Iot for defense and national security robert douglass - Quickly download the ebook to never miss imp

Page 1


https://ebookmass.com/product/iot-for-defense-and-national-

Fetal and Neonatal Physiology, 2-Volume Set 6th

Edition

https://ebookmass.com/product/fetal-and-neonatal-physiology-2-volumeset-6th-edition-richard-a-polin/

ebookmass.com

Operative Techniques: Orthopaedic Trauma Surgery 2nd Edition Emil H. Schemitsch

https://ebookmass.com/product/operative-techniques-orthopaedic-traumasurgery-2nd-edition-emil-h-schemitsch/

ebookmass.com

Assessing Students with Special Needs – Ebook PDF Version

https://ebookmass.com/product/assessing-students-with-special-needsebook-pdf-version/

ebookmass.com

Foreign Exchange: Practical Asset Pricing and Macroeconomic Theory 1st ed. 2022 Edition Iqbal

https://ebookmass.com/product/foreign-exchange-practical-assetpricing-and-macroeconomic-theory-1st-ed-2022-edition-iqbal/

ebookmass.com

Introduction to Forensic and Criminal Psychology 7th Edition Dennis Howitt

https://ebookmass.com/product/introduction-to-forensic-and-criminalpsychology-7th-edition-dennis-howitt/

ebookmass.com

IEEEPress

445HoesLane Piscataway,NJ08854

IEEEPressEditorialBoard

SarahSpurgeon, EditorinChief

JónAtliBenediktsson

AnjanBose

AdamDrobot

Peter(Yong)Lian

AndreasMolisch

SaeidNahavandi

JeffreyReed

ThomasRobertazzi

DiomidisSpinellis

AhmetMuratTekalp

IoTforDefenseandNationalSecurity

Editedby

RobertDouglass AltaMontes,Inc.,USA

KeithGremban UniversityofColoradoSchoolofLaw,Boulder,CO,USA

AnanthramSwami ArmyResearchLaboratory,Adelphi,MD,USA

StephanGerali LockheedMartin,Inc.,Bethesda,MD,USA

Contents

ListofContributors xix

Introduction:IoTforDefenseandNationalSecurity xxv RobertDouglass

Section1Introduction:Vision,Applications,andOpportunities 1 StephanGerali

1InternetofBattlefieldThings:Challenges,Opportunities,andEmerging Directions 5 MaggieWigness,TarekAbdelzaher,StephenRussell,andAnanthramSwami

