currently exercise on a daily basis, (e.g., text, chat, voice, position location information, imagery and map viewing, streaming video, web browsing and e-mail). All of these identified communication capabilities are available in military command and control systems however, they reside primarily at the higher headquarter levels, requiring large communication assets to establish those services. Furthermore, due to technology shortfalls and asset limitations, only a few of these capabilities are currently being extended down to the small unit level. Many small-unit leaders are experiencing that these limitations in communication capabilities are needlessly placing risks on their mission and their personnel. With COTS smartphone technology and the advancements made in the commercial cellular industry, this research intends to advance the study towards discovery of a viable COTS solution that can satisfy tactical communication requirements for the small-unit leader.

  • Oregon, Rogelio S., "Smart fires: a COTS approach to tactical fire support using a smartphone", Sept 2011 ( PDF )

    Communications in wartime are critical. The United States Marine Corps communicates well using a variety of radios, each for a specialized and limited purpose. However, the USMC could potentially benefit from the exploration of combining communication capabilities in a single device by leveraging commercial off-the-shelf software and expanding the existing network infrastructure. This thesis seeks to resolve this gap in capabilities by providing a fire support application prototype that serves as a proof-ofconcept for rapidly developable applications that would have an immediate positive impact, providing enhanced warfighter capabilities. If successful, this application could be further developed and fielded, and thus improve warfighting capabilities and inform future efforts in an effort to accomplish improved network management and the efficient use of existing and future communication technologies.

  • Marshburn, Erik R., "Supporting Command and Control (C2) of an embarked commander: tunneling siprnet data across an unclas wireless Local Area Network LAN", Sept 2011 ( PDF )

    Command and Control (C2) by todays embarked commanders requires timely and reliable access to classified data systems at the C2 node provided by the ship. Most often, the ships spaces provided to an embarked staff are inadequate to support the commanders C2 requirements. Often, there are not enough classified computers or classified Local Area Network (LAN) connections. To facilitate improved ability to exercise C2, a ships company technicians typically place a hub on the network to provide extra connection points. This procedure takes time for the technicians to implement and requires physical connection to the wired network. A potential alternative may be to leverage current IEEE 802.11 technology to provide wireless connectivity for these clients, yet wireless technology alone will not address this problem. Coupling an 802.11 network with Secret Client Tunneling Device (SCTD)- enabled classified laptops can provide the access to classified data that is required by the embarked commander to exercise command and control of his assigned forces. This thesis examines the use of the KOV-26 Talon card and the KIV-54 cryptographic module, both NSA Type I encryptors, as a method of tunneling SIPRNet data across an afloat unclassified wireless Local Area Network (LAN).

  • Kevin La Frenier, "Mobile Security Enclaves", Sept 2011 ( PDF )

    There are currently no access control methods to permit personnel, such as military members, government agencies, or first-responders, access to restricted resources and applications that are only available when certain conditions are satisfied. Such conditions include user authentication, authorized geographic locations, and connections to specific base transceiver stations or base station controllers. This work defines mobile security enclaves, which are designed to provide this access control, are adaptable and compatible with mobile cellular infrastructures, and can operate without being connected to a dedicated back-end network. The goal of this proposed architecture is to permit users who satisfy specific pre-conditions access to resources and applications to which they otherwise normally would not be granted access. An example where this research is beneficial is during crisis response. Disasters require first responders the need to have immediate access to resources available in a specific location. Another example is agencies requiring mobile communication device use on classified networks or to access classified resources. These mobile security enclaves not only provide strict security by authenticating the user and device location, they also prevent access to networks or resources outside of authorized areas and restrict unauthorized users.

  • Greg Cardwell, "Residual Network Data Structures In Android Devices", Sept 2011 ( PDF )

    The emergence and recent ubiquity of Smartphones present new opportunities and challenges to forensic examiners. Smartphones enable new mobile application and use paradigms by being constantly attached to the Internet via one of several physical communication media, e.g. cellular radio, WiFi, or Bluetooth. The Smartphone's storage medium represents a potential source of current and historical network metadata and records of prior data transfers. By using known ground truth data exchanges in a controlled experimental environment, this thesis identifies net-work metadata stored by the Android operating system that can be readily retrieved from the device's internal non-volatile storage. The identified network metadata can ascertain the identity of prior network access points to which the device associated. An important by-product of this research is a well-labeled Android Smartphone image corpus, allowing the mobile forensic community to perform repeatable, scientific experiments, and to test mobile forensic tools.

