kumoh national institute of technology
Networked Systems Lab.

Williams Paul Nwadiugwu and Dong-Seong Kim, "'Tactical & Real-time Remodeling of Unrecoverable Sensitive-Data in MIL-STD-1553 Network Protocol for Internet of Battlefield Things (IoBT)', MILCOM, Track 22019.
By : Rusyadi
Date : 2019-08-08
Views : 382

Dear Mr. Nwadiugwu Williams Paul Chukwuka:

Thank you for submitting your paper #1570562463 ('Tactical & Real-time Remodeling of Unrecoverable Sensitive-Data in MIL-STD-1553 Network Protocol for Internet of Battlefield Things (IoBT)') to MILCOM 2019 Track 2 - Networking Protocols and Performance.

Unfortunately we are not able to accept your paper for publication at MILCOM 2019 Track 2 given the limited number of slots available and the outcome of the review process.

All papers received three reviews by experts in the field, and you may find the reviews for your submission at the bottom of this message and online at https://edas.info/showPaper.php?m=1570562463.

We are sorry to share this news, but hope you find the reviews useful and look forward to your possible submissions to next year's conference.

Regards,

-------------------------------------
Claudiu Danilov and Mauro Tortonesi
MILCOM Track 2 Co-Chairs

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Reviews:


Review 1

Technical Contribution: Rate the content based on its technical strength.

Acceptable - Valid work but limited contribution (3)

Advancing Technologies / State-of-the-Art: Rate the novelty or contribution to military communications.

Some new concepts (3)

Relevance and Timeliness: Rate the relevance of the topic and the importance to military communication applications.

Questionable relevance (2)

Quality of Presentation: Rate the organization and readability of the paper.

Organization and/or writing could be improved (3)

Accept/Reject Recommendation: Do you feel that this paper should be accepted or rejected?

Reject (0)

Comments to Authors:: Please provide comments to the authors that explain your numerical ranking:

This paper presents an approach to reconstruct data sent over a MIL-STD-1553 bus.

It's not clear what specific use cases are being addressed by the proposed approach or how this relates to IoBT specifically.

The work would be strengthened by including a quantitative comparison to other possible data encoding techniques.

Similarly, it would be helpful to compare the overhead and delay of the method presented to other possible error correction or retransmission techniques.

Review 2

Technical Contribution: Rate the content based on its technical strength.

Good - Solid work of notable importance (4)

Advancing Technologies / State-of-the-Art: Rate the novelty or contribution to military communications.

Some new concepts (3)

Relevance and Timeliness: Rate the relevance of the topic and the importance to military communication applications.

Relevant (4)

Quality of Presentation: Rate the organization and readability of the paper.

Good organization and writing (4)

Accept/Reject Recommendation: Do you feel that this paper should be accepted or rejected?

Accept if room (3)

Comments to Authors:: Please provide comments to the authors that explain your numerical ranking:

Your work highlights an important contribution in ensuring message delivery, even if ECC methods fail. That said, it would be great to see more detail around actual implementations as a logical next step--while your algorithm code looks straightforward, it would be valuable to develop a prototype in existing hardware and benchmark.

Review 3

Technical Contribution: Rate the content based on its technical strength.

Good - Solid work of notable importance (4)

Advancing Technologies / State-of-the-Art: Rate the novelty or contribution to military communications.

Some new concepts (3)

Relevance and Timeliness: Rate the relevance of the topic and the importance to military communication applications.

Somewhat relevant (3)

Quality of Presentation: Rate the organization and readability of the paper.

Organization and/or writing could be improved (3)

Accept/Reject Recommendation: Do you feel that this paper should be accepted or rejected?

Accept if room (3)

Comments to Authors:: Please provide comments to the authors that explain your numerical ranking:

*Technical Contribution: The author present an algorithm based on Bezier Curves designed to recover data that could not be recovered by error correction with the understanding that a re-transmission can be very expensive in tactical networks. The problem is described thoughtfully and a mathematical analysis of problem and solution is provided.

*Advancing Technologies / State-of-the-Art: The authors present an incremental improvement to an already established protocol.

*Relevance and Timeliness: The problem described and the solution are relevant but it is likely that radio hardware and firmware evolution will soon shadow the contribute.

*Quality of presentation: Numerous minor spelling errors such as missing s, round brace, and obscure sentences. Space dedicated to results quite limited. Very limited description of simulation's Hardware and software that should be used to reproduce the experiment.
Attachments
Attachment 1:   ÷ Mi.PNG(85.6KB)