1.1IoBTVision 5

1.2IoBTvs.IoT 6

1.3IoBTOperationalRequirements 7

1.4AnOrganizingConcept 8

1.4.1TheMDOEffectLoop 9

1.4.2TechnicalChallenges 11

1.4.2.1CompositionalityandSynthesis 11

1.4.2.2TimelinessandEfficiency 12

1.4.2.3RobustnesstoAdversarialDisruption 12

1.4.2.4DeployabilityatthePointofNeed 12

1.5PerformantandResilientIoBTs 13

1.5.1CompositionalityandSynthesis 13

1.5.2TimelinessandEfficiency 14

1.5.3RobustnesstoAdversarialDisruption 15

1.5.4DeployabilityatthePointofNeed 16

1.6FutureDirections 16

1.6.1Multi-tenancyandMultiplicityofUse 17

1.6.2MultiplicityofFunction 17

1.6.3Non-stationarityandMultiplicityofPerturbations 18

1.6.4MultiplicityofSensingModalities 18

1.6.5MultiplicityofTime-scales 18

1.6.6Architecture 19

1.7Conclusion 19 References 20

2SensorizedWarfighterWeaponPlatforms:IoTMakingtheFogofWar

Obsolete 23

KyleBroadway

2.1Introduction 24

2.2 IoT forFirearms 26

2.3NewInsightsintotheBattlefieldProvidedby IoT 27

2.4Challengesfor IoT inSoldierWeapons 31

2.5BattlefieldChallengestoAggregatingandExfiltratingData 32

2.6ProtectionandSecurityfor IoT DataCommunication 34

2.7StateoftheArt 37

2.8Conclusion 37

References 38

3IoBTResourceAllocationviaMixedDiscreteandContinuous Optimization 39

JonathanBuntonandPauloTabuada

3.1Introduction 39

3.2LatticesandSubmodularFunctions 42

3.3ProblemFormulation 43

3.4AnEquivalentParameterization 44

3.5ReturningtoConstraints 47

3.5.1KnapsackConstraints 48

3.5.2ContinuousBudgetConstraints 49

3.6ComputationalExamples 50

3.6.1UnconstrainedOptimization 50

3.6.2Knapsack-ConstrainedAllocations 51

3.6.3ContinuousBudget-constrainedAllocations 54

3.7Conclusions 55 References 55

4OperationalizingIoTDataforDefenseandNationalSecurity 59

SteveMorganandJaimeWightman

4.1Introduction 59

4.2ProblemStatement 60

4.3Challenges 62

4.4SecurityConsiderations 64

4.5DevelopingaStrategyforOperationalizingData 65

4.6Precedence 69

4.7EndState 70

4.8Conclusion 71 References 71

5RealTimeMonitoringofIndustrialMachinesusingAWSIoT 73

StephanGerali

5.1ProblemStatement 73

5.2SolutionStatement–Overview 74

5.3SolutionStatement–EdgeComputing 74

5.4SolutionStatement–CloudConnectivity 75

5.5SolutionStatement–StreamingAnalyticsandDataStorage 76

5.6SolutionStatement–DataVisualization 77

5.7SolutionStatement–ExampleDataVisualizations 78

5.8Results 79

5.9NextSteps 79 References 80

6ChallengesandOpportunitiesofIoTforDefenseandNationalSecurity Logistics 83

GiseleBennett,WilliamCrowder,andChristinaBaxter

6.1Introduction 83

6.2LinkingIndustryandDoDUsesofIoT 84

6.3SituationalAwareness 85

6.3.1PolicyandLegalImplications 85

6.3.2ChallengesandConsiderations 86

6.4ApplicationsforDoD 86

6.4.1SituationalAwarenessofPeopleandEquipmentforMaintainabilityand Sustainability 86

6.4.2DataCollectionforReal-timeandPredictiveCBM 87

6.4.3PrepositioningandPlanningforPeopleandSupplies(Prepo-in-motion) 88

6.4.4IoTatDoDInstallations 90

6.4.4.1EnergyManagement 90

6.4.4.2InstallationsasTrainingPlatforms 91

6.4.5IoTandEmergencyResponse 91

6.4.6IoTandDisasterResponse 92

6.5ObservationsontheFuture 93 Acknowledgement 94 References 94

7DigitalTwinsforWarshipSystems:Technologies,Applicationsand Challenges 97

SaraFerreno-Gonzalez,AliciaMunin-Doce,MarcosMíguezGonzález,LucíaSantiago Caamaño,andVicenteDiaz-Casas

7.1Introduction 97

7.2ADigitalTwinArchitectureforImplementation 99

7.2.1PhysicalLevel 99

7.2.2PhysicalWorld/VirtualWorldInterface 101

7.2.3DigitalTwin 102

7.2.3.1IntegrationofFunctionalities:UserInterfaces 102

7.2.3.2SimulationModels 103

7.2.3.3DataStorageandDataLakes 106

7.2.3.4DataAnalysis,MachineLearning,andPredictiveAlgorithms 107

7.3ShipDigitalTwinImplementation 108

7.3.1PhysicalLevel 108

7.3.2PhysicalWorld/VirtualWorldInterface 109

7.3.3IntegrationofFunctionalitiesandtheUserInterface 110

7.3.4SimulationModels 110

7.3.5DataAnalysis,MachineLearning,andPredictiveAlgorithms 111 References 111

Section2Introduction:ArtificialIntelligenceandIoTforDefenseand NationalSecurity 115 RobertDouglass

8PrinciplesofRobustLearningandInferenceforIoBTs 119 NathanielD.Bastian,SusmitJha,PauloTabuada,VenugopalVeeravalli,andGunjanVerma

8.1InternetofBattlefieldThingsandIntelligence 119

8.2DimensionsofResponsibleAI 120

8.2.1ResearchChallengesinIoBTs 121

8.2.2Trust,ResilienceandInterpretability 122

8.3DetectingSurprise:AdversarialDefenseandOutlierDetection 123

8.4NovelDeepLearningRepresentation:DynamicalSystem 124

8.5RobustSecureStateEstimation 125

8.6DistributionallyRobustLearning 126

8.7FutureDirections 127

8.8Conclusion 128 References 128

9AIattheEdge:Challenges,Applications,andDirections 133 DhirajJoshi,NirmitDesai,ShyamaProsadChowdhury,Wei-HanLee,LuisBathen, ShiqiangWang,andDineshVerma

