catch ~Next ~Previous ~Home!
See also ~Patrol and ~Business networks!
Epsilon series Military Sensor FS4M Networks:
[001]~ FC4M helicopter masters Sensor locations in Network
[002]~ Link 16 Protocol
[003]~ Wireless Ad Hoc Sensor Network
[004]~ Mobile Inshore Undersea Warfare
[005]~ Sensor Network Security
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[001] FS4M Networks ~ Military Sensor FC4M helicopter masters Sensor locations in Network
FC4M helicopter masters Sensor locations in Network
~ FC helicopter drops sensors and saves their location
~ sensors do not have to have location transmitter
~ FC helicopter uses radar and it's cameras and sensors to save sensor location on ground,ice
catch: ~[content] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[002] FS4M Networks ~ Military Sensor: ~ Link 16 Protocol
Link 16 Protocol
~ sensors uses the same protocol as FC helicopter
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[003] FS4M Networks ~ Military Sensor: ~ Wireless Ad Hoc Sensor Network
Wireless Ad Hoc Sensor Network
~ FC helicopter drops FS sensors and all dropped sensors create an Ad Hoc Sensors Network with FC helicopter as network server
Links:
Summary:
~ Military sensor networks to detect and gain as much information as possible about enemy movements, explosions, activites....
~ The basic goals of a wireless ad hoc sensor network:
~ 1. Determine the value of some parameter at a given location;a given sensor node may be connected to different types of sensors
~ 2. Detect the occurrence of events of interest and estimate parameters of the detected event or events; enemy vehicle,speed,
~ 3. Classify a detected object; tank...
~ 4. Track an object: track an enemy tank as it moves through the geographic area covered by the network
Wireless ad hoc sensor network requirements include the following:
~ Low energy use
~ Network self-organization: it is essential that the network be able to self-organize
~ the network must be able to periodically reconfigure itself so that it can continue to function
~ Individual nodes may become disconnected from the rest of the network, but a high degree of connectivity must be maintained.
Collaborative signal processing:
~ Yet another factor that distinguishes these networks from MANETs is that
~ the end goal is detection/estimation of some events of interest, and not just communications.
~ To improve the detection/estimation performance, it is often quite useful to fuse data from multiple sensors.
~ This data fusion requires the transmission of data and control messages, and so it may put constraints on the network architecture
Querying ability:
~ A user may want to query an individual node or a group of nodes for information collected in the region.
~ Depending on the amount of data fusion performed, it may not be feasible to transmit a large amount of the data across the network.
~ Instead, various local sink nodes will collect the data from a given area and create summary messages.
~ A query may be directed to the sink node nearest to the desired location.
Sensor types and system architecture:
~ With the coming availability of low cost, short range radios along with advances in wireless networking,
~ it is expected that wireless ad hoc sensor networks will become commonly deployed.
~ In these networks, each node may be equipped with a variety of sensors, such as
~ acoustic,
~ seismic,
~ infrared,
~ still/motion videocamera, etc.
These nodes may be organized in clusters such that a locally occurring event can be detected by most of, if not all, the nodes in a cluster.
Each node may have sufficient processing power to make a decision,
and it will be able to broadcast this decision to the other nodes in the cluster.
One node may act as the cluster master,
and it may also contain a longer range radio using a protocol such as IEEE 802.11 or Bluetooth.
catch: ~[content] ~[previous]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[004] FS4M Networks ~ Military Sensor: ~ Mobile Inshore Undersea Warfare
Mobile Inshore Undersea Warfare
~ S&S explores MIUW activities
Wave: Mobile Inshore Undersea Warfare
~~~ The MIUW System Upgrade Program will significantly improve the capabilities of the MIUW community.
~~~ The new baseline system consists of an
~~~ upgraded AN/TSQ-108A Radar Sonar Surveillence Center (RSSC) van
~~~ with a Portable Sensor Platform (PSP),
~~~ a Mobile Sensor Platform (MSP),
~~~ and a lightweight, small boat deployable,
~~~ underwater sensor string.
~~~ In addition, each van will have a Readiness Trainer System.
MSP
~~~ The MSP is a sensor platform built onto a HMMWV
~~~ to permit rapid deployment and maximum site flexibility.
~~~ The remote sensors consist of
~~~ a Thermal Imaging Sensor (TIS)
~~~ and a Visual Imaging Sensor (VIS)
~~~ co-located on a computer controlled pan and tilt mechanism and
~~~ a Furuno X-Band surface search radar with a CEA radar track processor system.
