Sei sulla pagina 1di 6

G4 SECURED FUTURE WARRIOR

M.Tharani, G.Tilton Jebakumar Students-Dept of Information Technology, tharanishri@yahoo.com, gtilton20@gmail.com, S.A.Engineering College, Chennai-77
ABSTRACT Information is power, nowhere is this truer than on the battlefield, where the ability to communicate clearly and rapidly pass on information spells the difference between survival and death? 4G (4th Generation) is the technology that is going to drive a soldier in the field in future. The key to empowering the military with tactical broadband voice, video and data is 4G communications technology. This technology adopts Wireless technology on the platform of fixed networks, Advanced antennae technologies and More advanced wireless security technologies. Next thing is about the gear for the future warrior. Our system provides a enhanced power of vision, which provides Ground Guidance, Unit Detection, Soldier Status, Target Hand-Off and provides the Soldier Rescue during the battle. The uniform along with the armor, onboard computer which will monitor soldiers' overall physiological and psychological picture of how they are performing in the battle zone and enhanced human performance which weighs 50 pounds from head to toe against 120 pounds of the current day system present. In this paper the complete fourth generation technique in military is explained with its challenges faced through LTE network and a solution to it.

The U.S. Army Research, Development and Engineering Command's communications-electronics RD&E center, or CERDEC, enabled a mounted/hand-held computing environment that allowed for the dissemination of mission command data, imagery, streaming video and voice between dismounted Soldiers and fixed command posts. This was achieved by integrating a fourth-generation Long Term Evolution, or 4G LTE network with a multi-tiered transport architecture that leveraged components of the Capability Set 13 design -including the Soldier Radio Waveform, the Adaptive Networking Wideband Waveform, terrestrial communications and WIN-T Increment 1 and Increment 2 satellite communications. In 2011, CERDEC demonstrated the Multi-Access Cellular Extension foundational architecture to help pave the way for integrating commercial cellular technologies into current and future force networks, allowing use beyond a fixed infrastructure, such as WiFi access points or cellular base stations. Technologies under MACE seek to enable the secure use of smart devices and the ability to provide direct device-to-device MANET-like features, enabling the Army to use multiple commercial wireless solutions, which could save the Army billions of dollars. TECHNOLOGY The approach will support military operations across a spectrum of environments from backpacks to ships. The key technology supporting these initiatives is ad hoc peer-to-peer wireless networking (ad hoc p2p), also known as a mobile mesh network. Ad hoc p2p operates by taking a collection of mobile terminals (such as handheld devices and vehicular systems) that communicate directly with each other without

Keywords: LTE,P2P,CERDEC,COMSEC,3GPP, 3GPP2,PCRF,PCEF,IETE.VoLTE

INTRODUCTION The new systems include a weapon, head-to-toe individual protection, onboard computer network, soldier-worn power sources, and enhanced human performance. "The Future Warrior will be a responsive and formidable member of an invincible battle space team". The Future Warrior system will meet the more immediate, short-term demands of our fighting warriors in the battle space, and will remind you of an ominous creature out of a science fiction movie.

the aid of established infrastructure. Ad hoc networking provides a self-organizing and selfhealing network structure. Multi-hop routing terminals act as routers and relays for each other, and extend the range and coverage of communications links between individual soldiers, troop transports and command centers. This is illustrated in Figure 1.

setup automatically begins the minute troops exit a transport, helicopter or ship. Geo-location well beyond the limitations of GPS : Soldiers cannot afford to expose themselves on a battlefield to acquire GPS coordinates. GPS is also limited in that satellite signals cannot penetrate caves, underground bunkers or inside shielded buildings. Ad hoc p2p wireless has built-in geo-location using an extremely accurate form of triangulation. The 4G Warrior can triangulate his or her position, or that of another soldier, based on mesh-enabled vehicles or other devices, even when hiding in caves or otherwise out of harm_s way. Readings are faster than GPS (under a second) because soldiers don_t have to wait for multiple satellites to acquire a fix. Security : The device security must address both communications security (COMSEC) and a way to protect the network from unauthorized use if the device is captured. Communications are more secure when mesh networks allow for route diversity. Meshed architectures also allow devices to transmit at lower output power to neighbours rather than _Shouting_ at a cell tower.

