Naval Research Laboratory

Displaying 1-13 of 13 results

  • White Papers // May 2011

    Sleeping Dogs Lie on a Bed of Onions But Wake When Mixed

    The authors introduce and investigate sleeper attacks and explore them in the context of anonymous communication, especially mix networks. Sleeper attacks can make use of the interference inherent to mix protocols. Simply by leaving his own messages in a mix network an adversary can learn about the communication of network...

    Provided By Naval Research Laboratory

  • White Papers // Jan 2011

    Practical Vulnerabilities of the Tor Anonymity Network

    Onion routing is a technology designed to protect the security and privacy of network communications. In particular, Tor, the current widely-used onion routing system, was originally designed to protect intelligence gathering from open sources and to otherwise protect military communications over insecure or public networks, but it is also used...

    Provided By Naval Research Laboratory

  • White Papers // Nov 2010

    Testing of Policy-Based Dynamic Spectrum Access Radios

    Policy-driven Dynamic Spectrum Access (DSA) systems are emerging as one of the key technologies to enable the Department of Defense (DoD) to meet its increasing requirements for access to the electromagnetic spectrum. A key open issue surrounding deployment and continuing development of DSA systems concerns the need to test and...

    Provided By Naval Research Laboratory

  • White Papers // Oct 2010

    Optimal Scheduling in Frequency-Agile Wireless Networks

    In this paper, the authors reviewed the problem of spectrum-based minimum-length scheduling in wireless networks that employ frequency-agile radios. They formulated the problem as a cross-layer optimization problem with consideration of simultaneous activations at the link layer and spectrum sharing at the physical layer. They proposed a solution procedure based...

    Provided By Naval Research Laboratory

  • White Papers // Oct 2010

    Channel Sharing in Cognitive Radio Networks

    In this paper, the authors consider a cognitive radio network in which the secondary users are allowed to share the spectrum with the primary users as long as the interference caused by the secondary users to the primary users is below a specified level. Both the primary users and secondary...

    Provided By Naval Research Laboratory

  • White Papers // Nov 2009

    Using Web Services to Enhance Geographic Information Systems

    This paper describes an approach to the extension of geographic information systems to take advantage of the continuing development of capabilities of the Semantic Web. This is presented in the context of a portal based Geospatial Information Database (GIDB), an object-oriented spatial database capable of storing multiple data types from...

    Provided By Naval Research Laboratory

  • White Papers // Oct 2009

    Optimal Scheduling in Interference Limited Fading Wireless Networks

    The authors consider the problem of minimum-length scheduling of point-to-point links in a Spatial TDMA (STDMA)- based wireless network with Rayleigh fading of both desired and interference signals. The problem formulation integrates the activation of multiple sets of links in the network, while taking into account their explicit statistical variations....

    Provided By Naval Research Laboratory

  • White Papers // Oct 2009

    Quantifying Pervasive Authentication: The Case of the Hancke-Kuhn Protocol

    As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g. location authentication. While many interesting and subtle protocols have been proposed and implemented to provide such strengthened authentication, there are very few proofs that such protocols satisfy the required properties....

    Provided By Naval Research Laboratory

  • White Papers // Sep 2009

    Systems for Anonymous Communication

    The authors present an overview of the field of anonymous communications, from its establishment. The anonymous communication hides who is communicating with whom, for example, on the internet anonymous communication would hide a sender's (or recipient's) network address (IP address, email address, etc.) from unwanted observation. Key systems are presented...

    Provided By Naval Research Laboratory

  • White Papers // Aug 2009

    Experiment and Field Demonstration of a 802.11-Based Ground-UAV Mobile Ad-Hoc Network

    This paper describes a field demonstration and presents the network performance of an 802.11 ground-UAV network composed of 11 ground stations, a mobile vehicle and two fixed wing UAVs, connected by two routing gateways to a legacy wired network. The network effects demonstrated include mobility, network partitions, network merges and...

    Provided By Naval Research Laboratory

  • White Papers // Aug 2009

    A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition

    It is widely agreed that building correct fault-tolerant systems is very difficult. To address this problem, this paper introduces a new model-based approach for developing masking fault-tolerant systems. As in component-based software development, two (or more) component specifications are developed, one implementing the required normal behavior and the other(s) the...

    Provided By Naval Research Laboratory

  • White Papers // Dec 2008

    Implementation of a Very Low Cost Portable Spacewire Monitor and Debugger

    The advent of a wide range of USB peripherals for personal computers has altered the test and measurement landscape. In particular, easily portable and inexpensive USB logic analyzers, such as the DigiView DV1-100, have enabled a host of industry-specific test applications. Such a logic analyzer used in conjunction with the...

    Provided By Naval Research Laboratory

  • White Papers // Oct 2007

    Range Authentication Protocols for Localization

    The authors have given a framework for using distance bounding and range authentication for use in localization. They have used this, not only to compare the use of distance bounding and range authentication in localization, but to design a two-stage mechanism that takes advantage of the special features of localization....

