Analysis Report - Cognitive Radio Technologies

advertisement
Final Report
Deliverable #5
for
Army Total Asset Visibility Enhanced RFID Tracking
Contractor:
Millennium Integrated Services 2000
Address:
704 W. Nye Lane, Suite 201 Carson City, NV 89703
Contract Number:
[INSERT HERE]
Contract Amount:
Award Type:
FFP
TPOC:
U.S. Army RDECOM /ARL
Name:
Erik Syvrud
Contact info:
erik.syvrud@us.army.mil
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Executive Summary
This document is the final report for Army Total Asset Visibility Enhanced RFID Tracking.
Working with SOCOM (Erik Syvrud), Global has developed an application for the iPhone family
that interfaces with the Cursor on Target enabled systems. Currently our system (iCOTS)
implements a Rover capability where Blue Force Tracking, force protection and UAV feeds are
integrated onto a common smart phone (or tablet) as well as an image surveillance capability.
Plans are to port this native iOS implementation to Titanium1 to support all smart phone
platforms from a common code base and to enhance the map, chat, routing, and zeroize
capabilities in the coming months.
Conceptual Prototype
This Rover capability was preceded by the creation of a conceptual prototype of an ATAV
reader / system for tracking and managing assets in the field. The objectives of this effort were
to:
 Develop an intuitive system that
o Maintains asset visibility as assets move around the world
o Track who handled asset
o Show where the asset will be next
o Manage asset status
o Find asset on site
 Support integrated communications for anywhere connectivity and in-the field visibility
of asset location
 Maximize the use of COTS to reduce both recurring and engineering costs
 Be an extensible solution to incorporate later applications
 Support multiple servers / data formats with a common reader
As described in more detail in Section 2, a conceptual prototype of this design was implemented,
demonstrated, and video-recorded in December 2010.
1
http://www.appcelerator.com/products/
MIS/Global Defense Inc.
ii
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Alerts from RFIDs in area
Functional Prototype
To better serve SOCOM needs, the effort was redirected to create iCOTS. iCOTS is a universal
Cursor on Target (CoT) viewing and tasking application supported by a server that integrates and
distributes CoT information. CoT is used to provide real-time battlefield awareness of the
locations of personnel and assets (e.g., sensors and UAVs) and to support tasking of assets (e.g.,
requesting repositioning or aiming a camera) and can be broadly classified as providing
situational awareness. Hundreds of different devices provide data to a CoT network, and the goal
of iCoT is to integrate management / viewing of all of these (as limited by user access) into a
single application on a smart phone or tablet.
The iCoT software will be deployed on devices owned or distributed by the military either as
part of a toolkit included in initial distribution or downloaded on demand from a government or
MIS-2000 hosted application market-place. The server providing the iCoT feeds can either be an
existing US government COT server or a modified server developed by MIS-2000 to segment
feeds and manage downloads. The resulting integrated environment for viewing this information
on smart phones (beginning with the iPhone) and sending tasking requests to devices in the
network (tasking is in Phase II) has the following benefits.
 Significantly reduce cost to allow for radios given to foreign friendlies or supporting
responders in a disaster response to be treated as “disposable”
 Enhance spectrum access and improved spectrum management capabilities to allow the
solution to be deployed in a wide variety of locations with minimal manual intervention
 Achieve a minimal level of operation without infrastructure while identifying and
exploiting communications resources when available.
 Achieve significant operating range
 Be rapidly deployable and suitable for tactical urban environments
 LPI / LPD (Low Probability of Detection)
MIS/Global Defense Inc.
iii
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report



Improved interoperability among heterogeneous communications assets
Easy to use, intuitive interface that untrained, unsophisticated users can immediately
begin to use
Ability to disseminate text and limited image information and support for voice
communications
As described in more detail in Section 3, this prototype was implemented and demonstrated and
tested at the Camp Roberts TNT experiments in May 2011.
Picture of an iPod, iPhone, and iPad receiving Cursor on Target information at Camp
Roberts TNT experiments in May 2011 with an intermediate server hosted on the laptop
Nanotechnology
In parallel, a study was conducted into how nanotechnology could improve the performance and
reduce the costs and SWAP of wireless sensor systems. The study examined current trends,
impact on RF components and antennas, packaging, and sensor performance. The study also
examined ways to extend battery life and technologies suitable for energy scavenging. This is
discussed in more detail in Section 4.
Future Directions
In the immediate future, we plan on returning to Camp Roberts for further testing and user
interaction on the ICOTS application at the beginning of August, 2011.
In light of a likely later need to support deployment onto the GD300 and RATS, we have begun
initial discussions with General Dynamics and Raytheon. In particular we recently submitted a
SBIR proposal to the Army where MIS/Global Defense will team with Raytheon to extend the
design of ICOTS where there are plans to for a capability for interfacing with DCGS and lay the
foundation for creating an extensible API for “plugging-in” interfaces and data fusion from
additional ISR / SA standards and custom sensors and UAVs. All software will be ported to
Titanium to support additional smart phone platforms and we will continue to mature the security
and peer-to-peer communications technologies and tactical network interfaces. In parallel to that
effort, the COT interface would be matured, a SAHANA interface created, and various features
related to enhancing situational awareness (supporting additional video feeds, telestration, after
action reporting) and core services would be developed and integrated. This is discussed in more
detail in Section 5.
MIS/Global Defense Inc.
iv
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
MIS/Global Defense Inc.
v
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Table of Contents
Executive Summary ........................................................................................................................ ii
List of Tables ................................................................................................................................. ix
Acronyms ....................................................................................................................................... ix
1
Introduction ............................................................................................................................. 1
1.1.1
Smart Phones ............................................................................................................ 1
1.2 Programmatics .................................................................................................................. 2
1.3 Shift in Project Direction.................................................Error! Bookmark not defined.
1.4 Document Organization ................................................................................................... 3
2
Conceptual Prototype (ATAV System) .................................................................................. 4
2.1 Army Total Asset Visibility Program and Project Scope ................................................ 4
2.2 Solution Concept .............................................................................................................. 5
2.3 Conceptual Prototype Design ........................................................................................... 6
2.4 Initially Envisioned Functional Prototype ....................................................................... 7
2.5 Summary of Conceptual Prototype Demonstration ......................................................... 8
2.5.1
User Log-In ............................................................................................................... 8
2.5.2
Main View ................................................................................................................ 9
2.5.3
Alert View ................................................................................................................. 9
2.5.4
Asset View .............................................................................................................. 10
3
Functional Prototype ............................................................................................................. 12
3.1 Cursor on Target............................................................................................................. 12
3.1.1
System Objectives ................................................................................................... 13
3.1.2
System Design ........................................................................................................ 14
3.2 Design for May Camp Roberts Demonstration .............................................................. 18
3.2.1
iCoT OVerview ....................................................................................................... 18
3.2.2
General Requirements ............................................................................................. 19
3.2.3
General Capabilities ................................................................................................ 20
3.2.4
Views ...................................................................................................................... 21
3.3 Results from May Camp Roberts Test and Demonstration............................................ 24
3.3.1
Test Results ............................................................................................................. 25
3.3.2
User Feedback ......................................................................................................... 27
3.4 Summary of Major Updates for August Camp Roberts Test and Demonstration ......... 31
3.5 Functional Prototype References ................................................................................... 32
4
Summary of Study into Reducing SWAP for Asset Management RFIDs ............................ 33
4.1 Summary of SWAP Study Findings............................................................................... 33
4.1.1
Processor Trends and projections ........................................................................... 33
4.1.2
System on Chip, mixed signals, and RFICs ............................................................ 33
4.1.3
Antenna Miniaturization ......................................................................................... 35
4.1.4
Packaging ................................................................................................................ 35
4.1.5
Energy Scavenging ................................................................................................. 36
4.1.6
Nanotechnologies for Sensors................................................................................. 37
4.1.7
General System SWAP Considerations .................................................................. 38
4.2 Recommendations from SWAP Study ........................................................................... 38
MIS/Global Defense Inc.
vi
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
4.3
5
References from Miniaturization / SWAP study............................................................ 40
Future Plans for Situational Awareness Application ............................................................ 44
5.1 Position Within the Smart Phone and Situational Awareness Ecosystem ..................... 44
5.1.1
Other DoD Situational Awareness systems beyond COT and DCGS .................... 44
5.1.2
Programs ................................................................................................................. 44
5.1.3
Devices .................................................................................................................... 45
5.1.4
App Stores ............................................................................................................... 45
5.2 Collaboration Discussions .............................................................................................. 46
5.3 Development Roadmap .................................................................................................. 46
Appendix A Conceptual Prototype Design Document ............................................................ 49
A.1 OVERVIEW................................................................................................................... 49
A.2 USER INTERFACES / VIEWS ..................................................................................... 49
A.2.1 Main TabBar View ................................................................................................. 49
A.2.2 User Authentication ................................................................................................ 49
A.2.3 Connectivity View .................................................................................................. 50
A.2.4 Map View................................................................................................................ 51
A.2.5 History/log view...................................................................................................... 52
A.2.6 Asset management view ......................................................................................... 53
A.2.7 Add new asset view ................................................................................................ 54
A.2.8 Alert Views ............................................................................................................. 55
A.2.9 Asset Detail ............................................................................................................. 56
A.2.10
Asset List View ................................................................................................... 57
A.2.11
Web View ............................................................................................................ 58
A.3 DATA INTERFACES.................................................................................................... 59
A.3.1 MySQL server database .......................................................................................... 59
A.3.2 SQLlite interface ..................................................................................................... 61
A.3.3 RFID network API – ............................................................................................... 61
A.4 ATAV Location Detector ............................................................................................... 62
A.4.1 Supported APIs ....................................................................................................... 62
A.5 Database ......................................................................................................................... 63
MIS/Global Defense Inc.
vii
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
List of Figures
Figure
Page
Figure 1: Smartphone usage is exploding and will surpass PC sales this year. Left from RBC
Capital Markets. Right from
ftp://ftp.3gpp.org/workshop/2010_04_Rio_LTEseminar/Marketplace_update.pdf............... 1
Figure 2: Schedule of Activities for the ATAV project. ................................................................. 3
Figure 3: Original Envisioned Deployment Scenario ..................................................................... 2
Figure 4: Screen Captures from Recorded December Demonstration of Conceptual Prototype of
ATAV system. ...............................................................................Error! Bookmark not defined.
Figure 5: ATAV is an effort to provide visibility and information flow across many different
systems with many different user groups throughout the life cycle of tracked components. ......... 4
Figure 6: In the deployment scenario, Zigbee-based wireless sensors would interface provide a
local area network connected to long-haul wireless links (Tier 1) to provide remote and in-thefield monitoring. This would be supplemented with augmented smart phones for directly
interfacing with the ZigBee sensors. ............................................................................................... 5
Figure 7: Principle Components and Modules in Envisioned Design ............................................ 6
Figure 8: Major components and features of the Conceptual Prototype Design ............................ 7
Figure 9: Initial Functional Prototype Design ................................................................................ 8
Figure 10: Picture of User Log-In Screen ....................................................................................... 8
Figure 11: Conceptual and Implemented versions of the Main ATAV View on the Reader ......... 9
Figure 12: Conceptual and Implemented versions of the Alerts Viewed on the Reader .............. 10
Figure 13: Conceptual and Implemented versions of the View for Individual Assets on the
Reader ........................................................................................................................................... 11
Figure 14: FalconView: One of the more popular viewers for Situational Awareness Data
[Konstantopoulos_06] ................................................................................................................... 12
Figure 15: CoT XML Schema Base Schema [Kristan_09]. ......................................................... 15
Figure 16: Example type hierarchies [Kristan_09] ....................................................................... 16
Figure 17: Example subschema. From [Kristan_09] .................................................................... 17
Figure 18: Example Cot message reporting a hostile fixed wing air craft at the latitude and
longitude specified, but only valid at the time of reporting. From [Kristan_09]. ......................... 18
Figure 19: Picture of an iPod, iPhone, and iPad receiving Cursor on Target information at Camp
Roberts TNT experiments in May 2011 with an intermediate server hosted on the laptop. ........ 24
Figure 20: Connection between CMOS technology, digital performance, and RF performance.
From [Jiménez_05] ....................................................................................................................... 33
Figure 21: Scaling factor relationships ( is the same as S from the digital scaling discussion).
From [Vittoz_90] .......................................................................................................................... 34
Figure 22: Expected trends for mixed circuit chips in area and cost by fabrication technology.