9.1Introduction 133

9.2IoTApplications 134

9.2.1VisualInspectionofAssets 135

9.2.1.1VisualRecognition 135

9.2.1.2AIOptimization 135

9.2.1.3FixedIoTSensorsvs.RIDs 135

9.2.2ThermalInspectionofAssets 135

9.2.2.1InspectionatElectricSubstations 136

9.2.2.2ProposedAutomation 136

9.2.3InspectionofAnalogMetersandGauges 137

9.2.3.1GaugeDetection 137

9.2.3.2PerspectiveCorrection 138

9.2.3.3PointerDetectionandTextRecognition 138

9.2.4OtherDefenseandCommercialUseCases 138

9.3DistributedAIArchitecture 138

9.3.1Background:CentralizedAIandEdgeAI 139

9.3.1.1CentralizedAI 139

9.3.1.2EdgeAI 140

9.3.2OpenChallengesinEdgeAI 141

9.3.3NewParadigm:DistributedAI 142

9.4Technology 143

9.4.1DataOps 143

9.4.1.1StatisticalSummaries 143

9.4.1.2DimensionalityReduction 144

9.4.1.3SamplingfromOriginalSpace 144

9.4.2ModelOps 144

9.4.2.1OODDetectionAlgorithm 145

9.4.2.2Experiments 147

9.4.3OptimizationandAdaptation 147

9.4.3.1ModelPruning 148

9.4.3.2ModelQuantization 148

9.4.3.3OtherSchemes 149

9.4.3.4Experiments:ModelOptimizationforAssetInspection 149

9.4.4FederatedLearning 149

9.4.4.1ResourceEfficiencyofFL 151

9.4.4.2PrivacyConsiderations 151

9.5ResearchDirections 152

9.5.1LearningwithResourceOptimization 152

9.5.2CollaborationAmongHumansandRobots 152

9.5.3Multi-modalLearning 153

9.5.3.1Context-basedMulti-modalSensing 153

9.5.3.2AdaptiveNavigationtoOptimizeSensing 154

9.6Conclusions 155 References 155

10AIEnabledProcessingofEnvironmentalSoundsinCommercialandDefense Environments 161

DavidWood,Jae-wookAhn,SeraphinCalo,NancyGreco,KeithGrueneberg, TadanobuInoue,DineshVerma,andShiqiangWang

10.1Introduction 161

10.1.1Challenges 162

10.1.2SystemOverview 165

10.1.3IoTAcousticsvs.SpeechRecognition 166

10.2UseCases 166

10.2.1DefenseUseCases 166

10.2.1.1PerimeterDefense 167

10.2.1.2VehicleClassification 167

10.2.1.3ActivationofOtherModalities 167

10.2.1.4FleetandFacilitiesMaintenance 168

10.2.2CommercialUseCases 168

10.2.2.1Manufacturing 168

10.2.2.2VehicleMonitoring 168

10.2.2.3AnimalHusbandry 169

10.2.2.4Healthcare 169

10.2.2.5Security 169

10.3SystemArchitecture 169

10.4Technology 171

10.4.1DataManagementandCuration 171

10.4.2ModelTrainingPipeline 173

x Contents

10.4.3Models 175

10.4.3.1ShallowModels 176

10.4.3.2DeepModels 176

10.4.3.3InferencePerformanceontheEdge 177

10.4.4AnomalyDetection 178

10.4.5ModelDrift 179

10.4.6ModelUpdate/Evolution 180

10.4.7ModelAdaptation 181

10.5Summary 182

References 183

Section3Introduction:Security,Resiliency,andTechnologyfor AdversarialEnvironments 187 AnanthramSwami

11AssurancebyDesignforCyber-physicalData-drivenSystems 191 SatishChikkagoudar,SamratChatterjee,RameshBharadwaj,AuroopGanguly, SastryKompella,andDarleneThorsen

