We present a high fidelity cognitive radio (CR) network emulation platform for wireless system tests, measure-
ments, and validation. This versatile platform provides the configurable functionalities to control and repeat
realistic physical channel effects in integrated space, air, and ground networks. We combine the advantages of
scalable simulation environment with reliable hardware performance for high fidelity and repeatable evaluation
of heterogeneous CR networks. This approach extends CR design only at device (software-defined-radio) or
lower-level protocol (dynamic spectrum access) level to end-to-end cognitive networking, and facilitates low-cost
deployment, development, and experimentation of new wireless network protocols and applications on frequency-
agile programmable radios. Going beyond the channel emulator paradigm for point-to-point communications,
we can support simultaneous transmissions by network-level emulation that allows realistic physical-layer inter-
actions between diverse user classes, including secondary users, primary users, and adversarial jammers in CR
networks. In particular, we can replay field tests in a lab environment with real radios perceiving and learning
the dynamic environment thereby adapting for end-to-end goals over distributed spectrum coordination channels
that replace the common control channel as a single point of failure. CR networks offer several dimensions of
tunable actions including channel, power, rate, and route selection. The proposed network evaluation platform
is fully programmable and can reliably evaluate the necessary cross-layer design solutions with configurable op-
timization space by leveraging the hardware experiments to represent the realistic effects of physical channel,
topology, mobility, and jamming on spectrum agility, situational awareness, and network resiliency. We also
provide the flexibility to scale up the test environment by introducing virtual radios and establishing seamless
signal-level interactions with real radios. This holistic wireless evaluation approach supports a large-scale, het-
erogeneous, and dynamic CR network architecture and allows developing cross-layer network protocols under
high fidelity, repeatable, and scalable wireless test scenarios suitable for heterogeneous space, air, and ground
In Net-centric operations the timely flow of the correct information to the mission partners is fundamental for the
success of the endeavor. Yet, as we strive to work in multi-agencies and multi-national coalitions it is important to
control the flow of information. This is the information assurance net-centric dilemma. How to speed the flow of
information while keeping the necessary access boundaries?
Current multi-level security and role base access strategies and their derivatives control the flow of data, but fail to
implement higher levels of information policy.
We propose an architecture capable of supporting the solution of the Net-Centric dilemma. This architecture, distributed
and scalable, is compatible with Air Force's Metadata Environment initiative (MDE). In the proposed architecture the
metadata tagged data items are used to construct a semantic map of how the information items are associated. Using this
map, policy can be applied to information items. Provided the policy is logically based, reasoners can be used to identify
not only if the person soliciting the data item has rights to receive it but also what kind of information can be derived
from this data based on information retrieved previously. The full architecture includes the determination of which
information can be relayed or not at any given time, as well as all the required mechanisms for enforcement including
identification of potential intentional fraudulent actions.
The proposed architecture is extensible and does not require any specific policy language or reasoner to be effective.
Multiple approaches can be simultaneously present in the system.
Airborne networks are envisioned to provide interconnectivity for terrestial and space networks by interconnecting
highly mobile airborne platforms. A number of military applications are expected to be used by the operator, and all
these applications require proper routing security support to establish correct route between communicating platforms in
a timely manner. As airborne networks somewhat different from traditional wired and wireless networks (e.g., Internet,
LAN, WLAN, MANET, etc), security aspects valid in these networks are not fully applicable to airborne networks.
Designing an efficient security scheme to protect airborne networks is confronted with new requirements. In this paper,
we first identify a candidate routing architecture, which works as an underlying structure for our proposed security
scheme. And then we investigate the vulnerabilities and attack models against routing protocols in airborne networks.
Based on these studies, we propose an integrated security solution to address routing security issues in airborne
The task of building a multiagent system using traditional software tools is a complex and error-prone process. Therefore, we have developed an agent infrastructure called Cybele and a verification tool called DIVA for building agent based systems suited for large distributed applications. These tools enforce simple coding practice and facilitate generation of complex systems. These tools in the context of factory scheduling will allow the agent designers to design and assign roles to the problem-solving entities, design and verify interaction protocols, and subsequently use the distributed system either as a simulation or as a control and execution system. In this paper, we discuss how Cybele and DIVA can be used in designing a system that solves dynamic scheduling problems in real-time.