From [Jiménez_05] ....................................................................................................................... 34
Figure 23: Expected relative performance levels following ITRS projections for LNAs, VCOs,
Pas, and ADCs. From [Jiménez_05]. ............................................................................................ 35
Figure 24: Example Packaging solutions. From [Pack_09].......................................................... 36
Figure 25: Energy Densities for Commonly Available Energy Scavenging Sources .................. 37
Figure 26: Typical Power Profile of a low-power Wireless Sensor. From [TI_LPRF] ................ 38
Figure 27: Battery Life: Energy Density over time for various battery technologies. From
[Xue_07] ....................................................................................................................................... 39
MIS/Global Defense Inc.
viii
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Figure 28: Screen Capture from pre-release version of the Army App Store: Army Marketplace
(http://www.wired.com/dangerroom/2011/04/armys-app-store-for-war/) ................................... 46
Figure 29: ICOT Roadmap assuming funding via this SBIR. ...................................................... 47
Figure 30: View of iNode integration ........................................................................................... 48
List of Tables
Table
Page
Table 1: ATAV Enhanced RFID Tracking Milestones .................................................................. 3
Acronyms
3GPP
3GPP2
ADTB-T
ANDVT
ANSI
AOR
API
ARQ
ATSC
AWGN
BLOS
BPSK
CogNeA
COTS
CP
CR
C-SDR
C-SDRTS
CTS
DFS
DHS
DMB-T
DoD
DoDISS
DSA
DTV
DVB-T2
EDGE
EDR
EFT
EIRP
EOC
EVDO
FCC
3rd Generation Partnership Project
3rd Generation Partnership Project 2
Advanced Digital Television Broadcast-Terrestrial
Advanced Narrowband Digital Voice Terminal
American National Standards Institute
Area of Responsibility
Application Programming Interface
Automatic Repeat reQuest
Advanced Television Systems Committee
Additive White Gaussian Noise
Beyond Line of Site
Binary Phase Shift Keying
Cognitive Networking Alliance
Commercial Off The Shelf
Cyclic Prefix
Cognitive Radio
Cognitive-Software Defined Radio
C-SDR Transmission System
Clear to Send
Dynamic Frequency Selection
Department of Homeland Security
Digital Multimedia Broadcast Terrestrial
Department of Defense
Department of Defense Index of Specifications and Standards
Dynamic Spectrum Access
Digital TV
Digital Video Broadcasting—Terrestrial2
Enhanced Data rates for GSM Evolution
Enhanced Data Rate (an option mode for Bluetooth)
Enhanced File Transfer
Equivalent isotropically radiated power
Emergency Operations Center
Evolution Data Optimized
Federal Communications Commission
MIS/Global Defense Inc.
ix
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
FEMA
FFT
FID
FHA
FIPS
FM
GIG
GPS
GMR
GSM
HAIPE
HF
HN
HSDPA
HSPA
IEEE
IP
IPC
ISDB-T
ISM
ITU-R
LOS
LPI
LRI
LTE
MBITR
NIST
NLOS
OFDM
OFDMA
OSPF
PC
PD
PFA+
PN
QAM
QPSK
RSSI
RTS
SDR
SNMP
SNR
SSH
STANAG
SWAP
TCP
Federal Emergency Management Agency
Fast Fourier Transform
Foreign Internal Defense
Foreign Humanitarian Assistance
Federal Information Processing Standard
Frequency Modulation
Global Information Grid
Global Positioning System
Ground Mobile Radio
Global System for Mobile communications
High Assurance Internet Protocol Encryptor
High Frequency
Host Nation
High Speed Downlink Packet Access
High Speed Packet Access
Institute of Electrical and Electronic Engineers
Internet Protocol
Inter-Process Communication
Integrated Services Digital Broadcasting-Terrestrial
Industrial, Scientific, Medical
International Telecommunications Union- Radio
Line-of-Sight
Low Probability of Intercept
Limited Range Intercept
Long Term Evolution
Multiband Inter/Intra Team Radio
National Institute of Standards and Technology
Non-Line of Sight
Orthogonal Frequency Division Multiplexing
Orthogonal Frequency Division Multiple Access
Open Shortest Path First
Personal Computer
Probability of Detection
Probability of False Alarm
Pseudo-Noise
Quadrature Amplitude Modulation
Quadrature Phase Shift Keying
Received Signal Strength Indicator
Request to Send
Software Defined Radio
Simple Network Management Protocol
Signal-to-Noise Ratio
Secure Shell
Standardization Agreement
Size Weight And Power
Transmission Control Protocol
MIS/Global Defense Inc.
x
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
TV
TVWS
UAV
UDP
UHF
UMTS
U.S.
USB
VHF
VSB
WLAN
WWAN
WNW
Television
TV White Space (spectrum allocated, but unassigned, for TV broadcast)
Unmanned Aerial Vehicle
User Datagram Protocol
Ultra High Frequency (300 MHz - 3 GHz)
Universal Mobile Telecommunications System
United States
Universal Serial Bus
Very High Frequency (30 MHz – 300 MHz)
Vestigal Side Band
Wireless Local Area network (e.g., WiFi)
Wireless Wide Area Network (e.g., cellular)
Wideband Networking Waveform
MIS/Global Defense Inc.
xi
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
1 Introduction
1.1.1 Smart Phones
As noted at (http://www.defenseindustrydaily.com/military-smartphones-dod-apps-06512/ ):
The US Army soldier is burdened with C4ISR technology. The soldier uses a handheld radio to
talk to other soldiers and commanders, Blue Force Tracker to track friendly and enemy forces, a
portable GPS receiver to determine location, a ROVER system to receive UAV video feeds, and,
if he or she is lucky enough, an Afghan interpreter to communicate with the locals.
But if all of these devices could be integrated on a single device, the burden could be greatly
reduced. At the same time, smartphone use has exploded, with recent year-over-year growth up
to 67% (http://www.fiercemobilecontent.com/press-releases/global-smart-phone-market-growthrises-67) and rapid increases in the number of app stores (growing from 9 to 38 in 2009 alone),
with over 3 billion apps downloaded daily from iTunes and over 100,000 Android based phones
activated every day (http://gigaom.com/2010/05/24/android-vs-chrome-os/).
Figure 1: Smartphone usage is exploding and will surpass PC sales this year. Left from RBC Capital Markets. Right
from ftp://ftp.3gpp.org/workshop/2010_04_Rio_LTEseminar/Marketplace_update.pdf
Conceptually, because smartphones are effectively pocket computers with high data rate
communications and intuitive interfaces and significant development tools, smartphones appear
to be an attractive platform for creating the universal C4ISR device to lessen the burden on the
warfighter. Further, because smartphones are mass market commercial products, a smartphone
would be a relatively low-cost solution to the problem. With this reduced cost, it is easily
conceivable that every soldier could be equipped with a smart phone. Then by using the existing
sensing and surveillance capabilities on smartphones, would lead to the much discussed concept
of “every soldier a sensor” whereby real-time information could be gathered across the network,
synthesized and distributed across the battlefield to significantly enhance situational awareness.
To quote Mark Bigham2:
“Some of the best data about what is going on is at the individual soldier level, so what we want
to do is make sure that data gets back into the bigger systems like the DCGS [ISR network] so
they can have the benefit of what the soldier is seeing…The soldier needs to understand what is
going on at the individual level. Who are the key people in the village, who are the decision
2
http://www.defenseindustrydaily.com/military-smartphones-dod-apps-06512/
MIS/Global Defense Inc.
1
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
makers…So every time a squad goes through that village, they don’t have to learn from scratch
who the good guys are, who the bad guys are, and who the people in the middle are.”
With the military beginning to make significant investments in bringing smartphones to the
battlefield (e.g., Army App Challenge, DARPA’s Transformative Apps), CSDA, and MACE,
what remains to be done is to develop an application that improves the situational awareness of
the dismounted warfighter. This edge enabled systems will provide dismounted warfighters with
access to ISR sensors, data products, and common operational pictures via mobile applications
designed for use on hand held devices. In keeping with the edge enabled design principles, the
systems must be customizable, support non-centralized resources, and provide for continuous
evolution. The candidate design must address issues related to security and information
assurance while emphasizing the use of commercially available software and mobile devices
1.2 Project Scope
This project began with a focus on developing an integrated smart-phone based system for
managing assets tracked by a system of wireless sensors and RFIDs with smartphone readers, HF
links for long-distance links and ZigBee for interfacing and networking with sensors.
Figure 2: Original Envisioned Deployment Scenario
After delivering the conceptual prototype in December, to better serve the needs of SOCOM, the
ATAV effort was refocused on providing a situational awareness capability on smart phones
using information from the Cursor on Target network. As part of that change in plans, the
hardware miniaturization report was moved up in schedule and expanded to also serve as a
planning document for the effort to integrate with the Cursor on Target network, which we call
iCoT. Demonstrations of and experiments with iCOTS occurred in May at Camp Roberts with
initial testing in Tampa in April.
1.3 Programmatics
The original schedule for this project and associated milestones are shown below.
MIS/Global Defense Inc.
2
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Figure 3: Schedule of Activities for the ATAV project.
Table 1: ATAV Enhanced RFID Tracking Milestones
Milestone
1. Kickoff
2. Conceptual Prototype
3. Functional Prototype
4. Hardware Miniaturization Report
5. Final Report
Date at Kickoff
July 1, 2010
Dec 6, 2010
April 7, 2011
May 21, 2011
July 8, 2011
Actual or Planned
July 1, 2010
Dec 6, 2010
May 7, 2011
March 14, 2011
July 8, 2011
The only changes from this original plan were the change in scope of the functional prototype to
support Cursor on Target instead of ATAV, and moving functional prototype demonstration
back to May to leverage the TNT experiments at Camp Roberts.
1.4 Document Organization
The remainder of this document is organized as follows.
 Section 2 reviews the work performed creating the initial ATAV Conceptual Prototype
 Section 3 presents the design, demonstration, and results from the Functional Prototype
of the Cursor on Target Situational Awareness Application
 Section 4 summarizes the results of the HW Miniaturization study
 Section 5 discusses future plans for the situational awareness application.
MIS/Global Defense Inc.
3
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
2 Conceptual Prototype (ATAV System)
The project began with a focus on creating a series of two smart-phone enabled prototypes for
supporting the Army Total Asset Visibility program. After delivering the first of these prototypes
(the Conceptual Prototype), to better serve the needs of SOCOM, the ATAV effort was
refocused on providing a situational awareness capability on smart phones using information
from the Cursor on Target network.
Because of the shift in focus away from an ATAV solution, this section is somewhat abbreviated
in its coverage of the design, though the design document for the Conceptual Prototype is
included in Appendix A for the interested reader.
2.1 Army Total Asset Visibility Program and Project Scope
The Army Total Asset Visibility (ATAV) program is developing solution to providing awareness
of asset location and status throughout the asset’s life cycle, especially tracking this when
moved. This is made more complicated due to variation in available communications networks
and systems needed to communicate information about the asset.
Figure 4: ATAV is an effort to provide visibility and information flow across many different systems with
many different user groups throughout the life cycle of tracked components.
The intention was not to create a complete ATAV solution, but rather a combination of smartphone based readers and ZigBee-based sensors that would interface with the ATAV
infrastructure. The ZigBee-based sensors would provide a low-cost COTS-based way of tracking
the location and fetching information about individual assets.
MIS/Global Defense Inc.
4
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
2.2 Solution Concept
In the deployment scenario, Zigbee-based wireless sensors would interface provide a local area
network connected to long-haul wireless links (Tier 1) to provide remote and in-the-field
monitoring. This would be supplemented with augmented smart phones for directly interfacing
with the ZigBee sensors.
Data Server
HF Long Distance Data Link
HF Long Distance
Data Link
Zigbee dense mesh provides:
Pallet
• Relative location of pallets
• Low power consumption
• Cheap
Mobile assets
Tier 1 provides:
• Absolute location (GPS)
• Long distance connectivity
• Data connection when available
Zigbee
Tier1 Radio
Wireless Link
Figure 5: In the deployment scenario, Zigbee-based wireless sensors would interface provide a local area
network connected to long-haul wireless links (Tier 1) to provide remote and in-the-field monitoring. This
would be supplemented with augmented smart phones for directly interfacing with the ZigBee sensors.
For in-the-field tracking, smart phones would be augmented with hardware for directly
interrogating wireless sensors and then leverage existing connectivity to synchronize data with
data storage and provide feedback to remote monitoring stations.
This shows the primary system components for the final design – a server, an asset reader, an
RFID for the asset, and a Tier 1 device. The Tier 1 device is intended to provide long-distance
backhaul communications when civilian networks, such as cellular and WiFi, are not available.
Currently the Tier 1 backhaul communications is envisioned as being performed over an HF
communications link, but could also be performed over existing networks such as via WAVE
RELAY nodes.
MIS/Global Defense Inc.
5
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
IP
Backbone
RFID Server
Config
Discovery
WWAN / WLAN
Asset Reader
(iPhone)
Our App
MapKit
Tier 1
Voice / Video /
Picture
IP
Gateway
Zigbee
GameKit APIs
Secondary
Network Layer
Asset RFID
Asset App
Our Layer (HW)
HF
HF
Zigbee
Zigbee
Figure 6: Principle Components and Modules in Envisioned Design
By implementing the asset reader on an iPhone, we are able to leverage Apple’s significant
investment into developing capabilities to
 communicate over cellular, WiFi, and Bluetooth networks
 Take and manage photos and record video and voice
 Make use of an intuitive user touch-screen interface
 Provide GPS-enabled device location and to manage information displayed on maps
Further, because of the open interfaces provided by Apple, we will be able to rapidly extend our
design to incorporate new capabilities as needed by evolving user needs.
Another key component is the RFID which will be implemented using ZigBee wireless sensor
networks. By adding custom application software, we will be able to continuously monitor the
health of assets in the field. To communicate with the asset, we place the custom hardware
behind existing APIs for Bluetooth communications so that later applications can be easily
integrated with the custom wireless hardware. In addition to supporting ZigBee communications,
we also plan to support HF communications for when long data needs to be transmitted over long
distances and no other infrastructure is available. However, when no connection is possible, the
Reader stores information locally until it comes back in contact with the network so that data can
be synchronized with the server.
2.3 Conceptual Prototype Design
To enable early feedback in the development process, a partial prototype was designed and
implemented – the so-called conceptual prototype. This conceptual prototype can track asset
locations, detect and report movement, and store and manage asset information as well as other
capabilities we will highlight later in this presentation.
MIS/Global Defense Inc.
6
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Many of the key features of the design This prototype has a functional server accessible over the
Internet that maintains a limited set of information about assets and a functional asset reader
implemented on an iPhone. But to reduce time to getting to something demonstratable, the asset
RFID was not the ZigBee-based sensors and was instead a mockup on another iPhone using the
limited sensors already available on the iPhone and communicating via the iPhone’s built-in
Bluetooth communications link. Also the Tier 1 HF backhaul link was not planned as part of this
prototype.
This was implemented and demonstrated in December 2010.
IP
Backbone
Config
Discovery
WWAN / WLAN
Asset Reader
(iPhone)
Our App
Our App
GameKit APIs
Built-in
Bluetooth
GameKit APIs
Built-in
Bluetooth
MapKit
Voice / Video /
Picture
Asset RFID
Mockup
Figure 7: Major components and features of the Conceptual Prototype Design
2.4 Initially Envisioned Functional Prototype
In the Spring, the intention was to replace the mocked-up RFID with ZigBee wireless sensors, to
add a ZigBee-iPhone HW interface, to further refine the server and application as needed, and to
address feedback from the Conceptual Prototype demonstrations. However, this was dropped
with the change in direction to focus on Cursor on Target applications.
MIS/Global Defense Inc.
7
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
IP
Backbone
Config
Discovery
WWAN / WLAN
Asset Reader
(iPhone)
Our App
MapKit
Voice / Video /
Picture
GameKit APIs
Custom Zigbee
Sublayer
Figure 8: Initial Functional Prototype Design
2.5 Summary of Conceptual Prototype Demonstration
A demonstration of the conceptual prototype was video-recorded with slide supplements for
context on the displays. The following summarizes the material in the recorded demonstration.