11.1Introduction 191

11.1.1FormalMethodsforSoftwareIntensiveSystems 194

11.1.2AdaptingFormalMethodsforDataDrivenSystems 195

11.2MethodsforAssurance 196

11.2.1ToolsforInformationFreshness 196

11.2.2MethodsforDecisionAssurance 198

11.2.2.1ScenarioGenerationforCPDDSs 198

11.2.2.2ConsequenceAssessmentforCPDDSs 202

11.2.3AssuranceofInterconnectedNetworkedCPDDSs 202

11.2.3.1NetworkRepresentation 204

11.2.3.2DynamicCascadeModeling 205

11.2.3.3Multi-AgentDecisionOptimization 206

11.3DiscussionandConclusion 207 References 208

12VulnerabilitiesinIoTSystems 213 ZhengFangandPrasantMohapatra

12.1Introduction 213

12.1.1IoTSystemComponents 214

12.1.2VulnerabilitiesandThreats 215

12.1.2.1Devices 215

12.1.2.2CommunicationProtocols 216

12.1.2.3IoTApplications 216

12.1.2.4PhysicalMedium 216

12.1.2.5MobileApps 217

12.2Firmware 217

12.2.1UnprotectedNetworkServices 217

12.2.2UnprotectedFirmwareUpdating 218

12.2.3BufferOverflow 219

13.3.1.1PortScanning 243

13.3.1.2Telnet/SSH/HTTPBruteforce 244

13.3.1.3SYN/ACK/UDP/HTTPFlooding 244

13.3.2IoT-specificNetwork-layerAttacks 244

13.3.2.1HelloFloodAttack 244

13.3.2.2NeighborAttack 244

13.3.2.3DISAttack 244

13.3.2.4SinkholeAttack 244

13.3.2.5WormholeAttack 244

13.3.2.6Grayhole(orSelectiveForwarding)Attack 244

13.3.3IoT-specificApplication-layerAttacks 245

13.3.3.1CONNECT/CONNACKFlooding 245

13.3.3.2CoAPRequest/ACKFlooding 245

13.4ProposedIDSesforIoT 245

13.4.1DefinitionofNormal/AbnormalBehavior 245

13.4.1.1LegitimateIPAddresses 245

13.4.1.2Threshold 246

13.4.1.3Automata 247

13.4.1.4FederatedLearning 248

13.4.2EnhancementsofML-basedDetectors 249

13.4.2.1CompressionHeaderAnalyzerIntrusionDetectionSystem(CHA-IDS) 249

13.4.2.2E-Spion 249

13.4.2.3Deeplearning-basedIDS(DL-IDS) 249

13.4.2.4MulticlassClassificationProcedure 249

13.4.2.5Discussion 249

13.4.3LightweightDetectorImplementation 250

13.4.3.1RaspberryPiIDS(RPiDS) 250

13.4.3.2PassbanIDS 250

13.4.3.3Discussion 250

13.4.4CombinationofDiverseDetectors 250

13.4.4.1IDSwithGame-theoreticMethodology 251

13.4.4.2HybridIntrusionDetectionandPreventionSystem(IDPS) 251

13.4.4.3IDPS 251

13.4.4.4Discussion 251

13.4.5OptimalDetectorSelection 252

13.4.5.1Kalis 252

13.4.5.2Reinforcementlearning-basedIDS(RL-IDS) 252

13.4.5.3Discussion 252

13.5ResearchDirections 252

Acknowledgement 254 References 255

14BringingIntelligenceattheNetworkDataPlaneforInternetofThings Security 259

QiaofengQin,KonstantinosPoularakis,andLeandrosTassiulas

14.1Introduction 259

14.2RelatedWork 262

15.5.1.5OpenOpportunities 297

15.5.2ByzantineFault-tolerantDistributedComputing 298

15.5.2.1OpenOpportunities 299

15.5.3GreyResourceAccumulation 300

15.5.3.1OpenOpportunities 301

15.5.4CryptographicApproaches 301

15.5.4.1OpenOpportunities 302

15.5.5SecureComputationwithTrustedExecutionEnvironments 302

15.5.5.1OpenOpportunities 302

15.6Summary 302

Acknowledgment 303

References 303

16EnsuringtheSecurityofDefenseIoTThroughAutomaticCode Generation 307

M.DouglasWilliamsandRobertDouglass

16.1TheChallengeofIoTinDefenseandNationalSecurityApplications: TheChallenge 307

16.2Solutions 308

16.2.1ControltheInterfacesBetweenIoTElements 309

16.2.2ProblemswithTraditionalApproachestoMalwareProtection 309

16.2.3TraditionalApproachestoSecurity:Hardware 309

16.2.4TraditionalApproachestoSecurity:Simulation 310

16.2.5TraditionalApproachestoSecurity:Software 310