    Provided By Naval Research Laboratory

  • White Papers // Oct 2009

    Optimal Scheduling in Interference Limited Fading Wireless Networks

    The authors consider the problem of minimum-length scheduling of point-to-point links in a Spatial TDMA (STDMA)- based wireless network with Rayleigh fading of both desired and interference signals. The problem formulation integrates the activation of multiple sets of links in the network, while taking into account their explicit statistical variations....

    Provided By Naval Research Laboratory

  • White Papers // Dec 2008

    Implementation of a Very Low Cost Portable Spacewire Monitor and Debugger

    The advent of a wide range of USB peripherals for personal computers has altered the test and measurement landscape. In particular, easily portable and inexpensive USB logic analyzers, such as the DigiView DV1-100, have enabled a host of industry-specific test applications. Such a logic analyzer used in conjunction with the...

    Provided By Naval Research Laboratory

  • White Papers // Nov 2009

    Using Web Services to Enhance Geographic Information Systems

    This paper describes an approach to the extension of geographic information systems to take advantage of the continuing development of capabilities of the Semantic Web. This is presented in the context of a portal based Geospatial Information Database (GIDB), an object-oriented spatial database capable of storing multiple data types from...

    Provided By Naval Research Laboratory

  • White Papers // Oct 2009

    Quantifying Pervasive Authentication: The Case of the Hancke-Kuhn Protocol

    As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g. location authentication. While many interesting and subtle protocols have been proposed and implemented to provide such strengthened authentication, there are very few proofs that such protocols satisfy the required properties....

    Provided By Naval Research Laboratory

  • White Papers // Oct 2010

    Channel Sharing in Cognitive Radio Networks

    In this paper, the authors consider a cognitive radio network in which the secondary users are allowed to share the spectrum with the primary users as long as the interference caused by the secondary users to the primary users is below a specified level. Both the primary users and secondary...

    Provided By Naval Research Laboratory

  • White Papers // Nov 2010

    Testing of Policy-Based Dynamic Spectrum Access Radios

    Policy-driven Dynamic Spectrum Access (DSA) systems are emerging as one of the key technologies to enable the Department of Defense (DoD) to meet its increasing requirements for access to the electromagnetic spectrum. A key open issue surrounding deployment and continuing development of DSA systems concerns the need to test and...

    Provided By Naval Research Laboratory

  • White Papers // Aug 2009

    Experiment and Field Demonstration of a 802.11-Based Ground-UAV Mobile Ad-Hoc Network

    This paper describes a field demonstration and presents the network performance of an 802.11 ground-UAV network composed of 11 ground stations, a mobile vehicle and two fixed wing UAVs, connected by two routing gateways to a legacy wired network. The network effects demonstrated include mobility, network partitions, network merges and...

    Provided By Naval Research Laboratory

  • White Papers // Aug 2009

    A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition

    It is widely agreed that building correct fault-tolerant systems is very difficult. To address this problem, this paper introduces a new model-based approach for developing masking fault-tolerant systems. As in component-based software development, two (or more) component specifications are developed, one implementing the required normal behavior and the other(s) the...

    Provided By Naval Research Laboratory

  • White Papers // Oct 2010

    Optimal Scheduling in Frequency-Agile Wireless Networks

    In this paper, the authors reviewed the problem of spectrum-based minimum-length scheduling in wireless networks that employ frequency-agile radios. They formulated the problem as a cross-layer optimization problem with consideration of simultaneous activations at the link layer and spectrum sharing at the physical layer. They proposed a solution procedure based...

    Provided By Naval Research Laboratory

  • White Papers // Oct 2007

    Range Authentication Protocols for Localization

    The authors have given a framework for using distance bounding and range authentication for use in localization. They have used this, not only to compare the use of distance bounding and range authentication in localization, but to design a two-stage mechanism that takes advantage of the special features of localization....

    Provided By Naval Research Laboratory

  • White Papers // Sep 2009

    Systems for Anonymous Communication

    The authors present an overview of the field of anonymous communications, from its establishment. The anonymous communication hides who is communicating with whom, for example, on the internet anonymous communication would hide a sender's (or recipient's) network address (IP address, email address, etc.) from unwanted observation. Key systems are presented...

    Provided By Naval Research Laboratory

  • White Papers // May 2011

    Sleeping Dogs Lie on a Bed of Onions But Wake When Mixed

    The authors introduce and investigate sleeper attacks and explore them in the context of anonymous communication, especially mix networks. Sleeper attacks can make use of the interference inherent to mix protocols. Simply by leaving his own messages in a mix network an adversary can learn about the communication of network...

    Provided By Naval Research Laboratory

  • White Papers // Jan 2011

    Practical Vulnerabilities of the Tor Anonymity Network

    Onion routing is a technology designed to protect the security and privacy of network communications. In particular, Tor, the current widely-used onion routing system, was originally designed to protect intelligence gathering from open sources and to otherwise protect military communications over insecure or public networks, but it is also used...

    Provided By Naval Research Laboratory