Next Article in Journal
2D Semantic Segmentation: Recent Developments and Future Directions
Previous Article in Journal
Federated Learning and Blockchain Integration for Privacy Protection in the Internet of Things: Challenges and Solutions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Avoiding Detection by Hostile Nodes in Airborne Tactical Networks

1
Department of Computer Science, Blekinge Institute of Technology, 371 79 Karlskrona, Sweden
2
Saab AB, Surveillance, 371 30 Karlskrona, Sweden
3
Saab AB, Aeronautics, 581 88 Linköping, Sweden
4
Saab AB, Surveillance, 412 76 Göteborg, Sweden
*
Author to whom correspondence should be addressed.
Future Internet 2023, 15(6), 204; https://doi.org/10.3390/fi15060204
Submission received: 14 April 2023 / Revised: 24 May 2023 / Accepted: 29 May 2023 / Published: 31 May 2023

Abstract

:
Contemporary airborne radio networks are usually implemented using omnidirectional antennas. Unfortunately, such networks suffer from disadvantages such as easy detection by hostile aircraft and potential information leakage. In this paper, we present a novel mobile ad hoc network (MANET) routing protocol based on directional antennas and situation awareness data that utilizes adaptive multihop routing to avoid sending information in directions where hostile nodes are present. Our protocol is implemented in the OMNEST simulator and evaluated using two realistic flight scenarios involving 8 and 24 aircraft, respectively. The results show that our protocol has significantly fewer leaked packets than comparative protocols, but at a slightly higher cost in terms of longer packet lifetime.

1. Introduction

Recent developments within the aerospace industry indicate that an increasing proportion of aerospace products will consist of cooperative platforms, in particular autonomous platforms such as aircraft, ships, missiles, drones and decoys.
Conventional radio communication between airborne platforms is usually implemented using antennas that radiate signal power omnidirectionally. A disadvantage associated with this approach is that the transmission power is not concentrated towards the receiver. This limits the communication range between nodes and increases power requirements, but more importantly, it simplifies node detection and positioning from an arbitrary location by an adversary.
This situation motivates a departure from omnidirectional transmission towards directed communication in order to obtain communication solutions with low probability of intercept/detection (LPI/LPD). Furthermore, if the receiver antennas are of digital multi-channel type, further advantages can be achieved, such as simultaneous reception at the same frequency, asynchronous or reactive reception and adaptive noise suppression [1]. Thus, our approach assumes the use of directional antennas.
In addition, the use of mobile ad hoc networks (MANETs) would enable multihop communication bringing additional benefits, ranging from increased range of communication and robustness to network dynamics through the use of multiple paths between communicating nodes. However, in military heterogeneous environments involving airborne nodes, in terrestrial units, as well as in nodes at sea and in space, multihop routing suffers from several issues such as poor interoperability, heterogeneous software interfaces, non-standard link information reported by the involved radios and significant manual setup and configuration [2].
It is crucial that the pilots of military aircraft have access to updated information about the location of friendly and hostile aircraft. This kind of information is provided through so-called situation awareness (SA) data. SA data contain, among other things, the location, direction and speed of friendly and hostile aircraft in an area.
We define the concept of the leaked packet. A leaked packet is a unit of data transmitted with a radio carrier wave that can be detected by an adversary aircraft. A packet is considered to be leaked even if the received radio signal to noise ratio (SNR) is so low that the adversary cannot receive and decode the data. Data on tactical links is typically encrypted, which makes decoding infeasible. However, it is enough that the adversary can discern the radio signal carrying the packet from electromagnetic noise. Adversaries can use this information to track the position of the transmitting aircraft.
In this paper, we present a routing protocol for airborne tactical networks. The protocol is called the Hostile-Direction Aware Routing Protocol (HDARP). The protocol requires nodes to be equipped with directional antennas and makes use of SA data to route packets from the sender to the receiver (including multi-hop routing when needed), while at the same time avoiding adversary detection/positioning by eliminating leaked packets. HDARP is intended to be used together with the widely adopted TCP/IP stack, with minor adaptions for directed communication. HDARP is protected by patent application SE 2200136-6.

2. Background and Related Work

2.1. Background

Currently, the convergence of several state-of-the-art technologies to create new system-of-system via digitalization within the electromagnetic domain redefines the capability of future airborne communication systems via increased levels of parallelization. Combined with high directivity antennas, novel systems now have the potential to satisfy modern operational requirements for robust networked communication with capabilities such as LPI/LPD, high data rate, security and low latency.
Nonetheless, knowledge is still needed on how a targeted MANET performs in an operational context with different collaborative systems, in expected threat environments and with relevant data traffic requirements, as well as what prerequisites the solution imposes on employed multifunctional antenna systems.
Overall, it is expected that such networks will find applicability in interoperable contexts between multiple platforms throughout different domains. In that respect, the defense industry needs to rapidly develop its familiarity with directed networks, especially for drones and tactical unmanned aerial vehicles (UAVs) for flexible, cost-adapted solutions.
The background for this is that an increasing proportion of aerospace hardware is expected to consist of cooperative platforms, particularly between autonomous systems, thus enabling technologies for this transformation is vital from a future proofing perspective.

2.2. Related Work

Sharma and Kumar [3] have written a survey of flying ad hoc networks (FANETs) for UAVs. The authors conclude that such networks can be categorized into different types. One important type of network is self-organizing networks, which is what we consider in this paper. One important research area is medium access control (MAC) protocols for FANETs [4]. The MAC protocols for FANETs are challenging for many reasons, e.g., the high speeds of the aircraft create a highly dynamic topology. Some FANETs use directional antennas. Networks with directional antennas offer many advantages, including higher communication capacity through non-interfering simultaneous communication in different directions [5]. Another advantage with using directional antennas is that it becomes easier to avoid detection by hostile nodes; HDARP benefits from this advantage. The challenges on the MAC level in networks using directional antennas have been studied by several researchers [6,7].
In this paper we focus instead on the network layer where the MANET routing protocols are located. Oubbati et al.   [8] have conducted a survey of routing protocols for FANETs. The authors note that at least 60 routing protocols for FANETs have been suggested. However, most of these 60 protocols are designed for UAVs in non-military contexts, and none of the 60 protocols consider leakage of packets to adversary aircraft, which is the main focus in our case.
We consider communication in an airborne tactical network (ATN) [9] where there are hostile aircraft. Previous studies on ATNs have, however, not considered the presence of hostile aircraft and the implications and restrictions that the presence of hostile aircraft have on routing [10,11,12].
Xiaofeng et al. [13] consider ad hoc networks with hostile nodes, which they call detection systems. The authors define a routing algorithm called MinDP (Minimizing Detection Probability). Compared to routing protocols that do not consider hostile nodes, MinDP reduces the detection probability by 74%. This study differs from our study in several aspects: the nodes in the ad hoc network are not mobile, only two-dimensional space is considered (we consider routing in three-dimensional space), only the main lobe of the directional antenna is considered (we also consider sidelobes) and the evaluation is based on simplistic assumptions about a quadratic two-dimensional space with random placements of nodes (we use mobility data from realistic flight scenarios used by the defense industry).
In mobile ad hoc where the nodes can have a high relative speed, geographical routing is sometimes used [14,15]. Geographical routing is based on the idea that the source sends a message to the geographic location of the destination. Geographical routing uses the position, speed and (sometimes) acceleration of the nodes in the ad hoc network. Three common approaches when the destination node cannot be reached in a single hop are to select the next node as the node that is closest to the destination node, as the node that the nearest node that makes forward progress, or as the node that is closest to a straight line from the sender to the destination [16,17]. HDARP is a geographical routing protocol in the sense that the routing decisions are based on the location, speed and acceleration of friendly and adversary nodes. However, the routing decisions are based on an adaptation of Dijkstra’s shortest-path algorithm (see Section 3.3).

