Use of Live Virtual & Constructive (LVC) technology for large scale operational tests of net-centric systems
Operational Test Command, Fort Hood, TX, USADOI: 10.1109/MILCOM.2010.5680329 Conference: MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010
Source: IEEE Xplore
The Operational Test Command's BCNIS program will provide realistic situational awareness (SA) and command and control (C2) tactical environment to support operational testing, without the costs and constraints of deploying a large number of physical units in the field. In order to fulfill the requirements for large scale testing of emerging communication technology with the constraint of limited availability of physical radio units, BCNIS is looking to leverage the concept of Live, Virtual and Constructive (LVC) test environments. This central idea of LVC involves connecting units that exist in a constructive simulation model with live and virtual lab based units to form a “hybrid” large scale network, which now can be employed for the large scale operational tests of the communication technology. Along with `at operational scale' testing, LVC also allows configuration of `hard to setup and test' scenarios such as urban combat scenarios: the constructive domain can be employed to simulate the urban areas and complex network layout in which the constructive units operate, while the live domain setup can be compatible with the constraints of the physical environment of the test range. This paper describes the use hardware-in-the-loop (HWIL) capability to support the use of emulated JTRS radio models in a larger scale Operational Test of GMR radios. In addition to representing some portions of the Network Under Test (NUT), the LVC representations will also be used to represent a variety of battle command system simulations and network loading tools to create the appropriate voice, video (or imagery), and tactical message loads on networks.
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.
- [Show abstract] [Hide abstract]
ABSTRACT: Current simulations supporting the Net-Centric Test battlespace do not accurately represent the impact of cyber threats and information operations. When cyber threats are considered, they are typically limited to a small number of isolated physical devices. To further limit consideration, insufficient attention is paid to cyber attacks launched on the basis of passive threats like the eavesdroppers or the coordinated threats. Further, the test technologies are typically limited to incorporation of threats that can be realized physically, which limits both the scale and sophistication of representing such attacks; a Live-Virtual-Constructive (LVC) paradigm for modeling of threats is missing. Lastly, for threats such as jamming, wormhole attacks, large-scale Denial of Service attacks, use of physical threats is expensive, since specialized equipment and manpower is required to realize these threats. The net consequence of these deficiencies is to leave a major gap in the DoD test infrastructure with respect to our ability to realistically test the vulnerabilities and resiliency of Blue Force communication architectures to sophisticated cyber attacks, particularly in networks that include both current force & Future Force communication infrastructure. In this paper, we present StealthNet, a Live-Virtual-Constructive (LVC) framework that provides a real-time, hardware-in-the-loop capability for simulation of cyber threats to the entire net-centric infrastructure. It also provides the ability to evaluate the effectiveness of the threats in disrupting Blue Force communications via key performance indicators, i.e. bandwidth, reliability, delay and quality of service metrics. The StealthNet framework provides models for accurate cyber threat simulation at all layers of the networking stack to include passive, active, coordinated and adaptive attacks on networks with hundreds to thousands of wired and wireless components. The LVC technology can stimulate physical Networked-System Under Test (NSUT) with simulated cyber threats that span all the protocol stack layers for real-time testing. Additionally, the framework enables composability with existing Test and Evaluation (T&E) architecture and tools (TENA, SBE environments, etc) to facilitate transition to other T&E programs.01/2011; DOI:10.1109/MILCOM.2011.6127499