~~~ Telemetry of radar data and imagery back to the van over a 10 Km line-of-sight distance
~~~ is provided by a microwave transceiver with capability for future upgrades to fiber-optic cable.
~~~ A stand-alone controller provides on-site operation if needed.
RSSC van
~~~ The RSSC van has been upgraded to a V3 configuration.
~~~ The new RSSC contains sensor processing hardware
~~~ including an upgraded AN/SQR-17A(V)3 acoustic processor,
~~~ an ESM system and a Furuno/CEA radar system as well as
~~~ upgrades to the communications suite including Global Command Control System
~~~ - Maritime (GCCS-M) network access,
~~~ Fleet Broadcast,
~~~ and PC Based message management.
~~~ A trailer-based PSP permits
~~~ remoting of most antennas and emitters up to 150 feet away from the van if needed.
GDFS:
~~~ Information from all the sensors is displayed via the Graphical Data Fusion System (GDFS).
~~~ The GDFS is a software program which correlates all sensor information
~~~ and overlays it onto a digitized map.
~~~ On a single 19" screen display, operators can see
~~~ the geographic picture,
~~~ their own location,
~~~ the location of the sensors,
~~~ and target tracks.
~~~ There are two GDFS workstations in the upgraded van,
~~~ each with its own set of video monitors for display of the TIS and VIS images transmitted from MSPs.
~~~ The display is user friendly, with scaleable maps, pop-up windows for sensor control and calibration,
~~~ target icons using NTDS symbology and selectable zones of target acquisition and non-interest.
~~~ If desired, the actual radar video from one or all of the radars can be underlaid onto the display.
~~~ Target data can be stored, replayed and selectively routed into case files or into GCCS-M.
~~~ A passive underwater array sensor string,
~~~ configured to be deployable from a small boat,
~~~ will be included in the upgrade.
~~~ Development of omni passive strings and active sonars for close-in swimmer detection are under consideration for future inclusion.
~~~ The array string in conjunction with the continued use of sonobuoys
~~~ and an upgraded acoustic processor tied to the GDFS
~~~ will give the MIUW units a significantly improved shallow water surveillance capability.
~~~ The MIUW System Upgrade program,
~~~ sponsored by OPNAV N852G and managed by the PMW 182,
~~~ will provide an integrated upgrade of MIUW equipment
~~~ and capabilities using primarily off-the-shelf equipment.
~~~ Seventeen upgraded RSSC van systems have been delivered to date.
~~~ The production schedule is planned with the goal of re-outfitting most MIUW units nationwide by the end of 2002,
~~~ at the rate of five systems per year.
NB: MIUW-SU Program Office,Space and Naval Warfare Systems Command (PMW-182),San Diego
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[005] FS4M Networks ~ Military Sensor: ~ Sensor Network Security
Sensor Network Security
~ S&S bases it's network architecture on the latest and proven network solutions
Wave: Sensor Networks
What is sensor network ?
~~~ Recent advances in wireless communication and microelectronics
~~~ have led to the development of low-cost and low-power sensor nodes.
~~~ Those small sensor nodes can communicate among themselves to perform the various tasks assigned to them.
~~~ The sensor nodes consisting of data sensing, data processing and communicating lead to the development of sensor networks.
~~~ They are expected to revolutionize the information gathering in any type of environment.
Small & Smart Solution:
(1) FC helicopter collect data from sensors and gives it to FB base; it does NOT send sensor data to other destinations
(2) FB base receives sensor data from helicopter, NOT from sensors expect sensor around the base
(3) FS sensors communicate with helicopter, NOT with other sensors
Configuration
~~~ Specifically, a sensor network consists of
~~~ base stations
~~~ and a number of sensor nodes spread across a geographical area.
~~~ It activates when an event occurs.