3. Proposed Approach

3.1. Situation Awareness Data

A fundamental aspect of our proposed protocol is that we have access to data that are referred to as situation awareness (SA) data. Situation awareness is a critical component in military command and control operations, including flight missions in combat situations. In order to make real-time decisions about tactical maneuvers during a combat flight mission, the pilots must have good and accurate information about both adversary and friendly aircraft. SA data contain such information.
In our proposed solution, we work with a three-dimensional Euclidean space. The SA data consist of the following:
  • The x-position (longitude), y-position (latitude) and z-position (altitude) of each friendly aircraft in the current situation;
  • The speed in the x-, y-, and z-directions of each friendly aircraft in the current situation;
  • The acceleration in the x-, y-, and z-directions of each friendly aircraft in the current situation;
  • The x-, y-, and z-positions of each adversary aircraft in the current situation;
  • The speed in the x-, y-, and z-directions of each adversary aircraft in the current situation;
  • The acceleration in the x-, y-, and z-directions of each adversary aircraft in the current situation.
In some cases, the SA data only contain incomplete information regarding adversary aircraft position, usually the bearing (i.e., direction) from own aircraft location. This may be sufficient in our case, but otherwise the range (or distance) may be estimated with some uncertainty, e.g., by triangulation of a number of different observations.
In our work, a node has two sources of SA data. The first one is the set of SA sensors integrated with the airborne platform. The sensors have a maximum operational range, outside of which they cannot work reliably. We refer to the acquired sensor data as local SA data. The union of all friendly nodes’ local SA data is the totality of environmental knowledge that friendly nodes pose as a group. We refer to this as a unified SA view. It is important to keep in mind that although the unified SA view contains more data than available for a single node, it does not provide total SA visibility. Some nodes, friendly or otherwise, can be located so far away that they are not captured in the local SA data of any of the friendly nodes and are thus not available in the unified SA view. Each friendly node strives to obtain the unified SA view through exchange of SA data with friendly nodes. This is the second source of SA data. A node that receives SA data from another friendly node merges that with its own local SA and with previously received SA data from other nodes into something called the node’s SA view. The merging operation favors local SA data over received SA data. In the ideal case, the node’s SA view becomes identical to the unified SA view. However, due to latency, packet loss and nodes out of range, a node’s SA view may diverge from the unified SA view. When this happens, it prevents the nodes from converging on a common topological view [18]. This phenomenon can lead to subopotimal routing and strategies should be put in place to alleviate its effects.
The local SA data are updated regularly, and each SA datum has a timestamp. However, how often the SA data are updated is not completely defined. The SA data are used to keep track of where all aircraft are at each time. Accordingly, since the SA data are updated at certain intervals, the local aircraft needs to update the positions of the other aircraft in the interval t i to t i + 1 , where δ = t i + 1 t i is the interval between updates/exchanges of the SA data.
Based on the SA data, we know the position of all friendly as well as adversary aircraft. In the next step, we can then calculate in which directions we can transmit using directional antennas in order to reach each aircraft directly, provided they are in range to receive the radio signal (Tx range). Further, we can also calculate whether other aircraft are reachable through intermediate friendly nodes, thus enabling a multi-hop routing protocol. The position of adversary aircraft allows us to determine if we would leak packets if transmitting towards a specific node. When using directional antennas, the radiation pattern will include a main lobe and a set of sidelobes. The region of 3D space where the signal can be detected, through the either main lobe or sidelobes, is referred to as a forbidden sector, as described in Section 3.4. HDARP avoids leaking packets by selecting routes outside forbidden sectors if such routes are available.
An important aspect of the topology control and routing scheme is that aircraft can both enter and leave a configuration. The enter/leave information should be present in the situation awareness data, thus enabling the routing information to be updated with new/disappearing nodes (aircraft).

3.2. Use Cases

One of the main advantages of a directional antenna is that it transmits only in a narrow angle, for example 10 degrees, which reduces the possibility of adversary detection. Therefore, we need to design a routing protocol that avoids transmitting in a direction where an adversary aircraft is located, which we call a forbidden direction. The forbidden direction is assumed to be aligned with the antenna boresight. By combining the forbidden direction with information about the shape of main lobe and sidelobes of radiation pattern one can specify the associated forbidden sector. The calculation of forbidden direction and sector and, thus, which aircraft we can communicate with in a single-hop, is an important part of the developed routing protocol.
Figure 3 shows a use case where an adversary aircraft is in the neighborhood. In this case, when A wants to communicate with B, A is forced to use multi-hop via C in order to reach B without risk of being detected.
In order to describe the topology control and the routing protocol, we will start with the use cases below. In the evaluation of the protocol, we have more complex use cases (scenarios) as outlined in Section 4.
  • A new aircraft enters the network. This use case can be broken down into
    (i)
    two aircraft establishing connection with each other, as in Figure 1, and
    (ii)
    a new aircraft enters an existing network with N aircraft.
  • An aircraft loses contact with the network. This use case can be broken down into
    (i)
    an aircraft acting as an end node (e.g., “C” in Figure 2) loses contact with the other ones in a network of N aircraft, which does not affect the routing between the other N 1 nodes, and
    (ii)
    an aircraft acting as a relay node (e.g., “B” in Figure 2) loses contact with the other ones in a network of N aircraft, which affects the communication and network topology between the other nodes.
  • Two friendly aircraft communicating with each other; see Figure 1.
  • Three friendly aircraft communicating with each other, using both single-hop routing (A⇔B and B⇔C) and multi-hop routing (A⇒B⇒C); see Figure 2.
  • Three friendly aircraft communicating with each other but with an adversary aircraft in the neighborhood. Since the adversary aircraft is in the send direction A⇒B, we are forced to use multi-hop routing A⇒C⇒B when A wants to communicate with B; see Figure 3.

3.3. Routing Protocol Description

Each node participating in the FANET runs an instance of the routing protocol described in Algorithms 1–4. It is assumed that each node is equipped with a mission computer (MC), which contains parameters pre-configured before the start of a mission. Examples of pre-configured parameters may include the node identification, identification of participants in the same squadron, MAC addresses assigned to network interfaces and corresponding IP addresses for all members of squadron, configured cryptographic services and associated cryptographic material, etc. This information is integrated into the node’s SA view.
When the routing protocol is started, it will begin the bootstrapping procedure described in Algorithm 1. The first step is to interface with the aircraft sensors and on-board auxiliary systems to identify any other nodes, friends or adversaries detectable in the range of the sensors. The information will include the position, velocity and acceleration of the discovered nodes, essentially yielding the node local SA data mentioned in Section 3.1. The local SA data are inserted into the node’s SA view, which is an aggregation of SA data from local sensors and SA data obtained from other friendly nodes through routing protocol message exchanges. In bootstrap mode, no such exchanges have taken place yet, and therefore, the node’s SA view contains only local SA data. The third step is to call the HDA_Routing procedure (Algorithm 4) to compute routes to any of the friendly nodes discovered. Finally, a timer called send_SA_update is configured. When this timer expires, the node will share its SA view with other nodes located one hop away, which is the procedure outlined in Algorithm 2.
Algorithm 1 Bootstrap at node n.
Require: Identity of node n running the bootstrap
  1: Use aircraft sensors to collect SA data (local_SA)
  2: Insert local_SA into SA_view
  3: HDA_Routing(SA_view, n)    ▹Executes Algorithm 4
  4: Schedule send_SA_update timer    ▹Triggers Algorithm 2 when it expires
Algorithm 2 is rather straightforward. When the send_SA_update timer expires, this algorithm is invoked, and during its execution, it will prepare a message containing the node’s SA view and send it to the one-hop friendly neighbors. Information from the MC is not included in the updates, since it is assumed that each node has access to it from their own MC. After that, it will re-schedule the send_SA_update timer for the next update to the neighbor nodes.
Algorithm 2 Update neighbor nodes.
Require:SA_view, identity of node n running the algorithm
  1: procedure Send_SA_Update(SA_view, n)
  2:     for each friendly node d s t in SA_view reachable in one hop do
  3:         Transmit SA_view to d s t
  4:     end for
  5:     Schedule send_SA_update timer    ▹ Triggers this algorithm when it expires
  6: end procedure
Algorithm 3 handles the situation when an SA view is received from a friendly neighbor. First, the node will update its local SA data by interfacing with the aircraft sensors and on-board auxiliary systems. If the new local SA data conflict with data in the node’s SA view, for example with SA data received earlier from a friendly node, the information from the local SA data will replace the existing data in the SA view. Our policy is that fresh local SA data are trusted above anything else. The currently received SA view, recvd_SA_view, is merged into the node’s SA view using the same policy. Since SA data are timestamped, entries from the recvd_SA_view will replace the node’s existing SA view data only if newer. The final step is to call the HDA_Routing procedure (Algorithm 4) to re-compute routes that were affected by the received recvd_SA_view message or changes in the node’s local SA data.
Algorithm 3 SA fusion at node n.
Require:SA_view, received SA_view from neighbor, node n running the algorithm
    ▹Triggered by message reception
  1: procedure Received_SA_Update(SA_view, recvd_SA_view, n)
  2:     Use aircraft sensors to collect fresh SA data (local_SA)
  3:     Merge local_SA into existing SA_view     ▹ local_SA data are preferred
  4:     Merge recvd_SA_view into SA_view     ▹ local_SA data are preferred
  5:     HDA_Routing(SA_view, n)     ▹ Executes Algorithm 4
  6: end procedure
The aim of the HDARP routing protocol described in Algorithm 4 is to exploit the information from the node’s SA view to determine the shortest paths from the node to all other friendly nodes, while avoiding forbidden sectors. The actual shortest-path computation is performed using an adaptation of Dijkstra’s shortest-path algorithm [19] that produces a shortest-path tree. This approach is well known in computer networking, and therefore, rather than explaining it here, we point the interested reader to [18,20].
Dijkstra’s algorithm requires as input the source node for all the paths to be produced (denoted by n in the algorithm) and a weighted graph G consisting of all vertices and directed edges in the graph, which in our case correspond to nodes and links. When directed edges are used in a graph, the edge ( u , v ) is distinct from ( v , u ) .
The first step in Algorithm 4 is to collect all friendly nodes from the SA view into the set F . Secondly, we create an empty set L that will eventually be populated with links connecting a pair of nodes. We cannot add the links yet because we need to determine a) which pairs of nodes are connected by a link and b) the weight (cost) assigned to that link. Two nodes, u and v, will be connected by a link ( u , v ) if node v is in Tx range from u. In addition, if node u is in Tx range from v, there will be an additional link ( v , u ) . The weight of a link is determined by whether or not the link connecting the two nodes overlaps with a forbidden sector. To enable this determination, we collect all adversary nodes from the SA view into the set A .
The algorithm iterates through each node s r c in F and creates an outgoing link to each of the remaining d s t nodes that can be be connected to it according to (a) and (b). If a link was created, the algorithm will iterate through each adversary node a in A to test if it causes a forbidden sector for the new link. The forbidden sector detection is performed as described in Section 3.4. Links outside a forbidden sector are assigned unit cost, whereas links inside a forbidden sector are penalized with a high cost. The link can be excluded from the topology instead of increasing its cost if the mission requires radio silence. The costs along a path are additive. Dijkstra’s algorithm will attempt to minimize the total cost of a path towards a specific destination.
In a network with n nodes, the longest possible acyclic path consists of n 1 links. If all links are outside forbidden sectors, the cost for such a path is n 1 considering the unit link cost as mentioned above. Thus, the lowest penalty cost that can be chosen for links inside forbidden sectors is n, the number of nodes in the network. A path consisting of one or more such links will have a cost that exceeds the cost of any acyclic path where all links are outside forbidden sectors. In our simulations, the nodes forward IPv4 packets. The time-to-live (TTL) field in the IPv4 header is 8-bit wide, limiting the longest path to 255 links. Therefore, the lowest penalty cost for IPv4 links is 256. In our case, we have set the cost of links located in forbidden sectors to 5000. This value does not confer any advantage or disadvantage compared with 256, but is rarely occurring in the simulations and is thus easy to find in the log files.
In the final part of Algorithm 4, the shortest-path tree produced by Dijkstra’s algorithm will be used to update the IPv4 routing tables of node n.
Algorithm 4 Hostile-Direction Aware Routing (HDARP) at node n.
Require:SA_view, node n running the algorithm
  1:
procedure HDA_Routing(SA_view, n)
  2:
    Group friendly nodes from SA_view in a set F
  3:
    Create an empty set L that will store links between friendly nodes
  4:
    Group remaining nodes from SA_view in a set A
  5:
    Use the sets F and L to define a directed topology graph G ( F , L )
  6:
    for each node s r c F  do
  7:
        for each node d s t F other then s r c  do
  8:
           if  d s t in Tx range from s r c  then
  9:
               Add the directed link ( s r c , d s t ) to set L
10:
               Set link cost: ( s r c , d s t ) .weight 1
11:
           else
12:
               continue
13:
           end if
14:
            f Is_Forbidden_Sector( s r c , d s t , A )
15:
           if f = True then
16:
               Set link cost: ( s r c , d s t ) .weight 5000
17:
               break
18:
           end if
19:
        end for
20:
    end for
21:
     S P T Dijkstra(n, G ( F , L ) )                     ▹Shortest paths from n to other nodes in F
22:
    Use S P T to update the IPv4 routing table entries at n
23:
end procedure