2.5.1 User Log-In
When a user first starts the new application, he is presented with a user login screen that requires
he input his credentials. Based on his credentials, the reader will grant the user different levels of
access. This controls access to reader, with the intention that different levels of access would be
given to different user classes.
Figure 9: Picture of User Log-In Screen
MIS/Global Defense Inc.
8
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
2.5.2 Main View
After successfully logging in to the reader, the user is taken to the main view. From here, the user
has five primary options on the bottom menu bar.
 He can update the configuration of the reader, e.g., to disable certain wireless networks or
to log out.
 He can view the location of assets and their movement history on a map.
 He can manage assets not immediately accessible and search for assets based on key
words and other identifiers.
 He can directly interface and manage assets within his communication range over the
RFID link.
 He can manage alerts or warnings generated by assets.
The bottom menu bar is dynamic and will highlight the RFID and Alert fields when they are
present and indicate the number of RFIDs within range as well as the number of alerts that need
his immediate attention.
Finally, the built-in capability of the iPhone allows the user to monitor his connection to the
backhaul network.
Wireless
Network
Availability
Manage user
login, wireless
connections
View location of assets
Movement history
(Default view)
Local asset
management
Asset warnings
that need
immediate
user attention
Figure 10: Conceptual and Implemented versions of the Main ATAV View on the Reader
The Map on the Main View also allows viewing of own location and desired asset with the list of
assets chosen from
 Search results
 RFIDs in the area
 View movement history of single device
2.5.3 Alert View
The system continually monitors the health of the assets and issue alerts when immediate
attention is needed. The sensors and conditions to generate these alerts will be configurable on an
asset-by-asset basis. For the purpose of the conceptual prototype, alerts were limited to the
MIS/Global Defense Inc.
9
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
sensors available on the iPhone, which report shaking, tilt, and position. The Functional
Prototype intended to implement a fuller complement of sensors.
Alerts are indicated by badges (numbered red circle) on the bottom bar while a similar list of
assets within immediate communication range and indicated by the badge on the RFID icon.
Alerts from RFIDs in area
Figure 11: Conceptual and Implemented versions of the Alerts Viewed on the Reader
2.5.4 Asset View
After fetching the relevant information from the server, each asset’s data can be viewed
individually. Note that in the conceptual prototype demonstration, we only dummied-up data.
When viewing an individual asset, the user has several options including updating the status of
the asset which allows the user to add comments about the status of the asset, to manually take a
new photo if the asset has been damaged, or to pull up help about the asset. Because of the
extensive amount of information that may be associated with each asset, the information list for
each asset is scrollable. This information would eventually being processed on the server to
detect anomalies and to further automate many asset management features.
MIS/Global Defense Inc.
10
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Figure 12: Conceptual and Implemented versions of the View for Individual Assets on the Reader
Online help and Maintenance information
Demonstrating the extensibility of the solution, we leveraged the existing network and browser
support on the iPhone to allow users to pull up online information about assets. While the
demonstration only showed a dummy webpage for proof-of-concept, this could be readily
applied to a maintenance program or just to provide users critical information in the field about
their equipment.
Edit Interface
To complete the reader design for asset management, the individual asset view also allows the
user to update information about the asset. This includes writing descriptions or taking photos (to
document status or damage). Each of which would be (in the Functional Prototype) location and
time-stamped.
MIS/Global Defense Inc.
11
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
3 Functional Prototype
After delivering the conceptual prototype in December, to better serve the needs of SOCOM, the
ATAV effort was refocused on providing a situational awareness capability on smart phones
using information from the Cursor on Target network. Also note that in addition to a
demonstration of iCOT in Tampa in April, experiments on the iCOT were conducted at Camp
Roberts in May with additional development experiments to be performed in August. The results
of and feedback from the May experiments are included in Section 3.3.
3.1 Cursor on Target
Cursor on Target (Cursor on Target) is a DoD XML-based standard electronic portable data
format to define location based data and to coordinate operation of equipment and personnel.
Developed by Mitre in 2002 in support of the U.S. Air Force Electronic Systems Center (ESC),
Mitre first demonstrated COT “during a combined joint task force exercise in 2003, during which
a Predator unmanned aircraft was able to operate (and) coordinate with manned aircraft.”
[Ucore_11] It has since grown to being used in more than 50 other CoT prototypes [Bryne_04]
and is implemented by more than 70 nations. [Neuman_06]
Figure 13: FalconView: One of the more popular viewers for Situational Awareness Data
[Konstantopoulos_06]
CoT is commonly used for situational awareness, command and control, image processing,
automated multi-asset management, airspace deconfliction, and weather information distribution
[Robbins_07], to report and distribute sensor and UAV information, and to send tasking requests
to individual or groups of objects in the CoT network (e.g., reposition a UAV or request new
imagery from a camera). It provides a common context within which disparate user groups and
situational awareness systems can communicate. Other uses include:
 “overlaying special ops targets, Army blue force positions, (Air Force) air situational
awareness, and the joint Common Operating Picture all onto one display” [Schaeffer_05]
 “a MITRE team fused target information from a laser range finder, a compass, and a GPS
receiver and then sent the data to an intelligence system to be refined for high-precision
resolution. From there the data was relayed over a Link 16 radio to an F15E jet fighter to
be automatically downloaded to onboard precision-guided munitions.” [Byrne_04]
MIS/Global Defense Inc.
12
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
It accomplishes this via a common protocol and conventions that build on commonly available
tools.
We studied CoT in this effort and report on it in this section because of CoT’s success in
facilitating communication between distinct user groups, its support for machine-to-machine
communications and automated operation, and the way that it exploits shared context to reduce
bandwidth usage.
3.1.1 System Objectives
A long-standing problem with military communications is voice communications over noisy
channels can lead to mis-interpretation and long transmission times, which can degrade mission
effectiveness. Along with other solutions such as the phonetic alphabet (e.g., Alpha, Bravo,
Charlie), Cursor on Target tries to solve this via a protocol appropriate for M2M
communications over lossy channels as emphasized in the following popular origin story for
CoT. [Schaeffer_05]
“In April 2002 at the C2ISR Summit, Gen John Jumper (Chief of Staff for the Air Force)
gave an impassioned plea to find ways to horizontally integrate machines directly talking to
other machines to eliminate time-consuming and error-prone human translations. His
“Sergeant Matt” story described a special ops warrior riding a donkey, laser designating
targets using a handful of non-integrated machines, and manually performing calculations
that ended with long voice transmissions over noisy radios3, epitomizing the current state of
warfare. What Jumper envisioned was machine-to-machine (M2M) automation that would
achieve his vision that “the sum of all wisdom is a cursor over the target.”
While equating CoT to “the sum of all wisdom” is a bit of hyperbole, CoT does distill vast
amounts of data into actionable and easily understood information (within its context) . This then
allows [Byrne_04]
“battle commanders to be able to mouse over an aerial view of enemy positions, point, click a
cursor, and watch as the target is eliminated. Cursor on Target provides real-time access to
secure and reliable information.”
CoT critically provides and conveys context so that the aforementioned battle commanders know
if they are eliminating an enemy target or protecting a friendly unit.
Rather than trying to address all possible types of communication, CoT focuses on a particular
set of commonly needed information that addresses the following three questions about objects
and events on the battlefield. [Konstantopoulos_06]]
 What is it? Is it a friend or foe? Is it a tank, a UAV, a sensor or an anticipated event (e.g.,
weather front)?
 Where is it? What is its location for targeting and for coordinating movements? What is
the uncertainty in the location?
3
“Noisy radios” is
MIS/Global Defense Inc.
13
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report

When is it? For what period of time is this information valid or when will it be valid (e.g.,
for coordinating movements)?
The communication of this information is constrained to be reliably conveyed with minimal
bandwidth to allow operation over as many different networks as possible.
3.1.2 System Design
CoT achieves its objectives via a terse XML-schema and various messaging conventions.
Because of its design, only a few thousand lines of code are required to implement [Neuman_06]
3.1.2.1 Architecture
Broadly, a COT system is implemented over a network that connects a server with multiple edge
devices (clients) through intermediate routers. The edge devices may be pure consumers of
information provided by the server, may be producers of information, or both. Both information
and requests (and replies) flow over the network, via TCP/IP messages. COT supports both push
and pull methods due to relative benefits of both approaches [Konstantopoulos_06]
Theoretically speaking, push models are more adapted to transmitting Battlespace awareness/
Common Operating Pictures (COP) information, since the server retains the knowledge of
when important data has changed in order to initiate a new transmission with clients.
…
In practice, clients are the final authority on which data is important (to them), and thus it is
ultimately better to leave it up to the clients to initiate a pull for new data rather than having
the server force-feeding them data that may be fresh but of marginal consequence. Moreover,
clients may fuse data from multiple servers, and fusing is easier when the client is in control
of data refresh activity.
3.1.2.2 CoT XML Schema
The base XML schema for CoT is shown in Figure 14. XML has the following advantages as an
implementation language: wide availability of commercially available tools for processing XML,
extensibility, and capability to be both machine and human readable. This means that all
information is natively sent as a sequence of strings, which is less efficient but does aid in human
readability and extensibility to additional platforms.
MIS/Global Defense Inc.
14
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Figure 14: CoT XML Schema Base Schema [Kristan_09].
There are three primary elements in a CoT message – Event, Point, and Detail.
3.1.2.2.1 Event
The Event element answers two of the three questions: What and When. What is addressed by
the type field, which is a hierarchical descriptor that can provide a detailed description of what is
being reported in this message, e.g., what type of tank is seen, what domain is it operating in and
its affiliation. This has been described as “Organized much like an object hierarchy used in
object-oriented programming.” [Konstantopoulos_06]
The type field is a hierarchical classification of the object of the message with symbols
drawn from a shared dictionary. A partial breakdown of the hierarchy is shown in Figure
15 for messages about “atoms” (physical things), which are successively classified by
MIS/Global Defense Inc.
15
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
affiliation (e.g., friend-or-foe), domain (land, sea, or air), and then more detailed classifiers.
For example, a tank might be described in the hierarchy as thing (atom) -> Friendly
(affiliation)- > Ground (domain) ->tank -> what type of tank-> … These classifications
follow the MIL-STD-25254 as much as possible, though COT specific classifications are also
sometimes necessary. To differentiate between what is a COT specific classification and a
2525 code, labels from 2525 are written in upper case, while labels from COT are in lower
case. [Konstantopoulos_06]
Figure 15: Example type hierarchies [Kristan_09]
The use of a hierarchical type field has the following implications.
1) Only a handful of classifications are possible at each level of the hierarchy, which means
that a single letter can be used to convey the relevant information at each level, which
reduces bandwidth usage.
2) Less capable devices or users only interested in information defined at higher levels need
only parse a part of the type description.
3) The information assumed to be the most relevant to the most users is placed first to
hasten processing.
The Event field also answers the When question, specifically addressing the start time at which
the information is valid and the stale time at which the information should no longer be
considered valid. Note that to aid human readability, time is specified in a year-date-time format
rather than a decimal format. Additional context is provided in the Event field to aid in
processing including:
 What version of schema is being used. In theory, this should simplify compatibility
issues, though the event schema has been stable at 2.0 for some time.
 A unique identifier about the event (not the sender!) which facilitates information fusion
from multiple sources.
4
See http://www.mapsymbs.com/ms2525b_ch1_full.pdf
MIS/Global Defense Inc.
16
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report

A note about how the information was generated (e.g., manually or by machine) so the
recipient of the information can consider this in weighting the quality of the reported
information.
3.1.2.2.2 Point
The Point field answers the Where question. The Point field specifies where the event is located
in terms of geographic location and height (e.g., on the ground or in the air). Additionally, an
uncertainty in the location is also conveyed in terms of height and radius, thereby defining a
cylinder of location uncertainty. Height is measured as “height above ellipsoid” based on WGS84 ellipsoid, the same convention used with GPS. [Konstantopoulos_06]
3.1.2.2.3 Detail
The Detail field is optional and included to allow the use of sub-schema to communicate
additional information beyond the base schema, e.g., requests for actions or very specific
language such as weather information. By segmenting out the sub-schema, more capable and
more specialized systems or user groups can inter-operate with more limited or generalized
systems wherein all systems maintain a common high-level of battlefield awareness, while still
facilitating more detailed communications. Examples of sub-schema are shown below. The
Details field is also used to link together multiple UIDs to express relationships between the
UIDs, e.g., a group of objects or that one object should perform some function on another object.
[Konstantopoulos_06]
Figure 16: Example subschema. From [Kristan_09]
3.1.2.2.4 Sample Message
A sample CoT message is shown below, which reads as an atom (a, i.e., a thing) hostile (h) in the
Air (A) aircraft (M) fixed wing (F) was spotted at 11:43 (Zulu) on April 5, 2005. The aircraft has
been assigned the identifier “J-01334” for later processing and was at latitude 30.090027.
MIS/Global Defense Inc.
17
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Figure 17: Example Cot message reporting a hostile fixed wing air craft at the latitude and longitude
specified, but only valid at the time of reporting. From [Kristan_09].
3.1.2.3 CoT Conventions and Functions
In addition to the overt information transfer in a COT message, there are a number of
conventions that help processing and reduce bandwidth by creating a shared context. One of the
foremost examples of this is how required bandwidth is reduced by accounting for the time
validity of a message as described in [Konstantopoulos_06].
“Any geolocalized point can thus be considered “valid” and constitutes actionable
information until the current time & date overtakes the time and date identified in the stale
sub-element. In this way, DoD systems need not be constantly exchanging WWW
information in order to keep their Common Operating Picture (COP) synchronized at all
times.
…
In other words, what is really transmitted between systems sharing WWW information
consists of “diffgrams”, or “deltas” which are relative to changed data.”
CoT also supports the definition of tests or subscriptions that allows an end-client to limit how
much data is streamed to it. In a fairly expressive manner, a client can request that the server or
router limit the stream to any subclass defined by any part of the message, from type to UID to
location to messages within a certain time frame to affiliations. Because of the hierarchy, this is
a relatively simple parsing activity for the server.