Figure 1 : Battle field forces without any fixed infrastructure BENEFITS OF 4-G 1. It is also true that regardless of the 4G technology selected (LTE or WiMAX), when compared to 3G, most core transport and throughput bottlenecks will certainly be addressed by the technology itself. 4G technologies offer at least 2x more efficient use of spectrum, higher max speeds, and improved support for real-time applications. Enables new mobile applications (like Telepresence) and enhances existing ones (Streaming Music) Some 4G services will be enhanced by improved 4G bandwidth and latency such as smart home monitoring or digital storage.

2.

BASIC DESIGN The military and DARPA have outlined specific capabilities for these devices. At a minimum, they will need the following setup processes that are essential for a good and effective communication between the soldier and his troops. Illustrated in Figure 2. Deploy-ability with little or no fixedinfrastructure : Military engagements are often spontaneous, and a communications solution needs to be, as well. 4G Warriors bring their networks with them, and take them away when they leave. Network

Figure 2 : Self-healing and routing of traffic around downed links. This lowers the probability of detection and increases battery life. Should a device be captured, the 4G Warrior can blacklist that device to maintain the integrity of the network. Anti-jamming robustness : The 4G Warrior is neither dependent on a single frequency nor constrained to a military band. These self-forming, self-healing networks will have the ability to instinctively and proactively reduce the probability of jamming. Communications devices must operate while vehicles or soldiers are mobile, even at speeds in excess of 100 mph. 4G Warriors can receive realtime streaming video from aircraft, such as the Predator Drone flying over a battlefield. Multi-tap rake receivers minimize the effects of Doppler radar to maximize the impact of theater air assets. End-to-end IP : Modern soldiers grew up with computers and will demand the same applications and user interfaces available to civilians. The 4G Warrior, using instant messaging, can send photos of

enemy positions back to the camp for analysis, and use voice over IP to communicate with non-military phones in an occupied city.

4G ON THE BATTLEFIELD All of the battlefield network devices including those embedded in tanks or other vehicles will instantly form, heal, and update the network as users come and go. That is, they will associate in an ad-hoc manner. Moreover, the devices will automatically and continuously optimize network connections as users merge in and out of the network at will. As intelligent elements, all of the devices will constantly reconfigure routing tables to determine the best network routes and, unlike cell-based solutions, network coverage and service levels will improve when soldier density increases. The network resources are better utilized because networks are self-balancing, as well. The soldiers_ subscriber devices can hop to distant network access points, away from points of congestion, shifting network capacity to meet demand. Network deployment will be fast and easy because it is tower less. Communication systems providing the backhaul and the network will disappear as fast as it was formed once soldiers leave the area. The 4G battlefield will be entirely mobile, with satellites or other. This technology could function as a personal are network (PAN), local area network (LAN), or wide area network (WAN), simultaneously. This means that the same network can connect a soldier to the squad or platoon, to the battalion, and to a fully mobile division. It is the equivalent of a Bluetooth, 802.11, and 3G convergences, but in a single network, with a single device. POWER OF VISION This has been seen in science-fiction movies, a dropdown piece of eyewear from the helmet allows the soldier to see a 17-inch computer screen displaying anything relayed to the soldier. "This eyewear device is see-through, so it hangs out in space_. This allows soldiers to take in all supporting data while keeping both hands on their weapons. Illustrated in Figure 3.

Figure 3 : Eyewear with Helmet Soldiers wearing the new system will have no need for an external microphone to communicate. "The helmet has sensors that register vibrations of the cranial cavity so they don't have to have a microphone in my mouth. That allows the soldier to control the entire computer via voice. Soldiers will be able to cycle through onboard menus via their eyewear device. Unit Detection : Overlays beyond-line-of-sight combat identification. This allows to differentiate Friend from Foe. Combat-ID is limited to line-ofsight identification, requires initiation, and encumbers soldiers with additional equipment. Unit Detection overlays identification on live targets in a soldiers scope. Exposes enemies that are camouflaged, obscured, or outside of a soldier's visual range. Enables rapid firing decisions and reduces the risk of friendly fire. Since, in Desert Storm (Jun 91) 35 out of 148 US casualties resulted from friendly fire. Illustrated in Figure 4.

