Presentation + Paper
30 May 2022 Secure Internet of Things Architecture (SIoTA) on the battlefield
Author Affiliations +
Abstract
The future of military combat brings a comprehensive suite of interconnected physical objects that are embedded with sensors, processing capabilities, and software that will exchange data in real time over both public facing internet services and dedicated military communications networks. New interconnected devices could include anything from combat gear embedded with biometric wearables, sensors for collection of imagery, audio, video, electromagnetic signals, chemical and biological agents, smart guns, and other military equipment that will advance that state of interconnected military arsenal. Adding to this evolving complexity will be new processing accelerators, distributed cloud environments, next generation cellular towers, distributed applications, sensing devices, and crowed-sourced intelligence we hope to leverage from the commercial sector. Predictive battlefield analytics and robust security strategies must be implemented for this ecosystem to be successful and not present a “weak link” for our adversary to exploit. Decentralization, low power consumption, and security are also vital to an Internet of Things (IoT) network architecture operating on the battlefield. In this investigative study, a hierarchical approach is explored. Principles of Zero-Trust which assume there is no implicit trust granted to assets based solely on their physical or network location are explored to ensure the robustness and security of the ecosystem. We explore a theoretical IoT network design using LoRaWAN (Long Range Wide Area Networks) and Distributed Ledger Technology (DLT) that is secure and decentralized while meeting low power requirements. To achieve this in a military operational environment, a private blockchain will be explored that has been developed by the Linux Foundation called the Hyperledger Fabric. This private blockchain based ecosystem provides a modular enterprise distributed framework with plug-and-play capabilities, decentralization, scalability, immutability, and a tailorable consensus mechanism. Integrating these capabilities will enable a more secure ecosystem of bi-directional communication, end-to-end security, and mobility.[1]
Conference Presentation
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jon Williams, Hannah Hong, Larry Crosby, James Potter, Jon Neyer, Isaac Thompson, and Rob Branson "Secure Internet of Things Architecture (SIoTA) on the battlefield", Proc. SPIE 12117, Disruptive Technologies in Information Sciences VI, 121170D (30 May 2022); https://doi.org/10.1117/12.2622823
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Network architectures

Internet

Data communications

Defense and security

Sensors

Computer security

RELATED CONTENT

Improved security monitoring method for network bordary
Proceedings of SPIE (March 20 2013)
Communication networks for the tactical edge
Proceedings of SPIE (April 25 2017)
A case of reliable remote functionality
Proceedings of SPIE (July 15 2008)
Dynamic immune intrusion detection system for IPv6
Proceedings of SPIE (March 28 2005)
Internet firewalls: questions and answers
Proceedings of SPIE (March 12 1996)

Back to Top