3.2 Design for May Camp Roberts Demonstration
To better serve the needs of SOCOM, the ATAV effort was refocused on providing a situational
awareness capability on smart phones using information from the Cursor on Target network.
This section describes the planned design of the system with initial prototypes demonstrated in
Tampa and at Camp Roberts.
3.2.1 iCoT OVerview
Cursor on Target (Cursor on Target) is a DoD XML-based standard electronic portable data
format to define location based data and to coordinate operation of equipment. It is commonly
used to report locations of sensors and UAVs, to report sensor information, and to send tasking
requests to objects in the CoT network.
MIS/Global Defense Inc.
18
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
iCOT is intended to be an integrated environment for viewing this information on a smart phone
(beginning with the iPhone) and sending tasking requests to devices in the network (tasking is in
Phase II).
 Significantly reduce cost to allow for radios given to foreign friendlies or supporting
responders in a disaster response to be treated as “disposable”
 Enhance spectrum access and improved spectrum management capabilities to allow the
solution to be deployed in a wide variety of locations with minimal manual intervention
 Achieve a minimal level of operation without infrastructure while identifying and
exploiting communications resources when available.
 Achieve significant operating range
 Be rapidly deployable and suitable for tactical urban environments
 LPI / LPD (Low Probability of Detection)
 Improved interoperability among heterogeneous communications assets
 Easy to use, intuitive interface that untrained, unsophisticated users can immediately
begin to use
 Ability to disseminate text and limited image information and support for voice
communications
For a CoT network, there is a common server that all devices communicate with. The IP address
for the server and the iPhone will be specified as part of network configuration. At initialization,
a device registers with the server, requests a service and then begins participating in the network.
Typically, a mobile / portable device will update its position every 30 seconds 5 via a short UDP
message and receives an ongoing stream of CoT data via an open TCP connection registered
with the server from the other devices in the network. To support use with FID users, the server
will need to support multiple data streams bearing different data by level of user / device access,
authenticate the identity of the users, and encrypt the delivery of the data.
A typical data message consists of the following information:
 Location: lat, long and uncertainty
 Unique ID
 Message type
 Object type (ignored in this phase)
 Object friendliness: friend, foe, neutral, unknown
 Timing information: when message was created, period for which data is valid
3.2.2 General Requirements
3.2.2.1 OS Support
 The application should support iOS 4 and Android 3
3.2.2.2 Platform Support
 iPhone - The application should work properly on iPhone 4
 iPad – The application should work properly on the iPad2
5
Position is specified in terms of latitude and longitude and is sometimes augmented by a cylinder (radius and
height) of position uncertainty.
MIS/Global Defense Inc.
19
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report


iPod – The iPod is not a target platform for this application
Android phones and Tablets - The application should work properly on Android devices
3.2.2.3 Application Guidelines
 The application should be developed based on Apple's user interface guidelines6
 There should no memory leaks or excess memory allocation issue during the application
running state
 Processes that require a perceptible amount of time to execute should run in the
background
3.2.3 General Capabilities
3.2.3.1 Network Communications
 IP v4/6
 The application will only communicate over WiFi7
 Static IP will be used
 When WiFi network connectivity or server connectivity is not available, messages should
be queued until the connections are re-established.
 Reconnection with the server should be automatic if the correct WiFi SSID is available
 Some icon should indicate when a connection to the server is active
3.2.3.2 Method of Encryption
The system shall be interoperable with any of the following crypto algorithm options:
Threshold:
 Wideband
o Vinson (KY – 57/58)
o Bulk Encryption (KG-84)PFA = 0.01%
 Narrowband
o Advanced Narrowband Digital Voice Terminal (ANDVT)
 Network
o High Assurance Internet Protocol Encryptor (HAIPE)
o AES 256 under Federal Information Processing Standard (FIPS197)
Objective. Upgradable to future DoD approved encryption standards.
3.2.3.3 CoT message handling
Low level communications of COT messages should be handled as a background process.
 An XML parser is necessary to handle CoT data.
 Outgoing messages should conform to the CoT standard
 Each received CoT message should be stored over the duration of a session and sorted by
UID and history
 Outgoing location messages and status updates should be sent as UDP messages
 Outgoing images should be sent as TCP messages
6
http://developer.apple.com/iphone/library/documentation/UserExperience/Conceptual/MobileHIG/Introduction/Intr
oduction.html
7
The iCoT application will be used in many locations where cellular coverage is not available. Further, the available
WiFi network will be secure
MIS/Global Defense Inc.
20
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
3.2.3.4 Voice Support
 Voice over WiFi will be supported.
 Launching any existing iPhone App for Voice over WiFi (e.g., Skype, Cisco Voice over
WiFi) is an acceptable solution
3.2.3.5 Photos
 The application will be able to view photos received over the CoT network
 The application will be able to take, annotate, and transmit photos received over the CoT
network
 Files should be saved as .jpg
3.2.3.6 Location Updating
If enabled, location updating will be a background process
where every 30 seconds the application reports its location to
the server if the connection to the server is active.
3.2.4 Views
3.2.4.1 General
 On the iPhone, each new view should default to
appearing over preceding views.
 On the iPad, the Map View should be most prominent,
filling the screen, with other views defaulting to
appearing on the right half of the screen.
3.2.4.2 Bottom Bar
The bottom bar should allow switching between primary
views. Specifically to launch the following views:
 Log-in view
 Configuration view
 Map view
 Alert view (includes badge that increments as alert
events are received and not viewed, and brightens
when an unprocessed alert is present)
 Photo View
X
3
3.2.4.3 Top Bar
The top bar should be the standard network connectivity bar with an indicator for an active
server connection. This then includes:
 Cell network bars8
 WiFi connection status
 GPS reporting (based on Configuration View setting for reporting)
 Server connection status
8
The application will not use the cellular network. But if the user wants to separately place a call over a cellular
network, this should be allowed.
MIS/Global Defense Inc.
21
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
3.2.4.4 Map View
The map view is the primary view of the application capable of showing the current location of
all devices in the network (depending on map zoom) and will be updated on receipt of each CoT
message from the server.
 Toggle between street view and satellite (Google Earth) views
 Display icons at the location of each reported object
(differentiable by the Unique Identifier – UID - field)
from the server stream and own location
 Friendlies are blue squares
 Hostiles are red circles
 Neutrals are green triangles
UID: Type X
 Unknown are orange pentagons
 If the UID icon’s time has timed out (current time >
timeout of last message), it should be filled grey
 Once a data field has shown up, the icon should blink
until clicked on
 Double clicking on an icon launches its Detailed
Asset View (Section 3.2.4.7)
 Single clicking spawns an annotation beside the asset
CoT Info
that displays the most recently received CoT data for
the object
CoT Info
 When a data file is received (e.g., an image), an alert
3
badge should be shown next to the icon and the
updated
3.2.4.5 Log-in View
The log-in screen should be the first screen seen when
starting the application. Access to the application only occurs after successful log-in. Functions
include
 Prompt user for name and password.
 This will be sent to the server for authentication.
 The name will be used to update the details field of the transmitted CoT messages
 Log out
3.2.4.6 Configuration View
The configuration view is used to:
 Specify server static IP address
 Specify iPhone static IP address
 Specify WiFi SSID
 Enable / disable status updates to the server (e.g., disable reporting location)
 Enable / disable status updates from the server (upload only)
 Enable / disable image annotation
 Enable / disable auto-send image
 Enable / disable alerts on new data (flashing icons)
 Clear session history
 Save session history (local)
MIS/Global Defense Inc.
22
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
3.2.4.7 Detailed UID View
The detailed asset view is used to view current and past CoT messages associated by a UID and
to contact users as needed.
 A scrollable list displaying past CoT messages for the UID from newest message (top) to
oldest message (bottom)
 Default view on newest message
 Expands to fill space as available
 A small view of the most recent image (if any) has been received
 Clicking on the image should make it display full-screen
 Clicking the full-size image should restore back to a mini-view
 Clicking on a minus sign hides the image (a plus sign takes it place to restore the
image)
 A small view of its position on the map (mini-map)
 Clicking on the mini-map should pull up the map view and circle the selected
UID with a yellow circle
 Mini-map should maintain primary map focus point, but zoom out enough to
encompass the UID location
 Clicking on a minus sign hides the map (a plus sign takes it place to restore the
mini-map)
 A button to initiate a voice session (if device type is “iCoT”)
 An indicator if there is current information for the UID (if current time < valid time of
last CoT message)
 The self-UID is one of the UIDs that will be tracked (for reviewing past locations and
images)
3.2.4.8 Photo View
The photo view is used to take, annotate and send pictures.
 After taking a photo (use default iPhone capability)
 if image annotation is enabled, a mini-window should open to allow the user to
add text (no text is acceptable)
 else, no annotation is kept
 After optional annotation
 if auto-send image is disabled, the user should be prompted to send, save, or
delete the image
 If saved, store locally
 If sent, send to CoT server
 if auto-send is enabled, then send the image
 Only display the image after taking if auto-send is not enabled
 When a photo is sent, the CoT transmission takes the following form
 the data field is occupied by the jpg for the image.
 The location is the current location reported by the GPS
 The UID is the ID assigned by the server
 The annotation is located in the details field
3.2.4.9 Alert View
The alert view is used to manage when important messages have arrived (primarily data files)
and tracks when there are alerts that have not been viewed yet
MIS/Global Defense Inc.
23
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report






The view should consist of a scrollable list of CoT messages that contained data in
reverse chronological order
Each entry in the list should list the location, UID, UID type, and data type
Double clicking on an entry should spawn the Detailed UID View for that UID
Clicking on the alert view will clear the alert state (flashing) of all UIDs
A thick line should separate UIDs in the list that have previously been viewed from those
that have not
On the iPad, as each entry in the list is selected, a yellow circle should highlight the
associated UID on the map
3.3 Results from May Camp Roberts Test and Demonstration
From Sunday, May 8 through Tuesday, May 10 iCOTS Kurt Badertscher, James Neel, and Mark
Phillips traveled to Camp Roberts to
 conduct performance and interoperability tests with a live Cursor on Target network
 gather feedback from users and PEOs on features and modifications to be make to iCOTS
 Fulfill Milestone 3.
Figure 18: Picture of an iPod, iPhone, and iPad receiving Cursor on Target information at Camp Roberts
TNT experiments in May 2011 with an intermediate server hosted on the laptop.
Interoperability testing revealed no issues as we successfully exchanged position and image data
with the main COT network and among devices without message drops or any reported issues
caused to the primary COT network. However, testing also revealed that the design needs to be
modified to reduce (eliminate) interactions with the internet. While this would also work towards
the goal of realizing a closed system, based on bandwidth availability, using internet based
services (map, Skype voice, Skype chat) yielded unacceptable levels of performance.
Additionally, it was revealed that a limited number of devices on the COT network (specifically
radars) generate an extraordinary number of messages with new UIDs (~2000 / minute) which
overloads the current icon rendering and alert systems. However, when the radar was not
flooding the network (Tuesday morning), we saw excellent performance for the main COT
routines (map displays, image uploads), though Skype voice and Skype chat were still
unacceptably bad over the WiFi network. Network reliability was identified as a particular issue
with the COT network repeatedly going up and down on Sunday during initial tests, often
staying up for only 30 seconds at a time. To address this issue, Sunday night, we coded our own
message router that acted as a repeater and access point to the iCOTS devices. By Monday
MIS/Global Defense Inc.
24
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
afternoon, this intermediate server was operational and included in demonstrations Monday
afternoon and Tuesday morning.
On Monday morning and (to a lesser extent) Tuesday morning, many different special forces
operators provided feedback on:
 Ways we could improve the interface
 How they envisioned using the device (applications)
 What should be assumed about network availability
Overwhelmingly, the response was positive, though a couple signals users on Tuesday expressed
doubt on the utility of smartphones in general. Even on Tuesday (after official experiments were
over), operators were seeking us out to try out the application. In particular, operators from Fort
Bragg expressed interest in continuing to help us test and evaluate iCOTS even between
Monday morning, Erik Syvrud attended initial demonstrations where we had two iPod Touches
tethered to our own COT server and network (via a WiFi access point purchased on Sunday).
Feedback was positive and milestone 3 was satisfied.
3.3.1 Test Results
3.3.1.1 Interoperability
We received no reports of poorly formed COT messages interfering with the COT network and
were able to receive and monitor feeds from numerous devices both via an intermediate Position
information and imagery were correctly sent and received without issue (ignoring the radar
issue). The COT server did indeed relay back messages sent from a device back to the device.
We also downloaded our application onto two iPhones brought by other participants at TNT –
one a special forces user (Tuesday) and one a professor at CMU (Monday). These successfully
participated in our locally hosted COT network
3.3.1.2 Radar Issue
Radars on the CoT network were sending out a message with a new UID with every ping. This
completely overwhelmed our devices. We will need to develop a routine on the devices to detect
this condition and filter out the messages when they occur. A log of COT messages from Sunday
and Monday has been requested to aid in creating this filter. This could also be accomplished by
ensuring the primary COT server implements a similar filter, so this should be viewed as a failsafe mechanism.
3.3.1.3 Performance
Network Reliability – On Sunday, this was a significant issue as the COT network would stay up
only intermittently, sometimes for only 30 seconds. This was addressed on-site by developing a
message router that would allow us to host our own local COT network where our message
router relayed COT messages between the local network and the primary COT network. This
largely solved the ancillary issues that resulted from the WiFi connection having to be constantly
re-established.
MIS/Global Defense Inc.
25
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
3.3.1.4 Skype Voice and Chat
On Tuesday, voice and chat capabilities were tested over the WaveRelay WiFi connections and
found wanting. Specifically no voice calls were successfully completed9 either from calling or
when trying the Skype recorded message setup. Further only ~50% of Skype chat messages were
successful.
Proposed resolution – users repeatedly emphasized their preference for using cellular networks
instead of WiFi. Over cellular, for voice Skype is not needed. COT also supports its own chat
protocol, which should be implemented in lieu of Skype.
3.3.1.5 Map Interface
Map tiles for the iPhone MapKit are designed to make use of Google’s online map tiles for both
satellite and street views. However, with spotty internet connectivity (particularly on Sunday),
this led to long periods of time where the icons would be displayed over an empty map due to an
inability to reliably and consistently reach Google’s servers.