16.2.5.1CodingWeaknesses,SoftwareVulnerabilitiesandMalware 310

16.2.5.2TraditionalApproachesforProtectingIoTSoftware 311

16.2.5.3ImprovementsonTraditionalSoftwareApproaches 311

16.2.6Auto-codeGenerationforVulnerability-freeIoT 312

16.2.6.1ApplyingAuto-codeGenerationSelectivelyforIoTNetworkSecurity 312

16.2.6.2APracticalApproachtoGeneratingVulnerability-freeIoTNetworks 312

16.3AutomaticCodeGeneration 312

16.3.1CoreAuto-generationEngine 314

16.3.2SemanticDefinitionsofSoftwareFunctions 314

16.3.3FormalMethodsforVerifyingSemanticDefinitions 316

16.3.3.1StaticAnalysisforVerifyingCodeGeneratorProducesVulnerability-freeCode 317

16.3.4AnExtendedExample:AutomaticGenerationofRouterSoftware 319

16.4IoTInterface-codeIssuingAuthority 319

16.4.1RoleofIoTInterface-codeAuthority(IICA) 320

16.4.2PrecedentsandExamplesandaProposedIoTInterfaceCodeAuthority 320

16.5Conclusions 321

References 322

Section4Introduction:CommunicationsandNetworking 325 KeithGremban

17LeveragingCommercialCommunicationsforDefenseIoT 327 KeithGrembanandPaulJ.Kolodzy

17.1Introduction 327

17.2KeyDifferencesBetweenDefenseandCommercialCommunications Requirements 329

17.2.1Interoperability 329

17.2.2Mobility 330

17.2.3Security 330

17.2.4Vulnerability 331

17.3KeyDifferencesBetweenDefenseandCommercialTechnologyDevelopment 332

17.4CommercialCommunicationsforUseinDefenseandHomelandSecurity 334

17.5Conclusion 337

References 337

18MilitaryIoT:TacticalEdgeCloudsforContentSharingAcrossHeterogeneous Networks 339 TimStrayer,SamNelson,DanCoffin,BishalThapa,JoudKhoury,ArmandoCaro, MichaelAtighetchi,andStephaneBlais

18.1Introduction 339

18.2TheNeedforTacticalEdgeClouds 341

18.3TwoArchitectures 342

18.3.1ArchitectureParadigm1:DARPACBMEN 342

18.3.2ArchitectureParadigm2:DARPADyNAMO 345

18.4TacticalEdgeCloudArchitecturalInsights 347

18.4.1InformationGenerationandDiscovery 347

18.4.2InformationAvailability 349

18.4.3ControllingAccess 349

18.4.4InformationQualityofService 350

18.4.5InformationImportance 350

18.5Summary 351 Acknowledgment 351 References 351

19SpectrumChallengesintheInternetofThings:StateoftheArtand NextSteps 353 FrancescoRestuccia,TommasoMelodia,andJonathanAshdown

19.1Introduction 353

19.2SpectrumBandsofInterestintheInternetofThings 356

19.2.1Low-bandsandMid-bands 356

19.2.1.1Millimeter-WaveBands 357

19.2.1.2VisibleLightandCommunicationsAbove100GHz 357

19.3SpectrumManagementintheInternetofThings:RequirementsandExisting Work 358

19.4SpectrumManagementintheInternetofThings:TheWayAhead 360

19.4.1ProtectingPassiveandIncumbentUsersfromIoTInterferencein SharedBands 360

19.4.2ExperimentalSpectrumSharingatScaleThroughtheColosseumandNSFPAWR Testbeds 362

19.4.3RobustMachineLearningforEffective,ReliableandEfficientSpectrum Management 363

19.4.4TheRoleofO-RANinSpectrumSharing 365

21.2.1.1TheNeedandBasisforanIoTFrameworktoProtectHumanRights 433

21.2.1.2ConsentbythePublicandtheGoverned 434

21.2.1.3Transparency:TheFoundationofConsent 436

21.2.1.4AccountabilityandConsequences 437

21.2.1.5SecurityandIntegrity 439

21.3TypesofAbuseandMisuse,andPreventionThroughRegulation 440

21.3.1TypesofAbuseofIoT 440

21.3.1.1Type1Abuse:IllegalorUnethicalAbusebyIndividualsorOrganizations 440

21.3.1.2Type2Abuse:LegalAbuseofIoTWithoutConsentorBenefittoUsersorOwners 443

21.3.1.3Type3Abuse:GovernmentAbuseWhileUsingIoTforPublicDefense,Health,Safety, andWellbeing 449

