scholarly journals Dispersed Computing for Tactical Edge in Future Wars: Vision, Architecture, and Challenges

2021 ◽  
Vol 2021 ◽  
pp. 1-31
Author(s):  
Haigen Yang ◽  
Gang Li ◽  
GuiYing Sun ◽  
JinXiang Chen ◽  
Xiangxin Meng ◽  
...  

In the future, the tactical edge is far away from the command center, the resources of communication and computing are limited, and the battlefield situation is changing rapidly, which leads to the weak connection and fast changes of network topology in a harsh and complex battlefield environment. Thus, to meet the needs of communication and computing to build a new generation of computing architecture for real-time sharing and service collaboration of tactical edge resources to win the future war, the dispersed computing (DCOMP) seeks a new solution to satisfy the requirements of fast and efficient sensing, transmission, integrating, scheduling, and processing of various information in the tactical edge. Through the research of a traditional computing paradigm of mobile cloud computing (MCC), fog computing (FC), mobile edge computing (MEC), mobile ad hoc network (MANET), etc., it can be found that these computations have difficulty in meeting the high changing and complex battlefield environment and we propose a novel architecture of DCOMP to build a scalable, extensible, and robust decision-making system, to realize powerful and secure communication, computing, storage, and information processing capabilities for the tactical edge. We illustrate the fundamental principles of building a network model, channel allocation, and forwarding control mechanism of the network architecture for DCOMP called DANET and then design a new architecture, programming model, task awareness, and computing scheduling for DCOMP. Finally, we discuss the main requirements and challenges of DCOMP in future wars.

Author(s):  
Anuj Joshi ◽  
Pallavi Srivastava ◽  
Poonam Singh

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration. Due to this unique property, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for, security challenges has become a primary concern to provide secure communication. In this paper, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have identified the challenges and proposed solutions to overcome them. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.


2021 ◽  
pp. 545-552
Author(s):  
Dang Van Anh ◽  
◽  
Nguyen Duy Tan ◽  
Cong-Doan Truong ◽  
Nguyen Van Hau ◽  
...  

Device-to-Device (D2D) is one of the emerging technologies expected to have significant contributions to the future of the Internet. The combination of personal mobile devices and D2D communications forms the Mobile Ad-hoc Network architecture, called MANETs. Nowadays, due to the flexibility and simplicity of establishing data transmission, MANETs are applied in various areas such as healthcare, intelligent transportation systems, tactical, smart retail, and smart agriculture. In practice, due to the mobility of network nodes, the network structure often changes, and the performance of MANETs is relatively low. Routing is one of the significant challenges of MANETs. In this study, we perform a comprehensive analysis of the traditional routing protocols for MANETs. Based on the analysis results, we obtained a common framework for designing routing protocols for MANETs. To visualize the efficiencies of protocols under variable network traffic, we performed a simulation to compare the performance of typical protocols, including AODV, DSR, and OLSR. The obtained results again demonstrated that on-demand-based routing protocols are suitable for dynamic topology networks. We hope that this work will be an essential guide in researching and proposing energy-saving, secure, and QoS routing protocols for MANETs in the future.


Author(s):  
Rakesh Kumar Singh

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. In this research, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack, etc.


Vehicular Ad-hoc network a subclass of Mobile Ad-hoc network with various features providing Vehicle-to-Vehicle communication, Vehicle-to-RSU communication, Vehicle-to-Trusted Authority Communication. VANET is gaining higher attention now days both in industry and academic area and has become a trending research topic for research but still a lot of improvements is required in this area. Security of data is one of the major challenge in VANET. Encryption of data with the help of various encryption algorithms came up as solution for securing communication in VANET. But existing encryption algorithms used to secure VANET’s are complex due to which data are not delivered on time and face a lot of problems like privacy of data ,non-repudiation and cost (i.e. communication cost, computational cost).In our proposed scheme we use a hybrid approach, which contain ECC algorithm( asymmetric algorithm).ECC algorithm is used for encryption of personal details (i.e. Speed, location, device address) and AES algorithm (symmetric algorithm ) is used for encryption for safety messages along with output of ECC algorithm. The objective of this hybrid approach is to perform double encryption on personal details for more privacy of personal data (using ECC and AES algorithm) and single encryption on safety messages (using AES algorithm) so safety messages are delivered on time and without any delay.


Big Data ◽  
2016 ◽  
pp. 2006-2027
Author(s):  
Rakesh Kumar Singh

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. In this research, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack, etc.


2016 ◽  
Vol 3 (3) ◽  
pp. 72-103 ◽  
Author(s):  
Amartya Mukherjee ◽  
Nilanjan Dey ◽  
Noreen Kausar ◽  
Amira S. Ashour ◽  
Redha Taiar ◽  
...  

The extended Mobile Ad-hoc Network architecture is a paramount research domain due to a wide enhancement of smart phone and open source Unmanned Aerial Vehicle (UAV) technology. The novelty of the current work is to design a disaster aware mobility modeling for a Flying Ad-hoc network infrastructure, where the UAV group is considered as nodes of such ecosystem. This can perform a collaborative task of a message relay, where the mobility modeling under a “Post Disaster” is the main subject of interest, which is proposed with a multi-UAV prototype test bed. The impact of various parameters like UAV node attitude, geometric dilution precision of satellite, Global Positioning System visibility, and real life atmospheric upon the mobility model is analyzed. The results are mapped with the realistic disaster situation. A cluster based mobility model using the map oriented navigation of nodes is emulated with the prototype test bed.


Sign in / Sign up

Export Citation Format

Share Document