This should be addressed by locally caching map tiles relevant to the mission. Based on user
feedback, this should support tile generation from many different map sources and the
application should support dynamic overlays of these map tiles.
3.3.1.6 Battery Life
On Monday afternoon, an iPod, an iPhone, and an iPad were left connected to our own COT
network from a fully charged state and allowed to discharge until off. The devices took the
following amounts of time to fully discharge:
 iPod ~ 2.5 hours; iPhone ~ 4 hours; iPad ~ 4 hours
Note that this is shorter than advertised operational life of the devices, but the GPS and WiFi
were in continuous heavy use over this period of time. In the future we could improve battery life
by adjusting the design to consider which network data is being sent over and adjusting phone
operation mode. Indeed, many interface design decisions will strongly influence power
consumption as illustrated by the Android statistics below. While these statistics assume the use
of commercial cellular networks, we expect similar tradeoffs to exist for tactical cellular
networks and for using services of various smartphone components. Thus, as much as possible
the interface should be designed to communicate in a way that minimizes power consumption.
9
No radars were operational at the time.
MIS/Global Defense Inc.
26
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
3.3.1.7 Configuration Time
We configured several devices to run on the primary COT network (our own and a couple
others) and our own COT network. The following are estimates of times required to join a
network for a provisioned device with the iCOTS application.
 Set WiFi (network) settings: 1 minute
 Configure COT server settings: 1 minute
 Time from clicking “connect” to data reception: < 1 second
3.3.1.8 Usability
Users had little trouble understanding how to make use of the application and very little
explanation was required for an unexperienced user to begin to be effective with the application.
However, it was important to at least give a short briefing of what the application was intended
for and what features it supported. An estimate training time of 1-5 minutes is recommended for
using iCOT in its current form.
3.3.1.9 Alerts
 This feature was much appreciated, though user and mission configuration is desired.
 Audio chimes were preferred (feeling a vibration was judged to be impractical through
body armor), but this should be integrated into their existing headsets.
 Cleared alerts should be indicated by cell color instead of font color
 The alert badge should go away when 0 new alerts are present (easier visual indication)
3.3.1.10 Configuration
Most users were either not interested or knowledgeable enough of network protocols to
configure the settings for talking to the COT server from the iCOTS devices. These settings
should be input prior to deployment by comm. specialists along with other relevant information
for the mission.
3.3.1.11 Device Detail Confusions
 Clicking on image should expand the image and allow manipulation
 Clicking on the mini-map should bring the user back to a zoomed in view of the map
3.3.1.12 Memory management
One of the more positive feedbacks we got about iCOT was that it was much smoother and
responsive than I2W (a competitor product focused on generating after-action reports, but
without a COT tie-in). However (unseen by the users), after 30+ minutes of operation the devices
became noticeably less responsive. It is speculated that this is due to RAM filling up and
repeated dynamic allocations of memory. This should be resolved by pre-allocating fixed (but
large) size arrays when new UIDs are encountered (to store messages) and implementing a
routine to regularly save messages in RAM to the harddrive.
3.3.2 User Feedback
3.3.2.1 Form Factor
The iPad was seen as too big for individuals to use, but useful as a controller or for management
in a vehicle (iNode) or as part of an airkit after crash-landing. The iPod and iPhone was seen as a
more useful form factor for use by individuals in the field.
MIS/Global Defense Inc.
27
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
3.3.2.2 Practical Considerations
 Gloves - In all cases, we need a good solution for how to interface with the devices when
wearing gloves.
 Devices need to be water-proofed.
 Support for voice activation / input is desired
 Default to Dim light level as it might get pulled out at night and a bright light can give
away their location. Having to brighten the device in daylight was not seen as
burdensome, though ideally the device would auto-detect ambient light conditions and
adjust accordingly.
3.3.2.3 Networking
 WiFi was not as popular as expected. The rationale is due to its limited coverage range as
users could easily shout 100 meters if needed. Bluetooth was spoken of *very* poorly
and should be avoided due to interference susceptibility.
 Cellular was expected to be well represented in Iraq, though is reportedly quite spotty in
the middle of Libya.
 The preferred solution appears to be to support cellular and WiFi in permissive
environments (as they’re already on the phones) but to also provide an Ethernet
connection to the phone to support communication over additional existing military
networks. This would also address potential security concerns
 Direct messaging without the COT server was also desired, both for messages that don’t
need to distribute to everyone and for when the connection to the server is lost.
3.3.2.4 Major Apps
 Liked it as a redundant Blueforce tracker
 Liked transmission of imagery
 Wanted support for report generation
 Surveillance – want video and audio record and upload / share in addition to imagery.
3.3.2.5 Search Function
An ability to search for a specific UID or related UIDs that match some search string related to
CoT fields and time. This is desired to a) allow the user to quickly zoom in on a desired UID and
b) to look for patterns of behavior over time.
3.3.2.6 UTM (MGRS)
users requested an ability to switch back and forth and to display simultaneously UTM with
lat/long data. Lat-long is reportedly used when communicating with aircraft, while UTM is used
for their own internal communications.
3.3.2.7 Velocity / Heading
When conveyed by the COT network, users would like to see direction and speed included in the
UID annotation field.
3.3.2.8 Zeroize / Remote Device management
Users expressed a desire to remotely clear a device and/or to remotely control a device that fell
into an enemy’s hands. However, there is perhaps multiple levels of wiping required as for the
MIS/Global Defense Inc.
28
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
car tracking capability, the phone should continue reporting its information, but all stored data
and imagery should be wiped.
3.3.2.9 Transmission management
Users requested a capability to manage who got different messages. Suggested levels include
 within team
 to everyone
 Selectable
 To commander
Surveillance data has greatest need for run-time selection. Probably support as lists defined in
configuration to define where surveillance and position info defaults to and a user screen when
uploading surveillance data.
3.3.2.10 Visibility
Users suggested that glare may be an issue on the device in bright sunlight. This implies that
matting on the screen may be desirable to reduce glare.
3.3.2.11 Bearing
Users expressed a desire for an optional compass displayed on the map. This bearing should be
included in any tags attached to submitted imagery.
Icons – As a bit of a surprise, very few users were familiar with the 2525B iconography. There
was some feedback that suggested that more “video-game” like icons would be easier to
understand (e.g., a tank for a tank, a UAV for a UAV…)
3.3.2.12 Imagery
 Auto-save uploaded images.
 Append orientation information. Distance would be nice, but this is a difficult feature to
add.
 Clicking on image should bring up image manipulation routines (zoom in / out…)
 Users should get an alert when an image does not successfully get to its intended
destination.
 Want to be able to draw on images and write notes directly on images. Described as like
how John Madden telestrates.
3.3.2.13 Iconography
 2525B was not well known (“maybe the old guys like it”).
 Users would like to be able to
o define their own icons and select from different icon sets (2525B, video-game
icons, or something customizable)
o Define their own relationship rules between types and icons
o Add their own labels for UIDs
o Possibly use their own icon sets
 Display part of UID on icon
 Affiliation and type were universally the most important things to show
 Delete icons of stale icons (suggest moving to another optionally displayed layer)
MIS/Global Defense Inc.
29
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report



Possibly indicate speed and heading
Need to be updating icon locations in pseudo-real-time.
Add some visual indicator when a UID has an image
3.3.2.14 COT / UID XML Dump
 No awareness of meaning of COT fields, e.g., what does “hae” mean? Should map
known fields to English descriptors
 Didn’t like “XML Dump” as didn’t know what that meant
3.3.2.15 Annotation
 Add support for UTM (already identified)
 Add speed and heading (likely want to make what is displayed on the configuration user
definable)
3.3.2.16 Routing
 Support for routing was greatly desired, but what routing meant varied by user.
 Some thought this meant being able to coordinate on a position to meet at, at a specified
time (our original interpretation)
 Others thought this meant the preceding with Tom-Tom like turn-by-turn navigation
which would optionally auto-route around bad terrain and known problem areas
3.3.2.17 Maps
 Add a compass overlay to the map
 Support distance estimates (pick two spots on the map and have the screen tell you the
distance)
 Support user-definable saved views. Perhaps page these in from the side of the screen.
 Returning to the map should return to the last map view (not the current fit-all icons
view)
 Clicking on mini-map should take users to that spot on the map
 Extend mini-map range to encompass a larger view
 Support dynamic (transparent / partial opacity) overlays of map tiles from a variety of
sources. These should be locally cached due to network and security issues.
 Want to be able to do screen captures of maps which could then be drawn on like with
images
3.3.2.18 Reporting
 Support for generating after-action reports was repeatedly voiced. This should support
voice-to-text reports and attaching images to the reports.
 Reporting can take over an hour of their time after a mission and anything that can cut
this down is desirable.
 Should support “breadcrumbing” to recreate where entities were during the action.
3.3.2.19 Unexpected applications / features requested
 Tracking device – the scenario given was to attach the device to a car of interest and then
see where it goes. Other users noted that cheaper, more disposable devices already exist
explicitly for this purpose. However, this is effectively a “free” application that iCOTS
MIS/Global Defense Inc.
30
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report




already supports. But this should only be used once the zeroize server is also
implemented.
Surveillance by Border Patrol10 – A representative from DHS noted that iCOTS image
uploading capability would be particularly useful for their covert missions in border
towns as it would be much easier to conceal and would not draw attention.
A 3-D auto-rendering map display was requested by one user so that users / commanders
would better account for terrain. This was said to be “far cooler” than just a topo map.
Directly integrate into mission planning and executing with recognition of phase lines.
Generate alerts when phase lines are crossed.
Use for survival information in crash landing (from pilot Erik Hesko)
 Videos of medical, local fora informational
 Canned messages for chat, hijack message (ejected but ok)
 Canned message for crossing phase line
 Emergency survival information that has comm.
o 1-4 hours; generally up to 24 hours
 Medical info
 iPad maybe too big (maybe under seat); iPod in pocket; Needs to eject with the
pilot.
 Waterproof
3.3.2.20 Security
 (Not from users) Imagery should not be loaded onto the main phone camera roll as this
poses a security risk as those without access to the iCOTS application, but with access to
the phone can too easily pull up imagery from missions.
 Encryption is desired when not in a permissive environment, but this could be
accomplished by communicating over a more secure network.
3.4 Summary of Major Updates for August Camp Roberts Test and
Demonstration
The following additional features are planned for further testing and demonstration at Camp
Roberts in August.
 Routing to coordinate movements from the Map Interface
 A change in map tile access to local storage and multiple tile overlay to reduce network
bandwidth requirements and improve responsiveness
 Remote device wiping
 A compass overlay
 A distance measuring tool on the map
 UTM coordinate display on the UID annotation
 A local COT filter to address the radar issue
 Updates to imagery management
 Improved memory management to store older messages on the phone hard drive and limit
table size displays to maintain application responsiveness
10
Surveillance is one of the primary apps intended for iCOTS, but the use by DHS was unexpected.
MIS/Global Defense Inc.
31
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
3.5 Functional Prototype References
[Byrne_04] R. Byrne, “‘Cursor on Target’” Improves Efficiency” The Edge, MITRE, Fall 2004.
Available online: http://www.mitre.org/news/the_edge/fall_04/edge_fall_04.pdf
[Konstantopoulos_06] D. Konstantopoulos, J. Johnston, “Data Schemas for Net-Centric
Situational
Awareness,”
CCRTS
2006,
Available
online:
http://www.dodccrp.org/events/2006_CCRTS/html/papers/073.pdf
[Kristan_09] M. Kristan, J. Hamalainen, D. Robbins, P. Newell, “Cursor on Target Message
Router User’s Guide,” MITRE PRODUCT MP090284, November 2009. Available online:
http://www.mitre.org/work/tech_papers/2010/09_4937/09_4937.pdf
[Neuman_06] T. Neuman, “Cursor on Target (CoT): The Future of Network Centric Warfare,”
http://www.angelfire.com/planet/gb3020_cursor_on_tgt/index.html, 2006.
[Robbins_07] D. Robbins, “Unmanned Aircraft Operational Integration Using MITRE’s Cursor
on Target,” The EDGE, Summer 2007, vol. 10, no 2. Available online:
http://www.mitre.org/news/the_edge/summer_07/edge_summer_07.pdf
[Schaeffer_05] K. Schaeffer, T. Gibbons, Jr., “Enhancing the Extended Awareness Capability of
the ESG: Integrating Shotspotter and Cursor on Target Technologies with Unmanned Aerial
Vehicles to Enhance the Mission Capability of the ESG,” Masters Thesis, Naval Post Graduate
School,
June
2005.
Available
online:
http://edocs.nps.edu/npspubs/scholarly/theses/2005/Jun/05Jun_Schaeffer.pdf
[Ucore_11] “Ucore”, Wikipedia. Retrieved 4/29/11. http://en.wikipedia.org/wiki/UCore
MIS/Global Defense Inc.
32
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
4 Summary of Study into Reducing SWAP for Asset Management
RFIDs
4.1 Summary of SWAP Study Findings
4.1.1 Processor Trends and projections
For the same functionality and clock speeds, we can expect power to reduce by 19% each year
and die size reductions of 30% per year ( 1 1/ 2 ). Note that reductions in die size do not
immediately translate to reductions in area as packaging must also be taken into consideration.
Thus without investing new monies, it can be expected that the SWAP for the same capability
will improve year over year. Also, while each generation of fabrication technologies is more
expensive, older generations of processors are typically much cheaper. So if price is the driving
factor, relying on older generation processors can be used, at a tradeoff of reduced performance
and power and increased area.
4.1.2 System on Chip, mixed signals, and RFICs
As feature sizes reduce, not only will digital components improve, but analog components on RF
Integrated Circuits and Mixed Signal chips will also improve, albeit more slowly. The expected
performance improvements (and decreases) are covered extensively in [Jiménez_05] from which
the following extracts key information. Broadly, improvements in CMOS technology are related
to digital performance and RF performance as shown in Figure 19 where only IP3 (3rd order
intercepts) are degraded by CMOS technology trends.
Figure 19: Connection between CMOS technology, digital performance, and RF performance. From
[Jiménez_05]
More specific relationships with scaling parameters are shown in Figure 20. From this table, we
can notice the following:
 Conventional (digital) CMOS technology scaling does not improve any analog / mixed
signal parameter.