Figure 4 : Unit Detection

Figure 5 : Ground Guidance Ground Guidance : Directs soldiers to targets while avoiding obstacles. Ground Guidance fuses road maps and aerial imagery to discover obstructions and generate routes. This enables commanders to cordoned off dangerous areas and demarcate secure zones. This Frees commander from issuing turn-byturn directions. This is a relief for the commanders of olden days in which they use paper maps, issue turnby-turn directions, and suggest obstructed routes. Target Hand-Off : Enables rapid selection of fire support targets and also Enables a soldier to select targets using his weapon_s scope and range finder. It determines the coordinates of the target. Warns the commander if soldiers are near the target. Alerts friendly soldiers to the presence of targets via their scope and map. Illustrated in Figure 6. Soldier Rescue : Coordinates Missions to Aid Injured Soldiers. Identifies soldiers with failing vital signs and prompts commanders to call in nearby soldiers to provide assistance. Directs the rescue team to the injured soldier, while avoiding enemy obstacles. This provides lowers casualty rates, reduces the severity of injuries, and prevents enemy ambush. Soldier Status : Presents battery indicator, vital signs, and round count.Soldiers wearing the new system will have no need for an external microphone to communicate. "The helmet has sensors that register vibrations of the cranial cavity so I don't have to have a microphone in my mouth. That allows the soldier to control the entire computer via voiceactivation". BODY GEAR The uniform system of the Future Warrior is been designed with more advanced nanotechnology. Nanotechnology deals with the creation of incredibly small materials, devices or systems with a scaleddown size of 100 nanometres or less. A nanometre is a metric measurement equivalent to one billionth of a meter. What we hope to gain from this program is body armor that wears like a traditional textile impregnated with nanomachines connected to an onboard computer, So when you shoot a round into the uniform system, it's normally pliable until it senses the strike of a round it becomes rigid, defeats the strike of the round and becomes soft again. A shortcoming of traditional body armor is that it can only absorb so many strikes from machine-gun rounds. When you have a uniform with this new nanotechnology, it can absorb unlimited numbers of machine-gun rounds. Another potential development is inserting "Nanomuscle fibres" that can actually simulate muscles, giving soldiers more strength. Fabric is impregnated with nanomachines that create the same weight, lift and feel as a muscle. So I coat the outside of the armor with a nanomuscle fibre that gives me 25 to 35 percent better lifting capability.

The uniform from the waist down will have a roboticpowered system that is connected directly to the soldier. This system could use pistons to actually replicate the lower body, giving the soldier upwards of about 300 percent greater lifting and load-carriage capability. We are looking at potentially mounting a weapon directly to the uniform system and now the soldier becomes a walking gun platform. This also provides protection against chemical and biological agents is more realistic with a respirator tube that attaches to the back of the helmet and connects to a low-profile air purifier that forces cool air into the helmet for comfort and visor defogging. Another major change in the uniform is the addition of protruding, interconnecting black pieces of plastic on the legs that represent a lower body exoskeleton. A medic, who can be miles away, will now be able to diagnose and treat a soldier who is about to have sunstroke, without even physically seeing the soldier. So a medic can see how the soldier's core body temperature is rising and) heart rate is falling and the soldier then knows to go directly to the medic for treatment. The computer will drop down a map to direct the soldier where to find the medic for help. The new system commanders will be able to consider each soldier, aircraft and vehicle as part of a node of a tactical network that shares data with each other, sending and receiving data inside the battle space. Illustrated in Figure 8 & Figure 9

Security and Privacy:In the development of 4G Networks, security measures must be established that enable data transmission to be as safe as possible. Specifically, The 4G core addresses mobility, security, and QoS through reuse of existing mechanisms while still trying to work on some mobility and handover issues . Therefore, it is necessary for the organization to develop an effective series of tools that support maximum 4G security measures as a means of protecting data that is transmitted across the network from hackers and other security violations. Because of the nature of the 4G network, there is an increased likelihood of security attacks, and therefore, multiple levels of security, including increased requirements for authentication, will be necessary to protect data and information that is transmitted across the network .One of the main goals of G4 networks is to blanket very wide geographic area with seamless service. Obviously, smaller local area networks will run different operating systems. The heterogeneity of these wireless networks exchanging different types of data complicates the security and privacy issues. Furthermore, the encryption and decryption methods being used for 3G networks are not appropriate for 4G networks as new devices and services are introduced for the first time in 4G networks. To overcome these security and privacy issues, two approaches can be followed. The first is to modify the existing security and privacy methods so that they will be applicable to heterogeneous 4G networks. Another approach is to develop new dynamic reconfigurable, adaptive, and lightweight mechanisms whenever the currently utilized methods cannot be adapted to 4G networks .