21.3.1.4Type4Abuse:GovernmentUseofIoTtoEnhanceItsOwnPowerandEnrich Officials 453

21.3.2RegulatingIoTtoPreventAbuseWhileAdvancingItsBenefits 454

21.3.2.1TheRighttoLimitandRegulateIoT 454

21.3.2.2RegulatingIoT:ASummary 457

21.4ConcludingRemarks:ACalltoAction 457

References 458 Index 467

ListofContributors

TarekAbdelzaher DepartmentofElectricalandComputer Engineering

UniversityofIllinoisatUrbana-Champaign Urbana IL USA

Jae-wookAhn IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA

JonathanAshdown AirForceResearchLaboratory Rome NY USA

MichaelAtighetchi RaytheonBBN Cambridge MA USA

NathanielD.Bastian ArmyCyberInstitute UnitedStatesMilitaryAcademy WestPoint NY USA

LuisBathen IBMResearch–Almaden IBM

SanJose CA USA

ChristinaBaxter EmergencyResponseTIPS LLC MelbourneBeach FL USA

GiseleBennett MEPSSLLC IndianHarbourBeach FL USA

ElisaBertino DepartmentofComputerScience PurdueUniversity WestLafayette IN USA

RameshBharadwaj InformationTechnologyDivision U.S.NavalResearchLaboratory Washington DC USA

xx ListofContributors

StephaneBlais RaytheonBBN

Cambridge MA

USA

KyleBroadway ChiefTechnologyOfficer ArmamentsResearchCompany UniversityofMissouri Columbia MO USA and JohnsHopkinsUniversity Baltimore USA

JonathanBunton DepartmentofElectricalandComputer Engineering UniversityofCalifornia LosAngeles CA USA

SeraphinCalo IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA

ArmandoCaro RaytheonBBN Cambridge MA USA

SamratChatterjee

DataSciences&MachineIntelligenceGroup PacificNorthwestNationalLaboratory Richland WA

USA

SatishChikkagoudar InformationTechnologyDivision U.S.NavalResearchLaboratory Washington DC

USA

ShyamaProsadChowdhury IBMGBS

IBMIndia

Kolkata WB India

DanCoffin RaytheonBBN Cambridge MA USA

WilliamCrowder LogisticsManagementInstitute Tyson VA USA

NirmitDesai IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA

VicenteDiaz-Casas GrupoIntegradodeIngenierÍa CITENI

CampusIndustrialdeFerrol UniversidadedaCoruña Ferrol Spain

RobertDouglass AltaMontes Sandy UT USA

TadanobuInoue

IBMResearch

IBMJapan Chuo-ku Tokyo Japan

SusmitJha Neuro-symbolicComputingandIntelligence CSL

SRIInternational MenloPark CA USA

DhirajJoshi IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA

JoudKhoury RaytheonBBN Cambridge MA USA

PaulJ.Kolodzy KolodzyConsulting,LLC FallsChurch VA USA

SastryKompella InformationTechnologyDivision U.S.NavalResearchLaboratory Washington DC USA

BhaskarKrishnamachari DepartmentofElectricalandComputer Engineering UniversityofSouthernCalifornia LosAngeles CA USA HyunwooLee DepartmentofComputerScience PurdueUniversity WestLafayette IN USA

Wei-HanLee IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA

NinghuiLi DepartmentofComputerScience PurdueUniversity WestLafayette IN USA

TommasoMelodia DepartmentofElectricalandComputer Engineering NortheasternUniversity Boston MA USA

SteveMorgan ChiefTechnologyOffice RaftLLC Herndon VA USA

PrasantMohapatra DepartmentofComputerScience UniversityofCalifornia Davis CA USA

AnandMudgerikar DepartmentofComputerScience

PurdueUniversity WestLafayette IN USA

AliciaMunin-Doce GrupoIntegradodeIngenierÍa CITENI

CampusIndustrialdeFerrol UniversidadedaCoruña Ferrol Spain

SamNelson RaytheonBBN Cambridge MA USA

KonstantinosPoularakis DepartmentofElectricalEngineering& InstituteforNetworkScience

