Enemy Track Based Threat Assessment in Distributed Sensing Networks

نویسندگان

  • Abhay Joshi
  • Rajan Batta
  • Rakesh Nagi
چکیده

Design of efficient distributed sensing/fusion networks involves issues such as sensor mobility, bandwidth capacity and reliability of communication links. Communication links between the sensors and fusion centers referred to as clusterheads are prone to jamming or foliage effects. In a recent paper, Patel et al. (2005) proposed a dynamic maximal expected coverage model for sensor networks operating under a uniform threat environment. This is useful in a situation where only the overall threat level is known. When enemy track information is available from sensors, it can be used to provide accurate assessments of threat probabilities, which vary in space and time. The first part of our work is in the calculation of these time/space dependent probabilities. We then enhance Patel et al.’s model by incorporating time dependent link failure probabilities. Computational studies involving packet level analysis are performed using OPNET network simulator, to study the benefit of using the revised threat probabilities. Results of a case study are presented, using a network centric warfare simulation testbed developed at the University at Buffalo. Both the computational and simulation results demonstrate that the track based topology management model is superior to the uniform threat topology model in terms of packets received (740% more), packets lost (7-50% less) and expected coverage (by 7.2%).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Architecture for Genetic Algorithm-Based Threat Assessment

The determination and subsequent analysis of potential enemy course of actions (COAs) forms a key element within the Intelligence Preparation of the Battlespace (IPB) process. Enemy COA prediction and analysis is also key element of threat assessment data fusion processing. Here we formulate an architecture that employs genetic algorithms (GAs) to generate and evaluate enemy COAs. This formulat...

متن کامل

Distributed and Cooperative Compressive Sensing Recovery Algorithm for Wireless Sensor Networks with Bi-directional Incremental Topology

Recently, the problem of compressive sensing (CS) has attracted lots of attention in the area of signal processing. So, much of the research in this field is being carried out in this issue. One of the applications where CS could be used is wireless sensor networks (WSNs). The structure of WSNs consists of many low power wireless sensors. This requires that any improved algorithm for this appli...

متن کامل

ATRIA: Cooperative Agent-Based Recovery in a Communications Network

Today's dynamic battlefield environment requires rapid reconfiguration and reorganization of warfighter assets, communication links, and computing resources in response to enemy attacks. The extent to which supporting operations can take place autonomously, and thus more rapidly, could be critical to neutralizing future enemy threats. This paper describes a software system developed at The Aero...

متن کامل

Intelligence analysis and threat assessment: towards a more comprehensive model of threat

A central focus of intelligence is the identification, analysis and assessment of threat. However, as acknowledged by intelligence practitioners, threat assessment lags behind the related field of risk assessment. This paper highlights how definitions of threat currently favoured by intelligence agencies are primarily based on threatening entities alone. Consequently, assessments of threat are ...

متن کامل

Threat Assessment Using Evidential Networks

Decision makers operating in modern defence theatres need to comprehend and reason with huge quantities of potentially uncertain and imprecise data in a timely fashion. In this paper, an automatic information fusion system is developed which aims at supporting a commander’s decision making by providing a threat assessment, that is an estimate of the extent to which an enemy platform poses a thr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006