Browse Topic: Telecommunications

Items (4,264)
ABSTRACT Information is critical to successful deployment and operation of unmanned vehicles. The increasing use of unmanned vehicles in modern conflicts has substantially increased the strategic and tactical value of these vehicles and the information they gather. It is now common public knowledge that the video streams of some predator drones were unencrypted and militants were able to use cheap commercially available software to intercept these feeds. This is an example of security as an afterthought. Encryption and security are critical to unmanned systems and should be implemented early in the development process. This paper explores some of the issues related to encryption and security of unmanned vehicles and communication
Phillips, Ramie
ABSTRACT The roll-up roll-away Tactical Vehicle-to-Grid / Vehicle-to-Vehicle (V2G/V2V) system provides a plug-and-play, very fast forming, smart, aggregated, and efficient power solution for an emerging (including austere) contingency base that is ready to generate up to 240kW of 208 VAC 3-phase power in less than 20 minutes. The system is designed to provide grid services (peak shaving, Volt/VAR control, power regulation, and current source mode) beneficial to emerging and mature grids (CONUS or OCONUS). The system uses vehicle Transmission-Integrated Generators (TIGs) to produce 600VDC power for use by vehicle hotel-loads (electrification) and off-board loads (tents/shelters, communications centers, or other electrical loads). Each vehicle is equipped with a Vehicle Communication Module (VCM), which provided the communication capability prior to initiation of transfer of up to 100kW of power via the J1772 SAE Combo Connector between vehicles (V2V) and/or for export power off-vehicle
Hancock, JanieKolhoff, Steven W.McGrew, Dean Z.Masrur, M. AbulSkowronska, Annette G.Vandiver, JamesGatherer, JimPalmer, JasonWood, RobertCurtiss, PeterDorflinger, Max
ABSTRACT With recent advancements in the automotive world and the introductions of autonomous vehicles, automotive cybersecurity has become a main and primary issue for every automaker. In order to come up with measures to detect and protect against malicious attacks, intrusion detection systems (IDS) are commonly used. These systems identify attacks while comparing normal behavior with abnormalities. In this paper, we propose a novel, two-stage IDS based on deep-learning and rule-based systems. The objective of this IDS is to detect malicious attacks and ensure CAN security in real time. Deep Learning has already been used in CAN IDS and is already proven to be a successful algorithm when it comes to extensive datasets but comes with the cost of high computational requirements. The novelty of this paper is to use Deep Learning to achieve high predictability results while keeping low computational requirements by offsetting it with rule-based systems. In addition, we examine the
Zhang, LinxiKaja, NevrusShi, LyndonMa, Di
ABSTRACT This paper describes strategies to secure military ground vehicles by using digital fingerprinting, detection algorithms, and bus segmentation to identify and remove anomalous messages from the Controller Area Network (CAN) bus. Modern automotive buses were designed for reliability rather than security. This lack of security means that any node on the bus can transmit a message to any other node, and the receiver cannot verify the sender or that the message is unaltered. The intrusion defense system (IDS) protects the bus by actively monitoring traffic on all connected busses and removing messages identified as anomalies. Digital fingerprinting combined with various detection algorithms identifies these anomalies while bus segmentation simultaneously defends the CAN bus by removing anomalous messages. Citation: J. Wolford, C. Westrick, P. Moldenhauer, “Cyberattack Defense Through Digital Fingerprinting, Detection Algorithms, and Bus Segmentation in Ground Vehicles”, In
Wolford, JonathanWestrick, CourtneyMoldenhauer, Peter
ABSTRACT A simulation capable of modeling grid-tied electrical systems, vehicle-to-grid (V2G) and vehicle-to-vehicle(V2V) resource sharing was developed within the MATLAB/Simulink environment. Using the steady state admittance matrix approach, the unknown currents and voltages within the network are determined at each time step. This eliminates the need for states associated with the distributed system. Each vehicle has two dynamic states: (1) stored energy and (2) fuel consumed while the generators have only a single fuel consumed state. One of its potential uses is to assess the sensitivity of fuel consumption with respect to the control system parameters used to maintain a vehicle-centric bus voltage under dynamic loading conditions
Jane, Robert S.Parker, Gordon G.Weaver, Wayne W.Goldsmith, Steven Y.