3.4. Forbidden Sector Detection

The goal of the forbidden sector detection method is to determine if an adversary aircraft can detect the communication between two friendly nodes. More specifically, it is to determine if the adversary is able to distinguish the main lobe or sidelobes of the incoming signal from electromagnetic noise. To do so, we construct a 3D geometrical model (i.e., a 3D volume) of the radiation pattern, main lobe and sidelobes combined and determine if any of the adversary aircraft are located within the volume. If any such adversaries are found, then the sending node should avoid direct communication and instead try to forward the packet through other friendly nodes unaffected by forbidden sectors.
We have used a tetrahedron as a first-order approximation of the radiation pattern, as shown in Figure 4. This provides us with an acceptable tradeoff between accuracy and computation time: the last one being particularly important for reducing simulation time. The tetrahedron is created such that the sender is at the center of the tetrahedron base, and the receiver, Blue 2, is located at the apex of the main lobe. Obviously, this assumes that the receiver is within Tx range from the sender; otherwise, direct communication is not possible. In addition, we assume that when the receiver is located closer than Tx range, the sender can adjust the transmission power so the SNR for received signal is just enough for the sender to decode the data. This reduces the likelihood of leaking data behind the receiver. However, according to information from our aerospace industry partner, the receiver can decode the incoming signal (with an acceptable BER) if its SNR is at least 10 dB. Furthermore, given that a signal can be detected if it is just above the noise floor, when this information is plugged into a simplified path loss model [21], the outcome indicates that a signal can be discerned as far as three times the distance from sender to receiver along antenna boresight. Therefore, we extend the tetrahedron apex at three times the distance from the sender and receiver, which is the detection range, the maximum distance at which an adversary can detect the transmission. Similarly, we extend the radius of the tetrahedron base (i.e., the distance from center to each of the three vertices) to 1 / 30 of the detection range to prevent detection through the sidelobes. Thus, our forbidden sector detector consists of the tetrahedron constructed as described above combined with logic to detect if any adversary is located with the 3D space of the tetrahedron.
It is important to point out that when the transmission power is adjusted for the distance to the receiver, the volume of 3D space used by main and side lobes of the signal will change accordingly. Similarly, the tetrahedron is scaled proportionally to the distance to the receiver, but the aspect will remain the same.
The left part of Figure 4 illustrates the operation of the detector in the scenario where node Blue 1 wants to transmit to node Blue 2. The red and green nodes are hostile nodes that should not be able to detect the transmission. The right part of Figure 4 represents a cross-section of the figure on the left, as seen from above, and is rotated so that the tetrahedron apex points upwards. The figure also shows the embedded radiation pattern (also a cross-section of the 3D pattern). The Green node is outside the tetrahedron and thus does not pose a detection risk. However, node Red 1 is able to detect the signal from the sidelobes. In addition, although the signal that passes Blue 2 has a very low SNR, it is also detectable by Red 2. Thus, the location of either Red 1 or Red 2 is enough reason to conclude that the transmission from Blue 1 to Blue 2 is located inside a forbidden sector and that an alternative path through an intermediate friendly node would be preferred.
The logic used to detect if an adversary is inside the tetrahedron is captured by Algorithms 5–7. The algorithms presented here are based to a large extent on discussions available online [22]. Algorithm 5 constructs a tetrahedron with the apex oriented towards the destination node and with the sender node located at the center of the base. We use the convention that T.v1, T.v2 and T.v3 are the coordinates for the three vertices defining the base of the tetrahedron T. The position of the tetrahedron apex (forth vertex) is available in T.v4.
Algorithm 5 Forbidden sector detection.
Require: sender, receiver, set of adversary nodes
1: 
procedure Is_Forbidden_Sector(src, dst, A )
2:
     T  Tetrahedron(src.pos, dst.pos)
3:
    for each node a A  do
4:
        if IsInside(T, a) = True then
5:
           return True
6:
        end if
7:
    end for
8:
    return False
9:
end procedure
The attribute pos appearing to the right of a node variable (e.g., src and dst) contains the 3D coordinates of that node. The algorithms iterates through all adversary nodes, calling the IsInside procedure (Algorithm 6) to check if any generate a forbidden sector. In that case, the algorithm aborts and returns True. Otherwise, if none of the adversaries are located within the tetrahedron space, the algorithm returns False.
Algorithm 6 checks for each of the four planes making up the tetrahedron if the opposite vertex and the adversary node are located on the same side of the plane. If this is true for all planes, it means that the position of the adversary is a point located inside the tetrahedron. Otherwise, the adversary is on the outside.
Algorithm 6 Check if adversary is within tetrahedron.
Require: tetrahedron, adversary node
  1:
procedure Is_Inside(T, a)
  2:
     p 1 Is_On_Same_Plane_Side(T.v1, T.v2, T.v3, T.v4, a.pos)
  3:
     p 2 Is_On_Same_Plane_Side(T.v2, T.v3, T.v4, T.v1, a.pos)
  4:
     p 3 Is_On_Same_Plane_Side(T.v3, T.v4, T.v1, T.v2, a.pos)
  5:
     p 4 Is_On_Same_Plane_Side(T.v4, T.v1, T.v2, T.v3, a.pos)
  6:
    if  p 1 = True and p 2 = True and p 3 = True and p 4 = True then
  7:
        return True
  8:
    else
  9:
        return False
10:
    end if
11:
end procedure
The logic to detect if the opposite vertex and the adversary are located on the same side of a plane is shown in Algorithm 7. The first three input parameters, p , q and r , are the coordinates of the vertices defining the plane. Vertex p is used as common origin when using the coordinates to construct two vectors, q p and r p , that span the plane. The cross-product n of these two vectors is perpendicular to the two vectors spanning the plane, and is thus a normal to the plane. Similarly, we use the remaining two parameters v and a to construct two vectors v p and a p , using the same origin p as before. The normal n is then used as a reference direction when computing the dot products of the normal with these two vectors. The dot product returns a positive value if the angle θ between the vector and normal is π < θ < π and it returns a negative value when π < θ < 3 π . When the vector and normal are perpendicular their dot product is zero. Therefore, if both dot products, d 1 and d 2 , have the same sign, it means that v and a are on the same side of the plane. When both dot products are zero, it means that the two vectors are on the plane. In this situation, we still claim the two vectors are on the same side as this weighs towards concluding that the adversary is within the tetrahedron space (pessimistic view). The Sign function shown in Algorithm 7 returns integer −1 if the numeric argument is negative, +1 if positive, and 0 otherwise.
Algorithm 7 Check if opposite vertex and adversary are on the same side of the tetrahedron plane.
Require: Tetrahedron plane vertices, opposite vertex, adversary position
  1:
procedure Is_On_Same_Plane_Side( p , q , r , v , a )
  2:
    Compute normal to the plane spawned by q p and r p :
  3:
     n ( q p ) × ( r p )                                                                                             ▹ Cross-product
  4:
    Compute dot products between plane normal and vectors towards v and a :
  5:
     d 1 n · ( v p )
  6:
     d 2 n · ( a p )
  7:
    if Sign( d 1 ) = Sign( d 2 ) then
  8:
        return True
  9:
    else
10:
        return False
11:
    end if
12:
end procedure