 Constant current (and area) scaling improves transconductance and dynamic range, but
does not improve maximum max. transconductance and reduces max. dynamic range.
MIS/Global Defense Inc.
33
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report



Constant power (and area) scaling allows increasing biasing current, and therefore
maximum transconductance is increased and maximum dynamic range is not reduced (it
stays constant with scaling).
Both 1/f noise and mismatching worsen with conventional CMOS digitally driven
scaling.
Area must be kept constant with scaling to maintain the same mismatching effects and
reduce 1/f noise.
Figure 20: Scaling factor relationships ( is the same as S from the digital scaling discussion). From
[Vittoz_90]
Since maintaining a constant area is important for maximizing analog circuit performance, this
has the effect of making the analog portion of the area of an integrated IC consume an
increasingly larger fraction of the chip as technology scales and in turn limits cost savings (per
transistor) that come from improved technologies.
Figure 21: Expected trends for mixed circuit chips in area and cost by fabrication technology. From
[Jiménez_05]
MIS/Global Defense Inc.
34
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Similar limitations apply to scaling down voltages where decreasing voltages applied to analog
components greatly reduces dynamic range. This is discussed in more depth in [Larson_03] and
[Hanson_06]. Thus reductions in power consumption for analog integrated components is
normally much less.
After defining some general figures of merit for critical analog components, [Jiménez_05]
calculates the expected values for different generations of CMOS technologies as shown below.
Note that for all four classes, significant improvements can be expected (though less for VCOs),
but this will come with limited reductions in area and power.
Figure 22: Expected relative performance levels following ITRS projections for LNAs, VCOs, Pas, and ADCs.
From [Jiménez_05].
4.1.3 Antenna Miniaturization
In general, the larger the antenna, the better the performance of a communications link.
However, this runs counter to the goal of smaller, less intrusive emplacement of a wireless
sensor. To counter this trend, many different developers have taken different approaches to
reducing the apparent size of antennas by embedding them on the circuit boards on which the
chips are boarded, within the chips themselves, and as part of the packaging of the device. To
Note that these techniques to reduce the size of an antenna often induce directionality to the
antenna and can reduce radiative effectiveness which has the effect of increasing transmit power.
Integrating an antenna into another component also tends to reduce maintenance costs as
antennas do not protrude limiting damage. Conversely, because of the modified radiative
patterns, more time can be required to optimally site the device based on its environment.11
4.1.4 Packaging
Ideally transparent, packaging determines the connection between the chip and the board. Any
deviation from an ideal package causes mismatches increasing insertion loss (increasing power)
and causing reflections (degrading signal quality). Care needs to be taken in the design /
selection of packaging for the intended signals as insertion losses can grow quite high.
A great many different packaging types exist including those listed in Figure 23. In general the
choice is determined by the die size, operating frequency/speed, pin count requirements, size and
cost (variations of a few orders of magnitude, e.g., from pennies to tens of dollars are possible).
11
A great example of this is the iPhone 4 antenna which is integrated into the case of the iPhone. But holding the
phone the “wrong” way can significantly decrease antenna performance.
MIS/Global Defense Inc.
35
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Figure 23: Example Packaging solutions. From [Pack_09]
4.1.5 Energy Scavenging
For sensors intended to be left in place for long period of time, power minimization is frequently
driven by a desire to minimize the effort and cost associated with replacing batteries and
servicing sensors. In addition to reducing power consumption, it is also possible to generate
enough power from ambient conditions to support low power devices. For example, the Seiko
Kinetic wrist watch is primarily powered from the motion of your arm. Such a capability is
known as energy scavenging and has also been the focus of much research, and is in fact the
focus of a current Zigbee standardization effort.12
Almost any power source in the environment can be used. In addition to significant variation in
power availability, the suitability of any given energy scavenging technique depends on the
environment, i.e., the forms of available ambient energy. Thus no one-size fits all energy
scavenging technique can be applied to all possible sensors. Also note that energy scavenging
techniques typically have to be exploited opportunistically and stored as power sources come and
go (e.g., night and day).
12
www.zigbee.org/imwp/download.asp?ContentID=16107
MIS/Global Defense Inc.
36
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Figure 24: Energy Densities for Commonly Available Energy Scavenging Sources
4.1.6 Nanotechnologies for Sensors
[NSET] writes that nanotechnology is “the understanding and control of matter at dimension
between 1 nanometer (nm) and 100 nm, where unique phenomena enable novel applications.
Encompassing nanoscale science, engineering, and technology, nanotechnology involves
imaging, measuring, modeling, and manipulating matter at this length scale.” In general,
nanotechnology can also be applied directly to make ultra-small self-contained sensors. Further,
nanotechnology also allows for direct measurement of much smaller phenomena which allows
things to be detected that might not otherwise be possible or be extremely expensive to detect. In
fact [NSET_09] writes that
The most transformative opportunity for nanotechnology lies in the discovery and
application of transducers based on unique material properties and unusual phenomena
that emerge at the nanoscale….
The use of nanoscale materials in sensing applications is growing quickly, with
encouraging early results. Carbon nanotubes, nanostructured metal oxides, polymers, and
many other materials are being functionalized with chemical and biological species to
selectively identify specific analytes. These technologies are leading to smaller, more
capable environmental monitors for sensing ammonia, nitrogen oxides, hydrogen
peroxide, hydrocarbons, volatile organic compounds, and other potentially hazardous
gases. Early commercial examples include sensors that use carbon nanotubes to detect
ozone in water and air, and hotplate transducer arrays coated with nanostructured tin
oxide that are used for automotive cabin climate control. Metal and dielectric films
patterned at the nanoscale, able to control and amplify electromagnetic signals, are
another example of nanotechnology-enabled sensing capability.
So nanotechnology can be applied to detect minute traces of gasses or particles as described in
[Stonybrook] and [EPA], as well as chemical constituent concentration, separation, and
transduction, energy harvesting and storage, computing systems to analyze transducer response,
and opto-electriconic systems for communications. Additional examples of nanotechnology
sensors include enhanced spectroscopy and artificial pores to detect single molecules [Lucas],
and the use of self-assembled quantum dots for IR detector application [Amirtharaj_02].
MIS/Global Defense Inc.
37
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
In general, this is another area where millions, if not billions, of dollars are being invested right
now to make smaller and more effective sensors. The system design should be open to
accommodating new sensor designs as they become available. However, the possibility of sensor
degradation should be accounted for in the design and maintenance of any system.
4.1.7 General System SWAP Considerations
Additionally, SWAP can be managed via system and design considerations including the
following general principles:
 Minimize duty cycle to only transmit when needed, and only transmit the minimum
needed, including protocol overhead
 Likewise aggressive sleep-modes should be used for all processors
 Minimize voltage use as much as possible, and possibly by component but take care as
lower voltages reduce RF performance
 A switch-mode regulator with low quiescent current can increase battery lifetime
 Use power control to limit transmit power
 Faster crystals and PLLs can reduce active processing time (see Figure 25).
 Use carrier-sense recognition to start a receiver to limit the number of active circuits
Figure 25: Typical Power Profile of a low-power Wireless Sensor. From [TI_LPRF]
4.2 Recommendations from SWAP Study
Billions of dollars is being spent by the public and private sectors to reduce the size, weight,
power, and cost of wireless components and sensors. It seems unlikely that additional research
funds will do much to broadly change the direction of these trends. However, the design should
capitalize on the principles and trends outlined in this Section.
If the direct manufacture of chipsets is envisioned, then the aspects discussed in this report need
to be studied further and put into practice to minimize SWAP and cost, e.g., using integrated
MIS/Global Defense Inc.
38
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
antennas, maximizing the amount of functionality implemented digitally, making systems
considerations on how to reduce power, and integrating as many components into a single chip
as possible to reduce I/O losses. But if the end design is the integration of existing components,
then continued monitoring of products and related technologies is likely sufficient. Regardless of
the approach, using an antenna fabricated into the chip or board can significantly decrease
effective area, but will likely reduce performance somewhat.
As an example of a related technology, energy scavenging is an effective technique for reducing
the amount of time required to service batteries and can be used to reduce battery requirements in
general (typically reducing size, weight, and power). Thus energy scavenging should be included
as part of any persistent wireless sensor network. However, the design will need to support
multiple types of energy scavenging sources for different emplacements, e.g., vibrational or
electromagnetic for motor sensors, solar for sensors on outdoor pallets, and kinetic for personal
sensors.
The adoption of nanotechnology will generally decrease the SWAP and cost of all components
except for analog RFIC components which require constant area and near-constant voltage
scaling to maximize performance. Further nanotechnology enabled sensors open up the
possibilities of new and more powerful sensors as surface and molecular level physics are able to
be exploited. However, as with all sensors, their performance will be expected to degrade over
time, so incorporating automated calibration may be desirable.
Though not the particular focus of this portion of the report, it is important to note that the type
of battery used has a significant impact on the usable lifetime of a device as all batteries decay in
energy storage capability over time and some much more quickly than others. Thus even if a
wireless sensor has greatly reduced power consumption and is able to scavenge for all of its
needs,
Figure 26: Battery Life: Energy Density over time for various battery technologies. From [Xue_07]
Additionally, though not a different technology, code optimization can have a significant impact
on performance reducing execution cycles by 50-70%. However, this only has a particularly
MIS/Global Defense Inc.
39
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
noticeable impact on power consumption when used in conjunction with processors that can
aggressively manage their sleep modes as clocks continue to execute.
4.3 References from Miniaturization / SWAP study
[Altera_03] Altera, “An Analytical Review of FPGA Logic Efficiency in Stratix, Virtex-II, &
Virtex-II Pro Devices,” Altera White Paper, May 2003, Available online:
http://www.altera.com/literature/wp/wp_stx_logic_efficiency.pdf
[Altera_05] Altera, “Stratix II and Virtex IV Power Comparison & Estimation Accuracy,” Altera
White Paper, August, 2005, Available online:
http://www.altera.com/literature/wp/wp_s2v4_pwr_acc.pdf
[Amirtharaj_02] P. Amirtharaj, et al., “The Army Pushes the Boundaries of Sensor Performance
through Nanotechnology,” AMPRIAC Quarterly, Volume 6, No 1, Spring 2002, pp 49-56.
[BDTI_06] “BDTI Pocket Guide,” BDTI, http://www.bdti.com/pocket/pocket.htm
[Brodkin_08] J. Brodkin, “Shift to multicore processors inevitable, but enterprises face
challenges,” LinuxWorld, February 2008. Available online:
http://www.linuxworld.com/news/2008/022708-multicore-processors.html
[Chen_11] G. Chen, H. Ghaed, R. U. Haque, M. Wieckowski, Y. Kim, G. Kim, D. A. Fick, D.
Kim, M. Seok, K. D. Wise, D. Blaauw, and D. Sylvester, "A Cubic-Millimeter EnergyAutonomous Wireless Intraocular Pressure Monitor," IEEE International Solid-State Circuits
Conference (ISSCC), San Francisco, California, pp. 310-311, February 2011.
[Commstack_03] “Why License Commstacks OFDM Modem IP Cores,” CommStack white
paper, 2003. Available online:
http://www.commstack.com/WhyLicenseCommStacksOFDMModemIPCoresv2.pdf
[Crocket_98] J. Crocket, “DSP Architectures for Wireless Communications,” 1998 International
Symposium on Advanced Radio Technologies.
[Enea_04] “Enea Supports TI’s OMAP with Bundled Multi-Core RTOS Platform,” ENEA Press
Release, March 31, 2004. Available online:
http://www.embeddedstar.com/press/content/2004/3/embedded13813.html
[EPA] http://www.epa.gov/ncer/nano/research/nano_sensors.html
[Evans_07] J. Evans, “Analog Spectral Processors,” MTO Symposium 2007, Available online:
http://www.mtosymposium.org/2007/posters/Communication/52_Evans_ASP.pdf
[Gardiner_07] B. Gardiner, “IDF: Gordon Moore Predicts End of Moore's Law (Again)” Wired,
Sep 2007, http://blog.wired.com/business/2007/09/idf-gordon-mo-1.html
[Gardiner_08] B. Gardiner, “Tick-Tock: Researcher Says Silicon Chips Have Four Years of
Improvement Left,” Wired, March 2008, Available online:
http://blog.wired.com/business/2008/03/researcher-says.html
[Gargini_04] P. Gargini, “Sailing with the ITRS into Nanotechnology,” Semicon West, July 12,
2004.
MIS/Global Defense Inc.
40
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
[Gargini_08] P. Gargini, “Overcoming the Red Brick Walls,” Industry Strategy Symposium, Jan
2008. Available online: http://download.intel.com/technology/silicon/orbw.pdf
[Grochowski_06] E. Grochowski and M. Annavaram, “Energy per Instruction Trends in Intel
Microprocessors,” Technology @ Intel Magazine, March 2006. Available online:
ftp://download.intel.com/pressroom/kits/press/core2/epi-trends-final2.pdf
[Hanson_06] S. Hanson, D. Sylvester, and D. Blaauw, "A New Technique for Jointly Optimizing
Gate Sizing and Supply Voltage in Ultra-low Energy Circuits," IEEE/ACM International
Symposium on Low-Power Electronics Design, Tegernsee, Germany, pp. 338-341, October 2006.
[Ireton_06] M. Ireton and M. Kardonik, “Using a multicore RTOS for DSP applications,”
DSPDesignLine, July 17, 2006. Available online:
http://www.embedded.com/columns/showArticle.jhtml?articleID=190500287
[ITRS_07] “Executive Summary,” The International Technology Roadmap for Semiconductors:
2007, Available online: http://www.itrs.net/Links/2007ITRS/ExecSum2007.pdf
[IWPC] “IWPC Trends in RF Integrated Packaging,” IEEE MTT-S, June 2004
Ft. Worth, TX USA. Available online:
http://www.iwpc.org/TempDocs/IWPC_Trends_in_RF_Integrated_Packaging5.pdf
[Jalan] V. Jalan “Energy Scavenging For Wireless Sensor Networks,” Available online:
http://intranet.daiict.org/~ranjan/sn/presentations/Energy_Scavenging_For_Wireless_Sensor_Networks.pdf
[Jiménez_05]
J. Jiménez, “AMS and RF technology roadmap,” Available online:
http://petrus.upc.es/limits/roadmap_AMS_RF_qt05.pdf
[Jones_04] M. Jones, “Energy Scavenging for Wireless Sensor Networks,” Available online:
http://www.howelljones.ca/tech/energyscavengefull.pdf
[Larson_03] L. Larson, “Silicon Technology Tradeoffs for Radio-Frequency/Mixed-Signal
“Systems-on-a-Chip,” IEEE Transactions on Electron Devices, Vol. 50, No. 3, March 2003.