ABSTRACT US Army and Marine Corps tactical networking and command post programs have a widely-acknowledged critical need to improve mobility, including the objective of moving to mobile, vehicle-mounted command posts that can move hourly. The current state of the art for tent-based command posts requires hours of setup, which includes thousands of feet of copper wiring that delay network availability. To enable mobility for warfighting, the National Security Agency (NSA) established a program (with a set of guidelines) called “Commercial Solutions for Classified” (CSfC). CSfC-based mobility solutions have great potential to enable command post mobility and soldier dismounted situational awareness using ground vehicles as network nodes. However, the extensive requirements and processes involved are complex and not well understood. This paper compares various CSfC network architectures, and proposes several approaches for CSfC solutions optimized for mobility use cases. The paper further
Kawasaki, Charlie
ABSTRACT This paper focuses on the use of PKI within intra vehicle networks in compliance with the VICTORY specification. It will describe how the use of PKI within vehicle networks can leverage and integrate with the other PKI efforts across the Army to ensure a consistent and interoperable solution. It will also describe some of the challenges with implementing PKI as part of VICTORY and introduce possible solutions to address these challenges
Fedorchak, Bob
ABSTRACT The Vehicular Integration for C4ISR/EW Interoperability (VICTORY) Standard adopts many protocols that are traditionally used for developing enterprise application software deployed on general-purpose or server/workstation based computing platforms. This has led to discussions regarding the suitability of the VICTORY Standard for deployment to embedded and resource-constrained platforms. An independent software implementation of VICTORY core services was developed within the U.S Army Tank and Automotive Research, Development and Engineering Center (TARDEC) VICTORY System Integration Lab (SIL). These services were ported from a general-purpose computing platform to an embedded environment. Test procedures were developed and extensive performance tests were conducted to determine the feasibility of operating in this resource-constrained environment. This paper discusses the development procedures, implementation, test procedures, and performance results
Russell, Mark
ABSTRACT Curtiss-Wright has developed an open-standard approach for real time control over Ethernet, incorporating VICTORY .specifications. The paper presents definitions for Real Time, traditional perceptions of Ethernet for real-time usage, solutions for real time, a comparison to MIL-STD-1553, and suggestions for additional specifications to include in VICTORY
Jedynak, David
ABSTRACT The goal of Secure Wireless Communications is to provide controlled access to classified or controlled unclassified information (CUI) over any RF transport in the field – between vehicles and end users alike. Secure – yet simplified – system deployment, node integration, managed accessibility, network situational awareness, and configuration management are all essential for maintainability. Citation: D. Jedynak, C. Kawasaki, D. Gregory, “Managing Next Generation Open Standard Vehicle Electronics Architectures”, In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 13-15, 2019
Gregory, DavidNelson, Jeff
ABSTRACT Improved combat and tactical radios along with battle command systems that provide real-time communication and situation awareness information are frequently appliqued into the Army’s ground combat vehicles to support its modernization initiatives. During the integration of these devices within the vehicle it is often the case that the additional components cannot be placed in a readily accessible proximity to the crew, due to the space-constrained interiors as well as the equipment’s expanded SWaP (Space Weight and Power). This paper describes an ongoing effort/project to design and implement a Victory Radio Adapter (VRA) which supports the integration and single point control of multiple radios having different physical and logical interfaces. The VRA will minimize SWaP, cable count and provide a scalable/agnostic combat radio integration environment that allows control using VICTORY compliant messages. This paper further details the Victory Radio Adapter concept along with
Petty, Millard E.Wilson, Chad J.Wong, Michael C.Smith, Michael R.Wright, Ronnie L.