4. Methodology

We have used the OMNEST simulator framework to evaluate HDARP. OMNEST is the commercial version of the well-known simulator framework OMNeT++ [23,24]. OMNEST uses a modular, component-based approach to build simulations. At the core, OMNEST modules are written in C++, but at a higher level, they can be combined and extended using OMNEST’s Network Description (NED) language. We also made use of the INETMANET [25] open-source model library, which contains models for the internet stack, wired and wireless link-layer protocols and more. Historically, INETMANET was forked from the official INET [26] model library in order to address the shortage of MANET protocol components. Nowadays, INET and INETMANET are pretty much aligned in terms of functionality and compatibility with each other. However, INETMANET continues to provide access to additional MANET protocols, which is the reason we preferred it for our study. INETMANET does not have specific versioned releases. The code we use in our simulations comes from Git commit 6708b98344e5fd5a5e788da97367efa9150629a2. Both INET and INETMANET are well described in [27].
We have compared HDARP’s performance against five other MANET protocols available in INETMANET: AODV [28], BATMAN [29], DSDV [30], DSR-UU [31], and OLSR [32], respectively. Initially, we included additional MANET routing protocols from INETMANET, AODV-UU [33], Dymo [34,35] and Dymo-FAU [36], but these crashed multiple times during our simulations and are therefore not included in the results. Notably, DSR-UU and AODV-UU are protocol implementations for the Linux kernel that later were also made operable with the ns-2 and OMNeT++ simulators.
For all nodes that are simulated, we used the NED language to inherit generic networking functionality from the AdHocHost component, which provides among other things a TCP/IP stack simulation model, support for mobility models, a loopback interface as well as a wireless interface. In addition, the nodes were configured to use one specific MANET routing protocol from the selection above, including our own HDARP routing protocol.
Every node derived from the AdHocHost component can be equipped with an arbitrary number of applications. These simulation modules exploit functionality of the underlying TCP/IP stack to communicate with peer modules application located on other nodes, typically using a socket abstraction. However, the applications can also subscribe for signals from lower layers and other modules, or hook into the functionality of the underlying TCP/IP stack to provide special processing for incoming and outgoing packets, much like the functionality of the Linux netfilter [37]. In our case, we equipped the nodes in the simulation with two applications, InterceptApp and UdpBasicApp, described in Section 4.1 and Section 4.2, respectively.
The nodes were also equipped with a mobility model that imports realistic flight path traces provided by our aerospace industry partner. This module was implemented using a combination of C++ and NED. Our mobility model reads data from file where records are indexed by monotonically increasing timestamps. Each record contains the 3D position of a specific node at the time indicated by the timestamp. The module computes instantaneous node velocity and acceleration using the data from the records. In addition, the module interpolates the position of the aircraft between two consecutive timestamps using the computed velocity. The module emits a notification each time a node updates its position, either through interpolation or by advancing to the next record in the data. It is important to note that each node participating in the simulation is equipped with its own mobility model instance that emits notifications for that particular node.
HDARP nodes are configured as above with the notable exception that they require an additional SA module to implement situation awareness. Every HDARP node has its own SA module instance that subscribes to mobility notifications from all nodes in the simulation. The mobility data are used to update the node’s SA view. The SA module has logic to determine if specific nodes are “visible” based on sensor range, which is a configurable parameter. Invisible nodes are excluded from the node’s SA view computed by the module. The same procedure is applied when receiving SA updates from friendly nodes.
The HDARP routing module receives a notification from the SA module every time the SA view is updated. For each notification, it determines whether routes must be recomputed as described in Section 3.3 above. To avoid stale routes, the HDARP module purges the existing routes in the IPv4 routing table before installing routes derived from the current SA view.
Unfortunately, there is almost no support for antenna arrays components with beamforming in INET/INETMANET, with the notable exception of [38]. Furthermore, our interest was primarily in the behavior of the routing protocol, separated from the intricacies of the link layer and physical layer models. Consequently, we made a pragmatic simplification by configuring the wireless interface to use the AckingWirelessInterface module. This module contains two submodules: a unit disk radio (UnitDiskRadio) and a very simple MAC protocol (AckingMac).
The unit disk radio is configured to perform interference modeling, which means that when a node transmits a MAC frame, all nodes within Tx range will be able to receive the frame, unless other nodes within Tx range are transmitting at the same time, in which case the reception will fail. The model implies the use of a isotropic antenna, which is at odds with our aim to use directional antennas. Instead, we emulate the effects of a directional antenna through the InterceptApp module, which is presented in Section 4.1.
The AckingMac is trivial in the sense that it offers encapsulation and decapsulation of link layer frames, but no medium access procedure or retransmission.
For over-the-air tactical links, it is common practice to avoid the use of the Address Resolution Protocol (ARP) [39] in order to reduce latency. Instead, IP addresses are mapped to MAC addresses in a static table available as a parameter in the MC, or the mapping is a deterministic function based on the assigned IP address of a node. We have configured the simulator to use GlobalArp in order to avoid ARP exchanges. The GlobalArp is a lookup table of IP to MAC address mappings available to all simulation nodes.

4.1. InterceptApp

The InterceptApp provides three services: it emulates the functionality of directional antennas for nodes derived from the AdHocHost component, it provides the means to measure the number of leaked packets by such nodes, and it helps implementing teams/groups (e.g., red, blue, green) while running a separate MANET for each team. To provide these services, InterceptApp uses a subset of the SA functionality from the SA module described above.
The application subscribes to notifications from the MAC layer about incoming packets received by the wireless network interface. Each notification provides access to the full packet, including the MAC headers. The InterceptApp extracts the source MAC address and the destination MAC address from the packet headers and uses these to look up the identification of the sender and receiver in the node’s SA view. If the sender does not belong to the same team as the node that received the packet (i.e., the node where InterceptApp is currently executing) and directional antenna emulation is turned off, then InterceptApp will record the incoming packet as a leaked packet.
In the case when directional antenna emulation is enabled, the receiving node will run Algorithm 5 with sender and receiver identities as input for the first two parameters. The third parameter, the set A , will contain a single element, which is the identity of the node that received the packet. In essence, the algorithm answers the following question: would this node have received the packet if the sender from the other team instead of isotropic antennas used directional antennas with a radiation pattern following the tetrahedron model? If the answer is yes, the received packet would be leaked even if directional antennas were in use, and thus, the packet is marked as leaked.
In either case (directional antenna emulation on or off), the application will force the TCP/IP stack to drop the packet if the sender belongs to a different team. Existing MANET protocol modules in INET/INETMANET are not aware of the concept of a team. Without InterceptApp, they will try and succeed to use nodes from other teams as relay nodes.
If the sender belongs to the same team, normal packet processing will ensue.

