Tsan-ying
S. (Steven) Yuen
Rockwell
Collins
Advanced
Technology Center
TTNT (Tactical Targeting Networking Technology) is an
advanced tactical data link currently under development by Rockwell Collins
Government Systems and the Advanced Technology Center.
The incorporation of network centric warfare concepts into military
operations creates a technological challenge that the packet exchanges within
the network are susceptible to eavesdropping, traffic analysis, and distortion.
Thus, modes supporting Low Probability of Intercept (LPI) and Low Probability of
Detection (LPD) are a highly desirable addition to existing TTNT functionality.
From the networking perspective, critical to LPI/LPD is a
detection aware routing scheme for mobile ad hoc networks (MANET) which TTNT
will operate on. By using a LPI/LPD aware routing scheme, system detectability
can be improved and usable data rate for given detectability level can be
maximized.
Current routing schemes mostly use the shortest path or the
least hop count to determine the routing path. In the last few years, power
aware routing and mobility aware routing have received some attentions in the
research communities. However, no one has considered using possibility of being
intercept, threat level / detectability, or node characteristics as the factors
for routing.
This invention presents a method and scheme that provides
LPI/LPD aware routing. The method can be used for secure communications in a
high detectability threat environment.
In this invention, the routing path selection considers the
following three factors:
• Intercept radius, Ri, of node, which is related to the required transmission power level
• Detectability / threat level of node
•
Availability of non-LO nodes for rerouting
The intercept radius, or range of intercept, is a concept
used to define link detectability. It is determined by transmission power and
data rate which affects communication range, channel fading, and jamming.
Different data rates needs different signal to noise ratio for demodulation of
data, which in turn is driven by coding efficiency and chip rate. For a given
range of communication, the intercept radius decreases with decreasing data
rate. Low data rates allow for a long transmission time per bit, and thus for an
equivalent Eb/No operations lower data rates require lower transmission power
levels and decrease signal detectability.
Another concept we introduce for controlling the
detectability of packet transmission in LPI/LPD aware routing is the threat
level or detectability level of routing nodes. The purpose is to route away from
the high detection / threat area. This can be accomplished by using the sensor
information collected by the physical layer to guide the layer 3 routing.
One method to minimize packets being detected is to route
the packets to nodes that are not Low Observable (LO) platforms. This method
works especially well for long range broadcasting. Thus the third parameters we
use for LPI/LPD routing is node characteristics. Also, TTNT supports
receive-only and silent mode operations. One consideration of routing node
selection is that the node is able to transmit in high threat environment.
Below is the procedure of node selection in route
discovery:
• Each node keeps a table containing information of its neighbor nodes: Required Ri, threat/detectability level, suitability, etc.
• The table is updated periodically (though infrequently) by locally-broadcasted information (beacon) from each neighbor node.
• At a certain time period, called synchronization time, each node examines its LPI/LPD parameters.
• If a certain parameter has changed above a threshold, it will locally broadcast a beacon.
• Assuming there are N nodes within the communication range, the source node selects top M nodes (M<N) for the first hop relay.
• The selection criteria are based on the heuristic analysis of the three LPI/LPD routing path selection factors.
• The source node sends a Route Notification (RN) packet to each desired node, which will reply using a Route Reply (RR) packet if it is available.
• After a preset time period, if the source node does not receive RR from one of the desired node, it will pick the node with the M+1 priority for routing, if it is available.
•
Starting from the second hop, each node in the M-path selects its next
hop node using the same selection criteria.