ABSTRACT Off-road mobility for an individual autonomous ground vehicle (AGV) can be severely limited by extreme environments (such as muddy patches or steep cliffs in off-road terrain). However, when operating as a group, cooperation between the AGVs can be leveraged to overcome such limitations. Traditionally cooperation has been achieved through information sharing, enabling the AGVs to “avoid” the extreme environments. In this paper we propose to achieve such cooperation through physical energy sharing, where the AGVs can “recover” from these environment scenarios. Specifically, we propose the use of a robotic manipulator (RM) that connects a disabled or degraded AGV with an operational AGV. A fleet level controller is proposed. The AGVs and the RM are modeled in Modelica, and integrated with the controller to perform simulations. We demonstrate collaborative movement in two scenarios, namely crossing a muddy patch and climbing a steep cliff. In each scenario the individual vehicle
Ashley, MichielMcMullan, DavisGopalswamy, Swaminathan
ABSTRACT Continued proliferation of terrorist activities throughout the globe, as well as other low to medium intensity conflicts, present unique challenges to the US Army, Marines, and Special Operating Forces, especially in times of reduced manpower and operating budgets. Soldiers are called upon to do increasingly complex, dangerous, and lengthy missions with reduced troop strength and in more remote and austere conditions often far from traditional means of ready resupply. The need for organic persistent surveillance of potentially hostile areas is also of significant value to improve situational awareness and preserve the tactical advantage. The high risk nature of these missions can be significantly mitigated and operational tempo (OPTEMPO) improved by using unmanned solutions. Previously proposed solutions attempting to make use of Unmanned Ground Vehicles (UGVs) or Unmanned Air Vehicles (UAVs) alone experienced multiple problems. One solution that addresses these issues is to
Deminico, Mathew R.Mills, Myron E.
ABSTRACT Electrical power system upgrades needed to fulfill mission objectives for next generation vehicles will require technology advances such as greater power density, increased functionality, and higher operating temperature. To meet these requirements, electrical power demands will exceed the capabilities of currently available low voltage power systems. High Voltage DC (HVDC) systems, e.g., 270 – 800 VDC, are being considered to meet next generation vehicle requirements, but these electrical power systems have the potential for extremely large fault currents in case of electrical equipment failure. Improved battery safety and intelligent Solid State Circuit Breakers (SSCB) and Solid State Power Controllers (SSPC) are needed to improve mission effectiveness, reliability, and personnel safety of next generation military and commercial ground, air, and sea vehicle electrical power systems. In this paper we present three enabling technologies developed by Creare: (1) an intelligent
Pilvelait, BruceCameron, BenRentel, CarlosFogg, DavidFinger, Bill
ABSTRACT Most of the current fielded Unmanned Ground Vehicle (UGV) functionality is dependent on the ability to drive the UGV using tele-operation technology. In addition, a large number of payloads require tele-operation to perform the mission function. Tele-operation technology is dependent on providing the operator streaming video, which is reliant on radio capabilities along with video format, resolution and compression routines. There have been Army efforts to perform real-time network modeling as part of Program Executive Office-Integration (PEO-I). These are primarily related to the passing of C2 tactical information from vehicle to vehicle. Ground Vehicle Robotics (GVR) has funded a ‘proof of principle’ effort that culminated in a demonstration performed in February, 2011. This effort modeled the impact of latency, packet/data loss and distorted signal on streaming video being sent from a virtual UGV to the Operator Control Unit (OCU). These distorted signals, cause loss of
Bounker, PaulHope, KevinKaniarz, JohnBergin, Dennis
ABSTRACT This paper describes the use of neural networks to enhance simulations for subsequent training of anomaly-detection systems. Simulations can provide edge conditions for anomaly detection which may be sparse or non-existent in real-world data. Simulations suffer, however, by producing data that is “too clean” resulting in anomaly detection systems that cannot transition from simulated data to actual conditions. Our approach enhances simulations using neural networks trained on real-world data to create outputs that are more realistic and variable than traditional simulations. Citation: P.Feldman, “Training robust anomaly detection using ML-Enhanced simulations”, In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 11-13, 2020
Feldman, Philip