4.2. UdpBasicApp

As described above, all nodes in the simulation are equipped with an application called UdpBasicApp. The application can send UDP datagrams to a set of preconfigured IP addresses and port numbers. The datagram size and the send rate can be configured either as fixed values, or as random values drawn from a specific probability distribution. In addition, UdpBasicApp listens on a configurable port for incoming UDP datagrams and uses these to compute basic statistics for metrics such as throughput and packet lifetime.
We have configured UdpBasicApp to draw the datagram size from a discrete uniform distribution over the interval 100 bytes to 1000 bytes. Similarly, the datagram send rate follows a discrete uniform distribution over the interval 100 ms to 200 ms. This is intended as a rough approximation of low bitrate voice-over-IP communication between the planes, such as that produced by the Mixed Excitation Linear Prediction Enhanced (MELPe) codec, including real-time transport protocol (RTP/RTCP) headers [40,41]. Each node in the simulation is configured to send UdpBasicApp datagrams only to all other nodes belonging to the same team, but none to nodes belonging to other teams.
The random numbers are generated using an implementation of the Mersenne Twister [42] pseudo-random number generator (PRNG) that is included in the OMNEST distribution. In OMNEST, multiple PRNG instances can run simultaneously to create independent streams of random numbers. We have dedicated a PRNG instance to the UdpBasicApp. This way, the random events in UdpBasicApp are not affected by random events in the reminder of the simulator (e.g., scheduled updates in the routing protocol that include a random delay component). The result is that the transmission time and size for UdpBasicApp datagrams remain the same when we change the routing protocol. In effect, this becomes the workload against which we evaluate the MANET protocols in this study.

4.3. Simulation Scenarios

In our evaluation of the protocols, we will use two different simulation scenarios:
  • Scenario 1: R4B4, which contains four red aircraft and four blue aircraft representing two different teams (red and blue). This scenario is depicted to the left in Figure 5.
  • Scenario 2: BVR (beyond visual range), which contains a total of 24 aircraft from three teams (red, blue, green). This scenario is depicted to the right in Figure 5.
In Scenario 1, the two teams start far enough from each other to avoid leaking packets to the adversary, but close enough (i.e., within Tx range) within the team to enable direct communication. The two teams approach each other until the majority of the nodes are in detection range from at least one of the adversary aircraft. At this point, HDARP starts using multi-hop communication to avoid forbidden sectors. Eventually, the aircraft veer away from adversary nodes.
In Scenario 2, the red and blue team consist each of a bulk of eight fighter jets. These are shown closely packed together, visible as clusters in the figure. We have drawn a vertical red line in that figure that separates the two clusters. In addition, the red and blue teams have each two airborne early warning (AEW) nodes that act as command-and-control (C2) centers from behind the fighter jets. They are shown to the far left and right of the figure, respectively. Furthermore, the blue team has a node denoted as blue-ship1, visible at the top of the figure on the left side of the red vertical line. Similarly, the red team has a red-ship1 node located at the bottom, on the right side of the red vertical line. Blue-ship1 and red-ship play the role of mid-air tanker aircraft. The green team has two nodes, one at the top on the right of the vertical line and one at the bottom on left of the vertical line. We have drawn arrows in the figure to ease the identification of the green nodes in the figure.
The red and blue clusters are initially out of Tx range from each other, and thus, direct communication within the cluster is possible. The clusters approach each other while the AEW nodes remain behind. The tanker aircraft remain stationary through the whole simulation. When the two clusters come within Tx range, they begin using the tanker and AEW nodes in their team as relay nodes. The green nodes are out of Tx range for the entire simulation, and thus, cannot communicate with each other. Their role is to stress the directional antenna emulation part of the simulation, as well as the forbidden sector detection in HDARP. After a close encounter, the red and blue clusters return to their approximate starting positions.
In each scenario, we can choose one out of six routing protocols: AODV, BATMAN, DSDV, DSR-UU, HDARP (our protocol), and OLSR, respectively. A third parameter is the antenna type: directional (dir), or omnidirectional (omni). The choice of antenna only affects the operation of InterceptApp, but the simulation must be re-run if we want results for a different antenna type. To increase the statistical accuracy of the results, we run each scenario + protocol + antennna type combination 30 times with different RNG seeds.

4.4. Simulation Settings

In Table 1, we list the critical simulation parameters used to produce the results in this study. In the case where multiple parameter values were simulated, the distinct values are separated by comma in the Settings column. For the remainder of simulation components, including MANET protocols others then HDARP, we have used the configured default settings in OMNEST/INETMANET.

5. Results

As discussed previously, it is important that no packets are leaked to hostile aircraft. If traditional omnidirectional antennas are used, there is a very high risk that a packet is leaked. This risk is reduced if directional antennas are used. However, even when using directional antennas, there is still a risk that a packet is leaked if there are adversary aircraft close to the sender or the receiver (see Figure 4). The main benefit of the HDARP protocol is that it considers forbidden sectors so that the risk for leaked packets is substantially reduced.
Table 2 and Table 3 show the reduction of leaked packets when using directional antennas instead of omnidirectional antennas for the five protocols, which the HDARP protocol is compared to for scenarios 1 (R4B4) and 2 (BVR). The table shows that using directional antennas reduced the number of leaked packets with a factor 133 to 222 (depending on the protocol) for Scenario 1 and with a factor of 110 to 7464 for Scenario 2. This means that the reduction of leaked messages due to using directional antennas is very high. However, some packets are still leaked to an adversary aircraft.
Figure 6 shows the number of packets that are leaked when using directional antennas. The averages and the 99% confidence intervals are shown in the figure. The confidence intervals are very small with the exception of DSR-UU that has a somewhat larger confidence interval than the other protocols. DSR-UU is a complete protocol implementation for the Linux operating system that was later integrated with OMNEST, unlike the other protocols, which are pure simulation implementations. However, it is difficult to assess whether this is the reason for the large confidence intervals observed without an in-depth code review, which is outside the scope of this study. The figure shows that the HDARP protocol has (virtually) no leaked packets, whereas the other protocols have a substantial number of leaked packets for the scenarios considered here.
In order not to leak packets, the HDARP protocol sometimes avoids sending packets directly from the sender to the destination, since such direct transmissions could be detected by adversary aircraft (see Figure 3 and Figure 4). This means that one would expect that the number of hops and, as a consequence of this, the average end-to-end packet delivery time of HDARP could increase compared to protocols that do not consider forbidden sectors. Packet delivery time includes queuing time in each node on the path, as well as transmission and propagation delay for each link of the path.
Figure 7 shows that average packet lifetime of the HDARP protocol is longer than the average packet lifetime for four of the other protocols. The difference is small for Scenario 1, but rather significant for Scenario 2. In practice, the type of traffic routed by HDARP will consist mostly of voice-over-IP communication. Conventional wisdom indicates that for this type of traffic, the one-way latency should not exceed 150 ms [43,44]. This is almost two times the amount of packet life time observed in Scenario 2 and thus does not adversely impact the quality of the voice communication. The average packet lifetime for the AODV protocol is not shown in the figure. The reason for this is that the average packet lifetime of AODV is more than 100 times longer than that of HDARP for Scenario 1 and more than 5 times longer than that of HDARP for Scenario 2.
One drawback of using directional antennas is that a receiver may suffer from destructive interference from two or more simultaneous senders without the senders being aware of the problem (c.f., discussion about unit disk radio in Section 4). An example would be if A and B simultaneously sent to C in Figure 3 on the same frequency. Therefore, one could expect that the HDARP protocol could suffer from a low packet delivery ratio. Figure 7 shows that the packet delivery ratio of the HDARP protocol is on a par with the best of the other protocols for Scenario 1 but a bit lower for Scenario 2. This means that the extra packet loss due to avoiding leakage seems limited. In some situations, HDARP will not be able to find a route that is free from leakage risks. However, in such cases, the packet will still be delivered (see how weight is handled in Algorithm 4). This means that the lower packet delivery rate for Scenario 2 is not caused by HDARP not being able to find a route that is free from leakage risks. The very low number of leaked packets for HDARP (see Figure 6) shows that HDARP was indeed able to find leakage-free routes in (virtually) all cases. The type of destructive interference mentioned here can be handled in the future by smart antenna arrays that multiplex multiple signals over time, frequency and angle of arrival.
In MANETs, there are two types of packets: packets containing user information (the payload provided through UdpBasicApp), e.g., voice communication between pilots and packets containing control information about the network and the network topology (i.e., routing messages). For each of our two scenarios, the number of packets containing user information is the same for all communication protocols. The number of packets containing control information, however, differs between different protocols. Figure 9 shows the total number of packets sent for the protocols considered here. The figure shows that DSR-UU and OLSR send a smaller number of packets than the HDARP protocol and that DSDV sends almost the same amount of packets for our two scenarios. This means that for HDARP, the number of packets containing control information is relatively small compared to most of the other protocols.
For HDARP, the control information consists of SA data, and SA data are something that the pilots need for tactical reasons regardless of which communication protocol is used. This means that the control information needed for the HDARP protocol needs to be distributed between the aircraft anyways. As a consequence, Figure 9 does not give a completely fair picture of the number of packets sent, since the values for the other protocols do not include communication of SA data. In Table 1, we see that the average time between UDP datagram transmissions is 150 milliseconds (uniform (0.1, 0.2)) and that the average time between SA update messages is 4 s (uniform (3, 5)). This means that during a 12 s interval, we receive 80 UDP datagram transmissions and 3 SA transmissions for each friendly node. Since 3/80 = 3.75%, one would think that we should multiply the number of sent packets with 1.0375 for all protocols except HDARP. However, SA data are only sent to nodes that are within a one-hop distance from the sender, and due to forbidden sectors, it may not be possible to reach all nodes in one hop. This means that the average number of SA packets sent from each friendly node is somewhat smaller than three during a 12 s interval. If we take this aspect into consideration, all values in Figure 9 should be multiplied with a factor or 1.03 (and not 1.0375), except the values for the HDARP protocol. If we consider this multiplication, the HDARP protocol will have the second smallest number of packets sent for the R4B4 scenario (DSR-UU will still have the smallest number of sent packets) and the third smallest for the BVR scenario (DSR-UU and OLSR will still have a smaller number of sent packets). Since the SA data are the control information about the network topology for the HDARP protocol, it may seem surprising that some protocols have a lower number of sent packets. The reason for this that the forbidden sectors in HDARP cause more hops and each extra hop generates a sent packet.