YaleUniversity NewHaven CT USA

FrancescoRestuccia DepartmentofElectricalandComputer Engineering

NortheasternUniversity Boston MA USA

ListofContributors

StephenRussell DepartmentofResearchOpportunitiesand Innovation

JacksonHealthSystem Miami FL USA

QiaofengQin DepartmentofElectricalEngineering& InstituteforNetworkScience

YaleUniversity

NewHaven CT USA

GowriSankarRamachandran SchoolofComputerScience QueenslandUniversityofTechnology

Brisbane Queensland Australia

LucíaSantiagoCaamaño GrupoIntegradodeIngenierÍa CITENI

CampusIndustrialdeFerrol UniversidadedaCoruña Ferrol Spain

TimStrayer RaytheonBBN Cambridge MA USA

AnanthramSwami U.S.ArmyDEVCOMArmyResearch Laboratory

U.S.ArmyFuturesCommand Adelphi MD USA

PauloTabuada

DepartmentofElectricalandComputer

Engineering UniversityofCalifornia LosAngeles CA USA

LeandrosTassiulas

DepartmentofElectricalEngineering& InstituteforNetworkScience YaleUniversity NewHaven CT USA

BishalThapa RaytheonBBN Cambridge MA USA

DarleneThorsen

DataSciences&MachineIntelligenceGroup PacificNorthwestNationalLaboratory Richland WA USA

VenugopalVeeravalli

ECEDepartment UniversityofIllinoisatUrbana-Champaign Champaign IL USA

DineshVerma

IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA

GunjanVerma

U.S.ArmyDEVCOMArmyResearch Laboratory

U.S.ArmyFuturesCommand Austin TX USA

ShiqiangWang

IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA

JaimeWightman ChiefDataandAnalyticsOffice LockheedMartinCorporation

Bethesda MD USA

MaggieWigness

U.S.ArmyDEVCOMArmyResearch Laboratory

U.S.ArmyFuturesCommand Adelphi MD USA

DavidWood

IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA

Introduction:IoTforDefenseandNationalSecurity

RobertDouglass

AltaMontes,Inc.,Sandy,Utah,USA

1AnIntroductiontotheTopicofIoTforDefenseandNational Security

TheInternetofThings,IoT,connectsphysicalobjectsthroughdigitalnetworks.Itfusessensors, processors,datastorage,smartalgorithms,andactuatorstoobserveandphysicallyaltertheworld andthepeopleinit.Inthewinterof2022,IoTweaponswieldedbybadlyoutnumberedbut determinedandcourageousUkrainianlightinfantrywonthebattleofKyiv,destroyinghundreds ofRussiantanksandperhapsthousandsofmilitaryvehiclesalongwiththeRussiansoldiersin them.Javelinanti-tankmissilesandSwitchbladeloiteringmissileswereinstrumentalinsecuring Ukraine’svictory.JavelinsarenascentIoTweaponswhileSwitchblademissilesarequintessential IoTsystems.Theymovetheirhumanoperatorsbackfromthemosthazardouscombatzones.They operatewithadiversecollectionofsensorsandactuators,wiredandwirelesstiedtogether.They coordinateandsharetheirattackacrossanetworkconnectingreconnaissancedrones,command nodes,andothersoldiers.Theyfunctionbothasweaponsreceivingoff-boardintelligenceandasa sourceofintelligence.Theyputsoldiersintop-levelsupervisorycontrolwhilemovingthemoutof thereal-timecontrolloop,allowingtheirweaponstofind,track,attack,anddestroytheirtargets inahighlyautonomousmanner.Theyturbochargethetempoofcombat.Theydispelthefogof war.Theysavethelivesoftheiroperators.InthebattleofKyiv,theyhelpwinthefightagainstlong oddsandanoverwhelmingweightofarmor.

IoTisnotnew.Morethanhalfacenturyago,theinternetprotocolswereconceivedastheglueof anIoTsystem,onethatwouldconnectearlywarningsensorsdetectingincomingintercontinental missileswithcommandnodesandsystemsofresponse.Whilethefirstinternetwasnotultimately usedforthisapplication,itsrationalewasclearlythecreationofanetworkofsystemstosenseand respondinanation’sdefense–itwasconceivedasanIoTsystemofsystemsforwar.Realizing thepowerofIoTrequireddecadesofmaturationinfivecoretechnologies:sensors,wireless networkingandcommunication,cloudordistributedcomputing,intelligentalgorithms,and digitallycontrolledactuators.LiketheInternetitself,defenseinvestmentlargelyinventedthese technologiesandtheirunderlyingconceptswhilethemuchgreatercommercialmarketpowered theirexpandedperformanceandreducedtheirsize,weight,power,andespeciallycost.These technologiescontinuetoadvance,buttheyalreadyenableemergingIoTsystemstorealizeavision anticipatedfordecades.Asdescribedbelow,IoTwillrevolutionizewarfare.Itwillrevolutionize hownationssecurethemselvesandmaintainpeace.Thetechnologyisalreadydoingso,although

xxvi Introduction:IoTforDefenseandNationalSecurity

itisnotoftenreferredtoasIoT.Despitetheirimpacttodateandtheirstillgreaterfuturepromise, IoTsystemsusedformilitaryaffairsstillfacemanychallenges–challengesnotfacedorfacedto thesamedegreebycommercialIoT.