ABSTRACT Building embedded systems is nothing like building desktop applications, as the hard real time requirements and relative harshness of the operating environment further constrains design choices to meet real world needs. Those familiar with mainframe or server farm hosted, high volume, wide bandwidth applications know similar harsh computing environments for application development. Given that more man-hours have been devoted to web application development over the past decade than have been devoted to embedded application development, there may be some valuable lessons to be learned that can be adopted by the embedded community for in-vehicle computing. The best web application development teams successfully apply the notions of Representational State Transformation (REST) and Resource Description Framework (RDF) to handle the increasing demands on their sites. We have taken these technologies and applied them to the smaller scale vehicle telematics platforms (PowerPC, ARM
Branigan, JamesCunningham, JohnDempsey, PatrickHackleman, BrettVanderLei, Paul
ABSTRACT A cybersecurity exploit can be crafted to affect the vehicle diagnostic adapter system, which consists of the technician, vehicle diagnostic adapter, device drivers, and maintenance software all working together in a trusting relationship. In this paper, application layer encryption of the SAE J1939 diagnostic traffic between the vehicle diagnostic application and the in-vehicle secure gateway is developed to mitigate the vulnerabilities in potential attack paths. The proposed encryption strategy uses AES-128, which uses 16-byte cipher blocks. The secure connection is established by adjusting the bit rate to over twice the normal speed and packing a single J1939 message into two encrypted sequential CAN frames, The in-vehicle diagnostic gateway employs a hardware security module. A provisioning process is employed wherein the diagnostic application and the hardware security module both generate public-private key pairs. An elliptic curve Diffie-Hellman (ECDH) key exchange then
Daily, Jeremy S.Kulkarni, Prakash
ABSTRACT To improve robustness of autonomous vehicles, deployments have evolved from a single intelligent system to a combination of several within a platoon. Platooning vehicles move together as a unit, communicating with each other to navigate the changing environment safely. While the technology is robust, there is a large dependence on data collection and communication. Issues with sensors or communication systems can cause significant problems for the system. There are several uncertainties that impact a system’s fidelity. Small errors in data accuracy can lead to system failure under certain circumstances. We define stale data as a perturbation within a system that causes it to repetitively rely on old data from external data sources (e.g. other cars in the platoon). This paper conducts a fault injection campaign to analyze the impact of stale data in a platooning model, where stale data occurs in the car’s communication and/or perception system. The fault injection campaign
Louis, August St.Calhoun, Jon C.
ABSTRACT This paper discusses how programs can leverage VICTORY architecture and specifications in order to achieve interoperability between electronics systems integrated with ground vehicles. It explains the contents of the VICTORY architecture, and the concept of compliance with the VICTORY system and component type specifications. It suggests a model for Army ground vehicle programs to utilize the VICTORY architecture and specifications, and a process called guided self-verification to test components for compliance with VICTORY specifications
Moore, Michael S.Price, Jeremy C.Griffith-Boyle, Kay
ABSTRACT The demand for mobile, secure communications has been and will continue to be a fundamental requirement for dismounted, urban and distributed operations in the field. It is imperative that soldiers on the front lines receive actionable information in a timely, secured and uninterrupted manner to increase force protection and effectiveness. In this paper, we describe a novel, high technical maturity (TRL 8+) communications link that offers the mounted and dismounted soldier secure, beyond line of sight, encrypted capability for weapons control and command & control of multiple platforms. An innovative spread spectrum waveform was designed from the ground up to deliver necessary functionality for reliable communications amongst multiple nodes with a data rate and range commensurate with battlefield scenarios
Mehta, Amish A.Cambridge, AndrewGardner, Brian
ABSTRACT Individual complex systems routinely operate with other complex systems (in a complex environment no less!) to achieve desired military capabilities; generally speaking, Lethality, Mobility and Survivability. While challenging in itself, this scenario is complicated by the fact that new systems are being deployed and retired which imposes training requirements and adaptation on the part of users and maintainers. The author will characterize the challenge and describe an approach to coping with the challenge and mitigating its impact. Specifically, ground combat vehicle capabilities are undergoing a transformation which can be accelerated by employing some of the techniques described and improve our soldiers’ ability to meet and defeat rapidly changing threats. The technique is generically referred to as Capability Planning and it is supported by set of software tools and analytic techniques, commonly called a Decision Support Framework. This paper characterizes the techniques
Gill, John J.Biltgen, Patrick T.