6. Analysis and Discussion

Our experiments show that the HDARP protocol avoids adversary detection by minimizing the amount of leaked packets. The HDARP protocol uses situation awareness (SA) data when making routing decisions. The pilots of fighter jets need SA data for completing their missions. This means that SA data are used for two purposes: providing the pilots with mission critical information and for routing communication packets so that they cannot be detected by an adversary.
The HDARP protocol prevents leaking packets to an adversary by proactively trying to avoid transmitting in forbidden sectors. A consequence of this strategy is that a packet sometimes cannot be sent along a direct line between the sender and the destination. In such cases, the packet needs to be sent via an intermediate node (see Figure 3). As a result of this, the number of hops will increase in some cases, and as a consequence, the average packet life time will also increase when we avoid leaking packets. Our experiments quantify this effect for the two scenarios considered. It turns out that compared to most protocols that do not avoid leaked packets, the average packet life time increased significantly for the more complex of the two scenarios (the BVR scenario). However, experts in the area of fighter jet design consider packet leakage to be a major tactical disadvantage from an operational perspective, and the cost in terms of longer average packet life time is therefore regarded as acceptable, depending on scenario at hand.
Our experiments show that using directional instead of omnidirectional antennas will reduce the number of leaked packets by several orders of magnitude. Similar reductions of the detection probability when using directional instead of omnidirectional antennas have been observed by other researchers [45]. The HDARP protocol only works for directional antennas. However, when using directional antennas, simultaneous senders using the same frequency will not detect that the receiver suffers from destructive interference. As a consequence of this, some packets will be lost, resulting in a somewhat lower packet delivery rate for HDARP compared to the best of the omnidirectional protocols. Directional antennas can receive two packets on the same frequency simultaneously if the difference in angle of arrival (AOA) between the two senders is big enough. Our simulator does not consider the angle of arrival, which means that there will be destructive interference regardless of the AOA difference between the senders. This means that the packet delivery rates for HDARP shown in Figure 7 are pessimistic and that the cost of using directional antennas and avoiding adversary detection in terms of a somewhat decreased packet delivery rate is acceptable.
The total number of sent packets is relatively small for the HDARP protocol. In fact, it is almost at the same level as the protocol with the smallest number of sent packets (DSR-UU). This means that SA data are a relatively efficient way of representing topology information about the mobile ad hoc network. As discussed previously, the pilots need SA data for completing their mission in any case. If we compensate for this, the difference between the number of packets sent by the HDARP protocol and the number of packets sent by DSR-UU becomes even more marginal. This means that the cost of avoiding adversary detection in terms of an increase in the number of sent packets is minimal and clearly acceptable.
In this paper, we base our evaluation on data from realistic flight scenarios used by the aerospace industry. Unfortunately, many studies of mobile ad hoc networks use very simplistic and unrealistic workload models, e.g., nodes with random movement patterns in a rectangular area [46]. This project was conducted in close cooperation between researchers from academia and aerospace industry experts, which facilitates a high level of realism in the evaluation. In addition, the HDARP protocol is protected by a patent application, which demonstrates the expected importance and practical applicability of the HDARP protocol.

7. Conclusions

We have defined the Hostile-Direction Aware Routing Protocol (HDARP) that avoids detection by adversary aircraft in airborne tactical networks. HDARP uses directional antennas and avoids adversary detection by using so-called situation awareness (SA) data to determine a route such that the packets are not detected by hostile aircraft. SA data are needed in order for the pilots to perform their mission.
One of the advantages of HDARP, besides avoiding adversary detection, is that it uses already existing SA data for network topology control and routing decisions as well. Based on evaluations using realistic directional antenna models and flight scenarios from the defense industry, we have shown that the major tactical advantage of avoiding adversary detection comes at a relatively small, and clearly acceptable, cost in terms of somewhat longer packet lifetime and marginally lower packet delivery rate. Our evaluations also show that SA data provide a highly efficient way of representing network topology control, and the number of sent packets using HDARP is on a par with the best routing algorithms that do not avoid adversary detection. This means that the cost of avoiding adversary detection in terms of a slight increase of the number of sent packets is negligible.
In general, in this paper, we focus on the algorithmic properties of the protocol and not on the radio transmission protocol. In future work, we will consider looking at the effects of the radio protocol as well: examples include path loss, fading, and shadowing aspects. Further, we might also consider additional flight scenarios, different relations between flight speed and message propagation latencies. Finally, we have not tracked the beam width in our simulations. Theoretically, a narrow beam width decreases the probability of detection but potentially increases the average path length. Conversely, a wide beam width enables direct communication with more nodes, i.e., multicast, but potentially increases the probability of detection. We think that the trade-off between these two is a very interesting aspect that we consider for future work

8. Patents

The following patent application has been submitted as a result of the work presented in this paper:
  • A. Westerhagen, B. Granbom, D. Ilie, L. Lundberg, and H. Grahn, “A Computer Implemented Method for Secure Transmission of a Data Message from a Source Node to a Target Node”, filed in November 2022 as PRV (Swedish Intellectual Property Office) registration number SE 2200136-6.