Inthecommercialsector,hundredsofbookshavebeenwrittenonIoT.ArguablyIoTtechnology impactsdefenseandnationalsecuritymorethananycommercialdomain;however,notasingle bookexistsonthetopic.Thesubjectisshroudedinsecrecyandgovernmentrestrictions,isolating itfromthepublicrealm.ThisBookprovidesafirstlookatwhatcanbereleased.Leadingscientists andtechnologistsdescribetheirlatestresearchresults.TheyaddressawiderangeoftopicsincludingIoTsecurityinhostileenvironments,artificialintelligence(AI)inIoTfordefense,andtactical networksinadisrupted,intermittent,andlimited-bandwidthbattlefield.Forexample,thisBook explainsthatinsuchaworldIoTcanbesustainedinthecauldronofcombatusingcontent-based routing,configuredwithmobilead-hocnetworksthatridejam-defiantandintercept-resistant electronicallyformedbeams.

ThisbookofferssolutionstospecialchallengesofIoTfordefensethatsetitapartfromthecommercialenvironment.Itenumeratessomeoftheoutstandingandunsolvedtechnicalproblems. ItlooksatseveraldifferentvisionsforthefutureofIoTrangingfromIoT-enabledriflestoentire logisticssystemspoweredbyIoT.Itprovidesseveralcasestudiesbypractitionersinthefieldfrom defensemanufacturingtothedesignofwarships.Itprovidesaroadmapforpolicyandregulation ofgovernmentuseofIoT.ThisBookinnowaypurportstobeacomprehensivereviewofIoT fordefense,fortworeasons.First,noonevolumecanspansuchanextensivedomain.Second, governmentssequestermuchofthematerial.Thisbookpresentsanintroductiontothesubject–a samplingofitsmanyaspects.Thepublicremainslargelyunawareoftheseissues,buttheyare criticallyimportanttogovernmentsandindividualswhoareprotectedbyIoTsystemsandin placesoppressedbythem.

Sections1to4ofthisBookassumesomepriorknowledgeofIoT.ForIoTneophytesorthose whowantmorebackgroundandcontextontheelementsofIoTfordefenseandnationalsecurity, thefirstpartofChapter21providesthatintroduction,andthebeginnermightwanttostartthere. Section1ofthisBookpresentsasamplingofchallenges,applications,andopportunitiesforIoT usedfordefense.Section2reviewstheroleofAIinIoTfordefenseandaddressesselectedcase studiesandkeychallengesassociatedwithAI-basedIoT.Section3discussessecurityissuesand solutionsforoperatingdistributedIoTnetworksinadversarialenvironments.Section4addresses thekeychallengeofprovidingIoTsystemswithreliablecommunicationsandnetworkingin mobile,dynamic,andhostileenvironments.Ithighlightsdifferingrequirementsbetweendefense andcommercialIoTandsuggesthowonemightbuildontheother.ThefinalChapter,21, addressesissuesofregulatingIoTtoadvanceitsusewhileblockingitsmisuseandabuse.

2WhatIsIoT?

Asarevolutionintechnology,IoTrivalstheInternetonwhichitdepends.Itisnotjustanother applicationridingontheInternet,butafundamentaladvanceintechnology.Itcanautomateour world.IoTsensestheworld,analyzesthedatainthelightofmissionrequirements,andthentakes actionsthataffectthephysicalworld.Thisisunique–closingtheloopautomaticallyinthephysical world.Theonlysimilartechnologyconsistsofcontrolsystems.Insomesense,IoTisacontrolsystemfortheworld.IoTcombinesthreeelements–sensingandinformationextraction,processing, andaction.Theseelementsrideontopofdigitalcommunicationandnetworking,aninfrastructure thathasbecomecheaper,smaller,andevergreaterincapacity,especiallywiththeadventof5G wirelesstechnology.IoTgoesbeyondsensingandprocessinginformation.Itfusesthetechnology

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.