ABSTRACT The authors studied the effects of different types of armor on the performance of spin-torque microwave detectors (STMD). Working prototypes of novel nano-sized spintronic sensors of microwave radiation for battlefield anti-radar and wireless communications applications are being integrated into Sensor Enhanced Armor (SEA) and Multifunctional Armor (MFA) and tested in SEA-NDE Lab at TARDEC. The preliminary theoretical estimations have shown that STMD based on the spin-torque effect in magnetic tunnel junctions (MTJ), when placed in the external electromagnetic field of a microwave frequency, can work as diode detectors with the maximum theoretical sensitivity of 1000 V/W. These STNO detectors could be scaled to sub-micron size, are frequency-selective and tunable, and are tolerant to ionizing radiation. We studied the performance of a STMD in two different dynamical regimes of detector operation: in well-known traditional in-plane regime of STMD operation and in recently
Bankowski, ElenaMeitzler, ThomasPesys, Tomas
ABSTRACT This paper describes an approach to aid the many military unmanned ground vehicles which are still teleoperated using a wireless Operator Control Unit (OCU). Our approach provides reliable control over long-distance, highly-latent, low-bandwidth communication links. The innovation in our approach allows refinement of the vehicle’s planned trajectory at any point in time along the path. Our approach uses hand-gestures to provide intuitive fast path editing options, avoiding traditional keyboard/mouse inputs which can be cumbersome for this application. Our local reactive planner is used for vehicle safeguarding. Using this approach, we have performed successful teleoperation nearly 1500 miles away over a cellular-based communications channel. We also discuss results from our user-tests which have evaluated our innovative controller approach with more traditional teleoperation over highly-latent communication links
Baker, Chris LBatavia, Parag
ABSTRACT Connected and automated vehicles (CAVs) leverage onboard sensing and external connectivity using Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I) and Vehicle-to-Everything (V2X) technologies to "know" the upcoming operating environment with some degree of certainty, significantly narrowing prior information gaps. These technologies have been traditionally developed and used for driver assistance and safety but are now being used to operate the vehicle more efficiently [1–5]. The eco-driving algorithm, which leverages the data available through these streams, performs two key functions: (1) acceleration smoothing and (2) eco-approach and departure (Eco-AND) at signalized intersections. The algorithm uses information from neighboring vehicles and signalized intersections to calculate an energy-efficient speed trajectory. This paper presents the development of an Android-based driver advisory application that leverages cellular Internet connectivity and Traffic
Bhagdikar, PiyushGankov, StasRengarajan, SankarSarlashkar, JayantHotz, Scott
ABSTRACT Sharing information among vehicles in an unmanned ground vehicle (UGV) convoy allows for improved vehicle performance and reduces the need for each vehicle to be equipped with a full-suite of sensors. Information such as obstacle data, surface properties, and terrain maps are particularly useful for vehicle control and high-level behaviors. This paper describes a system architecture for sharing semantic information among vehicles in a convoy operation. This architecture is demonstrated by sharing terrain information between vehicles in a two-vehicle convoy in both simulation and on actual autonomous vehicles. Update rules fuse information from different sources in a statistical manner and allow for an onboard algorithm to make high-level decisions about the incoming data whether it be from its own sensors or semantic information from other vehicles
Ferrin, Jeffrey L.Bybee, Taylor C.