Author Contributions

Conceptualization, D.I.; methodology, D.I., L.L., H.G. and A.W.; software, D.I.; validation, D.I., A.W. and A.H.; data curation, D.I. and B.G.; writing—original draft preparation, D.I., L.L., H.G. and A.W.; writing—review and editing, D.I., L.L., H.G., A.W., B.G. and A.H.; visualization, D.I., L.L., H.G., A.W. and A.H.; project administration, A.W.; funding acquisition, D.I., L.L., H.G., A.W., B.G. and A.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partly funded by VINNOVA, Sweden, project “NFFP7 (Call 2)–Riktad luftdatalänk”.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Restrictions apply to the availability of these data, thus data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Saunders, S.R.; Aragón-Zavala, A. Antennas and Propagation for Wireless Communication Systems, 2nd ed.; Wiley: Chichester, UK; West Sussex, UK, 2007; ISBN 978-0-470-84879-1. [Google Scholar]
  2. Cheng, B.N.; Charland, R.; Christensen, P.; Veytser, L.; Wheeler, J. Evaluation of a Multihop Airborne IP Backbone with Heterogeneous Radio Technologies. IEEE Trans. Mob. Comput. 2014, 13, 299–310. [Google Scholar] [CrossRef]
  3. Sharma, V.; Kumar, R. Cooperative frameworks and network models for flying ad hoc networks: A survey. Concurr. Comput. Pract. Exp. 2017, 29, e3931. [Google Scholar] [CrossRef]
  4. Arafat, M.Y.; Poudel, S.; Moh, S. Medium Access Control Protocols for Flying Ad Hoc Networks: A Review. IEEE Sens. J. 2021, 21, 4097–4121. [Google Scholar] [CrossRef]
  5. Yi, S.; Pei, Y.; Kalyanaraman, S. On the Capacity Improvement of Ad Hoc Wireless Networks Using Directional Antennas. In MobiHoc ’03, Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Annapolis, MD, USA, 1–3 June 2003; Association for Computing Machinery: New York, NY, USA, 2003; pp. 108–116. [Google Scholar] [CrossRef]
  6. Babich, F.; Comisso, M.; Crismani, A.; Dorni, A. On the Design of MAC Protocols for Multi-Packet Communication in IEEE 802.11 Heterogeneous Networks Using Adaptive Antenna Arrays. IEEE Trans. Mob. Comput. 2015, 14, 2332–2348. [Google Scholar] [CrossRef]
  7. Wang, G.; Qin, Y. MAC Protocols for Wireless Mesh Networks with Multi-beam Antennas: A Survey. In Advances in Information and Communication; Arai, K., Bhatia, R., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 117–142. [Google Scholar]
  8. Oubbati, O.S.; Atiquzzaman, M.; Lorenz, P.; Tareque, M.H.; Hossain, M.S. Routing in Flying Ad Hoc Networks: Survey, Constraints, and Future Challenge Perspectives. IEEE Access 2019, 7, 81057–81105. [Google Scholar] [CrossRef]
  9. Cheng, B.N.; Block, F.J.; Hamilton, B.R.; Ripplinger, D.; Timmerman, C.; Veytser, L.; Narula-Tam, A. Design considerations for next-generation airborne tactical networks. IEEE Commun. Mag. 2014, 52, 138–145. [Google Scholar] [CrossRef]
  10. Pan, Y.; Lyu, N.; Yang, C. GOR: Group-oblivious multicast routing in airborne tactical networks under uncertainty. J. Netw. Comput. Appl. 2022, 207, 103509. [Google Scholar] [CrossRef]
  11. Miao, J.; Lv, N.; Chen, K.; Gao, Q.; Wang, X. Dynamic Reliability-Aware Virtual Network Embedding for Airborne Tactical Networks. Wirel. Commun. Mob. Comput. 2022, 2022, 7164854. [Google Scholar] [CrossRef]
  12. Chen, K.; Zhao, S.; Lv, N. Network Monitoring Information Collection in the SDN-Enabled Airborne Tactical Network. Int. J. Aerosp. Eng. 2018, 2018, 1940842. [Google Scholar] [CrossRef]
  13. Lu, X.; Towsley, D.; Lio’, P.; Wicker, F.; Xiong, Z. Minimizing Detection Probability Routing in Ad Hoc Networks Using Directional Antennas. EURASIP J. Wirel. Commun. Netw. 2009, 2009, 256714. [Google Scholar] [CrossRef]
  14. Peters, K.; Jabbar, A.; Cetinkaya, E.K.; Sterbenz, J.P.G. A Geographical Routing Protocol for Highly-Dynamic Aeronautical Networks. In Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, Cancun, Mexico, 28–31 March 2011; pp. 492–497. [Google Scholar] [CrossRef]
  15. Swidan, A.; Khattab, S.; Abouelseoud, Y.; Elkamchouchi, H. A secure geographical routing protocol for highly-dynamic aeronautical networks. In Proceedings of the MILCOM 2015—2015 IEEE Military Communications Conference, Tampa, FL, USA, 26–28 October 2015; Volume 2015, pp. 708–713. [Google Scholar]
  16. Lemmon, C.; Lui, C.; Lee, I. Review of Location-Aware Routing Protocols. Inf. Sci. Serv. Sci. 2010, 2, 132–143. [Google Scholar] [CrossRef]
  17. Agrawal, J.; Kapoor, M. A comparative study on geographic-based routing algorithms for flying ad-hoc networks. Concurr. Comput. 2021, 33, e6253. [Google Scholar] [CrossRef]
  18. Medhi, D.; Ramasamy, K. Networking Routing: Algorithms, Protocols and Architectures, 2nd ed.; Morgan-Kaufmann: Cambridge, MA, USA, 2018; ISBN 978-0-12-800737-2. [Google Scholar]
  19. Dijkstra, E.W. A Note on Two Problems in Connection with Graphs. Numer. Math. 1959, 1, 269–271. [Google Scholar] [CrossRef]
  20. Cormen, T.H.; Leiserson, C.E.; Rivest, R.L. Introduction to Algorithms, 2nd ed.; The MIT Press: Cambridge, MA, USA, 2001; ISBN 0-262-53196-8. [Google Scholar]
  21. Goldsmith, A. Wireless Communications, 8th ed.; Cambridge University Press: New York, NY, USA, 2005; ISBN 978-0-521-83716-3. [Google Scholar]
  22. Stack Overflow. How to Check Whether the Point Is in the Tetrahedron or Not? Available online: https://stackoverflow.com/questions/25179693/how-to-check-whether-the-point-is-in-the-tetrahedron-or-not (accessed on 28 May 2023).
  23. Varga, A.; Hornig, R. An overview of the OMNeT++ simulation environment. In Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, SimuTools 2008, Marseille, France, 3–7 March 2008. [Google Scholar]
  24. OMNeT++. Available online: https://omnetpp.org (accessed on 7 April 2023).
  25. INETMANET. Available online: https://github.com/aarizaq/inetmanet-4.x (accessed on 7 April 2023).
  26. INET. Available online: https://inet.omnetpp.org/ (accessed on 7 April 2023).
  27. Virdis, A.; Kirsche, M. (Eds.) Recent Advances in Network Simulation: The OMNeT++ Environment and Its Ecosystem; EAI/Springer Innovations in Communication and Computing; Springer Nature Switzerland AG: Cham, Switzerland, 2019; ISBN 978-3-030-12844-9. [Google Scholar]
  28. Perkins, C.E.; Belding-Royer, E.M.; Das, S.R. RFC 3561: Ad hoc On-Demand Distance Vector (AODV) Routing; IETF: Fremont, CA, USA, 2003; Available online: https://www.rfc-editor.org/rfc/rfc3561 (accessed on 8 April 2023).
  29. Open-Mesh.net. Better Approach to Mobile Ad-Hoc Networking. Available online: https://www.open-mesh.org/projects/open-mesh/wiki (accessed on 8 April 2023).
  30. Perkins, C.E.; Bhagwat, P. Highly-Dynamic Destination-Sequenced Distance-Vector Routing for Mobile Computers (DSDV). In Proceedings of the ACM SIGCOMM ’94, London, UK, 31 August–2 September 1994. [Google Scholar]
  31. Johnson, D.B.; Maltz, D.A.; Hu, Y.C. RFC 4728: The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4; IETF: Fremont, CA, USA, 2007; Available online: https://www.rfc-editor.org/rfc/rfc4728 (accessed on 8 April 2023).
  32. Clausen, T.H.; Dearlove, C.; Jacquet, P.; Herberg, U. RFC 7181: The Optimized Link State Routing Protocol Version 2 (OLSRv2); IETF: Fremont, CA, USA, 2014; Available online: https://www.rfc-editor.org/rfc/rfc7181 (accessed on 8 April 2023).
  33. Lundgren, H. Implementation and Real-World Evaluation of Routing Protocols for Wireless Ad hoc Networks. Licentiate Thesis, Department of Information Technology, Uppsala University, Uppsala, Sweden, 2002. Available online: https://www.it.uu.se/research/publications/lic/2002-008 (accessed on 28 May 2023).
  34. Perkins, C.E.; Ratliff, S.; Dowdell, J. Dynamic MANET On-Demand (AODVv2) Routing; IETF: Fremont, CA, USA, 2013; Available online: https://www.ietf.org/archive/id/draft-ietf-manet-dymo-26.txt (accessed on 8 April 2023).
  35. Perkins, C.E.; Ratliff, S.; Dowdell, J.; Steenbrink, L.; Pritchard, V. Ad Hoc On-Demand Distance Vector Version 2 (AODVv2) Routing; IETF: Fremont, CA, USA, 2019; Available online: https://www.ietf.org/archive/id/draft-perkins-manet-aodvv2-03.txt (accessed on 8 April 2023).
  36. Louizi, M. Implementierung des Ad-Hoc-Routing-Protokolls DYMO. Bachelor’s Thesis, Friedrich–Alexander University of Erlangen–Nuremberg (FAU), Nuremberg, Germany, 2006. [Google Scholar]
  37. Netfilter: Firewalling, NAT, and Packet Mangling for Linux. Available online: https://www.netfilter.org (accessed on 8 April 2023).
  38. Inzillo, V.; De Rango, F.; Quintana, A.A. Supporting 5G Wireless Networks Through IEEE802. 11ac Standard With New Massive MIMO Antenna System Module Design in OMNeT++ Simulator. In Proceedings of the 8th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH), Porto, Portugal, 29–31 July 2018. [Google Scholar]
