MILCOM 2013 - 2013 IEEE Military Communications Conference 2013
DOI: 10.1109/milcom.2013.255
|View full text |Cite
|
Sign up to set email alerts
|

ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge

Abstract: Abstract-Situational awareness applications in disaster response and tactical scenarios require efficient communication without a managed infrastructure. In principle, the performance, size, weight, and power of commercial off-the-shelf mobile phones and tablets are sufficient to support such applications, provided that efficient protocols and mechanisms are put in place for the efficient and secure sharing and storage of content among such devices. ICEMAN (Information CEntric Mobile Ad-hoc Networking) is a sy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
2
2
2

Relationship

2
4

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…ICMANET supports situational awareness applications at the tactical edge. Declarative Attribute-based Naming, network coding, utility-based content caching and symmetric encryption are used in ICMANET to provide efficient communication for multiple simultaneous classes of situational awareness traffic in the presence of severe disruptions to network connectivity [111].…”
Section: ] Experimentsmentioning
confidence: 99%
“…ICMANET supports situational awareness applications at the tactical edge. Declarative Attribute-based Naming, network coding, utility-based content caching and symmetric encryption are used in ICMANET to provide efficient communication for multiple simultaneous classes of situational awareness traffic in the presence of severe disruptions to network connectivity [111].…”
Section: ] Experimentsmentioning
confidence: 99%
“…In [40], we conducted an extensive evaluation of ICEMAN through emulation with CORE/EMANE [7] to understand the performance characteristics of different policies. We modeled a tactical network consisting of 30 nodes (3 squads of 10) with different classes of situational awareness traffic.…”
Section: Summary Of Evaluationmentioning
confidence: 99%
“…Periodic purging and refreshing of interests ensure that stale paths are discarded and that new paths are discovered. Recent work [2] has demonstrated the value of combining network coding, ICN [14] and DTN [5], using interest-based routing. In the ICEMAN system, network coding can achieve significant performance benefits over fragmentation [15].…”
Section: Related Workmentioning
confidence: 99%
“…Formally, interest predicates for node S are represented as a set of weighted attribute/value pairs, I(S) ✓ A ⇥ V ⇥ N, where A, V, and N denote the domains for attributes, values, and weights. We say that content C with weighted attributes M (C) satisfies interest I(S) for node S with a satisfaction degree (C, S) defined as in [2], where…”
Section: Socraticmentioning
confidence: 99%
See 1 more Smart Citation