ABSTRACT Curtiss-Wright has developed an open-standard approach to low latency digital video distribution, incorporating VICTORY .specifications and other open standards, including Motion JPEG 2000. The paper presents various application definitions, parameters, and reference architectures, demonstrating the applicability to ground vehicles, and suggesting additional specifications and open standard to include in VICTORY
Jedynak, David
ABSTRACT Communications has come a long way from the two dimensional model provided by voice and data. Today complete situational awareness requires bringing a third dimension, video, into the mix. Implementing this unified view into today’s military vehicles calls for a unit with a well thought out design that interfaces thoroughly with other equipment and minimizes SWAP-C impact. This paper addresses the efficient convergence of video with existing voice and data presenting unified communications into a single SWAP-C device
Elms, BrettNair, UnniD’Agostino, Rosemarie
ABSTRACT Radio frequency products spanning multiple functions have become increasingly critical to the warfighter. Military use of the electromagnetic spectrum now includes communications, electronic warfare (EW), intelligence, and mission command systems. Due to the urgent needs of counterinsurgency operations, various quick reaction capabilities (QRCs) have been fielded to enhance warfighter capability. Although these QRCs were highly successfully in their respective missions, they were designed independently resulting in significant challenges when integrated on a common platform. This paper discusses how the Modular Open RF Architecture (MORA) addresses these challenges by defining an open architecture for multifunction missions that decomposes monolithic radio systems into high-level components with well-defined functions and interfaces. The functional decomposition maximizes hardware sharing while minimizing added complexity and cost due to modularization. MORA achieves
Melber, AdamDirner, JasonJohnson, Michael
ABSTRACT Robotic platforms require accurate geo-spatial localization for high-level mission planning, real-time site reconnaissance, and multi-machine collaboration. Global navigation satellite system (GNSS) receivers are most commonly used to provide UGVs with accurate geolocation. However, GNSS is not reliable in contested environments because it is vulnerable to jamming, spoofing and black-outs. To address these issues, the United States Army Corps of Engineers (USACE) -Engineer Research and Development Center (ERDC) has developed the Active Terrain Localization Imagery System (ATLIS) which uses on-board perception and a priori satellite imagery to eliminate reliance on GNSS for global positioning of a ground vehicle. Using LiDAR and camera imagery, ATLIS creates a vehicle-centric, orthorectified image that is compared to an a priori satellite image using template matching. It then produces a global position estimate for the vehicle. We develop a method to estimate the uncertainty
Niles, KennethBunkley, StevenWagner, W. JacobBlankenau, IsaacNetchaev, AntonSoylemezoglu, Ahmet
ABSTRACT The Controller Area Network (CAN) protocol is still a de-facto standard for in-vehicle communication between Electronic Control Units (ECUs). The CAN protocol lacks basic security features such as absence of sender node information, absence of authentications mechanism and the plug and play nature of the network. The payload in a CAN data packet is very small i.e. 8 bytes, therefore, implementation of cryptographic solutions for data integrity verification is not feasible. Various methods have been proposed for ECU identification, one of the methods is clock intrusion detection system (CIDS) [14]. The proposed method is based on authenticating the message sender by estimating the unique characteristics of the clock crystal. In an asynchronous network, the clocking information in a transmitted payload is entirely dependent upon the crystal which invokes the clock. These unique characteristics exists because of the asymmetry in the microstructure of the material. The challenge
Tayyab, MuhammadHafeez, AzeemMalik, Hafiz
ABSTRACT This paper discusses various soft security considerations that should be accounted for in the next generation of advanced military unmanned systems. By modeling unmanned system teams as mobile ad hoc networks, we underscore the different types of information-based security vulnerabilities that motivated adversaries may be able to exploit in unmanned systems. Then we provide an overview of computational trust and show that it can be used to defend against these vulnerabilities by finding the most reliable agents to interact with from a pool of potential agents. Finally, we discuss ongoing work at U.S. Army TARDEC that is applying computational trust within a vehicle controller for autonomous convoy operations
Mikulski, Dariusz
