Abstract:The Command and Control (C2) system that provide information to the actors in a conflict has always been a key target for technology advancement. The ongoing development of automated digital military information systems has enabled, and is demanding the development of specific functional area support systems. The focus of communication systems and methods is shifting away from human to human communication towards human to machine and machine to machine communication. Along with this change have come proliferat… Show more
“…The proactive middleware has a role in inter-system communication and in principle it can be also applied in intra-system communication. Both the concept of ProWare and its implementations in simulation and practical applications has been previously described in [8], [9] and [10].…”
Section: A Proactive Middleware -Prowarementioning
confidence: 99%
“…We suggest the use of a distributed proactive middlewareProWare [8] to implement mediated interactions in real cyberphysical systems. The proactive middleware has a role in inter-system communication and in principle it can be also applied in intra-system communication.…”
Section: A Proactive Middleware -Prowarementioning
Cyber-physical systems depend on good situation awareness in order to cope with the changes of the physical world and in the configuration of the system to fulfill their goal functions. Being aware of the situation in the physical world enables a cyberphysical system to adapt its behaviour according to the actual state of the world as perceived by the cyber-physical system. Understanding the situation of the cyber-physical system itself enables adaptation of the behaviour of the system according to the current capabilities and state of the system, e.g., providing less features or features with limited functionality in case some of the system components are not functional. In order to build resilient cyber-physical systems we need to build systems that are able to consider both of these aspects in their operation.
“…The proactive middleware has a role in inter-system communication and in principle it can be also applied in intra-system communication. Both the concept of ProWare and its implementations in simulation and practical applications has been previously described in [8], [9] and [10].…”
Section: A Proactive Middleware -Prowarementioning
confidence: 99%
“…We suggest the use of a distributed proactive middlewareProWare [8] to implement mediated interactions in real cyberphysical systems. The proactive middleware has a role in inter-system communication and in principle it can be also applied in intra-system communication.…”
Section: A Proactive Middleware -Prowarementioning
Cyber-physical systems depend on good situation awareness in order to cope with the changes of the physical world and in the configuration of the system to fulfill their goal functions. Being aware of the situation in the physical world enables a cyberphysical system to adapt its behaviour according to the actual state of the world as perceived by the cyber-physical system. Understanding the situation of the cyber-physical system itself enables adaptation of the behaviour of the system according to the current capabilities and state of the system, e.g., providing less features or features with limited functionality in case some of the system components are not functional. In order to build resilient cyber-physical systems we need to build systems that are able to consider both of these aspects in their operation.
“…SA depends on the person's competence and understanding of the specific task related events and phenomena [1], [3], [4] and the situation picture such as Common Operational Picture (COP) is a presentation of all the task related information available for the person [4]. In many cases the information originates from a large amount of data and multiple sensor feeds which are automatically fused using multi-sensor data fusion processed, for example according to JDL model by the US Joint Directors of Laboratories Data Fusion Sub-Group [3], [5], [6], [7].…”
Section: Situation Awareness and Decision Makingmentioning
confidence: 99%
“…One example of Tactical Data Links is The Joint Tactical Information Distribution System (JTIDS) Link16 the high-capacity, ECM-resistant, secure data link for voice and data [16]. In C2 systems the shared information can be owned by different stakeholders with different geographical locations, different missions or even different security clearances [5]. Good real life example of that is the usage of Air Situation Data Exchange (ASDE) during the Euro Championship 2012 where NATO Programming Centre (NPC) supported Poland in the air situation data exchange with national organizations [17].…”
Section: Sharing Of Situational Awarenessmentioning
Exchanging of Situation Awareness information is extremely important for organizations in order to survive as part of the cyber domain. The situation Awareness is required for decision making and for an early warning of upcoming threats. Situation Awareness and the security information in the cyber domain differ from the kinetic domain. Because of that, Situation Awareness has different requirements and use cases, for example when considering time or geographical distances. There is always a risk when sharing security information due to the classified nature of the information. It might contain information of weaknesses or vulnerabilities of the organization, and if used wrongly it jeopardizes the continuity of the business or mission. The model introduced in this paper for creating information sharing topologies enables sharing of classified security related information between multiple organizations with the lowest possible risks levels.
“…The WSN middleware for handling the subscriptions for exchanging SA information has been introduced in our previous work. 5 In this article, we consider the communication between asynchronous WSN nodes -meaning that clocks in different nodes are not synchronized and the start-up, data production and consumption processes in the nodes are activated independently from each other. The nodes in the network may employ different operating modes or duty cycling schemes and incorporate several heterogeneous sensors, with different modalities, characteristics and sampling frequencies.…”
This article introduces a time-selective strategy for enhancing temporal consistency of input data for multi-sensor data fusion for in-network data processing in ad hoc wireless sensor networks. Detecting and handling complex time-variable (real-time) situations require methodical consideration of temporal aspects, especially in ad hoc wireless sensor network with distributed asynchronous and autonomous nodes. For example, assigning processing intervals of network nodes, defining validity and simultaneity requirements for data items, determining the size of memory required for buffering the data streams produced by ad hoc nodes and other relevant aspects. The data streams produced periodically and sometimes intermittently by sensor nodes arrive to the fusion nodes with variable delays, which results in sporadic temporal order of inputs. Using data from individual nodes in the order of arrival (i.e. freshest data first) does not, in all cases, yield the optimal results in terms of data temporal consistency and fusion accuracy. We propose time-selective data fusion strategy, which combines temporal alignment, temporal constraints and a method for computing delay of sensor readings, to allow fusion node to select the temporally compatible data from received streams. A real-world experiment (moving vehicles in urban environment) for validation of the strategy demonstrates significant improvement of the accuracy of fusion results.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.