[Lee_05] K. Lee, et al., “The impact of semiconductor technology scaling on CMOS RF and
digital circuits for wireless application,” Electron Devices, July 2005 vol 52, issu3 7, pp. 14151422.
[Leopold_07] G. Leopold et al., “High-k push brings anxiety as 32 nm looms,” EE Times,
December
17,
2007.
Available
online:
http://www.eetimes.com/news/semi/showArticle.jhtml?articleID=204803606
[Linux_07] “The Core of the Issue: Multicore and You,” Linux Magazine, November 13, 2007.
Available online: http://www.linux-mag.com/id/4311
[Lucas] D. Lucas et al., “Nanotechnology-Based Environmental Sensing,” Available online:
http://superfund.berkeley.edu/research-projects/project-5-nanotechnology-based-environmentalsensing/
[Matthew_04] S. Matthew, et al., “A 4GHz 300mW 64b Integer Execution ALU with Dual
Supply Voltages in 90nm CMOS,” ISSCC 04.
[Maxfield_08] C. Maxfield, “Xilinx Responds to Altera’s Benchmarks,” Programmable Logic
Design Line, May 30, 2008. Available online: http://www.pldesignline.com/blogs/208401153
MIS/Global Defense Inc.
41
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
[McKenney_07] P. McKenney, “SMP and Embedded Real Time,” Linux Journal, January 1,
2007. Available online: http://www.linuxjournal.com/article/9361
[Moore_03] G. Moore, “No Exponential is Forever,” International Solid State Circuits
Conference 2003, Available online:
http://download.intel.com/research/silicon/Gordon_Moore_ISSCC_021003.pdf
[Neel_02] J. Neel, “Simulation of an Implementation and Evaluation of the Layered Radio
Architecture,” MS Thesis, Virginia Tech December 2002.
[Neel_04] J. Neel, S. Srikanteswara, J. Reed, P. Athanas, “A Comparative Study of the
Suitability of a Custom Computing Machine and a VLIW DSP for Use in 3G Applications,”
IEEE Workshop on Signal Processing Systems SiPS2004, Oct 13-15, 2004, pp. 188-193.
[Neel_05] J. Neel, P. Robert, J. Reed, “A formal methodology for estimating the feasible
Processor solution space for a software radio”, SDR Forum Technical Conference 2005, Orange
County, CA, Nov. 14-18, 2005, #1.2-03.
[NSET_09] NSET, “Nanotechnology-Enabled Sensing, Report of the National Nanotechnology
Workshop,” May 2009.
[Pack_09] “Developments in Packaging: RFIC, MMIC, LTCC, SiP, SoC,” High Frequency
Electronics, June 2009. Available online:
http://www.highfrequencyelectronics.com/Archives/Jun09/HFE0609_TechReport.pdf
[Patel_05] C. Patel, “Lecture 11: Scaling,” UMBC, October 2005. Available online:
http://www.csee.umbc.edu/~cpatel2/links/640/lectures/lect11_scaling.pdf
[PC_04] “PC102 Product Brief,” PicoChip, March 2004.
[Rivoallon _02] F. Rivoallon, “Comparing Virtex-II and Stratix Logic Utilization,” Xilinx White
Paper 161, June 2002, Available online:
http://www.xilinx.com/support/documentation/white_papers/wp161.pdf
[SDRF_08] SDR Forum “Cognitive Radio Definitions and Nomenclature,” Working Document
SDRF-06-P-0009-V0.5.0, May 30, 2008.
[Silva_06] M. Silva, J. Ferreira, “Support for partial run-time reconfiguration of platform
FPGAs,” Journal of Systems Architecture: the EUROMICRO Journal, vol 52 issue 12, pp. 709726, December 2006.
[Soni_01] M. Soni, “VLSI Implementation of a Wormhole Run-time Reconfigurable Processor.”
MS Thesis, Virginia Tech, 2001.
[Stonybrook]
http://commcgi.cc.stonybrook.edu/am2/publish/General_University_News_2/New_Sensor_Nano
technology_Developed_by_Stony_Brook_University_Researchers_Simplifies_Disease_Detectio
n.shtml
[TI_07] “Texas Instruments Goes Beyond 3G with New LTE Offering for Wireless
Infrastructure,” Texas Instruments Press Release, April 2007, Available online:
http://focus.ti.com/pr/docs/preldetail.tsp?sectionId=594&prelId=sc07077
[TI_08] Texas Instruments, “TMS320C6414T, TMS320C6414T, TMS320C6414T Fixed-Point
Signal Digital Signal Processors,” Texas Instruments Datasheet SPRS226L, February 2008.
MIS/Global Defense Inc.
42
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
[TI_LPRF] Texas Instruments, “Designer’s Guide to LPRF,” Available online:
http://focus.ti.com.cn/cn/lit/sg/slya020a/slya020a.pdf
[West_07] J. West, “Intel Ships New Hafnium Assisted Transistors,” Inside HPC, November
2007, http://insidehpc.com/2007/11/12/intel-ships-new-hafnium-assisted-transistors/
[Vittoz_90] E. Vittoz, “Future of analog in the VLSI environment,“ IEEE International
Symposium on Circuits and Systems, 1990., pp. 1372 -1375 vol.2.
[Wiki_08] “Transistor Count,” Wikipedia, http://en.wikipedia.org/wiki/Transistor_count
[Xilinx_07] Xilinx, “Virtex-II Platform FPGAs: Complete Data Sheet,” DS031 (v3.5),
November 2007, Available online:
http://www.xilinx.com/support/documentation/data_sheets/ds031.pdf
[Xue_07] X. Xue, L. Gonzalez-Argueta, V. Sundararajan, “Energy Scavenging Methods for
Wireless Sensor Networks,” IDETC 2007 September 4-7, 2007, Las Vegas, Nevada, US
MIS/Global Defense Inc.
43
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
5 Future Plans for Situational Awareness Application
Broadly, the intention is to create an app deployable across all smartphone platforms that
supports the fusion of data from all known ISR and SA systems (this effort will extend beyond
Phase II). This app would support interfacing with tactical radio networks, customizable views,
customizable information distribution, multiple map sources, tools for reporting, Blue-Force
tracking, tasking sensors and unattended vehicles, routing, and surveillance capabilities.
In the immediate future, we plan on returning to Camp Roberts for further testing and user
interaction on the ICOTS application at the beginning of August, 2011. A wider view of our
plans to further enhance ICOTS is described in the following.
5.1 Position Within the Smart Phone and Situational Awareness Ecosystem
The following briefly describe many of the systems, programs, envisioned app stores, and
devices that the iCOTS application should support.
5.1.1 Other DoD Situational Awareness systems beyond COT and DCGS
Integrated Information Management System (IIMS) – a USAF and USA sponsored; scalable
system that supports a common operational picture for commanders and geographically
separated unit control centers addressing conventional and Chemical, Biological, Radiological
and Nuclear (CBRN) events
Joint Environment Toolkit (JET): a USAF net-enabled weather service provider to facilitate
strategies in support of operational decisions.
Cross Domain Collaborative Information Environment (CDCIE): Developing out of United
States Joint Forces Command (USJFCOM) CDIE enables joint forces to share information in
the form of chat/whiteboarding (with language translation interface) and web services between
DoD and non-DoD networks of various security classifications with coalition partners, other
government agencies, and Non Governmental Organizations (NGO).
Event Management Framework (EMF): The EMF Advanced Concept Technology
Demonstration (ACTD) enables users to efficiently and effectively search, correlate, assess, and
present actionable information from disparate sources across the Air, Land, Maritime, Cyber, and
Space and Missile Defense domains.
Next Generation Wireless Communications for Logistics Applications (NGWC): An advanced
wireless mesh capability for global logistics visibility, supports today’s tactical and strategic
logisticians, operates in unimproved locations, and does not require a fixed ground infrastructure.
5.1.2 Programs
Connecting Soldiers to Digital Applications (CSDA): an initiative sponsored by the Army
Capabilities Integration Center and the Army CIO with support from the Army Training and
Doctrine Command and other Army organizations, according to an Army news release. While
Phase 1 considered several training- and office-oriented pilot projects using a variety of smart
phones, Phase 2 is more on point in its assessment of the value of smart-phone apps for tactical
operations (which applies to ICOT).
MIS/Global Defense Inc.
44
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Multi-Access Communications Extender (MACE) – a CERDEC program to develop a tactical
communications architecture that can support smartphone devices on the tactical battlefield, with
intended support for commercial smartphones.
Transformative Apps – a DARPA program to develop apps and an ecosystem for military
smartphones
5.1.3 Devices
While many smartphone devices from many different vendors are anticipated to be eventually
deployed, the GD-300 and RATS are the two leading existing solutions on which ICOT could be
deployed. Note that both are Android based and no Android phone has started going through the
process of having the National Institute of Standards and Technology certify it as secure-enough
to host government data.13 As the iPhone has started the process, this motivates our initial
targeting of the iOS family.
Android-based GD300 (General Dynamics)
Android based RATS (Raytheon)
5.1.4 App Stores
Despite statements that there is a desire to provide a common store front for all military apps,
there will likely be multiple app stores. Based on what documentation currently exists, it appears
that these will allow more interactions between users and developers than traditional app stores
and will require security approvals.
Transformative Apps Store – An app store being created by the Corporation for National
Research Initiatives (CNRI) under the Transformative Apps program.
Army Marketplace – The app store developed by the Army as an outgrowth from the Army Apps
challenge, with possible formal roll-out later this year.
13
http://www.wired.com/dangerroom/2011/04/armys-app-store-for-war/
MIS/Global Defense Inc.
45
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Figure 27: Screen Capture from pre-release version of the Army App Store: Army Marketplace
(http://www.wired.com/dangerroom/2011/04/armys-app-store-for-war/)
5.2 Collaboration Discussions
In light of a likely later need to support deployment onto the GD300 and RATS, we have begun
initial discussions with General Dynamics and Raytheon. In particular we recently submitted a
SBIR proposal to the Army where MIS/Global Defense will team with Raytheon to extend the
design of ICOTS to address the following issues:
 Supporting P2P data distribution
 User customization of distribution, views, and data sources
 An evolvable framework to support additional systems and application “mashing”
 Interfacing with Distributed Common Ground System (a Raytheon supported Situational
Awareness system used by the Air Force and Army)
 Interfacing smart phones with tactical radios via Ethernet or USB
 Securing communications appropriate for SBU, Secret and above, with a particular focus
on security ramifications of combining data from multiple sources.
5.3 Development Roadmap
Our near-term roadmap assuming funding from the SBIR is shown below. In particular there are
plans to for a capability for interfacing with DCGS and lay the foundation for creating an
extensible API for “plugging-in” interfaces and data fusion from additional ISR / SA standards
and custom sensors and UAVs. From mid 2012 on, our software will be ported to Titanium to
support additional smart phone platforms, the security and peer-to-peer communications
technologies and tactical network interfaces would be matured. In parallel to that effort, the COT
interface would be matured, a SAHANA interface created, and various features related to
enhancing situational awareness (supporting additional video feeds, telestration, after action
reporting) and core services would be developed and integrated.
MIS/Global Defense Inc.
46
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Figure 28: ICOT Roadmap assuming additional funding
Some of the planned steps include the following
 Create generalized interfaces for interfacing with most prevalent sensors and UAVs
 Develop packages for 3rd parties to develop plug-in interfaces for other sensors currently
under development.
 Stand up the server for multiple-level authentication and access and CoT data distribution
 Create a secure interface for adding the iCoT capability to authenticated smartphone
users
 Perform extensive field tests and demonstrations to ensure readiness for field deployment
and to make final revisions to the design based on user feedback
To better integrate the system (iCOT or ATAV) with vehicles, an integrated connection server
and local data cacher, which we refer to as the iNode, will be developed as shown in Figure 29.
The iNode supports a variety of interfaces and wireless connections and is responsible for
integrating data from local devices, local distribution, and interfacing with the broader CoT
network. Supported wireless interfaces include WiFi and ZigBee for interfacing smartphones,
tablets, and sensors. Supported wired interfaces include Ethernet, USB, and serial ports. By
connecting other communications assets to the iNode via the Ethernet port, the iNode will be
able to communicate over additional networks.
MIS/Global Defense Inc.
47
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Figure 29: View of iNode integration
MIS/Global Defense Inc.
48
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Appendix A
Conceptual Prototype Design Document
A.1 OVERVIEW
The RFID iPhone Reader app will offer
 asset management,
 asset tracking,
 wireless communication with RFID tagged assets,
 wireless communications with server over IP cloud with cellular, WiFi (later) HF
connections
 asset maintenance support
 search capabilities
 map view of assets by location (later directions and relative location display)
 Local storage of data for off-line management
 User authentication
This native iPhone app is coded in Objective C using Xcode. The user interface for the reader
app is designed using XCode and Interface Builder.
A.2
USER INTERFACES / VIEWS
A.2.1 Main TabBar View
The main navigation controller for reader app with the following buttons
 Connectivity button – displays connectivity view.
 Map button - displays the map view.
 Asset Manager Button – displays the asset manager view.
 RFID button – displays asset list view of nearby assets.
 Alert button – displays asset list view of all nearby asset alerts messages.
A.2.2 User Authentication
First screen shown at Reader start-up. Collects badge ID and password from user. “Login”
returns ATAV main screen or authorization failure message. UITabbar options at bottom of
screen are disabled until successful authentication is complete. Once authentication is complete,
badge ID number is shown at the top of all subsequent views except history/list views. Calls the
“user authentication” external database function.
MIS/Global Defense Inc.