SECURITY IN G4 The standards organizations supporting these developments have been the 3rd Generation Partnership Project (3GPP), initially for GSM systems, and the 3rd Generation Partnership Project 2 (3GPP2), initially for CDMA systems. Long Term Evolution (LTE) and its 4G evolution, LTEAdvanced, is defined by 3GPP as the evolution path for wireless networks. The initial release of the standard is currently being deployed commercially and LTE Advanced is targeted for service in several years.

ISSUES IN THE NETWORK

Fortunately, the 4G LTE standard builds in the latest security features such as mutual authentication of user and network, centralized identity management and policy enforcement. End-user authentication, trackingarea list management and idle-mode mobile device reachability are managed in the mobility management entity (MME) in the network core. The system-wide user identity is maintained in the home subscriber server (HSS) database with the illustrated features. The policy and charging resource function (PCRF) queries the policy database and enforces quality of service (QoS)policy. In LTE, data-plane traffic is carried over bearers in virtual containers with unique QoS characteristics. The PCRF supports dynamic QoS management and the packet data network gateway (PDN GW) acts as the policy and charging enforcement function (PCEF) point to maintain QoS / SLA for each of the service data flows. Looking ahead, ALU personnel have proposed a standards contribution to the Internet Engineering Task Force (IETF) for advanced encryption and key management for secure Voice-over-LTE (VoLTE). Although these standards are works in progress and not complete, one possible solution for encrypted VoLTE communications is based on identity-based mode of key distribution in multimedia Internet KEYing (MIKEY-IBAKE). The goal in the VoLTE call encryption service is to provide an additional layer of security for voice calls made between mobile phones to assure end-to-end voice security and prevent third-party eavesdropping. To achieve this service requires mutual authentication between the user and IP multimedia system (IMS) service management, signaling protection and media encryption. CONCLUSION : Here we have used the next technology of mobile technology- 4G for creating a fool proof system that can be used at any place by a military force in the future. This system can be used to provide intelligent communication cum detection

system using which every soldier can be virtually connected to a network that will be monitored by a mobile unit. The DoD has many new options to leverage this LTE off-the-shelf technology and more extensively use broadband wireless for enhanced effectiveness in its missions and for productivity of its personnel, especially as the latest security features are being incorporated into this standard. New military recruits are technology savvy and mobilecentric and expect the DoD to be at the forefront of mobile communications. A second driving force is the substantial, growing gap in peak data rates between 4G LTE and traditional plan-of-record military radio systems. Yet another is the current DoD interest in adding secure military applications to this wireless ecosystem. Since the 4G technology is yet to become a reality the system may look very simple but as the technology will be implemented a more complex and cost effective system could be designed.

REFRENCES [1]Global Information Warfare _, By Gerald L Kovacich , Andy Jones, Perry G Luzwick. : pp 539541. [2]Science, Technology and Warfare _: The Proceedings of the Third Military History Symposium , By Monte D Wright, Lawrence J Paszeik . : pp 180-182. [3]Electronic Warfare for the Digitized Battlefield _ , By Michael Frater, Michael Ryan. : pp 217-218 [4] www.engpaper.com/4g-wireless-research-papers2012.htm [5] eecatalog.com/4g/2011/11/03/enabling-securecommunications-in-military-4g-lte-environments/ [6] airccse.org/journal/ijngn/papers/4312ijngn03.pdf [7]www.bioinfo.in/uploadfiles/13365457392_1_3_B SI.pdf [8]www.ijmra.us/project%20doc/IJMIE_JUNE2012/I JMRA-MIE1439.pdf [9]www.ijcnwc.org/papers/vol2no12012/4vol2no1.pd [10]cisjournal.org/journalofcomputing/archive/vol3n o5/vol3no5_1.pdf