  39. Plummer, D.C. RFC 826: An Ethernet Address Resolution Protocol–or–Converting Network Protocol Addresses to 48 bit Ethernet Address for Transmission on Ethernet Hardware. 1982. Available online: https://www.rfc-editor.org/rfc/rfc826.txt (accessed on 8 April 2023).
  40. NATO. The 600 Bit/S, 1200 Bit/S and 2400 Bit/S NATO Interoperable Narrow Band Voice Coder; STANAG No. 4591; NATO: Brussels, Belgium, 2006. [Google Scholar]
  41. Schulzrinne, H.; Casner, S.L.; Frederick, R.; Jacobson, V. RFC 3550 RTP: A Transport Protocol for Real-Time Applications; IETF: Fremont, CA, USA, 2003; Available online: https://www.rfc-editor.org/rfc/rfc3550 (accessed on 11 April 2023).
  42. Matsumoto, M.; Nishimura, T. Mersenne Twister: A 623-Dimensionally Equidistributed Uniform Pseudo-Random Number Generator. ACM Trans. Model. Comput. Simul. 1998, 8, 3–30. [Google Scholar]
  43. ITU. One Way Transmission Time; ITU-T Recommendation G.114; International Telecommunication Union: Geneva, Switzerland, 2003. [Google Scholar]
  44. Markopoulou, A.; Tobagi, F.; Karam, M. Assessing the quality of voice communications over Internet backbones. IEEE/ACM Trans. Netw. 2003, 11, 747–760. [Google Scholar] [CrossRef]
  45. Lu, X.; Wicker, F.D.; Towsley, D.; Xiong, Z.; Lio’, P. Detection Probability Estimation of Directional Antennas and Omni-Directional Antennas. Wirel. Pers. Commun. 2010, 55, 51–63. [Google Scholar] [CrossRef]
  46. Conti, M.; Giordano, S. Multihop Ad Hoc Networking: The Theory. IEEE Commun. Mag. 2007, 45, 78–86. [Google Scholar] [CrossRef]
Figure 1. Two friendly aircraft communicating with each other.
Figure 1. Two friendly aircraft communicating with each other.
Futureinternet 15 00204 g001
Figure 2. Three friendly aircraft communicating with each other, using both single-hop routing and multi-hop routing.
Figure 2. Three friendly aircraft communicating with each other, using both single-hop routing and multi-hop routing.
Futureinternet 15 00204 g002
Figure 3. Three friendly aircraft communicating with each other, but with an adversary nearby forcing multi-hop routing to be used.
Figure 3. Three friendly aircraft communicating with each other, but with an adversary nearby forcing multi-hop routing to be used.
Futureinternet 15 00204 g003
Figure 4. Forbidden sector detection. To the left: 3D view of detector operation. To the right: cross-section of 3D radiation pattern with detector. Ratio between size of main lobe and size of sidelobes is decreased on purpose in order for the sidelobes to be visible in the figure.
Figure 4. Forbidden sector detection. To the left: 3D view of detector operation. To the right: cross-section of 3D radiation pattern with detector. Ratio between size of main lobe and size of sidelobes is decreased on purpose in order for the sidelobes to be visible in the figure.
Futureinternet 15 00204 g004
Figure 5. Simulation scenarios. Upper: Scenario 1. Lower: Scenario 2. Maps data: Google ©2023.
Figure 5. Simulation scenarios. Upper: Scenario 1. Lower: Scenario 2. Maps data: Google ©2023.
Futureinternet 15 00204 g005
Figure 6. Average number of leaked packets when using directional antennas (99% confidence interval), for Scenario 1 (upper) and Scenario 2 (lower).
Figure 6. Average number of leaked packets when using directional antennas (99% confidence interval), for Scenario 1 (upper) and Scenario 2 (lower).
Futureinternet 15 00204 g006
Figure 7. Average packet life time in seconds (99% confidence interval) when using omnidirectional antennas for all protocols except HDARP (HDARP uses directional antennas) for Scenario 1 (upper) and Scenario 2 (lower).
Figure 7. Average packet life time in seconds (99% confidence interval) when using omnidirectional antennas for all protocols except HDARP (HDARP uses directional antennas) for Scenario 1 (upper) and Scenario 2 (lower).
Futureinternet 15 00204 g007
Figure 8. Average number of packets sent over the radio interface (99% confidence interval) when using omnidirectional antennas for all protocols except HDARP (HDARP uses directional antennas) for Scenario 1 (upper) and Scenario 2 (lower).
Figure 8. Average number of packets sent over the radio interface (99% confidence interval) when using omnidirectional antennas for all protocols except HDARP (HDARP uses directional antennas) for Scenario 1 (upper) and Scenario 2 (lower).
Futureinternet 15 00204 g008
Figure 9. Average number of packets sent over the radio interface (99% confidence interval) when using omnidirectional antennas for all protocols except HDARP (HDARP uses directional antennas) for Scenario 1 (upper) and Scenario 2 (lower).
Figure 9. Average number of packets sent over the radio interface (99% confidence interval) when using omnidirectional antennas for all protocols except HDARP (HDARP uses directional antennas) for Scenario 1 (upper) and Scenario 2 (lower).
Futureinternet 15 00204 g009
Table 1. Simulation settings.
Table 1. Simulation settings.
ParameterSettingsHDARP SpecificDescription
ScenarioR4B4, BVR Pre-recorded flight path traces.
Simulation durationR4B4: 900 s, BVR: 1570 s As obtained from our aerospace industry partner.
MANET protocolsODV, BATMAN, DSDV, DSR-UU, HDARP, OLSR Simulated MANET protocols, as available from INETMANET.
Antenna typeisotropic, emulated directional Isotropic antennas are always used, but directional antenna emulation can be enabled via InterceptApp (see Section 4.1).
Tx range300 km Maximum antenna transmission range, where decoding is still possible.
Adjust TX power 1 True Adjust Tx power to destination range, as described in Section 3.4.
Link bitrate10 Mbps Effective bitrate for wireless interface.
ARP functionalityGlobal ARP Over-the-air interfaces do not use ARP (see Section 4).
UdpBasicApp
message length
intuniform (100, 1000) Discrete uniform distribution for UDP datagram size (in bytes).
UdpBasicApp
message interval
uniform (0.1, 0.2) Continuous uniform distribution for time between consecutive UDP datagram transmissions (in seconds).
SA range300 kmSA sensor range.
SA max age5 sTime before SA data received from peers is considered stale.
Forbidden link cost5000Penalty cost for links in forbidden sectors (used by Dijkstra’s algorithm, see Section 3.3).
SA update intervaluniform (3, 5)Continuous uniform distribution for time between consecutive SA update messages to peers (in seconds).
1 This is emulation provided by InterceptApp.
Table 2. Reduction of the number of leaked packets when going from omnidirectional antennas to directional antennas for each of the studied protocols for Scenario 1 (R4B4).
Table 2. Reduction of the number of leaked packets when going from omnidirectional antennas to directional antennas for each of the studied protocols for Scenario 1 (R4B4).
AODVBATMANDSDVDSR-UUOLSR
Omnidirectional antennas199,562211,454149,051137,781147,410
Directional antennas12561588782620762
Reduction ratio159133191222194
Table 3. Reduction of the number of leaked packets when going from omnidirectional antennas to directional antennas for each of the studied protocols for Scenario 2 (BVR).
Table 3. Reduction of the number of leaked packets when going from omnidirectional antennas to directional antennas for each of the studied protocols for Scenario 2 (BVR).
AODVBATMANDSDVDSR-UUOLSR
Omnidirectional antennas3,138,5532,524,6581,393,7521,311,3491,194,179
Directional antennas118695527211,953160
Reduction ratio2646264451431107464
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ilie, D.; Grahn, H.; Lundberg, L.; Westerhagen, A.; Granbom, B.; Höök, A. Avoiding Detection by Hostile Nodes in Airborne Tactical Networks. Future Internet 2023, 15, 204. https://doi.org/10.3390/fi15060204

AMA Style

Ilie D, Grahn H, Lundberg L, Westerhagen A, Granbom B, Höök A. Avoiding Detection by Hostile Nodes in Airborne Tactical Networks. Future Internet. 2023; 15(6):204. https://doi.org/10.3390/fi15060204

Chicago/Turabian Style

Ilie, Dragos, Håkan Grahn, Lars Lundberg, Alexander Westerhagen, Bo Granbom, and Anders Höök. 2023. "Avoiding Detection by Hostile Nodes in Airborne Tactical Networks" Future Internet 15, no. 6: 204. https://doi.org/10.3390/fi15060204

APA Style

Ilie, D., Grahn, H., Lundberg, L., Westerhagen, A., Granbom, B., & Höök, A. (2023). Avoiding Detection by Hostile Nodes in Airborne Tactical Networks. Future Internet, 15(6), 204. https://doi.org/10.3390/fi15060204

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop