Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2018 2018
DOI: 10.1117/12.2311404
|View full text |Cite
|
Sign up to set email alerts
|

Named data networking protocols for tactical command and control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…However, as expected, the push-based IP-multicast architecture exhibits lower delays than the pullbased NDN architecture. The same testbed is reused in [29] for a similar experiment. In this paper, the authors discuss some of the advantages and disadvantages with the NDN security model.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, as expected, the push-based IP-multicast architecture exhibits lower delays than the pullbased NDN architecture. The same testbed is reused in [29] for a similar experiment. In this paper, the authors discuss some of the advantages and disadvantages with the NDN security model.…”
Section: Related Workmentioning
confidence: 99%
“…Traffic analysis is also a challenge, in NDN the Interest is sent in clear text. This is not adequate for military networks [29]. The security model does not handle network security (NETSEC).…”
Section: B Securitymentioning
confidence: 99%
“…Radio networks for tactical communication require series of standard formatted messages which are used to exchange digital/analog data between radios, associated with the system. The exchange of this information permits continuous coordination and harmonization among radio nodes and sometimes between the tactical control systems involved [3], [4]. It minimizes mutual interference and significantly increases the effectiveness of the systems in a joint operation area.…”
Section: Introductionmentioning
confidence: 99%
“…Sun, Y [7] et al studied the C2 structure design of distributed military organizations, established a multi-objective optimization model to balance and minimize the relative load of decision-makers, and proposed a multi-objective genetic algorithm. Evans J et al [8] mainly studied how to meet the requirements of the rapid decision-making cycle of tactical command and control. We discussed the security requirements of security packages and how named data networks meet these requirements.…”
Section: Introductionmentioning
confidence: 99%