Small & Smart Solution:
(1) FC helicopter drops sensors and monitor them uploading sensor data and downloading software to sensors
(2) FB base is the base station, there may also be a back-up base
(3) FS sensors are dropped by helicopter and sensors communicate only with that helicopter
Characteristics
~~~ flexibility
~~~ low cost
~~~ high sensing fidelity
~~~ fault tolerance
~~~ rapid deployment
Small & Smart Solution:
(1) FC helicopter master sensors and only the helicopter,which dropped sesnors know sensor locations
(2) FB base communicates with helicopter and masters it's own sensor network around the base
(3) FS sensor are low cost because helicopter frees sensors from extra devices and let sensors to concentrate on sensoring
Security requirements
~~~ if we want data to be confidential, we need to employ techniques such as encryption to avoid someone else to be able to read the contents
~~~ If we want to trust sensor data that we receive, we need to be able to authenticate the source to avoid bogus and malicious sensors to inject false data
~~~ If we want to detect data modification, we also need to be able to verify data
~~~ If we want to make sure that the data we receive is recent, we need to take data freshness into account
~~~ The security requirements for sensor networks should include data confidentiality, data authentication, data integrity, and data freshness.
Small & Smart Solution:
(1) FC helicopter is the only one who can upload and download data and software to/from sensors it has dropped
(2) FB base is the only one accepting sensor data from helicopters it recognizes
(3) FS sensor data is encrypted
Security Threats
(1) The most dangerous attack is to insert malicious code to the sensor network.
~~~ If this occurs, malicious code injected in the network can spread to all nodes,
~~~ potentially destroying the whole network, or even worse,
~~~ taking over the network on behalf of an adversary.
~~~ A seized sensor network can either send observations about the monitored area to a malicious user
~~~ or send false observations about the environment to a legitimate user.
(2) An attacker could intercept the messages containing the physical locations of sensor nodes
~~~ and then locate the nodes and destroy them.
~~~ Since the sensor nodes have small dimensions and their location cannot be trivially traced,
~~~ it is significant to hide the location information from an attacker.
(3) An adversary can observe the application specific content of messages
~~~ including message IDs, timestamps and other fields.
(4) An adversary can inject false messages
~~~ that give incorrect information about the environment to the user,
~~~ and these false messages can exhaust the scarce energy resources of the nodes.
Small & Smart Solution:
(1) FC helicopter is the only one device communicating with base and the sensors it has dropped
(2) FB base is the one communicating with command and control centre
(3) FS sensor communicates only with helicopter which has dropped the sensor
Resource constraints
~~~ Limited energy
~~~ Limited computation: 4 MHz, 8-bit
~~~ Limited memory: 512 bytes
~~~ Limited code size: 8 Kbytes; ~3.5 K base code ("TinyOS" + radio encoder) ; Only 4.5 K for application & security
~~~ Limited communication: 30 byte packets
~~~ Energy-consuming communication: 1 byte transmission = 11000 instructions
~~~ The amount of key-storage memory in a given node is highly constrained;
~~~ it does not possess the resources to establish unique keys with every one of the other nodes in the network.
~~~ The limited computation and power resources of sensor nodes often make it undesirable to use public-key algorithms.
~~~ Transmission reliability is often low, making the communication of large blocks of data particularly expensive.
~~~ Limited bandwidth is another problem as we scale up the number of sensors.
~~~ In a sensor network, base stations are few and expensive.
~~~ Therefore, it may be attractive to rely on them as source of trust,
~~~ but this invites attack on the base station and limits the application of the security protocol.
Small & Smart Solution:
(1) FC helicopter check sensors and the data sensors send to helicopter; helicopter masters software in sensors it has dropped
(2) FB base checks helicopters using the base and the data it receives from helicopter
(3) FS sensors communicate only with helicopter; sensors just pass sensor data to helicopter
Ad-hoc Network challenges
~~~ Every node can be a target node to be attacked
~~~ No trusted peers among nodes
~~~ Encryption and authentication cannot eliminate threats
~~~ All nodes are decentralized and participate cooperatively
~~~ No matter how many intrusion prevention measures are inserted in a network,
~~~ there are always some weak links that one could exploit to break in.
Small & Smart Solution:
(1) FC helicopter is the ONLY one communicating with sensors; and only the helicopter which dropped sensors
(2) FB base is the ONLY one communicating with helicopter; back-up base only if master base goes down
(3) FS sensors do NOT communicate with peer sensors
DRIVE: see Sensor Network protocols!
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[006] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[007] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[008] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[009] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[010] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[011] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[012] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[013] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[014] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[015] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[016] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[017] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[018] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[019] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[020] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous] ~[next]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[021] FS4M Networks ~ Military Sensor: ~
FREE
catch: ~[content] ~[previous]!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Small & Smart Inc reserves rights to change this specification
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~