ABSTRACT One of the main challenges of co-simulating hardware-in-the-loop systems in real-time over the Internet is the fidelity of the simulation. The stochastic delay of the Internet may significantly distort the dynamics of the network-integrated system. This paper presents the development of an iterative learning control based approach to improve fidelity in such network-integrated systems. Towards this end, a new metric for characterizing fidelity is proposed first, which, unlike some existing metrics, does not require knowledge about the reference dynamics (i.e., dynamics that would be observed, if the system was physically connected). #ext, using this metric, the problem of improving fidelity is formulated as an iterative learning control problem. Finally, the proposed approach is utilized in a case study, which shows that the proposed approach can significantly improve the fidelity in Internet-distributed hardware-in-the-loop simulation
Ersal, TulgaBrudnak, Mark J.Kim, YoungkiSalvi, AshwinSiegel, Jason B.Stefanopoulou, AnnaStein, Jeffrey L.Filipi, Zoran
ABSTRACT This paper describes strategies to secure military ground vehicles by using digital fingerprinting, detection algorithms, and bus segmentation to identify and remove anomalous messages from the Controller Area Network (CAN) bus. Modern automotive buses were designed for reliability rather than security. This lack of security means that any node on the bus can transmit a message to any other node, and the receiver cannot verify the sender or that the message is unaltered. The intrusion defense system (IDS) protects the bus by actively monitoring traffic on all connected busses and removing messages identified as anomalies. Digital fingerprinting combined with various detection algorithms identifies these anomalies while bus segmentation simultaneously defends the CAN bus by removing anomalous messages. Citation: J. Wolford, C. Westrick, P. Moldenhauer, “Cyberattack Defense Through Digital Fingerprinting, Detection Algorithms, and Bus Segmentation in Ground Vehicles”, In
Wolford, JonathanWestrick, CourtneyMoldenhauer, Peter
ABSTRACT Over time, the National Institute of Standards and Technology (NIST) has refined the 4Dimension / Real-time Control System (4D/RCS) architecture for use in Unmanned Ground Vehicles (UGVs). This architecture, when applied to a fully autonomous vehicle designed for missions in urban environments, can greatly assist in the process of saving time and lives by creating a more intelligent vehicle that acts in a safer and more efficient manner. Southwest Research Institute (SwRI®) has undertaken the Southwest Safe Transport Initiative (SSTI) aimed at investigating the development and commercialization of vehicle autonomy as well as vehicle-based telemetry systems to improve active safety systems and autonomy. This paper will discuss the implementation of the 4D/RCS architecture to the SSTI autonomous vehicle, a 2006 Ford Explorer
McWilliams, GeorgeBrown, Michael
Abstract Current and future military vehicles will be expected to not only last longer than their predecessors, but also operate with a flexible mission package. These vehicles must be architected for lifecycle multiple upgrades of electronics and general product improvements. The ability to be upgraded and reconfigured for flexible mission profiles compels the vehicle’s architecture be centered around a “data bus” network backbone that facilitates “universal plug and play” of electronic payloads. The vehicle’s over all data stream will consist of at a minimum of voice, video, control and diagnostics. To maintain flexibility as well as to be cost effective in support of the “plug and play concept” for new and upgraded electronic payloads it is a fundamental requirement that every type of current and foreseeable data streams be able to coexist on one single network backbone. Only this architecture will guarantee the most flexible, and scalable reconfiguring for future expansions or
Murphree, JayWeil, RoarkWootton, John R.
ABSTRACT The confluence of intra-vehicle networks, Vehicular Integration for (C4ISR) Command, Control Communication, Computers, Intelligence, Surveillance, Reconnaissance/(EW) Electronic Warfare Interoperability (VICTORY) standards and onboard general-purpose processors creates an opportunity to implement Army combat ground vehicle intercommunications (intercom) capability in software. The benefits of such an implementation include 1) SWAP savings, 2) cost savings, 3) simplified path to future upgrades and 4) enabling of potential new capabilities such as voice activated mission command. The VICTORY Standards Support Office (VSSO), working at the direction of its Executive Steering Group (ESG) members (Program Executive Office (PEO) Ground Combat Systems (GCS), PEO Combat Support and Combat Service Support (CS&CSS), PEO Command Control Communications-Tactical (C3T) and PEO Intelligence, Electronic Warfare and Sensors (IEW&S)), has developed and demonstrated a software intercom
Kelsch, GeoffreySerafinko, RobertFrissora, Anthony
ABSTRACT Materials and parts in complex systems, such as ground vehicles, can suffer from fatigue due to use, age and other stresses experienced during service. It is therefore essential to evaluate damage and predict the remaining life, reliability and safety of the vehicle. This paper describes the design of a wireless system for real-time monitoring of ground vehicles using Lamb waves. The proposed approach integrates sensor technology, signal processing and wireless networking into a single solution for online structural health monitoring (SHM). Lamb wave inspection is accomplished by inexpensive piezoelectric transducer patches (PZT), which are surface-mounted on the critical components of the vehicle without interrupting its operation. Lamb wave scattering from damage is obtained by comparing the recorded signal with the healthy sample and then damage-related features are identified using Probability Diagnostic Imaging (PDI). The problem of multiple Lamb wave modes is addressed
