Combining information centric and software defined networking to support command and control agility in military mobile networks

Jorgito Matiuzzi Stocchero,Andre Dexheimer Carneiro,Iulisloi Zacarias,Edison Pignaton de Freitas
DOI: https://doi.org/10.1007/s12083-022-01443-z
IF: 3.488
2023-01-11
Peer-to-Peer Networking and Applications
Abstract:Current military operations demand flexibility and adaptability due to the lack of communication infrastructure and the need for timely assertive decisions. To answer these challenges, we need to construct an efficient information dissemination mechanism to heterogeneous actors in the Battlefield Network (BN), which provides flexible and adaptable communications services to the military. Command and Control (C2) systems must sustain network-centric operations and guarantee C2 agility in situations in which the dynamics of the operational scenario require new network paradigms to deal with autonomous equipment, such as Unmanned Aerial Vehicles (UAV) and Wireless Sensor Networks (WSN), along with troopers and decision makers that need the right information at the right time. These entities constitute the Internet of Battle Things (IoBT), where the monitoring ability of smart things produces valuable information to be processed by peer-to-peer C2 applications. To address these issues, this work proposes a combination of Software Defined Networks (SDN) with Information Centric Networks (ICN) to meet the high level C2 requirements within deployed military mobile ad hoc networks. ICN provides an efficient data distribution mechanism and SDN controls the patterns of interaction among the IoBT heterogeneous nodes, as well as acts as an enabler for ICN to be integrated with the rest of the IP military cloud. A proof of concept of the architecture was implemented and compared with IP only and SDN-IP networks. The experiments performed to evaluate the implemented solution provided results showing a significant improvement of end-to-end delay and network load of the proposed architecture compared to conventional approaches.
computer science, information systems,telecommunications
What problem does this paper attempt to address?