49
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
A.2.3 Connectivity View
Displays connectivity options. Allows user to select connection types by toggling UISwitch for
each connection method. Displays signal strength indicators. Interfaces with iPhone reader
RFID Bluetooth using the “check connectivity” and “update connectivity” functions.
MIS/Global Defense Inc.
50
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
A.2.4 Map View
Shows user’s current location and asset(s) on UIMapView. Allows user to select pinned map
item for Asset Detail View. List button allows user to toggle assets list/type shown on map.
Search button allows user to search for a particular RFID or class of RFIDs by type, location.
Calls “asset list”, “asset detail” external database functions. When map is unavailable, displays
“NETWORK ERROR” UIAlertView message.
MIS/Global Defense Inc.
51
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
A.2.5 History/log view
Display asset history in UITableView. Shows date, time, location and event description for each
event in history. Allows user to sort table data by column.
Calls “asset history” external database function. When no data found displays “No Data Found”
or “NETWORK ERROR” in UIAlertView message.
MIS/Global Defense Inc.
52
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
A.2.6 Asset management view
Gives user option to search for assets or add a new asset. “Add asset” returns the add asset view.
Logout returns user to main login view, Info button brings up help view.
MIS/Global Defense Inc.
53
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
A.2.7 Add new asset view
Enter relevant information and add new asset to database. (UITextFields) including: capture
asset picture using UIImagePickerController, ID, Tags, manifest, comments. “Take photo”
allows user to take photo with iPhone using UIImagePickerView. “Done” submits the
transaction to the Sqllite database and the external database using the “add asset” function.
Returns “SUCCESS” or “NETWORK ERROR” in UIAlertView message.
MIS/Global Defense Inc.
54
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
A.2.8 Alert Views
Displays a list of asset alerts detected using RFID network API interface. Updates tab-bar badge
number with alert count. When data is unavailable, displays “NETWORK ERROR”
UIAlertView message.
MIS/Global Defense Inc.
55
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
A.2.9 Asset Detail
Displays detailed information about a particular asset including: a picture (if available), ID, Tags,
manifest, comments, more info link, parent ID, child IDs, time in container, time in current
location. Calls the “asset detail” external database function. When data is unavailable, displays
“NETWORK ERROR” UIAlertView message. Pressing edit button allows editing of the tags,
comments, manifest fields.
MIS/Global Defense Inc.
56
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
A.2.10 Asset List View
Shows list of assets based on location, ID, or type. Displays ID, tag, and most recent event in
UITableView. Can select asset detail for items displayed. Calls the “asset search” external
database function. Uses “detect RFID” network API function when called by RFID tabBar
button. Touching list item will bring up Asset Detail View. When list is unavailable displays
“NETWORK ERROR” UIAlertView message.
MIS/Global Defense Inc.
57
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
A.2.11 Web View
Displays UIWebView with URL provided in “asset detail” function. When URL is unavailable,
displays “NETWORK ERROR” UIAlertView message.
MIS/Global Defense Inc.
58
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
A.3 DATA INTERFACES
The iPhone reader application utilizes several data interfaces.
A.3.1 MySQL server database
Using WiFi, Cellular 3G, TCP/IP sockets and ASP.NET web services. All data is returned as a
JSON object. Database objects are parsed using an Objective C JSON data parser. The
following data interactions are used:
Asset detail – used to retrieve detailed information about an asset based on asset ID.
MIS/Global Defense Inc.
59
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
IN
ASSET RFID
OUT
TAGS
MANIFEST
REF. URL
COMMENTS
LOCATION
PARENT
CHILDREN
LAST EVENT TYPE
LAST EVENT DATE
LOCATION DATE
ARRIVAL DATE
Asset update– stores updated events or database fields for an asset, based on ID
IN
ASSET RFID
EVENT
TAGS
REF. URL
LOCATION
IMAGE
MANIFEST
COMMENTS
OUT
RESPONSE CODE
Asset search– retrieves list of assets by type or location, parent or child.
IN
OUT
TYPE/TAG
ASSET RFID
LOCATION
MANIFEST
PARENT RFID
LOCATION
CHILD RFID
IMAGE
(partial) ASSET RFID
Add asset – used to insert a new asset record into the database
IN
OUT
(ASSET RFID) server?
RESPONSE CODE
TAGS
REF. URL
LOCATION
IMAGE
MANIFEST
COMMENTS
MIS/Global Defense Inc.
60
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Asset history – retrieve management and event information for a given asset based on ID. (30
rows at a time, starting with most recent)
IN
OUT
ASSET RFID
(Start ROW, End ROW) ||
(Start DATE, End DATE)
EVENT TYPE
EVENT DATE
IMAGE OR IMAGE URL
BADGE ID
COMMENTS
IMAGE
User Authentication – authenticates iPhone RFID Reader app user login credentials against user
database. Returns a validation or failure message.
IN
OUT
BADGE ID
PASSWORD
Opt: (PICTURE)
RESPONSE CODE
ROLES
Opt: (PICTURE)
Synchronization – upload new RFID information (events) to the server. Append to end
IN
OUT
ASSET RFID
EVENT LIST
RESPONSE CODE
A.3.2 SQLlite interface
SQLLite Provides local temp storage of asset / event / management data on iPhone device when
server communication is unavailable. When server communication becomes available again,
system will upload stored data. Keeps log of all reader transactions.
A.3.3 RFID network API –
Objective C library that uses Bluetooth to detect / communicate with RFID tags. Retrieves ID
and any stored events. Provides the following functions:
 Detect RFID – returns a list of all RFID’s nearby
 RFID Change notification – notifies reader app of RFID composition changes.
 Check RFID – returns RFID ID, and stored data
 Check Connectivity – returns connectivity status and strength
 Update Connectivity – modify connection type – Bluetooth, HF, 2G, 3G, WiFi.
MIS/Global Defense Inc.
61
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
A.4
ATAV Location Detector
A.4.1 Supported APIs
Detect RFID()
Returns a list of all RFIDs nearby
Begins search for local RFIDs within range. Found RFIDs are added to a list which is returned. It
will return an empty list if no RFIDs are found.
IN
OUT
NSARRAY
Register as delegate for listenerRFID
RFIDDetect checkforRFID method invoked
Listener method returns the RFID and the GPS coordinates for each device in an NSARRAY
object:
 RFID
 LONGITUDE
 LATITUDE
 NSDICTIONARY: DESCRIPTION, EVENTID,
 DATE/TIME
Update RFID
Clears alarms, updates RFID object status.
Search detected RFIDs and checks for major alarm event. Items that have an alarm event are
added to a returned list. It will return an empty list if no alarms are found.
IN
OUT
RFID
STATUS CODE
Register as delegate for updateRFID
clearHistoryRFID
Send RFID - return status code 0=success -1= failure
clearAlarmRFID
Send RFID, alarm ID - return status 0=success -1= failure
updateStatusRFID
Send RFID, status message - return status 0=success -1= failure
Check RFID
Returns specific RFID ID, and stored data
Searches for a specific RFID and, if found, returns all data received or NIL if the requested RFID
is not found.
IN
OUT
RFID
RFID Data
MIS/Global Defense Inc.
62
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
Register as delegate for checkRFID
RFIDcheck checkRFID method invoked
Listener method returns the RFID and the GPS coordinates for each device in an NSARRAY
object:
 RFID
 LONGITUDE
 LATITUDE
 NSDICTIONARY: EVENTS/ ALARMS
 DATE/TIME
Check Connectivity – returns connectivity status and indicates signal strength
To save power network connectivity is minimal so indicated power for a given RFID refers to
the most recent connection.
.
IN
OUT
Updates
status
connectivity
Call checkConnectivy delegate function
Returns NSARRAY of TYPE and BOOLEAN for status
Update Connectivity – modify connection type (Bluetooth/WIFI)
The user is allowed to choose which method to use to connect to RFIDS.
IN
OUT
BT/WIF
RESULT CODE
BOOLEAN
Call updateConnectivy delegate function
Send TYPE and BOOLEAN value, returns TYPE and BOOLEAN for status.
A.5 Database
Database: MySQL is the DBMS for the project. There are two reasons for selecting MySQL
for the DBMS. First, iPhone actively supports connectivity to the MySQL server should the
project take a different turn and the iPhone needs direct access to data as opposed to gathering
data through a web service. Second, MySQL – natively – supports OpenGIS data structures,
which can be utilized to store asset positions in the database.
Database Terminology: When describing the database and its functions; it is important to
understand the terminology and their relationships.
1. Asset: The asset is the pallet. The pallet contains a collection of items; it is a grouping of
items. When a transaction occurs on an asset, it occurs on all items in the asset. For
MIS/Global Defense Inc.
63
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
example, if an asset is moved to a new location, all items in the asset are moved to that
location.
2. Item: The item is a single entity that is located on a pallet. This may be a box of
ammunition or other single entity. An item can be added or removed from an asset.
3. Transaction: A transaction is a specific event or action that is performed on an item or
asset. This may include moving the asset or retiring – or deleting – an item.
Database Schema: The following sections are descriptions of the tables and the relationships
between them.
1. UserInfo: The UserInfo table stores all information for authenticating users and contains
their respective flags. It also includes information regarding the user.
a. PK: The primary key of the user. It is used to uniquely identify the user.
b. strName: The name of the user.
c. strLogin: The login name of the user. This is the login string the user uses to
authenticate against the server.
d. strPassword: This is the encrypted password for the user. When authenticating
against the server, the password will be decrypted and compared against the
passed value.
e. nFlags: This is a 64-bit integer identifying the flags the user possess. The flags
identify the roles for the authenticated user, allowing or denying various features
of the system.
f. bActive: This is a boolean value, indicating if the user is active or inactive. If the
user is inactive, all authentication for this user will be disabled.
2. Asset: The Asset table contains an entire list of assets that were created for the entire
system. It also contains a description and short description of the asset.
a. PK: The primary key of the asset. It is used to uniquely identify the asset.
b. strShortDescription: A short description of the asset.
c. strDescription: A longer description of the asset. This is a more detailed
description of the asset than the strShortDescription.
3. AssetImage: The AssetImage table is a collection of images that associate with a specific
asset.
a. PK: The primary key of the asset image. It is used to uniquely identify the asset
image.
b. Asset_FK: A foreign key associating the asset image to a specific asset.
c. UserInfo_FK_EnteredBy: A foreign key associating the asset image to the user
who created the image.
d. imgAsset: The raw byte stream of the image. This is the image in binary format.
e. dtEntered: A timestamp indicating the time the image was added to the table.
f. bActive: A boolean value indicating if the image is active or inactive in the table.
4. Item: The Item table contains the entire list of items that were added to assets. It also
contains a description and short description of the item.
a. PK: The primary key of the item. It is used to uniquely identify the item.
b. strShortDescription: A short description of the item.
c. strDescription: A longer description of the item. This is a more detailed
description of the item than the strShortDescription.
MIS/Global Defense Inc.
64
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
5. ItemImage: The ItemImage table is a collection of images that associate with a specific
item.
a. PK: The primary key of the item image. It is used to uniquely identify the item
image.
b. Item_FK: A foreign key associating the item image to a specific item.
c. UserInfo_FK_EnteredBy: A foreign key associating the item image to the user
who created the image.
d. imgItem: The raw byte stream of the image. This is the image in binary format.
e. dtEntered: A timestamp indicating the time the image was added to the table.
f. bActive: A boolean value indicating if the image is active or inactive in the table.
6. AssetTransaction: The AssetTransaction table identifies all transactions for a specific
asset. It includes all movements, splits, and merges of assets. It also logs all transactions
on the item level of the asset.
a. PK: The primary key of the transaction. It is used to uniquely identify the
transaction.
b. dtTransaction: The timestamp that indicates when the transaction occurred.
c. Asset_FK: A foreign key associating this entry with a specific asset.
d. AssetTransactionType_FK: A foreign key indicating the type of transaction that
occurred. See AssetTransactionType table.
e. ptLocation: A point data type indicating the latitude and longitude for the specific
transaction. If it is null, the location where the transaction occurred is assumed to
occur at the last non-null ptLocation.
f. mTilt: The tilt value, in radians, for the specific transaction. If it is null, the tilt
where the transaction occurred is assumed to have the last non-null mTilt.
g. UserInfo_FK_ActionBy: A foreign key that indicates the user who performed the
action. If null, no user “acted on” the asset; this may include when an asset is
moved.
h. Asset_FK_MergeInto: A foreign key to an asset; it indicates that the asset
indentified by Asset_FK has been merged, or joined, into the asset identified by
Asset_FK_MergeInto.
i. Asset_FK_SplitFrom: A foreign key to an asset; it indicates that the parent asset
has been split, creating a new asset, the asset identified by the Asset_FK.
Initially, when split, no items are added to the new asset. They must be transacted
there.
j. ItemTransaction_FK: A foreign key to an ItemTransaction. If the
AssetTransaction_FK indicates that the transaction is an ItemTransaction, this
foreign key identifies this ItemTransaction.
k. bUndo: A boolean value indicating if the transaction should be undone, or
nullified. The default value for all records is false; it must be manually set to true
to nullify the transaction.
7. AssetTransactionType: This table identifies all types of asset transactions; they include
Create, Movement, Retire, Revive, Merge, Split, and Item Transaction.
a. PK: A primary key uniquely indentifying the record.
b. strDescription: A description of the transaction.
c. bActive: A boolean value indicating if the transaction type is active or inactive.
8. ItemTransaction: This table logs all transactions that are invoked on items.
MIS/Global Defense Inc.
65
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
a. PK: A primary key that uniquely identifies the record.
b. Item_FK: A foreign key to an item that this transaction was acted upon.
c. ItemTransactionType_FK: A foreign key to an ItemTransactionType that
indicates the type of transaction that occurred. See the ItemTransactionType
table.
d. Item_FK_MergeInto: A foreign key to an item; it indicates that the item –
identified by Item_FK – has been merged into another item, which is identified by
the Item_FK_MergeInto. Once merged, the item is no longer considered active.
e. Item_FK_SplitChild: A foreign key to an item; it indicates that the parent item
has been split, creating a new item, the item identified by the Item_FK.
Database Diagram:
MIS/Global Defense Inc.
66
Army Total Asset Visibility Enhanced RFID Tracking
Deliverable 5: Final Report
MIS/Global Defense Inc.
67
Download