Dib, GergesKarpenko, OleksiiKlaser, JacobUdpa, Lalita
ABSTRACT Recent advances in spintronics resulted in the development of a new class of radiation-resistant nano-sized microwave devices - spin-torque nano-oscillators (STNO). To use these novel nano-scale devices in wireless communications system as either microwave sources or detectors it is necessary to develop antennas coupled to STNO and providing efficient radiation and reception of microwave radiation. We demonstrate that it is possible to design antennas of a sub-wavelength size that have sufficiently high efficiency to be successfully used in spintronic communication devices. A coplanar antenna has the best performance characteristics, because its impedance could be easily matched with the impedance of nano-scale spintronic devices. We developed prototype spintronic devices with matched coplanar antennas (oscillators and radar detectors) which could be embedded into armor, thereby improving the survivability of the antennas as well as reducing the visual signature of antennas on
Bankowski, ElenaMeitzler, ThomasZielinski, SteveSlavin, AndreiTiberkevich, Vasil
ABSTRACT This paper will discuss trends in compatibility issues between radio systems and Tactical Vehicle on-board systems which have been identified as potential interference sources and discuss electromagnetic compatibility (EMC) between co-located radio systems. All Tactical vehicles have electronic systems which come as part of the base vehicle, such as lights, air-conditioners, wind shield wipers, etc. all of which have the potential to disrupt communications. To further complicate the radio frequency environment today’s tactical vehicles are being outfitted with new sophisticated technology such as programmable communications systems, sensor systems and remote weapon stations. The new systems are complex and are subject to emitting and absorbing electromagnetic radiation which can severely degrade radio system performance and cause inadvertent electromagnetic fratricide
Busayadilok, TanyaBohn, Frank A.
ABSTRACT A key objective of the Vehicular Integration for C4ISR/EW Interoperability (VICTORY) Architecture is to use open standards to increase the portability of C4ISR/EW systems and enhance interoperability within military ground vehicles. When possible these technologies are adopted by VICTORY and when existing specifications are inadequate, best-practices are used to develop the necessary adaptations. Many Commercial Off-The-Shelf (COTS) publish/subscribe messaging solutions are available and the Open Management Group (OMG) Data-Distribution Service (DDS) is one such technology that provides open interfaces, open data formats, and open protocols. This paper will discuss the current VICTORY messaging approach and the benefits and disadvantages of using OMG-DDS as a data transport for VICTORY services
Elliott, LeonardWilliams, NikiaSiddapureddy, Venu
ABSTRACT The roll-up roll-away Tactical Vehicle-to-Grid / Vehicle-to-Vehicle (V2G/V2V) system provides a plug-and-play, very fast forming, smart, aggregated, and efficient power system for an emerging (including austere) contingency base. The V2G/V2V system gives the Soldier a capability they currently lack: The ability to generate up to 240kW of 120/208 VAC 3-phase power anywhere, anytime using Transmission-Integrated Generators (TIGs) to produce 600VDC for use by vehicle hotel loads (electrification), transfer of power from V2V, and export power off-vehicle in a Forward Operating Base (FOB) environment, V2G. The system is designed to provide grid services (peak shaving, Volt/VAR control, power regulation, and current source mode) beneficial to emerging and mature grids (CONUS or OCONUS). Data collected during the FY 14 Tactical Enabled Contingency Basing Demonstration (TECD 4a) of a single vehicle with V2G capability showed that variable speed engine power management can provide up
Hancock, JanieMcGrew, DeanKolhoff, StevenSkowronska, Annette G.
ABSTRACT The U.S. Army Tank-Automotive Research, Development and Engineering Center (TARDEC) contracted DornerWorks Ltd. to evaluate Ethernet-based networking protocols for the safety-critical RDECOM Modular Active Protection Systems (MAPS) framework (MAF). The MAF requires a universal and robust high-speed communication network that can transmit heterogeneous data at near gigabit speeds in a deterministic fashion with bounded and predictable latency. The objectives were to evaluate candidate protocols through rigorous stressing scenarios to: 1) assess and estimate upper bound of performance including data throughput and reliability; and, 2) detect and identify causes and conditions of data loss or corruption. We assessed four protocols: SAE AS6802 (TTEthernet; TTE), ARINC664p7 (rate-constrained; RC), COTS UDP integrated with these two protocols (best-effort; BE), and UDP on a COTS network under three levels of network saturation and with varying payload sizes. On an unsaturated
Verbree, David A.Shvartsman, Andrey
Items per page:
1 – 50 of 4264