Categories
Papers

Towards RPR FOM 3: Revisiting the Datatypes

ABSTRACT: Version 2 of the Real-time Platform Reference FOM (RPR FOM) has recently been finalized. It is the most widely used FOM for defense simulations. The original purpose of the RPR FOM was to facilitate interoperability between the DIS protocol and HLA federations. Today it is often also used as a common basis for further adaptation and extensions in US and NATO federations.


One of the main goals of the final phase of the RPR FOM 2 development was to maintain buffer compatibility with the widely used draft 17 of the RPR FOM 2. This in turn carries a lot of heritage from both the DIS protocol and the HLA version 1.3, including many convoluted data buffer layouts. Today these may not be seen as striking the best balance between low bandwidth utilization, simple encoding and decoding, flexibility and extensibility.


Now the time may have come to revisit the RPR FOM data representations for RPR FOM version 3. In addition to the
reviewing the record data structures, a goal could be to remove the RPR FOM specific datatype encodings such as the length less array representations. Furthermore, an attempt to generate the Enumerations module from the SISO-REF010 XML source showed that some enumerations may need to be reconsidered or moved to other modules. The RPR FOM 2 work has also revealed that some new datatypes may need to be added to the HLA standard, in particular to represent unsigned integers that are used in DIS.


This paper provides an analysis and recommendation for the RPR FOM 3 development and to some extent for the next version of HLA.

Authors: Björn Möller, Aaron Dubois, Patrice Le Leydour, Graham Shanks, René Verhage, Fredrik Antelius
Publication: Proceedings of 2015 Fall Simulation Interoperability Workshop, 15F-SIW-039, Simulation Interoperability
Standards Organization, September 2015

Download the full paper (pdf)

Categories
Papers

Using HLA Object Models for the Analysis of Cross Domain Security Policies

ABSTRACT: Across defence, training equipment, data and scenarios are likely to have different classification levels. Thus it is sometimes necessary for training to be carried out using a federation of participating systems
running at different classification levels, but without compromising security rules. This is usually done using guards and filters to limit the data that may be released from the higher security domain to the lower security
domain. In some cases, limiting the data may negatively impact the training and make it impossible to meet all the training goals. When following the process from design to security accreditation it is crucial to understand
how to meet security requirements while also understanding the impact this will have on the training.


This paper suggests an approach based on a description of the data exchange using the object models of the High Level Architecture. One type of object model is the Federation Object Model (FOM). It specifies the type and format of any data exchanged in the federation. This includes descriptions of objects (such as aircraft, soldiers and weapons) and interactions (such as orders, fire and detonation). Another type of object model is the Simulation Object Model (SOM). This is used to describe which objects and interactions are published (produced) and subscribed (consumed) by any one simulation system. The proposed method uses the SOMs to analyse the data flow within and between the different security domains.


It allows the user to suggest different security policies. It then provides an automatic analysis that can be used to analyse the effect from both training and security perspective. This analysis can be performed for standard
FOMs, like RPR FOM and NATO NETN FOM as well as extensions of these and project specific FOMs.


The proposed method can be used as a basis for a dialog between accreditors and developers of training federations. This can help to avoid security issues, to understand the impact of training goals and also to detect any technical issues that may be introduced by the presence of a guard.

Authors: Björn Möller, Stella Croom-Johnson, Åsa Falkenjack, Kester Hughes
Publication: Proceedings of 2015 Fall Simulation Interoperability Workshop, 15F-SIW-038, Simulation Interoperability Standards Organization, September 2015.

Download the full paper (pdf)