  • Scott Huchton, "Secure mobile distributed file system (MDFS)", March 2011 ( PDF )

    Provide a way for frontline troops to securely store and exchange sensitive information on a network of mobile devices with resiliency. The first portion of the thesis is the design of a file system to meet military mission specific security and resiliency requirements. The design integrates advanced concepts including erasure coding, shamir's threshold based secret sharing algorithm, and symmetric AES cryptography. The resulting system supports two important properties: 1) data can be recovered only if some minimum number of devices are accessible, and 2) sensitive data remains protected even after a small number of devices are compromised. The second part of the thesis is to implement the design on Android mobile devices and demonstrate the system under real world conditions.

  • Chris Rapin, "Message prioritization for routing in a DTN environment", March 2011 ( PDF )

    Investigate an aspect of delay/disruption tolerant networking (DTN) techniques, the potential of a message priority system to maintain delivery rate delays in proportion to message priority to help solve network connectivity problems. Currently, the priority field exists in the standardized DTN metadata bundle header, but no implementation exists to use message priority as a forwarding criterion. The result of the research aims to provide service estimations in terms of delivery rates and comparative delivery times for all levels of priority through all regimes of network demand.

  • Matthew R. O'Neal and Joshua S. Dixon, "DOD Strategic and Business Case Analyses for Commercial Products in Secure Mobile Computing", March 2011 ( Public Release Version PDF )

    DOD lags behind commercial entities in terms of adopting mobile computing technologies. Commercial smartphones offer scalable solutions to meet requirements ranging from business functions to tactical operations; however, these solutions require considerations beyond those applicable to the commercial sector. This research identifies whether solutions contribute to three objectives: 1) reduce the DOD's currently high device and service costs; 2) increase the DOD's smartphone functionality; 3) maintain or increase the level of security functionality available in commercial devices for DOD.

    A strategic analysis of the commercial mobile communications industry highlights the business drivers and motivations of industry participants. This information is used to identify the DOD's strategic options, which in turn serve as the basis of business cases for adopting future smartphone capabilities. Business case analyses compare proposed cost models with the cost models for current smartphone implementations.

    Results indicate growing strategic opportunities for the DOD to acquire more economical commercial handsets and more flexible network services. The business case may potentially save billions of dollars over 7 years. Risk assessments demonstrate the strong potential for the proposed solutions to maintain handset functionality, security features, and network coverage.

  • Joshua S. Dixon, "Integrating Cellular Handset Capabilities with Marine Corps Tactical Communications", May 2010 ( PDF )

    Stateside, communication is as easy as picking up a cell phone and dialing from virtually anywhere. A cell phone has the capability to send and receive realtime voice communication, voice messaging, text messaging, and e-mail as well as to capture videos/pictures. However, the cost of this technology in a field environment has traditionally been too heavily weighted toward permanent infrastructure or other non-cost-efficient solutions. Imagine the communication benefits for highly mobile units either providing disaster relief and humanitarian assistance or conducting full-scale combat operations. These missions share similar characteristics, which routinely require a highly mobile, ad-hoc wireless network to provide successful communication within and among participating units. This thesis investigates three approaches of integrating COTS cellular technology with Marine Corps tactical radio networks: reconfiguring a hand-held device, adding a modular bridge device, and reconfiguring current Marine Corps tactical radios. The majority of the experiment chapter is devoted to evaluating current military radios and commercial cellular devices as extensions. Because the military does not currently field cellular technology, the main focus was the measurement and comparison of the throughput limitations and device emissions. The risks associated with COTS cellular handsets are not as significant as the normal misconceptions.

Publications:

  • Rob Jansen and Robert Beverly, "Toward Anonymity in Delay Tolerant Networks: Threshold Pivot Scheme", Oct 2010 Milcom link

    Delay Tolerant Networks (DTN) remove traditional assumptions of end-to-end connectivity, extending network communication to intermittently connected mobile, ad-hoc, and vehicular environments. This work considers anonymity as a vital security primitive for viable military and civilian DTNs. DTNs present new and unique anonymity challenges since we must protect physical location information as mobile nodes with limited topology knowledge naturally mix. We develop a novel threshold Pivot Scheme (TPS) for DTNs to address these challenges and provide resistance to traffic analysis, source anonymity, and sender-receiver unlinkability. Reply techniques adapted from mix-nets allow for anonymity that enables a balance between security and efficiency. We evaluate TPS via simulation on real world DTN scenarios to understand its feasibility, performance, and overhead while comparing the provided anonymity against an anyalytically optimal model.

To request MWC publications please contact Daniele Allion at 'djallion@nps.edu', with subject "MWC Publication Request".

This is an official U.S. Navy website.
Page Last Updated: July 17, 2011 8:53:27 AM | Contact the Webmaster